Escolar Documentos
Profissional Documentos
Cultura Documentos
Inheritance
Polymorphism
Data Hiding
Encapsulation
Overloading
Reusability
Let us see a brief overview of these important features of Object Oriented programming
But before that it is important to know some new terminologies used in Object Oriented programming
namely
Objects
Classes
Objects:
In other words object is an instance of a class.
Classes:
These contain data and functions bundled together under a unit. In other words class is a collection of
similar objects. When we define a class it just creates template or Skelton. So no memory is created
when class is created. Memory is occupied only by object.
Example:
Class classname
{
Data
Functions
};
main ( )
{
classname objectname1, objectname 2,..;
}
In other words classes acts as data types for objects.
Member functions:
The functions defined inside the class as above are called member functions.
Here the concept of Data Hiding figures
Data Hiding:
This concept is the main heart of an Object oriented programming. The data is hidden inside the class by
declaring it as private inside the class. When data or functions are defined as private it can be accessed
only by the class in which it is defined. When data or functions are defined as public then it can be
accessed anywhere outside the class. Object Oriented programming gives importance to protecting data
which in any system. This is done by declaring data as private and making it accessible only to the class
in which it is defined. This concept is called data hiding. But one can keep member functions as public.
Example:
Class classname
{
private:
datatype data;
public:
Member functions
};
main ( )
{
classname objectname1,objectname2,..;
}
Encapsulation:
The technical term for combining data and functions together as a bundle is encapsulation.
Inheritance:
Inheritance as the name suggests is the concept of inheriting or deriving properties of an exiting class to
get new class or classes. In other words we may have common features or characteristics that may be
needed by number of classes. So those features can be placed in a common tree class called base class
and the other classes which have these characteristics can take the tree class and define only the new
things that they have on their own in their classes. These classes are called derived class. The main
advantage of using this concept of inheritance in Object oriented programming is it helps in reducing the
code size since the common characteristic is placed separately called as base class and it is just referred
in the derived class. This provide the users the important usage of terminology called as reusability
Reusability:
This usage is achieved by the above explained terminology called as inheritance. Reusability is nothing
but re- usage of structure without changing the existing one but adding new features or characteristics to
it. It is very much needed for any programmers in different situations. Reusability gives the following
advantages to users
It helps in reducing the code size since classes can be just derived from existing one and one need to add
only the new features and it helps users to save their time.
For instance if there is a class defined to draw different graphical figures say there is a user who want to
draw graphical figure and also add the features of adding color to the graphical figure. In this scenario
instead of defining a class to draw a graphical figure and coloring it what the user can do is make use of
the existing class for drawing graphical figure by deriving the class and add new feature to the derived
class namely add the feature of adding colors to the graphical figure.
Examples of popular modern operating systems for personal computers are Microsoft
Windows, Mac OS X, and GNU/Linux.
operating system. While there are hundreds of operating systems available, the most popular by far are
the Microsoft Windows family of operating systems, the Macintosh operating system, and the Unix family
of operating systems.
There are four general types of operating systems. Their use depends on the type of computer and the
type of applications that will be run on those computers.
1. Real-time operating systems (RTOS) are used to control machinery, scientific instruments, and
industrial systems. In general, the user does not have much control over the functions performed
by the RTOS.
2. Single-user, single task operating systems allow one user to do one thing at a time. And example
of a single-user, single task operating system is the operating system used by personal digital
assistants (PDAs), also known as handheld computers.
3. Single-user, multi-tasking operating systems allow a single user to simultaneously run multiple
applications on their computer. This is the type of operating system found on most personal
desktop and laptop computers. The Windows (Microsoft) and Macintosh (Apple) platforms are the
most popular single-user, multi-tasking operating systems.
4. Multi-user operating systems allow multiple users to simultaneously use the resources on a single
computer. Unix is an example of a multi-user operating system.
major retail outlets and small artisans and traders. Business-to-business and financial services on the
Internet affect supply chains across entire industries.
