1 For all useful updates, vi sit at http://ignousolvedmbaassignment.blogspot.com/ASSIGNMENT Course Code : MS-07 Course Title : Information Systems for Managers Assignment No. : MS-07/SEM-I/20 11 Coverage : All Blocks Note:Answer all the questions and send them to the Coordinator of the Study Centre you are attached with. 1.Explain the difference between the following: a.High-Level and Low level languages b.Applications and Utilities c.Shareware, Open source software, Freeware Solved: a) High level and low level languagesThe most basic difference is t hat the statements in a low level language can be directly mapped to processor instructions, while a single statement in a high level language may execute dozens ofinstructions. Low level refers to the fact that this is a machine language, binary in form, generally meaning one low level command = one executed instruction. The complexity arises when we need to enable a programmer to designate one high level instruction that performs several or many machine (low level) operations. Low Level Languages: Assembler and Advanced Assembler High Level Languages: RPG, COBOL, any that make machine level programming of a computer easier. a high level language is a language for programming computers which does not require detailed knowledge of a specific computer, as a low-level language does.High-level languages do not have to be written for a particular computer, but must be compiled for the computer they will work with.High-level languages are closer to human language than low-level languages, and include statements like GOTO or FOR which are regular words On the other hand, a low level language is a computer programming language that is close to machine language.Machine language is at the lowest level, because it is the actual binary code of 1s and 0s that the computer understands.Assemb ly languages are low- level languages which are translated into machine
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
For all useful updates, visit at http://ignousolvedmbaassignment.blogspot.com/
ASSIGNMENT
Course Code : MS-07
Course Title : Information Systems for Managers
Assignment No. : MS-07/SEM-I/2011
Coverage : All Blocks
Note: Answer all the questions and send them to the Coordinator of the Study Centre you are attached
with.
1. Explain the difference between the following:
a. High-Level and Low level languagesb. Applications and Utilitiesc. Shareware, Open source software, Freeware
Solved: a) High level and low level languages
The most basic difference is that the statements in a low level language can be directly mapped to
processor instructions, while a single statement in a high level language may execute dozens of
instructions.
Low level refers to the fact that this is a machine language, binary in form, generally meaning one low
level command = one executed instruction.
The complexity arises when we need to enable a programmer to designate one high level instruction that
performs several or many machine (low level) operations.
Low Level Languages: Assembler and Advanced Assembler
High Level Languages: RPG, COBOL, any that make machine level programming of a computer easier.
a high level language is a language for programming computers which does not require detailed
knowledge of a specific computer, as a low-level language does.High-level languages do not have to be
written for a particular computer, but must be compiled for the computer they will work with.High-levellanguages are closer to human language than low-level languages, and include statements like GOTO or
FOR which are regular words
On the other hand, a low level language is a computer programming language that is close to machine
language.Machine language is at the lowest level, because it is the actual binary code of 1s and 0s that the
computer understands.Assembly languages are low- level languages which are translated into machine
For all useful updates, visit at http://ignousolvedmbaassignment.blogspot.com/
these kinds of user-oriented or output-oriented functionality, utility software usually focuses on how the
computer infrastructure (including the computer hardware, operating system, application
software and data storage) operates. Due to this focus, utilities are often rather technical and targeted at
people with an advanced level of computer knowledge.
Most utilities are highly specialized and designed to perform only a single task or a small range of tasks.
However, there are also some utility suites that combine several features in one piece of software.
Most major operating systems come with several pre-installed utilities.
Utility software categories
Disk storage utilities
Disk defragmenters can detect computer files whose contents are broken across several locations onthe hard disk, and move the fragments to one location to increase efficiency.
Disk checkers can scan the contents of a hard disk to find files or areas that are corrupted in some
way, or were not correctly saved, and eliminate them for a more efficiently operating hard drive.
Disk cleaners can find files that are unnecessary to computer operation, or take up considerable
amounts of space. Disk cleaner helps the user to decide what to delete when their hard disk is full.
Disk space analyzers for the visualization of disk space usage by getting the size for each folder
(including sub folders) & files in folder or drive. showing the distribution of the used space.
