You are on page 1of 27

c c cc

 
       
p 
p Y
   

  

 


        p

Biometrics is the high technology sector refers to a particular class of identification


technologies. These technologies use an individual's unique biological traits to determine
one's identity. The traits that are considered include fingerprints, retina and iris patterns,
facial characteristics and many more.

This method of identification is preferred over traditional methods involving passwords


and PIN numbers for its accuracy and case sensitiveness. A biometric system is essentially
a pattern recognition system which makes a personal identification by determining the
authenticity of a specific physiological or behavioural characteristic possessed by the user.
An important issue in designing a practical system is to determine how an individual is
identified. Depending on the context, a biometric system can be either a verification
(authentication) system or an identification system. Verification involves confirming or
denying a person's claimed identity while in identification, one has to establish a person's
identity. Biometric systems are divided on the basis of the authentication medium used.
They are broadly divided as identifications of Hand Geometry, Vein Pattern, Voice
Pattern, DNA, Signature Dynamics, Finger Prints, Iris Pattern and Face Detection. These
methods are used on the basis of the scope of the testing medium, the accuracy required
and speed required. Every medium of authentication has its own advantages and
shortcomings. With the increased use of computers as vehicles of information technology,
it is necessary to restrict unauthorized access to or fraudulent use of sensitive/personal
data. Biometric techniques being potentially able to augment this restriction are enjoying a
renewed.

Reliable authorization and authentication has become an essential part of every man¶s life
for a number of routine applications. Biometrics is automated method of recognizing a
person based on a physiological or behavioural characteristic. Biometrics though in its
nascent form has a number of tractable aspects like security, data integrity, fault tolerance
and system recovery. It is considered a reliable solution for protecting the identity and the
rights of individuals as it recognizes unique and immutable features. Biometrics is used for
two authentication methods.

‡ Ê 

This involves establishing a person's identity based only on biometric measurements. The
comparator matches the obtained biometric with the ones stored in the database bank using
a 1: N matching algorithm for identification

‡ r 

It involves confirming or denying a person's laimed identity. A basic identity (e.g. ID


number) is accepted and a biometric template of the subject taken, is matched using a 1:1
matching algorithm to confirm the person¶s identity


 Y 

c c cc  
       
p 


 !"# $

There are basically two types of biometrics:


1. behavioural biometrics
2. Physical biometrics

p 
  
 

Behavioural biometrics basically measures the characteristics which are acquired naturally
over a time. It is generally used for verification. ‘ ample:

* Speaker Recognition - analysing vocal behaviour


* Signature - analysing signature dynamics
* Keystroke - measuring the time spacing of typed words

p
 
 :

Physical biometrics measures the inherent physical characteristics on an individual.It


canbe used for either identification or verification.

* Bertillon age - measuring body lengths (no longer used)


* Fingerprint- analysing fingertip patterns
* Facial Recognition- measuring facial characteristics
* Hand Geometry - measuring the shape of the hand
* Iris Scan - analysing features of colour ring of the eye
* Retinal Scan - analysing blood vessels in the eye
* Vascular Patterns - analysing vein patterns
* DNA -analysing genetic makeup

 
  

Y à  
 


Fingerprint Recognition involves taking an image of a person's fingertips and records its
characteristics like whorls, arches, and loops along with the patterns of ridges, furrows,
and minutiae. Fingerprint matching can be achieved in three ways

1-Yinutiae based matching stores minutiae as a set of points in a plane and the points are
matched in the template and the input minutiae.

2-YCorrelation based matching superimposes two fingerprint images and correlation between
corresponding pixels is computed.


 Y 

c c  cc    
p
Y
Y
Y Ri Y t Y Y t i Y iY  Y 
 Y t Y t tY  t Y iY Y
i tiY  t i Y Yii ltYi Yl Ylit Yi  i tYiY
Y
Y  t Y t Y i  i tY   tY t  iY  lY  ti lY   Y ttY Y Y
CC Y  Y CY iY   Y liY ttY   Y ttY  Y  Y tY t    Y
t  lY i Y   iti
Y t lY l t i Y ilY  Y il t i Y   Y  Y
lt  Y   Y ttY  Y  Y    Y i Y i Y tY   Y  Y  ti Y
i lYt YtYt  itt Yt YtYi  Y Y  t YtY Yi lYitY
tY  i
 Y i  i tY   i Y iY
 Y tlY  Y lilY tY   Y  t Y

i Y  Y ili Y  Y l Y  Y  t Y t Y Y iY  i Y  Y
 YR  tlY Y llY  Y Y  Y 
Y Y i Y i  i tY  Y
 Y t iti Y tY Y Y !t lY lY it i Y t  lY i Y
i  i tY Y l Y  Y   iY Y Y i Y  Y   tY i tii ti Y
tYY

