Você está na página 1de 103

Questions and Answers

Q1. What are the different types of softwares? Explain each type.
Types of Softwares:-
1. Systems Software
2. Application Software
3. Embedded Software
Systems Software:-
1. Designed to operate and control the Computer Hardware.
2. Designed to provide a platform for running Application Software.
3. May also include Software Development tools (like a Compiler, Linker or Debugger).
Application Software:-
1. Helps a computer to perform useful tasks beyond the running of the computer itself.
2. Examples include Accounting Software, Enterprise Software, Graphics Software, Media Players,
and Office Suites.
Embedded Software:-
1. Software written to control machines or devices that are not typically thought of as computers.
2. Specialized for the particular Hardware that it runs on
3. Time and Memory Constraints.
4. Mostly Initiated/Controlled not through Human Interface, but through Machine Interface

Q2. What is operating software and what are its applications??

Operating software (OS)

An operating software/system or OS is a software program that enables the computer hardware to communicate
and operate with the computer software. The operating system is the most important program that runs on a
computer. Operating systems perform basic tasks, such as recognizing input from the keyboard, sending output to
the display screen, keeping track of files and directories on the disk, and controlling peripheral devices such as disk
drives and printers. Application programs usually require an operating system to function.

An understanding of how a user uses a System.
For large systems, the operating system has even greater responsibilities and powers. It is like a traffic cop -- it
makes sure that different programs and users running at the same time do not interfere with each other. The
operating system is also responsible for security, ensuring that unauthorized users do not access the system.
For hardware functions such as input and output and memory allocation, the operating system acts as an
intermediary between programs and the computer hardware, although the application code is usually executed
directly by the hardware and will frequently make a system call to an OS function or be interrupted by it. Operating
systems can be found on almost any device that contains a computerfrom cellular phones and video game
consoles to supercomputers and web servers.
Examples of popular modern operating systems include Android, BSD, iOS, GNU/Linux, OS X, QNX, Microsoft
Windows,Windows Phone, and IBM z/OS. All these, except Windows and z/OS, share roots in UNIX.
The following schematic explains the entire function of the Operating Software (Operating System)




Operating software types
As computers have progressed and developed so have the operating systems. Below is a basic list of the different
operating systems and a few examples of operating systems that fall into each of the categories. Many computer
operating systems will fall into more than one of the below categories.

GUI - Short for Graphical User Interface, a GUI Operating System contains graphics and icons and is
commonly navigated by using a computer mouse. See the GUI definition for a complete definition. Below
are some examples of GUI Operating Systems.
System 7.x
Windows 98
Windows CE

Multi-user - A multi-user operating system allows for multiple users to use the same computer at the
same time and different times. See the multi-user definition for a complete definition for a complete
definition. Below are some examples of multi-user operating systems.
Linux
Unix
Windows 2000

Multiprocessing - An operating system capable of supporting and utilizing more than one computer
processor. Below are some examples of multiprocessing operating systems.
Linux
Unix
Windows 2000

Multitasking - An operating system that is capable of allowing multiple software processes to run at the
same time. Below are some examples of multitasking operating systems.
Unix
Windows 2000

Multithreading - Operating systems that allow different parts of a software program to run concurrently.
Operating systems that would fall into this category are:
Linux
Unix
Windows 2000


Application of Operating Software
Personal Computer
Mobile phone
Military Purposes
Video Games
Supercomputers
Web-servers

Q3. What are the future trends in computer Hardware? What is Moore's law, and explain its significance in
development of computers.
Moores Law states that:
1) The power of microprocessors doubles every 18 months
2) Computing power doubles every 18 months
3) The price of computing falls by half every 18 months
The exponential increase in processing power and the decrease in cost of producing microprocessors since the
1960s has resulted in rapid development in computer hardware over the past 40 years. It is also used as by the
semi-conductors industry as a baseline for long term growth and to set targets their research and development
activities
Based on the above trends in computer Hardware, we can predict the following future trends:
1) Processing speed: Increased exponentially over the past 60 years. Roughly, increases by 100% every 18
months.
2) Size: Size has been getting smaller and smaller. The early computers used to be large enough to fill an entire
room. Todays computers can be easily carried in the palm of a hand. Computers which are smaller and lighter
tend to be more comfortable for the user. This is likely to be a driver for design of lighter computers in the future.
3) Mobility: Over the past 10 years, with the advancements in microprocessors have meant many handheld
phones and tablets are now performing functions traditionally performed by computers. Due to the increasing
advances in communication technologies, mobile devices are well on the way to replace desk computers as the
most used devices to access the internet.
4) Cost: Only Government and large institutions were able to afford them. Over the years, the price has steadily
fallen. The cost of computer hardware will keep on declining, even more so vis--vis computer software, and this
will result in increased penetration for computers throughout the world.

Questions

Q1- WHAT IS NETWORKING AND WHAT ARE THE USES OF NETWORKING IN BUSINESS APPLICATIONS?

Ans:
Networking: Networking is a a collection of autonomous computers interconnected by a single technology.
Computers are able to exchange information. It is a practice of linking two or more computing devices together.


(1) Client-Server Model:

For smaller companies, all the computers are likely to be in a single office orperhaps a single building, but for larger
ones, the computers and employees maybe scattered over dozens of offices and plants in many countries.
Nevertheless, a sales person in Headquarters of a company might sometimes need access to a product inventory.
Networking maybe used to join the individual networks at different sites into one extended network.In other
words, the mere fact that a user happens to be far awayfrom his data should not prevent him from using the data.

This whole arrangement is called the client-server model. It is widely usedand forms the basis of much network
usage. The most popular realization is thatof a Web application, in which the server generates Web pages based
on its databasein response to client requests that may update the database. The client-servermodel is applicable
when not only the client and server are both in the same building (andbelong to the same company), but also
when they are far apart. For example,when a person at home accesses a page on the World Wide Web, the same
modelis employed, with the remote Web server being the server and the users personalcomputer being the client.
Under most conditions, one server can handle a largenumber (hundreds or thousands) of clients simultaneously.




(2) Communication Medium:

A computer network can provide a powerful communication medium among employees. Virtually every company
that has two or more computers now has email (electronic mail), which employees generally use for a great deal of
daily communication.

Employees at distant locations can see and hear each other as they hold a meeting. This technique of Computer
Networking is a powerful tool for eliminating the cost and time previously devoted to travel.

Desktop sharing letsremote workers see and interact with a graphical computer screen. This makes iteasy for two
or more people who work far apart to read and write a shared blackboardor write a report together. When one
worker makes a change to an online document, the others can see the change immediately, instead of waiting
severaldays for a letter. Such a speedup makes cooperation among far-flung groups ofpeople easy where it
previously had been impossible.
More ambitious forms ofremote coordination such as telemedicine are only now starting to be used (e.g., remote
patient monitoring) but may become much more important.

(3) E-commerce:

A third goal for many companies is doing business electronically, especiallywith customers and suppliers. This new
model is called e-commerce (electroniccommerce) and it has grown rapidly in recent years. Airlines, bookstores,
andother retailers have discovered that many customers like the convenience of shoppingfrom home.
Consequently, many companies provide catalogues of their goodsand services online and take orders online.
Manufacturers of automobiles, aircraft,and computers, among others, buy subsystems from a variety of
suppliersand then assemble the parts. Using computer networks, manufacturers can place orders electronically as
needed. This reduces the need for large inventories andenhances efficiency.

Q2 What are the different parameters according to which computer networks can be distinguished? Categorize
computer networks according to these parameters.
Ans. Computer networks can be distinguished according to their architecture, topology or geography/scope. These
parameters are described below:
- Architecture-The architecture of a network describes its logical arrangement or configuration. It basically
describes how the client, who is the requester of services, communicates with the server, who is the provider
of services.

- Topology The topology of a computer network describes its physical arrangement in terms of how the nodes
of the network connect with each other, to a network backbone or to a central hub. It basically describes the
structure of the network in terms of the physical connections and patters used to connect the network
entities.

- Geography/Scope This element describes how the various nodes of a network are distributed and how
distant they are from each other. It describes their relative geographical separation.

Categorization of networks according to these parameters is done below:

Division according to architecture: In terms of the architecture, computer networks can be divided as below
Two Tier(or client tier) This is the simplest architecture where a client is directly connected to a
data server and the client holds the application logic
Three Tier This architecture has an additional application server between client and server tiers
and this application server hosts the processing logic thereby freeing client of that responsibility
Multi Tier In this architecture, the application as well as the data server tiers are divided across
multiple servers which may or may not be present at geographically different locations.
Peer to Peer In this architecture, there are no separate clients or servers. A client can act as both
the client as well as a server at different times.


Division according to topologies: In terms of the topology, computer networks can be divided as follows
Bus The simplest topology where all nodes are connected to a single network backbone
Ring All the nodes are connected to two adjacent nodes and hence they together form a ring
Star Every node is connected to a central network hub
Mesh All nodes have direct routes to all other nodes. In an incomplete mesh, some redundant
routes may be pruned
Tree The nodes are arranged in a tree like manner where each node is connected to a subtree of
nodes or is a terminal node
Division according to scope/geography: In this classification, networks may be divided as follows
LAN (Local Area Network) Here all the nodes of a network are present in either the same building or in
the same campus. The nodes are close enough to be connected via direct cables originating from routers
MAN (Metropolitan Area Network) In this scope, the nodes is present in different buildings across a
wider area and special communication systems like private networks or virtual private networks are used.
Computer systems in a set of offices in a city is an example of this type
Computer Networks
Architecture
Wise
Two
Tier
Three
Tier
Multi
Tier
Peer
to
Peer
Topology Wise
Ring Star Bus Mesh
Complete Incomplete
Tree
Geography
Wise
LAN MAN WAN
WAN (Wide Area Network)- In this scope, the nodes are wide apart with even entire continental spaces or
oceans may separate them. Hence in this type, satellite communication and other long distance modes of
connecting to the network are used.
Q3- What is wireless technology ?What are various emerging trends in wireless technology ? Discuss.

Different methods and standards of wireless communication have developed across the world, based on various
commercially driven requirements. These technologies can roughly be classified into four individual categories,
based on their specific application and transmission range.



1) Personal Area Network (PAN)
A Personal Area Network (PAN) is a computer network used for communication among computer devices
(including telephones and personal digital assistants) close to one person. The reach of a PAN is typically a few
meters. PANs can be used for communication among the personal devices themselves (intrapersonal
communication), or for connecting to a higher level network and the Internet.
Personal area networks may be wired with computer buses such as USB and FireWire. However, a Wireless
Personal Area Network (WPAN) is made possible with network technologies such as Infrared (IrDA) and Bluetooth.

and infrared
ininfrared


Bluetooth: Bluetooth is an industrial specification for wireless personal area networks (PANs), also known as IEEE
802.15.1. Bluetooth provides a way to connect and exchange information between devices such as personal digital
assistants (PDAs), mobile phones, laptops, PCs, printers, digital cameras and video game consoles via a secure,
globally unlicensed short-range radio frequency.
Bluetooth is a radio standard and communications protocol primarily designed for low power consumption, with a
short range (power class dependent: 1 metre, 10 metres, 100 metres) based around low-cost transceiver
microchips in each device.

Infrared (IrDA): The Infrared Data Association (IrDA) defines physical specifications communications protocol
standards for the short range exchange of data over infrared light, for typical use in Personal Area Networks.
Some common applications of infrared technology are listed below.
1. Augmentative communication devices
2. Car locking systems
3. Computers
a. Mouse
b. Keyboards
c. Floppy disk drives
d. Printers
4. Emergency response systems
etc.





2) Local Area Network (LAN)
A wireless LAN or WLAN is a wireless Local Area Network, which is the linking of two or more computers without
using wires. It uses radio communication to accomplish the same functionality that a wired LAN has. WLAN utilizes
spread-spectrum technology based on radio waves to enable communication between devices in a limited area,
also known as the basic service set. This gives users the mobility to move around within a broad coverage area and
still be connected to the network.
IEEE 802.11: IEEE 802.11, the Wi-Fi standard, denotes a set of Wireless LAN/WLAN standards developed by
working group 11 of the IEEE LAN/MAN Standards Committee (IEEE 802). The 802.11 family currently includes six
over-the-air modulation techniques that all use the same protocol. The most popular (and prolific) techniques are
those defined by the b, a, and g amendments to the original standard.



3)Metropolitan Area Network (MAN)
Wireless Metropolitan Area Network (MAN) is the name trademarked by the IEEE 802.16 Working Group on
Broadband Wireless Access Standards for its wireless metropolitan area network standard (commercially known as
WiMAX), which defines broadband Internet access from fixed or mobile devices via antennas. Subscriber stations
communicate with base-stations that are connected to a core network. This is a good alternative to fixed line
networks and it is simple to build and relatively inexpensive.

4)Wide Area Network (WAN)
A Wide Area Network or WAN is a computer network covering a broad geographical area. Contrast with personal
area networks (PANs), local area networks (LANs) or metropolitan area networks (MANs) that are usually limited
to a room, building or campus. The largest and most well-known example of a WAN is the Internet.
WANs are used to connect local area networks (LANs) together, so that users and computers in one location can
communicate with users and computers in other locations. Many WANs are built for one particular organisation
and are private. Others, built by Internet service providers, provide connections from an organisation's LAN to the
Internet.

Emerging trends in various technologies -
-WiMAX: WiMAX is defined as Worldwide Interoperability for Microwave Access by the WiMAX Forum, formed in
June 2001 to promote conformance and interoperability of the IEEE 802.16 standard, officially known as
WirelessMAN. The Forum describes WiMAX as "a standards-based technology enabling the delivery of last mile
wireless broadband access as an alternative to cable and DSL".The range of WiMAX probably generates more
confusion than any other single aspect of WiMAX. It is common to see statements in the media describing WiMAX
multipoint coverage extending 30 miles. In a strict technical sense (in some spectrum ranges) this is correct, with
even greater ranges being possible in point to point links. In practice in the real world (and especially in the license-
free bands) this is wildly overstated especially where non line of sight (NLOS) reception is concerned.
Due to a variety of factors, the average cell ranges for most WiMAX networks will likely boast 4-5 mile range (in
NLOS capable frequencies) even through tree cover and building walls. Service ranges up to 10 miles (16
Kilometers) are very likely in line of sight (LOS) applications (once again depending upon frequency). Ranges
beyond 10 miles are certainly possible but for scalability purposes may not be desirable for heavily loaded
networks. In most cases, additional cells are indicated to sustain high quality of service (QOS) capability. For the
carrier class approach, especially as regards mobility, cells larger than this seem unlikely in the near future.



-Rapid growth in medical monitoring applications
Now wireless sensor technology is allowing us to easily monitor the critical life-signs of patients. Previously, the
lack of suitable sensors, combined with an un-workable tangle of wires, has severely limited medical applications.
Now patients can be monitored effectively for serious conditions such as sleep apnoea, while in bed sleeping. Or
monitoring critical parameters such as heart rate, while a patient is undergoing strenuous physical exercise and the
connection of wires is impractical.
-Wireless medical implants
Medical applications are undergoing massive growth as it becomes increasingly possible to monitor patients with
tissue-implantable wireless-linked sensors.
This is one of the most important of the emerging wireless technology trends as these applications can potentially
improve the quality of life for so many who suffer from a chronic medical condition.

-Radio Frequency Identification

Radio Frequency Identification is one of the wireless technology trends that is rapidly gaining momentum
worldwide.
You can use it for identifying and tracking products, as they move from manufacturer to supplier and even
between countries. This technology takes asset management to a whole new level. More and more people are
tracking manufactured goods in real time, using wireless telemetry .

Questions & Answers

Q.1 What is Internet, Intranet & Extranet?
What are their various advantages & disadvantages?
What are their business applications?
An Internet is a global system of interconnected computer networks that use the standard Internet protocol
suite (TCP/IP) to serve several billion users worldwide. It is a network of networks that consists of millions of
private, public, academic, business, and government networks, of local to global scope, that are linked by a broad
array of electronic, wireless and optical networking technologies.
An intranet is a computer network that uses Internet Protocol technology to share information, operational
systems, or computing services within an organization.
An extranet is a computer network which allows controlled access from the outside, for specific business or
educational purposes. In a business-to-business context, an extranet can be viewed as an extension of an
organization's intranet that is extended to users outside the organization, usually partners, vendors, and suppliers,
in isolation from all other Internet users.
Following are the advantages of these above:
Internet:
Faster Communication & Social Networking: The foremost target of Internet has always been speedy
communication and it has excelled way beyond the expectations. New innovations are only going to make
it faster and more reliable.
Information Resources: Information is probably the biggest advantage that Internet offers. Internet is a
virtual treasure trove of information. Any kind of information on any topic under the sun is available on
the Internet. Today, it is almost required that students should use it for research or the purpose of
gathering resources.
Entertainment: It is another popular reason why many people prefer to surf the Internet. In fact, the
Internet has become quite successful in trapping the multifaceted entertainment industry. Downloading
games or just surfing the celebrity websites are some of the uses people have discovered.
Intranet:
Time Saving: Intranets allow organizations to distribute information to employees on an as-needed basis.
Communication: Intranets can serve as powerful tools for communication within an organization.
Business operations and management: Intranets are also being used as a platform for developing and
deploying applications to support business operations and decisions across the internet worked
enterprise.
Cost-effective: Users can view information and data via web-browser rather than maintaining physical
documents. This can potentially save the business money on printing, duplicating documents.
Enhance collaboration: Information is easily accessible by all authorized users, which enables teamwork.
Cross-platform capability: Standards-compliant web browsers are available for Windows, Mac, and UNIX.
Rich in Format: Intranet allows employees to view documents in various rich formats ((e.g. Word, Excel,
PowerPoint, PDF, video, audio). Multimedia programs can be used with intranet as well, allowing for
better communication and information being shared very fast.
Extranet:
Exchange large volumes of data using Electronic Data Interchange (EDI)
Share product catalogs exclusively with trade partners
Collaborate with other companies on joint development efforts
Jointly develop and use training programs with other companies
Provide or access services provided by one company to a group of other companies, such as an online
banking application managed by one company on behalf of affiliated banks
Improved quality.
Lower travel costs.
Lower administrative & other overhead costs.
Reduction in paperwork.
Delivery of accurate information on time.
Improved customer service.
Better communication.
Overall improvement in business effectiveness.
Following are the disadvantages of these above:
Internet:
Theft of personal information such as name, address, credit card number etc.
Virus threats nothing but a program which disrupts the normal functioning of your system.
Spamming refers to receiving unwanted e-mails in bulk, which provide no purpose and needlessly
obstruct the entire system.
Pornography: This is perhaps the biggest threat related to childrens healthy mental life. A very serious
issue concerning the Internet.
Social Disconnect: Thanks to the Internet, people now only meet on social networks. More and more
people are getting are drifting apart from their friends and family. Even children prefer to play online
games rather than going out and mingling with other kids.
With all its falls the internet has the potential to make your life simple and convenient, as well as wreak havoc in
your life. Its influence is mostly dictated by the choices you make while you are online. With clever use, you can
manage to harness its unlimited potential.
Intranet:
A company may not have person to update their
Fear of sharing information and the loss of control
Limited bandwidth for the business
Unauthorized access
Abuse of access
Denial of service
Information overload lowers productivity
True purpose of the Intranet is unknown to many employees/departments
Hidden or unknown complexity and costs
Extranet:
The suppliers & customers who dont have technical knowledge feel problem.
Faceless contact.
Information can be misused by other competitors.
Fraud may be possible.
Technical Employees are required.
Following are the business applications of these above:
Internet:
Download programs and files
E-Mail
Voice and Video Conferencing
E-Commerce
File Sharing
Information browsing
Search the web addresses for access through search engine
Chatting and many more
Intranet:
Sharing of company policies/rules & regulations
Access employee database
Distribution of circulars/Office Orders
Access product & customer data
Sharing of information of common interest
Launching of personal/departmental home pages
Submission of reports
Corporate telephone directories
Extranet:
Supply-chain management
Customer communications
Distributor promotions
Online continuing education/training
Customer service
Order status inquiry
Inventory inquiry
Account status inquiry
Warranty registration
Claims
Online discussion forums
Q.2 Discuss in details the emerging trends in Internet.
Following are some of the current emerging trends in Internet:
Emerging markets are driving the world's online future. In 2012, the world had 2.4 billion Internet users,
with a growth of 8 percent since 2011. Much of that growth comes from emerging markets. Future
Internet growth potential remains very high for many overseas markets. Despite contributing significantly
to Internet growth, some countries have only a small percentage of their total populations online,
representing tremendous potential for future growth.
Most top websites are American, but most Internet users are not. Eighty percent of the Top 10 global
Internet properties -- including Facebook, Google, and Twitter -- are from companies headquartered in
the United States.
Smartphone adoption soars -- especially in emerging markets. Smartphone subscriber growth remains
rapid, with 1.5 billion current subscribers, and 31 percent growth in 2013. There is also ample room for
market development, with only 21 percent global penetration currently. Some of the fastest Smartphone
adoption rates are found in India, Indonesia, Russia, and Mexico.
Mobile traffic makes up a sizeable share of global Internet traffic. In 2008, mobile traffic accounted for
less than 1 percent of all online traffic. Fast forward to May 2013, and mobile traffic now makes up 15
percent. In China, mobile Internet access actually surpassed PC access in the second quarter of 2012.
Mobile OS and showcase using iPad or Android More people access the Internet on their mobile devices
than on any other device. We are rapidly approaching the time where designs must be created for the
mobile Web first. The goal will be to enable each and every store colleague to transact, checkout and take
payments without going to the tills. With iOS 6 and Android 4.2 Jellybean, the features you can enable in
the customer assisted app are endless.
Advanced website browsing on mobile/iPad/tablets Along with the above assisted scenarios, potential
growth of mobile/iPad in retail eCommerce is enormous. With the current projections, in the next couple
of years mobile/iPad will exceed desktop numbers. Companies are actively taking advantage of mobile
functions.
Social media like Facebook & others Facebook has more than 850M+ subscribers, and it is a known fact
that number grows by 20% or more every year in emerging countries. Companies will take more and more
advantage from the various set of data about users daily activity using Facebook Connect, like offering
promotions on products which they most commented on or identifying what their friends mostly like and
recommending the same when they visit the store.
Time based availability Some of the hottest and most successful sites are those that have a time-critical
response component.
Getting It Right on Every Device-Responsive design will be a must have for mobile sites, ensuring your site
is designed for optimal viewing no matter what mobile or tablet device is being used.

