1. “BUISNESS
COMMUNICATION”
TOPIC:-
MEANS & MODES OF
COMMUNICATION
1
2. INDEX:-
INTRODUCTION
MOBILE PHONES
• HISTORY
• OVERVIEW
• APLICATIONS
TELEPHONES
• HISTORY
• BASCI PRINCILPES
• USEAGE
INTERNET
• HISTORY
• INTERNET PROTOCOLS
• INTERNET ACCESS
• INTRA NET
• EXTRA NET
E MEAILS
• ADVANTAGE
• DIS ADVANTAGE
2
3. I NTRODUCTION:-
Once you and your team have produced your list of people
for your communication plan, gotten everyone's phone number
and email, and listed their role, there is one more thing that needs
to be done. Add each person's preferred mode of communication
to the list. This is one of the most crucial, but commonly
overlooked, elements of a good communication plan. Different
people have different ways they like to communicate and the
more you respect that, the better off you and your project are
going to be.
Some people are at their computers all day and constantly check
their email, others travel a lot and you can catch them only on
their cell phone, others prefer office phone calls, and still others
only respond if you talk with them face-to-face. Not using a
person’s preferred mode of communication means you may not
get the information or feedback you need when you need it. This
can prevent you from being able to effectively make a required
quick decision or stave off an impending crisis.
In today's workplace, adequate communication is difficult
because many times not all the people in your communications
loop work in the same building or city or state, and some don’t
even work the same hours. Once you know how you need to
communicate to the people identified on your communications
plan, you then need to identify which of the many available
communications tool are best suited for your team/company and
how they work.
3
4. Mobile (Cell) Phones:-
Another way to communicate in India is through Mobile or Cell
phones. If you have a mobile phone with the tri-band technology, you can
easily use it here. You don’t need to use the service provider of your own
country. There are number of service providers in India to keep you
connected. You can buy a prepaid sim card from any service provider. You
only need to make payment for it and give a photocopy of your any Identity
proof (like your passport). Get it recharged and enjoy free mobility. Mobile
phone
he mobile phone (also called a wireless phone or cellular phone)[1] is a
short-range, portable electronic device used for mobile voice or data
communication over a network of specialized base stations known as cell
sites. In addition to the standard voice function of a telephone, current
mobile phones may support many additional services, and accessories, such
as SMS for text messaging, email, packet switching for access to the Internet,
gaming, bluetooth, infrared, camera with video recorder and MMS for
sending and receiving photos and video. Most current mobile phones
connect to a cellular network of base stations (cell sites), which is in turn
interconnected to the public switched telephone network (PSTN) (the
exception is satellite phones
OLDEST CELL PHONE
History:-
4
5. In 1908, U.S. Patent 887,357 for a wireless telephone was issued in to
Nathan B. Stubblefield of Murray, Kentucky. He applied this patent to "cave
radio" telephones and not directly to cellular telephony as the term is
currently understood.Cells for mobile phone base stations were invented in
1947 by Bell Labs engineers at AT&T and further developed by Bell Labs
during the 1960s. Radiophones have a long and varied history going back to
Reginald Fessenden's invention and shore-to-ship demonstration of radio
telephony, through the Second World War with military use of radio
telephony links and civil services in the 1950s, while hand-held cellular
radio devices have been available since 1973. Due to their low establishment
costs and rapid deployment, mobile phone networks have since spread
rapidly throughout the world, outstripping the growth of fixed telephony
Overview:-
According to internal memos, American Telephone & Telegraph
discussed developing a wireless phone in 1915, but were afraid deployment
of the technology could undermine its monopoly on wired service in the
U.S.[2]
The first commercial mobile phone service was launched in Japan by
NTT in 1978. By November 2007, the total number of mobile phone
subscriptions in the world had reached 3.3 billion, or half of the human
population (although some users have multiple subscriptions, or inactive
subscriptions), which also makes the mobile phone the most widely spread
technology and the most common electronic device in the world.[3]
The first mobile phone to enable internet connectivity and wireless
email, the Nokia Communicator, was released in 1996, creating a new
category of expensive phones called smartphones. In 1999 the first mobile
internet service was launched by NTT DoCoMo in Japan under the i-Mode
service. By 2007 over 798 million people around the world accessed the
internet or equivalent mobile internet services such as WAP and i-Mode at
least occasionally using a mobile phone rather than a personal computer.
5
6. Applications:-
The most commonly used data application on mobile phones is SMS
text messaging, with 74% of all mobile phone users as active users (over 2.4
billion out of 3.3 billion total subscribers at the end of 2007). SMS text
messaging was worth over 100 billion dollars in annual revenues in 2007
and the worldwide average of messaging use is 2.6 SMS sent per day per
person across the whole mobile phone subscriber base. (source Informa
2007). The first SMS text message was sent from a computer to a mobile
phone in 1992 in the UK, while the first person-to-person SMS from phone
to phone was sent in Finland in 1993.
The other non-SMS data services used by mobile phones were worth
31 Billion dollars in 2007, and were led by mobile music, downloadable
logos and pictures, gaming, gambling, adult entertainment and advertising
(source: Informa 2007). The first downloadable mobile content was sold to a
mobile phone in Finland in 1998, when Radiolinja (now Elisa) introduced
the downloadable ringing tone service. In 1999 Japanese mobile operator
6
7. NTT DoCoMo introduced its mobile internet service, i-Mode, which today is
the world's largest mobile internet service and roughly the same size as
Google in annual revenues.