Y
Y
Y
 
6Y 6YtY iY i Y Yi ti "Y YY   #Yi  YtY ltY i tY  Y
Yi tiY
6Y Y  Y Yl ti YYtYi tiY
 Y Yi  YtYi  Yi Y Y
 ti l Y   Y Y Y   YtY   Y Y Y  ti l Yi  Y

Y
Y à  
 Y
àY Y

 Y
Y
Y
Y
Y
Y
Y
Y

     Y Y
Y
c c cc  
       
p 


There are two basic classes of matching techniques. They are:
‡Y Image techniques
Use both optical and numerical image correlation techniques
Feature techniques
Extracts features and develop representations from these features
Combining the above two techniques:

‡Y Hybrid techniques (with improved accuracy)

Y à 
 


Y



Face recognitiontechnique records face images through a digital video camera and analyses
facial characteristics like the distance between eyes, nose, mouth, and jaw edges. These
measurements are broken into facial planes and retained in a database, further used for
comparison. Face recognition can be done in two ways:

1-Y Face appearance employs Fourier transformation of the face image into its
fundamental frequencies and formation of Eigen faces, consisting of Eigen vectors
of the covariance matrix of a set of training images. The distinctiveness of the face
is captured without being oversensitive to noise such as lighting variations.

2-Y Face geometry models a human face created in terms of particular facial features
like eyes, mouth, etc. and layout of geometry of these features is computed. Face
recognition is then a matter of matching constellations. Another face identification
technology, Facial thermo grams, uses infrared heat scans to identify facial
characteristics. This non-intrusive technique is light-independent and not
vulnerable to disguises. Even plastic surgery, cannot hinder the technique. This
technique delivers enhanced accuracy, speed and reliability with minimal storage
requirements. To prevent a fake face or meld from faking out the system, many
systems now require the user to smile, blink, or otherwise move in a way that is
human before verifying. This technique is gaining support as a potential tool for
averting terrorism, law enforcement areas and also in networks and automated bank
tellers.


 Y 

c c cc  
       
p 

Y c 
 


Voice Recognitioncombines physiological and behavioural factors to produce speech


patterns that can be captured by speech processing technology. Inherent properties of the
speaker like fundamental frequency, nasal tone, cadence, inflection, etc. are used for
speech authentication. Voice recognition techniques can be divided into categories
depending on the type of authentication domain.

1-Y Fixed text method is a technique where the speaker is required to say a
predetermined word that is recorded during registration on the system.

2-Y In the text dependent method the system prompts the user to say a specific word or
phrase, which is then computed on the basis of the user¶s fundamental voice pattern.

3-Y The text independent method is an advanced technique where the user need not
articulate any specific word or phrase. The matching is done by the system on the basis of
the fundamental voice patterns irrespective of the language and the text used.

4- Conversational technique verifies identity of the speaker by inquiring about the


knowledge that is secret or unlikely to be known or guessed by a sham.

This technique is inexpensive but is sensitive to background noise and it can be


duplicated. Also, it is not always reliable as voice is subject to change during bouts of
illness, hoarseness, or other common throat problems. Applications of this technique
include voice-controlled computer system, telephone banking, m-commerce and audio
and video indexing.

‡Y Voice recognition is not the same as speech recognition, it is speaker recognition


‡Y Considered both physiological and behavioral
‡Y Popular and low-cost, but less accurate and sometimes lengthy enrollment

Ê 
 



 Y 

c c cc  
       
p 




Iris recognition analyses features like rings, furrows, and freckles existing in the colour
tissue surrounding the pupil. The scans use a regular video camera and works through
glasses and contact lenses. [The image of the iris can be directly taken by making the user
position his eye within the field of a single narrow-angle camera. This is done by observing
a visual feedback via a mirror. The isolated iris pattern obtained is then demodulated to
extract its phase information. Iris image acquisition can be done in two ways:

? YO
that uses an LED based point light source in conjunction with a
standard video camera. The system captures images with the iris diameter typically
between 100-200 pixels from a distance of 15-46 cm using 330mm lens.