Q.3 what is protocol?
What are the different types of protocols?
Explain the IPV6 protocol in detail.
A protocol is a set of rules that govern data communications. A protocol defines what is communicated, how it is
communicated, and when it is communicated. The key elements of a protocol are syntax, semantics, and timing.
The Internet Protocol (IP) is the principal communications protocol in the internet protocol suite for relaying
datagram across network boundaries. Its routing function enables inter-networking & essentially establishes the
internet.
Some of the most commonly used protocols are TCP, IP, UDP, POP, SMTP, HTTP, and FTP.
Internet Protocol version 6 (IPv6) is the latest revision of the Internet Protocol (IP) that provides an identification
and location system for computers on networks and routes traffic across the Internet. Every device on the Internet
must be assigned an IP address in order to communicate with other devices. With the ever-increasing number of
new devices being connected to the Internet, the need arose for more addresses than IPv4 is able to
accommodate.IPv6 is the next generation Internet Protocol (IP) address standard that will supplement and
eventually replace IPv4, the protocol most Internet services use today. To allow the Internet to continue to grow
and spread across the world, implementing IPv6 is necessary. Therefore, network operators and enterprises will
need to implement IPv6 in order to ensure long-term network growth and global connectivity.IPv6 is an important
part of ensuring continued growth and accessibility of your services to the rest of the Internet and emerging
markets in particular. As the Internet progressively becomes a dual IPv4/IPv6 network, ensuring that you are IPv6
enabled will be critical for retaining universal Internet connectivity for your clients, users, and subscribers, business
partners and suppliers. Every company even those not directly involved in the Internet industry ought to have
IPv6 on its strategic roadmap, and move IPv6 deployment higher on its to-do list.
The new IPV6 protocol would provide the following advantages over the old IPV4 protocol:

Prevent Increased Costs: Companies will need to spend more to cope with the scarcity of IPv4 addresses,
whether its in workarounds, buying networking gear or trying to buy more IPv4 addresses. The fact is, it is
more expensive if you dont plan for it.
Prevent Disruption to Your Websites: Businesses that do not commit to IPv6 transition, and do not start to
take the proper steps to initiate this process now, will risk accessibility problems of their websites and
other Internet-connected locations and services. A recent McKinsey Global Institute Internet Matters
report claimed that 75 percent of the economic value produced by the Internet benefits traditional
industries, not Internet-based enterprises.
Growth of Your Global Business Depends on It: Some parts of the world are completely out of new IPv4
addresses, including emerging economies that are experiencing the most economic growth. The use of
IPv6 will soon be a requirement for companies looking to tap into these growth opportunities.
Avoid Diminishing Experience for Your Customers and Access to Your Supply Chain: If the IPv6 transition
happens as expected, most users wont notice any change in their Internet use, but those that are still
operating on IPv4 will have a diminished experience sooner or later.
Organizations that continue to rely solely on IPv4 with no plans to implement IPv6 in the near future risk running
into a host of business challenges, from increased costs and limited website functionality, to inhibiting critical
growth opportunities in emerging markets and beyond. The only long-term solution to this shortage, and
subsequent business disruptions, is adoption of IPv6, providing a practically unlimited number of addresses.

Question 1:
Discuss the evolution of database over time from traditional database to modern database and enlist its benefits
to business.
Ans. 1968 File-Based: predecessor of database, Data was maintained in a flat file.
Benefits: Various access methods, e.g., sequential, indexed, random
[1968-1980] Era of Hierarchical Database:
Benefits : Efficient searching, Less redundant data, Data independence & Database security and integrity.
Network Data Model:
Benefits : Ability to handle more relationship types, Ease of data access, Data Integrity & Data Independence.It can
efficiently manage a large number of different data types, Objects with complex behaviors are easy to handle using
inheritance and polymorphism, Reduces the large number of relations by creating objects.

Question 2:
What are data warehousing and data mart. Explain their business applications. What is Data Mart?
Ans. Concepts: In computing, a data warehouse or enterprise data warehouse (DW, DWH, or EDW) is
a database used for reporting and data analysis. It is a central repository of data which is created by integrating
data from one or more disparate sources. Data warehouses store current as well as historical data and are used for
creating trending reports for senior management reporting such as annual and quarterly comparisons. The data
stored in the warehouse are uploaded from the operational systems (such as marketing, sales etc., shown in the
figure to the right). The data may pass through an operational data store for additional operations before they are
used in the DW for reporting.
Application:
Retail :-
1. Data warehousings early adopters
2. Capturing data from their POS systems
POS = point-of-sale
3. Industry analysts predict that brick-and-mortal retailers will see a slowdown in sales growth over the next
several years (Silverman, 1998).
4. Market Basket Analysis
5. In-Store Placement
6. Use decision support to understand which items are being purchased, where they belong, and modify
configurations in order to maximize the # of items in the market basket.
7. Retailers are able to negotiate more effectively with their suppliers
8. Display space, product placement
9. Product Pricing
o Price elasticity models manipulate detailed data to determine not only the best price, but often different
prices for the same product according to different variables
o Permits differential pricing
10. Product Movement and Supply chain
11. Analyzing the movement of specific products and the quantity of products sold helps retailers predict
when they will need to order more stock
12. Product sales history allows merchandisers to define which products to order, the maximumnumber of
units and the frequency of reorders
13. Automatic replenishment with JIT delivery

Financial Services:-
1. The pioneers of the data warehouse
o Business intelligence has become a business mandate as well as a competitive weapon.
o 1999 Financial Services Modernization Act:- Requires financial service and insurance
companies to disclose how they will use data collected from their customer
2. Profitability Analysis
Cannot know the true value of a customer without understanding how profitable that
customer is
Used by many banks to help dictate the creation of new products or the expunging of old
ones.
3. Risk Management and Fraud Prevention
DW provides a banking compnay with a scientific approach to risk management
Helps pinpoint specific market or customer segment that may be higher risk than others
Examines historical customer behavior to verify that no past defaults have occurred
Ever gotten a call from you credit card company asking about a recent purchase
4. Propensity Analysis and Event-Driven Marketing
Helps bank recognize whether a customer is likely to purchase a given product and
service, and even when such a purchase might occur
Example:Loan for college tuition may mean a graduation gift or wedding in the future
5. Distribution Analysis and Planning
o By understanding how and where customers perform their transactions, banks can tailor
certain locations to specific customer groups.
o Allows banks to make decisions about branch layouts, staff increases or reductions, new
technology additions or even closing or consolidating low-traffic branches

Telecommunications:-
1. Churn
Differentiate between the propensity to churn and actual churn. Differentiate between
product church and customer churn
2. Fraud Detection
Data mining tools can predict fraud by spotting patterns in consolidated customer
information and call detail records
3. Product Packaging and Custom Pricing
Using knowledge discover and modeling, companies can tell which products will see well
together, as well as which customers or customer segments are most likely to buy them
Packaging of vertical features
Voice products such as caller ID, call waiting
Employ price elasticity models to determine the new package's optimal price
4. Network Feature Management
By monitoring call patterns and traffic routing, a carrier can install a switch or cell in a
location where it is liable to route the maximum amount of calls
Historical activity analysis can help telecommunications companies predict equipment
outages before they occur
5. Call Detail Analysis
Analysis of specific call records
Helps provide powerful information about origin and destination patterns that could
spur additional sales to important customers
Data Mart:- A data mart is a small data warehouse focused on a specific area of interest. Data warehouses can be
subdivided into data marts for improved performance and ease of use within that area. Alternatively, an
organization can create one or more data marts as first steps towards a larger and more complex enterprise data
warehouse.

Question 3:
What is data mining? What are its various elements and data mining tasks? What are various business applications
of data mining?
Ans. Data mining is the process of analysing data from different perspectives and summarizing it into useful
information Technically, data mining is the process of finding correlations or patterns among dozens of fields in
large relational databases. The term is a buzzword and misused to mean any form of large-scale data or
information processing. Data mining uses information from past data to analyse the outcome of a particular
problem or situation that may arise. Data mining works to analyse data stored in data warehouses that are used to
store that data that is being analysed. That particular data may come from all parts of business, from the
production to the management. Managers also use data mining to decide upon marketing strategies for their
product. They can use data to compare and contrast among competitors. Data mining interprets its data into real
time analysis that can be used to increase sales, promote new product, or delete product that is not value-added
to the company.
Major elements of data mining:
1) Extract, transform, and load transaction data onto the data warehouse system
2) Store and manage the data in a multidimensional database system
3) Provide data access to business analysts and information technology professionals
4) Analyse the data by application software
5) Present the data in a useful format, such as a graph or table
In short the three key tasks that we do are:
Analyse
Reorganize
Summarize
How data mining works:
The analytical techniques used in data mining are often well-known mathematical algorithms and techniques.
What is new is the application of those techniques to general business problems made possible by the increased
availability of data and inexpensive storage and processing power. Also, the use of graphical interfaces has led to
tools becoming available that business experts can easily use.
Classes: Stored data is used to locate data in predetermined groups. For example, a restaurant chain could
mine customer purchase data to determine when customers visit and what they typically order. This
information could be used to increase traffic by having daily specials.
Clusters: Data items are grouped according to logical relationships or consumer preferences. For example,
data can be mined to identify market segments or consumer affinities.
Associations: Data can be mined to identify associations. The beer-diaper example is an example of
associative mining.
Sequential patterns: Data is mined to anticipate behaviour patterns and trends. For example, an outdoor
equipment retailer could predict the likelihood of a backpack being purchased based on a consumer's
purchase of sleeping bags and hiking shoes
Applications of data mining:
6. Customer targeting
Data mining is the analysis of historical business activities, stored as static data in data warehouse
databases, to reveal hidden patterns and trends. Data mining software uses advanced pattern recognition
algorithms to sift through large amounts of data to assist in discovering previously unknown strategic
business information. Examples of what businesses use data mining for include performing market
analysis to identify new product bundles, finding the root cause of manufacturing problems, to prevent
customer attrition and acquire new customers, cross-sell to existing customers, and profile customers
with more accuracy.
In todays world raw data is being collected by companies at an exploding rate. For example, Wal-Mart
processes over 20 million point-of-sale transactions every day. This information is stored in a centralized
database, but would be useless without some type of data mining software to analyse it. If Wal-Mart
analysed their point-of-sale data with data mining techniques they would be able to determine sales
trends, develop marketing campaigns, and more accurately predict customer loyalty.

7. Credit card policy analysis
Every time we use our credit card, a store loyalty card, or fill out a warranty card data is being collected
about our purchasing behaviour. Many people find the amount of information stored about us from
companies, such as Google, Facebook, and Amazon, disturbing and are concerned about privacy.
Although there is the potential for our personal data to be used in harmful, or unwanted, ways it is also
being used to make our lives better. For example, Ford and Audi hope to one day collect information
about customer driving patterns so they can recommend safer routes and warn drivers about dangerous
road conditions
8. Customer relations management
Data mining in customer relationship management applications can contribute significantly to the bottom
line. Rather than randomly contacting a prospect or customer through a call centre or sending mail, a
company can concentrate its efforts on prospects that are predicted to have a high likelihood of
responding to an offer. More sophisticated methods may be used to optimize resources across campaigns
so that one may predict to which channel and to which offer an individual is most likely to respond (across
all potential offers). Additionally, sophisticated applications could be used to automate mailing. Once the
results from data mining (potential prospect/customer and channel/offer) are determined, this
"sophisticated application" can either automatically send an e-mail or a regular mail. Finally, in cases
where many people will take an action without an offer, "uplift modelling" can be used to determine
which people have the greatest increase in response if given an offer. Uplift modelling thereby enables
marketers to focus mailings and offers on persuadable people, and not to send offers to people who will
buy the product without an offer. Data clustering can also be used to automatically discover the segments
or groups within a customer data set
9. Human resource management:
Data mining can also be helpful to human resources (HR) departments in identifying the characteristics of
their most successful employees. Information obtained such as universities attended by highly
successful employees can help HR focus recruiting efforts accordingly. Additionally, Strategic Enterprise
Management applications help a company translate corporate-level goals, such as profit and margin share
targets, into operational decisions, such as production plans and workforce levels.
10. Astronomy
11. Molecular biology & genetics
12. Surveillance
Data mining has been used to fight terrorism by the U.S. government. Programs include the Total Information
Awareness (TIA) program, Secure Flight (formerly known as Computer-Assisted Passenger Pre-screening System
(CAPPS II)), Analysis, Dissemination, Visualization, Insight, Semantic Enhancement (ADVISE).
These programs have been discontinued due to controversy over whether they violate the 4th Amendment to the
United States Constitution, although many programs that were formed under them continue to be funded by
different organizations or under different names. In the context of combating terrorism, two particularly plausible
methods of data mining are "pattern mining" and "subject-based data mining"
13. Pattern mining:
"Pattern mining" is a data mining method that involves finding existing patterns in data. In this context patterns
often means association rules. The original motivation for searching association rules came from the desire to
analyse supermarket transaction data, that is, to examine customer behaviour in terms of the purchased products.
For example, an association rule "beer >potato chips (80%)" states that four out of five customers that bought beer
also bought potato chips.
In the context of pattern mining as a tool to identify terrorist activity, the National Research Council provides the
following definition: "Pattern-based data mining looks for patterns (including anomalous data patterns) that might
be associated with terrorist activity these patterns might be regarded as small signals in a large ocean of noise."
Pattern Mining includes new areas such a Music Information Retrieval (MIR) where patterns seen both in the
temporal and non-temporal domains are imported to classical knowledge discovery search methods.
14. Subject based data mining:
"Subject-based data mining" is a data mining method involving the search for associations between individuals in
data. In the context of combating terrorism, the National Research Council provides the following definition:
"Subject-based data mining uses an initiating individual or other datum that is considered, based on other
information, to be of high interest, and the goal is to determine what other persons or financial transactions or
movements, etc. are related to that initiating datum.
15. Knowledge Grid:
Knowledge discovery "On the Grid" generally refers to conducting knowledge discovery in an open environment
using grid computing concepts, allowing users to integrate data from various online data sources, as well make use
of remote resources, for executing their data mining tasks. The earliest example was the Discovery Net developed
at Imperial College London, which won the "Most Innovative Data-Intensive Application Award" at the ACM SC02
conference and exhibition, based on a demonstration of a fully interactive distributed knowledge discovery
application for a bioinformatics application. Other examples include work conducted by researchers at the
University of Calabria, who developed Knowledge Grid architecture for distributed knowledge discovery, based on
grid computing.


1. What is Knowledge Management?
The business of a business is business in itself. Profits are a business necessity. Hence Knowledge Management
becomes a business imperative!
In our daily life, we deal with huge amount of data and information. Data and information is not knowledge until
we know how to dig the value out of it. This is the reason we need Knowledge Management. There is no universal
definition of Knowledge Management, just as there is no agreement as to what constitutes knowledge in the first
place.
"Knowledge Management is the process of capturing, distributing, and effectively using knowledge."
Knowledge Management is a discipline that promotes an integrated approach to identifying, capturing, evaluating,
retrieving, and sharing all of an enterprise's information assets. These assets may include databases, documents,
policies, procedures, and previously un-captured expertise and experience in individual workers.
Knowledge Management is primarily about managing the knowledge of and in organizations.
The most central thrust in Knowledge Management is to capture and make available, so it can be used by others in
the organization, the information and knowledge that is in people's heads as it were, and that has never been
explicitly set down.
Another way to view and define Knowledge Management is to describe it as the movement to replicate the
information environment known to be conducive to successful R&Drich, deep, and open communication and
information accessand deploy it broadly across the firm. In the post-industrial information age, an increasingly
large proportion of the working population consists of information workers. The role of the researcher, considered
the quintessential information worker, has been studied in depth with a focus on identifying environmental
aspects that lead to successful research, and the strongest relationship by far is with information and knowledge
access and communication. It is quite logical then to attempt to apply those same successful environmental
aspects to knowledge workers at large, and that is what in fact Knowledge Management attempts to do.
Knowledge Management may be viewed in terms of:
People How do you increase the ability of an individual in the organisation to influence others with their
knowledge?
Processes Its approach varies from organization to organization. There is no limit on the number of processes
Technology It needs to be chosen only after all the requirements of a Knowledge Management initiative have
been established.
Or
Culture The biggest enabler of successful knowledge-driven organizations is the establishment of a knowledge-
focused culture
Structure the business processes and organisational structures that facilitate knowledge sharing
Technology a crucial enabler rather than the solution.

In traditional management of early twentieth century that dealt with the optimum utilization of labour, parts, and
other physical resources, capital was considered limited to the factories, machines, and other human-made inputs
into the production process. In the modern corporation with a KM initiative, the concept of capital is extended to
include ephemeral intellectual capital and its impact on individual and organizational behaviour.
The three major components of intellectual capital are:

1. Human capital
The knowledge, skills, and competencies of the people in the organization. Human capital is owned by the
employees and managers that possess it. Without a KM system in place, when employees and managers leave the
company; they take their skills, competencies, and knowledge with them.
2. Customer capital
The value of the organizations relationships with its customers, including customer loyalty, distribution channels,
brands, licensing, and franchises. Because customers often form bonds with a salesperson or customer
representative, customer capital typically is jointly owned by employee and employer. The proportion of customer
capital held by employees and employers depends on the relative contribution of customer loyalty to customer
capital.
3. Structural capital
The process, structures, information systems, and intellectual properties that is independent of the employees and
managers who created them. Intellectual properties are sometimes considered as a separate, fourth component of
intellectual capital.

Since management in every organization manipulates human, structural, and customer capital, every organization
uses Knowledge Management to some degree, though not necessarily in a sophisticated, formalized way. Not only
does the relative percentage of the three types of intellectual capital vary from one company to the next, but the
percent of human, customer, and structural capital varies from company to company, as well.









2. List the major technologies that support Knowledge Management and correlate with Knowledge
Management life cycle?
The following diagram reflects the main technologies that currently support Knowledge Management systems.

A large number of tools, many computer based, significantly boost the effectiveness of KM.
Infrastructure: groupware, intranets, document management, KM suites
Thinking: concept mapping, creativity tools
Gathering, discovering: search engines, alerting, push, data mining, intelligent agents
Organizing, storing: data warehousing, OLAP, metadata, XML
Knowledge worker support: case based reasoning, decision support, workflow, community support,
simulation
Application specific: CRM, expertise profiling, competitive intelligence
Hardware and Software: hardware is the electronic components and related periphery technologies that allows
end users to input data, the hardware processes that data, and outputs the data transformed into information
through one of the periphery technologies such as a monitor, printer, speakers, or other similar output technology.
Hardware also serves as a storage device: storage devices save data and applications. Common storage devices
include CDs, DVDs, and USB drives.
Software: Software generally is defined as a series of data and instructions written by computer programmers
using a programming language to perform a certain tasks.
Common Hardware technologies used in business include: Desktop computers, laptops, mainframes, MS Windows,
Mac OS, UNIX, Linux, servers, web servers, and blade servers.
Common Software technologies used in business include: enterprise applications, productivity and Office
Applications, communication and information-sharing software, and entertainment and Media development
software
Database Processing: is the system of collecting, storing, and processing data for the purpose of gathering
information, managing information, and creating new knowledge from the stored data.
Database Management Systems: Data processing in business is most often done using Database Management
Systems (DBMS). A DBMS is used to create, process, and maintain a database.
Some common inputs and outputs of a DBMS include; tables and forms to input data, queries to retrieve data, and
reports to output and present data.
Enterprise Database Managements Systems: This is a database system that supports a multi-user environment.
These are most often used in large businesses that require employees to input and process data using a variety of
different applications.
Common enterprise technologies include Microsofts MySQL Server and Oracles Oracle.
Data Communications & Internet Technologies: data communication technologies common in businesses include
local area networks (LANs) and wide area networks. (WANs). A LAN is a series of networked computers and devices
located within a single building, room, or campus. A WAN is a series of connected computer and devices that span
a large geographic area such as a city.
Internetworking technologies are primarily made up of protocols that are used to communicate data across the
Internet. These technologies are part of the Internet Protocol Suite. (This is found in the KM in Business PPT)
Common Internet technologies protocols include: the hypertext transfer protocol (HTTP), Simple Mail transfer
protocol (SMTP), File transfer protocols (FTP), and hypertext mark-up language (HTML).
These technologies roughly correlate to four main stages of the KNOWLEDGE MANAGEMENT life cycle:
1. Knowledge is acquired or captured using intranets, extranets, groupware, web conferencing, and
document management systems
2. An organizational memory is formed by refining, organizing, and storing knowledge using structured
repositories such as data warehouses.
3. Knowledge is distributed through education, training programs, automated knowledge based systems,
expert networks.
4. Knowledge is applied or leveraged for further learning and innovation via mining of the organizational
memory and the application of expert systems such as decision support systems.
All of these stages are enhanced by effective workflow and project management.
3. Explain the business implications of Knowledge Management for corporations.
The business of a business is business in itself. Profits are a business necessity. Hence Knowledge Management
becomes a business imperative!