B. Intranet: An intranet is a private computer network that uses Internet Protocol technologies to
securely share any part of an organization's information or network operating system within that
organization. The term is used in contrast to internet, a network between organizations, and instead
refers to a network within an organization. Sometimes the term refers only to the organization's
internal website, but may be a more extensive part of the organization's information technology
infrastructure. It may host multiple private websites and constitute an important component and focal
point of internal communication and collaboration.
C. Extranet: An extranet is a private network that uses Internet protocols, network connectivity. An
extranet can be viewed as part of a company's intranet that is extended to users outside the
company, usually via the Internet. It has also been described as a "state of mind" in which the Internet
is perceived as a way to do business with a selected set of other companies (business-to-business,
B2B), in isolation from all other Internet users. In contrast, business-to-consumer (B2C) models
involve known servers of one or more companies, communicating with previously unknown consumer
users.
Q.5 What is E-commerce? Discuss the framework of E-commerce.
Electronic commerce, commonly known as e-commerce or eCommerce, or e-business consists of the
buying and selling of products or services over electronic systems such as the Internet and
other computer networks. The amount of trade conducted electronically has grown extraordinarily with
widespread Internet usage. The use of commerce is conducted in this way, spurring and drawing on
innovations in electronic funds transfer, supply chain management, Internet marketing, online transaction
processing, electronic data interchange (EDI), inventory management systems, and automated data
collection systems. Modern electronic commerce typically uses the World Wide Web at least at some
point in the transaction's lifecycle, although it can encompass a wider range of technologies such as email as well.
A large percentage of electronic commerce is conducted entirely electronically for virtual items such as
access to premium content on a website, but most electronic commerce involves the transportation of
physical items in some way. Online retailers are sometimes known as e-tailers and online retail is
sometimes known as e-tail. Almost all big retailers have electronic commerce presence on the World
Wide Web.
Framework
The vision outlined above for electronic commerce assumes a set of basic infrastructure services and
standards consistent with a broad architectural framework. This framework must permit the flexibility,
interoperability, and openness needed for the successful evolution of electronic commerce over the NII.
This framework, and its services and products, will offer the consumer a diverse set of interoperable
choices, rather than a collection of independent solutions that may not work in concert.
Many of today's ambitious electronic commerce initiatives vary in their approach to security and privacy,
their ability to handle micro payments, and their applicability to various types of transactions. They also
differ in their business models -- for example, in their pricing strategy and in their assumptions as to who
bears the risk in case of insufficient funds or disputes. Such diversity promotes innovation and allows for
provider and consumer choices. Still, to achieve wide acceptance and scale to truly mass markets, a
broad framework is needed, which encompasses the following requirements and idiosyncrasies of
conducting new forms of business in the emerging electronic environment.
Interoperability -- Electronic commerce must be based on a common set of services and standards that
ensure interoperability. Preferably, service providers and application designers will be able to use these
services and standards as building blocks that can be combined, enhanced, and customized.
Maximum flexibility for innovation -- As the NII evolves; it will grow and mature in ways not even
imagined today. As it does so, new services and businesses will emerge. For example, the NII's electronic
marketplace will provide new opportunities for narrow case marketing to very short-lived niche markets.
Existing services and products will be redefined and modified. The electronic commerce framework must
be sufficiently flexible to accommodate all of these changes and be able to address new applications and
requirements as they arise.
Information-intensive products -- A particularly important class of products on the NII are those that are
pure information. These products are actually enabled by information technology, not just distributed more
efficiently by it. Information products include electronic publications, catalogs, videos, and the like, as well
as interactive video games, software programs, electronic tokens, customized design specifications, and
even electronic keys to hotel rooms, cars, storage compartments, and airport boarding gates. Many of
these products will not be simply ``offered'' by a vendor; they will be designed or tailored by a customer.
