Saturday, November 2, 2013

Notes on ICT_DAIBB

November-2010

Computer Virus

A computer virus is a computer program or piece of code that can replicate itself and spread from one computer to another. A computer virus is loaded onto computer without user’s knowledge and runs against his/her wishes. All computer viruses are man-made. A simple virus that can make a copy of itself over and over again is relatively easy to produce. Even such a simple virus is dangerous because it will quickly use all available memory and bring the system to a halt. An even more dangerous type of virus is one capable of transmitting itself across networks and bypassing security systems.

Types of Viruses

There are many types of computer viruses:
  • File virus: Most viruses fall into this category. A virus attaches itself to a file, usually a program file.
  • Boot sector virus: These viruses infect floppy and hard drives. The virus program will load first, before the operating system.
  • Macro Virus: This is a new type of virus that use an application's own macro programming feature to distribute themselves. Unlike other viruses, macro viruses do not infect programs; they infect documents.
  • Virus Hoax: Although there are thousands of viruses discovered each year, there are still some that only exist in the imaginations of the public and the press - known as virus hoaxes.
Disadvantages of computer virus
In the modern world our lives revolve around the computer and the internet. Without these it is simply not possible to envision a single day. We are totally dependent on the technology to get on with our regular activities. In such a scenario anything which threatens the data present in the computer is extremely debilitating indeed. Viruses can really make the life of computer users a living hell. Once they enter the system there is simply nothing to do but to rue the absence of a sturdy firewall. Virus remover programs are really the savior of all those whose lives are totally machine dependent.

Antivirus software has to be installed in the machine if you really give priority to the safety of the data stored there. A computer virus weakens the system, makes it prone to outside attacks of each and every kind. Not only that the machine slows down quite perceptibly and this increase with the length of time, the virus is allowed to remain inside. Virus and malware removal should become the utmost priority once you find that there is an uninvited guest present in your machine. Formatting followed by the addition of good antivirus software are some of the basic steps which need to be taken.

Phishing

Phishing is the act of attempting to acquire information such as usernames, passwords, and credit card details (and sometimes, indirectly, money) by masquerading as a trustworthy entity in an electronic communication. Phishing is a type of online identity theft. It uses email and fraudulent websites that are designed to steal one’s personal data or information such as credit card numbers, passwords, account data, or other information.

Phishing messages usually take the form of fake notifications from banks, providers, e-pay systems and other organizations. The notification will try to encourage a recipient, for one reason or another, to urgently enter/update their personal data. Such excuses usually relate to loss of data, system breakdown, etc.

Digital signature

A digital signature (standard electronic signature) takes the concept of traditional paper-based signing and turns it into an electronic "fingerprint.” This "fingerprint,” or coded message, is unique to both the document and the signer and binds both of them together. A digital signature ensures the authenticity of the signer. Any changes made to the document after it has been signed invalidate the signature, thereby protecting against signature forgery and information tampering. As such, digital signatures help organizations sustain signer authenticity, accountability, data integrity and the non-repudiation of signed electronic documents and forms.

Digital signature software is a powerful business tool that provides your customers, employees, vendors, and other partners the ability to fill out and sign documents online. Contracts, non-disclosure agreements, employment applications, forms, and dozens of other business documents can be executed in a web browser. This technology is secure, legally robust, and efficient, and saves all parties time, money, and hassle.
Many people use the terms “e-signature” and “digital signature” interchangeably. However, an electronic signature and a digital signature are two different types of consent, from both a legal and a technological perspective.
If a signature is digital, electronic, or written by hand on paper the old-fashioned way, the intent is the same. All three forms of signature indicate that the party signing a document agrees to the terms therein.

What Is a Website?

A website is a collection of web pages served from a single web domain. A web page is what you see on the screen when you type in a web address, click on a link, or put a query in a search engine. A web page can contain any type of information, and can include text, color, graphics, animation and sound. A website is hosted on at least one web server, accessible via a network such as the Internet or a private local area network through an Internet address known as

When someone gives you their web address, it generally takes you to their website's home page, which should introduce you to what that site offers in terms of information or other services. From the home page, you can click on links to reach other sections of the site. A website can consist of one page, or of tens of thousands of pages, depending on what the site owner is trying to accomplish.