The first mobile news service, delivered via SMS, was launched in
Finland in 2000. Mobile news services are expanding with many
organizations providing "on-demand" news services by SMS. Some also
provide "instant" news pushed out by SMS. Mobile telephony also facilitates
activism and public journalism being explored by Reuters and Yahoo![5] and
small independent news companies such as Jasmine News in Sri Lanka.
he mobile phone became a mass media channel in 1998 when the first
ringing tones were sold to mobile phones by Radiolinja in Finland. Soon
other media content appeared such as news, videogames, jokes, horoscopes,
TV content and advertising. In 2006 the total value of mobile phone paid
media content exceeded internet paid media content and was worth 31
Billion dollars (source Informa 2007). The value of music on phones was
worth 9.3 Billion dollars in 2007 and gaming was worth over 5 billion dollars
in 2007 (source Netsize Guide 2008 [1]).
The mobile phone is often called the Fourth Screen (if counting
cinema, TV and PC screens as the first three) or Third Screen (counting only
TV and PC screens). It is also called the Seventh of the Mass Media (with
Print, Recordings, Cinema, Radio, TV and Internet the first six). Most early
content for mobile tended to be copies of legacy media, such as the banner
advertisement or the TV news highlight video clip. Recently unique content
for mobile has been emerging, from the ringing tones and ringback tones in
music to "mobisodes," video content that has been produced exclusively for
mobile phones.
The advent of media on the mobile phone has also produced the
opportunity to identify and track Alpha Users or Hubs, the most influential
members of any social
7
8. community. AMF Ventures measured in 2007 the relative accuracy of three
mass media, and found that audience measures on mobile were nine times
more accurate than on the internet and 90 times more accurate than on TV.
Telephones:-
India has a highly developed network of telephone lines. Almost every road
in India has one phone booth, which offers public calls, STD calls and ISD
calls. The ISD code of India is 91. In order to make an international call, dial
00 (international access code from India) followed by code of the country
you are calling followed by the area code and then local number.
LATEST
History:-
TECHNOLOGIES
Credit for inventing the electric telephone remains in dispute. As with
other great inventions such as radio, television, light bulb, and computer,
there were several inventors who did pioneer experimental work on voice
transmission over a wire and improved on each other's ideas. Innocenzo
Manzetti, Antonio Meucci, Johann Philipp Reis, Elisha Gray, Alexander
Graham Bell, and Thomas Edison, among others, have all been credited with
pioneer work on the telephone.
The early history of the telephone is a confusing morass of claim and
counterclaim, which was not clarified by the huge mass of lawsuits which
hoped to resolve the patent claims of individuals. The Bell and Edison
patents, however, were forensically
victorious and commercially decisive.
8
9. An 1896 Telephone from
Sweden.
Who invented telephone?
Alexander Graham Bell invented the telephone in 1876. The first words he
spoke on his telephone were, "Watson, come here. I need you." Watson was
his assistant's name.
That happened in 1875-76. However Antonio Meucci had a working
telephone since 1848 in Havana and a perfected model by 1871. On that year
Meucci filed for and obtained a patent (caveat #3335) for the telephone. To
say that Bell invented the telephone is erroneous. Meucci invented it. The
unfortunate thing about Meucci is that he did not renew the caveat 3335 for
lack of money. Had he renewed it, Bell would not have been granted a
patent. Bell knowing the facts applied and was granted a patent. Bell is not
the inventor. He simply commercialized what had been invented by Meucci
and made a fortune whereas Meucci died poor and destitute..
t depends on who you believe. Alexander Graham Bell got a patent for the
telephone. Reisling in Germany had a patent, but wasn't able to make it
actually work. Bell actually used his plans and made something that almost
worked. There are numerous other claims and Bell's patent request arrived
in the Patent office mere hours before another claim arrived.
Meucci set up a form of voice communication link in his Staten Island home
that connected the basement with the first floor, but was unable to raise
sufficient funds to pay for the patent application. He filed a patent caveat in
1871, which was forced to expire in 1874. In 1876, Alexander Graham Bell
patented the electro-magnetic transmission of vocal sound by undulatory
electric current.
9
10. Use-age:-
By the end of 2006, there were a total of nearly 4 billion mobile and fixed
line subscribers and over 1 billion Internet users worldwide. This included
1.27 billion fixed line subscribers and 2.68 billion mobile subscribers.
LATEST TECHNOLOGIES
10
11. Internet:-
India is connected to the world through the Internet also. Almost every
urban household has access to high speed Internet. Now-a-days, Internet
has also reached rural India and people living at the grassroot level are
learning how to communicate and move with the world. You can send and
receive emails and surf the net in those many "cyber cafes" that have sprung
up at every nook and corner in all cities, which offer Internet services at
minimal costs.
11
12. History of the Internet:-
Prior to the widespread inter-networking that led to the Internet, most
communication networks were limited by their nature to only allow
communications between the stations on the network, and the prevalent
computer networking method was based on the central mainframe method.
