Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
An Assignment
On
CAD CAM LAB
Submitted by:
MANPREET KAUR NOTEY
MBA - Semester I
(Session: 2018-20)
Roll no.- 12847
1|Page
CAM Lab & Viva 12847 MBA I Semester (2018-20)
CERTIFICATE
This is to certify that the work incorporated in the assignment of CAD CAM Lab is a work
carried out by Manpreet Kaur Notey bearing enrollment no.- BF3059 under my guidance
and supervision for the partial fulfilment for the award of Master of Business
Administration degree affiliated to Chhattisgarh Swami Vivekanand Technical University,
Bhilai (C.G), India.
Signature
Dr. Manoj Verghese
Head of the Department
2|Page
CAM Lab & Viva 12847 MBA I Semester (2018-20)
I, the undersigned, solemnly declare that the report of the thesis work entitled CAD CAM
Lab is based on my own work carried out during the course of my study under the
supervision of Ms. Aarti Sahu.
I assert that the statements made and conclusions drawn are an outcome of my research
work. I further declare that to the best of my knowledge and belief the report does not
contain any part of any work which has been submitted for the award of MBA degree or
any other degree/diploma/certificate in this University or any other University of India or
abroad.
(Signature)
Manpreet Kaur Notey
Enrollment no.- BF3059
3|Page
CAM Lab & Viva 12847 MBA I Semester (2018-20)
ACKNOWLEDGEMENT
Firstly, I would like to thank the almighty God, who bestowed upon me this
opportunity for working on this assignment and generated the capacity to
successfully complete the project.
I am extremely indebted to my project guide Ms. Aarti Sahu ma’am and Dr. Manoj
Verghese sir for their valuable suggestions and guidance, which ensured an in-
depth learning and understanding of the concepts. Their inputs from past
experiences and practical interpretation of the problem helped me a lot in
comprehending the requirements of the assignment. This ensured great learning
for me. They were always helpful & always able to take out some time off their
busy schedule to guide me in this project.
Lastly, I would like to thank my parents for their moral support, and my friends
from whom I received lots of suggestions that improved the quality of my work.
4|Page
CAM Lab & Viva 12847 MBA I Semester (2018-20)
TABLE OF CONTENTS
5|Page
CAM Lab & Viva 12847 MBA I Semester (2018-20)
1. What are Peripheral devices and their classification? Discuss about Storage
devices.
A peripheral device provides input/output (I/O) functions for a computer and serves as
an auxiliary computer device without computing-intensive functionality. Peripheral
devices connect with a computer through several I/O interfaces, such as
communications (COM), Universal Serial Bus (USB) and serial ports.
Peripheral devices are categorized as either an input device or an output device, and
some function as both.
Among these types of hardware are both internal peripheral devices and external
peripheral devices, either type of which might include input or output devices.
Common internal peripheral devices you'll find in a computer include an optical disc
drive, a video card, and a hard drive.
In those examples, the disc drive is one instance of a device that's both an input and
an output device. It can not only be used by the computer to read information stored
on the disc (e.g. software, music, movies) but also to export data from the computer
to the disc (like when burning DVDs).
Network interface cards, USB expansion cards, and other internal devices that might
plug in to a PCI Express or other type of port, are all types of internal peripherals.
Common external peripheral devices include devices like a mouse, keyboard, pen
tablet, external hard drive, printer, projector, speakers, webcam, flash drive, media
card readers, and microphone.
6|Page
CAM Lab & Viva 12847 MBA I Semester (2018-20)
Anything that you can connect to the outside of a computer, that typically doesn't
operate on its own, could be referred to as an external peripheral device.
Some devices are considered peripheral devices because they can be separated from
the primary function of the computer and can usually be removed rather easily. This
is especially true of external devices like printers, external hard drives, etc.
However, that isn't always true, so while some devices might be considered internal
on one system, they could just as easily be external peripheral devices on another.
The keyboard is one great example.
• Keyboards
• Pointing Devices mouse, trackballs, joysticks, touchpads and light pens
• Source entry devices scanners, audio input devices, video input devices, digital
cameras.
