30
SPM & IRTM  Prof. Ramesh Koutarapu Assignment 1 Application Software, System software, Hardware, Networking and Equipment. Submitted By Roll Number Name !"#1$#1% Sandeep !auriya "ES !anagement &ollege and 'esearc( &entre, !umbai

Inst Mim s4 Spm a1 Mi-12-10 Sandeep Mauriya

Embed Size (px)

Citation preview

8/12/2019 Inst Mim s4 Spm a1 Mi-12-10 Sandeep Mauriya

http://slidepdf.com/reader/full/inst-mim-s4-spm-a1-mi-12-10-sandeep-mauriya 1/30

SPM & IRTM

  Prof. Ramesh Koutarapu

Assignment 1

Application Software, System software, Hardware, Networking

and Equipment.

Submitted By

Roll Number Name

!"#1$#1% Sandeep !auriya

"ES !anagement &ollege and 'esearc( &entre, !umbai

8/12/2019 Inst Mim s4 Spm a1 Mi-12-10 Sandeep Mauriya

http://slidepdf.com/reader/full/inst-mim-s4-spm-a1-mi-12-10-sandeep-mauriya 2/30

Application Software

1. Claim Tracer S!stemAbout " 

 )(e claim tracker system de*eloped by tec(process payments ser*ices limited for "&"&"

+ombard. "t was first released in t(e $%%$ under t(e name eb &laim tracker system.

And later different *ersion (as been released as per user requirements c(anges.

Purpose " 

)(e purpose t(e of claim tracker is to track t(e policy claim status online so t(at customer 

can easily comes to know about claim related information and different stages of t(e

claims processing. )(e leads to more settlement on claim *ery as compare ot(er

insurance company and satisfying customer due to unique ser*ices. The application is used

for tracking marine & non-marine claims registered and providing the status update .for the

same.

 Implementation & Setup " 

)(e de*elopment (as been done in t(e Asp.net $.% and back#end as sql ser*er $%%%.

)(e implementation (as been done in t(e "&"&" +ombard en*ironment on (ig(ly

configured ser*er. as it is t(e web based application so t(e publis( code (as been

deployed on ser*er and accessing t(e t(roug( specific -'+ gi*en to user.

Maintenance #Re$ular & %mer$enc!'

)(e maintenance (as been done by "&"&" +ombard as well as tec(process payment

ser*ices limited. rimary maintenance acti*ity is maintained by "&"&" +ombard like

Ser*er space management, ser*er maintenance etc. and all query related to application

(as been mail to tec(process on daily basis. )(ey sol*ed t(e query on daily t(roug( t(e

interacti*e communication between business analyst and de*eloper.

"n t(e cases of any emergency, tec(process always pro*ide t(e $/0 ser*ices to "&"&"

+ombard for claim tracker system.

"ES !anagement &ollege and 'esearc( &entre, !umbai

8/12/2019 Inst Mim s4 Spm a1 Mi-12-10 Sandeep Mauriya

http://slidepdf.com/reader/full/inst-mim-s4-spm-a1-mi-12-10-sandeep-mauriya 3/30

Ris Mana$ement & Contin$enc! plan'

)(e application can be (acked by (acker to a*oid t(is risk. )(e "&"&" +ombard (as

implemented t(e different AS+& points to pre*ent from (acker. )(e (acker can2t (acked

t(e application. )(e all contingency plan (as been (andled by company like disaster

reco*ery. )(e 3' ser*er (as been maintained separately. Any problem (appened on t(e

current ser*er, t(ey directly redirect to 3' ser*er.

R(I & )uration " 

)(is application makes company claim related acti*ity *ery faster and t(ey generate more

money t(an company e4pectation. So return on in*estment generates more money t(at

in*ested in t(is application. )(is duration of application is increased e*ery year due to

different c(anges in t(e application. )(e application will be continues till t(e company

e4ist.

*p$ra)e or Chan$e " 

)(e application was de*eloped in .net framework $.% and now upgraded to .net frame

work 5.6 and now new *ersion of t(e .net framework (as been came in t(e market.

 Now "&"&" +ombard is planning to upgrade to /.6 and t(e c(anges request of t(e

application (as t(e done e*ery year per new business c(anges in t(e company.

"ES !anagement &ollege and 'esearc( &entre, !umbai

8/12/2019 Inst Mim s4 Spm a1 Mi-12-10 Sandeep Mauriya

http://slidepdf.com/reader/full/inst-mim-s4-spm-a1-mi-12-10-sandeep-mauriya 4/30

+. ,rau) Intimation S!stem

About " 

 )(e fraud "ntimation system de*eloped by tec(process payments ser*ices limited for

"&"&" +ombard. "t was first released in t(e $%%% under t(e name 7raud "ntimation system.

And later different *ersion (as been released as per user requirements c(anges. )(e

application de*eloped on )(ree#tier arc(itecture tracks t(e fraud details and action taken

status.

Purpose " 

)(e application is used for tracking fraud registered and pro*iding t(e status update for

t(e same. )(e purpose of t(e application is to intimate t(e fraud by any in t(e company, if 

any one comes to know about t(e fraud done by (is subordinates or anyone in t(e

organi8ation, t(e intimator can directly "ntimates fraud t(roug( login to t(is online fraud

"ntimation system.

Implementation & Setup " 

)(e de*elopment (as been done in t(e Asp.net $.% and back#end as sql ser*er $%%%.

)(e implementation (as been done in t(e "&"&" +ombard en*ironment on (ig(ly

configured ser*er. as it is t(e web based application so t(e publis( code (as been

deployed on ser*er and accessing t(e t(roug( specific -'+ gi*en to user.

Maintenance #Re$ular & %mer$enc!'

)(e maintenance (as been done by "&"&" +ombard as well as tec(process payment

ser*ices limited. rimary maintenance acti*ity is maintained by "&"&" +ombard like

Ser*er space management, ser*er maintenance etc. and all query related to application

(as been mail to tec(process on daily basis. )(ey sol*ed t(e query on daily t(roug( t(e

interacti*e communication between business analyst and de*eloper.

"n t(e cases of any emergency, tec(process always pro*ide t(e $/0 ser*ices to "&"&"

+ombard for claim tracker system.

"ES !anagement &ollege and 'esearc( &entre, !umbai

8/12/2019 Inst Mim s4 Spm a1 Mi-12-10 Sandeep Mauriya

http://slidepdf.com/reader/full/inst-mim-s4-spm-a1-mi-12-10-sandeep-mauriya 5/30

Ris Mana$ement & Contin$enc! plan'

As t(is is t(e fraud "ntimation application, )(e information cannot be re*ealed to anyone

in t(e company so t(e application is controlled *arious risk management points.

)(e application can be (acked by (acker to a*oid t(is risk. )(e "&"&" +ombard (as

implemented t(e different AS+& points to pre*ent from (acker. )(e (acker can2t (acked

t(e application. )(e all contingency plan (as been (andled by company like disaster

reco*ery. )(e 3' ser*er (as been maintained separately. Any problem (appened on t(e

current ser*er, t(ey directly redirect to 3' ser*er.