Disk partitions can divide an individual drive into multiple logical drives, each with its own filesystem which can be mounted by the operating system and treated as an individual drive.
Backup utilities can make a copy of all information stored on a disk, and restore either the entire disk
(e.g. in an event of disk failure) or selected files (e.g. in an event of accidental deletion).
Disk compression utilities can transparently compress/ uncompress the contents of a disk, increasing
the capacity of the disk.
File managers provide a convenient method of performing routine data management tasks, such as
deleting, renaming, cataloging, uncataloging, moving, copying, merging, generating and modifying
data sets.
Archive utilities output a stream or a single file when provided with a directory or a set of files.
Archive utilities, unlike archive suites, usually do not include compression or encryption capabilities.
Some archive utilities may even have a separate un-archive utility for the reverse operation.
System profilers provide detailed information about the software installed and hardware attached to
For all useful updates, visit at http://ignousolvedmbaassignment.blogspot.com/
2. Discuss the relationship between data and information, information and knowledge. Also explainthe concepts of cost and value of information by the help of an example.
Solution : The Relationship Between Data And Information
The relationship between data and information is an interconnected one. Data is raw facts such as phonenumbers or addresses, and information is the organization of these raw facts into a meaningful manner.
The information may be well organized on a report or table and yet not always be meaningful to allpeople. There are different ways to arrange data to make it meaningful for different people. For example,one person might be satisfied with information that shows him or her the towns in which their customerslive in to help him or her determine where the largest volume of customers are. A different person mightwant that information expanded to include those customers street addresses as well so that they maydetermine a better shipping route. Both of these examples contain the same customers and similar data butthe first person would have no use for the street addresses in his search and the second person would nothave enough information to create a shipping route from just the towns.
The type of data used can also affect the information generated. You can gather a great deal of data on theneeds of plants to grow but if you do not put the data in the table correctly or put inaccurate data in youwill get information that is basically useless. That is the garbage in/ garbage out theory. It is also a goodidea when creating a table to group the like characteristics together to make it easier to gather informationfrom the data. Computers now make it easier to input data into tables in a meaningful manner to createinformation that might be useful to someone.
It is now easier to manipulate data and examine it in many different ways from many different points of view quickly. It is in man’s nature to gather data and group things together according to similar data togenerate information that is useful for what they are doing. An example would be similar to one show inthe study guide. An employer is looking for an employee that lives in the Trenton area and speaksSpanish. The older way to find this information was to look through each record and look for the pertinent
data that they are looking for. Then they went to card readers, which was faster but still time consuming.The employer would input all the employee’s cards into a reader and set it to look for those with the rightcriteria. The card reader would then generate information from the data that the employer needs. Thecomputer however is much more efficient. Provided that all information was put into the computercorrectly, the employer can now ask the computer to search for this data and tell it to generate a report.The time is significantly shorter than waiting for the card reader to look through all though cards.
The relationship between Information & knowledge
Information: data that are processed to be useful; provides answers to "who", "what", "where", and"when" questions
Knowledge: application of data and information; answers "how" questions
Information... information is data that has been given meaning by way of relational connection. This"meaning" can be useful, but does not have to be. In computer parlance, a relational database makesinformation from the data stored within it.
For all useful updates, visit at http://ignousolvedmbaassignment.blogspot.com/
Knowledge... knowledge is the appropriate collection of information, such that it's intent is to be useful.Knowledge is a deterministic process. When someone "memorizes" information (as less-aspiring test-bound students often do), then they have amassed knowledge. This knowledge has useful meaning tothem, but it does not provide for, in and of itself, an integration such as would infer further knowledge.For example, elementary school children memorize, or amass knowledge of, the "times table". They cantell you that "2 x 2 = 4" because they have amassed that knowledge (it being included in the times table).
But when asked what is "1267 x 300", they can not respond correctly because that entry is not in theirtimes table. To correctly answer such a question requires a true cognitive and analytical ability that is onlyencompassed in the next level... understanding. In computer parlance, most of the applications we use(modeling, simulation, etc.) exercise some type of stored knowledge.