• Softcopy: - Monitor /Display Screens CRT and Flat Panel (LCD), EL and gas
plasma.
Monitor /Display Screen clarity:
Resolution refers to the number of dots displayed in the X (across) and Y (down) co-
ordinates expressed in terms of horizontal pixels X vertical pixels. Typical screens are
capable of displaying 640x480 dots.
Dot Pitch is the measurement of how close together the pixels, or phosphor dots, are that
make up an image.
The smaller the dot pitch, the crisper the image,0.31 or less provides a sharp image,
especially when displaying text.
Refresh rate is the vertical frequency, or the rate at which each pixel on a screen is re-
drawn. A low refresh rate results in an image that flickers, resulting in eye-strain.
7|Page
CAM Lab & Viva 12847 MBA I Semester (2018-20)
A refresh rate of 60Hz means the images is redrawn 60 times a second. Typical refresh
rates are 60Hz, 72Hz and 75Hz.
Advantages: Less expensive, fast (some types), can make multiple copies with multipart
paper.
Disadvantages: Noisy! Prints lower quality in some types. Poor graphics or none at all.
Dot matrix printers form characters using row(s) of pins, 9, 18, or 24 which impact the
ribbon on top of the paper.
Daisy wheel printers use a spoked wheel with characters placed at the end of each spoke.
A print hammer is used to strike the desired character onto the ink ribbon and then the
paper.
Non-Impact Printers-
General features-
8|Page
CAM Lab & Viva 12847 MBA I Semester (2018-20)
vi. offers superior quality and greater options (in terms of the number of fonts and
quality of graphic pictures)
The three main types of non-impact printers are LaserJet, inkjet and thermal.
Characteristics of printers:
Speed: The speed of a printer is measured in: cps= characters per second, lpm= lines
per minute ppm= pages per minute. The faster the printing, the more expensive the
printer.
A storage device is any computing hardware that is used for storing, porting and extracting
data files and objects. It can hold and store information both temporarily and permanently,
and can be internal or external to a computer, server or any similar computing device. A
storage device may also be known as a storage medium or storage media.
Storage devices are one of the core components of any computing device. They store
virtually all the data and applications on a computer, except hardware firmware. They are
available in different form factors depending on the type of underlying device. For
example, a standard computer has multiple storage devices including RAM, cache, and
hard disk, as well as possibly having optical disk drives and externally connected USB
drives.
Primary storage devices: Generally smaller in size, these are designed to hold data
temporarily and are internal to the computer. They have the fastest data access speed
and include RAM and cache memory.
9|Page
CAM Lab & Viva 12847 MBA I Semester (2018-20)
Secondary storage devices: These usually have large storage capacity, and they store
data permanently. They can be either internal or external to the computer, and they
include the hard disk, optical disk drive and USB storage device.
Today, magnetic storage is one of the most common types of storage used with
computers. This technology found mostly on extremely large HDDs or hybrid hard drives.
• Floppy diskette
• Hard drive
• Magnetic strip
• Super Disk
• Tape cassette
• Zip diskette
Another common storage is optical storage, which uses lasers and lights as its method of
reading and writing data.
• Blu-ray disc
• CD-ROM disc
Flash memory has replaced most magnetic and optical media as it becomes cheaper
because it is the more efficient and reliable solution.
10 | P a g e
CAM Lab & Viva 12847 MBA I Semester (2018-20)
• CF (CompactFlash)
• Memory card
• SD card
Storing data online and in cloud storage is becoming popular as people need to access
their data from more than one device.
• Cloud storage
• Network media
Paper storage
Early computers had no method of using any of the above technologies for storing
information and had to rely on paper. Today, these forms of storage are rarely used or
found. In the picture to the right is an example of a woman entering data to a punch card
using a punch card machine.
• OMR
• Punch card
11 | P a g e
CAM Lab & Viva 12847 MBA I Semester (2018-20)
2. Explain about Operating Systems and its types. Discuss about Unix OS.
An operating system (OS), in its most general sense, is software that allows a user to
run other applications on a computing device. While it is possible for a software
application to interface directly with hardware, the vast majority of applications are
written for an OS, which allows them to take advantage of common libraries and not
worry about specific hardware details.