R(I & )uration " 

)(is application is used intimate fraud related case like fake policy gi*en to customer and

 policy amount taken by users9 if t(is entire amount is sa*ed by company t(en ':" will be

increased. So return on in*estment generates more money t(at in*ested in t(is

application. )(is duration of application is increased e*ery year due to different c(anges

in t(e application. )(e application will be continues till t(e company e4ist.

*p$ra)e or Chan$e " 

)(e application was de*eloped in .net framework $.% and now upgraded to .net frame

work 5.6 and now new *ersion of t(e .net framework (as been came in t(e market.

 Now "&"&" +ombard is planning to upgrade to /.6 and t(e c(anges request of t(e

application (as t(e done e*ery year per new business c(anges in t(e company.

 

"ES !anagement &ollege and 'esearc( &entre, !umbai

8/12/2019 Inst Mim s4 Spm a1 Mi-12-10 Sandeep Mauriya

http://slidepdf.com/reader/full/inst-mim-s4-spm-a1-mi-12-10-sandeep-mauriya 6/30

S!stem Software

1. -I(S software

About'

B":S software is stored on a non#*olatile ':! c(ip on t(e mot(erboard. "t is

specifically designed to work wit( eac( particular model of computer, interfacing wit(

*arious de*ices t(at make up t(e complementary c(ipset of t(e system. "n modern

computer systems, t(e B":S contents are stored on a flas( memory c(ip so t(at t(e

contents can be rewritten wit(out remo*ing t(e c(ip from t(e mot(erboard. )(is allows

B":S software to be easily upgraded to add new features or fi4 bugs, but can make t(e

computer *ulnerable to B":S root kits.

Purpose " 

)(e fundamental purposes of t(e B":S are to initiali8e and test t(e system (ardware

components, and to load a boot loader or an operating system from a mass memory

de*ice. )(e B":S additionally pro*ides abstraction layer for t(e (ardware, i.e. a

consistent way for application programs and operating systems to interact wit( t(e

keyboard, display, and ot(er input0output de*ices. ;ariations in t(e system (ardware are

(idden by t(e B":S from programs t(at use B":S ser*ices instead of directly accessing

t(e (ardware. !odern operating systems ignore t(e abstraction layer pro*ided by t(e

B":S and access t(e (ardware components directly.

)(e B":S of t(e original "B! &0<) (ad no interacti*e user interface. Error messages

were displayed on t(e screen, or coded series of sounds were generated to signal errors.

:ptions on t(e & and <) were set by switc(es and =umpers on t(e main board and on

 perip(eral cards. !odern intel#compatible computers pro*ide a setup routine, accessed

at system power#up by a particular key sequence. )(e user can configure (ardwareoptions using t(e keyboard and *ideo display.

"ES !anagement &ollege and 'esearc( &entre, !umbai

8/12/2019 Inst Mim s4 Spm a1 Mi-12-10 Sandeep Mauriya

http://slidepdf.com/reader/full/inst-mim-s4-spm-a1-mi-12-10-sandeep-mauriya 7/30

Implementation & Setup'

)(e "ntel B":S "mplementation )est Suite >B")S? pro*ides a bootable pre#:S

en*ironment for testing B":Ses and in particular t(eir initiali8ation of "ntel processors,

(ardware, and tec(nologies. B")S can *erify your B":S against many "ntel

recommendations. "n addition, B")S includes "ntel@s official reference code as pro*ided

to B":S, w(ic( you can use to o*erride your B":S@s (ardware initiali8ation wit( a

known#good configuration, and t(en boot an :S.

ou mig(t want to use B")S if

ou@re a system or B":S de*eloper, and you want to *alidate t(at your system meets

"ntel@s recommendations.

ou@re an :S or application de*eloper building on tec(nologies pro*ided by "ntel

 platforms, and you want to c(eck if your system >or one of your user@s systems? (as

configured t(ose tec(nologies correctly.

ou@re an ad*anced user or de*eloper, and you want to c(eck your B":S to see if it

configures "ntel (ardware correctly and if not, to make a stronger case to your B":S

*endor to get it fi4ed.

ou need to poke (ardware in a low#le*el way, and you need a pre#:S en*ironment to

work in to a*oid :S interference.

B")S functionality fits in t(ree broad categories

;alidate run test suites to *erify recommendations

&onfigure o*erride B":S using "ntel reference code

"ES !anagement &ollege and 'esearc( &entre, !umbai

8/12/2019 Inst Mim s4 Spm a1 Mi-12-10 Sandeep Mauriya

http://slidepdf.com/reader/full/inst-mim-s4-spm-a1-mi-12-10-sandeep-mauriya 8/30

Maintenance #Re$ular & %mer$enc!'

B":Sis a*ailable for download9 t(is is a maintenance update for t(e production '$.%.%

release. )(is update can be manually downloaded or automatically downloaded directly

from &&S using Eclipse -pdate !anager9 see t(e B":S !&S3 -ser@s Cuide for details

on setting up automatic software updates.

)(e ma=or updates from t(e last maintenance release, B":S !&S3 $.%./, are

:ptimi8ed ++ and 33' configurations in "B+ and latform +ibrary

Added support for !A3 prelinker bypass mode

-pdated components SS0B":S, E3!A5 ++3, A ++3, D!SS ++3, &"e ++3,

Hyperlink ++3, and <3&)ools

Added programe*m script to simplify updating E;! flas( contents

Added "B+ command#line tool to modify configuration

Added :S) print of configuration registers

Bug fi4es >see t(e 'elease Notes for full list?

Ris Mana$ement & Contin$enc! plan'

 )(e 'isk in t(e B":S software is *arying computer to computer. !any released of t(e

software (as (andled in t(e risk. )(e contingency is implemented to (andle different risk.

R(I & uration " 

)(e !icrosoft and "ntel (a*e generated more money in t(e B":S. )(e durability of t(e

B":S is more t(an ot(er system software. )(e ':" of B":S (as more income t(an t(e

in*ested income.

*p$ra)e or chan$e'

:ccasionally, a computer will need to (a*e its B":S updated. )(is is especially true of

older mac(ines. As new de*ices and standards arise, t(e B":S needs to c(ange in order to

"ES !anagement &ollege and 'esearc( &entre, !umbai

8/12/2019 Inst Mim s4 Spm a1 Mi-12-10 Sandeep Mauriya

http://slidepdf.com/reader/full/inst-mim-s4-spm-a1-mi-12-10-sandeep-mauriya 9/30

understand t(e new (ardware. Since t(e B":S is stored in some form of ':!, c(anging

it is a bit (arder t(an upgrading most ot(er types of software.

)o c(ange t(e B":S itself, you@ll probably need a special program from t(e computer or

B":S manufacturer. +ook at t(e B":S re*ision and date information displayed on system

startup or c(eck wit( your computer manufacturer to find out w(at type of B":S you

(a*e. )(en go to t(e B":S manufacturer@s eb site to see if an upgrade is a*ailable.

3ownload t(e upgrade and t(e utility program needed to install it. Sometimes t(e utility

and update are combined in a single file to download. &opy t(e program, along wit( t(e

B":S update, onto a floppy disk. 'estart your computer wit( t(e floppy disk in t(e dri*e,

and t(e program erases t(e old B":S and writes t(e new one. ou can find a B":S

i8ard t(at will c(eck your B":S at B":S -pgrades.