In the 1960s, computer researchers, Levi C. Finch and Robert W. Taylor
pioneered calls for a joined-up global network to address interoperability
problems. Concurrently, several research programs began to research
principles of networking between separate physical networks, and this led
to the development of Packet switching. These included Donald Davies
(NPL), Paul Baran (RAND Corporation), and Leonard Kleinrock's MIT and
UCLA research programs.
This led to the development of several packet switched networking
solutions in the late 1960s and 1970s, including ARPANET, and X.25.
Additionally, public access and hobbyist networking systems grew in
popularity, including UUCP. They were however still disjointed separate
networks, served only by limited gateways between networks. This led to
the application of packet switching to develop a protocol for inter-
networking, where multiple different networks could be joined together into
a super-framework of networks. By defining a simple common network
system, the Internet protocol suite, the concept of the network could be
separated from its physical implementation. This spread of inter-network
began to form into the idea of a global inter-network that would be called
'The Internet', and this began to quickly spread as existing networks were
converted to become compatible with this. This spread quickly across the
advanced telecommunication networks of the western world, and then
began to penetrate into the rest of the world as it became the de-facto
international standard and global network. However, the disparity of
growth led to a digital divide that is still a concern today.
Following commercialization and introduction of privately run
Internet Service Providers in the 1980s, and its expansion into popular use in
12
13. the 1990s, the Internet has had a drastic impact on culture and commerce.
This includes the rise of near instant communication by e-mail, text based
discussion forums, the World Wide Web. Investor speculation in new
markets provided by these innovations would also lead to the inflation and
collapse of the Dot-com bubble, a major market collapse. But despite this,
Internet continues to grow.
Before the Internet:-
In the 1950s and early 1960s, prior to the widespread inter-networking
that led to the Internet, most communication networks were limited by their
nature to only allow communications between the stations on the network.
Some networks had gateways or bridges between them, but these bridges
were often limited or built specifically for a single use. One prevalent
computer networking method was based on the central mainframe method,
simply allowing its terminals to be connected via long leased lines. This
method was used in the 1950s by Project RAND to support researchers such
as Herbert Simon, in Pittsburgh, Pennsylvania, when collaborating across
the continent with researchers in Sullivan, Illinois, on automated theorem
proving and artificial intelligence.
the telephone (from the Greek words tele (τηλέ) = far and phone
(φωνή) = voice) is a telecommunications device that is used to transmit and
receive sound (most commonly speech), usually two people conversing but
occasionally three or more. It is one of the most common household
appliances in the world today. Most telephones operate through
transmission of electric signals over a complex telephone network which
allows almost any phone user to communicate with almost anyone.A
traditional landline telephone system, also known as "plain old telephone
service" (POTS), commonly handles both signaling and audio information
on the same twisted pair of insulated wires: the telephone line. Although
originally designed for voice communication, the system has been adapted
for data communication such as Telex, Fax and Internet communication. The
signaling equipment consists of a bell, beeper, light or other device to alert
13
14. the user to incoming calls, and number buttons or a rotary dial to enter a
telephone number for outgoing calls. A twisted pair line is preferred as it is
more effective at rejecting electromagnetic interference (EMI) and crosstalk
than an untwisted pair.A calling party wishing to speak to another party
will pick up the telephone's handset, thus operating a button switch or
"switchhook", which puts the telephone into an active state or "off hook" by
connecting the transmitter (microphone), receiver (speaker) and related
audio components to the line. This circuitry has a low resistance (less than
300 Ohms) which causes DC current (48 volts, nominal) from the telephone
exchange to flow through the line. The exchange detects this DC current,
attaches a digit receiver circuit to the line, and sends a dial tone to indicate
readiness. On a modern telephone, the calling party then presses the
number buttons in a sequence corresponding to the telephone number of the
called party. The buttons are connected to a tone generator that produces
DTMF tones which are sent to the exchange. A rotary dial telephone
employs pulse dialing, sending electrical pulses corresponding to the
telephone number to the exchange. When a landline phone is inactive or "on
hook", its alerting device is connected across the line through a capacitor,
which prevents DC current from flowing through the line. The circuitry at
the telephone exchange detects the absence of DC current flow and thus that
the phone is on hook with only the alerting device electrically connected to
the line. When a party initiates a call to this line, the ringing signal
transmitted by the telephone exchange activates the alerting device on the
line. When the called party picks up the handset, the switch hook
disconnects the alerting device and connects the audio circuitry to the line.
14
15. Internet protocols:-
The complex communications infrastructure of the Internet consists of
its hardware components and a system of software layers that control
various aspects of the architecture. While the hardware can often be used to
support other software systems, it is the design and the rigorous
standardization process of the software architecture that characterizes the
Internet.
The responsibility for the architectural design of the Internet software
systems has been delegated to the Internet Engineering Task Force (IETF).[7]
The IETF conducts standard-setting work groups, open to any individual,
about the various aspects of Internet architecture. Resulting discussions and
final standards are published in Request for Comments (RFCs), freely
available on the IETF web site.