The OS also provides services to facilitate the efficient execution and management
of, and memory allocations for, any additional installed software application programs.
Some operating systems were developed in the 1950s, when computers could only
execute one program at a time. Later in the decade, computers included many
software programs, sometimes called libraries, which were linked together to create
the beginning of today's operating systems.
The OS consists of many components and features. Which features are defined as
part of the OS vary with each OS. However, the three most easily defined components
are:
Kernel: This provides basic-level control over all of the computer hardware devices.
Main roles include reading data from memory and writing data to memory, processing
execution orders, determining how data is received and sent by devices such as the
monitor, keyboard and mouse, and determining how to interpret data received from
networks.
User Interface: This component allows interaction with the user, which may occur
through graphical icons and a desktop or through a command line.
12 | P a g e
CAM Lab & Viva 12847 MBA I Semester (2018-20)
• It is a specialized software that controls and monitors the execution of all other
programs that reside in the computer, including application programs and other
system software.
• To act as an intermediary between the hardware and its users, making it easier for
the users to access and use other resources.
13 | P a g e
CAM Lab & Viva 12847 MBA I Semester (2018-20)
• To keep track of who is using which resource, granting resource requests, and
mediating conflicting requests from different programs and users.
• To provide efficient and fair sharing of resources among users and programs.
• Memory Management − Keeps track of the primary memory, i.e. what part of it is
in use by whom, what part is not in use, etc. and allocates the memory when a
process or program requests it.
• Processor Management − Allocates the processor (CPU) to a process and
deallocates the processor when it is no longer required.
• Device Management − Keeps track of all the devices. This is also called I/O
controller that decides which process gets the device, when, and for how much
time.
• File Management − Allocates and de-allocates the resources and decides who
gets the resources.
• Security − Prevents unauthorized access to programs and data by means of
passwords and other similar techniques.
• Job Accounting − Keeps track of time and resources used by various jobs and/or
users.
• Control Over System Performance − Records delays between the request for a
service and from the system.
• Interaction with the Operators − Interaction may take place via the console of the
computer in the form of instructions. The Operating System acknowledges the
same, does the corresponding action, and informs the operation by a display
screen.
• Error-detecting Aids − Production of dumps, traces, error messages, and other
debugging and error-detecting methods.
14 | P a g e
CAM Lab & Viva 12847 MBA I Semester (2018-20)
• Multi-user: Allows two or more users to run programs at the same time. Some
operating systems permit hundreds or even thousands of concurrent users.
• Multiprocessing: Supports running a program on more than one CPU.
• Multitasking: Allows more than one program to run concurrently.
• Multithreading: Allows different parts of a single program to run concurrently.
• Real time: Responds to input instantly. General-purpose operating systems, such
as DOS and UNIX, are not real-time.
The three most popular types of operating systems for personal and business
computing include Linux, Windows and Mac.
Windows
Mac
Mac OS is the official name of the Apple Macintosh operating system. Mac OS
features a graphical user interface (GUI) that utilizes windows, icons, and all
applications that run on a Macintosh computer have a similar user interface.
Linux
Linux is a freely distributed open source operating system that runs on a number of
hardware platforms. The Linux kernel was developed mainly by Linus Torvalds and it
is based on Unix.
15 | P a g e
CAM Lab & Viva 12847 MBA I Semester (2018-20)
Unix has been ported to more machine families than any other operating system. As
a result, it has come to be identified with the concept of open systems. Unix operating
systems are widely used in PCs, servers and mobile devices. The Unix environment
was also an essential element in the development of the Internet and networking.
Unix was developed based on the philosophy that the power of the system comes
from the relationships among programs, rather than on the programs themselves. Unix
programs are written to do one thing well, and programs are written so that they work
together. As such, Unix developers espouse simplicity, portability and clarity in design.
In order to adhere to this philosophy, Unix systems are characterized by:
Unix had a significant impact on other operating systems and can be credited (in whole
or in part) for the following:
• Unix shell inspired many of the command line interpreters that followed
16 | P a g e
CAM Lab & Viva 12847 MBA I Semester (2018-20)
• Helped contribute to the explosion of the Internet by making TCP/IP protocol more
widely available
Free Unix-like operating systems such as Linux and BSD now hold a large portion of
the market originally held by Unix.