Fig: This figure shows the relationship among data, information, knowledge and wisdom
For all useful updates, visit at http://ignousolvedmbaassignment.blogspot.com/
The concepts of cost and value of information
The decision theory suggests the method of solving the problems of decision making under
certainly risk & uncertainly.
A decision making situation is of certainly when the decision maker has full knowledge about the
alternatives & its outcomes this is possible when perfect information is available. Therefore theinformation has a perceived value in term of decision making.
The decision makes full more secured when additional information is received in case of decision
making under an uncertainly or a risk.
The information is called a perfect information if it wipes out uncertainly or risk completely.
However perfect information is myth.
The decision theory stipulates that the values of the additional information Is the value of the
change in the decision behavior resulted by the information less the cost of obtaining the
information.
If the additional information does not cause any change in the decision behavior then the value of
the additional information is zero. The value of the additional information making the exiting
information perfect (VPI) is:
VPI = ( V2 - V1 ) – ( C2 - C1 )
Where, V is the value of the information,
C is the cost of obtaining the information
V1 & C1 relate to one set of information and
V2 & C2 relate to the new set of information
If the VPI is very high then it is beneficial to serve the additional information need.
If Manager does not know the perfect information about the decision situation then he is faced
with the problem of decision making under uncertainly or risk conditions.
Given a set of the possible decisions a decision maker will select one of the bases of the available
information causes a change in the decision then the value of the new information is the
difference in the value between the outcome of the old decision & that of new information
So information has a value only to those who have the background knowledge to use it in a
decision.
The experienced manager generally uses the information most effectively but he may need less
information as experience has already reduced uncertainly for him when compared to a less
experienced manager.
In MIS the concept of the value of information is used to find out the benefit of perfect
information & if the value is significantly high, the system should provide it. If the value if
insignificant it would not be worth collecting the additional information.
For all useful updates, visit at http://ignousolvedmbaassignment.blogspot.com/
3. Explain the major marketing subsystems and enumerate the advantages of the use of computers insuch subsystems.
Solution : A business information system is the sum of all the tools, techniques, and procedures used by
the business to process data Such a system accepts input data about the business and generates required or
desired output information. These tools, techniques, and procedures may be carried out manually or by acomputer. Most information systems are made up of component subsystems and applications or modules
that are designed to process data in specific areas of business activity. Any business information system
can be divided into processing systems of narrower scope which accept input data, process it, and interact
with each other to produce output information and files of data.
Components of an Information System
The same fundamental ideas apply to both computer-based systems and to manual systems. Indeed, the
component parts of computer-based systems generally parallel those of manual systems since the goals of
both are fundamentally the same. It is realistic to view the activities and data of most businesses as falling
into four major categories cash inflows and outflows, sales and purchases, financial accounting and
budgeting, and manufacturing (cost) accounting. A computer-based information system can then be
logically as viewed consisting of four component subsystems that are identifiable and distinguishable, but
not isolated from one another. Each of these subsystems processes data from a certain area of business
activity, however, each depends upon the other, and reformation must flow between them for the
computer-based system to work.
Figure 1 illustrates the conceptual relationships and the logical flow of business information between
component subsystems and their application modules. As you examine this figure, consider the following
significant points:
1. The entire figure represents a computer-based business reformation system It is composed of four
distinct, but interrelated component subsystems which are represented by the large curved shapes.
2. The major components of such an information system are:
For all useful updates, visit at http://ignousolvedmbaassignment.blogspot.com/
3. Each major component, in turn, consists of specific processing applications or modules which are
represented by the rectangular figures. It is these application modules that are the basic braiding blocks of
an information system.
4. It is important to note that information flow between modules is absolutely necessary in a computer-based information system. The arrows indicating reformation flow which intersect the curved shapes
demonstrate that all systems interact with each other through the modules that make up the systems.
5. The conceptual differences between information systems and accounting systems should become
clearer after careful study of Figure 1. Accounting systems process only certain kinds of events, called
transactions, because of the basic assumptions on which accounting is based Information systems, on the
other hand, are capable of processing any information (i e, more than just accounting transactions) that is
useful to management or any other user of the system.