The business implications of Knowledge Management are:
Leadership is essential
Someone in senior management has to own the KM effort. This manager is often termed the chief knowledge
officer (CKO) if the task is all-encompassing, or the chief information officer (CIO) or other senior manager may
take it on as an additional responsibility. Regardless of who takes the role, it involves achieving buy-in at all levels
in the organization.
Knowledge Management works
The potential benefits of Knowledge Management are numerous and can potentially benefit every type of
business, especially those involved in the information technology and service industries. What can a senior
manager expect from implementing KM in a corporation? Under optimum conditions, KM promises reduced costs,
improved service, increased efficiencies, and retention of intellectual assets.
Knowledge Management requires training
Employee and manager education is fundamental to the proper operation of every phase of the KM process.
Employees and managers have to be trained to focus on the overall process even while they are attending to
specific problems.
Expectations must be managed
Implementing a KM program involves fundamental changes in how employees and managers interact,
communicate, command, and get things done. Before reporting lines, responsibilities, and management directives
shift to meet the KM demands of the corporation, employees and managers must be prepared for the change.
However, since most people fear change, especially if it means disrupting a way of life that theyve grown
accustomed to, productivity can suffer unless employee expectations are managed proactively.

An effective approach is to demonstrate the process on a clearly defined, obvious goal that is an easy win.
Practical Knowledge Management is technology dependent
Each of the steps in the KM process, as well as tracking knowledge assets, can be enhanced by information
technologies. For example, the process of information creation is supported by the ubiquitous word processor
running on a PC, and painless acquisition is made possible by the web and associated networking hardware.
Similarly, storing and manipulating huge stores of data are made possible by database servers and software, and
getting data in the hands of users benefits from handheld devices and wireless networks that provide anytime,
anyplace access to information.
Knowledge Management is a process, not a product
Knowledge Management is a dynamic, constantly evolving process, and not a shrink-wrapped product. Knowledge
is an organizational process rather than a static collection of data that can be stored in a database. Typical KM
practices in a modern corporation include acquiring knowledge from customers, creating new revenues from
existing knowledge, capturing an employees knowledge for reuse later, and reviewing the predictors of a
successful KM initiative.
Knowledge Management Principles Apply in Varying Degrees
Every successful business operation, from the corner deli to the top Fortune 500 companies, uses Knowledge
Management to some degree, even if only in an unsophisticated, ad hoc way. However, the work that some
companies engage in is so dependent on individual talent, such as musical or graphical artistry, that the only
practical way to capture the relevant knowledge is through a lengthy personal apprenticeship.
Other work can be defined to the point that virtually anyone with a modicum of training can fill a vacancy
anywhere in the company. For example, since McDonalds hires workers with a wide range of abilities and
experiences, its training program leaves virtually no room for variation in process. Even seemingly insignificant
tasks, such as the method in which are fries salted (from the back to the front of the deep fryer rack), are fully
defined, leaving little room for misinterpretation of the intended process.
Knowledge Management Isnt PerfectYet
In most organizations, Knowledge Management is a work-in-progress, with some subtle and some obvious
imperfections. For example, the transfer of data, information, and knowledge from person to person, person to
computer system, or one generation of employees to the next is an imperfect process that rarely occurs smoothly
and always involves loss of information. Loss of information happens when recording standards shift, when a
longer-lasting storage medium requires transfer of information, when data must be migrated between storage
locations or translated from one form of representation to another, and when the computer hardware used to
interpret the data becomes obsolete.
Significant Legal Issues Exist
Knowledge Management deals with the ownership and manipulation of intellectual property, from copyrighted
materials, trademarks, patents, and patent applications to trade secrets. A patent portfolio can add significant
value to a company. However, in many instances, intellectual property instruments are useful primarily in
defending a court case.
Whats more, the time lag between applying for patent protection and receiving a patent may be years. Given the
time pressure to bring products and services to market, the time and expense of patenting a process or device may
make it more feasible for the company simply to keep the information as a trade secret.
However, relying on trade secrets is associated with a risk of employees leaving with proprietary knowledge, even
with nondisclosure and no compete agreements in place. Trade secrets also dont contribute to the valuation of
the company to the degree that patents do, since a competing company may file a patent application, potentially
barring the company from using its trade secrets. Some companies are attempting to avoid the intellectual
property courts altogether by publishing their findings early to prevent the competition from patenting the
product or service. This KM approach is especially attractive in the software industry, where virtually any program
can be reverse-engineered and replicated in a matter of weeks to months.
Extensive Training and Retraining May Be Required
A significant investment in employee and management training may be required if a KM program is to succeed.
Knowledge Management works best when employees and management willingly and regularly contribute to the
pool of corporate knowledge. However, willingness without training in process and the use of the technology for
storing and retrieving corporate knowledge typically results in costly errors and inefficiency. Most companies with
successful KM programs have employee and management training programs in place. For example, a customer
service representative who deals with customers via the telephone has to know how to access the list of
frequently asked questions (FAQs) on specific topics and how to enter new questions into the system so that the
questions and their answers can be made available to others customer service reps.
Overhead Can Be Considerable
Administrative and employee overhead associated with Knowledge Management can cut into efficiency and
effectiveness, especially when the typical transaction is very brief. Customers may resent being asked personal
questions when they place orders, for example. Saving and submitting customer questions for management to
review and include in the store of FAQs in the corporate web site takes time. At issue is whether the expected
return on investment in the time spent creating a bank of FAQs or other information makes economic sense.
Knowledge Management Is in Flux
Changes in the KM industry, including abuse of the Knowledge Management vocabulary and concepts by vendors
and consultants, obfuscates what would otherwise be simple comparisons of products and services. For example,
many database companies and reengineering consultants became KM companies overnight by simply modifying
copy in their sales brochures. Companies intent on implementing a KM program have to wade through the
unsubstantiated claims from vendors, many of which are made with jargon that serves only to obscure simple (and
less expensive) concepts.
Knowledge Management Takes Time
Realistic implementation times for developing a workable KM system range from a few months to years,
depending on the complexity of the processes that must be analysed, the size of the company, the number of
employees, and the managers involved. Even in the most technologically challenging KM implementation, the pace
of corporate cultural change, not the availability of resources or technology, is the rate-limiting step.
Investment Requirements Can Be Significant
Establishing and maintaining a KM program can be an expensive proposition. A KM system for customer support is
an on-going investment, not a one-time expense. Consider that as soon as the sales reps stop adding questions and
answers to the bank of FAQs, the value of the KM system drops precipitously. Eventually, the point will be reached
when the time spent searching through the FAQs might not be worth the time or effort of the customer support
staff.
Corporate Legacy Must Be Acknowledged
In designing a KM system, its generally easier to start from scratch. It isnt surprising that the dream of most
knowledge officers is to have a new venture built from scorched earth with no history and no legacy data.
However, the reality is that most KM programs are implemented in existing companies with established processes
for handling orders, deciding on best practices, and dealing with customer support issues. As such, these processes
and attitudes will have to be folded into the new KM process. In other words, the KM program should complement
the existing business and strengthen existing processesnot turn the company inside out, resulting in processes
optimized for Knowledge Management, and no employees to execute them.
Whether Knowledge Management makes sense for a particular business application depends on the business, the
corporate culture, and budgetary limitations.
Question / Answers:
1] Define ERP and explain how it helps to achieve business integration?

Enterprise resource planning (ERP) is business management software that allows an organization to use a system
of integrated applications to manage the business
Enterprise resource planning (ERP) systems are systems that have basic goal to form backbone of all company
operations and to unite these operations under same IT infrastructure.

Ways in which ERP helps in achieving Business integration:
Data integration-
In todays world, businesses swim in pool of data. Problem is not just only in procuring data but also in sorting it
and avoiding duplications.
ERP helps in obtaining as well as integrating data such as from what customers purchase to where they come from,
and from manufacturing costs to shipping taxes etc. It integrates financial information, Accounting information,
sales information, customer order information, Human resources information etc.
ERP can remove duplications and interpret the data in a way that will aid your businesss bottom line.

People from different department can access what they need, when they need-
Before ERP, in most companies, each department had its own computer files and system on which they worked.
Accounting department had list of all outstanding invoices whereas purchase department had list of all
outstanding purchase orders.
Before ERP one department was not able to access data of another department.
So if purchase manager had to know about certain invoice, he had to call accounts department and ask for
information which was time consuming.
But with ERP and integrated database, he can easily access data and answer back to vendor.
It improves efficiency across the board, allowing your team to address specific needs, issues, or strategies as they
arise.

Cost reduction-
The integration of data helps organisation in numerous ways to reduce cost e.g. Reduction in inventory
ERP helps manufacturing process flow more smoothly and it improves visibilities of the order fulfilment process in
the company. That lead to reduced inventories used to make products i.e. WIP inventory. It also helps in better
planning deliveries to customers, reducing the finished good stocks at the warehouses and the shipping docks.

Marketing help and prediction-
With push of a button one can know what people are purchasing, who is referring them, where are they coming
from, what else they purchase and more. This invaluable data will drive one`s marketing strategy decisions moving
forward, as one adjust one`s message to suit the personalities and desires of one`s audience. Think of it as one`s
own personal market researcher.

Managing Customer Relationship-
Customers today look for a positive experience, which means so much more than simply enjoying your product.
They want to feel listened to and cared for throughout the entire purchasing process. This means having a
responsive ticket tracking system; a reliable confirmation page; and the ability to follow up with and respond to
customer. ERP systems can automate all of these relationship management processes. And if one takes care of
one`s relationships, one may just have a loyal customer for lifetime.

Standardizing HR information:
In companies with multiple business units, Human Resource Department (HR) may not have unified, simple
method for tracking employees` time and communicating them about benefits and services. ERP helps in business
activities by integrating information about various personnel at various levels. It can be helpful in developing
effective communication channel. It can provide information useful in performing activities such as Recruitments,
Transfers, Promotions, Training, Performance Appraisal, Retention and other human resource management
activities.


In ERP packages, the data of related business functions is automatically updated at the time a transaction occurs.
For this reason, one is able to grasp business details in real time, and carry out various types of management
decisions in a timely manner based on that information.
2] What are business modules in ERP? What are its merits and demerits?
-> Most common business modules in an ERP system are: 1) Finance
Module. 2) Human
Resources 3)
Manufacturing Module 4) Plant
Maintenance 5) Materials Management
6) Quality Management 7)
Marketing Module
8) Sales and distribution
Merits:
Improved integration :Ability to automatically update data between related functions and components,
leading to better decision making
Reduction of lead time and better inventory management.
Improved resource utilization by reducing forced outages, breakdowns etc
Improved Supplier Performance: The quality of raw materials or components and capability of the
vendor to deliver them in time are of critical importance for the success of the organization, ERP monitors
supplier list and determines the best quality suppliers.
Increased flexibility to capitalize on opportunities while they are available. To create a flexible
organization that can adapt to the changes in environment rapidly.
Reduced Quality Costs: Reduces internal failure costs , external failure costs, appraisal costs and
prevention costs as ERP provides tools for Total Quality Management programs within an organization
Better analysis and planning capabilities
Improved information accuracy & decision making capability
Use of Latest technology such as open systems, client / server technology and internet/intranet
Demerits:
Expensive to purchase and even more expensive to customize.
Limited customization possible for ERP
It needs effort from company to adjust its processes.
When setting up system, the changes can be costly in time and money.
If proper training not given, it can be difficult to control system.

3] What is SAP? What are different products of SAP?
-> Xerox decided to exit the computer industry. They asked IBM to migrate their business systems to IBM
technology. As part of IBM's compensation for the migration, IBM was given the rights to the SDS/SAPE software,
reportedly for a contract credit of $80,000. Five IBM engineers from the AI department, Dietmar Hopp, Klaus
Tschira, Hans-Werner Hector, Hasso Plattner, and Claus Wellenreuther, all from Mannheim, Baden-Wrttemberg
were working in an enterprise-wide system based on this software, only to be told that it would be no longer
necessary. Rather than abandon the project, they decided to leave IBM and start another company.
In June 1972 they founded Systemanalyse und Programmentwicklung ("System Analysis and Program
Development") as a private partnership under the German Civil Code.
Products:
SAP's products focus on Enterprise Resource Planning (ERP). The company's main product is SAP ERP. The current
version is SAP ERP 6.0 and is part of the SAP Business Suite. Its previous name was R/3. The "R" of SAP R/3 stood
for realtime. The number 3 related to the 3-tier architecture: database, application server and client (SAPgui). R/2,
which ran on Mainframe architecture, was the predecessor of R/3.
ERP Financials
Streamlines and automates financial operations while ensuring regulatory compliance and gaining real-time
insight into overall performance. Enhances core financial capabilities and generates accurate reports in real time.
Captures processes from different applications for a single version of financial truth and reduces cost of goods
sold (COGS), maximizes profitability.
ERP Human Capital Management
Better management of your most valuable assets, your people. It provides support for recruiting, on boarding and
administration to professional development and promotion. It improves workforce efficiency, productivity and
satisfaction. It delivers best-in-class HR processes at the lowest possible cost. It predicts and plans for future
workforce needs and demands.
ERP Sales and Service
Provides support for a wide range of customer-focused processes, from selling products and delivering services to
aftermarket warranty claims, service orders, and returns. It simplifies and accelerates the entire order-to-cash
cycle. It helps in delivering orders on time and improving customer satisfaction. It streamlines processes and
reduces operational costs. It helps boost productivity and increase sales and profit margins.
ERP Procurement and Logistics Execution
It maximizes cost savings with support for end-to-end procurement and logistics processes. It enables self-service
requisitioning to invoicing and payments. It streamlines and optimizes the flow of materials. It actively manages
your end-to-end procure-to-pay processes. It reduces unnecessary stock and improve spend performance.
ERP Product Development and Manufacturing
It helps in accelerating entire manufacturing processes. It helps in planning, scheduling, monitoring and analysis. It
helps in improving efficiency across the value chain. It helps in proactively identifying and fixing potential issues
with real-time tracking and analysis. It enables a quick respond to changes in demand with accelerated planning
and execution. It improves plant performance with real-time visibility into shop floor processes.
ERP Corporate Services
It streamlines and enables greater control of corporate services. It helps in enterprise asset and quality
management, travel, portfolio and project management. It tightly integrates services with processes that span the
enterprise. It maximizes the transparency of corporate services. It increases the efficiency and effectiveness of
your business operations. It reduces financial and environmental risks and enhances employee safety. It helps in
ensuring that company policies are applied to all processes.
Integrated Business Management On Demand
It helps run all business management processes on an affordable, cloud-based suite, ideally suited for SMEs and
subsidiaries of large corporations. Helps accelerate financial, customer relationships, HR, procurement, and supply
processes. It helps in gaining timely insights into business with the help of integrated analytics and reporting. One
can access key business functionality anywhere, on a broad range of mobile devices. One can rely on SAP to
maintain and manage your business.
Q.1
Define E-Government. Discuss objectives of E-Government Services.
E-government is very simply about applying information and communication technology to all aspects of a
governments business where it makes sense to improve efficiency and effectiveness in the achievement
of policy and program outcomes.
United Nations definition
E-government is defined as utilizing the Internet and the world-wide-web for delivering government
information and services to citizens.
World Bank definition
E-Government refers to the use by government agencies of information technologies (such as Wide Area
Networks, the Internet, and mobile computing) that have the ability to transform relations with citizens,
businesses, and other arms of government. These technologies can serve a variety of different ends: better
delivery of government services to citizens, improved interactions with business and industry, citizen
empowerment through access to information, or more efficient government management. The resulting benefits
can be less corruption, increased transparency, greater convenience, revenue growth, and/or cost reductions.
Objectives
To pursue real economic development goals not just technology push
To create the right policy and institutional frameworks from the start.
To maximize effectiveness of ICT initiatives within Government.
To manage the increasing costs of IT in government
To generate savings by applying IT in backend processes or other programmatic areas
To map path from pilot experiments to sustainable, scalable systems
To design technology architecture (infrastructure, data, standards) for the public sector
To integrate organizational silos and deliver citizen services through common channels.
Q.2
Define E-Governance. Discuss different delivery models.
E-Governance is a process of reform in the way Governments work, share information, engage citizens
and deliver services to external and internal clients for the benefit of both government and the clients
that they serve. Governments harnesses information technologies such as Wide Area Networks (WAN),
Internet, World Wide Web, and mobile computing reach out to citizens, business, and other arms of the
government to:
Improve delivery of services to citizens, businesses and employees Engage citizens in the process of
governance through interaction Empower citizens through access to knowledge and information and
Make the working of the government more efficient and effective
Results in enhanced transparency, convenience and empowerment; less corruption; revenue growth; and
cost reduction
Different Delivery Models
Departments going on-line
Citizen visit many departments, each one may be more efficient
Could be a first step in the absence of high band width network
Assisted; restrictive timings, single agency-complete service
Conveniently located Community Service Centers
Assisted counters manned by public/private agencies
Services from single/ multiple agencies under one roof: payment, licenses, certificates
Larger time window but not 24X7
Complete service from all department difficult-bill payments, receive applications
Self Service through a Portal one stop shop
24X7, multiple agencies, partial service (submit applications)
Back end computerization and Integration needed for data sharing
High internet penetration; willingness and ability of citizen to use
Security and mutual trust (builds with successful outcome)
Usage builds up gradually. Adoption rate has to be driven.

Q.3
Discuss success & risk factors of E-Governance. Discuss impact of E-Governance. Success Factors
Strong Political and Administrative Leadership , detailed Project Management
Clearly identified goals and benefits
Significant Process Reengineering Required
Adopt established standards and protocols minimize customization
Start Small, scale up through stages, manage expectations
In-source Analysis ; Outsource design, software development, data preparation, training, etc.
Training Expenses should not be minimized
Public Private Partnerships
Risk Factors
Implementation and use should sustain over long periods and measurable benefits delivered to all
stakeholders-need for evaluation
Frequent changes in administrative leadership. Short tenure of implementers: hurried implementation
and/or lack of resources
Inappropriate definition of project scale and scope.
E-government not implemented in a context of wider change/ administrative reform.
Does not lead to overall cost reduction or value addition
Close identification of a project with a single champion
Resistance from vested interests not countered effectively
Partial automation(back-end not computerized) and automation without reengineering.
Use of untested fancy technology.
E-government can offer new opportunities for fraud and corruption
Impact of E-Governance
Introduces transparency in data, decisions/actions, rules, procedures and performance of Govt. agencies
Automates processes to take away discretion
Entry point for simplification of rules and reengineering
Makes decisions traceable-tracks actions
Builds accountability-greater access to information through web publishing-role of civil society
Provides documentation to citizens for follow up
Introduces competition amongst delivery channels
Standardized documentation of comments/ objections leads to effective supervision-through comparative
indicators
Centralizes and integrates data for better audit and analysis.

Questions and answers Business Intelligence Group 8
1) What is BI and what are BI implementation challenges?
Business intelligence is valuable, timely, accurate, high-value, and actionable business insights, and the work
processes and technologies used to obtain them. Business intelligence technologies transform raw data into
meaningful and useful information for business purposes. Common functions of business intelligence technologies
are reporting, online analytical processing, analytics, data mining, complex event processing, business performance
management, benchmarking etc.
Important BI implementation challenges are
1) Resistance to BI adaption - A BI initiative can change the way in which business users do their data analysis. It
might also entail changes to the procedures in place at the organization. Thus a BI deployment can face resistance
from business users as well as various IT teams. Building strong relationships within IT and data management
teams is necessary to counter this challenge. Also required is full backing of the top management to drive adaption
of BI and new reporting standards in the organization. A company can also form central BI committee or center of
excellence to drive BI initiatives.
2) Data volatility Data sources, downstream application or the process can change while a large scale BI
implementation is still going on. Planning in advance for data volatility by maintaining data hierarchies and
relationships is crucial to counter this. Also it will be helpful if BI implementation plan is integrated with other
project plans.
3) Functionality limitation It is highly important to be aware of your BI requirements and communicate them to
the vendors in clear terms. Various BI products available should be thoroughly studied and checked against
requirements before doing selection. In depth study must be carried out even while selecting the vendor. The
ability of the vendor to execute the project, availability of skills, vendor track record are some of the points one
should check.
4) BI penetration Even if BI is implemented it is of no help if people are not using it. Getting more and more
employees to make used of BI functionalities is necessary to the success of BI program. Thus getting the used
involved well in advance before BI implementation begins and providing them with proper training is a must.
5) Clean data Data quality is a severe challenge faced during BI implementation. Different source systems have
varying layers of controls and business-rule consistency. Many a times data in different sources are in different
formats. Correcting the data at the source and modifying the procedures is required to counter this.

6) Scope creep - BI projects have a notoriously high incidence of scope creep because BI covers many
departments and often touches many different preexisting systems. This can be countered by employing good
business analyst who can provide excellent business requirements, by building flexibility into the project plan and
by adhering to strict change management processes.




2) State applications of business intelligence in real life scenarios.

Business intelligence has been used to identify cost-cutting ideas, uncover business opportunities, roll ERP data
into accessible reports, react quickly to retail demand and optimize prices.
BI software can give companies more leverage during negotiations by making it easier to quantify the value of
relationships with suppliers and customers.
Some of the important real life applications of BI are -
1. Hospitals
Value-based reimbursement models are rapidly changing the face of healthcare. To compete in the new era of
patient-centered medical homes, accountable care organizations and initiatives related to reducing the cost of
care, hospitals of all sizes need business intelligence (BI).
Hospitals increasingly are expected to measure, report on, and manage a wide variety of operational, financial and
clinical indicators. Ultimately, reimbursement is at stake, with incentives handed to hospitals whose data shows
lower costs and better patient careand penalties assessed on those whose data falls short.

2. Retail Shops-
There are intelligent retailers such as Wal-Mart and Tesco are heavy users of BI. Take Tesco, for example, who has
become the second most powerful retailer on the planet. This has not happened by chance but through applying
the principles of an intelligent company. Tesco have identified two factors above all: making sure everyone in the
company is actively engaged in trying to improve performance - all the time; and having the data and analytical
skills to test ideas and turn insights into customer and business relevant actions.