The Unix operating system is a set of programs that act as a link between the
computer and the user.
The computer programs that allocate the system resources and coordinate all the
details of the computer's internals is called the operating system or the kernel.
Users communicate with the kernel through a program known as the shell. The shell
is a command line interpreter; it translates commands entered by the user and
converts them into a language that is understood by the kernel.
Unix Architecture
The main concept that unites all the versions of Unix is the following four basics −
• Kernel − The kernel is the heart of the operating system. It interacts with the
hardware and most of the tasks like memory management, task scheduling and
file management.
17 | P a g e
CAM Lab & Viva 12847 MBA I Semester (2018-20)
• Shell − The shell is the utility that processes your requests. When you type in a
command at your terminal, the shell interprets the command and calls the program
that you want. The shell uses standard syntax for all commands. C Shell, Bourne
Shell and Korn Shell are the most famous shells which are available with most of
the Unix variants.
• Commands and Utilities − There are various commands and utilities which you
can make use of in your day to day activities. cp, mv, cat and grep, etc. are few
examples of commands and utilities. There are over 250 standard commands plus
numerous others provided through 3rd party software. All the commands come
along with various options.
• Files and Directories − All the data of Unix is organized into files. All files are then
organized into directories. These directories are further organized into a tree-like
structure called the filesystem. The standard file system has, among others, the
following directories:
Directory Description
18 | P a g e
CAM Lab & Viva 12847 MBA I Semester (2018-20)
Directory Description
Darwin
Open source &
Apple Inc & 17.3.0, Nov
mostly APSL with 2000 Hybrid
Open source 2017
proprietary drivers
community
AIX
Closed source &
IBM 1986 7.2, Oct 2015 Monolithic
proprietary
Corporation
19 | P a g e
CAM Lab & Viva 12847 MBA I Semester (2018-20)
HP-UX
11i v3 Update
Hewlett- Closed source &
1982 16, March Monolithic
Packard proprietary
2017
Company
FreeBSD
Open source &
The FreeBSD 1993 11.1, Jul 2015 Monolithic
FreeBSD license
Project
Modular
NetBSD
Open source & 2- 7.1.1 Dec Monolithic Any
The NetBSD 1993
clauseBSD license 2017 Kernel (Rump
Foundation
Kernel)
Xenix
Closed source &
Microsoft, 1980 2.3.4, 1989 Monolithic
proprietary
SCO…
IRIX
Closed source & 6.5.30, Aug
Silicon 1988 Monolithic
proprietary 2006
Graphics
Tru64
Digital Closed source & 5.1B-6, Oct
1992 Hybrid Kernel
Equipment proprietary 2010
Corporation
Closed
macOS source (with open
2001 10.13.2 Hybrid
Apple Inc source
components)
20 | P a g e
CAM Lab & Viva 12847 MBA I Semester (2018-20)
Microsoft Office was primarily created to automate the manual office work with a
collection of purpose-built applications.
Besides desktop applications, Microsoft Office is available to use online or from cloud
under a lighter (Office Web Apps) and full (Office 365) version. As of 2013, Microsoft
Office 2013 is the latest version, available in 4 different variants including Office Home
Student 2013, Office Home Business 2013 and Office Professional 2 and the
online/cloud Office 365 Home Premium.
21 | P a g e
CAM Lab & Viva 12847 MBA I Semester (2018-20)
It was initially launched in 1983 and has since been revised numerous times. Microsoft
Word is available for both Windows and Macintosh operating systems.
In 1995, with the release of Windows 95 and Office 95, which offered a bundled set of
office productivity software, sales of Microsoft Word increased significantly.
Microsoft Word offers several features to ease document creation and editing,
including:
• Spell check: Word features a built-in dictionary for spell checking; misspelled
words are marked with a red squiggly underline. Sometimes, Word auto-corrects
an obviously misspelled word or phrase.