+. Microsoft /or) Software

About'

!icrosoft ord is a word processor de*eloped by !icrosoft. "t was first released in 1FG5

under t(e name !ulti#)ool ord for <eni4 systems.5I/I6I Subsequent *ersions were

later written for se*eral ot(er platforms including "B! &s running 3:S >1FG5?, t(e

Apple !acintos( >1FG6?, t(e A)J) -ni4 & >1FG6?, Atari S) >1FGG?, S&: -N"<

>1FF/?, :S0$ >1FGF?, and indows >1FGF?. &ommercial *ersions of ord are licensed as

a standalone product or as a component of !icrosoft :ffice, indows ') or t(e

discontinued !icrosoft orks Suite. 7reeware editions of ord are !icrosoft ord

;iewer and ord eb App on Sky3ri*e, bot( of w(ic( (a*e limited features.

Purpose'

!icrosoft ord is a word processing program t(at is part of t(e !icrosoft :ffice Suite

 package. )(e main purpose of ord is to create te4t documents t(at can be sa*ed

electronically, printed on paper or sa*ed as 37 files.

Implementation & Setup'

"ES !anagement &ollege and 'esearc( &entre, !umbai

8/12/2019 Inst Mim s4 Spm a1 Mi-12-10 Sandeep Mauriya

http://slidepdf.com/reader/full/inst-mim-s4-spm-a1-mi-12-10-sandeep-mauriya 10/30

)(is guide contains compre(ensi*e information about (ow to plan, install, configure,

customi8e, and maintain !icrosoft 3ynamics &'! $%15 and !icrosoft 3ynamics &'!

:nline. )(ere are easy steps for "mplement and setup t(e !icrosoft word.

Maintenance #Re$ular & %mer$enc!'

 )(e maintenance of word document is a*ailable wit( t(e !icrosoft, new released of t(e

software as per new business industry required to complete t(e business requirement. )(e

!icrosoft also pro*ides t(e customi8ed word software as per t(e company or new

 business requirement for !icrosoft word.

Ris Mana$ement an) contin$enc! plan'

'isk is t(e possibility of an e*ent or condition t(at, if it occurred, would (a*e a negati*e

impact on a pro=ect. After a pro=ect begins, e*ents t(at are difficult to anticipate mig(t

create new risks. 7or e4ample, unseasonably rainy weat(er mig(t t(reaten t(e end date of 

a construction pro=ect.

repare a contingency plan As part of a good risk plan, you s(ould define t(e actions to

take if risk e*ents occur, so t(at you can respond to t(ose e*ents quickly and effecti*ely.

"dentify (ig(#risk tasks A critical part of risk management is identifying t(ose tasks t(at

are most likely to take longer t(an e4pected, end beyond t(eir finis( dates, delay t(e start

or finis( of ot(er tasks, or cause t(e pro=ect to finis( late.

R(I & uration'

)(e !icrosoft (as regenerated t(e income on (is return (is in*estment in t(e !icrosoft

word. )(e duration of t(e !icrosoft is depending upon t(e license period for purc(asing

t(e !icrosoft word software.

*p$ra)e or chan$e'

)(e !icrosoft word software upgraded time to time as *ersion released by !icrosoft.

"f you@re already using !icrosoft -pdate to get updates for your computer, indows

-pdate in &ontrol anel will automatically open and display your update status

"ES !anagement &ollege and 'esearc( &entre, !umbai

8/12/2019 Inst Mim s4 Spm a1 Mi-12-10 Sandeep Mauriya

http://slidepdf.com/reader/full/inst-mim-s4-spm-a1-mi-12-10-sandeep-mauriya 11/30

0ar)ware

1. Ke!boar)

About'

"n computing, a keyboard is a typewriter#style de*ice, w(ic( uses an arrangement of

 buttons or keys, to act as mec(anical le*ers or electronic switc(es. 7ollowing t(e decline

of punc( cards and paper tape, interaction *ia teleprinter#style keyboards became t(e

main input de*ice for computers.

A keyboard typically (as c(aracters engra*ed or printed on t(e keys and eac( press of a

key typically corresponds to a single written symbol. Howe*er, to produce some symbols

requires pressing and (olding se*eral keys simultaneously or in sequence. (ile most

keyboard keys produce letters, numbers or signs >c(aracters?, ot(er keys or simultaneous

key presses can produce actions or e4ecute computer commands.

Purpose'

"n normal usage, t(e keyboard is used to type te4t and numbers into a word processor,

te4t editor or ot(er programs. "n a modern computer, t(e interpretation of key presses is

generally left to t(e software. A computer keyboard distinguis(es eac( p(ysical key from

e*ery ot(er and reports all key presses to t(e controlling software. eyboards are also

used for computer gaming, eit(er wit( regular keyboards or by using keyboards wit(

special gaming features, w(ic( can e4pedite frequently used keystroke combinations. A

keyboard is also used to gi*e commands to t(e operating system of a computer, suc( as

indows@ &ontrol#Alt#3elete combination, w(ic( brings up a task window or s(uts down

t(e mac(ine. A command#line interface is a type of user interface operated entirely

t(roug( a keyboard, or anot(er de*ice performing t(e function of one.

Implementation & Setup')(e keyboard is used by connecting to t(e computer into t(e keyboard port. Now days,

-SB keyboard is also coming so it is kind of plug and play kind of (ardware of t(e

computer. )(e setup of t(e keyboard is *ery as compare to computer internal (ardware.

"ES !anagement &ollege and 'esearc( &entre, !umbai

8/12/2019 Inst Mim s4 Spm a1 Mi-12-10 Sandeep Mauriya

http://slidepdf.com/reader/full/inst-mim-s4-spm-a1-mi-12-10-sandeep-mauriya 12/30

Maintenance #Re$ular & emer$enc!'

:t(er t(an t(e monitor, you will probably need to clean t(e keyboard more often t(an t(e

rest of t(e &. 3ust and debris can collect between t(e keys can affect t(eir functioning.

)(e surface of t(e keyboard and keys can be wiped o*er wit( a clot( lig(tly dampened

wit( warm non#soapy water. ou must a*oid getting t(e keyboard wet as it may cause

damage to t(e keyboard circuits.

)o gi*e t(e keyboard a t(oroug( clean or to do a close *isual inspection of t(e keyboard,

remo*e its co*er. By remo*ing t(e key caps of t(e # >minus?, K >plus?, and Enter keys in

t(e numeric keypad at t(e far#rig(t end of t(e keyboard, you can create a gap to remo*e

t(e debris from t(e keyboard.

Small non#static *acuum cleaners can be used to remo*e debris from t(e keyboard as

well as ot(er small parts of t(e &. )(ese usually (a*e a small brus( (ead attac(ed wit( a

gooseneck t(at can be bent to pro*ide t(e best angle for cleaning. &ompressed#air can be

used to dislodge debris from inaccessible parts of t(e keyboard. 3islodged debris can

t(en be safely remo*ed by *acuum. +arge pieces of debris can be carefully remo*ed

using non#static brus(es, twee8ers or probes.