2-{ 
in comparison results in an illumination rig that is more complex. The
system images the iris with approximately 256 pixels across the diameter from 20cm
using an 80mm lens.

Iris recognition was piloted in Saudi Arabia as a method of keeping track of the millions
making Haj. Also it is used a Berkshire County jail for prisoner identification and
Frankfurt airport for passenger registration.
‡Y Analysis of the iris of the eye, which is the colored ring of tissue that surrounds the
pupil of the eye.
‡Y Based on visible features, i.e. rings, furrows, freckles and the corona. Features and
their location are used to form the Iris codes, which is the digital template.
‡Y Widely regarded as the most safe, accurate biometrics technology and capable of
performing 1-to-many matches at extraordinarily high speeds, without sacrificing
accuracy.

Iris recognition is a highly mature technology with a proven track record in a


number of application areas and used very effectively all over the world.

Y a 
 

Hand geometry, as the name suggests, involves the measurement and analysis of the
human hand. Features like length and width of the fingers, aspect ratio of the palm or


 Y 

c c cc  
       
p 
fingers, width of the palm, thickness of the palm, etc. are computed. The user places the
palm on a metal surface, which has guidance pegs on it to properly align the palm, so that
the device can read the hand attributes.

The basic procedure involves capturing top and side views of the hand using a single
camera by judicious placement of a single 45° mirror. To enrol a person in a database, two
snapshots of the hand are taken and the average of resulting feature vectors is computed
and stored. Four different distance matrices (Absoluteweighted absolute, Euclideanand
weighted Euclidean

Hand Geometry is employed at locations like the Colombian legislatures, San Francisco
International Airport, day care centres, a sperm bank, welfare agencies, hospitals, and
immigration facilities.

‡Y Hand geometry systems are commonly available in two main forms. Full hand
geometry systems take an image of the entire hand for comparison while Two
Finger readers only image two fingers of the hand.

‡Y Hand recognition technology is currently one of the most deployed biometrics


disciplines world wide

‡Y A camera captures an image of the hand, with the help of a mirror to get also the
edge. The silhouette of the hand is extracted, and some geometrical characteristics
stored.

Biometric devices, such as finger scanners, consist of:

‡Y A reader or scanning device.


‡Y Software that converts the scanned information into digital form and compares
match points.
‡Y A database that stores the biometric data for comparison

V 

Ben-Gurion Airport - Hand Geometry INSPASS

Y c    



 Y 

c c cc  
       
p 

Signature recognition is an instance of writer recognition, which has been accepted as


irrefutable evidence in courts of laws. The way a person signs his name is known to be a
characteristic of that individual. Approach to signature verification is based on features like
number of interior contours and number of vertical slope components. Signatures are
behavioural biometric that can change with time, influenced by physical and emotional
conditions of the signatories. Furthermore, professional forgers can reproduce signatures to
fool an unskilled eye and hence is not the preferred choice.

‡Y Static/Off-line: the conventional way


‡Y Dynamic/On-line: using electronically instrumented device
‡Y Principle: the movement of the pen during the signing process rather than the static
image of the signature.
‡Y any aspects of the signature in motion can be studied, such as pen pressure, the
sound the pen makes

Applications

÷ Ê÷Ê÷
÷
Ê
÷ 

Y O 


 Y 

c c cc  
       
p 
‡Y DNA has been called the ³ultimate identifier´
‡Y Identify information from every cell in the body in a digital form
‡Y Not yet fully automated, not fast and expensive
‡Y Theoretical limitation: Identical twins have the same DNA
‡Y Privacy issue ± DNA contains information about race, paternity, and medical
conditions for certain disease

Y   
 
 


Retina Recognitiontechnology uses infrared scanning and compares images of the blood
vessels in the back of the eye, the choroid vasculature. The eye¶s inherent isolation and
protection from the external environment as an internal organ of the body is a benefit.
Retina scan is used in high-end security applications like military installations and power
plants. The pattern of blood vessels that emanate from the optic nerve and disperse
throughout the retina depends on individuals and never changes. No two retinas are the
same, even in identical twins.