The principal methods of networking that enable the Internet are
contained in a series of RFCs that constitute the Internet Standards. These
standards describe a system known as the Internet Protocol Suite. This is a
model architecture that divides methods into a layered system of protocols
(RFC 1122, RFC 1123). The layers correspond to the environment or scope in
which their services operate. At the top is the space (Application Layer) of
the software application, e.g., a web browser application, and just below it is
the Transport Layer which connects applications on different hosts via the
network (e.g., client-server model). The underlying network consists of two
layers: the Internet Layer which enables computers to connect to one-
another via intermediate (transit) networks and thus is the layer that
establishes internetworking and the Internet, and lastly, at the bottom, is a
software layer that provides connectivity between hosts on the same local
link (therefor called Link Layer), e.g., a local area network (LAN) or a dial-
up connection. This model is also known as the TCP/IP model of
networking. While other models have been developed, such as the Open
Systems Interconnection (OSI) model, they are not compatible in the details
of description, nor implementation.
15
16. The most prominent component of the Internet model is the Internet
Protocol (IP) which provides addressing systems for computers on the
Internet and facilitates the internetworking of networks. IP Version 4 (IPv4)
is the initial version used on the first generation of the today's Internet and
is still in dominant use. It was designed to address up to ~4.3 billion (109)
Internet hosts. However, the explosive growth of the Internet has led to IPv4
address exhaustion. A new protocol version, IPv6, was developed which
provides vastly larger addressing capabilities and more efficient routing of
data traffic. IPv6 is currently in commercial deployment phase around the
world.
IPv6 is not interoperable with IPv4. It essentially establishes a
"parallel" version of the Internet not accessible with IPv4 software. This
means software upgrades are necessary for every networking device that
needs to communicate on the IPv6 Internet. Most modern computer
operating systems are already converted to operate with both version of the
Internet Protocol. Network infrastructures, however, are still lagging in this
development.
Internet access:-
Common methods of home access include dial-up, landline
broadband (over coaxial cable, fiber optic or copper wires), Wi-Fi, satellite
and 3G technology cell phones.
Public places to use the Internet include libraries and Internet cafes,
where computers with Internet connections are available. There are also
Internet access points in many public places such as airport halls and coffee
shops, in some cases just for brief use while standing. Various terms are
used, such as "public Internet kiosk", "public access terminal", and "Web
payphone". Many hotels now also have public terminals, though these are
usually fee-based. These terminals are widely accessed for various usage
like ticket booking, bank deposit, online payment etc. Wi-Fi provides
wireless access to computer networks, and therefore can do so to the
16
17. Internet itself. Hotspots providing such access include Wi-Fi cafes, where
would-be users need to bring their own wireless-enabled devices such as a
laptop or PDA. These services may be free to all, free to customers only, or
fee-based. A hotspot need not be limited to a confined location. A whole
campus or park, or even an entire city can be enabled. Grassroots efforts
have led to wireless community networks. Commercial Wi-Fi services
covering large city areas are in place in London, Vienna, Toronto, San
Francisco, Philadelphia, Chicago and Pittsburgh. The Internet can then be
accessed from such places as a park bench.[9]
Apart from Wi-Fi, there have been experiments with proprietary
mobile wireless networks like Ricochet, various high-speed data services
over cellular phone networks, and fixed wireless services.
High-end mobile phones such as smart phones generally come with
Internet access through the phone network. Web browsers such as Opera are
available on these advanced handsets, which can also run a wide variety of
other Internet software. More mobile phones have Internet access than PCs,
though this is not as widely used. An Internet access provider and protocol
matrix differentiates the methods used to get online.
17
18. Intranet:-
An intranet is a private computer network that uses Internet protocols
and network connectivity to securely share part of an organization's
information or operations with its employees. Sometimes the term refers
only to the organization's internal website. The same concepts and
technologies of the Internet such as clients and servers running on the
Internet protocol suite are used to build an intranet. HTTP and other
Internet protocols are commonly used as well, such as FTP. There is often an
attempt to use Internet technologies to provide new interfaces with
corporate "legacy" data and information systems.
Briefly, an intranet can be understood as "a private version of the
Internet," or as a version of the Internet confined to an organization. The
term first appeared in print on April 19, 1995, in Digital News & Review in an
article authored by technical editor Stephen Lawton [1].An IntranetSite
differs from a website in the fact that websites are oriented to public web
browsers that do not need be authenticated in order to view the content. The
IntranetSite content is private and does require authentication for each web
viewer. Some websites require a subscription to access some or all of their
content and be cause of the authentication requirement it makes them an
IntranetSites or ExtranetSites.
Advantages of
intranets:-
18
19. • Workforce productivity: Intranets can help users to locate and view
information faster and use applications relevant to their roles and
responsibilities. With the help of a web browser interface, users can
access data held in any database the organization wants to make
available, anytime and - subject to security provisions - from
anywhere within the company workstations, increasing employees'
ability to perform their jobs faster, more accurately, and with
confidence that they have the right information. It also helps to
improve the services provided to the users.
• Time: With intranets, organizations can make more information
available to employees on a "pull" basis (ie: employees can link to
relevant information at a time which suits them) rather than being
deluged indiscriminately by emails.
• Communication: Intranets can serve as powerful tools for
communication within an organization, vertically and horizontally.
From a communications standpoint, intranets are useful to
communicate strategic initiatives that have a global reach throughout
the organization. The type of information that can easily be conveyed
is the purpose of the initiative and what the initiative is aiming to
achieve, who is driving the initiative, results achieved to date, and
who to speak to for more information. By providing this information
on the intranet, staff have the opportunity to keep up-to-date with the
strategic focus of the organization.
