Computer Fundamentals & Programming



Download 361.8 Kb.
Page6/6
Date02.06.2017
Size361.8 Kb.
#19879
1   2   3   4   5   6

INTRODUCTION:

An electronic mail is called e-mail. Now a day this word is very common. Between two users, using this service they can pass on their messages within a minute through telephone line using computers. It is an electronically mailing service around the world. This service was started first time by the USA in 1976. This is the first stage of using Internet globally. Using e-mail anybody can send and receive the text and pictures as information from one corner to another of the world. Due to e-mail service, the surface mail has gone down around the world. Because e-mail service is very useful, quick, cheap and easy. Now this service is available at your personal computer, too.

    1. E-MAIL ADDRESS:

To send e-mail, the receiver's e-mail address must be correct. Similarly, the user must have the general idea about the e-mail address. From the following examples, you also will have the clear idea of e-mail address, which contains five parts as follows. Here we can take following two examples as:

i) hari@wlink.com.np

ii) ncollege@ccsl.edu.np

Hari and ncollege = Individual or user's name.

A sign @ = a separator symbol

wlink and ccsl = a Internet service provider (ISP), which is called a domain name.

.com and .edu = a commercial or educational group which is called a top domain name.

.np = country code (np= Nepal)



    1. MAILING BASIC:

To compose an E-mail message, click on "compose new message" button on the tool bar. You will see an empty mail form, which will have the following parts as shown below:

  • To-Enter the E-mail address to where you are sending message.

  • CC- Enter the E-mail address to where the copy of messages is sent.

  • Subject-Enter the brief description as to what the message is about.

  • Body-Enter the actual message here.

Almost all E-mail programs have the following features: address look, signature feature and attachment facility.


    1. EAIL ETHICS:-

Like any form of communication, there are certain manner and general decplain that you should follow where using the E-mail. There are some guide lines, which will help you in getting the most out of your electronic mailing

  1. Let your message have a personal touch and politeness.

  2. Be friendly on writing.

  3. Be short and sweet.

  4. Know your recipient.

  5. Be brief.

  6. Make the subject line precise.

  7. Use your technology like spell checker & thesaurus.

  8. Read the message carefully and answer properly.

  9. Don't send copies of E-mail to people unless they need it.

  10. You should check your mail regularly.



    1. NTERNET CODE OF CONDUCT:-

  1. Don't encode the personal privacy of other users.

  2. Do not forward E-mail without permissions.

  3. Do not deliberately break into computer system.

  4. Getting passwords or other access information fraudulently is unacceptable.

  5. Copy or making available copies of protected works without the author's precession is illegal.



    1. ADVANTAGES & DISADVANTAGES OF E-MAIL

a) Advantages: - (Bright side)

  1. E-mail is accessible 24 hours a day and 365 days a year.

  2. Endless amount data you can send any part of the world.

  3. Global communication is easier.

  4. At your home also you can access E-mail.

  5. Work can be now done anywhere a computer can be plugged in.


b) Disadvantages: - (Dark side)

  1. Import of virus into your computer.

  2. Over load information is created.

  3. Swamped by link mails.

  1. Intranets:



  1. INRODUCTION TO INTRANET

Internet is a communication network, which bridges the entire small computer networks worldwide as a whole. Intranet is based upon internet technology, in particular World Wide Web (www), technology to build information system within organization or enterprise to accomplish standardization and automation. Ultimately it allows a certain organization to build a group ware within web environment at low cost on top of existing network in fracture. If a corporate web connects two or more trading partners, it is often referred to as a business to business web or an extranet. Extranet is a sub-group of internet. For example of web server and a professional organization with the thousand web server can each the considered an Intranet.
18.2) CHARCTERIETICS OF INTRANET:

  1. Openness

  2. Easy to use

  3. Low cost

  4. flexibility

  5. Scalability

  6. Innovative.


18.3 ADVANTAGES OF INTRANET:-

  1. It costs much less to build initial system, which results in maximum efficiency and flexibility.

  2. It is based an internet protected, which expands accessibility worldwide.

  3. It helps on decision making system and it automates lauding a MIS.

  4. It handles multimedia data effortlessly.

  5. Ready to access the information worldwide.

  6. Low administration and maintenance costs.

  7. Platform –independent system configuration features.


18.4) WHY DOES AN ORGANIZATION NEED INTRANET? :-

A good business houses wants to reach more customer more effectively and efficiently, and to provide them with letter service. Daily, more consumer look to the Web for new sources, and more business look to their internet Web or Internet, to process their client's needs in more cost effective and efficient manner. To remain competitive, all organization needs to keep pace with technological advances.