Interdependence of Components
The necessary flow of information between applications makes it unlikely that any individual module, or
even any component subsystem, can successfully stand alone or operate independently. Each of these
modules provide the necessary "environment" for the other. Many processing applications use the same
basic data as input, but require that the data be organized or accessed differently. By the same token, the
output of some applications may be used as input for other applications.
This commonality of data needs makes it possible for a business system to create a basic set of data whichis available to all processing applications and flexible enough to be referenced by these modules in many
different ways. Such a set of data within reach of all processing applications for their use is, of course, a
data base Instead of each application organizing and storing all of its own data (which would necessarily
result in redundancy and duplication throughout the system), the data base concept extracts data that is
common to many application modules and makes it accessible to all. Only with the aid of a computer's
speed and memory is this possible, thus, implementation of the data base idea in a manual system is
generally not feasible.
Important Characteristics of an Information System
All processing applications of business reformation systems have some important characteristics in
common These fundamental ideas can be summarized as follows.
Output reports From each application module some output will be generated to provide information on
which decisions can be based or statements to meet the business' reporting requirements Although it is
For all useful updates, visit at http://ignousolvedmbaassignment.blogspot.com/
modules provide the necessary "environment" for the other. Many processing applications use the same
basic data as input, but require that the data be organized or accessed differently. By the same token, the
output of some applications may be used as input for other applications.
This commonality of data needs makes it possible for a business system to create a basic set of data whichis available to all processing applications and flexible enough to be referenced by these modules in many
different ways. Such a set of data within reach of all processing applications for their use is, of course, a
data base Instead of each application organizing and storing all of its own data (which would necessarily
result in redundancy and duplication throughout the system), the data base concept extracts data that is
common to many application modules and makes it accessible to all. Only with the aid of a computer's
speed and memory is this possible, thus, implementation of the data base idea in a manual system is
generally not feasible.
Important Characteristics of an Information System
All processing applications of business reformation systems have some important characteristics in
common These fundamental ideas can be summarized as follows.
Output reports From each application module some output will be generated to provide information on
which decisions can be based or statements to meet the business' reporting requirements Although it is
conceivable for a package to produce no printed output, this is not likely to occur very often in business
processing. The ability of computer-based systems to provide information which is not available from a
manual system is one of the primary reasons for their existence. Timely and useful management reports
are one of the significant advantages of an information system.
Interaction with other packages The transfer of data between applications (sometimes called interface)
exists to reduce duplication and redundancy in an reformation system. The capabilities of computer
systems make this kind of interchange between modules relatively easy to carry out as compared to
manual systems It is unusual to find an individual computer-based module that is not made more efficient
by accepting some organized and (at least) partially processed data from another module. By the same
token, almost all modules generate some data which can be used by other applications in the system.
Inquiry and response capability. Given the inherent advantages of speed and memory possessed by
computers, much of the benefit of computer-based systems is lost if critical pieces of information are not
available on request from the system. The immediate availability of up-to-date information by direct
inquiry to the system is one of the most significant advantages of computer systems.
For all useful updates, visit at http://ignousolvedmbaassignment.blogspot.com/
Data organization into files. The concepts of file, record, and data-item are essential to every computer-
based application. Since the computer does not have intuition, judgment, or reasoning powers, the
organization of input data must follow a known logical design. This logical design most often results in
each module having access to a permanent master file which is updated with each processing run by a file
of current activity. Although other types of files are sometimes necessary, the basic concept of master and
transaction files is common to all applications.
Data Organization and Input
To generate output reports the computer system must have access to certain input data, and this data must
be organized so that processing can be done efficiently. The input data to any system can be thought of as
falling into three categories.
Constant or Report Files. Relatively permanent data may be used over and over as input to a applicationmodule, but this data is not altered by the processing that takes place and is changed externally only
occasionally. This data may consist of constants, such as tax rates and limits, exemption amounts,
deduction percentages, and so on, or headings and titles to be used in output reports such as financial
statements.