3. Restaurants-
Restaurant chains such as McDonalds, CKE and T.G.I. Fridays have successfully applied the principles of an
intelligent company. They use BI to make strategic decisions, such as what new dishes to add to or remove from
their menus and which underperforming stores to close. They also use BI for tactical matters such as renegotiating
contracts with suppliers and identifying opportunities to improve inefficient processes. At the US-
headquartered CKE Restaurants, which includes major US brands such as the Hardees and Carls Jr. quick-service
restaurant chains, the process for new product introduction calls for rigorous testing at a certain stage.
Testing begins with brainstorming, in which several cross-functional groups develop a variety of new product ideas.
Only some of them make it past the next phase, judgmental screening, during which a group of marketing, product
development, and operations people will evaluate ideas based on experience and intuition. Those that make the
cut are actually developed and then tested in stores, with well-defined measures and control groups. At that point,
executives decide whether to roll out a product system wide, modify it for retesting, or kill the whole idea.

4. Industries-
Yahoo Inc. is another intelligent company that used BI effectively to improve their website. The organization
receives many millions of hits to its home page each hour. To test alteration to the home page they randomly
assign one or two hundred thousand users to an experimental group and have several million other visitors as a
control group. By doing so, they can quickly see whether or not the alterations to the home page leads to the
assumed change in the behavior of the customer. This in turn allows them to optimize their offerings to enhance
revenues and profits. The results of these experiments can often be seen within minutes, and Yahoo! typically runs
about 20 experiments at any given time.
3) Name any 5 BI vendors and state features of their products

1) IBM
1) IBM Cognos BI 10.2, Cognos Insight, SPSS Modeler 15, Analytical Decision Management 7.0 and Analytic
Answers are some of the major BI products by IBM
2) IBM Cognos Express 10.1, provides comprehensive BI suite functionality along with budgeting, planning and
forecasting capabilities at a lower license cost. This is ideal for departmental, workgroup or smaller company
business analytics requirements.
3) Analytic Answers is a cloud based IBM product which offers analytics-as-a-service. You simply use a web
browser to upload sets of data and download results which are expressed in terms that can be acted on promptly.
4) IBM products are chosen for the comprehensive functionality and ability to integrate easily with information
infrastructure i.e. databases and servers.
5) IBM Cognos products are difficult to use as compared to its competitors and they are mainly used for creating
static reports as of yet.

2) SAP
1) SAP is the global market share leader of the BI and analytics platforms market. The major system integrators all
have large SAP and BusinessObjects practices. Access to people (internal or external) who know SAP BW or
BusinessObjects is rarely difficult.
2) SAP offers an integrated mobile BI toolkit so that developers can leverage the SAP Mobile Platform, (formerly
known as Sybase Unwired Platform), thereby offering customer mobile analytics app design, device management
and device security.
3) SAP Predictive Analysis, is its predictive analytics offering which integrates analytical capabilities with the real-
time and in-memory capabilities. Advanced analytics products can be used for uses cases such as Customer
Segmentation Accelerator, and Business Planning and Consolidation.

3) Oracle
1) Oracle Business Intelligence Enterprise Edition (OBIEE), is an IT-driven, unified metadata-centric BI and analytics
platform that's best suited for building large, IT-managed and centrally governed global deployments. OBIEE
customers report among the largest average deployment sizes in terms of users, data and company size.
2) Oracle products are chosen because of ease of integration optimization with broader oracle stack. Oracle BI
offers more than 80 prebuilt analytic applications for Oracle E-Business Suite (EBS), PeopleSoft, JD Edwards, Siebel,
Fusion (on-premises and in the cloud) and other enterprise applications.
3) Oracle's newest engineered system, Exalytics In-Memory Machine, provides an optimized hardware and
software configuration that includes OBIEE, Oracle Essbase, Oracle Endeca Information Discovery, and in-memory
software (based on Oracle's acquisition of TimesTen) designed for large and complex analytics workloads, including
dynamic planning and what-if and scenario analysis.
4) OBIEE is primarily used for systems of record, static and parameterized reporting, as well as dashboards
centrally developed by IT and delivered to report consumers.

4) Microsoft
1) The company's strategy has been to enhance the BI capabilities in three of its core offerings with each release
including Microsoft Office (specifically Excel), Microsoft SQL Server and Microsoft SharePoint to increase their
value and drive upgrades.
2) Microsoft's product success is driven in part by its IT-oriented BI authoring tools within SQL Server, which are
based on Visual Studio, the broadly adopted development environment.
3) By incorporating BI capabilities into its most ubiquitous products, and by removing deployment barriers,
Microsoft virtually guarantees its BI offering's continued and even expanded adoption, particularly in organizations
that have standardized on Microsoft for information management.
4) Because Microsoft's BI platform capabilities exist across three different tools (Office, SQL Server and SharePoint)
that also perform non-BI functions, integrating the necessary components and building the applications is left to
the organization. Microsoft's do-it-yourself approach puts more of the BI solution's development and integration
onus for the platform components on customers, compared with the all-in-one purpose-built BI platforms offered
by most other vendors in the BI market.
5) Microsoft lags behind most other BI vendors in delivering mobile BI capabilities. It has been slow to deliver BI on
mobile devices.
5) SAS
1) SAS's portfolio includes tools in areas such as BI, performance management, data warehousing and data quality;
however, unlike most other BI platform vendors, SAS primarily focuses on advanced analytical techniques, such as
data mining and predictive modeling.
2) SAS's products are used to report the use of large datasets and perform analysis with above-average complexity.
They are difficult to use as well.
3) Visual Analytics, is its product that merges dashboard design with diagnostic analytics and the use of predictive
models a possibility not yet available in some of its competitors' tools.
4) SAS's dominance in predictive analytics and statistics is challenged on many fronts. IBM is still the main
challenger with SPSS and other analytic assets, but wide support of open-source R by large competitors, such as
Oracle, SAP and other smaller vendors, are most serious

1. What is Cloud Computing? What are its advantages and disadvantages?
Ans: Cloud computing is Internet-based computing, whereby shared resources, software and information are
provided to computers and other devices on-demand, like the electricity grid.
Cloud computing allows a company to pay for only as much capacity as is needed, and bring more online as soon
as required as the way electricity, fuel and water are consumed. Its an On-demand provision of computational
resources (data, software) via a computer network, rather than from a local computer
Typical requirements and models:
platform (PaaS),
software (SaaS),
infrastructure (IaaS),
Services-based application programming interface (API)

Following are the advantages of cloud computing:
1. Reduced spending on technology infrastructure :
By using the Cloud infrastructure on pay as used and on demand, all of us can save in capital and operational
investment.
2. Reduced capital costs
You do not need a high-powered and high-priced computer to run cloud computing's web-based applications.
Since applications run in the cloud, not on the desktop PC, your desktop PC does not need the processing power or
hard disk space demanded by traditional desktop software.
When you are using web-based applications, your PC can be less expensive, with a smaller hard disk, less memory,
more efficient processor.
In fact, your PC in this scenario does not even need a CD or DVD drive, as no software programs have to be loaded
and no document files need to be saved.
3. Universal document access
Universal document access is not a problem with cloud computing, because you do not take your documents with
you.
Instead, these documents stay in the cloud, and one can access them whenever one has a computer and an
Internet connection.
Documents are instantly available from wherever you are.
4. Almost Unlimited Storage
Storing information in the cloud gives you almost unlimited storage capacity as the infrastructure responsibility is
with the cloud provider.
5. Improved performance
With few large programs on your computer's memory, you will see better performance from your PC.
Computers in a cloud computing system boot and run faster because they have fewer programs and processes
loaded into memory.
6. Backup and Recovery
Since all the data is stored in the cloud, backing it up and restoring the same is easy. The cloud service providers
are usually competent enough to handle recovery.
7. Increased collaboration
This helps in increased collaboration by allowing all employees wherever they are to sync and work on
documents and shared apps simultaneously.
8. Document Control
If a company doesnt use the cloud, workers have to send files back and forth over email, meaning only one person
can work on a file at a time and the same document has tonnes of names and formats.
Here, many people can access the file at the same time due to a central storage.
9. Increased data reliability
Unlike desktop computing, in which if a hard disk crashes and destroy all your valuable data, a computer crashing
in the cloud should not affect the storage of your data.
If your personal computer crashes, all your data is still out there in the cloud, still accessible
In a world where few individual desktop PC users back up their data on a regular basis, cloud computing is a data-
safe computing platform.
Hence, more work can be done in less time with less people.

Following are the disadvantages of cloud computing:
Like many other technological capabilities, cloud computing too has its advantages
1. Requires a fast constant Internet connection
The use of cloud computing technology requires the user to connect to the cloud via the internet. So, cloud
computing is impossible if you cannot connect to the Internet.
Since you use the Internet to connect to both your applications and documents, if you do not have an Internet
connection you cannot access anything, even your own documents.
Similarly, a low-speed Internet connection, such as that found with dial-up services, makes cloud computing
painful at best and often impossible.
2. Stored data can be lost:
Theoretically cloud computing technology is safe but on the off chance that your data goes missing, you have no
physical or local backup.
3. Security in the Cloud
Cloud computing involves surrendering the companys sensitive information to a third-party cloud service
provider. This could potentially put a company to great risk.
4. Prone to Attacks
Surrendering the data can make company vulnerable to external hack attacks and threats. An example of this can
be hacking of a personal gmail account.

2. Explain the types of cloud and their business applications?
Ans: The different types of cloud are Public cloud, Private cloud, Community cloud and Hybrid cloud.
Public cloud: These are made available to its users by a service provider who hosts the cloud infrastructure. Public
cloud providers like Microsoft and Google own and operate the infrastructure and offer access over the Internet.
With this model, customers have no visibility or control over where the infrastructure is located. All customers on
public clouds share the same infrastructure pool with limited variation and security protections.
Public Cloud customers benefit from economies of scale, because infrastructure costs are spread across all users,
allowing each individual client to operate on a low-cost, pay-as-you-go model. Another advantage of public cloud
infrastructures is that they are typically larger in scale than private cloud. Public clouds offer the greatest level of
efficiency in shared resources; however, they are also more vulnerable than private clouds.
A public cloud is typically used when:
Range of applications or services is consumed by lots of consumers, e.g: e-mail, social networking
sites, on-demand-gaming etc.
Savings on the amount to be spent on maintenance of the resources is important.
Operating a start-up or for a small enterprise
Private cloud: These clouds are dedicated to a particular organization. Private clouds allow businesses to host
applications in the cloud, while addressing concerns regarding data security and control, which is often lacking in a
public cloud environment. It is not shared with other organizations, whether managed internally or by a third-
party, and it can be hosted internally or externally.
There are two variations of private clouds:
1. On-Premise Private Cloud: This type of cloud is hosted within an organizations own facility. A businesses
IT department would incur the capital and operational costs for the physical resources with this model.
On-Premise Private Clouds are best used for applications that require complete control and configurability
of the infrastructure and security.
2. Externally Hosted Private Cloud: Externally hosted private clouds are also exclusively used by one
organization, but are hosted by a third party specializing in cloud infrastructure. The service provider
facilitates an exclusive cloud environment with full guarantee of privacy. This format is recommended for
organizations that prefer not to use a public cloud infrastructure due to the risks associated with the
sharing of physical resources.
Private clouds are more expensive but also more secure when compared to public clouds. Roughly 76% of IT
decision-makers will focus exclusively on the private cloud, as these clouds offer the greatest level of security and
control.
Private Cloud can be used when:
An organisation needs data control but wants cloud efficiencies
It wants consistency across services
Organisation has more server capacity than your organization can use
Community cloud: It is a multi-tenant (single instance of software runs on multiple clients) cloud service model
that is shared among several organizations and is governed, managed and secured commonly by all the
participating organizations or a third party managed service provider.
Community clouds are a form of private clouds built and operated specifically for a targeted group. These
communities have similar cloud requirements and their ultimate goal is to work together to achieve their business
objectives.

The goal of community clouds is to have participating organizations realize the benefits of a public cloud with the
added level of privacy, security, and policy compliance usually associated with a private cloud. Community clouds
can be either on-premise or off-premise.
Community clouds are suited in the following manner:
Government can exploit this concept to enforce standardization across domains and create a level playing field
e.g.: A private number portability cloud for a group of service providers.
Hybrid cloud: These are a composition of two or more clouds (private, community or public) that remain unique
entities but are bound together offering the advantages of multiple deployment models. In a hybrid cloud, one can
leverage third party cloud providers in either a full or partial manner; increasing the flexibility of computing.
Combining a traditional private cloud with the resources of a public cloud can be used to manage any unexpected
surges in workload.
Hybrid cloud architecture requires both on-premise resources and off-site server based cloud infrastructure. By
spreading things out over a hybrid cloud, we can keep each aspect of a business in the most efficient environment
possible. The downside is that one has to keep track of multiple cloud security platforms and ensure that all
aspects of a business can communicate with each other.
Hybrid clouds are best suited when:
A company wants to use a SaaS application but is concerned about security.
A company offers services that are tailored for different vertical markets.
An organisation can provide public cloud to your customers while using a private cloud for
internal IT.
3. Explain different service models of cloud computing with their advantages and disadvantages?

Ans: Cloud computing vendors provide their services according to several service models: software as a service
(SaaS), platform as a service (PaaS), and infrastructure as a service (IaaS).

1. SAAS
These are cloud services that allow customers to access software application over the internet. The application is
hosted over the cloud and the users can access the application via any internet enabled device. SAAS is referred to
as software on demand and it is like renting software rather than buying it. E.g. Twitter, facebook, Google Apps
Advantages of using SAAS:
No additional hardware costs: The hardware is maintained by the cloud provider
Multitenant Architecture: A multitenant architecture, in which all users and applications share a single,
common infrastructure and code base that is centrally maintained. Because SaaS vendor clients are all on
the same infrastructure and code base, vendors can innovate more quickly and save the valuable
development time previously spent on maintaining numerous versions of outdated code.
No initial setup costs: Applications are ready to use once the user subscribes them.
Pay for what you use: You can access a piece of application and just pay for it.
Usage is scalable: if a user decides they need additional services they can access them on demand without
needing to install new software or hardware.
Updates are automated: the updates will usually be deployed automatically by the cloud provider.
Cross device compatibility; SaaS applications can be accessed via any internet enabled device, such as
internet enabled phones and tablets
Accessible from any location; You can access the application from anywhere via internet.
Applications can be customized and whitelabelled; with some software, customization is available
meaning it can be altered to suit the needs and branding of a particular customer.
Disadvantages of the SaaS:
Security and privacy of critical data
Risk of service disruption due to internet connectivity issues

2. PAAS
These are cloud computing services that allow the developers to build applications and services over the internet.
Cloud providers deliver a computing platform typically including operating system, programming language
execution environment, database, and web server. Application developers can develop and run their software
solutions on a cloud platform without the cost and complexity of buying and managing the underlying hardware
and software layers.
Examples of PaaS include: Amazon Elastic Beanstalk, Cloud Foundry, Heroku
Below are some of the features that can be included with a PaaS offering:
Operating system
Server-side scripting environment
Database management system
Server Software
Support
Storage
Network access
Tools for design and development
Hosting
Advantages of PaaS to application developers:
No investment in physical infrastructure: clients will only need to rent the resources they need rather
than invest in fixed, unused and therefore wasted capacity.
Makes development possible for non-experts; with some PaaS offerings anyone can develop an
application. They can simply do this through their web browser utilizing one-click functionality. Salient
examples of this are one-click blog software installs such as WordPress.
Flexibility: They can pick and choose the features they feel are necessary from the tools provided in the
platform by cloud provider
Teams in various locations can work together; as an internet connection and web browser are all that is
required, developers spread across several locations can work together on the same application build.
Security; security is provided, including data security and backup and recovery.

Disadvantages of PaaS
PaaS clients cannot necessarily create and delete multiple virtual machines as easily as their IaaS
counterparts.
PaaS does not represent a complete product in the way that Software as a Service (SaaS) offerings do. An
organization must still undergo a development effort in order to design, build, and test programs before
they can be deployed to the end users.

3. IAAS

In the case of IaaS the cloud resource provided is specifically that of virtualized hardware, in other words,
computing infrastructure. The services include offerings as virtual server space, network connections, bandwidth,
IP addresses and load balancers. Physically, the pool of hardware resource is pulled from a multitude of servers
and networks usually distributed across numerous data centers, all of which the cloud provider is responsible for
maintaining. The client, on the other hand, is given access to the virtualized components in order to build their
own IT platforms.
Eg:Amazon EC2, Google Compute Engine, HP Cloud

How IaaS can be utilized by enterprise:
Enterprise infrastructure; by internal business networks, such as private clouds and virtual local area
networks, which utilize pooled server and networking resources and in which a business can store their
data and run the applications they need to operate day-to-day. Expanding businesses can scale their
infrastructure in accordance with their growth whilst private clouds (accessible only by the business itself)
can protect the storage and transfer of the sensitive data that some businesses are required to handle.
Cloud hosting; the hosting of websites on virtual servers which are founded upon pooled resources from
underlying physical servers. A website hosted in the cloud, for example, can benefit from the redundancy
provided by a vast network of physical servers and on demand scalability to deal with unexpected
demands placed on the website.
Virtual Data Centers (VDC); a virtualized network of interconnected virtual servers which can be used to
offer enhanced cloud hosting capabilities, enterprise IT infrastructure or to integrate all of these
operations within either a private or public cloud implementation.

Advantages of IAAS:
Scalability; resource is available as and when the client needs it and, therefore, there are no delays in
expanding capacity or the wastage of unused capacity
No investment in hardware; the underlying physical hardware that supports an IaaS service is set up and
maintained by the cloud provider, saving the time and cost of doing so on the client side
Utility style costing; the service can be accessed on demand and the client only pays for the resource that
they actually use
Location independence; the service can usually be accessed from any location as long as there is an
internet connection and the security protocol of the cloud allows it
Physical security of data centre locations; services available through a public cloud, or private clouds
hosted externally with the cloud provider, benefit from the physical security afforded to the servers which
are hosted within a data centre
No single point of failure; if one server or network switch, for example, were to fail, the broader service
would be unaffected due to the remaining multitude of hardware resources and redundancy
configurations. For many services if one entire data center were to go offline, never mind one server, the
IaaS service could still run successfully.

Disadvantages:

1. Success of use of the service depends on the capability of the vendor.
2. In the short run the costs may appear low but in the long cost of renting out services may prove costly.
3. Due to the shared nature of the infrastructure used, the applications may need new and special kind of security.
4. Governance issues: As data could be stored anywhere over the cloud, its important to determine the nature of
data stored. Many countries have strict regulations on the location of the data.
a) What is IT project Management? Explain its Emerging trends and challenges.
IT Project management is the application of knowledge, skills, tools, and techniques to project activities in order to
meet or exceed project requirements in the most efficient manner in the least possible time with least possible
cost.
Emerging trends in Project Management
1. Breaking the triple constant
Redesign systems- Organizations look to have a good mix of project, program and portfolio
managers. Systems should be redesigned thinking beyond the triple constraint.
Delivery of results- The combined power of project portfolio, program and project management
enables delivering business results not limited to the triple constraint.
Consideration of all factors- If a project is delivered on time, within budget and with required
quality, but its outcome doesn't provide expected value, the project should not be considered
successful.
2. Multiple project functions
Projects will start to be identified in different business functions where they might not exist very
often, such as sales, marketing, alliances, human resources, etc. Marketing managers, sales
managers, HR managers, finance managers and the like have to acquire project management
skills to deliver better results in their respective functions.
Organizations should refine their project management strategy to include project lifecycles for all
projects and training for all managers. Project Management Centers of Excellence (COE) have to
focus on creating special learning assets to train managers on project management in other
functions.
3. SMAC project management
Social media management is the way forward, and projects must incorporate this in their culture
Accounting for cloud computing, the approach must include refined templates, checklists, best
practices, risk registers etc.
Even a medium like Twitter can be used well if managers are educated on these trends and how
their usage will affect them.
4. Increased emphasis on soft skills
Communication- Among the most difficult skills for a project manager, it comes into play during
difficult conversations and negotiations.
Leadership- While it is necessary to rally the team and deliver on time, it is also important to
adapt your style to the people on your team.
Goal-setting- As it is frustrating for team members if they do not know what their goal is, it
should be such that each person feels responsible for his work.
Mentoring- Acts as a bridge between senior and junior members, whose payoff is committed
team members who will deliver.
5. PMOs as profit centers
PMOs will be transformed from cost centers to profit centers. PMOs will build very high-end
consulting skills and offer services to business units on a profit basis. PMOs will focus on an
'outside-in' perspective and move away from an 'inside-out' perspective. PMO drivers will be
around customers, markets and the economy, and not just limited to internal efficiencies.
This means that project managers have to understand the outside-in perspective. They have to
focus on outcome and the value to be delivered to customers.
6. Every employee is a project manager
Mini-projects- A mindset of planning, execution, monitoring and controlling is needed. Every task
should be considered a mini project.
Cultural change- In organizations currently, only a few people focus on project management. By
following the above step, self-reliance is promoted.
On-the-job training- The best way to train employees to think like project managers is through
on-the-job training.

-------------------------------------------------------------------------------------------------------------------------------
b) Explain basic principles of Project Cost management. Also explain cost modeling.

Basic Principles of Cost Management
Cost is a resource sacrificed or foregone to achieve a specific objective or something given up in exchange
Costs are usually measured in monetary units like dollars
Project cost management includes the processes required to ensure that the project is completed within
an approved budget
o Cost Estimating
Project managers must take cost estimates seriously if they want to complete projects within budget
constraints
Its important to know the types of cost estimates, how to prepare cost estimates, and typical problems
associated with IT cost estimates
o Cost Budgeting
Cost budgeting involves allocating the project cost estimate to individual work items over time
The WBS is a required input to the cost budgeting process since it defines the work items
An important goal is to produce a cost baseline
o A time-phased budget that project managers use to measure and monitor cost performance
o Cost Control
Project cost control includes:
o Monitoring cost performance
o Ensuring that only appropriate project changes are included in a revised cost baseline
o Informing project stakeholders of authorized changes to the project that will affect costs
Many organizations around the globe have problems with cost control

o Algorithmic Cost modeling
Cost is estimated as a mathematical function of
product, project and process attributes whose
values are estimated by project managers
o Effort = A Size
B
M
o A is an organisation-dependent constant, B reflects the disproportionate effort for large projects
and M is a multiplier reflecting product, process and people attributes
Most commonly used product attribute for cost
estimation is code size
Most models are basically similar but with
different values for A, B and M
Is the basis for modern costing methods such as COCOMO (Constructive Cost Model) and SLIM (Software
Lifecycle Management).