Cache Memory
Cache memory is extremely fast memory that is built into a computer’s central processing unit (CPU), or located next to it on a separate chip. The CPU uses cache memory to store instructions that are repeatedly required to run programs, improving overall system speed. The advantage of cache memory is that the CPU does not have to use the motherboard’s system bus for data transfer. Whenever data must be passed through the system bus, the data transfer speed slows to the motherboard’s capability. The CPU can process data much faster by avoiding the bottleneck created by the system bus.
As it happens, once most programs are open and running, they use very few resources. When these resources are kept in cache, programs can operate more quickly and efficiently. All else being equal, cache is so effective in system performance that a computer running a fast CPU with little cache can have lower benchmarks than a system running a somewhat slower CPU with more cache. Cache built into the CPU itself is referred to as Level 1 (L1) cache. Cache that resides on a separate chip next to the CPU is called Level 2 (L2) cache. Some CPUs have both L1 and L2 cache built-in and designate the separate cache chip as Level 3 (L3) cache.
B. SWIFT

The Society for Worldwide Interbank Financial Telecommunication (SWIFT) provides a network that enables financial institutions worldwide to send and receive information about financial transactions in a secure, standardized and reliable environment. SWIFT also markets software and services to financial institutions, much of it for use on the SWIFTNet Network, and ISO 9362 bank identifier codes (BICs) are popularly known as "SWIFT codes".

SWIFT does not facilitate funds transfer; rather, it sends payment orders, which must be settled by correspondent accounts that the institutions have with each other. Each financial institution, to exchange banking transactions, must have a banking relationship by either being a bank or affiliating itself with one (or more) so as to enjoy those particular business features.

Founded in Brussels in 1973, the Society for the Worldwide Interbank Financial Telecommunication (SWIFT) is a co-operative organization dedicated to the promotion and development of standardized global interactivity for financial transactions. SWIFT's original mandate was to establish a global communications link for data processing and a common language for international financial transactions. The Society operates a messaging service for financial messages, such as letters of credit, payments, and securities transactions, between member banks worldwide. SWIFT's essential function is to deliver these messages quickly and securely -- both of which are prime considerations for financial matters. Member organizations create formatted messages that are then forwarded to SWIFT for delivery to the recipient member organization. SWIFT operates out of its Brussels headquarters and processes data at centers in Belgium and the United States.

Who Uses SWIFT?

Although originally the network was designed to support the requirements of Treasury and Correspondent banking operations, it has over the years allowed other institutions access to the services, albeit in some cases only to a limited degree. Currently the following types of organizations can access the service:
  • Banks
  • Trading Institutions
  • Money Brokers
  • Securities Broker Dealers
  • Investment Management Institutions
  • Clearing Systems and Central Depositories
  • Recognised Exchanges
  • Trust and Fiduciary Service Companies
  • Subsidiary Providers of Custody and Nominees
  • Treasury Counterparties
  • Treasury ETC Service Providers
  • Corporates
SWIFT operates a number of services, primarily;

1.    General Purpose Application, which only allows system messages, i.e. messages from a user to SWIFT and vice versa, not from one user to another.
2.    Financial Application, which is the user to user service comprising System Messages MT0nn, User-to-User Messages MT1nn through 9nn and Service Messages such as Acknowledgements.

Additionally, SWIFT provides a number of services that are charged for over and above the normal fees. A few of these are:
  • IFT (Interbank File Transfer) -For bulk file transfer of messages, for example low net value, high volume retail payments.
  • ACCORD - A centralised confirmation matching bureau service.
  • Directory Services - An automated and centralised Standard Settlement Instruction service for message enrichment that at present is limited to Treasury and Payment information.
  • RTGS (Y-copy) - Mostly used for sending a copy of a message or parts thereof to a third party, for example a Central Bank
  • Country Specific (e.g. CREST, CHAPSEuro) - Where SWIFT are either the carrier of the messages or the supplier of additional network services.