Y 
  

‡Y Thermo grams requires an infrared camera to detect the heat patterns of parts of
the body that are unique to every human being (such as the face)
‡Y Normally expensive because of the sensors
‡Y Useful paper: Illumination Invariant Face Recognition Using Thermal Infrared
Imagery

Y Ô 


 Y 

c c cc  
       
p 

‡Y The final objective: to recognize persons using standard cameras in any conditions.
‡Y Gait recognition is particularly studied as it may enable identification at distance.

Y X 



‡Y The rhythms with which one types at a keyboard are sufficiently distinctive to form
the basis of the biometric technology known as keystroke dynamics.
‡Y 100% software-based, requiring no sensor more sophisticated than a home
computer

Y ‘ 
 
 


‡Y Ear geometry recognition uses the shape of the ear to perform identification
‡Y Suggestions have been made that the shapes and characteristics of the human ear
are widely different
‡Y An infrared image can be used to eliminate hair
‡Y ight be recognized at a distance

Y c  
 

In a range of wavelengths over 6mm patch, several LEDs send light into the
skin, and photodiodes read the scattered light, which is analyzed to perform
the authentication.


 Y 

c c cc  
       
p 

Y  

 

‡Y ÷            



‡Y                
‡Y            
   
    
   

Y M


 


It¶s absolutely clear that people with differing immunity genes produce different body
odors. Electronic/artificial noses: developed as a system for the automated detection and
classification of odors, vapors, gases. And artificial noses are not yet sophisticated enough
to do the entire job

Authentication by biometric verificationis becoming increasingly common in corporate


and public security systems, consumer electronics and point of sale (POS) applications. In
addition to security, the driving force behind biometric verification has been convenience.

The first time an individual uses a biometric system is called an enrolment. During the
enrolment, biometric information from an individual is stored. In subsequent uses,
biometric information is detected and compared with the information stored at the time of
enrolment. Note that it is crucial that storage and retrieval of such systems themselves be


 Y 

c c cc  
       
p 
secure if the biometric system is to be robust. The first block (sensor) is the interface
between the real world and the system it has to acquire all the necessary data. ost of the
times it is an image acquisition system, but it can change according to the characteristics
desired. The second block performs all the necessary pre-processing: it has to remove
artefacts from the sensor, to enhance the input (e.g. removing background noise), to use
some kind of normalization, etc. In the third block necessary features are extracted. This
step is an important step as the correct features need to be extracted in the optimal way. A
vector of numbers or an image with particular properties is used to create a template. A
template is a synthesis of the relevant characteristics extracted from the source. Elements
of the biometric measurement that are not used in the comparison algorithm are discarded
in the template to reduce the file size and to protect the identity of the enrolee.

If enrolment is being performed, the template is simply stored somewhere (on a card or
within a database or both). If a matching phase is being performed, the obtained
template is passed to a matcher that compares it with other existing templates,
estimating the distance between them using any algorithm .The matching program will
analyse the template with the input. This will then be output for any specified use or
purpose (e.g. entrance in a restricted area)

pY   % 


 
  % 
&


    ' p


A computer virus is a computer program that can copy itself and infect a computer without
the permission or knowledge of the owner. The term "virus" is also commonly but
mistakenly used to refer to other types of malware, adware, and spyware programs that do
not have the reproductive ability.

A true virus can only spread from one computer to another (in some form of executable
code) when its host is taken to the target computer for instance because a user sent it over
a network or the Internet, or carried it on a removable medium such as a floppy disk, CD,
DVD, or USB drive.Viruses are sometimes confused with computer worms and Trojan
horses, which are technically different.A worm can exploit security vulnerabilities to
spread itself to other computers without needing to be transferred as part of a host. Worms
like viruses, may cause harm to a computer system's hosted data, functional performance,
or networking throughput, when they are executed.ost personal computers are now
connected to the Internet and to local area networks, facilitating the spread of malicious
code.Viruses hide on a disk and when you access the disk (either a diskette or another hard
disk over a network) the virus program will start and infect your computer.The worst thing
about a computer virus is that they can spread from one computer to another, either via use
of infected floppy disk, or over aComputer network.


 Y 

c c cc  
       
p 

( #) *$+),-

p Y | 
r 

This type of virus is a permanent which dwells in the RA memory. From there it can
overcome and interrupt all of the operations executed by the system: corrupting files and
programs that are opened, closed, copied, renamed etc.