22 | P a g e
CAM Lab & Viva 12847 MBA I Semester (2018-20)
• External support: Word is compatible with many other programs, the most common
being the other members of the Office suite.
The default file format was .doc prior to the Microsoft Word 2007 version; in 2007,
.docx became the default file format.
23 | P a g e
CAM Lab & Viva 12847 MBA I Semester (2018-20)
24 | P a g e
CAM Lab & Viva 12847 MBA I Semester (2018-20)
Justify Alignment of
11 Ctrl+ J
Selected Text or Items
Apply/remove Highlight
12 Ctrl+Alt+H
Text
Function keys-
1 F1 Open Help
elements in window or on
6 F6
the windows
8 F8 Extended a selection
25 | P a g e
CAM Lab & Viva 12847 MBA I Semester (2018-20)
12 F12 Save As
26 | P a g e
CAM Lab & Viva 12847 MBA I Semester (2018-20)
27 | P a g e
CAM Lab & Viva 12847 MBA I Semester (2018-20)
If double-clicking a word,
9 Double-click
selects the complete word.
Double-clicking anywhere
10 Double-click after text on a line will set a
tab stop.
Double-clicking anywhere
11 Double-click after text on a line will set a
tab stop.
28 | P a g e
CAM Lab & Viva 12847 MBA I Semester (2018-20)
PowerPoint was developed by Dennis Austin and Thomas Rudkin at Forethought Inc.
It was supposed to be named Presenter, but the name was not adapted due to
trademark issues. It was renamed PowerPoint in 1987 as suggested by Robert
Gaskins. In August of 1987, Microsoft bought Forethought for $14 million and turned
it into its graphics business unit, where the company continued to develop the
software. The first iteration was launched together with Windows 3.0 in 1990. It only
allowed slide progression in one direction – forward – and the amount of customization
was fairly limited.
Function keys-
29 | P a g e
CAM Lab & Viva 12847 MBA I Semester (2018-20)
30 | P a g e
CAM Lab & Viva 12847 MBA I Semester (2018-20)
F5 Run a presentation
31 | P a g e
CAM Lab & Viva 12847 MBA I Semester (2018-20)
F7 Check spelling
32 | P a g e
CAM Lab & Viva 12847 MBA I Semester (2018-20)
33 | P a g e
CAM Lab & Viva 12847 MBA I Semester (2018-20)
34 | P a g e
CAM Lab & Viva 12847 MBA I Semester (2018-20)
35 | P a g e
CAM Lab & Viva 12847 MBA I Semester (2018-20)
Excel permits users to arrange data so as to view various factors from different
perspectives. Visual Basic is used for applications in Excel, allowing users to create a
variety of complex numerical methods. Programmers are given an option to code directly
using the Visual Basic Editor, including Windows for writing code, debugging and code
module organization.
Date/Time Functions
36 | P a g e
CAM Lab & Viva 12847 MBA I Semester (2018-20)
37 | P a g e
CAM Lab & Viva 12847 MBA I Semester (2018-20)
Math/Trig Functions
38 | P a g e
CAM Lab & Viva 12847 MBA I Semester (2018-20)
39 | P a g e
CAM Lab & Viva 12847 MBA I Semester (2018-20)
Statistical Functions
40 | P a g e
CAM Lab & Viva 12847 MBA I Semester (2018-20)
41 | P a g e
CAM Lab & Viva 12847 MBA I Semester (2018-20)
42 | P a g e
CAM Lab & Viva 12847 MBA I Semester (2018-20)
43 | P a g e
CAM Lab & Viva 12847 MBA I Semester (2018-20)
Network topology refers to the physical or logical layout of a network. It defines the
way different nodes are placed and interconnected with each other. Alternately,
network topology may describe how the data is transferred between these nodes.
There are two types of network topologies: physical and logical. Physical topology
emphasizes the physical layout of the connected devices and nodes, while the logical
topology focuses on the pattern of data transfer between network nodes.
A point-to-point connection is a direct link between two devices. For example, when
you attach your computer to a printer, you have created a point-to-point link. In
networking terms, most of the today’s point-to-point connections are associated with
modems and PSTN (Public Switched Telephone Network) communications because
only two devices share point-to-point connections, it defeats the purpose of a shared
network.