Customers can, for example, choose their own selection of articles to be bound in an electronic book, or
customize their own clothing designs. This capability adds a customer-driven activity -- a design phase -to the purchase cycle. It is likely that for these products, ordering, billing, payment, and distribution would
be tightly integrated and happen virtually simultaneously.
New revenue collection methods -- Electronic commerce will need to support advanced types of
revenue collection in addition to traditional methods (e.g., payment upon receipt, payment in advance,
etc.). For example, an information product service provider could distribute its product widely and charge
on a usage basis; that is, charge the customer only when the information (be it a software program, digital
document, or electronic key that opens and starts a rental car) is used. One innovative approach that
permits usage accounting and payment is called meterware. It provides local hardware and/or software
to record and bill customers continuously based on their product usage. Meterware, electronic cash and
checks that don't need an online payment processor, and other advanced revenue collection ideas create
opportunities for reaching new customers and for distributing products and services. These methods
make a lot of sense in a low distribution cost environment supported by the electronic commerce
infrastructure.
Legacy systems -- Many "legacy systems" exist in the electronic commerce domain. These include
paper checks, mainframe-based settlement and payment systems, and EDI VANs. None of these legacy
systems will go away overnight: A successful electronic commerce infrastructure must let the user transfer
easily and transparently between these older systems and newer, all-electronic systems, applications,
and processes.
Transaction devices -- Electronic commerce transactions will involve all kinds of legacy and newly
developed devices and media, and networks over which these are delivered. Electronic commerce must
accommodate the technologies and devices needed to reach and sustain the mass market.
A framework developed with all of these needs and considerations in mind will form the strongest basis
for a powerful and useful electronic commerce infrastructure. We next describe the specific activities and
functions this infrastructure must support.
A Database Management System (DBMS) is a set of computer programs that controls the creation,
maintenance, and the use of a database. It allows organizations to place control of database development
in the hands of database administrators (DBAs) and other specialists. A DBMS is a system software
package that helps the use of integrated collection of data records and files known as databases. It allows
different user application programs to easily access the same database. DBMSs may use any of a variety
of database models, such as the network model or relational model. In large systems, a DBMS allows
users and other software to store and retrieve data in a structured way. Instead of having to write
computer programs to extract information, user can ask simple questions in a query language. Thus,
many DBMS packages provide Fourth-generation programming language (4GLs) and other application
development features. It helps to specify the logical organization for a database and access and use the
information within a database. It provides facilities for controlling data access, enforcing data integrity,
managing concurrency, and restoring the database from backups. A DBMS also provides the ability to
logically present database information to users.
Components of DBMS
DBMS Engine accepts logical request from the various other DBMS subsystems, converts them
into physical equivalents, and actually accesses the database and data dictionary as they exist on a
storage device.
Data Definition Subsystem helps user to create and maintain the data dictionary and define the
structure of the files in a database.
Data Manipulation Subsystem helps user to add, change, and delete information in a database
and query it for valuable information. Software tools within the data manipulation subsystem are most
often the primary interface between user and the information contained in a database. It allows user
to specify its logical information requirements.
Application Generation Subsystem contains facilities to help users to develop transactionintensive applications. It usually requires that user perform a detailed series of tasks to process a
transaction. It facilitates easy-to-use data entry screens, programming languages, and interfaces.
Data Administration Subsystem helps users to manage the overall database environment by
providing facilities for backup and recovery, security management, query optimization, concurrency
control, and change management.
2.
Ans 2. Enterprise Resource Planning (ERP) is an integrated computer-based system used to manage
internal and external resources, including tangible assets, financial resources, materials, and human
resources. Its purpose is to facilitate the flow of information between all business functions inside the
boundaries of the organization and manage the connections to outside stakeholders. Built on a
centralized database and normally utilizing a common computing platform, ERP systems consolidate all
business operations into a uniform and enterprise-wide system environment.
An ERP system can either reside on a centralized server or be distributed across modular hardware and
software units that provide "services" and communicate on a local area network. The distributed design
allows a business to assemble modules from different vendors without the need for the placement of
multiple copies of complex and expensive computer systems in areas which will not use their full capacity.