Examples include: Radix, C$, aeve

p
O 
V
r 

The main purpose of this virus is to replicate and take action when it is executed. When a
specific condition is met, the virus will go into action and infect files in the directory or
folder that it is in and in directories that are specified in the AUTOEXEC.BAT file PATH.
This batch file is always located in the root directory of the hard disk and carries out
certain operations when the computer is booted.

p
  
r 

Virus of this kind is characterized by the fact that it deletes the information contained in
the files that it infects, rendering them partially or totally useless once they have been
infected. The only way to clean a file infected by an overwrite virus is to delete the file
completely, thus losing the original content.

Examples of this virus include: Way, Trj.Reboot, Trivial.88.D.

p

r 

This type of virus affects the boot sector of a floppy or hard disk. This is a crucial part of a
disk, in which information on the disk itself is stored together with a program that makes it
possible to boot (start) the computer from the disk. The best way of avoiding boot viruses
is to ensure that floppy disks are write-protected and never start your computer with an
unknown floppy disk in the disk drive.

Examples of boot viruses include: AntiEXE

p
 
r 

acro viruses infect files that are created using certain applications or programs that
contain macros. These mini-programs make it possible to automate series of operations so
that they are performed as a single action, thereby saving the user from having to carry
them out one by one.Examples of macro viruses: Relax, elissa. A, Babbles, O97/Y2K.

p
O  
r 


 Y 

c c cc  
       
p 

Directory viruses change the paths that indicate the location of a file. By executing a
program (file with the extension .EXE or .CO) which has been infected by a virus, you
are unknowingly running the virus program, while the original file and program have been
previously moved by the virus. Once infected it becomes impossible to locate the original
files.

p
 
r 

Polymorphic viruses encrypt or encode themselves in a different way (using different


algorithms and encryption keys) every time they infect a system.

This makes it impossible for anti-viruses to find them using string or signature searches
(because they are different in each encryption) and also enables them to create a large
number of copies of themselves.

Examples include: Elkin, arburg, Satan Bug, and Tulare.

p

Ê 

This type of virus infects programs or executable files (files with an .EXE or .CO
extension). When one of these programs is run, directly or indirectly, the virus is activated,
producing the damaging effects it is programmed to carry out. The majority of existing
viruses belong to this category, and can be classified depending on the actions that they
carry out.

p 
÷ 
r 

Companion viruses can be considered file infector viruses like resident or direct action
types. They are known as companion viruses because once they get into the system they
"accompany" the other files that already exist. In other words, in order to carry out their
infection routines, companion viruses can wait in memory until a program is run (resident
viruses) or act immediately by making copies of themselves (direct action viruses).

Some examples include: Stator, Asimov.1539, and Terrax.1069

p
V
r 

The file allocation table or FAT is the part of a disk used to connect information and is a
vital part of the normal functioning of the computer.
This type of virus attack can be especially dangerous, by preventing access to certain
sections of the disk where important files are stored. Damage caused can result in
information losses from individual files or even entire directories.


{ 

A worm is a program very similar to a virus it has the ability to self-replicate, and can lead
to negative effects on your system and most importantly they are detected and eliminated
by antiviruses. Examples of worms include: PSWBugbear.B, Lovgate.F, Trile.C, Sobig.D,
ap son.


 Y 

c c cc  
       
p 


 
 

A Trojan horse is just a computer program. The program pretends to do one thing (like claim
to be a picture) but actually does damage when one starts it (it can completely erase one's
files). Trojan horses cannot replicate automatically.

.


They are not considered viruses because they do not replicate. They are not even programs
in their own right but rather camouflaged segments of other programs.

Their objective is to destroy data on the computer once certain conditions have been met.
Logic bombs go undetected until launched, and the results can be destructive.



 

An e-mail virus will use an e-mail message as a mode of transport, and usually will copy itself
by automatically mailing itself to hundreds of people in the victim's address book.