44 | P a g e
CAM Lab & Viva 12847 MBA I Semester (2018-20)
A multipoint connection, on the other hand, is a link between three or more devices.
Historically, multipoint connections were used to attach central CPUs to distributed
dumb terminals.
1. Bus Topology
2. Ring Topology
3. Star Topology
4. Mesh Topology
5. Cellular Topology
6. Hybrid Topology
Bus Topology
The physical bus topology is the simplest and most widely used of the network
designs. It consists of one continuous length of cabling (trunk) and a terminating
resistor (terminator) at each end. The data communications message travels along
the bus in both directions until it is picked up by a workstation or server NIC.
If the message is missed or not recognized, it reaches the end of the cabling and
dissipates at the terminator. All nodes in the bus topology have equal access to the trunk
45 | P a g e
CAM Lab & Viva 12847 MBA I Semester (2018-20)
This design is easy to install because the backbone trunk traverses the LAN as one
cable segment. This minimizes the amount of transmission media required. Also, the
number of devices and length of the trunk can be easily expanded.
1. The bus networks are difficult to reconfigure, especially when the acceptable
number of connections or maximum distances have been reached.
Ring Topology
As its name implies, the physical ring topology is a circular loop of point-to-point links.
Each device connects directly or indirectly to the ring through an interface device or
drop cable. Messages travel around the ring from node to node in very organized
manner. Each workstation checks the messages for a matching destination address.
46 | P a g e
CAM Lab & Viva 12847 MBA I Semester (2018-20)
If the address doesn’t match, the node simply regenerates the message and sends it
on its way. If the address matches, the node accepts the message and sends a reply
to the originating sender. Initially, ring topologies are moderately simple to install;
however, they require more media than bus systems because the loop must be
closed.
Once your ring has been installed, it’s a bit more difficult to reconfigure. Ring segments
must be divided or replaced every time they’re changed. Moreover, any break in the
loop can affect all devices on the network.
1. They are very easy to troubleshoot because each device incorporates a repeater.
Star Topology
The Physical star topology uses a central controlling hub with dedicated legs pointing
in all directions – like points of a star. Each network devices have a dedicated point-
to-point link to the central hub. This strategy prevents troublesome collisions and
keeps the line of communication open and free of traffic.
47 | P a g e
CAM Lab & Viva 12847 MBA I Semester (2018-20)
Star topologies are somewhat difficult to install because each device gets its own
dedicated segment. Obviously, they require a great deal of cabling. This design
provides an excellent platform for reconfiguration and troubleshooting.
Changes to the network are as simple as plugging another segment into the hub. In
addition, a break in the LAN is easy to isolate and doesn’t affect the rest of the network.
2. Easy to troubleshoot.
Mesh Topology
The mesh topology is the only true point-to-point design. It uses a dedicated link
between every device on the network. This design is not very practical because of its
excessive waste of transmission media. This topology is difficult to install and
reconfigure.
48 | P a g e
CAM Lab & Viva 12847 MBA I Semester (2018-20)
2. You can easily identify faults and isolate the affected links. Because of the high
number of redundant paths, multiple links can fail before the failure affects any
network device.
Cellular Topology
49 | P a g e
CAM Lab & Viva 12847 MBA I Semester (2018-20)
The cellular topology relies on the location of wireless media hubs. Cellular networks
exhibit interesting characteristics since this topology do not depend on cables.
Troubleshooting is easy because each hub interacts independently with each device.
A cellular installation depends on the accessibility hub locations.
Hybrid Topology
1. Tree network
50 | P a g e
CAM Lab & Viva 12847 MBA I Semester (2018-20)
2. Star-Ring or interconnected
LAN Protocols
LAN protocols are distinguished by their capability to efficiently deliver data over
shorter distances, such as a few hundred feet, through various mediums, such as
copper cabling. Different protocols exist for different purposes and exist in different
"layers" of the "Open Systems Interconnect," or OSI, model. Typically, when using the
word "LAN" to describe a protocol, the intent is to describe lower level, or physical,
layers. Some of the most common LAN protocols are "Ethernet," "Token Ring" and
"Fiber Distributed Data Interface," or "FDDI."