"f t(e keyboard (as (ad somet(ing spilled o*er it, you must act quickly to sa*e t(e

keyboard circuits from permanent damage. "f a spill occurs o*er t(e keyboard of a laptop

computer, t(e liquid may also penetrate t(roug( t(e keyboard to t(e case damaging ot(er

components of t(e computer. "t is ine4pensi*e to replace a keyboard but e4pensi*e to

repair or replace a laptop.

"n t(e e*ent of a spill, immediately disconnect t(e keyboard from t(e computer, or

disconnect t(e power from t(e laptop, and turn it upside down to pre*ent t(e liquid

 penetrating any furt(er. ipe or swab out all areas you can reac(. A (airdryer can be used

to dry (ard#to#reac( areas, or lea*ing t(e keyboard upside down to dry o*ernig(t may

work. Ensure t(at t(e keyboard is completely dry before reconnecting it to t(e computer.

:nce you are satisfied t(at t(e keyboard is dry, reconnect and reboot t(e system,

"ES !anagement &ollege and 'esearc( &entre, !umbai

8/12/2019 Inst Mim s4 Spm a1 Mi-12-10 Sandeep Mauriya

http://slidepdf.com/reader/full/inst-mim-s4-spm-a1-mi-12-10-sandeep-mauriya 13/30

obser*ing t(e :S) for keyboard errors, and test t(e keyboard by pressing e*ery key and

*erifying its action. "f t(ere is still malfunction of t(e keys, you may need to replace t(e

keyboard

Ris Mana$ement & Contin$enc! plan'

 'egular prolonged use of t(e keyboard and mouse may result in some people de*eloping

'-+3s suc( as carpal tunnel syndrome and tendonitis so proper ad=ustment of

keyboard is t(e 'isk !anagement.

R(I & uration'

:ur local supplier is Coldtouc(, manufacturers of t(e popular Coldtouc( ;$ Ad=ustable

eyboard, a split ergonomic keyboard t(at promotes a (ealt(y typing posture. )(e

Coldtouc( keyboard works wit( a & or a !ac, and it (as (elped t(ousands of customers

wit( repetiti*e stress in=uries associated wit( prolonged computer use.

3o8ens of large enterprise organi8ations (a*e run internal assessments of t(e *alue of

Coldtouc( products. )(ese studies s(owed significant producti*ity gains and financial

 benefits. :ne e4ample customer found a return of o*er LM% per employee o*er a t(ree

year period due to workman2s compensation sa*ings and a reduction in absenteeism.

Anot(er found dramatic impro*ement in o*erall employee satisfaction.

 

*p$ra)e & Chan$e '

ou must be logged on as an administrator or a member of t(e Administrators group in

order to complete t(is procedure. "f your computer is connected to a network, network

 policy settings may also pre*ent you from completing t(is procedure.

1. :pen eyboard in &ontrol anel.

$. :n t(e Hardware tab, click roperties.

5. :n t(e 3ri*er tab, click -pdate 3ri*er.

/. 7ollow t(e instructions t(at appear on your screen. ou can (a*e indows searc( for

t(e dri*er, or point to t(e dri*er@s location yourself.

"ES !anagement &ollege and 'esearc( &entre, !umbai

8/12/2019 Inst Mim s4 Spm a1 Mi-12-10 Sandeep Mauriya

http://slidepdf.com/reader/full/inst-mim-s4-spm-a1-mi-12-10-sandeep-mauriya 14/30

+. Ran)om Access Memor! har)ware

About'

'A! is a form of computer data storage. A random#access de*ice allows stored data to

 be accessed directly in any random order. "n contrast, ot(er data storage media suc( as

(ard disks, &3s, 3;3s and magnetic tape, as well as early primary memory types suc(

as drum memory, read and write data only in a predetermined order, consecuti*ely,

 because of mec(anical design limitations. )(erefore, t(e time to access a gi*en data

location *aries significantly depending on its p(ysical location.

Purpose'

)(e purpose of 'A! is to store temporarily programs and data t(at are currently being

used. "n t(is way, t(e processor is able to access t(e data fast. 'A! is a*ailable in

multiples of 1M, for e4ample 1M!B, 5$!B or 1$G !B.

)(e purpose of 'A! is to pro*ide a large area of memory w(ere programs t(at are being

run can be stored. "t also allows data to be cac(ed w(ile it is waiting to be processed or

sa*ed to t(e (ard dri*e.

 )(e purpose of 'A!, or 'andom Access !emory, is to gi*e t(e computer a place to

store data temporarily. (en computer programs run t(ey need to be able to constantly

access data. )o speed up t(e process t(e needed data is stored in t(e 'A! modules,

w(ic( will clear w(en t(e program is terminated or t(e computer is turned off.

Implementation & Setup'

'ead access memory >'A!? considers an important part in se*eral systems

Suc( as computer and communication systems9 and t(ere is se*eral applications software

t(at used for implements t(e digital circuits of 'A!. "n t(is pro=ect, multisim F

application software was used to implement and simulate se*eral logic circuits of 'A!

wit( many si8es at w(ic( implement 'A! circuit from sub 'A!. Also, it may be

 prepared as apart of equipments for t(e airborne computer system.

"ES !anagement &ollege and 'esearc( &entre, !umbai

8/12/2019 Inst Mim s4 Spm a1 Mi-12-10 Sandeep Mauriya

http://slidepdf.com/reader/full/inst-mim-s4-spm-a1-mi-12-10-sandeep-mauriya 15/30

Ris Mana$ement & Contin$enc! Plan'

)(e performance of a 'A! dri*e is in general orders of magnitude faster t(an ot(er

forms of storage media, suc( as an SS3, (ard dri*e, tape dri*e, or optical dri*e.1I )(is

 performance gain is due to multiple factors, including access time, ma4imum t(roug(put

and type of file system, as well as ot(ers.

7ile access time is greatly decreased since a 'A! dri*e is solid state >no mec(anical

 parts?. A p(ysical (ard dri*e or optical media, suc( as &3#':!, 3;3, and Blu#ray must

mo*e a (ead or optical eye into position and tape dri*es must wind or rewind to a

 particular position on t(e media before reading or writing can occur. 'A! dri*es can

access data wit( only t(e memory address of a gi*en file, wit( no mo*ement, alignment

or positioning necessary.

Second, t(e ma4imum t(roug(put of a 'A! dri*e is limited by t(e speed of t(e 'A!,

t(e data bus, and t(e &- of t(e computer. :t(er forms of storage media are furt(er

limited by t(e speed of t(e storage bus, suc( as "3E >A)A?, SA)A, -SB or 7irewire.

&ompounding t(is limitation is t(e speed of t(e actual mec(anics of t(e dri*e motors,

(eads and0or eyes.

)(ird, t(e file system in use, suc( as N)7S, H7S, -7S, e4t$, etc., uses e4tra accesses,

reads and writes to t(e dri*e, w(ic( alt(oug( small, can add up quickly, especially in t(e

e*ent of many small files *s. few larger files >temporary internet folders, web cac(es,

etc.?.