V 
 

 
  

any users install anti-virus software that can detect and eliminate known viruses after the
computer downloads or runs the executable. They work by examining the contents of the
computer's memory (its RA, and boot sectors) and the files stored on fixed or removable
drives (hard drives, floppy drives), and comparing those files against a database of known
virus "signatures". Some anti-virus programs are able to scan opened files in addition to
send and received emails 'on the fly' in a similar manner. This practice is known as "on-
access scanning." Anti-virus software does not change the underlying capability of host
software to transmit viruses. There have been attempts to do this but adoption of such anti-
virus solutions can void the warranty for the host software. Users must therefore update
their software regularly to patch security holes. Anti-virus software also needs to be
regularly updated in order to gain knowledge about the latest threats and hoaxes.


 :

alwareis software designed to infiltrate or damage a computer system, without the owner's
informed consent. alware is commonly taken to include computer viruses, worms, Trojan
horses, spyware and adware.

pY&    
     
/ &  
 
  

 

     p


 Y 

c c cc  
       
p 




The term Client/server refers to the concept of sharing the work involved in processing data
between the client computer and the most powerful server computer.The client/server
network is the most efficient way to provide:
Databases and management of applications such as Spread sheets, Accounting,
Communications and Document management Network anagement
Centralizedfilesstorage.

The client/server model is basically an implementation of distributed or cooperative


processing. At the heart of the model is the concept of splitting application functions
between a client and a server processor. The division of labour between the different
processors enables the application designer to place an application function on the
processor that is most appropriate for that function. This lets the software designer
optimize the use of processors±providing the greatest possible return on investment for
the hardware.Client/server application design also lets the application provider mask the
actual location of application function. The user often does not know where a specific
operation is executing. The entire function may execute in either the PC or server, or the
function may be split between them. This masking of application function locations
enables system implementers to upgrade portions of a system over time with a minimum
disruption of application operations, while protecting the investment in existing hardware
and software.


 Y 

c c cc  
       
p 
Client/server systems are constructed so that the database can reside on a central computer,
known as a server, and be shared among several users. Users access the server through a
client or server application:

In a two-tier client/server system, users run an application on their local computer, known
as a client that connects over a network to the server running SQL Server. The client
application runs both business logic and the code to display output to the user, and is also
known as a thick client.

The business logic is located in server applications running on a server. Thin clients
request functions from the server application, which is itself a multithreaded application
capable of working with many concurrent users. The server application is the one that
opens connections to the database server and can be running on the same server as the
database, or it can connect across the network to a separate server operating as a database
server.

This is a typical scenario for an Internet application. For example, a server application can
run on a icrosoft Internet Information Services (IIS) and service thousands of thin clients
running on the Internet or an intranet. The server application uses a pool of connections to
communicate with a copy of SQL Server. SQL Server can be installed on the same
computer as IIS, or it can be installed on a separate server in the network.

Two tier architectures consist of three components: user system interfaces, processing
management, and database management. User system interface (USI) is a component of an
organization¶s decision support system, which includes human decision-makers. It
provides a user friendly layer of communication to make requests of the server and offers
multiple forms of input and output. USIs include features like display management
services, sessions, text input, and dialog. Processing management includes process
development, process implementation, process monitoring, and process resources services.
Database management includes database and file services.

Two tier client-server designsderive its name from how it distributes work between client
and server. Clients access databases through the user system interface. Database
management, on the server side, distributes processing between both client and server.
Both tiers, the client and the server, are responsible for some of the processing
management. Simply put, the client uses the user interface to make requests through
database management on the server side.


 Y 

c c cc  
       
p 

   
In peer-to-peer networking there are no dedicated servers or hierarchy among the
computers. All of the computers are equal and therefore known as peers. Normally each
computer serves as Client/Server and there is no one assigned to be an administrator
responsible for the entire network.Peer-to-peer networks are good choices for needs of
small organizations where the users are allocated in the same general area, security is not
an issue and the organization and the network will have limited growth within the
foreseeable future.

You can configure networks to operate in any of several modes, or configuration types.
Like personality types, some network configuration types are interested in controlling
computer users other network types are more relaxed about controls. The basic hardware
and configuration stuff that goes into creating a network doesn¶t change much among the
network types, so your choices mostly depend on how you want to communicate among
computers.

For nearly all home and small-business networking situations, peer-to-peer networking is
the way to go. A peer-to-peer network permits all the computers on the network to
communicate with each other.

With a peer-to-peer network, you can impose security on some resources, such as files,
but the security levels don¶t come close to the security of a client/server network. A
client/server network is a type often used in large business situations where one master
computer (the server) typically controls all data transfer with very strict password
controls for all the other computers on the network (the clients).