Large organizations, which use internets to electronically transmit documents internally, pay back their investment in the technology within six to twelve weeks according to a study commissioned by Netscape.
BENEFITS OF INTRANET OF EMPLOYEES AND ORGANIZATION:-

  1. Employees can access information they need, when they need it.

  2. One determines as to who can have access to what data and to what extent?

  3. Transactions can be followed electronically.

  4. Database can be updated automatically as the transaction occurs.

  5. Communication can take place instantaneously anywhere in the world.

  6. Employee can work remotely, and remote employee can be shared for their expert ices.

  7. You can access other business for ordering, sourcing, contracting and so on.




  1. EXTRANET:-

An extranet is a business to business intranet that allows limited, controlled, secure access between a company's internets and designed authenticated users from remote location. It is an intranet that allows controlled access by authenticated parties. A brief list of examples could include:

  1. Allowing suppliers access to relevant inventory levels.

  2. Allowing clients to review their account recorders.

  3. Allowing students to update address information in real time.

As with intranet access is granted only where you establish that it is required. User access is controlled lay the latest in security technologies, protecting sensitive material from intrusion.



  1. THE MULTIMEDIA

  1. INTRODUCTION TO MULTIMEDIA:

Multimedia is a technology that is made by combining hypertext, still pictures and video images, sound, animation and video using the computing power of pc. All these have been made possible recently by the latest developments in computer software and hardware. Many of us think that multimedia and CD-ROM are synonymous. But it is not true, CD-ROM is a storage device. Multimedia is a technology. For example if you want to use multimedia capabilities, your pc alone is not enough. You need additional set of hardware and software to support multimedia elements.


  1. MULTIMEDIA SYSTEM:

As you know, people can run some special classes using the multimedia system. To run such advanced class, they need a set of multimedia elements like a) Computer set b) Compatible software c) CD-ROM Reading drive d) Sound card e) Sound blast f) Microphone g) CD-ROM h) Head phone i) Digital camera, etc. With the help of these sets of multimedia system, any body can store, digitize, compress retrieve and decompress the information. To do this type of the job, the collection of the above sets of hardware set is called multimedia system. Using this system, anybody can do nice and advanced presentation.


  1. 19.3 MULTIMEDIA TECHNOLOGY:

Multimedia Technology is a special computerized technique, which helps the user by providing techniques to combine texts, pictures, sound and video films including interactive facilities. It also provides facilities to the user to create, store, edit, delete and copy those data in the computer media. To store those types of data, CD-ROM can be a very useful storing media. Such multimedia data stored CD is called multimedia CD. Now a day, instead of heavy book a light multimedia CD is sufficient. Such CD is very cheap, light, simple, portable and easy to carry. It also helps to provide colorful presentations. Therefore multimedia technology has created more and move marketing in the world. Hence now in most of the books, video paper, film reels floppy disks, super disks and zip disks are replaced by CD-ROM. Every where you can see multimedia CD.
19.4 USING THE MULTIMEDIA ANYWHERE:

Due to invention of multimedia hardware and software, computer users are taking more advantages at present. By combining the multimedia technology and multimedia system, users are gaining entertainment, knowledge, education and profits. Due to invention of multimedia technology, they are using it in the video game, film making, software training, education, seminars, website, office work and even in the video conferencing, etc.


19.5 SOFTWARE USED IN THE MULTIMEDIA:

To design and write multimedia software, the programmer has to use different utilities and programming languages, which are as follows.

(i) Java (Programming Language).

(ii) Windows media player (Utilities).

(iii) Real Judie or Shock wave (Utilities).

(iv) Active-x of open Dock.


19.6 ADVANTAGES AND DISADVANTAGES OF THE MULTIMEDIA:

Advantages:

(i) It helps to use in the nice video presentation for all subjects.

(ii) At anytime, anywhere and anybody can use it.

(iii) Very easy to use, handle, carry, copy and store.

(iv) Usable in interactive web page, Internet, video conferencing Open University and distance education and seminars

(v) Powerful presenting tool with colored pictures, motion pictures and graphical pictures with multiple facilities.


Disadvantages:

(i) Very costly at the beginning during multimedia production

(ii) Requires very skilled manpower to use it.

(iii) Requires very costly hardware set to use it.