Because t(e storage is in 'A!, it is *olatile memory, w(ic( means it will be lost in t(e

e*ent of power loss, w(et(er intentional >computer reboot or s(utdown? or accidental

>power failure or system cras(?. )(is is, in general, a weakness >t(e data must

 periodically be backed up to a persistent#storage medium to a*oid loss?, but is sometimes

desirable for e4ample, w(en working wit( a decrypted copy of an encrypted file.

"ES !anagement &ollege and 'esearc( &entre, !umbai

8/12/2019 Inst Mim s4 Spm a1 Mi-12-10 Sandeep Mauriya

http://slidepdf.com/reader/full/inst-mim-s4-spm-a1-mi-12-10-sandeep-mauriya 16/30

R(I & )uration " 

"ntel &orporation is an American multinational semiconductor c(ip maker corporation

(eadquartered in Santa &lara, &alifornia. "ntel is t(e world@s largest and (ig(est *alued

semiconductor c(ip maker, based on re*enue.5I "t is t(e in*entor of t(e 4GM series of

microprocessors, t(e processors found in most personal computers. "ntel &orporation,

founded on uly 1G, 1FMG, is a portmanteau of "ntegrated Electronics >t(e fact t(at OintelO

is t(e term for intelligence information was also quite suitable?./I "ntel also makes

mot(erboard c(ipsets, network interface controllers and integrated circuits, flas( memory,

grap(ic c(ips, embedded processors and ot(er de*ices related to communications and

computing. 7ounded by semiconductor pioneers 'obert Noyce and Cordon !oore and

widely associated wit( t(e e4ecuti*e leaders(ip and *ision of Andrew Cro*e, "ntel

combines ad*anced c(ip design capability wit( a leading#edge manufacturing capability.

)(oug( "ntel was originally known primarily to engineers and tec(nologists, its O"ntel

"nsideO ad*ertising campaign of t(e 1FF%s made it a (ouse(old name, along wit( its

entium processor.

"ntel was an early de*eloper of S'A! and 3'A! memory c(ips, and t(is represented

t(e ma=ority of its business until 1FG1. Alt(oug( "ntel created t(e world@s first

commercial microprocessor c(ip in 1F1, it was not until t(e success of t(e personal

computer >&? t(at t(is became its primary business. 3uring t(e 1FF%s, "ntel in*ested

(ea*ily in new microprocessor designs fostering t(e rapid growt( of t(e computer

industry. 3uring t(is period "ntel became t(e dominant supplier of microprocessors for

&s, and was known for aggressi*e and sometimes illegal tactics in defense of its market

 position, particularly against Ad*anced !icro 3e*ices >A!3?, as well as a struggle wit(

!icrosoft for control o*er t(e direction of t(e & industry.6IMI )(e $%15 rankings of

t(e world@s 1%% most *aluable brands publis(ed by !illward Brown :ptimor s(owed t(e

company@s brand *alue at number M1.

"ES !anagement &ollege and 'esearc( &entre, !umbai

8/12/2019 Inst Mim s4 Spm a1 Mi-12-10 Sandeep Mauriya

http://slidepdf.com/reader/full/inst-mim-s4-spm-a1-mi-12-10-sandeep-mauriya 17/30

*p$ra)e or Chan$e'

Adding 'A! is often t(e most cost#effecti*e upgrade you can make to speed up a

sluggis( computer. &s t(at (ad more t(an enoug( 'A! w(en t(ey were new often (a*e

trouble keeping up wit( t(e demands of t(e latest programs after a few years. New

operating systems almost always call for more memory, too. (en a computer runs s(ort

of 'A!, it@s forced to swap t(e o*erflow data on and off of t(e (ard dri*e, w(ic( can

significantly slow performance.

)(e a*erage indows < user s(ould be satisfied wit( 1CB of 'A!. :ur tests, w(ic(

in*ol*e working wit( images and using Nero E4press to burn &3s, ran one#t(ird faster

w(en we upgraded from 61$!B of 'A! to 1CB. ower users w(o simultaneously run

lots of demanding applications, or anyone regularly working wit( digital *ideo or ot(er

large grap(ics files, will want at least $CB. "f you@re planning to upgrade your & to

indows ;ista, you can still get away wit( 1CB, but for a more comfortable e4perience

we recommend $CB of 'A!.

"ES !anagement &ollege and 'esearc( &entre, !umbai

8/12/2019 Inst Mim s4 Spm a1 Mi-12-10 Sandeep Mauriya

http://slidepdf.com/reader/full/inst-mim-s4-spm-a1-mi-12-10-sandeep-mauriya 18/30

Networin$

1. AN

About'

A local area network >+AN? is a computer network t(at interconnects computers in a

limited area suc( as a (ome, sc(ool, computer laboratory, or office building using

network media. )(e defining c(aracteristics of +ANs, in contrast to wide area networks

>ANs?, include t(eir smaller geograp(ic area, and non#inclusion of leased

telecommunication lines.citation neededI A'&NE), )oken 'ing and ot(er tec(nology

standards (a*e been used in t(e past, but Et(ernet o*er twisted pair cabling, and i#7i

are t(e two most common tec(nologies currently used to build +ANs.

)(e increasing demand and use of computers in uni*ersities and researc( labs in t(e late

1FM%s generated t(e need to pro*ide (ig(#speed interconnections between computer

systems. A 1F% report from t(e +awrence 'adiation +aboratory detailing t(e growt( of

t(eir O:ctopusO network ga*e a good indication of t(e situation. &ambridge 'ing was

de*eloped at &ambridge -ni*ersity in 1F/ but was ne*er de*eloped into a successful

commercial product.

Et(ernet was de*eloped at <ero4 A'& in 1F5P1F6,6I and filed as -.S. atent

/,%M5,$$%. "n 1FM, after t(e system was deployed at A'&, !etcalfe and Boggs

 publis(ed a seminal paper, OEt(ernet 3istributed acket#Switc(ing for +ocal &omputer

 Networks.O A'&NE) was de*eloped by 3atapoint &orporation in 1FM and announced in

1F. "t (ad t(e first commercial installation in 3ecember 1F at &(ase !an(attan Bank 

in New ork.