Bangladesh Automated Clearing House (BACH)

BACH, the first ever electronic clearing house of Bangladesh, has two components -
  • The Automated Cheque Processing System and
  • The Electronic Funds Transfer.

Both the systems operate in batch processing mode – transactions received from the banks during the day are processed at a pre-fixed time and settled through a single multilateral netting figure on each individual bank’s respective books maintained with the Bangladesh Bank. A state-of-the-art Data Center (DC) and a Disaster Recovery Site (DRS) have been established comprising of most modern software and hardware for dealing with the operations of BACH. A Virtual Private Network (VPN) has been created between the participating commercial banks and Data Center (DC) & Disaster Recovery Site (DRS) for communicating necessary information related to BACH. Digital Certificate has been formulated for the first time in Bangladesh for secured data communication.

The automated clearinghouse (ACH) system is a nationwide network through which depository institutions send each other batches of electronic credit and debit transfers. The direct deposit of payroll, social security benefits, and tax refunds are typical examples of ACH credit transfers. The direct debiting of mortgages and utility bills are typical examples of ACH debit transfers. While the ACH network was originally used to process mostly recurring payments, the network is today being used extensively to process one-time debit transfers, such as converted check payments and payments made over the telephone and Internet.

The Reserve Banks and Electronic Payments Network (EPN) are the two national ACH operators. As an ACH operator, the Reserve Banks receive files of ACH payments from originating depository financial institutions, edit and sort the payments, deliver the payments to receiving depository financial institutions, and settle the payments by crediting and debiting the depository financial institutions' settlement accounts. The Reserve Banks and EPN rely on each other to process interoperator ACH payments--that is, payments in which the originating depository financial institution and the receiving depository financial institution are served by different operators. These interoperator payments are settled by the Reserve Banks.

 

Basics of ACH Payments

ACH payments are simply electronic transfers from one account to another. Common uses of ACH payments are:
  • Customer pays service provider
  • Employer deposits money to employee account
  • Consumer moves funds from one bank to another
  • Business pays supplier for products
Because they’re electronic, ACH payments use fewer resources (paper, ink, fuel to transport checks, etc). In addition, ACH payments make it easier to keep track of finances. Instead of generic check information on a bank statement, you see the other party’s name if you’ve used an ACH payment. Then it’s easier to categorize the transaction with your financial software.  ACH payments can be electronic from start-to-finish, or they can happen when a paper check is converted and processed electronically.

What is a Cheque Truncation System?
Cheque Truncation System (CTS) is a cheque clearing system for faster clearing of cheques. As the name suggests, truncation is the process of stopping the flow of the physical cheque in its way of clearing. In its place an electronic image of the cheque is transmitted with key important data.
Cheque truncation thus obviates the need to move physical instruments across branches. This effectively eliminates the associated cost of movement of physical cheques, reduces the time required for their collection and brings elegance to the entire activity of cheque processing. It is a system which is practiced worldwide in the banking sector.
Truncation means, stopping the flow of the physical cheques issued by a drawer to the drawee branch. The physical instrument is truncated at some point en route to the drawee branch and an electronic image of the cheque is sent to the drawee branch along with the relevant information like the MICR fields, date of presentation, presenting banks etc.