(iv) Poor people cannot use it due to high cost.
Exercise

1. What is multimedia? Explain it with examples.

2. What is the difference between multimedia and CD-ROM?

3. What is a multimedia system?

4. What is a multimedia technology?

5. What is the difference between multimedia system and multimedia technology?

6. Why and where are users using the multimedia?


  1. COMPUTER SECURITIES

The computer security is concerned with the protection of the software and hardware, etc. There are different problems you face while working in a computer system environment. Power or supply to a computer may fail especially in bad weather; program or packages may contain bugs. Computer Media such as disk or hard disk or tapes may become corrupted, data may be lost. Even the working staff may be careless or do some criminal type of activities.


The computer can be given security under the following headings:

1. Hardware Security

(i) Natural disaster (ii) Electric Power supply

(iii) Air conditioning (iv) Access Control

(v) Building Construction and Design (vi) Fire Protection

(vii) Insurance

2. Hardware Security

3. Software Security

4. Security of Data.

5. Safety from Virus


20.1 Hardware Security:

The environment and natural disaster has enormous influence on the security of the hardware. To protect the hardware from the natural disaster, necessary actions must be taken in proper time.


(i) Natural disaster:

The likely risks due to the computer location need to be assessed. The other factors or conditions affecting the hardware are Earthquake, Wind, Rain, Snow, Ice, Floods, Lightening, Land slip, Fire, etc.


(ii) Uninterruptible power supply (UPS):

No computer can operate without power supply. Computer needs 220 Volts (AC) 240 Volts (A.C) supply as the input voltage to its Power Supply Unit. The frequency of AC (Alternating Current) supply should be 49.5 Hz to 50 Hz.

An uninterrupted power supply (UPS) is one, which provides uninterrupted supply of power in case of failure of regular supply to the computer system. Whenever there is power cut or supply problem, automatic switching takes place between regular supply line and the UPS and without interruption, a continuous or constant supply to the computer is maintained. Hence, data or program loss or any electric damages to any unit or circuit will not take place.

A standby generator with battery supported UPS can maintain supply. Such a generator need very high capital cost. You can use volt guard or spike guard to protect your computer from the high or low voltage. As a cheap device, it can be used. A stand by emergency lighting is always necessary to escape in case of supply line failure. Large electric torches or lanterns should be kept near the reception desk.


(iii) Air Conditioning:

Large computers dissipate too much heat, so ventilation is needed to maintain the temperature. For the computer, certain environment is needed. Humidity and temperature must be controlled, and a dust-free atmosphere is to be maintained which is possible with air conditioning plants. A typical air conducting plant re-circulates some of the air and introduces a continuous supply of clean filtered air at the correct temperature and humidity. Some air is exhausted to the outside. The temperature of 21° C ± 2° C (70 °F± 3 ° F) and the relative humidity of 50% ± 5% are necessary. Rise in temperature inside the computer room leads to overheating of components (i.e. IC chip, transistor etc.), moisture precipitation.


(iv) Access Control:

Unnecessary persons should not be allowed inside the computer room. The entry and exit point of the computer room should be controlled and monitored properly using ID card system.


The commonly used access control methods are:

- By using people (e.g. Security guard)

- By using mechanical locks (e.g. Door Lock)

- By using electronic system (e.g. Card Locks)



(v) Insurance Protection:

Incase of the computer system is in danger due to natural disaster or malfunctioning or theft or rubbery, the insurance protection is a must.


20.2 SOFTWARE SECURITY:

The security of software includes security of both application programs and system software. From the security viewpoint, Operating System (OS) is the most important which controls and monitors the entire system. To provide security to the software the use can apply the following methods.


i) Password:

To prevent using the computer, the user can put the password system in the computer. If somebody wants to run the computer, he or she must entry the password, when the computer wants the password, if not it won't allow it to run lock key.


ii) Backup:

Sometimes, the software or database stored in the hard disk could be damaged due to crash of the hard disk or due to virus. If the user finds this type of problem, he can solve the problem using his backup program or the database file, provided he has the backup files. Hence to prevent such problems of the software, the user must create the backup files from time to time.


iii) Hard lock key:

Hard lock key is a kind of checking point available within the software during its running time. The user needs to type a kind of password when the software asks the hard lock key to be typed. If it matches the software runs, otherwise it does not work. Thus the hard lock key protects from the software piracy.


iv) Virus scanning:

Computer virus is a man made small program, which creates software problems to the users. For example, it damages the program or database files or the outputs. Hence the user must protect his application program, operating system or database files from the virus by any means. The details about the virus you can find in the following chapter.