"Ethernet" is by far the most common type of LAN protocol. It is found in homes and
offices throughout the world and is recognizable by its common "CAT5" copper cable
medium. It uses a switch or hub to which all systems connect to exchange data.
"Token Ring" is an older LAN technology that is not prevalent anymore. The basic
premise of "Token Ring" is a single "token" is passed from system to system, or
through a hub, and only the intended recipient reads the token.
51 | P a g e
CAM Lab & Viva 12847 MBA I Semester (2018-20)
"FDDI" defines how LAN traffic is transmitted over fiber cabling. Fiber cabling is used
when longer distances, usually between floors or buildings, are required, or where
heightened security is required.
"802.11g" combines the best of the previous two protocols, operating at up to 54 Mbps
over longer distances. "802.11n" is the latest wireless protocol to be released. It can
operate at speeds of greater than 150 Mbps over longer distances than the other
protocols.
52 | P a g e
CAM Lab & Viva 12847 MBA I Semester (2018-20)
Business
• Payroll calculations
• Budgeting
• Sales analysis
• Financial forecasting
Banking
• ATM machines which are completely automated are making it even easier for
customers to deal with banks.
Insurance
Insurance companies are keeping all records up-to-date with the help of computers.
Insurance companies, finance houses, and stock broking firms are widely using
computers for their concerns.
53 | P a g e
CAM Lab & Viva 12847 MBA I Semester (2018-20)
• Maturity date
• Interests due
• Survival benefits
• Bonus
Education
• The computer provides a tool in the education system known as CBE (Computer
Based Education).
Marketing
54 | P a g e
CAM Lab & Viva 12847 MBA I Semester (2018-20)
• Home Shopping − Home shopping has been made possible through the use of
computerized catalogues that provide access to product information and permit
direct entry of orders to be filled by the customers.
Healthcare
Computers have become an important part in hospitals, labs, and dispensaries. They
are being used in hospitals to keep the record of patients and medicines. It is also
used in scanning and diagnosing different diseases. ECG, EEG, ultrasounds and CT
scans, etc. are also done by computerized machines.
Following are some major fields of health care in which computers are used.
• Diagnostic System − Computers are used to collect data and identify the cause
of illness.
• Lab-diagnostic System − All tests can be done and the reports are prepared by
computer.
• Patient Monitoring System − These are used to check the patient's signs for
abnormality such as in Cardiac Arrest, ECG, etc.
Engineering Design
One of the major areas is CAD (Computer Aided Design) that provides creation and
modification of images. Some of the fields are −
• Structural Engineering − Requires stress and strain analysis for design of ships,
buildings, budgets, airplanes, etc.
55 | P a g e
CAM Lab & Viva 12847 MBA I Semester (2018-20)
Military
Computers are largely used in defense. Modern tanks, missiles, weapons, etc. Military
also employs computerized control systems. Some military areas where a computer
has been used are −
• Missile Control
• Military Communication
• Smart Weapons
Communication
• Chatting
• Usenet
• FTP
• Telnet
• Video-conferencing
Government
Computers play an important role in government services. Some major fields in this
category are −
• Budgets
56 | P a g e
CAM Lab & Viva 12847 MBA I Semester (2018-20)
• Weather forecasting
57 | P a g e
CAM Lab & Viva 12847 MBA I Semester (2018-20)
Conclusion
In conclusion, computers are becoming very important everywhere. Computers are a very
essential thing in our life. During the past 10 years, the use of computers in education has
increased dramatically and a wide range of educational computer programs are now
widely available for individual and classroom use. More companies are using them,
records are being stored in computer files, and stores are taking their business online to
sell to a broader audience. All of these are possible because of Computer Engineering. If
some very important changes are made in the curriculum, more students will be attracted
to the major allowing it to flourish even more. If students have the ability to learn what
they need to know about computers, they can go on into the job market and, hopefully,
become very successful. There will always be a rising need for people who can work with
technology, make it better, and even invent new tools to work with it.
58 | P a g e