Cheque truncation, would eliminate the need to move the physical instruments across branches, except in exceptional circumstances. This would result in effective reduction in the time required for payment of cheques, the associated cost of transit and delays in processing, etc., thus speeding up the process of collection or realization of cheques.
What are the benefits of CTS to bank customers?
  1. The main feature of the CTS 2010 cheque is that the physical movement of the cheque is stopped and the images of cheques are transmitted electronically thereby speeding up the process of cheque clearance and settlement between banks. This obviously means quicker clearance, shorter clearing cycle and speedier credit of the amount to your account.
  2. With the movement of cheques from one bank to another having been stopped, there is no fear of loss of cheques in transit and chances of cheques being lost due to mishandling, etc are totally avoided.
  3. At present clearing is restricted to banks operating within a city or within a restricted geographical area. Under the CTS, it is proposed to integrate multiple clearing locations managed by different banks in different centres so that cheques drawn on upcountry banks too can be cleared electronically without any geographical restrictions. Eventually, this will result in integration of clearing houses into a nation-wide standard clearing system, thereby making clearance of cheques drawn on any bank in India within 24 hours possible.
  4. The cheques in transit are most susceptible to frauds and customers of banks are the worst sufferers in the present system of physical movement of cheques from one place to another.  Under the CTS system moving of physical cheques at different points is obviated as only electronic images are transmitted between banks, and this will considerably reduce the scope for perpetuation of frauds inherent in paper instruments.
  5. With the introduction of homogeneity in security features under CTS standards 2010 such as embedded verifiable features like bar codes, encrypted codes, logos, watermarks, holograms, etc in every cheque leaf, it is now possible to detect frauds easily through interception of altered and forged instruments while passing through the electronic imaging system. This is expected to considerably reduce operational risks and risks associated with paper clearing for the benefit of all bank customers.
  6. The CTS is expected to improve operational efficiency of the entire banking system, resulting in better customer service, improved liquidity position for banks’ customers and safe and secure banking for the entire banking public.

What are MICR, OMR and OCR?

MICR:

MICR stands for Magnetic-Ink Character Recognition. It is a special scanner. It reads the characters printed with magnetic ink and converts them into digital signals. These signals are then input to the computer for further processing. MICR devices are normally used in banks for processing cheques. MICR is used extensively in banking because magnetic-ink characters are difficult to forge and are therefore ideal for marking and identifying cheques.

OMR:

OMR stands for Optical Marks Recognition. OMR device is used to read handwritten marks or symbols printed on the paper. It uses a light beam to scan the marks and converts them into digital signals. These signals are then input to the computer for further -processing. OMR device is usually used in education field to check (or mark) the objective type answers of the questions.

OCR:

OCR stands for Optical Character Recognition. OCR device reads preprinted characters in a particular font and converts them into digital code. The characters printed on paper may be typewritten or handwritten. The OCR devices are commonly used to process utility bills and price code printed on the products in departmental stores.


Business continuity planning (BCP)

Business continuity planning (BCP) is a set of documents, instructions, and procedures which enable a business to respond to accidents, disasters, emergencies, and/or threats without any stoppage or hindrance in its key operations. It is also called business continuity and resiliency planning (BCRP). A business continuity plan is a roadmap for continuing operations under adverse conditions such as a storm or a crime.

Creating and maintaining a BCP helps ensure that your business has the resources and information needed to deal with an emergency. Other benefits include:
  • Enhance your business image with employees, shareholders and customers by demonstrating a proactive attitude.
  • Improve efficiency in the overall organization.
  • Identify the relationship of assets both human and financial resources with respect to critical services and deliveries.


e-Governance

Several dimension and factors influence the definition of e-Governance. The word “electronic” in the term e-Governance implies technology driven governance. E-Governance is the application of Information and Communication Technology (ICT) for delivering government services, exchange of information communication transactions, integration of various stand-alone systems and services between Government-to-Citizens (G2C), Government-to-Business (G2B), Government-to-Government (G2G) as well as back office processes and interactions within the entire government frame work. Through the e-Governance, the government services will be made available to the citizens in a convenient, efficient and transparent manner. The three main target groups that can be distinguished in governance concepts are Government, citizens and businesses/interest groups. In eGovernance there are no distinct boundaries.


e-Government refers to government's use of information technology to exchange information and services with citizens, businesses, and other arms of government. e-Government may be applied by the legislature, judiciary, or administration, in order to improve internal efficiency, the delivery of public services, or processes of democratic governance. It also refers to the citizen to government interaction including the feed back of policiesThe primary delivery models are Government-to-Citizen or Government-to-Customer (G2C), Government-to-Business (G2B) and Government-to-Government (G2G) & Government-to-Employees (G2E). The most important anticipated benefits of e-government include improved efficiency, convenience, and better accessibility of public services.

Computer network
A computer network is a telecommunications network that connects a collection of computers to allow communication and data exchange between systems, software applications, and users. The computers that are involved in the network that originate, route and terminate the data are called nodes. The interconnection of computers is accomplished with a combination of cable or wireless media and networking hardware.