Exercise

1. What is the hardware security? Explain any two methods.

2. Give any two points to protect software. Explain how do you do.

3. Write short notes on:

a. Power Protection b. Password

c. De - fragmentation d. Backup

e. Computer security

4. What do you mean by computer security?

5. What is a UPS? What is the range of voltage and its frequency that can be applied to the computer system?

6. Why do you need Air-Conditioner?

7. Explain how building construction affect the computer security

8. Do the people in an organization affect the security of computer? Explain why?

9. How are hardware and software security maintained?

10. What should be the abilities of software having proper security system?

11. Write two examples of security package.

12. Why do we need security of data?




  1. IT Policies And Cyber Laws:

21.1 BACKGROUND:

Actually Nepal had started using computer technology in 1971 for the national population census 2028BS. Since then till now, Nepal has crossed many obstacles and gained different types of experiences in using IT. As everybody knows that the country like Nepal had tapped many opportunities using IT to speed up the all-round development of the country. With the help of using IT, the developing areas are education sector, health sector, agriculture sector tourism sector, banking sector and publishing sector, etc.

With the help of using IT, there will be increment in opportunities, developing activities, democratic process, financial status and all round awareness, etc. There will be big change in the people's thinking capability. In a short period of time, people will be able to achieve all round development and improve their quality of life. From the development of IT in the country, it will be able to avoid poverty and bring quick change in life. It will create job opportunities and will establish the intellectual basic infrastructures.

21.2 OBJECTIVE:

The development of IT will be done for the following three basic objectives in the country.

i) To create knowledge based society

ii) To create job opportunities for the people.

iii) To establish knowledge based industries.



21.3 INFORMATION TECHNOLOGY (IT) POLICY:

To fulfill the above mentioned three basic objectives, Nepal government will establish IT centers in most of the VDC's. Each and every department and ministry of the government will create their websites, develop e-commerce, e-education, e-health and e-banking. With the help of using the above tools, they try to create job opportunities and provide quick services to the people of different communities. The Nepal government will try to establish basic informative infrastructure and basic working culture with the help of internet, intranet and extranet.



21.4 WORKING POLICY:

To implement the national IT policy of Nepal and to fulfill the following objectives, the government of Nepal will follow the following points.

i) With the help of people's participation to develop the IT based infrastructures.

ii) With the help of people's participation to develop the skilled manpower.

iii) To disseminate the information technology within the country.

iv) To provide different facilities to develop the information technology.



21.5 INSTITUTIONAL MANAGEMENT:

i) Under the chairmanship of the honorable pri-minister and deputy chairmanship of the science and technology minister with other 16 members an organization called National Information Technology Development committee (NITDC) has been established in 2003 AD. It is the head of National Information Technology center, under which National Technology Committee will work. NITDC is the main body, under which Nepal works to develop information technology within whole Nepal.

ii) Similarly, to develop and expand the area of the information technology, to revise and update, to supervise and monitor the yearly progress and to solve the problems regarding IT, an organization called National Information Technology Centre (NITC) has been established in 2003 AD. This organization is running under the chairmanship of the honorable science and technology minister including deputy chairmanship of the deputy chairman of National Planning Commission and 10 other members. NITC is working under NITDC.

iii) Regarding information technology, to develop the curriculum to develop manpower, to fix the standard and levels, to organize the research works and to co-ordinate between private institutes and governmental organizations and the organization called National Information Technology Co-ordination Committee (NITCC) has been formed in 2003 AD.

iv) Similarly, as per necessary district level and regional level information technology centers will be opened, where the local people will be involved and will take advantages sharing information, using internet, intranet, extranet and e-mail. According to their knowledge, capacity and requirements, the local people will gain knowledge and experiences.

21.6 LEGISLATION:

Nepal government will design, update and implement the cyber laws from time to time as per national and international situation. The law will be related to e-banking, digital signature, software piracy, data protection by encryption, copyright protection and privacy protection act, etc.



21.7 UPDATING THE IT POLICY:

Nepal government will supervise the running of cyber law from time to time and rewrite them to update. In every two alternate years continuously, it will be updated.



International Cyber Laws:

  • Fair Credit Reporting Act-1970 = Privacy act.

  • Freedom of Information Act-1970 = To access data file & to collect information from the government agencies.

  • Federal Privacy Act-1974 = To allow individuals to know what is stored in the file about them.

  • Video Privacy Protected Act.-1988 = To stop disclosing a person's video, in the bank, hospital without authority.