There are two basic approaches to accomplishing this type of constant data input. The simplest approach
is to maintain a different computer program for each set of constants or report to be printed, and to make
headings, titles, subtotal, and total format a part of the program. This approach does, however, require that
the program be changed if a change in permanent data or report format is desired. The other basic
approach to handling permanent data makes it possible to change this data almost at will without the
necessity for altering the computer programs of a system. It involves the creation of a permanent input file
which specifies the constant data to be used or the headings, titles, subtotal, and total format for each
output report. Such a file is often called a constant data or report format file or report writer file.
Master Files. Semipermanent data of a cumulative nature may be input, then processed and changed by
the processing (this is usually called updating), and then become output to be updated again in later
processing. An example of this type of input data are the balances in general ledger accounts. Generalledger data is kept in a file and at the end of each period the account balances are updated for all of the
transactions (increases and decreases) that occurred during the period. The ending balances in each
account would then be stored and become input to the next period's transaction processing. All business
processing modules require at least one file of this kind of data. Files of this type are called master files.
For all useful updates, visit at http://ignousolvedmbaassignment.blogspot.com/
Transaction Files. Current data pertaining to activity of the present period must be processed and then
may or may not be stored in its raw form. This current data represents the basis for the updating of
cumulative (master) files. An example, consistent with the master file discussed above, would be the
accounting transactions that take place during a time period whose effect must ultimately be reflected in
general ledger balances. All business processing involves this type of data input because without current
activity no processing would be necessary. Files of current activity data are called current or transaction
files.
Now that we have an overview of the important characteristics and relationships in a business information
system, the remaining sections will discuss the component subsystems that make-up the total system.
The Cash Receipts and Disbursements Subsystem
The processing applications of this system are probably the best-known computer-based modules. Theyare usually the first processing applications to be computerized because they are relatively easy to convert
and represent highly visible activity areas for most businesses.
Accounts Receivable and Accounts Payable
The cash receipts and disbursements subsystem stands between (in an information flow sense) the other
major component subsystems. The accounts receivable and accounts payable applications receive input
from the sales and purchases subsystem and provide output to that system. Since accounts receivable are
affected by both sales and cash receipts, and accounts payable are affected by purchases and cashdisbursements, this interaction is not surprising. In addition, the receivables and payables modules
produce essential transaction processing information for inclusion in the general ledger by the financial
accounting/budgeting subsystem.
Payroll
The payroll application is interesting because it represents the closest thing to a stand-alone module in
business systems. Payroll applications can and sometimes do exist as the sole computerized area of
business activity, since no input from other areas may be necessary for the module to work. However, as
business activity becomes more complex and sales or other activity-related variables become important
factors in the determination of compensation, data from the sales and purchases subsystem may become
either very desirable or absolutely necessary input to the payroll package. The most common example of
this type of situation is a company with a large sales payroll where sales pay is based primarily on
commissions. Here, input from a sales analysis module is essential to payroll since, at the very least, a
For all useful updates, visit at http://ignousolvedmbaassignment.blogspot.com/
breakdown of sales by salesperson is needed for the payroll calculation. Also, payroll processing does
generate output information to be included in the general ledger.
The Sales and Purchases Subsystem
These modules represent the point of original data entry into the information system for many important
transactions and events. As such, there is significant information flow among the individual modules
which make up the sales and purchases subsystem as well as between these modules and those of the cash
receipts and disbursements and manufacturing subsystems. In addition, there is limited one-way
information flow from this system to the financial accounting system.
Order Processing and Inventory Management
The sales and purchases subsystem interacts significantly with the cash receipts and disbursements
subsystem. There is an 'important pairing of packages between these component systems. Order
processing and accounts receivable combine to process data on sales and cash receipts, while inventory
management and accounts payable combine to process data on purchases and cash disbursements. For
example, sales invoice summary information is passed from order processing, where these invoices are
created, to accounts receivable so that the customer master file can be updated.