Two devices are said to be networked when a process in one device is able to exchange information with a process in another device. Networks may be classified by various characteristics, such as the media used to transmit signals, the communications protocols used to organize network traffic, network scale, network topology and organizational scope. The best-known computer network is the Internet.

Communication protocols define the rules and data formats for exchanging information in a computer network. Well-known communications protocols include Ethernet, a hardware and link layer standard that is widely used for local area networks, and the Internet protocol suite (TCP/IP), which defines a set of protocols for communication between multiple networks, for host-to-host data transfer, and for application-specific data transmission formats. Protocols provide the basis for network programming.

Advantages of Computer Network

  • Networks allow data transmission among far areas also within local areas.
  • Networks allow different users share the processing characteristics of different computers.
  • Network allows users to share common set of data files and software stored in a main system.
  • Network allows users to share common hardware resources such as printers, fax machines, modem etc.
  • The cost of computing is reduced to each user as compared to the development and maintain of each single computer system.
One way to categorize the different types of computer network designs is by their scope or scale. For historical reasons, the networking industry refers to nearly every type of design as some kind of area network. Common examples of area network types are:
  • LAN - Local Area Network
  • WLAN - Wireless Local Area Network
  • WAN - Wide Area Network
  • MAN - Metropolitan Area Network
  • SAN - Storage Area Network, System Area Network, Server Area Network, or sometimes Small Area Network
  • CAN - Campus Area Network, Controller Area Network, or sometimes Cluster Area Network
  • PAN - Personal Area Network
  • DAN - Desk Area Network

LAN - Local Area Network

A LAN connects network devices over a relatively short distance. A networked office building, school, or home usually contains a single LAN, though sometimes one building will contain a few small LANs (perhaps one per room), and occasionally a LAN will span a group of nearby buildings. In TCP/IP networking, a LAN is often but not always implemented as a single IP subnet.
In addition to operating in a limited space, LANs are also typically owned, controlled, and managed by a single person or organization. They also tend to use certain connectivity technologies, primarily Ethernet and Token Ring.

WAN - Wide Area Network

As the term implies, a WAN spans a large physical distance. The Internet is the largest WAN, spanning the Earth.
A WAN is a geographically-dispersed collection of LANs. A network device called a router connects LANs to a WAN. In IP networking, the router maintains both a LAN address and a WAN address.
A WAN differs from a LAN in several important ways. Most WANs (like the Internet) are not owned by any one organization but rather exist under collective or distributed ownership and management. WANs tend to use technology like ATM, Frame Relay and X.25 for connectivity over the longer distances.

LAN, WAN and Home Networking

Residences typically employ one LAN and connect to the Internet WAN via an Internet Service Provider (ISP) using a broadband modem. The ISP provides a WAN IP address to the modem, and all of the computers on the home network use LAN (so-called private) IP addresses. All computers on the home LAN can communicate directly with each other but must go through a central gateway, typically a broadband router, to reach the ISP.

Other Types of Area Networks

While LAN and WAN are by far the most popular network types mentioned, you may also commonly see references to these others:
  • Wireless Local Area Network - a LAN based on WiFi wireless network technology
  • Metropolitan Area Network - a network spanning a physical area larger than a LAN but smaller than a WAN, such as a city. A MAN is typically owned an operated by a single entity such as a government body or large corporation.
  • Campus Area Network - a network spanning multiple LANs but smaller than a MAN, such as on a university or local business campus.
  • Storage Area Network - connects servers to data storage devices through a technology like Fibre Channel.
  • System Area Network - links high-performance computers with high-speed connections in a cluster configuration. Also known as Cluster Area Network.