• Web publishing allows 'cumbersome' corporate knowledge to be
maintained and easily accessed throughout the company using
hypermedia and Web technologies. Examples include: employee
manuals, benefits documents, company policies, business standards,
newsfeeds, and even training, can be accessed using common Internet
standards (Acrobat files, Flash files, CGI applications). Because each
business unit can update the online copy of a document, the most
recent version is always available to employees using the intranet.
• Business operations and management: Intranets are also being used as
a platform for developing and deploying applications to support
business operations and decisions across the internetworked
enterprise.
19
20. • Cost-effective: Users can view information and data via web-browser
rather than maintaining physical documents such as procedure
manuals, internal phone list and requisition forms.
• Promote common corporate culture: Every user is viewing the same
information within the Intranet.
• Enhance Collaboration: With information easily accessible by all
authorised users, teamwork is enabled.
• Cross-platform Capability: Standards-compliant web browsers are
available for Windows, Mac, and UNIX.
Extranet:-
An extranet is a private network that uses Internet protocols, network
connectivity, and possibly the public telecommunication system to securely
share part of an organization's information or operations with suppliers,
vendors, partners, customers or other businesses. An extranet can be viewed
as part of a company's Intranet that is extended to users outside the
company (e.g.: normally over the Internet). It has also been described as a
"state of mind" in which the Internet is perceived as a way to do business
with a reproved set of other companies business-to-business (B2B), in
isolation from all other Internet users. In contrast, business-to-consumer
(B2C) involves known server(s) of one or more companies, communicating
with previously unknown consumer users.
Briefly, an extranet can be understood as a private intranet mapped
onto the Internet or some other transmission system not accessible to the
general public, but is managed by more than one company's
administrator(s). For example, military networks of different security levels
20
21. may map onto a common military radio transmission system that never
connects to the Internet. Any private network mapped onto a public one is a
virtual private network (VPN). In contrast, an intranet is a VPN under the
control of a single company's administrator(s).
An argument has been made that "extranet" is just a buzzword for
describing what institutions have been doing for decades, that is,
interconnecting to each other to create private networks for sharing
information. One of the differences that characterized an extranet, however,
is that its interconnections are over a shared network rather than through
dedicated physical lines. With respect to Internet Protocol networks, RFC
4364 states "If all the sites in a VPN are owned by the same enterprise, the
VPN is a corporate intranet. If the various sites in a VPN are owned by
different enterprises, the VPN is an extranet. A site can be in more than one
VPN; e.g., in an intranet and several extranets. We regard both intranets and
extranets as VPNs. In general, when we use the term VPN we will not be
distinguishing between intranets and extranets. Even if this argument is
valid, the term "extranet" is still applied and can be used to eliminate the use
of the above description."[1]
ADVANTAGES:-
• Exchange large volumes of data using Electronic Data Interchange
(EDI)
• Share product catalogs exclusively with wholesalers or those "in the
trade"
• Collaborate with other companies on joint development efforts
21
22. • Jointly develop and use training programs with other companies
• Provide or access services provided by one company to a group of
other companies, such as an online banking application managed by
one company on behalf of affiliated banks
• Share news of common interest exclusively
DISADVANTAGES:-
• Extranets can be expensive to implement and maintain within an
organization (e.g.: hardware, software, employee training costs) — if
hosted internally instead of via an ASP.
• Security of extranets can be a big concern when dealing with valuable
information. System access needs to be carefully controlled to avoid
sensitive information falling into the wrong hands.
• Extranets can reduce personal contact (face-to-face meetings) with
customers and business partners. This could cause a lack of connections
made between people and a company, which hurts the business when it
comes to loyalty of its business partners and customers.
22
23. EMAILS
E mails history:-
Email is much older than Arpanet or the Internet. It was never
invented; it evolved from very simple beginnings.
Early email was just a small advance on what we know these days as a file
directory - it just put a message in another user's directory in a spot where
they could see it when they logged in. Simple as that. Just like leaving a note
on someone's desk.
Probably the first email system of this type was MAILBOX, used at
Massachusetts Institute of Technology from 1965. Another early program to
send messages on the same computer was called SNDMSG.
Some of the mainframe computers of this era might have had up to one
hundred users -often they used what are called "dumb terminals" to access
the mainframe from their work desks. Dumb terminals just connected to the
mainframe - they had no storage or memory of their own, they did all their
work on the remote mainframe computer.
Before internetworking began, therefore, email could only be used to send
messages to various users of the same computer. Once computers began to
talk to each other over networks, however, the problem became a little more
complex - We needed to be able to put a message in an envelope and
address it. To do this, we needed a means to indicate to whom letters should
go that the electronic posties understood - just like the postal system, we
23
24. needed a way to indicate an address.
This is why Ray Tomlinson is credited with inventing email in 1972. Like
many of the Internet inventors, Tomlinson worked for Bolt Beranek and
Newman as an ARPANET contractor. He picked the @ symbol from the
computer keyboard to denote sending messages from one computer to
another. So then, for anyone using Internet standards, it was simply a matter
of nominating name-of-the-user@name-of-the-computer. Internet pioneer
Jon Postel, who we will hear more of later, was one of the first users of the
new system, and is credited with describing it as a "nice hack". It certainly
was, and it has lasted to this day.