At the same time, information on the status of individual customer accounts can be returned to order,
processing to aid in sales order and credit granting decisions. Similarly, accounts payable receives
purchase invoice summaries from inventory management, where they are created, in order to update thevendor master file and returns vendor activity breakdowns which aid in making purchasing decisions.
Sales Analysis
Sales analysis is the only application of the sales and purchases subsystem which directly interacts with
the financial accounting/budgeting system. Data from order processing and inventory management are
ultimately included in the general ledger, but only after being processed and summarized by the cash
receipts and disbursements subsystem. Output from sales analysis, however, is incorporated into the
budgeting function directly, so that detailed comparisons of performance by product, territory,
salesperson, customer, or other basis can be readily made. Also, this sales analysis output provides a
sound basis for the preparation or revision of future financial budgets. Sales analysis by salesperson can
also be used in the calculation of payroll where compensation is based on commissions. Because most
detailed data on sales and collections is processed and stored in accounts receivable, important
information flow also takes place between sales analysis and accounts receivable.
For all useful updates, visit at http://ignousolvedmbaassignment.blogspot.com/
Components of a Financial Accounting/Budgeting System
In many ways, this is the most basic of the processing systems. It is designed to handle the bookkeeping
and accounting cycle events for a business, from recording transactions to the production of period-end
external financial statements, and reports on the comparison of actual results to budgeted (expected)figures.
General Ledger
The cash receipts and disbursements system provides input to the general ledger application of the
financial accounting/budgeting system. This is necessary because the accounts receivable, accounts
payable, and payroll applications provide much of the data necessary for the creation of the cash receipts
and cash disbursements journals, as well as the sales and purchases journals. Direct system input (i.e., not
from other modules) to the general ledger module would involve those transactions and data that are nothandled by the other processing applications. These transactions would usually be those found in the
company's general journal. Periodically, a listing is produced of all general ledger accounts and beginning
balances, together with a summary of the increase and decrease activity in each account and the resulting
ending balances. A trial balance could then be produced and, at the end of each period, the traditional
accounting financial statements can be produced according to any format specified by the system user.
In addition, detailed listings of all transactions together with posting references can be produced so that an
audit trail of all activity through the system in either direction can be established.
Control and Budgeting
An important part of a financial accounting/budgeting system is the control aspect. Budgeting is an vital
part of any control system and can be accomplished as an extension of financial statement preparation.
The master budget for a business consists of a projected income statement (sometimes called a profit
plan), a statement of projected cash needs (a cash budget), and a projected balance sheet. These pro forma
reports constitute a formal statement of expectations for the future as well as the standard or benchmark
against which actual results will be compared. The financial accounting system can produce budgeted
statements in the same format as actual period-end financial statements so that departures from expected
results in any important revenue, expense, or other category can be disclosed by the system and
highlighted for management analysis and action.
At the same time, information on the status of individual customer accounts can be returned to order,
processing to aid in sales order and credit granting decisions. Similarly, accounts payable receives
For all useful updates, visit at http://ignousolvedmbaassignment.blogspot.com/
Multiple assignment available in C language is not possible. A = B = C does not imply that the values
of A, B and C are equal. The boolean result of "Is B = C?" is stored in A. The result stored in A
would therefore be either false or true.
Boolean constant True has numeric value −1. This is because the Boolean data type is stored as a 16- bit signed integer. In this construct −1 evaluates to 16 binary 1s (the Boolean value True), and 0 as 16
0s (the Boolean value False). This is apparent when performing a Not operation on a 16 bit signed
integer value 0 which will return the integer value −1, in other words True = Not False. This inherent
functionality becomes especially useful when performing logical operations on the individual bits of
an integer such as And,Or, Xor and Not. This definition of True is also consistent with BASIC since
the early 1970s Microsoft BASIC implementation and is also related to the characteristics of CPU
instructions at the time.
Logical and bitwise operators are unified. This is unlike some C-derived languages (such as Perl),
which have separate logical and bitwise operators. This again is a traditional feature of BASIC.