Encryption & Decryption

Encryption is the process of translating plain text data (plaintext) into something that appears to be random and meaningless (ciphertext). Decryption is the process of converting cipher-text back to plain text.
To encrypt more than a small amount of data, symmetric encryption is used. A symmetric key is used during both the encryption and decryption processes. To decrypt a particular piece of ciphertext, the key that was used to encrypt the data must be used.
The goal of every encryption algorithm is to make it as difficult as possible to decrypt the generated ciphertext without using the key. If a really good encryption algorithm is used, there is no technique significantly better than methodically trying every possible key. For such an algorithm, the longer the key, the more difficult it is to decrypt a piece of ciphertext without possessing the key.
It is difficult to determine the quality of an encryption algorithm. Algorithms that look promising sometimes turn out to be very easy to break, given the proper attack. When selecting an encryption algorithm, it is a good idea to choose one that has been in use for several years and has successfully resisted all attacks.
In today’s world Internet has touched each and every aspect of life changing the way we work, communicate and live. But the major concern has been about the security and privacy of the data that is being exchanged via Internet especially when you are sending the sensitive information through it.  Amongst many ways of securing data, encrypting the sensitive data is the most popular and effective way to have data security. Encryption is translation of data into a secret code called a cipher text. Decryption is the process of decoding data that has been encrypted into a secret format this requires secret code or password.

Computer encryption uses the science of cryptography. As the human-based code is too easy for a computer to crack, most of the encryption systems belong to the one of two categories.

1. Symmetric-key encryption:

In Symmetric-key encryption technique single key is used to encrypt and decrypt the message.

2. Public-key encryption:

While in public-key (or asymmetric) encryption technique, uses one key (private key) to encrypt a message while another key (public key) to decrypt the message. Public-key encryption uses the combination of a private key and a public key. The private key is kept secret and is only known to the person who encrypts the message, while the public key is freely disseminated which helps to verify the message. To decode an encrypted message, receiver uses the public key of the sender and his own private key.
Encryption/Decryption is advisable while carrying out any kind of sensitive transaction, such as a online purchases or the communication of a company sensitive documents between different departments in the organization etc. Encryption of the data ensures its secrecy and/or privacy.


Credit Card vs Debit Card

A debit card is either linked to a bank account or is a prepaid card. In either case, the card draws on funds that the consumer (owner of the card) has already deposited with a financial institution. On the other hand, a credit card is a kind of loan. When a consumer uses a credit card, the financial institution fronts to the consumer credit (a loan). Purchases are totaled and billed monthly and the user pays a few weeks after receiving the monthly bill.

Comparison chart


Credit Card
Debit Card
Where money comes from?:
Borrowing money from a bank or financial institution. (Spending "other's" money)
Funds taken from the money that you have in your bank account. (Spending your "own" money)
Can be used as:
Credit card only
Debit Card and Credit Card
Line of Credit:
Carries Line of Credit
No Line of Credit
PIN Number:
No
PIN number provided, but not is not always asked to punch in.
Picture ID asked for:
Yes
No
Interest:
Pay additional interest drawn on the amount borrowed.
No
Credit History:
Responsible credit card usage and payment can improve one's credit rating. Credit cards typically report account activity to at least one of the three major credit bureaus on a monthly basis.
Does not affect credit history.
Legal Liability laws:
Strict. Consumer liability limit for credit card fraud is $50 if the credit card company is notified within 60 days in written since the fraudulent charges.
Lean. Consumer liability limit for debit card fraud is $50 if the bank is notified within two days of noticing the fraudulent charges.
Risk involved:
Low.
High, as they are attached to a bank account. A person does not need a pin number to use a debit card and therefore can easily drain a persons bank account, causing extreme problems.
Fraud:
Only problem is proving that someone else has used the card.
With a debit card the persons has to figure out how to get their money back and if any checks bounced they are responsible for those as well
Limit:
Credit line, which can be increased/decreased from the time of applying.
Equals your account limit.
Overdraw Fees:
Low.Some credit card companies allow to overdraw amount over the maximum credit line with a fees
High "overdraft" fees. Possible to overdraw amount over the account limit
Connected to:
Need not be connected to any bank account.
Checking Account;Savings Account
Monthly bills:
Yes
No
Offers Protection:
Yes. Example insurance on a rental car
No
Alternate payment type:
cash
cheque & cash