---------------------------------------------------------------------------------------------------------------------
c) Explain in brief the steps of defining and maintaining the project scope. Also explain Project risk
management process.
Scope Management Process
Scope planning: deciding how the scope will be defined, verified, and controlled
Scope definition: reviewing the project charter and preliminary scope statement and adding more
information as requirements are developed and change requests are approved
Creating the WBS: subdividing the major project deliverables into smaller, more manageable components
Scope verification: formalizing acceptance of the project scope
Scope control: controlling changes to project scope
The purpose of Scope Management is to ensure the project includes all the work required, and only the work
required, for completing the project successfully. In scope management the emphasis is on identifying and
controlling what is or is not included in the project.
Consequently, the objective of this scope management process is to provide a methodology for:
Describing the process and tools used to define the project scope;
Developing a project scope statement;
Defining and developing the Work Breakdown Structure;
Describing the scope verification activities; and
Describing how the project scope will be controlled.
Scope is defined and then refined during an iterative process that begins in the Project Identification Stage and
continues into the Delivery Stage. The process is conducted in consultation with subject matter experts (SMEs) and
stakeholders, becoming increasingly detailed as the project progresses. The fully defined project scope will contain
the following elements:
Project goals, business outcomes and objectives;
Product scope description;
Project boundaries;
Specifically excluded activities;
Deliverables and associated acceptance criteria;
Project constraints; and
Project assumptions.

IT Project Risk Management Processes


Risk Planning: It involves developing a proper plan for handling risks.
Risk Identification: It identifies the possible risks that can occur in the project.
Risk Assessment: It analyses the types of risk that can occur and the impact each of these can have on the
project
Risk Strategies: It decides the strategies that need to be followed for handling each type of risk.
Risk Monitoring and Control: After proper steps have been taken, it becomes essential to continuously
monitor them and ensure that they do not occur. Proper control measures need to be in place.
Risk Response: It takes actions when a risk occurs.
Risk Evaluation: Evaluating the action and consequences of the risk occurred.
Q.1 Explain the evolution of MRP. What is Manufacturing Resource Planning II? Describe the process involved
and also state the advantages and disadvantages in implementing it.
Material Requirements Planning (MRP) is a software based production planning and inventory control system used
to manage manufacturing processes.
An MRP system is intended to simultaneously meet three objectives:
Ensure materials and products are available for production and delivery to customers.
Maintain the lowest possible level of inventory.
Plan manufacturing activities, delivery schedules and purchasing activities
Prior to MRP, and before computers dominated industry, reorder-point/reorder-quantity (ROP/ROQ) type
methods like EOQ (Economic Order Quantity) had been used in manufacturing and inventory management. In
1964, Joseph Orlicky as a response to the TOYOTA Manufacturing Program, developed Material Requirements
Planning (MRP). The first company to use MRP was Black & Decker in 1964, with Dick Alban as project leader. In
1983 Oliver Wight developed MRP into manufacturing resource planning (MRP II).
Manufacturing Resource Planning (MRP II) is defined by APICS (American Production and Inventory Control
Society, Estd. 1957) as a method for the effective planning of all resources of a manufacturing company. Ideally, it
addresses operational planning in units, financial planning in dollars, and has a simulation capability to answer
"what-if" questions and extension of closed-loop MRP.
This is not exclusively a software function, but a marriage of people skills, dedication to data base accuracy, and
computer resources. It is a total company management concept for using human resources more productively.
Purpose
MRP II integrates many areas of the manufacturing enterprise into a single entity for planning and control
purposes, from board level to operative and from five-year plan to individual shop-floor operation. It builds on
closed-loop Material Requirements Planning (MRP) by adopting the feedback principle but extending it to
additional areas of the enterprise, primarily manufacturing-related.



Key functions and Features
MRP II is not a proprietary software system and can thus take many forms. It is almost impossible to visualise an
MRP II system that does not use a computer, but an MRP II system can be based on either purchased / licensed or
in-house software.
Almost every MRP II system is modular in construction. Characteristic basic modules in an MRP II system are:
Master Production Scheduling (MPS)
Item Master Data (Technical Data)
Bill of Materials (BOM) (Technical Data)
Production Resources Data (Manufacturing Technical Data)
Inventories & Orders (Inventory Control)
Purchasing Management
Material Requirements Planning (MRP)
Shop Floor Control (SFC)
Capacity planning or Capacity Requirements Planning (CRP)
Standard Costing (Cost Control)
Cost Reporting / Management (Cost Control)
Distribution Resource Planning (DRP)
together with ancillary systems such as:
Business Planning
Lot Traceability
Contract Management
Tool Management
and related systems such as:
General Ledger
Accounts Payable (Purchase Ledger)
Accounts Receivable (Sales Ledger)
Sales Order Management
Distribution Requirements Planning (DRP)
*Automated+ Warehouse Management
Project Management
Technical Records
Estimating
Computer-aided design/Computer-aided manufacturing (CAD/CAM)
CAPP

The MRP II system integrates these modules together so that they use common data and freely exchange
information, in a model of how a manufacturing enterprise should and can operate. The MRP II approach is
therefore very different from the point solution approach, where individual systems are deployed to help a
company plan, control or manage a specific activity. MRP II is by definition fully integrated or at least fully
interfaced.
MRP II systems can provide:

Better control of inventories
Improved scheduling
Productive relationships with suppliers
For Design / Engineering:
Improved design control
Better quality and quality control
For Financial and Costing:
Reduced working capital for inventory
Improved cash flow through quicker deliveries
Accurate inventory records
Timely and valid cost and profitability information
Drawbacks of MRP II
Hidden costs
Potential losses due to long lead times
Poor on-time customer delivery performance

Q.2] Describe the various IT applications used in FMCG industry. Also provide examples.
The various technologies used in FMCG are:
1) Cloud Computing
2) Neural Networks
3) Video Walls
4) RFID

a) Cloud Computing:

Cloud computing is defined as an updated version of utility computing. They are nothing but virtual servers
available over the internet. Cloud computing encompasses any subscription-based or pay-per-use service that, in
real time over the Internet, extends IT's existing capabilities. Shared architecture philosophy, on the other hand,
does support elastic scalability.
Advantages:
1. Cost Efficient
2. Almost Unlimited Storage
3. Backup and Recovery
4. Easy Access to Information
5. Quick Deployment

Disadvantages:
1. Security in the Cloud
2. More Prone to attack
3. Technical Issues
4. Maintenance


Eg:
1) The cloud based implementation by Media Cart and Shoprite in New Jersey for better consumer
experience.


b) Neural Networks
Neural Networks is something very similar to the Nervous system of our body
An excitation is signalled by a value of 1 and a value of 0 indicates inhibition
Neural networks are "trained" by presenting it examples of input and the corresponding desired
output
Used in Forecasting and Data mining
Neural networks are used in cases where the outcome is fuzzy in nature



c) Virtual Walls
Giant screens which were earlier used to for advertising.
However, with the evolution of technology, they are now being used as a means to interface with the
consumer.
These giant screens are strategically placed at locations all over the city, which can be easily accessible to
the general public.
A modern day Virtual Wall consists of a QR code which when scanned gives details about the desired
product.
The scan of the QR code leads the consumer to the online order portal, where the consumer can place
and order for the product and can also get it delivered at his doorstep.
This has currently been implemented by P&G in Czech Republic.

d) RFID Radio Frequency Identification Technology
RFID technology is basically used for easy location of products.
By collaborating it Internal Mapping technology, they can be used successfully to deliver a better
customer experience in a mall.
It has been implemented by Shoprite shopping mall at New Jersey in 2008.


Below is the flow chart for describing the use of this technology by the customer.


Q.3 What are the various applications of ITM in construction industry? Also provide examples.

1. Project Management Solutions
ITM provides custom built solutions for budgeting, monitoring and controlling all aspects of cost for all
major construction projects to aid in effective project management.
In order to facilitate managing projects across geographies, ITM provides custom built solutions required
for tracking and reporting the progress and performance of the construction projects with support for
multi-language, multi-currency and multi-regional setting.
ITM applications can be built for Procurement support and inventory management.

Benefits of Management Systems
Regulatory report filing which will be mandatory in India once the Real Estate (Regulation and
Development) bill is passed.
Tools are available to facilitate better financial control.
Tools are available for better communications with suppliers and customers.
Faster access to common data spread across all sites. Thus the developer need not visit multiple sites to
manage them.
There are myriad new and improved means to attract customers.
Faster completion of work via efficient supply chain management.
Streamline coordination between managers, suppliers and contractors.
Easier to manage large quantity of data

2. Mobile IT and RFID Solutions
Mobile Inspection and Progress Monitoring via mobile applications save time and travel.
Mobile Workforce Tracking solutions enable monitoring the employee activities.
Scheduling Materials via Mobile.
Fleet and Equipment Management.
Tracking Asset via Mobile.

3. Document Management Systems

Electronic Document Management (EDM) is a well known system consisting of a private network that uses
internet protocol to transmit information.
All these project documents are stored on a single server and the user interface can be as simple as an
FTP (File Transfer Protocol) site or a user friendly web page complete with a search engine
Electronic document management systems do away with the time-consuming process of sifting through
paper files at the risk of discovering the document was not properly put away by the last person to pull it.
EDM systems allow files to be recalled at the click of a mouse, while providing information on when and
by whom the file was last viewed and/or marked up.
Documents can be scanned and stored to create an electronic database accessible to users across an
enterprise. Cloud-based EDM systems can also allow out-of-office users to access company and project-
related documents through a wireless connection.

4. 3-D MODELLING AND BUILDING INFORMATION MODELS

3-D Modelling and building information models allow 3-Dimensional visualization of construction projects,
so that clients, design engineers and contractors can perform visualized walk-through, view realistic
renderings of buildings before actual construction and even examine construction frequencies in 4-
Dimensional animations.
Contractors can use the model to analyze the constructability of highly detailed areas and visualize
potential problem areas.
This type of early-on constructability verification can save considerable time and money by preventing
expensive re-work or on-site corrections.

5. CONSTRUCTION SEQUENCING AND 4-D MODELING
4D Concept
4D Models link components in 3D CAD models with activities from the design, procurement, and
construction schedules.
The use of the term 4D is intended to refer to the fourth dimension: time, i.e. 4D is 3D + schedule
(time).
4D models enable exploration and improvement of the project executing strategy, facilitate
improvements in constructability with corresponding gains in on-site productivity, and make
possible the rapid identification and resolution of time-space conflicts.
4D CAD models have proven particularly helpful in projects that involve many stakeholders, in
projects undergoing renovation during operation, and in projects with tight, urban site
conditions.

Example of 4D Project
Walt Disney Imagineering used 4D models to plan the construction of the Paradise Pier portion of
Disneys recently opened California Adventure in Anaheim, CA.
Tight site conditions, a must-meet completion deadline, and many non-construction stakeholders
made the project ideal for the application of 4D project management.
The 4D model enabled the project team to produce a better set of specifications and design
drawings for the construction of the project, resulting in fewer unplanned change orders, a
smaller construction team, and a comfortable completion of the project ahead of schedule.

6. Popular computer applications for construction activities
SmartBidNet: Consisting of bid management systems, this iPhone app will allow you create and track your
bid process with your subcontractors, and companies, in a secure and reliable way. SmartBidNet will
provide you with accessible information to make bid projects easier and on time.
GoBIM: BIM applications are now used everywhere in the construction industry. GOBIM application will
provide you the possibility to navigate 3D BIM models and their associated data. However, the size of the
model that GoBIM can handle is dependent on three factors, number of triangles, number of parameters,
and number of materials.

Following are the examples of some leading software companies and their applications
Aconex: Web-based system for managing project information such as drawings, documents, tenders and
correspondence.
Causeway: Application for Designing, cost management and financial supply chain management.
CMCS: CMCS offers PPMIS, a portfolio and project management solution.
Construction Computer Software (CCS): Provides solutions for Construction Estimating and Project
Control system.
Primavera: Oracle subsidiary, provides project portfolio management solutions.
Vico: Vicos 5D Virtual Construction suite is designed to bring the benefits of building information
modeling to construction companies.
TCS: Provides Asset Management Solutions, Collaboration & Document Management Solutions,
Engineering and Design Back Office etc.
Q 1: Give the brief details on application of IT in Indian Railways?
Application of Information Technology In Indain Railways
1. Passenger Reservation System (PRS) - A countrywide online passenger reservation and ticketing system,
developed and maintained by CRIS, is a complex online distributed client server application developed in C and
Fortran programming languages on Digital OpenVMS operating system using RTR (Reliable Transaction Router) as
middleware. CONCERT (Country-wide Network of Computerised Enhanced Reservation & Ticketing) interconnects
the four regional computing systems at New Delhi, Mumbai, Kolkata, and Chennai into a National PRS grid. It
allows a passenger from any location to book train tickets from any station to any station. It handles reservations,
modifications, and cancellations / refunds. It performs reservation for over 1.6 million seats and berths daily. It has
complex rules, validations and fare computation techniques interwoven in the application.

2. The computerization of the Freight Operations Information System of Indian Railways - FOIS enables
management and control of freight movement, optimization of asset utilization, and generation of freight invoices
("Railway Receipts"). Many of IR's important freight customers pay through the electronic payment gateway
interfaced with FOIS. Approximately 72% of the freight revenue of the Railways is paid through the payment
gateway.

3. The Internet based E-ticketing reservation system, whose front-end has been developed by CRIS.

4. The computerisation of the Unreserved Ticketing System Unreserved Ticketing System of Indian Railways -
Unreserved ticketing constitutes a major component of the IRs overall ticketing volume and is an important
source of revenue. UTS delivers fast and efficient unreserved ticketing from dedicated counters replacing manual
Printed Card Tickets/EFTs/BPTs with centralised online sales accounting. The solution architecture lends itself to
easy integration with handheld terminals, smart cards, automatic vending machines, etc.

5. National Train Enquiry System and RailRadar for latest train running timings and live train tracking.

6. Web Enabled Claims- The web-based software enables the general public to not only file claim cases
through the web but also track the progress of their claims. All the rules and regulations for claims and accident
case filing along with contact details of all claims offices are available on the website.

7. Rail Budget Compilation System (RBCS)- Developed for budgetary inputs from the different zones and
production units of the Indian Railways, RBCS facilitates capturing of data, building of database, analysis of
demands and pruning of the estimates for inclusion in the Railway Budget.

8. Vigilance Software System (VSS) - VSS is designed specially for the requirements of Vigilance on Indian
Railways and has been implemented in all the Zonal Railway Headquarters. VSS maintains information on vigilance
cases / complaints including various reports and correspondence.

9. "I-Pass" addresses functionalities for Personnel and Finance Departments. I-Pass contains two major
modules: Financial Accounting System (FAS) and Payroll System (PS).

10. Workshop Information System (WISE) - WISE is a MIS project for the various railway workshops around
the country. Currently it is in operation in 15 workshops, viz. Kharagpur, Jagadhri, Ajmer,Kota, Charbagh, Liluah,
Kanchrapara, Matunga, Lower Parel, Parel, Bhusawal, Secunderabad, Lallaguda, Jamalpur. WISE provides
managerial reports to the various Workshop managements. The project utilizes the ORACLE DBMS. WISE is being
upgraded to an ERP-based system.

11. Railway crew management - The Crew Management System (CMS) is software which provides information
regarding railway crew at all times. It provides information regarding the presence of crew at home station or at
out station, maintains their status-wise records, and assigns crew to trains. It also maintains information regarding
periodic and other rests, road learning & traction knowledge. The software system gives SMS alerts to
management and supervisors in case the crew levels fall below a critical level likely to affect train operations. It is
capable of booking crew on Coaching, Shunting, and Freight services in the form of Links and Rosters. The software
system has tools to support the safety monitoring of the crew by nominated Inspectors, monitoring of the crew
knowledge through a Quiz administered through the kiosks in the crew lobbies, and enables the crew to read the
latest safety circulars.

12. Control Office Application (COA) provides a solution for the rail traffic Controllers of each Division to
manage the trains running in their section. COA is running in all the Divisional Control offices in the Indian
Railways. The COA application is interfaced with other applications such as the National Train Enquiry System
(NTES) to provide train running information to the passengers and railway managers.

13. E-Procurement System :- Indian Railways E-Procurement Systems provides a secure, fair, and transparent
method of procurement of material by the Railways through a web-based interface. This system enables suppliers
to securely upload their tenders to a central server in encrypted form, which can then be decrypted only by
authorized officials of the Railways after the date and time of tender opening. All time stamps are authenticated by
the National Physical Laboratory. The system is in operation in all Zonal Railways and units of IR. E-Procurement
Tendering Modules has been implemented in All Indian Railways Zones and Production Units, Apart from this
service has been extended to CORE, RDSO, RailTel, Kolkata Metro. E-Auction was launched in March 2012 and
since then it has been adopted by 12 Zonal Railways which will be rolled out to All Indian Railways very soon.
Payment Gateway has also been implemented and running successfully since Jan 2012 with some new features
implemented for the first time with any E-commerce Web Application in India like Lien Feature.

14. Software for Locomotive Asset Management (SLAM) is a software system under development at CRIS
which shall cater for Electric Locomotive Asset Management on Indian Railways.

15. Asset Management systems such Locomotive Management System for Diesel locomotives, Freight
Maintenance Management System for wagons (freight railcars), Coaching Maintenance Management System
(CMM), and Track Management System are under development and implementation at pilot sites. In addition, an
ERP system has been implemented in the Integral Coach Factory, Chennai, in January 2012.

Q.2 What are the impacts of IT on Hospitality and tourism?