Variable array base. Arrays are declared by specifying the upper and lower bounds in a way similar
to Pascal and Fortran. It is also possible to use the Option Base statement to set the default lower
bound. Use of the Option Base statement can lead to confusion when reading Visual Basic code and
is best avoided by always explicitly specifying the lower bound of the array. This lower bound is not
limited to 0 or 1, because it can also be set by declaration. In this way, both the lower and upper
bounds are programmable. In more subscript-limited languages, the lower bound of the array is not
variable. This uncommon trait does exist in Visual Basic .NET but not in VBScript.
OPTION BASE was introduced by ANSI, with the standard for ANSI Minimal BASIC in the late 1970s.
Relatively strong integration with the Windows operating system and the Component Object Model.
The native types for strings and arrays are the dedicated COM types, BSTR and SAFEARRAY.
Banker's rounding as the default behavior when converting real numbers to integers with
For all useful updates, visit at http://ignousolvedmbaassignment.blogspot.com/
String, and @ for Currency) or using the key phrase As (type). VB can also be set in a mode that only
explicitly declared variables can be used with the command Option Explicit.
…………………………………………………………………………………………………………..
JAVAJava is an object-oriented programming language developed by Sun Microsystems in 1990s. Since then,
Java has gained enormous popularity as a computer language. Java was chosen as the programming
language for network computers. It is a universal front end for enterprise database. Sun Microsystems
states that, ―Java is a simple, object-oriented, distributed, secure, architecture, robust, multi threaded and
dynamic language. The program can be written once, and run anywhere‖. One of the most significant
advantages of Java is that, it has the ability to move easily from one computer to another. It also has the
ability to run the same program on many different operating systems. With such exemplary benefits, Java
is a hot favorite among techies and software professionals.
Java has significant advantages compared to other languages. Java language is easy to use and therefore
easy to write, compile, debug. Moreover, it is easier to learn when compared to other programming
languages. Since Java is object-oriented, it allows you to create modular programs and reusable codes.
Platform-independent, Java is a robust language. The language lays more importance on early checking
for errors, since Java compilers can detect many problems during the time of execution of an application.
Java is multithreaded, since it has the capability for a program to perform several tasks simultaneously
within the same program. Java Development has gained a significant position in the industry with
programmers and developers finding it easier and more effective than many other languages.
Java applications are designed to be compiled and then interpreted at runtime, unlike the conventional
programming languages, which can either compile source code to native code or interpret the source
code. The language itself has borrowed the syntax from C and C++. Java considers security as a part of itsdesign. The Java language, its compiler, interpreter, and runtime environment are all developed with
security. Writing network programs in Java is similar to sending and receiving data to and from a file.
The Java programming language was developed and re-designed for use on the Internet. In the internet
domain, Java’s popularity has increased tremendously, especially on the server side of the Internet.
Nowadays, there are a large number of Java experts who strive for the enhancement and improvement of
Java development. For beginners who are interested in learning Java, the numerous Java tutorials
available online are good to start with. Java tutorials and Java tips are the best resources for learning and
improvising in Java.
Java Developmentexperts are trying to enhance their programming skills for writing secure Java
applications. In order to write a secure code in Java you need to be aware of various things such as data
handling techniques, user authentication rules, access controls etc. JavaScript is a scripting language
which shares a similar name and has the same syntax, but is in no way related to the core Java language.
Few steps are crucial for a secure Java application development. They are logical software design, proper
validation, well planed application development and standardized security test. Java has become the
language of choice world over for providing effective and sure-fire Internet solutions.