Purpose'

)(e purpose being to allow users to connect t(eir computers to a common ser*er or

ser*ers. Ser*ers are =ust central computers to a network. Ser*ers contain data t(at could

 be of *arying types. )(ere@d data t(at are numbers for e4ample accounting data an

accounting department needs to s(are wit( ot(er people in t(e accounting department. :r

it could be p(otos t(at a marketing department s(ares wit( ot(er people in t(e marketing

"ES !anagement &ollege and 'esearc( &entre, !umbai

8/12/2019 Inst Mim s4 Spm a1 Mi-12-10 Sandeep Mauriya

http://slidepdf.com/reader/full/inst-mim-s4-spm-a1-mi-12-10-sandeep-mauriya 19/30

department w(en working on a marketing pro=ect. :r it could be sound data t(at would

also be used by t(e marketing department on a pro=ect in*ol*ing t(e use of sound. :r it

could be simply words0documents t(at people need to s(are amongst managers of t(e

company. )(e +AN allows e*eryone to work on t(e same document and wit( t(e rig(t

software0programs e*eryone can see t(e results in real time. )(at is per(aps one of t(e

most powerful aspects of a centrali8ed ser*er t(at e*eryone is accessing at t(e same time

from t(eir computers at t(eir desks or e*en from t(eir (ome. es accessing a +AN from

(ome is possible too. Accessing a +AN is possible t(ese days from nearly anyw(ere a

 person can get a cell p(one signal since t(ere are now cards t(at you can insert into your

computer and access t(e internet w(ic( mig(t also (a*e t(e +AN connected to it. So e*en

t(oug( t(e title is +AN it isn@t necessarily all t(at +ocal. " t(ink you get t(e idea now of

t(e purpose of a +AN. )(e safety aspect is great for a +AN also as t(e Network !anager

is usually in c(arge of backing up all t(e data. )(ese assure t(at all t(e work t(at

e*eryone does won2t be lost s(ould t(e ser*er cras( or get (acked or some ot(er disasters

occur. )(at is w(y good Network !anagers store t(e company data in a safety deposit

 bo4 on a daily basis.

 

Implementation & Setup'

ireless communications allows us to li*e and work in ways ne*er before possible,

offering us fle4ibility, mobility and a link to our en*ironment t(at is almost magical.

Anybody t(at uses cordless or cellular p(ones, pagers, ); remote controls, keyless car

entry, or garage door openers will readily agree. (ile telecommunications and computer 

networking (a*e *astly increased our options on (ow and w(at we communicate, t(ey

(a*e p(ysically constrained us by leas(ing us wit( a p(ysical wire to t(e network. But

wireless communications brings us back to a form of communications t(at is in(erently

natural to us. As creatures we do not like to be p(ysically constrained. Human speec(

itself, despite its limited range, is wireless.

"ES !anagement &ollege and 'esearc( &entre, !umbai

8/12/2019 Inst Mim s4 Spm a1 Mi-12-10 Sandeep Mauriya

http://slidepdf.com/reader/full/inst-mim-s4-spm-a1-mi-12-10-sandeep-mauriya 20/30

Ris Mana$ement & Contin$enc! plan'

&onnecting computers to networks significantly increases risk. Networks connect large

numbers of users to s(are information and resources, but network security depends

(ea*ily on t(e cooperation of eac( user. Security is as strong as t(e weakest link. Studies

(a*e s(own t(at most of t(e abuses and frauds are carried out by aut(ori8ed users, not

outsiders. As t(e number of +ANs and ANs increase, cost#effecti*e security becomes a

muc( more significant issue to deter fraud, waste, and abuse and to a*oid embarrassment.

(at t(eir security concerns s(ould be, and (ow to resol*e t(eir concerns. e will begin

 by introducing t(e concept of risk management and touc( on basic requirements for

 protecting +ANs. )(is will be followed by a summary of +AN components and features

t(at will ser*e as a foundation for determining security requirements. +AN security

requirements will t(en be discussed in terms of t(e risk assessment process, followed by

a detailed discussion of (ow to implement +AN security in a step#by#step approac(. )(is

s(ould pro*ide t(e necessary guidance in applying security procedures to specific

+AN0AN security risks and e4posures.

R(I & )uration'

':" analysis for any tec(nology typically in*ol*es calculations t(at s(ow (ow a gi*en

solution sa*es money, makes money or bot(. ireless +AN ':" analysis is no e4ception.

Howe*er, t(e e4periences reported by t(ose w(o deploy it *ary dramatically.

"n planning your +AN ':", you must address a few key questions

Q Are you c(oosing between wireless and wired for a new +AN installationR :r are you

deciding simply w(et(er or not to add a +AN to an e4isting wired +ANR

Q Are you deploying in isolated workgroups, or are you building an enterprise solution

>w(ic( will require deploying access points not =ust for client connections but possible

also for point#to#point links?R

"ES !anagement &ollege and 'esearc( &entre, !umbai

8/12/2019 Inst Mim s4 Spm a1 Mi-12-10 Sandeep Mauriya

http://slidepdf.com/reader/full/inst-mim-s4-spm-a1-mi-12-10-sandeep-mauriya 21/30

Q How mobile are your employeesR 3o t(ey need to mo*e around frequently during t(e

workdayR 3o t(ey work in eac( ot(er@s officesR 3o t(ey (a*e working meetings w(ere

access to ser*er#based applications can be importantR

*p$ra)e or Chan$e'

)(e speed of your network affects nearly e*ery de*ice on your (ome network, w(et(er it

 be a (ome#t(eater &, an e4ternal storage de*ice, or a gaming console. 7or most

networks, t(e transfer rate of a faster Et(ernet connection >roug(ly 1$.6 megabytes per

second? is t(e typical speed limit. )(at may be okay for transferring ordinary files, but it@s

 painfully slow if you@re trying to back up a & to a network de*ice, for e4ample, or to

stream a (ig(#definition mo*ie to your li*ing room.

)(e solutionR !o*e up to a gigabit network. Switc(ing o*er to gigabit >1%%%#!bps?

speeds increases your potential t(roug(put tenfold, minimi8ing your transfer times and

greatly en(ancing your ability to stream (ig(#bandwidt( files to connected de*ices

wit(out interference. Cigabit networking is now a sufficiently common feature of modern

networking de*ices t(at it s(ouldn@t carry too great a cost premium. As for your

mot(erboards, t(e odds are good t(at t(ey already (a*e gigabit functionality built in,

w(et(er you know it or not. Before we go any furt(er, " s(ould note t(at t(is guide does

not apply to wireless networks9 t(e factors t(at constrain speeds on wireless networks are

entirely different from t(ose t(at limit speeds on wired networks.

"ES !anagement &ollege and 'esearc( &entre, !umbai

8/12/2019 Inst Mim s4 Spm a1 Mi-12-10 Sandeep Mauriya

http://slidepdf.com/reader/full/inst-mim-s4-spm-a1-mi-12-10-sandeep-mauriya 22/30

+. -us Topolo$!

About'

A bus network uses a multi#drop transmission medium, all node on t(e network s(are a

common bus and t(us s(are communication. )(is allows only one de*ice to transmit at a

time. A distributed access protocol determines w(ic( station is to transmit. 3ata frames

contain source and destination addresses, w(ere eac( station monitors t(e bus and copies

frames addressed to itself.

A bus topology connects eac( computer >nodes? to a single segment trunk >a

communication line, typically coa4 cable t(at is referred to as t(e @bus@. )(e signal tra*els

from one end of t(e bus to t(e ot(er. A terminator is required at eac( to absorb t(e signal

so as it does not reflect back across t(e bus. A media access met(od called &S!A0!A is

used to (andle t(e collisions t(at occur w(en two signals placed on t(e wire at t(e same

time. )(e bus topology is passi*e. "n ot(er words, t(e computers on t(e bus simply @listen@

for a signal9 t(ey are not responsible for mo*ing t(e signal along.

Purpose'

)(e bus topology is one of t(e four main topology types for networking. "t allows

systems to be connected in a straig(t line wit(out any ot(er network connecti*ity de*ices.