Implementation:
Businesses have a wide scope of applications and processes throughout their functional units; producing
ERP software systems that are typically complex and usually impose significant changes on staff
work practices.[12] Implementing ERP software is typically too complex for "in-house" skill, so it is
desirable and highly advised to hire outside consultants who are professionally trained to
implement these systems.[1] This is typically the most cost effective way.[2] There are three types of
services that may be employed for - Consulting, Customization, Support. [12] The length of time to
implement an ERP system depends on the size of the business, the number of modules, the extent
of customization, the scope of the change and the willingness of the customer to take ownership for
the project. ERP systems are modular, so they don't all need be implemented at once. It can be
divided into various stages, or phase-ins. The typical project is about 14 months and requires
around 150 consultants.[13] A small project (e.g., a company of less than 100 staff) can be planned
and delivered within 39 months; however, a large, multi-site or multi-country implementation can
take years. The length of the implementations is closely tied to the amount of customization
desired.
To implement ERP systems, companies often seek the help of an ERP vendor or of thirdparty consulting companies. These firms typically provide three areas of professional services:
consulting; customization; and support. The client organization can also employ independent
program management, business analysis, change management, and UAT specialists to
ensure their business requirements remain a priority during implementation
3.
What do you understand by IT Enable services? What are the major segments of IT enable
services?
IT Enabled services (ITES), also called web enabled services or remote services or Tele-working, covers
the entire gamut of operations which exploit information technology for improving efficiency of an
organization. These services provide a wide range of career options that include opportunities in call
Centres, medical transcription, medical billing and coding, back office operations, revenue claims
processing, legal databases, content development, payrolls, logistics management, GIS (Geographical
Information System), HR services, web services etc.
Medical Transcription
Medical transcription seems a simple process but it requires enormous attention as the errors can lead to
business and legal issues. Medical transcription is a process wherein a doctor verbally dictates the history
of the patient. This is recorded in the electronic format, which is being done by the outsourcing services
provider, known as Medical Transcriptions. The task of the IT enabled services provider is not only
confined to preparing the common reports for every patient, but also includes recording of several other
mission critical information of the patients, such as laboratory reports, clinical reports, diagnosis,
medicines prescribed etc. As the information is of utmost importance it is necessary for the offshore
outsourcing services provider to listen and record the details in the way desired by the client. With the
help of such critical details the doctors can only defend themselves if their patients are suing them, as the
information supplements as legal proof. Besides this, it is also a great help to the insurance companies for
the claims made. Such IT enabled services have already proved that it has huge potential not only in few
regions but also everywhere across the globe.
Online Education and Training
Like any other sector, in IT enabled services sector the online education and training segment is on the
threshold of prosperity. One of the greatest advantages that this segment has is that it disregards the
geographical bars. Outsourcing services provider from around the globe specializing in the field of online
education and training are now benefiting out of this. Now the students and the trainees from corporate
can easily equip themselves with the latest advancement in educational and training segment. The
knowledge provided is not only limited to the computer hardware/software section but is also into other
diversified fields. There are some critical factors like the amount of bandwidth, cost of hardware and
infrastructure that needs to be considered in order to implement online education and training effectively
through abundant offshore resources
Call Centers
The most famous of all the IT enabled service is the call centers. Call centers are used for customeroriented activities like support and services, telemarketing, technical support, providing valuable
information. The call centers have wide database access to Internet for vital information complimented
with expert human resource. Advantages of Outsourcing to India like liberal government policy,
knowledge base, and language familiarity makes it a prominent contender for outsourcing services.. This
sector is most steady of all the sectors in the category of IT enabled services
Data Processing
Irrespective of any field the data has always been critical for any organization. The traditional form of data
processing has time and again proved its limitations. In order to provide effective and efficient information
to the clients the use of information technology plays a major role. The outsourcing services provided by
the offshore outsourcing services provider range from data entry, statistical analysis, customer tracking
reports etc. Data processing covers up all major sectors such as banks, insurance, telecom and
government.