For all useful updates, visit at http://ignousolvedmbaassignment.blogspot.com/
HTML
HTML (Hypertext Markup Language) is the set of markup symbols or codes inserted in a file intended fordisplay on a World Wide Web browserpage. The markup tells the Web browser how to display a Webpage's words and images for the user. Each individual markup code is referred to as an element (but manypeople also refer to it as a tag). Some elements come in pairs that indicate when some display effect is to
begin and when it is to end.HTML is a formal Recommendation by the World Wide Web Consortium (W3C) and is generallyadhered to by the major browsers, Microsoft's Internet Explorer and Netscape's Navigator, which alsoprovide some additional non-standard codes. The current version of HTML is HTML 4.0. However, bothInternet Explorer and Netscape implement some features differently and provide non-standard extensions.Web developers using the more advanced features of HTML 4 may have to design pages for bothbrowsers and send out the appropriate version to a user. Significant features in HTML 4 are sometimesdescribed in general as dynamic HTML. What is sometimes referred to as HTML 5 is an extensible formof HTML called Extensible Hypertext Markup Language (XHTML)
HTMLUI is very easy to use with complete designer integration. The control is very powerful, and rich
interfaces can be created with minimal coding. HTMLUI is also suitable for a wide variety of applicationsthat require a flexible user interface. It can be used as a HTML rendering control (example: light-weight
HTML browser, embedded HTML viewer, etc.) or a 'super' layout control (example: rich user interface
with localization support).
IE Independent
HTMLUI is completely independent of Internet Explorer. This provides full independence in defining
the control's appearance and settings. HTMLUI will not be affected by Internet Explorer related security
issues.
Programmatic Access
HTML elements displayed in the current document are exposed as programmatic elements that can be
manipulated from the application code. The elements expose standard events such as Click,
MouseMove and MouseDown. The content and appearance of all elements can be changed from within
code.
Source Code
HTMLUI is written in C# and is available with full source code. The source code can be integrated into
your development environment for debugging. Samples with source code are provided in C# and
For all useful updates, visit at http://ignousolvedmbaassignment.blogspot.com/
in the continuing evolution of ANSI/ISO standard COBOL. COBOL 97 includes conventional
improvements as well as object-oriented features. Like the C++ programming language, object-oriented
COBOL compilers are available even as the language moves toward standardization.
Significant Language Features
The language that automated business Allows names to be truly connotative - permits both long names (up to 30 characters) and word-
connector characters (dashes) Every variable is defined in detail - this includes number of decimal digits and the location of the
implied decimal point File records are also described with great detail, as are lines to be output to a printer - ideal for
printing accounting reports Offers object, visual programming environments Class Libraries Rapid Application Capabilities Integration with the World Wide Web
COBOL, long associated with green screens, core dumps, and traditional mainframe connections, may atfirst glance seem at odds with object technology, push-button graphical interfaces, and interactivedevelopment environments. This perceived incongruity, however, is more a reflection of the mainframe’sability to keep pace with the innovations of desktop and client-server computing than a flaw in theCOBOL language.
Areas of Application
COBOL is ideally suited for the solution of business problems. For example, if a company wanted to keeptrack of its employees’ annual wages, COBOL would be ideal language for implementation. It isinteresting to note that COBOL was the first programming language whose use was mandated bythe Department of Defense (DoD).
003300*003400 MAIN-ROUTINE.003500 OPEN INPUT SALESPERSON-FILE003600 OUTPUT REPORT-FILE003700 MOVE "N" TO WS-EOF-FLAG003800 READ SALESPERSON-FILE003900 AT END MOVE "Y" TO WS-EOF-FLAG004000 END-READ004100*004200 PERFORM UNTIL WS-EOF-FLAG IS EQUAL TO "Y"004300 MOVE SPACES TO REPORT-RECORD004400 MOVE SP-NUMBER TO RT-NUMBER
004500 MOVE SP-NAME TO RT-NAME004600 MOVE SP-CURRENT-SALES TO RT-CURRENT-SALES004700 MOVE SP-CURRENT-RETURNS TO RT-CURRENT-RETURNS004800 WRITE REPORT-RECORD004900 READ SALESPERSON-FILE005000 AT END MOVE "Y" TO WS-EOF-FLAG005100 END-READ005200 END-PERFORM005300*005400 CLOSE SALESPERSON-FILE, REPORT-FILE005500 STOP RUN.
Sample Run
0005 BENNETT ROBERT 1,600.35 12.500016 LOCK ANDREW S 357.72 79.850080 PARKER JAMES E 18,200.00 165.000401 REDDING OLIVIA 16,123.99 2,301.751375 BENTON ALEX J 3,250.00 56.50