24
25. Emails:-
With the growing popularity of the Internet
more and more people are communicating via
email. This fast and efficient method of
communication is perhaps the preferred method of
online communication at the present with
thousands upon thousands of emails being sent
each day. The many uses of email are what make it
so appealing and so versatile. Whether you are
sending a greeting to a grandparent or sending files
to a coworker, you can easily utilize email to do so.
Email has come quite a long way since its
introduction, yet it is still used for many of the same
reasons. Basic electronic communication has
essentially evolved into a more resourceful tool as
one has the ability to do much more now then they
once could. Along with the usual sending of files
and text messages through email, one can send
greeting cards, manage their emails by assigning
them to folders or classifying them as junk and even
organize and manage their daily tasks on some
email servers.
25
26. Advantages:-
• Email is effective in providing quick answers to yes and no, type
questions. e.g. Do you do international delivery?
• Email is effective in finding the right person in an organization or
company to answer your question.
• Email is good to make appointments for busy people.
• Email can distribute information quickly to many people for the time it
takes to email one person.
• . Global reach: No matter where you are or whom you need to reach,
targeted emails pave the way. Borders are no obstacles in email
marketing.
• 2. Lower cost: Costs incurred in designing, executing, testing, sending
and receiving an email is up to 78% less for a run of 5000 over paper-
based direct mail version. When you add e-mail to your marketing mix,
you spend less time, money and resources than with traditional
marketing vehicles like direct mail or print advertising.
• 3. Interactive: You can innovatively initiate campaigns using graphics,
videos, music, quiz, game or whatever that will be of interest to your
prospect, to grab his attention and interest immediately.
• 4. Highly personalized: Email enables you to personalize and greet every
person you target. This helps in creating a special bond with the
prospects.
• 5. Round the clock marketing: With an email the audience can
understand your offering even when you are out of office.
• Faster response: Time to receive responses through e-mail is one to three
days, where you will get maximum responses on day one itself, while a
direct mail campaign would take minimum 7 to 12 days to generate any
responses. Further, responding to a direct mail is more cumbersome,
while a person can respond to an email immediately.
• 10. Simplest: Executing an email campaign is simple and you can do it
sitting at home without any extensive resources.
26
27. • Managing Email is Easy
You can manage all your correspondence on screen and so can your
customers. Your proposal can be answered, revised, stored, and
sent to others, all without reams of paper involved.
• Email is Fast
Mail is delivered instantly...from your office to anywhere in
the world. No other method of delivery can provide this service.
Timely buying and selling decisions can be made in a heartbeat.
• Email is Easy to Filter
The subject line on an Email makes it easy to prioritize
messages. The reader can identify ritical correspondence
quickly and dealt with it immediately. Unlike regular mail
which needs to be opened and reviewed, or voice mail which
requires you to either listen to or scan all your messages
for those that require immediate attention.
• Transmission is Secure and Reliable
The level of security in transmitting Email messages is very
high, and the industry continues to strive to develop even
tighter security levels. Email is private. Often telephone and
fax messages are not. If the address information is correct,
rarely does an Email go astray. Fax machines can be out of
order or out of paper and this prevents an important message
from being delivered in a timely manner.
MAIL BOX
27
28. DIS ADVANTAGES:-
• Email can become time consuming for answering complicated questions
and misunderstandings can arise because cultural differences in the
interpretation of certain words. The telephone is much better for
providing detailed answers or if you feel that the question is not
absolutely clear.
• Email can compromise the security of an organization because sensitive
information can be easily distributed accidentally or deliberately. Email
should be entrusted to well trained and trusted staff members.
• Email can become impersonal or misunderstood.
• This wonderful tool is not without its downside however. Some people
choose to send worms and viruses via email and in the process infect and
damage quite a lot of computers. A virus email can often be very difficult
to detect, especially to someone with very little knowledge of computer
viruses and how they work. If you notice that you have an anonymous
email or an email with a name foreign to you then you may not want to
open this email as may likely be a viruses and the mere act of opening
the email makes your computer susceptible to infection.
• Along with the abovementioned problems privacy has also become an
issue with email activity. Virtually every email that you send has to go
through a number of computers before it reaches the inbox of the
intended receiver and along the way there exists a distinct possibility that
an individual could hack into your email and read it. Thus it is
imperative that you have a bullet proof password.
• Email attachments can contain viruses.
• You cannot send physical objects.
• Messages can only be sent to other email users.
• Unwanted junk email may be sent to you in large amounts.
• There is some cost involved in email marketing. Primarily this is the costs
associated with writing the advertisements and creating any graphics
which will accompany the email advertisements. This will require hiring
a writer to write the copy for the advertisement and a designer to create
and implements the graphics. The cost of these services will vary pretty
28
29. widely but in general you will pay more for writers and designers with
more experience. This is because these writers and designers are
expected to be able to produce a higher quality of work than those with
less experience could produce.
The most obvious disadvantage to email marketing is the possibility of
having your email marketing viewed as spam. This is a very important
problem because it could prove to be quite costly in terms of the profit
margin for your business. Each day Internet users are bombarded with
unsolicited emails serving as advertisements. This problem has reached
epic proportions and the abundance of spam infiltrating the email boxes
of innocent Internet users has to be cautious and suspicious about any
email they receive which is unsolicited and appears to be promoting a
particular product or service.