Answer: Information and Communication Technology in tourism sector is of special significance. This is due to its
special product behavior, various high tech information and communication technologies are in use in the tourism
sector around the world. They are used for tourism product development, marketing, distribution and training of
tourism sector personnel. These technologies are so indispensable in order to find out and satisfy the ever-
changing demands for tourism products. Though there are many definitions for tourism, it could be simply defined
as a travel and stay of a non-resident. In order to travel to a particular area there must be a reason. For example
a person may travel for leisure, business, visiting friends and relatives, health, education etc. He/she chooses a
destination for one or the other reason. Transport is necessary to travel and accommodation to stay at the
destination. So, tourism as an industry has three major components: Attraction, Accommodation and Transport. In
the developed world, today, all these components have reached at their zenith in satisfying their customers needs
aided by modern technology. These components have also came a long way to offer a range of products which suit
the needs of multitude tourists around the world, and are still working hard to cater to an ever changing test of
them. Tourism is ranking the top ahead of all other categories of international trade. This is evident from the
statistical information compiled from all over the world by WTO (World Tourism Organization). The number of
international arrival shows an evolution from a mere 5 million in 2011 to 20 million in 2012.The trend shows a
tremendous increase both in the number of tourists and income in the coming years.
INFORMATION TECHNOLOGY AND THE TOURISM INDUSTRY COMPONENTS
As indicated above the tourism industry is made up of three major components: namely,
(i) Transport sector, which includes air, water and surface transport,
(ii) Accommodation sector, all types of establishments that offer lodging to visitors
(Hotel, Motel, Guest houses, caravans etc.)
(iii) Attraction sector which comprises manmade and natural attractions which are developed to satisfy visitors
educational, recreational, aesthetic needs etc.
TRANSPORT SECTOR
Transport provides the essential link between tourism origin linkage destination and it facilitates the movement of
holidaymakers, business travelers, people visiting friends and relatives and those undertaking educational and
health tourism. Before setting out on a journey of any kind, every traveler makes sure which Transport Company
has a good safety record. To this effect, airplanes coaches and even taxis are equipped with good communication
equipment. An Airplane flies with the help of modern information technology equipment which provides
information ranging from weather, altitude and other information to the pilot to communication made during
emergency by the pilot with other airplanes and air traffic control stations. In-flight entertainment is also a product
of information technology, video games, video films are examples. In the case of buses/coaches and taxis, in many
countries with developed tourism business, they are equipped with radio communication systems for various uses.
For example, the driver or the tour guide updates the Tour Company headquarters about the progress of the tour
throughout the touring period. This communication ensures the safety of tourists. Fast and easy information flow
is of paramount importance to build confidence in the travelling public. In recent years, the confidence built due to
the use of modern IT has been demonstrated by a tremendous increase in the number of travelers worldwide.
ACCOMMODATION SECTOR
In the accommodation sector also the contribution of information technology is prominent. Any individual or
group wishing to travel to any part of the world now has an easy access to the accommodation service providers. A
visitor can access an information about the kind of hotels at the destination, their ranges of product, the price and
other relevant information without leaving his/her office or home. What one has to do is to ring up a travel agency
and get the expert advice. This will help any visitor greatly as to where to stay during any kind of away from home.
Here the information can be obtained aided by still or moving pictures in order to give an exact feature of an
accommodation, facilities and services of ones choice. At a destination also visitors are at ease during their stay in
every respect, in getting information about their business, family or other information back home. They are also at
ease to relax with the videos and television entertainment programs, which nowadays are part and parcel of many
accommodation units.
ATTRACTION SECTOR
In the case of attractions both manmade and natural attraction owners need to communicate or inform their
customers and potential customers about their product. Information about the kind of attraction, where they are
located and how to get there is of vital importance. The attraction owners particularly the national tourist offices
discharge their duty of promoting their countrys tourist attractions using the information technology products.
Information through promotional videos, Internet web Sites, television advertisements and travel documentaries
are the main information dissemination tools.
Travel Agencies and the role of information technology
One of the unique characteristics of tourism products is the need of the role played by the so-called travel
agencies. These travel agencies are also known as, tour operators, conference organizers booking agents etc. They
are so important because of the nature of the tourism product, perishables and intangibility. This means service
products including tourism, cannot be stored for a litter sale, and cannot be inspected for their quality before
purchase respectively. This entails a very big effort for marketing and distribution of these products. Tourism
product supply is fragmented both geographically and as product component, coupled with their relatively low
capital volume; individual components cannot afford to market and distribute their product for the dispersed
potential and actual customers on their own. For instance, an airline company, which flies many destinations, can
have a representative but cannot have so many offices or product distribution channels in all routes it serves. Or,
in Addis Ababa itself for example, Ethiopian Airlines has few offices to distribute and market its product. However,
one can also buy Ethiopian Airline ticket from many other travel agencies in the city. One can imagine if the airline
can run these many say sixty offices on its own which are usually with high fixed costs. This makes the travel agents
an indispensable partner both in efficiently distributing and marketing the product and substantially reducing the
cost of operation for the airline. As these are working on commission basis, the cost of operation for the airline is
relatively low. These travel agencies are performing this indispensable task of being intermediary by the use of
computers and computer reservation systems (CRS).
CRS (Computer Reservation System)
The airline CRS systems were the pioneers of computer applications in the 1950s and are now virtually
indispensable to airlines because they enable their revenue streams to be maximized by efficient inventory control
(an inventory in this context refers to an airlines stock of passenger seats that is available for sale). However,
these days, hotel and car hiring companies by renting the service from the airline companies are also employed
these systems. The technology works by using computers of special kind and leased telephone lines. The travel
agent is connected on line to the central host computer system or CRS. The host computer is always a mainframe
with massive database attached. The mainframe host polls each travel agent terminal every second or so, to see if
it has any messages to send. In this system it is possible that airliners, Hotels and car rental companies can talk to
the travel agent and vise versa. This system contributes to a great extent in increasing sales volume and giving
precise information on the availability and selling the products efficiently ensuring substantial profit gain.
GDS (Global Distribution Systems)
GDSs are systems which distribute reservation and information services to sales outlets around the world. Unlike
the CRSs used solely by an airline or hotel chain, GDS distribute more than one CRS to users who are usually travel
agents. GDSs were formed from the airlines of several CRSs, each of which had its airline backer. Once formed,
there was a period of some consolidation and shakeout, after which four main GDSs emerged. These are Amadeus,
Galileo, Sabre and World Span. These worlds leading GDSs are switches or simply computers that are connected on
the one side to many different supplier systems and on the other side to many end users. The end users of switch
comprise travel agents with a single reservation system to support the sale of airline seats and related travel
products such as hotel-and car hire, via a single computer terminal, usually a Personal Computer. All the GDSs are
owned by a group of airline companies. Eleven carriers of different countries for example own Galileo and there
are 500 participating airlines companies. GDSs require massive investment because they are extremely large
computer systems that link several airlines and travel principals into a complex network of PCs,
telecommunications and large main frame computers. It is not important here to go into the complex operation
how these GDSs are working. However it is pertinent to say that GDS are the macro version of CRSs with a
specialized and improved information technology for the distribution of Travel products.
Internet: Travel and Tourism
So far it has been dealt with an information technology where intermediaries, travel agents, tour operators etc. are
an indispensable part in the distribution and marketing of travel and tourism products, and as an important point
of sale or product outlets. Here I will discuss about an information technology where the producer and the
consumer are directly communicating, by putting the indispensability of travel intermediaries in question. As I have
said elsewhere in this article, the intangibility of the product where risk and uncertainty for the customer is higher,
his need for reliable pre-purchase information is stronger. The potential customers decision risk and dependence
on information is further increased because he cannot see, inspect compare or try out tourist services before
deciding to use them. This is not met perfectly than through Internet, which is the latest product of information
technology. This interactive information-supplying medium is user friendly and gives enormous information of all
kind related to travel. Apart from supplying information on world leading and emerging tourist destination of all
kind, it is now possible to book and buy holidays through Internet using plastic money. It gives information on all
Airlines, Hotels and Car hire companies, which are in its database. Microsoft is a travel agent. Its Internet site
branded Expedia is one of the most important examples of the new generation of travel intermediaries.
Distribution of travel and tourism products using the Internet has a substantial cost reduction advantage for
providers of tourism services. The cost incurred by suppliers in receiving a customer booking is the one, which is
costly. So, Internet gives a practical aid both in supplying information and receiving bookings or selling tourism
products on the principals behalf.
Marketing tourism products on the Internet is also possible. This is done through the page of the companys
Internet site. Once the company got access to the Internet, it gets various opportunities. Of these, Electronic-mail
(e-mail) is one. As a tourism product supplier, especially with business travel as a selected target market, it makes
possible to communicate the person through his/her e-mail address wherever the client is. Unlike telephone
communication, there is no need for the presence of the receiver of the message during message transmission. It
also gives a typed copy of the message. E-mail communication medium is very cheap yet efficient and effective. On
the other hand, marketing on the Internet has an advantage of being used by all companies of all size as long as
they can establish their Web Site on the Internet.

Q.3: What are the different functions performed by the Information Technology to support the various service
sector? Explain it with example.

Answer: Services, the 'tertiary sector' of the economy, covers a wide gamut of activities like trading, banking and
finance, infotainment, real estate, transportation, security, management and technical consultancy among several
others. The contribution from services sector today stands over 40 per cent of the total GDP in India. The sector
currently employs close to 20 million people in India. The TIFAC study on services covered nine select sub-sectors
ranging from advertising, HRD services, testing and certification to Government administration. Information
Technology (IT) revolution takes places everywhere. Organizations implementing IT are able to provide better
services and thereby able to improve their businesses manifold. In earlier days IT has enormously been used in
manufacturing sector regarding product designing and development, product modification etc. Now-a-days the
importance of IT has been strongly felt and applied in the services sector.

Application of IT in Hospitals

The hospital management is taking place with the application of IT. Starting from the reception by recording a
patient's name, the IT has been used everywhere in an hospital. A patient's record comprising his name, age, sex,
disease found, blood group, height, weight, blood pressure level, etc. has been maintained as database in a
computer in the hospital. So whenever the patient arrives his previous record can be verified. Similarly when the
surgeries take place, the hospitals use computers and specialized software for judgments of diseases/problems
and for curing the diseases. For billing purposes also the computers have been used widely in hospitals.

Application of IT in Pharmaceutical Shops

Because of the increase in competition, IT has also been applied in pharmaceutical shops. Whenever any medicine
enters the shop, all the information related to the medicine its name, quantity, manufacturing date, expiry date,
its content, price and other information can be entered into a computer system. Whenever the sales take place,
computerized billing would be provided to the customers. The bill would carry plenty of information for the benefit
of customers indicating the name of the medicine, quantities purchased by them, its price, manufacturing and
expiry date. Whenever any medicine has been sold the software created would also give indications to the
manager/supervisor of a pharmaceutical shop related to the number of quantities sold, number of quantities
available in the shop and the computer also warn them regarding the date of expiry.

Application of IT in Educational Institutions

The Government of India has come out with a statement stating that Information Technology (IT) is India's
Tomorrow. Hence the educational institutions have to use IT for teaching the childrens. Latest hardware and
software can be used and the latest computer languages and packages have to be taught to the students. It is not
enough if student of computer science alone has been taught about IT, but also the students of other disciplines
have to be taught about IT. Because, the application of IT takes place everywhere.

Application of IT in Share Trading

Gone are the days when stock brokers use to shout at the trading hall of a stock exchange quoting their price.
Now-a-days with the help of computer terminal and internet connection, purchasing and selling of share takes
place everywhere. A client can look at the transactions taking place through the computers. The volume of the
shares traded and the turnover has got consistently improved because of the online share trading.

Application of IT in Banking

Tremendous improvement has taken place in the Indian banking sector because of the IT revolution. All the private
and foreign banks have gone for 100 percent computerization. At a rapid fast, the government owned nationalized
banks are also improving their number of computerized branches. With the help of computerization, the
transaction takes place at a faster rate and the waiting time of a customer in a queue is getting minimized. E
Banking is emerging in the Indian banking sector. The banks provide the facility of internet banking, phone and
mobile banking with the help of IT. All the branches of a bank are networked. The networking also takes place
between two or more branches in order to provide easy accessibility for a customer. The cost incurred on
infrastructure, furniture and employees has got decreased because of the application of IT.

Application of IT in Advertising Agencies

'Creativity' is the slogan chanted in Ad Agencies. Creativity involves doing things differently. Things can be done
differently with the help of IT. The Ad Agencies use lot of software for creating advertisements. Lot of animations
and graphics can be done using IT tools.

Application of IT in Marketing Research Agencies

Marketing Research (MR) agencies involve in lot of research activities starting from research survey on product
development till distribution and measurement of customer response. Gone are the days of manual analysis of
data. The MR agencies use sophisticated statistical software packages for data analysis and interpretation. Some of
the statistical software packages are created by their own for customized problems. Hence, application of IT tools
take place in full swing at MR agencies.

Application of IT in Indian Railways

The Indian Railways has the proud of being the 'largest employer'. The application of IT, has provided various
benefits for the Indian Railways and its passengers. With the issue of computerized railway tickets, the errors have
been minimized. A passenger can book the train ticket from any part of the country. A passenger can also book the
train ticket at his convenient place, as the online reservation system has been introduced.

Application of IT in other services sector

Now-a-days the reservation for film shows take place through online ticket booking. The cinema theatres in order
to avoid queues and unnecessary rush follow the system of online ticket booking so that through internet anyone
can book tickets at their convenient places. In order to reduce the queue, computerization takes place in petrol
bunks also. Computerization ensures speedier billing and reduces the queue in petrol bunks. In Regional Transport
Offices, computerization ensures prompt and quick delivery of service to the peoples. The leading libraries are also
computerized these days. Application of IT tools provides various benefits for the libraries and readers. The books
available in the libraries and those on circulation can easily be found. The issue and return date can easily be
identified and other information related to the library can also easily be sought. IT also paves way for online
shopping. Websites like Amazon.com: Online Shopping for Electronics, Apparel, Computers, Books, DVDs & more,
fabmart.com etc. provide online shopping facilities. Online hundi system has been introduced by some of the
leading temples in India. With the help of online hundi system, those interested in donating amount to these
temples can remit their amount with the help of credit card numbers through internet.

Application of IT in BPO & KPO:
There are various BPO and KPO are present across the world. Following are the some of the major roles in which IT
plays an important role.

Communication
For many companies, email is the principal means of communication between employees, suppliers and
customers. Email was one of the early drivers of the Internet, providing a simple and inexpensive means to
communicate. Over the years, a number of other communications tools have also evolved, allowing staff to
communicate using live chat systems, online meeting tools and video-conferencing systems. Voice over internet
protocol (VOIP) telephones and smart-phones offer even more high-tech ways for employees to communicate.
Inventory Management
When it comes to managing inventory, organizations need to maintain enough stock to meet demand without
investing in more than they require. Inventory management systems track the quantity of each item a company
maintains, triggering an order of additional stock when the quantities fall below a pre-determined amount. These
systems are best used when the inventory management system is connected to the point-of-sale (POS) system.
The POS system ensures that each time an item is sold, one of that item is removed from the inventory count,
creating a closed information loop between all departments.
Data Management
The days of large file rooms, rows of filing cabinets and the mailing of documents is fading fast. Today, most
companies store digital versions of documents on servers and storage devices. These documents become instantly
available to everyone in the company, regardless of their geographical location. Companies are able to store and
maintain a tremendous amount of historical data economically, and employees benefit from immediate access to
the documents they need.
Management Information Systems
Storing data is only a benefit if that data can be used effectively. Progressive companies use that data as part of
their strategic planning process as well as the tactical execution of that strategy. Management Information
Systems (MIS) enable companies to track sales data, expenses and productivity levels. The information can be used
to track profitability over time, maximize return on investment and identify areas of improvement. Managers can
track sales on a daily basis, allowing them to immediately react to lower-than-expected numbers by boosting
employee productivity or reducing the cost of an item.
Customer Relationship Management
Companies are using IT to improve the way they design and manage customer relationships. Customer
Relationship Management (CRM) systems capture every interaction a company has with a customer, so that a
more enriching experience is possible. If a customer calls a call center with an issue, the customer support
representative will be able to see what the customer has purchased, view shipping information, call up the training
manual for that item and effectively respond to the issue. The entire interaction is stored in the CRM system, ready
to be recalled if the customer calls again. The customer has a better, more focused experience and the company
benefits from improved productivity.
Questions & Answers

Q1. Explain what is information audit and information security? Also, explain with examples what are the
impacts of new trends in technology on film & media industry?
The Information Audit (IA)
It extends the concept of auditing holistically from a traditional scope of accounting and finance to the
organizational information management system. Information is representative of a resource which requires
effective management and this led to the development of interest in the use of an IA.
Role and scope of an IA
To identify an organisations information resource
To identify an organisations information needs
To identify the cost/benefits of information resources
To identify the opportunities to use the information resources for strategic competitive advantage
To integrate IT investment with strategic business initiatives
To identify information flow and processes
To develop an integrated information strategy and/or policy
To create an awareness of the importance of Information Resource Management (IRM)
To monitor/evaluate conformance to information related standards, legislations, policy and guidelines

Information Security
Information security, sometimes shortened to InfoSec, is the practice of defending information from
unauthorized access, use, disclosure, disruption, modification, perusal, inspection, recording or
destruction. It is a general term that can be used regardless of the form the data may take (electronic,
physical, etc...)
Security is a broad topic and covers a multitude of sins. In its simplest form, it is concerned with making
sure that people cannot read, or worse yet, secretly modify messages intended for other recipients.
Most security problems are intentionally caused by malicious people trying to gain some benefit, get
attention, or to harm someone.
The CIA triad (confidentiality, integrity and availability) is one of the core principles of information security.




Emerging trends in technology & their impact on film & media industry -
Processing power has increased, software is getting more and more integrated and complex, hardware
that is needed to run programs is getting smaller and cost-effective
For the industry this means new editing software, more powerful digital imaging programs and new
formats like digital projection, DVDs and Blue-ray disks.
Digital cinema provides a clearer picture, a better cinematographic experience and faster and easier
distribution and is now becoming an industry standard
People meters used by Indian Television Audience Measurement
The media integration and convergence encourages increased intertextuality and franchising video
games, special edition DVDs, theme park rides, action figures
For example, movies like Quantum of Solace & Avatar used XBOX 360 & UbiSoft video game developers,
respectively, for creating a pre-launch hype in the consumer market. Games like tombraider & hitman gave a
platform to scriptwriters in turning a successful gaming concept into a blockbuster. Universal studio has had
created Jurassic Theme Park which boosted the success of the sequels of the movie. Special edition DVDs were
launched by the distribution house of Lord Of The Ring. Automated action figures & merchandise have always
been captured the teen market. With 4D theatres technology has equipped the consumer for getting a better
experience from the engaged time.

Q2. What is technological convergence? Cite examples.
Technological convergence is the tendency for different technological systems to evolve toward performing similar
tasks. Convergence can refer to previously separate technologies such as voice (and telephony features), data (and
productivity applications), and video that now share resources and interact with each other synergistically.
Telecommunications convergence, network convergence or simply convergence are broad terms used to describe
emerging telecommunications technologies, and network architecture used to migrate multiple communications
services into a single network. This involves the converging of previously distinct media such as telephony and data
communications into common interfaces on single devices.
Technological convergence is important for consumers as it helps to ensure greater price transparency.
Convergence also presents us with the potential to choose from and access a far wider and more diverse range of
films in different media. Convergence gives a boost to the market of animation designers & offers an aesthetic
choice to filmmakers by creating films that look like videogames - 300 (2006), Sin City (2005), Avatar (2009) and
vice versa. Just as the audiences ability to choose between different ways of consuming TV programmes is greatly
enhanced by digital technology (e.g. the emergence of BBCs iPlayer), so too is the ability of institutions to create
different ways to make films and to deliver them to audiences. The ability to create and distribute content in a
much larger variety of ways will accelerate the segmentation of the film industry.
Convergence in this instance can defined as the interlinking of computing and other information technologies,
media content, and communication networks that have risen as the result of the evolution and popularization of
the Internet as well as the activities, products and services that have emerged in the digital media space.
Examples
Convergent solutions include both fixed-line and mobile technologies :
Using Internet for voice telephony
Video on demand
Fixed-mobile convergence
Mobile-to-mobile convergence
Location-based services
Integrated products and bundles
IP Multimedia Subsystem
Session Initiation Protocol
IPTV
Voice over IP
Voice call continuity
Digital video broadcasting - handheld


Q3. What are the cons (for institutions) & the pros (for the audience) of digital film piracy?
Cons for institutions
It costs millions to create films and the aim of creating them, amongst other things, is to make a profit. If
people are recording the films themselves in cinemas and distributing them online or otherwise, they are
making no money for the institution that has made the film.
The quality of films that are illegally filmed and obtained is also usually much worse than the real quality.
This can reflect badly on the film creators and also dissatisfies the viewer where ever they may be
watching it.
The money incoming from the sales of piracy market is usually fluxed back in the piracy chain leading to
the obvious growth of cybercrimes.

Impact of increased download speeds on the online movie download rate -

As the download speed increased, the time taken to download online files of bigger sizes decreased &
downloading a movie online became as easy as sharing it with a portable drive. With, assured searches of
keywords asked, intermediaries like mediashare, filestube, rapidshare, bit & utorrents such accesses became even
simpler.

Pros for the audience -
The obvious advantage of watching a pirated film rather than an officially bought copy of it is that you
most probably have to pay a less charge.
Also, often it is easy to get hold of early copies of the movies that may not be out on DVD yet. For many
people, these advantages often weigh out the disadvantage of the quality not being as good as the
original print of the movie.

Q1) what are the major problems faced by Indian farmers in agriculture?
The major problems are:
1. High cost of insecticides & pesticides: Since most of the Indian farmers are quite poor, they cannot afford to buy
the latest insecticides and pesticides and hence fail to protect their harvest both in the field and during storage.
Prices of key insecticides and pesticides have increased 5-15 per cent over the past year and experts see prices
rising further due to short supply. There is 10-15 per cent shortage in the total demand for select molecules.
The industry also attributes the rise in prices to an increase in the production cost, followed by the rise
in crude oil prices. Farmers are facing a tough time due to a steep rise in the overall cost of production. Going by
the claims of industry sources, the generic agro-chemicals like weedicides, herbicides and pesticides, including
cypermethrin, 2, 4-D amine, 2, 4-D ethyl ester and glyphosate are in short supply in the country and the imports
from China are becoming costlier. A rise in prices of these generic agro-chemicals would mainly affect paddy and
cotton growing farmers.
2. High cost of fertilizers and other agricultural inputs: Also, they are often unable to afford the costly fertilizers.
Whereas the cow dung is used as kitchen fuel, as a result of which, the soil doesnt get replenished of its
nutrients. The Government can shift to a system of direct transfer of fertilizer subsidy to farmers in a phased
manner, starting with monitoring movement of fertilizers up to the retail points. This will help farmers buy high-
priced complex fertilizers at reasonable prices, but the issue of fiscal deficit continues to impact the sector. Also,
in a vast country such as India, implementation of any policy at the grassroots level always has certain limitations
3. Low rains and scarcity of ground water: Inadequate irrigation system and overdependence on monsoons leads to
low crop yields in India. Irrigation in India refers to the supply of water from Indian rivers, tanks, wells, canals and
other artificial projects for the purpose of cultivation and agricultural activities. In country such as India, 64% of
cultivated land is dependent on monsoons.[1] The economic significance of irrigation in India is namely, to
reduce over dependence on monsoons, advanced agricultural productivity, bringing more land under cultivation,
reducing instability in output levels, creation of job opportunities, electricity and transport facilities, control of
floods and prevention of droughts
4. Low financial support & insurance security from state: There is very little monetary support from the
Government to the farmers and often the farmers have to borrow money from money lenders at high interest
rates. Modified seeds cost nearly twice as much as ordinary ones, necessitating larger loans.
5. There has been minimal financial support from the government for small farmers. Many small farmers dont
qualify for bank credit, forcing farmers to turn to moneylenders, who charge up to 20% interest on a four-month
loan. As collateral, farmers often sign away the title to their land. The benefit of Indias 2008 farmer relief
package remains to be seen. A crop failure, an unexpected health expense or the marriage of a daughter are
perilous to the livelihood of these farmers. Suicide has spread like an epidemic among the distraught farmers.
Many farmers have committed suicide by drinking the very pesticides that no longer work on their crops.
6. Fluctuating market rates: The fluctuating market rates means that often the farmers dont get sufficient price for
their crops. Often they have to sell it to vendors within their village, who buy the crops at throwaway prices,
leading to financial losses for the farmers.
7. Difficult bureaucratic procedure for procurement: The procurement process is also not flexible and there is
hardly any initiative from the Government to bring about changes .The age old system of doing things remains
unchanged over years and there is hardly any noticeable progress in the Indian Agricultural sector.

Q2: What is the role of IT in Indian Agriculture?
Answer: Information Technology has a widespread role in Indian Agriculture.
Some of the applications are mentioned below:
Remote Sensing
Remote sensing is the acquisition of information about an object or phenomenon without making
physical contact with the object. In modern usage, the term generally refers to the use of aerial sensor
technologies to detect and classify objects on Earth (both on the surface, and in
the atmosphere and oceans) by means of propagated signals (e.g. electromagnetic radiation emitted
from aircraft or satellites).
There are two main types of remote sensing: passive remote sensing and active remote sensing.
[3]
Passive
sensors detect natural radiation that is emitted or reflected by the object or surrounding areas.
Reflected sunlight is the most common source of radiation measured by passive sensors. Examples of
passive remote sensors include film photography, infrared, charge-coupled devices, and radiometers.
Active collection, on the other hand, emits energy in order to scan objects and areas whereupon a sensor
then detects and measures the radiation that is reflected or backscattered from the
target. RADAR and LiDAR are examples of active remote sensing where the time delay between emission
and return is measured, establishing the location, speed and direction of an object.