Advantages and Disadvantages of ATM Machines and Bank/Debit Cards 

Advantages
Disadvantages
Debit Card
  • You don’t have to carry cash around with you.
  • If your card is stolen, the thief cannot get your money without your PIN.
  • You can use it to pay at some retail shops.
  • Keeps your money safe.
  •  If you forget your PIN number you cannot use the card.
  • The system can be off-line.
  • Training is needed.
  • Difficult to maintain spending discipline.
ATM or Bank Card
  • You can withdraw cash at any time, day or night. The banks don’t need to be open.
  • ATMs offer the convenience of multiple locations. You can withdraw cash at any bank that is part of the system to which your ATM card is linked.
  • Your ATM card is protected by a PIN, keeping your money safe.
  • You don’t need to fill out withdrawal and deposit slips as is required at the bank.
  • ATMs are faster than going to the bank—no long lines.
  • You can withdraw cash at ATMs in foreign countries.
  • ATM may be off-line (system down).
  • You may forget your PIN number.
  • Risk of robbery when you leave the ATM.
  • The ATM can break down or run out of cash.
  • Fees charged to use ATMs of other banks can become expensive.

ADVANTAGES & DISADVANTAGES OF AN ATM

Advantages of an ATM:

1. An automated teller machine increases existing business:
2. An automated teller machine generates new business:
3. An automated teller machine provides additional revenue streams :
4. An automated teller machine reduces risk and lowers costs:

Disadvantages:

1. Not available in remote places.
2. Cannot avoid illegal use in case of stolen card.

What are Storage devices?

Storage Devices are the data storage devices that are used in the computers to store the data. The computer has many types of data storage devices. Some of them can be classified as the removable data Storage Devices and the others as the non removable data Storage Devices. 
The memory is of two types; one is the primary memory and the other one is the secondary memory.

The primary memory is the volatile memory and the secondary memory is the non volatile memory. The volatile memory is the kind of the memory that is erasable and the non volatile memory is the one where in the contents cannot be erased. Basically when we talk about the data storage devices it is generally assumed to be the secondary memory.

The secondary memory is used to store the data permanently in the computer. The secondary storage devices are usually as follows: hard disk drives – this is the most common type of storage device that is used in almost all the computer systems. The other ones include the floppy disk drives, the CD ROM, and the DVD ROM. The flash memory, the USB data card etc.

 

 

Storage device


Alternatively referred to as storage, storage media, or storage medium, a storage device is a hardware device capable of holding information. There are two storage devices used in computers; a primary storage device such as computer RAM and a secondary storage device such as a computer hard drive. The secondary storage could be a removable, internal, or external storage. In the picture to the right, is an example of a Drobo, an external secondary storage device. Without a storage device, you and your computer would not be able to save any settings or information and would be considered a dumb terminal. Below, are some additional examples of storage devices that are used with computers:
  • Floppy diskette
  • CD-ROM disc
  • CD-R and CD-RW disc
  • Cloud storage
  • DVD-R, DVD+R, DVD-RW, and DVD+RW disc
  • Jump drive and USB flash drive
  • Hard drive
  • LS-120
  • Tape cassette
  • Zip diskette
When saving anything on the computer, you will be asked for the storage location, which is where you want to save the information. By default most of the information you save will be saved to your computer hard drive, however, if you want to move the information to another computer you would want to save it to a removable storage device such as a Jump drive.

 

 

Parity bit


A parity bit is a single bit added to a binary data transmission used to indicate if whether the 0's and 1's within that data transmission is an even or odd number. The parity bit is used in parity error checking to find errors that may occur during data transmission. In the picture to the right, is an example of a 8-bit binary number with the ninth digit being the parity bit.
A parity bit, or check bit, is a bit added to the end of a string of binary code that indicates whether the number of bits in the string with the value one is even or odd. Parity bits are used as the simplest form of error detecting code.
There are two variants of parity bits: even parity bit and odd parity bit. In case of even parity, the parity bit is set to 1, if the number of ones in a given set of bits (not including the parity bit) is odd, making the number of ones in the entire set of bits (including the parity bit) even. If the number of ones in a given set of bits is already even, it is set to a 0. When using odd parity, the parity bit is set to 1 if the number of ones in a given set of bits (not including the parity bit) is even, keeping the number of ones in the entire set of bits (including the parity bit) odd. when the number of set bits is odd, then the odd parity bit is set to 0.

No comments:

Post a Comment