  • Computer Matching and Privacy Protection Act-1988 = To prevent the government from comparing records to find match.

  • Copy Right Act-1992 = To protect copy right , PenaltyUS $260,000 & 5 Years of jail.



  1. Data Representations

      1. Integer,

      2. Real Numbers, Strings .Bits ,Bytes ,Nibble ,Positional And Non Positional Number

      3. Binary, Decimal, Octal, Hexadecimal System and Their Conversions.


24. E-TECHNOLOGIES:-

E-Technologies means the use of Information Communication Technologies (ICT) in the banking sector , management sector, education sector, mailing sector, business sector, tourism sector and others. Detail discussion on the above subjects matter is called discussion on E-technologies.



    1. History and Development of Computer in Nepal:

Although the first electronic digital computer was built in mid 1940’s, computer was introduced in Nepal in the year 1972 only. It was introduced by Government for the population census of 1972 (2028 B.S). This was the second generation computer of IBM Company called IBM 1401. The Government had paid Rs One lakh twenty five thousand per month as rent for this computer.

The Census Department at Thapathali Kathmandu had used IBM 1401 computer for the first time to process 1 corer 12.5 lakhs population census taking 1 year, 7 months and 15 days. Later, it became essential to operate the computer for day and night, for this reason a separate branch office called Yantric Sarinikaran Kendra (Electronic Data Processing Centre), was established in 1974 (15th Paush 2031 B.S.), which, after six years, was converted to National Computer Centre (NCC).

For the population census of 1981 (B.S. 2038), a British computer ICL 2950/10 (International Computer Limited 2900 Series) which had 64 terminals was added from the aid of UNDP and UNFPA at two million American dollar from the British ICL Company. By the help of this fourth generation computer, the 1981 population census was completed within one year and 3 months.

Microcomputer such as Apple, Vector and Sirus were introduced in Kathmandu for the first time in 1982 (B.S. 2039). New companies such as Computer consultancy (CC), Management Information Processing System (MIPS) and Data System International (DSI) were established.

Since 1983 (BS. 2040) National Computer Center, on the other hand, also started giving training on programming, data entry, data processing, and development of software packages. As a result, many people from various sectors started showing their interest in the field of computers.

Since 1977 (B.S. 2034) His Majesty’s Government employed IBM 1401 computer in tourist statistical data processing, industrial data processing, statistical and loan account keeping of Agricultural Development Bank, Provident fund, SLC result processing and TU result processing, etc. After a few years, new computer ICL 2950/10 was brought in use, which was more efficient for data processing in some other corporations such as Telecommunication, Electricity Authority, Janakpur Cigarette factory, Hetauda Cement Factory, Tribhuwan University, etc. Many others like travel agencies, hotels, factories, printing presses also started using computer for better & faster work. At present, not only Kathmandu is using microcomputers but also Lalitpur, Bhaktapur, Pokhara, Nepalgunj, Bhairhawa, Butwal, Hetauda, Birgunj, Biratnagar, Janakpur, Jhapa etc. are using computer for different purposes. Nowadays, computers have been used in different areas like, travel agencies, hotels, Airlines, Government offices, Banks, Colleges, Schools, Hospitals, etc. in Nepal. People are using computer even at home for day-to-day use for their personal convenience.

Now there are more than 1000 private computer-training centers all over Nepal. About 50 software development centers are working in the Nepali market. At present, in Nepal more than 1250 schools, 107 higher secondary schools, 50 general colleges, 42 IT related colleges and 4 Universities are teaching and using computer technology. More than one hundred thousand computers are busy in Nepal. More than 28 private Internet Service Provider (ISP) are providing services in the Nepali market. Nepal had started using e-mail, Internet, e-Banking and Websites since 1996 AD.

The purpose of using the computers is for word processing, keeping accounts, keeping the records and details of employees, inventory control, etc. A few software houses are involved in software development and in exporting the software to the international market (i.e. in Japan, Germany, USA, UK etc) also. Some of the private institutes and companies are involved in computer assembling, selling and distributing like in other developed countries. The scope of computer in our country is increasing rapidly day by day. In May 2000 AD, Ministry of Science and Technology, HMG had announced the national policy on IT. Similarly, HMG had announced the Cyber Law and copyright Law in Sept 2004 etc.






Download 361.8 Kb.

Share with your friends:
1   2   3   4   5   6




The database is protected by copyright ©ininet.org 2024
send message

    Main page