Geographical Information Systems
A geographic information system (GIS) is a system designed to capture, store, manipulate, analyze,
manage, and present all types of geographical data. The acronym GIS is sometimes used for geographical
information science or geospatial information studies to refer to the academic discipline or career of
working with geographic information systems and is a large domain within the broader academic
discipline of Geoinformatics. In the simplest terms, GIS is the merging of cartography, statistical analysis,
and computer science technology.
A GIS can be thought of as a systemit digitally makes and "manipulates" spatial areas that may be
jurisdictional, purpose, or application-oriented. Generally, a GIS is custom-designed for an organization.
Hence, a GIS developed for an application, jurisdiction, enterprise, or purpose may not be necessarily
interoperable or compatible with a GIS that has been developed for some other application, jurisdiction,
enterprise, or purpose. What goes beyond a GIS is a spatial data infrastructure, a concept that has no such
restrictive boundaries.

Soil Science
Soil science is the study of soil as a natural resource on the surface of the earth including soil
formation, classification and mapping; physical, chemical, biological, and fertility properties of soils; and
these properties in relation to the use and management of soils.
Sometimes terms which refer to branches of soil science, such as pedology (formation, chemistry,
morphology and classification of soil) andedaphology (influence of soil on organisms, especially plants),
are used as if synonymous with soil science. The diversity of names associated with this discipline is
related to the various associations concerned.
Indeed, engineers, agronomists, chemists, geologists, physical geographers, ecologists,
biologists, microbiologists, sylviculturists, sanitarians, archaeologists, and specialists in regional planning,
all contribute to further knowledge of soils and the advancement of the soil sciences.
Soil scientists have raised concerns about how to preserve soil and arable land in a world with a growing
population, possible future water crisis, increasing per capita food consumption, and land degradation.



Agronomy

Agronomy is the science and technology of producing and using plants for food, fuel, fiber, and
reclamation. Agronomy encompasses work in the areas of plant genetics, plant physiology, meteorology,
and soil science. Agronomy is the application of a combination of sciences like biology,
chemistry, economics, ecology, earth science, and genetics. Agronomists today are involved with many
issues including producing food, creating healthier food, managing environmental impact of agriculture,
and creating energy from plants.
[1]
Agronomists often specialize in areas such as crop
rotation, irrigation and drainage, plant breeding, plant physiology, soil classification, soil fertility, weed
control, insect and pest control.
In horticulture, sericulture and floriculture as well.
A range of innovative technologies are adapted to improve profitability of horticulture production
.Reducing post-harvest losses with the implementation of coolbot (Cold and dry storage) .Overcoming the
challenge of poor seed quality implementing drying beads Minimizing the insect pest damage with the
help of pest-exclusion nets.
In floriculture, Technologies used are a Nursery, Landscaping and Greenhouse technology, worldwide
events information and a complete production capsule to farmers for large scale cultivation

Other roles pertain to:
Seeds Development
Real time monitoring of temperature variation in storage facilities.
Soil
Sciences
pH
Nutrients
Bulk Density
Moisture
level
Hydraulic
Conductivity
Collection of data for crop growth stages via GPS and providing pest information.
Weather forecasting.
Q3) what are the major constraints in use of IT in Agriculture?
Some of the major constraints delaying the spread of e-revolution to rural India
are listed below :
1. Haphazard development: It is observed that some initiatives have already been made to
provide IT based services to rural community. However, duplication of efforts are witnessed
as most of the services revolve around limited subjects. Keeping in view the giant task
involved, it is necessary to form a coordination mechanism to strive for a concerted effort to
support farming community in the country. Such a coordination agency may only have
advisory powers such as user interface, broad design, delivery mechanism of the content,
standards for setting up kiosks.

2. User friendliness: The success of this strategy depends on the ease with which rural
population can use the content. This will require intuitive graphics based presentation. Touch
screen kiosks are required to be set up to encourage greater participation

3. Local languages : Regional language fonts and mechanisms for synchronisation of the
content provides a challenge that needs to be met with careful planning.

4. Restrictions : Information content based on remote sensing and geographical information
systems can provide timely alerts to the farmers and also improve the efficiency of
administration. These applications can have a major impact on the farmers and help them to
appreciate the potential of information technology. However, governments map restriction
policies often threaten to stifle the optimal utilisation of these tools.

5. Power Supply : In most of the rural India, power supply is not available for long hours. This
will reduce the usefulness of the intended services. Since almost entire country receives
sunshine for most part of the year, it is useful to explore solar power packs for UPS as well
as for supply of power. The Ministry of Non-conventional Energy Sources may pay special
attention in this area which can be a major contributor to the growth of IT in villages.

6. Connectivity : Despite the phenomenal progress made in the recent years, the connectivity to
rural areas still requires to be improved . Reliable connectivity is a prerequisite for a
successful penetration of IT into rural areas. Many private ISPs are setting up large networks
connecting many major towns and cities. Since some of these networks pass through rural
areas, it is possible to provide connectivity to a large number of villages. Several technologies
exist that can be utilised for connecting rural areas. Cable network is a possible medium for
providing the last mile connectivity to villages.

7. Bandwidth : Even in areas where telephone and other communication services exist, the
available bandwidth is a major constraint. Since internet based rural services require
substantial use of graphics, low bandwidth is one of the major limitations in providing
effective e-services to farmers. As already stated, networks with high bandwidth are being set
up by several companies passing through rural segments which can be utilised. Until this
materialises, a two pronged strategy of storing static information at the kiosks and providing
dynamic information from remote locations can be examined. The graphic oriented content
which does not change frequently, such as, demonstration clips for farmers, can be stored on
the local drives at the kiosks and arrange for periodic updation of this information over the
network during non-peak hours. The dynamic information which changes more frequently
can be accessed from remote locations to obtain the latest status.

8. Dissemination Points : Mass deployment of information kiosks is critical for effective use of
the Internet based content and services. In order to ensure that the information kiosks are
economically feasible, it is necessary to make the proposition sustainable and viable. This
requires a major focus on a viable revenue model for such kiosks. In the new information era,
the kiosks should be designed to become electronic super markets that can, in addition to
being information sources, handle other services of use to the people living in rural areas.
The revenue available through such sources can make a kiosk attractive for prospective
investors. The Government can provide finance facilities to unemployed rural agricultural
graduates who can be expected to have greater commitment and at the same time act as an
efficient interface for less educated rural visitors. The objective should be to transform rural
information kiosks into clicks and mortar gateway to rural India for Bricks and mortar
industry. Some of the sources that can generate revenue for rural kiosks are :
a) Distance education - A large number of people travel substantial distances to
attend educational courses. It is possible to set up virtual class rooms right in
their villages
b) Training - People living in rural areas require training and a means for
upgrading their skills in their area of work. It is possible to provide quality
education right at their door steps with facilities for online interaction with
experts. For example, a village teacher or a paramedical staff can keep abreast
latest developments without disturbing his/her routine. Similarly, training can
be imparted on various aspects of agriculture such as correct practices,
irrigation practices, efficient utilisation of tools used in farming such as
tractors.
c) Insurance : The advent of private players into insurance has brought about
advanced IT systems that can render services over networks. The kiosks can
be insurance agents for insurance firms which, in turn, can compensate the
kiosk operators for online transactions for new business as well as maintaining
the old.
d) Local Agent : Many companies have difficulty in working out logistics for
their supplies to rural outlets. A rural kiosk can act as conduit for such bricks
and mortar companies. This has the potential of transforming a rural kiosk
into a profitable venture.
e) Rural Post Office : The kiosks can facilitate sending and receiving emails,
facilitate chats with experts. Several successful rural kiosks are already
available in many states which run essentially on this model.
f) e-Governance : Rural kiosks are the stepping stones for effective
implementation of e-governance. Details related to central / state / local
governments, formats and procedures, status verification such as case listings
in courts, filing of applications in electronic format where admissible, etc. are
some of the areas where kiosks can be of major use.
g) Online examinations : Online certification examinations are in things with
many organisations and certification agencies. Many people are forced to stay
at metros to take the examinations. Eventually it should be possible to conduct
these examinations through the rural kiosks.

9. Who should take up the task ? : At present, several initiatives have been taken in the form of
websites / portals targeting rural India. These are at best sketchy information sources catering
to pockets of rural India. It is to be noted that strong interlinkages exist within entire rural
India and concerted and coordinated effort is required for carrying the benefits of IT to rural
India. The magnitude of the task is such that no single institution or organisation can
accomplish it. It is necessary for stake holders in rural India, such as fertiliser industry, to
come together to provide adequate thrust to the effort initially. The fertiliser industry
distributes more than 15 million tonnes of nutrients per annum in the country involving
complex production, logistics and storage operations. A small savings made possible through
better management of information upto the point of delivery to farmers can mean significant
savings. The success of e-powering Indian agriculture is high if fertiliser industry makes a
concerted and coordinated effort to set up Business to Business (B-B) market place with
dealer / cooperative networks. The consumer industry also benefits from efficient operations
in rural India. The corporate India may be willing to participate in a joint effort that proves
beneficial to them as well as the rural India. The Government of India may, as outlined
above, initiate a coordinating agency where various stake holders can join hands to spread
e-culture to rural India and at the same time benefit from efficient operations.
1) Discuss in detail the impact of IT on society along with its merits and demerits.

The positive impacts of IT on society

Impact on Education

Computerisation of library

Following are the changes brought with the use of IT in library
1. Online access to library catalogue, databases, internet
The entire books in the library can be searched from a single desktop with internet connectivity.
2. Online/ Offline sources to digital resources
Many books are even available in digital format. Nowadays with the advent of smartphones these digital versions
are gaining more and more importance
3. Database searching
Any book can be searched within seconds with its title or authors name. Even the prologue, epilogue or the
information regarding the author can be read from the desktop itself without moving to the shelf where the books
are kept.

The use of barcodes has helped in easy tracking of books. The details of book are directly feeded into the computer
by clicking the button of barcoder.

Ebooks
An electronic book is a book-length publication in digital form, consisting of text, images, or both, readable on
computers or other electronic devices. Although sometimes defined as "an electronic version of a printed book",
many e-books exist without any printed equivalent. Commercially produced and sold e-books are usually intended
to be read on dedicated e-book readers, however, almost any sophisticated electronic device that features a
controllable viewing screen, including computers, many mobile phones, and all smart phones can also be used to
read e-books. There was a revolution when Gutenberg invented press which result knowledge made available to
everybody. A similar revolution has been brought about with eBook which has resulted in knowledge explosion.
Most of the eBooks are in .pdf format. Research papers are mostly published in digital format nowadays. Also
magazines like The Economists publish in their digital formats. The following graph shows the usage of eBooks
from 2002 to 2010.
Open Online Educational Courses
Massive open online course (MOOC) is the new trend in the open online educational courses. A massive open
online course (MOOC) is an online course aimed at unlimited participation and open access via the web. In
addition to traditional course materials such as videos, readings and problem sets, MOOCs provide interactive user
forums that help build a community for the students, professors, and teaching assistants (TAs).
The advantages of MOOCs are as follows:
1. Appropriate for any setting that has connectivity (Web or Wi-Fi)
2. Any language or multiple languages
3. Any online tools
4. Escape time zones and physical boundaries
5. Produce and deliver in short timeframe (e.g. for relief aid)
6. Contextualized content can be shared by all
7. Informal setting
8. Peer-to-peer contact can trigger serendipitous learning
9. Easier to cross disciplines and institutional barriers
10. Lower barriers to student entry
11. Enhance personal learning environment and/or network by participating
12. Improve lifelong learning skills
Impact on Government
Governments can become closer to its people through the use of information technology and communications,
thereby increasing efficiency and helping to make their lives better. Further, governments in poorer countries can
bridge the gap between the global environment, the government employees, and their citizens. Having access to
information allows these governments to lay foundations for policies and make commitments to improve
conditions. There are many areas where there have been significant changes. Some of them are discussed in detail
below:
Electronic Voting System
Electronic Voting Machines ("EVM") are being used in Indian General and State Elections from 1999 elections and
in total since 2004 elections. The EVMs reduce the time in both casting a vote and declaring the results compared
to the old paper ballot system. Indian voting machines use a two-piece system with a balloting unit presenting the
voter with a button (momentary switch) for each choice connected by a cable to an electronic ballot box.
The main benefits of EVM are as follows:
1. The cost per EVM (One Control Unit, one Balloting Unit and one battery) was Rs.5,500/- at the time the
machines were purchased in 198990. Even though the initial investment was somewhat heavy, it was more than
neutralised by the savings in the matter of production and printing of ballot papers in lakhs, their transportation,
storage etc., and the substantial reduction in the counting staff and the remuneration paid to them.
2. It will be easier to transport the EVMs compared to ballot boxes as EVMs are lighter, portable and come with
polypropylene carrying cases.
3. The vote-counting is very fast and the result can be declared within 2 to 3 hours as compared to 3040 hours, on
an average, under the ballot-paper system.
4.In countries like India, where illiteracy is still a factor, illiterate people find EVMs easier than ballot paper system,
where one has to put the voting stamp on the symbol of the candidate of his/her choice, fold it first vertically and
then horizontally, and put it into the ballot box. In EVMs, the voter has to simply press the blue button against the
candidate and symbol of his choice and the vote is recorded.
5. Bogus voting can be greatly reduced by the use of EVMs. In case of ballot paper system, a bogus voter can stuff
thousands of bogus ballot papers inside the ballot box. But, an EVM is programmed to record only five votes in a
minute. This will frustrate the bogus voters. Further, the maximum number of votes that can be cast in a single
EVM is 3840.
6. Invalid votes can be reduced by use of EVMs. With EVMs, there are much less incidences of invalid votes, i. e.
less than 0.02%. When ballot system was used in India, the number of invalid votes was allegedly more than the
winning margin between the candidates in every general election.
Computerisation/ e-governance of Government departments
E-Governance in India has steadily evolved from computerization of Government Departments to initiatives that
encapsulate the finer points of Governance, such as citizen centricity, service orientation and transparency.
Lessons from previous e-Governance initiatives have played an important role in shaping the progressive e-
Governance strategy of the country. Due cognizance has been taken of the notion that to speed up e-Governance
implementation across the various arms of Government at National, State, and Local levels, a programme
approach needs to be adopted, guided by common vision and strategy. This approach has the potential of enabling
huge savings in costs through sharing of core and support infrastructure, enabling interoperability through
standards, and of presenting a seamless view of Government to citizens.
Due to computerisation a large amount of files have been converted into digital form, thus saving a lot of time and
energy of the employees. Processing delay has drastically reduced due to the easy availability of data.
Impact of IT on News/Media
Over the years, there had been many fluctuations in the newspaper industry in terms of circulation among readers
that simultaneously affected the overall business relations in the industry. Previously, newspapers had been used
for the purpose of communication between the writer, reporters, readers and rest of the societies. With the
advancement of technology, multiple media were used for the purpose of transference of information. Journalism,
in particular, was associated with limited functions and resources (Meyer, 2009). Different technologies were also
introduced in the newspaper industry, one of them being the web 2.0 phenomenon, which was welcomed by the
people. Such an inclusion worked against the circulation and readership of newspapers

Quick Information
Television, radio and the Internet increase an overall awareness of the masses.
Enhance the general knowledge by providing us with information from all over the world.
The speed that technology has achieved is helpful in times of crisis when media is to be used for reporting
news needing immediate attention.


Impact of IT on social networking

Technology runs in the veins of society. It is the fuel that drives our lives. It is an integral part of daily life. It has
definitely benefited society. It has brought luxury in the life of every common man. Automation brought about by
technology has saved human effort and time to a large extent. It has brought distant places closer and simplified
information access. It has made the world a smaller place to live in.
Social Life
Maintain and strengthen familial relationships.
Helps to communicate more effectively with others and become more socially adept.
Reducing communication barriers.
Free calling and messaging applications.
Free video calls at any place.

Easy Shopping
The way we shop has been greatly influenced by the web
With Sites like flipkart, ebay & amazon it makes bargain shopping very easy and convenient.
With a few clicks anyone can find whatever it is that are looking for.
Great deals and offers on shopping.
Negative effects of IT on society

Social isolation
Social isolation is characterized by a lack of contact with other people in normal daily livingin the workplace, with
friends, and in social activities. Technology has a large impact on social interaction. Because of technology such as,
cell phones, internet, and gaming systems, people are less likely to interact with people face to face. The younger
generation who spend every spare minute on a game system or online, are losing the ability to socially interact
with others outside in the real world. Data shows that those who use the Internet frequently spend over 100
minutes less time with friends and family than non-Internet users. Technology is a negative influence on us
because it separates individuals from reality. The iPod is one example; by putting in your earbuds and immersing
yourself in music while in public, you are disconnecting yourself from the real world.
Dependency Issues
Teaching kids how to use technology at such a young age can lead to dependency issues. It would be considered
big challenge for people to try to get by one day without technology such as a cell phone. An example of how we
are very dependent on technology is if you were to ask teens now a simple math question a majority of them
would have to refer to a calculator to answer the question simply because they have always relied on technology.
Many kids depend on spell check to correct their mistake . This doesnt have the same learning affect that getting
a dictionary and looking up the word would have on the person.

Aggression
If children are exposed to violence on Tv and in video games, they pick up on those actions, and are likely to act
more aggressively towards others. Watching violence on TV makes people think that it is okay and normal to be
violent towards others. Younger children are still developing their cognitive capacity to differentiate between
fantasy and reality. Therefore, preschool and school-age children are more sensitive to the effects of media
violence than adolescents, according to the Media Awareness Network.(Donner, 2011) .This is why children are
more likely to have violent behaviour because they are unaware that the behaviour is not acceptable in our
society. Teenagers are are more likely to view media violence as fictional action meant to entertain. (Donner,
2011)
Lack of Exercise:
Children are also becoming more obese because they arent getting the daily exercise they need. Studies have also
shown that Daily overuse of media and technology has a negative effect on the health of all children, preteens
and teenagers by making them more prone to anxiety, depression, and other psychological disorders, as well as by
making them more susceptible to future health problems. (DR. Rosen, August 6, 2011). When it comes to children
who play video games, these children are likely to increase their snacking and food intake, and are also more
prone to make unhealthy food choices. (Live Strong, 2012). With unhealthy food choices and the lack of exercise
children are gaining more weight. Lack of physical activity found to be the most significant factor in contributing to
childhood obesity.
Harming Communication Skills:
We have become a society that is completely dependent on our technology to communicate. It is almost
impossible for us to maintain our work life and social life without using some sort of modern-day technology to
communicate ideas.
Of course this use of technology can be good it provides us with faster and more efficient ways to communicate
with others, but it is also harming our ability to communicate with people face-to-face, and sometimes, it impacts
our ability to write properly. First and foremost, technological communication may be affecting our ability to
express our ideas clearly. When you are constantly using abbreviations and slang in texts and online chats, it is
hard to remember to use proper grammar when writing formal emails, letters or papers. Technology can also
harm our communication skills at work and in school. It may be degrading our ability to speak publicly and write
formally. Think of how many professors or bosses have probably received a "cuz," "l8ter" or "cya" in an
email. Technology can also harm our ability to deal with conflict. These days, when you have a problem with
someone, you can just send them an email or Facebook message, rather than confront them face-to-face and tell
them what's wrong. Many people in society are beginning to take the easy way out when it comes to conflict.
Finally, technology can damage our personal relationships. When we spend so much time on our computers and
phones, we lose real connection with others. According to atechnologysociety.com, "we make calls on our mobiles
and together send literally billions of text messages every year. We take the availability of others and ourselves
for granted." Instead of having a pleasant conversation with our family, friends or significant others, we are
gluing our eyes to our computer screens. Sure technology has its benefits, but we need to take a step back and
realize what it is doing to our skills and relationships. Internet users spend an average of 17 hours a week online.
Technology can also harm our communication skills at work and in school. It may be degrading our ability to speak
publicly and write formally. Technology can also harm our ability to deal with conflict. These days, when you have
a problem with someone, you can just send them an email or Facebook message, rather than confront them face-
to-face and tell them what's wrong. Many people in society are beginning to take the easy way out when it comes
to conflict. Finally, technology can damage our personal relationships. When we spend so much time on our
computers and phones, we lose real connection with others (northern-iowan, 2010)
Unemployment:
Most of us assume that at some point the economy is going to kick into gear. That unemployment will eventually
drop below 6 percent, and that job creation will return to its previous clip of 200,000 a month. But what if we're
stuck at a new normal of high unemployment and low job growth? It's possible because technology might just
have gotten the best of us. It used to be that new technologies generated lots of new jobs for those displaced from
old ones. After farms were mechanized, Americans moved to factories. After manufacturing declined -- in part due
to technologies that dramatically cut the cost of shipping goods -- we moved into services. But new technologies
have been eating away at services, too. Gas station attendants are long gone and telephone operators and bank
tellers aren't far behind. Endangered too are office clerks and secretaries, publishing jobs, and people providing
any expertise or information that can now be digitized into a computer. We still have plenty of jobs in retail sales,
education, and health care -- but these are also among the least efficient parts of our economy and pressure is
building to cut costs. Here again, technology is leading the way. In the next decade, it seems likely that many retail
sales workers will be being replaced by online sales. We're about to see a wave of online courses and classrooms --
supplanting some teachers. Health care has to become more efficient. So patients will carry their own medical files
on memory sticks. We'll also have personal health apps, allowing us to self-diagnose -- even measuring our own
blood pressure and other vital signs. All this is good for us as consumers -- but as workers we're putting ourselves
out of business. At this rate, 50 years from now, a tiny machine may satisfy all our needs. Call it the "iEverything."
The only problem: none of us will be able to afford it because we'll all be unemployed. With the coming of IT a lot
of lower and middle level jobs h done away. Manual business functions have been automated with. For example in
photography industry previously there was a lot of dependency on several parties. Now with the use of
information technology, one can do all of above jobs.
Privacy:
In an interview with TechCrunch last year, Facebook CEO Mark Zuckerberg said sharing private information online
with the faceless masses had become a "social norm."
Interpretation: Privacy is a has-been luxury, a relic of a bygone, unwired era. Today, oversharing has become
typical of online social networking, with people publicizing real-time information of where they are (Foursquare,
Gowalla) and what they're doing (Twitter, Facebook). "It may be that social norms just haven't completely
developed yet, but we end up revealing so much more than we likely would have without the Internet, and we
reveal it to a much wider range of people," Lorrie Cranor, director of the CyLab Usable Privacy and Security
Laboratory at Carnegie Mellon University. Whether we're constantly updating our Facebooks and flickrs or not, we
still leave behind a virtual breadcrumb trail anytime we hop online, thanks to data tracking software, cookies and
web bugs that log what we search for, where we land and what we do once we get there. "In a commercial setting,
it used to be that if you go into a store, the store knows what you bought, and if you buy with credit cards they can
tie it to your name, and if you pay cash they may not even know who you are," Cranor said. "But they didn't know
all the things you took off the shelf, manipulated, put back on the shelf, thought about. On the Internet, they all
have that." Information technology may have made communication quicker, easier it has also brought along
privacy issues. People are now worried about their once private information becoming public. Instances of
blackmailing other people by interfering in their personnel space have also increased.
Lack Of Job Security:
Robots, automation, and software can replace people might seem obvious to anyone whos worked in automotive
manufacturing or as a travel agent. But Brynjolfsson and McAfees claim is more troubling and controversial. They
believe that rapid technological change has been destroying jobs faster than it is creating them, contributing to the
stagnation of median income and the growth of inequality in the United States. And, they suspect, something
similar is happening in other technologically advanced countries.
Perhaps the most damning piece of evidence, according to Brynjolfsson, is a chart that only an economist could
love. In economics, productivitythe amount of economic value created for a given unit of input, such as an hour
of laboris a crucial indicator of growth and wealth creation. It is a measure of progress. On the chart Brynjolfsson
likes to show, separate lines represent productivity and total employment in the United States. For years after
World War II, the two lines closely tracked each other, with increases in jobs corresponding to increases in
productivity. The pattern is clear: as businesses generated more value from their workers, the country as a whole
became richer, which fueled more economic activity and created even more jobs. Then, beginning in 2000, the
lines diverge; productivity continues to rise robustly, but employment suddenly wilts. By 2011, a significant gap
appears between the two lines, showing economic growth with no parallel increase in job creation. Brynjolfsson
and McAfee call it the great decoupling. And Brynjolfsson says he is confident that technology is behind both the
healthy growth in productivity and the weak growth in jobs.
Its a startling assertion because it threatens the faith that many economists place in technological progress.
Brynjolfsson and McAfee still believe that technology boosts productivity and makes societies wealthier, but they
think that it can also have a dark side: technological progress is eliminating the need for many types of jobs and
leaving the typical worker worse off than before. Brynjolfsson can point to a second chart indicating that median
income is failing to rise even as the gross domestic product soars. Its the great paradox of our era, he says.
Productivity is at record levels, innovation has never been faster, and yet at the same time, we have a falling
median income and we have fewer jobs. People are falling behind because technology is advancing so fast and our
skills and organizations arent keeping up.
Since the technology is changing one has to keep learning or updating his/her knowledge or else the job he/she is
doing will be not secure. For example: For the sake of development in the technology of oracle many software
engineers have lost their jobs in some parts of the world
Health Effects:
Radioactive waves from IT equipment are damaging the health conditions of people. Different types of unhealthy
conditions are begetting from various advanced technical equipment. For example regular and continuous viewing
of computers badly affects eyes, brain and other parts of the body.