VIRUSES THAT COME THROUGH E MAILS
Computers:-
29
30. History
It is difficult to identify any one device as the earliest computer, partly
because the term "computer" has been subject to varying interpretations
over time. Originally, the term "computer" referred to a person who
performed numerical calculations (a human computer), often with the aid of
a mechanical calculating device.
The history of the modern computer begins with two separate
technologies - that of automated calculation and that of programmability.
Examples of early mechanical calculating devices included the abacus,
the slide rule and arguably the astrolabe and the Antikythera mechanism
(which dates from about 150-100 BC). The end of the Middle Ages saw a re-
invigoration of European mathematics and engineering, and Wilhelm
Schickard's 1623 device was the first of a number of mechanical calculators
constructed by European engineers. However, none of those devices fit the
modern definition of a computer because they could not be programmed.
Hero of Alexandria (c. 10 – 70 AD) built a mechanical theater which
performed a play lasting 10 minutes and was operated by a complex system
of ropes and drums that might be considered to be a means of deciding
which parts of the mechanism performed which actions - and when.[3] This
is the essence of programmability. In 1801, Joseph Marie Jacquard made an
improvement to the textile loom that used a series of punched paper cards
as a template to allow his loom to weave intricate patterns automatically.
The resulting Jacquard loom was an important step in the development of
computers because the use of punched cards to define woven patterns can
be viewed as an early, albeit limited, form of programmability.
It was the fusion of automatic calculation with programmability that
produced the first recognizable computers. In 1837, Charles Babbage was
the first to conceptualize and design a fully programmable mechanical
30
31. computer that he called "The Analytical Engine".Due to limited finances,
and an inability to resist tinkering with the design, Babbage never actually
built his Analytical Engine.
Large-scale automated data processing of punched cards was
performed for the U.S. Census in 1890 by tabulating machines designed by
Herman Hollerith and manufactured by the Computing Tabulating
Recording Corporation, which later became IBM. By the end of the 19th
century a number of technologies that would later prove useful in the
realization of practical computers had begun to appear: the punched card,
Boolean algebra, the vacuum tube (thermionic valve) and the teleprinter.
The Jacquard loom
was one of the first
programmable
devices.
During the first half of the 20th century, many scientific computing
needs were met by increasingly sophisticated analog computers, which used
a direct mechanical or electrical model of the problem as a basis for
computation. However, these were not programmable and generally lacked
the versatility and accuracy of modern digital computers.
31
32. Several developers of ENIAC, came up with a far more flexible and
elegant design, which came to be known as the "stored program
architecture" or von Neumann architecture. This design was first formally
described by John von Neumann in the paper First Draft of a Report on the
EDVAC, distributed in 1945. A number of projects to develop computers
based on the stored-program architecture commenced around this time, the
first of these being completed in Great Britain. The first to be demonstrated
working was the Manchester Small-Scale Experimental Machine (SSEM or
"Baby"), while the EDSAC, completed a year after SSEM, was the first
practical implementation of the stored program design. Shortly thereafter,
the machine originally described by von Neumann's paper—EDVAC—was
completed but did not see full-time use for an additional two years.
Nearly all modern computers implement some form of the stored-
program architecture, making it the single trait by which the word
"computer" is now defined. While the technologies used in computers have
changed dramatically since the first electronic, general-purpose computers
of the 1940s, most still use the von Neumann architecture.
EDSAC was one of the first
computers to implement the
stored program (von Neumann)
architecture
Computers that used vacuum tubes as their
electronic elements were in use throughout the 1950s.
Vacuum tube electronics were largely replaced in the
1960s by transistor-based electronics, which are smaller, faster, cheaper to
produce, require less power, and are more reliable. In the 1970s, integrated
circuit technology and the subsequent creation of microprocessors, such as
the Intel 4004, further decreased size and cost and further increased speed
and reliability of computers. By the 1980s, computers became sufficiently
small and cheap to replace simple mechanical controls in domestic
appliances such as washing machines. The 1980s also witnessed home
computers and the now ubiquitous personal computer. With the evolution
32
33. of the Internet, personal computers are becoming as common as the
television and the telephone in the household.
Microprocessors are miniaturized devices that
often implement stored program CPUs.
33
34. ADVANTAGES OF COMPUTER:-
Sharing devices such as printers saves money. Files can easily be shared
between users. Network users can communicate by email. Security is good -
users cannot see other users' files unlike on stand-alone machines. A file
server is easy to back up as all the data is stored in one place. A computer
allows a person to manipulate data easily and quickly, create text
documents, edit them, print them, manipulate images, print them, send text
and images over the Internet, download information over the Internet,
interact with other people easily from home, keep records of transactions,
activities, plan trips, and generally do far more than a person without a
computer. Computers are very useful to make everyday life a lot easier. You
can check the weather, email, search items, buy things type papers and
much much more. You can also play games and post blogs and other stuff.
People use computers in many ways. Can be used in business, inventions
and scanners.
Computers help children to be in control of their experience, to set their own
pace, and to select the level of challenge with which they feel comfortable.
Computers help children to use all of their senses to extract information.