As a result, it is easy to construct and needs *ery little in t(e way of configuration, and is

ine4pensi*e compared to ot(er topologies. )(e main result of any topology is to connect

clients toget(er in order to s(are resources.

)(e bus is t(e data link in a bus network. )(e bus can only transmit data in one direction,

and if any network segment is se*ered, all network transmission ceases.

A (ost on a bus network is called a station or workstation. "n a bus network, e*ery station

recei*es all network traffic, and t(e traffic generated by eac( station (as equal

transmission priority. Eac( network segment is, t(erefore, a collision domain. "n order for 

nodes to transmit on t(e same cable simultaneously, t(ey use a media access control

tec(nology suc( as carrier sense multiple access >&S!A? or a bus master.

"ES !anagement &ollege and 'esearc( &entre, !umbai

8/12/2019 Inst Mim s4 Spm a1 Mi-12-10 Sandeep Mauriya

http://slidepdf.com/reader/full/inst-mim-s4-spm-a1-mi-12-10-sandeep-mauriya 23/30

Implementation & Setup'

All workstations connect to t(e same cable segment commonly used for implementing

Et(ernet at 1%mbps t(e cable is terminated at eac( end wiring is normally done point to

 point a faulty cable or workstation will take t(e entire +AN down two wire, generally

implemented using coa4ial cable during t(e 1FG%@s.

)(e bus cable carries t(e transmitted message along t(e cable. As t(e message arri*es at

eac( workstation, t(e workstation computer c(ecks t(e destination address contained in

t(e message to see if it matc(es its own. "f t(e address does not matc(, t(e workstation

does not(ing more.

"f t(e workstations address matc(es t(at contained in t(e message, t(e workstation

 processes t(e message. )(e message is transmitted along t(e cable and is *isible to all

computers connected to t(at cable.

)(ere are )H'EE common wiring implementations for bus networks

1%Base$ >t(in#net, &(eaperNet? 6%#o(m cable using BN& ) connectors, cards pro*ide

transcei*er.

1%Base6 >)(ickNet? 6%#o(m cable using 16#pin A-" 3#type connectors and e4ternal

transcei*ers.

1%Base) >-)? -) cable using '/6 connectors and a wiring centre.

Maintenance #Re$ular & %mer$enc!'

A bus topology in more tec(nical terms means t(at it is a met(od of transmission on

networks t(at uses a common *e(icle for transmissions and t(us it is categori8ed as

s(ared communication. "magine a bus picking up *arious people from one stop and

dropping of people as it tra*els and t(en picking a few more. )(at is w(at (appens in a

 bus network e4actly.

A bus topology in more tec(nical terms means t(at it is a met(od of transmission on

networks t(at uses a common *e(icle for transmissions and t(us it is categori8ed as

"ES !anagement &ollege and 'esearc( &entre, !umbai

8/12/2019 Inst Mim s4 Spm a1 Mi-12-10 Sandeep Mauriya

http://slidepdf.com/reader/full/inst-mim-s4-spm-a1-mi-12-10-sandeep-mauriya 24/30

s(ared communication. "magine a bus picking up *arious people from one stop and

dropping of people as it tra*els and t(en picking a few more. )(at is w(at (appens in a

 bus network e4actly.

3ifficult to administer0troubles(oot. +imited cable lengt( and number of stations. "f t(ere

is a problem wit( t(e cable, t(e entire network goes down. !aintenance costs may be

(ig(er in t(e long run. erformance degrades as additional computers are added or on

(ea*y traffic. roper termination is required.>loop must be in closed pat(?. "f many

computers are attac(ed, t(e amount of data flowing causes t(e network to slow down.

Significant &apaciti*e +oad >eac( bus transaction must be able to stretc( to most distant

link?.

Ris Mana$ement & Contin$enc!'

)(e t(ree#tier network (as dominated t(e data centre since t(e late 1FF%s, but recent

mo*es toward a *irtuali8ed, ser*ice#oriented, con*erged infrastructure (as spawned

demand for a flat network topology t(at (ad been abandoned years ago.

7lat network belie*ers say t(at reducing t(e number of switc(ing tiers enables t(e kind of 

any#to#any connecti*ity between ser*ers and nodes on t(e network t(at allows for rapid

and automated ;! migration. )(ey also say it will diminis( latency and could ultimately

reduce management o*er(ead.

"n t(is guide, we e4plore t(e considerations t(at network arc(itects took before mo*ing

into flat networks, as well as related tec(nologies suc( as network fabrics and *irtual

cluster switc(ing t(at enable deeper manageability in a flat network topology.

R(I & )uration'

)(e +inear Bus is a multi#access topology w(ere all de*ices connect to or tap into a

single common backbone. )(is results in a contention based en*ironment w(ere all

de*ices broadcast t(eir messages on t(e backbone and all frames are *isible to all de*ices

on t(e bus backbone. )(is multi#access s(ared medium requires protocols to manage

transmissions in an effort to ma4imi8e t(roug(put. )(e &arrier Sense, !ultiple Access

"ES !anagement &ollege and 'esearc( &entre, !umbai

8/12/2019 Inst Mim s4 Spm a1 Mi-12-10 Sandeep Mauriya

http://slidepdf.com/reader/full/inst-mim-s4-spm-a1-mi-12-10-sandeep-mauriya 25/30

wit( &ollision 3etect >&S!A0&3? protocol is a good e4ample of t(e requisite

management protocols and will be discussed in Et(ernet and &S!A0&3. )(e ability for

e*ery de*ice to read all frames ob*iously introduces security concerns. )(e bus is also

susceptible to a single point of failure and t(erefore suffers from a*ailability concerns.

)(e bus is a relati*ely simple and ine4pensi*e implementation requiring minimal

administration if designed and implemented according to best practices >e.g. ad(ering to

ma4imum cable lengt( constraints, limiting t(e number of users based on t(eir

transmission requirements, etc.?. )(e ends of t(e backbone cable must be properly

terminated to ensure t(e signal is absorbed rat(er t(an being reflected back as t(is will

seriously (amper communications. Network designers can e4tend t(e bus topology

t(roug( t(e use of layer one (ubs also known as multiport repeaters. Hubs can en(ance a

network2s resiliency as a centrali8ed de*ice and dedicated cable can o*ercome single

 points of failure. "t must be noted t(at layer one de*ices do not parse or process frames

and t(erefore do not logically segment collision domains.

*p$ra)e or Chan$e'

ou are asked to upgrade a bus topology +AN at a friend2s (ouse to a star topology +AN.

our friend wants to connect t(ree computers and a printer and use t(e Et(ernet access

met(od. His computers do not contain wireless N"&@s. At minimum, w(ic( of t(e

following de*ices must you add to (is current networking (ardwareR

)(e type of network topology in w(ic( all of t(e nodes of t(e network are connected to a

common transmission medium w(ic( (as more t(an two endpoints t(at are created by

adding branc(es to t(e main section of t(e transmission medium P t(e p(ysical

distributed bus topology functions in e4actly t(e same fas(ion as t(e p(ysical linear bus

topology >i.e., all nodes s(are a common transmission medium?.