Data Digitization
Data digitization is nothing but the digital format of the non-digital menu scripts. Even the sounds and the
images these days are digitized. The offhsore outsourcing services providers in the field of Data
digitization serves major segments such as- government, museums, research centers, and educational
sectors.
Case Study
Company A is an Educational service for a museum, responsible for the provision of information to public
and research users on the holdings of a large national collection of artifacts.
Company A is not in the business of producing the applications or the software but in the procurement of
system, particularly multimedia application, from leading edge companies in the field. The contract must
specify that product acceptance is dependent on it reaching certain requirements for usability, quality in
use, and ease of use as the majority of the end users of these products are usually people with little or no
informatics skills, but highly discretionary needs.
Question:
Q. Discuss in detail what I.T infrastructure can be adapted and implemented for this kind of new setup so
that the after successfully implementing this infrastructure the training costs can also be avoided.
Ans. Leading IT Companies can be identified by huge, well-designed buildings, situated in significant
locations, and comprising lavish campuses. Besides the common infrastructures required in all
industries, IT companies of India require the following exclusive infrastructures:
Latest high-end machines that is able to support all sorts of hardwares and softwares.
Server
Router
Features
Local Area Network (LAN) providing 100% connectivity to the entire campus,
Wireless access to LAN in select open areas within the campus
Internet browsing facilities and integrated e-mail system accessible from anywhere in the
campus, facilitating intra-campus and external collaboration
Internet Connectivity
E-mail system
Data Centre
Audio Visual Facilities
Connectivity and projection from any prominent audio-visual device / media
Touch-pad operation, controlling cameras, lighting, voice, and window-drapes
1. When a key is pressed on the keyboard, which standard is used for converting the keystroke into the
corresponding bits?
a) ANSI
b) ASCII
c) EBCDIC
d) ISO
2. Which device is used as the standard pointing device in a Graphical User Environment?
a) Keyboard
b) Mouse
c) Joystick
d) Track ball
3. Which of the following is not an output device?
a) Scanner
b) Printer
c) Flat Screen
d) Touch Screen
4. Which of the following devices have a limitation that we can only information to it but cannot erase or
modify it
a) Floppy Disk
b) Hard Disk
c) Tape Drive
d) CDROM
5. Which technology is used in Compact disks?
a) Mechanical
b) Electrical
c) Electro Magnetic
d) Laser
6. Which of the following storage devices can store maximum amount of data?
a) Floppy Disk
b) Hard Disk
c) Compact Disk
d) Magneto Optic Disk
7. The programs which are as permanent as hardware and stored in ROM is known as
a) Hardware
b) Software
c) Firmware
d) ROMware
8. EPROM can be used for
a) Erasing the contents of ROM
b) Reconstructing the contents of ROM
c) Erasing and reconstructing the contents of ROM
d) Duplicating ROM
9. The contents of information are stored in
a) Memory data register
b) Memory address register
c) Memory access register
d) Memory arithmetic register
10. Algorithm and Flow chart help us to
a) Know the memory capacity
b) Identify the base of a number system
a)
b)
c)
d)
Analysis model
E R model
Object oriented model
Object oriented data mode
38. Which of the following factor does not contribute to the success of ERP?
a) Focus on business processes and requirements first.
b) Focus on achieving a healthy ERP ROI (Return on Investment), including post-implementation
performance measurement.
c) Strong project management and resource commitment.
d) Lack of budget.
39. Who plays and important role in the selection of ERP Package?
a) Consultants
b) Vendors
c) Users
d) All of the above.
40. Enterprise-wide resource planning systems (ERP systems) attempt to:
a) Integrate all corporate information in one central database
b) They do not allow information to be retrieved from many different organizational positions
c) They allow any organizational object to be made invisible.
d) They allow information to be stored in multiple databases.