Computers fascinate kids and can draw their full attention, which often
results in a deeper focus and concentration. Computers enable children to
learn through creating, just as they gain hands-on knowledge and
understanding when they build forts, make up stories, and paint, increase
their skills. Good educational software enables children to develop and
practice a broad range skill. It can help them learn, for example, about
letters, numbers, shapes, colours, and rhythm. Good software can also help
children develop their understanding of cause and effect, higher order
problem solving, procedural thinking, and creative expression. Today, the
wide range of multimedia available for kids in India is really amazing.
Computers are helpful because they offer a wide range of functions and
services that are not available anywhere else. There are four main uses:
word processing, internet/communications, digital video/audio
composition, and desktop publishing.
34
35. Disadvantages of computer:-
One of the worst disadvantages of a computer is a
computer virus
History:-
The Creeper virus was first detected on ARPANET, the forerunner of the
Internet in the early 1970s.[1] It propagated via the TENEX operating system
and could make use of any connected modem to dial out to remote
computers and infect them. It would display the message "I'M THE
CREEPER : CATCH ME IF YOU CAN.". It is rumored that the Reaper
program, which appeared shortly after and sought out copies of the Creeper
and deleted them, may have been written by the creator of the Creeper in a
fit of regret.
A common misconception is that a program called "Rother J" was the first
computer virus to appear "in the wild" — that is, outside the single
computer or lab where it was created, but that claim is false. See the
Timeline of notable computer viruses and worms for other earlier viruses. It
was however the first virus to infect computers "in the home". Written in
1982 by Richard Skrenta, it attached itself to the Apple DOS 3.3 operating
system and spread by floppy disk.This virus was originally a joke, created
by a high school student and put onto a game on floppy disk. On its 50th
use the Elk Cloner virus would be activated, infecting the computer and
displaying a short poem beginning "Elk Cloner: The program with a
personality".
The first PC virus in the wild was a boot sector virus called Brain, created in
1986 by the Farooq Alvi Brothers, operating out of Lahore, Pakistan. The
brothers reportedly created the virus to deter pirated copies of software they
had written. However, analysts have claimed that the Ashar virus, a variant
of Brain, possibly predated it based on code within the virus
35
36. A computer virus is a computer program that can copy itself and infect a
computer without permission or knowledge of the user. The term "virus" is
also commonly used, albeit erroneously, to refer to many different types of
malware and adware programs. The original virus may modify the copies,
or the copies may modify themselves, as occurs in a metamorphic virus. A
virus can only spread from one computer to another when its host is taken
to the uninfected computer, for instance by a user sending it over a network
or the Internet, or by carrying it on a removable medium such as a floppy
disk, CD, or USB drive. Meanwhile viruses can spread to other computers
by infecting files on a network file system or a file system that is accessed by
another computer. Viruses are sometimes confused with computer worms
and Trojan horses. A worm can spread itself to other computers without
needing to be transferred as part of a host, and a Trojan horse is a file that
appears harmless. Worms and Trojans may cause harm to either a computer
system's hosted data, functional performance, or networking throughput,
when executed. In general, a worm does not actually harm either the
system's hardware or software, while at least in theory, a Trojan's payload
may be capable of almost any type of harm if executed. Some can't be seen
when the program is not running, but as soon as the infected code is run, the
Trojan horse kicks in. That is why it is so hard for people to find viruses and
other malware themselves and why they have to use spyware programs and
registry processors.
Most personal computers are now connected to the Internet and to local area
networks, facilitating the spread of malicious code. Today's viruses may also
take advantage of network services such as the World Wide Web, e-mail,
Instant Messaging and file sharing systems to spread, blurring the line
between viruses and worms. Furthermore, some sources use an alternative
terminology in which a virus is any form of self-replicating malware.
Some malware is programmed to damage the computer by damaging
programs, deleting files, or reformatting the hard disk. Other malware
programs are not designed to do any damage, but simply replicate
themselves and perhaps make their presence known by presenting text,
video, or audio messages. Even these less sinister malware programs can
create problems for the computer user. They typically take up computer
memory used by legitimate programs. As a result, they often cause erratic
36
37. behavior and can result in system crashes. In addition, much malware is
bug-ridden, and these bugs may lead to system crashes and data loss. Many
CiD programs are programs that have been downloaded by the user and
pop up every so often. This results in slowing down of the computer, but it
is also very difficult to find and stop the problem.
Other disadvantages of computer are:-
The teenagers of today's society have changed dramatically due to the
Computer. Nowadays, the majority of teenagers have a PC and it has played
a key role in their lives. Teenagers need to be equipped with knowledge of
computer technology, as most things in life require the use of computers.
One disadvantage of owning a computer is the information that students
can access from the Internet. The Internet has also made the youth of today
quite lazy, especially in terms of their education. If a student needs to
research information for school, they merely access a relevant site and
download the information, rarely paying attention to what is written.
Purchasing the network cabling and file servers can be expensive. If the file
server breaks down the files on the file server become inaccessible. Viruses
can spread to other computers throughout a computer network. There is a
danger of hacking, particularly with wide area networks.
Computers are very engaging on children as well as adults. Kids with access
to software that is not age appropriate may be exposed to such negative
influences as violence, strong language, and over-stimulation from fast-
action graphics.
Latest technology
Laptop
37