"ES !anagement &ollege and 'esearc( &entre, !umbai

8/12/2019 Inst Mim s4 Spm a1 Mi-12-10 Sandeep Mauriya

http://slidepdf.com/reader/full/inst-mim-s4-spm-a1-mi-12-10-sandeep-mauriya 26/30

%2uipments

1. Scanner

About'

A scanner is a de*ice t(at captures images from p(otograp(ic prints, posters, maga8ine

 pages, and similar sources for computer editing and display. Scanners come in (and#(eld,

feed#in, and flatbed types and for scanning black#and#w(ite only, or color. ;ery (ig(

resolution scanners are used for scanning for (ig(#resolution printing, but lower

resolution scanners are adequate for capturing images for computer display. Scanners

usually come wit( software, suc( as Adobe@s (otos(op product, t(at lets you resi8e and

ot(erwise modify a captured image.

Scanners usually attac( to your personal computer wit( a Small &omputer System

"nterface > S&S" ?. An application suc( as (otos(op uses t(e )A"N program to read in

t(e image.

Some ma=or manufacturers of scanners include Epson, Hewlett#ackard, !icrotek, and

'elisys.

Purpose'

:ne of t(e most useful and underutili8ed tools in t(e modern office is t(e scanner.

!odern scanners are easy to use and as *ersatile as your imagination. Since many (ome#

use printers come wit( built#in scanners, many people (a*e scanners in t(eir (omes t(at

t(ey (a*e ne*er used.

)(e main purpose of Scanner Equipment#1. aper 7ile 'eduction

$. (otos

5. :ptical &(aracter 'ecognition

/. 7a4 'eplacement

"ES !anagement &ollege and 'esearc( &entre, !umbai

8/12/2019 Inst Mim s4 Spm a1 Mi-12-10 Sandeep Mauriya

http://slidepdf.com/reader/full/inst-mim-s4-spm-a1-mi-12-10-sandeep-mauriya 27/30

Implementation & Setup'

)(e Scanner can be installed on t(e computer t(roug( scanner dri*er. :nce t(e particular

scanner dri*er (as been installed t(en we can use t(e scanner on t(at computer.

Maintenance #Re$ular & %mer$enc!'

!aintenance "ncludes

$ 7eed !odules

$ Separation 'ollers

1% 'eplacement Strips

6% 'eplacement Strips

 Nominal tire life is appro4imately $6%,%%% documents, depending on paper types,

en*ironment and scanner cleanliness.

'isk !anagement J &ontingency plan#

)(e scanned image quality s(ould be in proper format. 'isk factor of t(is is manage

 properly by different scanner.

R(I & )uration'

)(e ':" of t(e scanner is more t(an t(e in*estment because it manage t(e company

important documents.

*p$ra)e or Chan$e'

Scanning is a new system in !ass Effect $ t(at replaces dri*ing wit( t(e !ako and

searc(ing for t(e minerals inland, from t(e first game. Scanning becomes a*ailable w(en

t(e Normandy S'#$ enters t(e orbit of any planet not in*ol*ed in a main storyline

mission, at w(ic( point you@ll be prompted to start t(e scan. :nce begun t(e planet will

"ES !anagement &ollege and 'esearc( &entre, !umbai

8/12/2019 Inst Mim s4 Spm a1 Mi-12-10 Sandeep Mauriya

http://slidepdf.com/reader/full/inst-mim-s4-spm-a1-mi-12-10-sandeep-mauriya 28/30

 be o*erlaid wit( a rectangular grid. ou may t(en press and (old anot(er button to begin

a mineral scanner w(ic( is slower t(an t(e main scanner, t(oug( its speed can be

upgraded slig(tly. A data column will appear on t(e side of t(e screen and you t(en mo*e

t(e scanner around until t(e data column spikes, indicating t(e presence of minerals at t(e

scanner@s current location. ou may t(en fire a probe at t(e deposit w(ic( will in turn add

t(e minerals to your stores.

+. /ebcam

About'

A webcam is a *ideo camera t(at feeds its image in real time to a computer or computer

network. -nlike an " camera >w(ic( uses a direct connection using et(ernet or i#7i?, a

webcam is generally connected by a -SB cable, 7ireire cable, or similar cable.

)(eir most popular use is t(e establis(ment of *ideo links, permitting computers to act as

*ideop(ones or *ideoconference stations. )(e common use as a *ideo camera for t(e

orld ide eb ga*e t(e webcam its name. :t(er popular uses include security

sur*eillance, computer *ision, *ideo broadcasting, and for recording social *ideos.

)(e first web cam was de*eloped in 1FF1 and was used by scientists at &ambridge

-ni*ersity to determine if t(ere was coffee a*ailable in anot(er location.

Purpose'

so t(e ot(er person on anot(er computer can see you w(en t(ey are talking to you and

capturing t(e images.

"ES !anagement &ollege and 'esearc( &entre, !umbai

8/12/2019 Inst Mim s4 Spm a1 Mi-12-10 Sandeep Mauriya

http://slidepdf.com/reader/full/inst-mim-s4-spm-a1-mi-12-10-sandeep-mauriya 29/30

Implementation & Setup'

)(e implementation is *ery of webcam, we only (a*e connected to t(e -SB port and

camera will be started. )(ere is not any specific setup is required for t(is. :nly plug and

 play equipment.

Maintenance #Re$ular & %mer$enc!'

)(e Skyline ebcams are constantly monitored by a ser*er able to sol*e any ordinary

 problem, w(en t(is is not possible an operator will be immediately informed.

)(e webcams need electric current and A3S+ connection, sometimes it occurs t(at t(is is

momentarily not supplied due to maintenance works or lack of A3S+. !oreo*er,

ordinary and special maintenance works may occur, so t(at some webcams could be

momentarily not a*ailable, usually for a brief period sometimes for a longer period of

time. "t is not necessary to report it9 our ser*er will immediately inform our tec(nical

staff.

Ris Mana$ement & Contin$enc! plan'

ebcams are low#cost computer perip(erals t(at feed *ideo images to a computer or

network in real time. )(ey may connect *ia -SB, wireless connection or E(ernet.

ebcams enable *ideo conferencing, allow users to monitor a space for security or

entertainment purposes, and can record still pictures and *ideo clips. )(ey come in

se*eral ma=or types.

R(I & )uration'

ebsite designers can add a cost effecti*e webcam feature for t(eir clients using our

ser*ice and in addition, we can e4c(ange website links, if you wis(, to increase our

mutual link popularity wit( Coogle. e will e*en pro*ide a custom &am secure camera

 page for your webcam wit( 7'EE ad*ertising for your website at no e4tra cost.

"ES !anagement &ollege and 'esearc( &entre, !umbai

8/12/2019 Inst Mim s4 Spm a1 Mi-12-10 Sandeep Mauriya

http://slidepdf.com/reader/full/inst-mim-s4-spm-a1-mi-12-10-sandeep-mauriya 30/30

*p$ra)e or chan$e'

)(e webcam can be upgraded timely. )(e recent *ersion is a*ailable on t(e net.

"f you are tired of t(e =agged looking image you are getting from your Skype calls or

ot(er ;ideo &onferencing, t(e H3 webcam is a*ailable in t(e today2s market.