Addiction:
The Internet has become a basic tool for trading, entertainment, communication, as well as education in the
contemporary world. Nevertheless, despite the high speed of information flow and potential educational value of
the Internet, there are several attributes of the Internet which may foster addictive behaviour. These attributes
include easy and flexible access 24 hours a day; anonymity; provision of free, diversified, and unlimited number of
social networks without geographical boundaries; greater control over one's self-presentation; and provision of
numerous opportunities to fulfil the need for belongingness as well as to escape from emotional difficulties,
problematic situations, and personal hardships.
Internet addiction commonly refers to an individual's inability to control his or her use of the Internet (including
any online-related, compulsive behaviour) which eventually causes one's marked distress and functional
impairment in daily life. Research findings have shown that excessive use of Internet or Internet addiction
adversely affects one's physical health, family life, and academic performance. Concerning the negative
consequences of Internet addiction on one's physical health, persistence of sleep deprivation may harm one's
immune system, thus increasing one's vulnerability to assorted diseases. The lack of exercise due to excessive use
of computer by maintaining a sitting posture may also risk suffering from carpal tunnel syndrome, back pain, and
eyestrain. Concerning family problems caused by Internet addiction, family relationships are seriously disrupted by
Internet addicts due to the decrease in time spending with family, reluctance of performing family duties such as
doing household chores, and increase of conflicts with family in the negotiation for time spent on the
Internet. Academic problems caused by Internet addiction include decline in study habits, significant drop in
grades, missing classes, increased risk of being placed on academic probation, and poor integration in
extracurricular activities. Besides, adolescent Internet addicts often suffer from severe psychological distress, such
as depression; anxiety; compulsivity; feeling of self-effacement; fear that life without Internet would be boring,
empty, and joyless; as well as feeling of loneliness and social isolation. In addition, people addicted to the Internet
games may excessively imitate the behaviours and values of the characters in online games.
In view of the possible negative influence of Internet addiction on human development, there is a need to have a
thorough understanding of the nature of Internet addiction. There are several sections in this chapter. First, a
historical review of Internet addiction is presented. Second, the conceptualization and assessment of Internet
addiction are discussed. Third, prevalence data of Internet addiction are described. Fourth, major theoretical
accounts of Internet addiction are presented. Fifth, risk factors and protective factors related to Internet addiction
are discussed. Sixth, intervention models of Internet addiction are outlined. Finally, the future research directions
are examined.
User withdraws from friends and family as he spends more and more time on the computer. Relationships begin to
wither as the user stops attending social gatherings, skips meetings with friends and avoids family members to get
more computer time. User gradually withdraws into an artificial world.

2) Discuss in detail the impact of IT on environment along with its merits and demerits.

The positive impacts of IT on environment

1) Remote Sensing
Remote sensing is defined as the technique of obtaining information about objects through the analysis of
data collected by special instruments that are not in physical contact with the objects of investigation.
Collection of information about an object without coming into physical contact.
The information needs a physical carrier to travel from the objects/events to the sensors through an
intervening medium.
The electromagnetic radiation is normally used as an information carrier in remote sensing.
The output of a remote sensing system is usually an image representing the scene being observed.
Active Remote Sensors
These provide their own energy source for illumination. The sensor emits radiation which is
directed toward the target to be investigated. The radiation reflected from that target is detected and measured
by the sensor.
Examples:
LIDAR (Light Detection And Ranging)
RADAR (Radio Detection And Ranging)
Passive Remote Sensors
Remote sensing systems which measure energy that is naturally available are called passive
sensors.
Examples:
Passive microwave radiometer that detects naturally emitted microwave energy.
Radiometers that measure reflected (or backscattered) sun light from the atmosphere
and ocean.

PLATFORMS USED FOR REMOTE SENSING
Ground-based platforms: ground, vehicles and/or towers up to 50 m
Airborne platforms: airplanes, helicopters, high-altitude aircrafts, balloons up to 50 km
Space borne: rockets, satellites, shuttle => from about 100 km to 36000 km
Space shuttle: 250-300 km
Space station: 300-400 km
Low-level satellites: 700-1500 km
High-level satellites: about 36000 km
APPLICATIONS OF REMOTE SENSING
Meteorology
Profiling of atmospheric temp. and water vapor
Measuring wind velocity
Oceanography
Measurements of sea surface temperature
Mapping ocean currents
Glaciology
Mapping motion of sea ice and ice sheets
Determining the navigability of the sea
Geology
Identification of rock types
Location of geological faults and anomalies
Agriculture
Monitoring the extend and type of vegetation
Mapping soil types
Hydrology
Assessing water resources
Forecasting melt water run-off from snow
Disaster control
Warning of sand and dust storms, flooding
Monitoring of pollution

2) Google Earth
Google Earth is a virtual globe, map and geographical information program that was originally called
EarthViewer 3D, and was created by Keyhole, Inc, a company acquired by Google in 2004. It maps the
Earth by the superimposition of images obtained from satellite imagery, aerial photography and GIS 3D
globe.
Google Earth is an online mapping and geographic research program that uses satellite images and aerial
photography.
In India, Google Earth has been used for flood relief in Gujarat.
It helps visualise the impacts of climate change on a 3D map of the world.
Google Earth as a demographic tool. It can be used to identify and describe the demographics in any
particular region.
It can be used to study the natural habitat or vegetation in an area and identify regions of deforestation or
areas with minimal green cover where action needs to be taken.
3) ENVIS
In order to develop the databases on environment and its related parameters and to make it online to the Ministry
for to and fro information flow, a web enabled software, namely, Indian State Level Basic Environmental
Information Database (ISBEID) was developed by ENVIS in collaboration with National Informatics Centre (NIC).
The objective for development of this software is to cover the gap in environmental data dissemination with
regard to vast parameters such as air pollution, water pollution, forestry, land resources, flora and fauna, etc. In
total there are 17 modules. Initially, the database consisting of 23 modules in various environmental fields was
tested on pilot basis by Eight States with 12 modules in two phases. During the two phase of the programme, it
was observed that there were some practical problems in collecting the data and filling the database software.
After deliberations, it was decided that the existing 23 modules will be revisited and revised in consultation with all
the States / UTs ENVIS Centres and to extend the ISBEID project for all the States / UTs.

Realising the importance of Environmental Information, the Government of India, in December, 1982,
established an Environmental Information System (ENVIS) as a plan programme. The focus of ENVIS since
inception has been on providing environmental information to decision makers, policy planners, scientists
and engineers, research workers, etc. all over the country. Since environment is a broad-ranging, multi-
disciplinary subject, a comprehensive information system on environment would necessarily involve
effective participation of concerned institutions/ organisations in the country that are actively engaged in
work relating to different subject areas of environment. ENVIS has, therefore, developed itself with a
network of such participating institutions/organisations for the programme to be meaningful. A large
number of nodes, known as ENVIS Centres, have been established in the network to cover the broad
subject areas of environment with a Focal Point in the Ministry of Environment & Forests. Both the Focal
Point as well as the ENVIS Centres have been assigned various responsibilities to achieve the Long-term &
Short-term objectives. For this purpose, various services has been introduced by the Focal Point. ENVIS
due to its comprehensive network has been designed as the National Focal Point (NFP) for INFOTERRA, a
global environmental information network of the United Nations Environment Programme (UNEP). In
order to strengthen the information activities of the NFP, ENVIS was designated as the Regional Service
Centre (RSC) of INFOTERRA of UNEP in 1985 for the South Asia Sub-Region countries. It stands for
Environmental Information System.
It assists the Decision/Policy Makers to take decisions based on the inputs received from the ENVIS
databases with respect to any region.
4) IT Decreases Consumption
In just over three years (the 37 months from July 4, 2006 to August 4, 2009) more than 200 million free
ebooks were downloaded. Had these 200 million books been made of paper, how many trees would have
been saved? Lets do some math. In the USA in one year, 2 billion books are produced. To get the paper
for these books requires consuming 32 million trees. We can estimate that one tree yields enough paper
for 62.5 books.
It helps eliminate the entire Manufacturing Process of physical books
Emails have helped Reduces mailing process and manual efforts.
5) IT Decreases Transportation
Automation of work enables people to work from home. This eliminates the need to travel to work and
reduced pollution via transportation.
Online Classrooms and distance learning are another aspect of reducing transportation and pollution
emanating from it.
Reduction in CO
2
Levels
6) Health Information Technology
An analysis found that use of health IT:
Avoided the use of 1,044 tons of paper for medical charts annually
Eliminated up to 92,000 tons of carbon dioxide emissions by replacing face-to-face patient visits (and the
associated travel) with virtual visits
Avoided 7,000 tons of carbon dioxide emissions by filling prescriptions online
Reduced the use of toxic chemicals, such as silver nitrate and hydroquinone, by 33.3 tons by digitizing and
archiving X-ray images and other scans
Resulted in a positive net effect on the environment despite increased energy use and additional waste
from the use of personal computers
The health care industry is burdened by high energy use, high water use and a unique toxic profile. Health care-
related activities account for 8 percent of total U.S. greenhouse gases and 7 percent of total carbon dioxide
emissions
HIT Benefits
Medical Charts
Virtual Visits
Online Prescriptions
Digitizing X-Ray Images
Negative effects of IT on environment

Phantom power : The use of energy to keep electronic devices such as PCs, servers, network printers, and
photocopiers operating in standby mode.
Myth : If you shut off your computer, it uses more energy every time you start it up. The fact is and a lot
of them consume the same amount of energy' as they do in fully operational mode.
Information technologys Best Friend :
Air conditioning unit. $56 billion was spent globally onservers for data centres 2007, S29 billion was spent
on power to operate and cool this facilities. A dozen computers will need 1T of air conditioning just to
remove the heat they generate.
The information technology equipment can tolerate a considerable range of temperature and humidity.
If the air conditioning system fails or malfunctions, the computer will be able to operate until it reaches its
specified limits.
Environmental criteria Computer room limits Office space air conditioned Office space not air
conditioned
Temperature 16 to 32 degrees C (60.8 to
89.6 degrees F)
16 to 32 degrees C (60.8 to
89.6degrees F)
10.0 to 40.6 degrees C (50 to
105.08 degrees F)
Relative humidity 20 to 80 percent 8 to 80 percent 8 to 80 percent

All computers, office IT equipment, servers, mobile and fixed telephony etc, the report suggests that the
combined contribution is 2% of global CO2 emissions about the same as the airline industry.
Some practical measures detailed within the article to help reduce this include:
Become aware of and start measuring power consumption of your IT devices
To use fewer servers and printers by increasing utilization virtualizing servers
To stop over-provisioning plan capacity requirements more efficiently
Improve the efficiency of cooling wasting energy with servers overheating, then wasting this energy by
cooling with expensive and high energy air conditioning
To use the power management features on devices, and to turn power off when devices are not in use
Extend the life of hardware assets by re-using within the business, or to pass on to be used outside of the
business after use
Ensure and validate the correct disposition of all electrical equipment ensuring no energy is being wasted
un-necessarily
Become aware of and analyze all waste

Calculation of CO2 footprint of JBIMS student individually & as a Batch(120 students)

1 Laptop when used for 24hrs consumes 700 watt , 1 Desktop when used for 24hrs consumes 2800 watt
1kwh = .9 co2 kg
No of hrs /day usage of Electricity Energy Co2 footprint in a year
laptop Consumed in a year
Individual 6 200 KWH 177 kg of CO2 released
Batch 2015 (120 students) 6 23652 KWH 21286 kg of CO2 released


E waste
There is no generally accepted definition of e-waste. Most favoured todays devices can become obsolete
tomorrow. Unwanted, obsolete or unusable electronic products such as computers, computer peripherals,
televisions, VCRs, DVD Players, stereo equipment, hand cell phones are commonly referred to as electronic
waste. Management and disposal of e-waste has become a serious problem among states nationwide. It is mainly
because the problem of electronic waste (e-waste) is growing at an unsustainable rate. E-waste is now the fastest
growing, and most toxic component of municipal garbage. Local governments are facing huge costs to handle e-
waste, and even greater costs if they do not capture this toxic stream and handle it in an appropriate manner. A
study by the USA showed that 1-2% of municipal waste is made up of e-waste. A further research estimates the
growing of e-waste at 3 times the rate of other waste streams. It is also estimated that between 2012 and 2017,
500 million computers and devices would become obsolete.

Lead is a toxic substance which may cause lead poisoning and can be especially harmful young children. A typical
17-inch computer monitor contains approximately 2.2 pounds of lead. The 500 million computers that will become
obsolete between 2012 and 2017 will contain nearly 1.6 billion pounds of lead.
It is important that we create a national framework for the environmentally sound management of e-waste
including wide public awareness and education. Companies should conduct detailed inventories of e-waste.
Companies manufacturing electronic products should initiate pilot schemes on collection and sorting of e-wastes,
including take back schemes and schemes for repair refurbishment and recycling.
What is e-waste? What are its harmful effects? What are the ways to curb it?

Definition:
"Electronic waste" may be defined as discarded computers, office electronic equipment, entertainment device
electronics, mobile phones, television sets and refrigerators. This definition includes use electronic which are
destined for reuse, resale, salvage, recycling, or disposal. Others define the re-usables (working and repairable
electronics) and secondary scrap (copper, steel, plastic, etc.) to be "commodities", and reserve the term "waste"
for residue or material which is dumped by the buyer rather than recycled, including residue from reuse and
recycling operations. Because loads of surplus electronics are frequently commingled (good, recyclable, and non-
recyclable), several public policy advocates apply the term "e-waste" broadly to all surplus electronics. Cathode ray
tubes (CRTs) are considered one of the hardest types to recycle.
Display units (CRT, LCD, LED monitors), Processors (CPU, GPU, or APU chips), memory (DRAM or SRAM), and audio
components have different useful lives. Processors are most frequently out-dated (by software no longer being
optimized) and are more likely to become "e-waste", while display units are most often replaced while working
without repair attempts, due to changes in wealthy nation appetites for new display technology.
Debate continues over the distinction between "commodity" and "waste" electronics definitions. Some exporters
are accused of deliberately leaving difficult-to-recycle, obsolete, or non-repairable equipment mixed in loads of
working equipment (though this may also come through ignorance, or to avoid more costly treatment processes).
Protectionists may broaden the definition of "waste" electronics in order to protect domestic markets from
working secondary equipment.
Harmful Effects
1.Environmental Impact of Electronic Waste
The processes of dismantling and disposing of electronic waste in the third world lead to a number of
environmental impacts as illustrated in the graphic. Liquid and atmospheric releases end up in bodies of water,
groundwater, soil and air and therefore in land and sea animals both domesticated and wild, in crops eaten by
both animals and human, and in drinking water.
One study of environmental effects in Guiya, China found the following:
Airborne dioxins one type found at 100 times levels previously measured
Levels of carcinogens in duck ponds and rice paddies exceeded international standards for agricultural areas and
cadmium, copper, nickel, and lead levels in rice paddies were above international standards
Heavy metals found in road dust lead over 300 times that of a control villages road dust and copper over 100
times
People are beginning to discuss the serious aspects of this pollution in terms of bioaccumulation and
biomagnification. Bioaccumulation occurs when people, plants and animals build up levels of toxic substances in
their bodies faster than they can get rid of them. Biomagnification occurs when toxin levels accumulate within the
food chain. For example, plankton might absorb low levels of mercury. Then fish that eat large amounts of
plankton ingest an even larger, unhealthier dose. The problem continues as birds or humans eat the mercury-
tainted fish.
Researchers in the Dartmouth Toxic Metals Research Program have compiled a list of the effects that some of
these toxins take on the human body. Keep in mind this is not an exhaustive list of all the suspected health effects
of these metals. Also, this list mentions only some of the chemicals and compounds used in household products.
Arsenic may disrupt cell communication and interfere with the triggers that cause cells to grow, possibly
contributing to cardiovascular disease, cancer and diabetes if someone is exposed in chronic, low doses.
Cadmium affects your body's ability to metabolize calcium, leading to bone pain and severely weakened, fragile
bones.
Chromium can cause skin irritation and rashes and is potentially carcinogenic.
Copper can irritate the throat and lungs and affect the liver, kidneys and other body systems.
Lead poisoning can cause a whole slew of health problems including the impairment of cognitive and verbal
activity. Eventually, lead exposure can cause paralysis, coma and death.
Nickel is carcinogenic in large doses.
Silver probably won't hurt you, but handle it too frequently and you might come down with a case of argyria -- a
condition that permanently stains your skin a blue-gray shade.
2. Information security
E-waste presents a potential security threat to individuals and exporting countries. Hard drives that are not
properly erased before the computer is disposed of can be reopened, exposing sensitive information. Credit card
numbers, private financial data, account information and records of online transactions can be accessed by most
willing individuals. Organized criminals in Ghana commonly search the drives for information to use in local scams.
Government contracts have been discovered on hard drives found in Agbogbloshie. Multi-million dollar
agreements from United States security institutions such as the Defense Intelligence Agency (DIA), the
Transportation Security Administration and Homeland Security have all resurfaced in Agbogbloshie. ways to curb
The mantra of " Reduce, Reuse, Recycle " applies here.
Reduce your generation of e-waste through smart procurement and good maintenance.
Reuse still functioning electronic equipment by donating or selling it to someone who can still use it.
Recycle those products that cannot be repaired. there is a need to find an organization that will manage your
electronics for recycling, processing of e-waste
In many developed countries, electronic waste processing usually first involves dismantling the equipment into
various parts (metal frames, power supplies, circuit boards, plastics), often by hand, but increasingly by automated
shredding equipment. A typical example is the NADIN electronic waste processing plant in Novi Iskar, Bulgaria
the largest facility of its kind in Eastern Europe.[53][54] The advantages of this process are the human's ability to
recognize and save working and repairable parts, including chips, transistors, RAM, etc. The disadvantage is that
the labour is cheapest in countries with the lowest health and safety standards.

Você também pode gostar