Peer-to-peer is a communications model in which each party has the same capabilities and
either party can initiate a communication session. Other models with which it might be
contrasted include the client/server model and the master/slave model. In some cases, peer-
to-peer communications is implemented by giving each communication node both server
and client capabilities. In recent usage, peer-to-peer has come to describe applications in
which users can use the Internet to exchange files with each other directly or through a
mediating server.

IB's Advanced Peer-to-Peer Networking (APPN) is an example of a product that


supports the peer-to-peer communication model.


 Y 

c c cc  
       
p 
On the Internet, peer-to-peer (referred to as P2P) is a type of transient Internet network that
allows a group of computer users with the same networking program to connect with each
other and directly access files from one another's hard drives. Napster and Gnutella are
examples of this kind of peer-to-peer software. ajor producers of content, including
record companies, have shown their concern about what they consider illegal sharing of
copyrighted content by suing some P2P users.

eanwhile, corporations are looking at the advantages of using P2P as a way for
employees to share files without the expense involved in maintaining a centralized server
and as a way for businesses to exchange information with each other directly.

p Y   %

     
  

  %  

p0 

A multi-useroperating system is a computer operating system (OS) that allows multiple


users on different computers or terminals to access a single system with one OS on it.
These programs are often quite complicated and must be able to properly manage the
necessary tasks required by the different users connected to it. The users will typically be
at terminals or computers that give them access to the system through a network, as well as
other machines on the system such as printers. A multi-user operating system differs from
a single-user system on a network in that each user is accessing the same OS at different
machines.

The operating system on a computer is one of the most important programs used. It is
typically responsible for managing memory and processing for other applications and
programs being run, as well as recognizing and using hardware connected to the system,
and properly handling user interaction and data requests. On a system using a multi-user
operating system this can be even more important, since multiple people require the system
to be functioning properly simultaneously. This type of system is often used on
mainframes and similar machines, and if the system fails it can affect dozens or even
hundreds of people.

In computing, an operating system that enables several users to access centrally stored data
and programs simultaneously over a network. Each user has a terminal, which may be local
(connected directly to the computer) or remote (connected to the computer via a modem
and a telephone line). The growth of the internet has given rise to new forms of application
level multi-user systems. ulti-user online games and meeting software are examples of a
growing range of collaboration and interaction systems.ulti-access is usually achieved by
time-sharing: the computer switches very rapidly between terminals and programs so that
each user has sole use of the computer for only a fraction of a second but can work as if
she or he had continuous access.

ulti-user systems are becoming increasingly common in the workplace, and have many
advantages ± such as enabling employees to refer to and update a shared corporate
database. The travel industry uses a multi-user system to manage bookings of airline
tickets travel agents around the world using the system can access information on
available seats as readily as an airline's own office.


 Y 

c c cc  
       
p 
p1Y  
 
       
  %

  
  p

The word "ultimedia" was first coined by Andy Warhol in 1965 in reference to his
music, video, and art presentation show titled the "Exploding Plastic Inevitable."
ultimedia later came to business presentations or slide shows and eventually transformed
into its modern interpretation of any presentation that combines different elements such as
text, video, and sound. In the 1990's the term was split into the classifications of linear and
non-linear

ultimedia is any combination of texts, images, pictures, graphics, animation, audio and
video delivered to us by computer or other electronic mediums such as
TV,newspaper,radio etc.ultimedia may be broadly divided into  and 
categories.

 
  %
  

 active content progresses without any navigational control for the viewer such as a
cinema presentation. Non-linear content offers user interactivity to control progress as used
with a computer game or used in self-paced computer based training. Hypermedia is an
example of non-linear content.ultimedia presentations can be live or recorded. A
recorded presentation may allow interactivity via a navigation system. A live multimedia
presentation may allow interactivity via an interaction with the presenter or performer. .
Linear multimedia works exceedingly well for providing information to large groups of
people such as at training sessions, seminars, workplace meetings, study groups, or church
gatherings.An example linear multimedia is of movie presentations, such as pre-recorded
instructional videos or fictional movies recorded for entertainment purposes, and printed
books and magazines. Live video feeds can also be considered linear multimedia because
the viewer has no ability to speed up or slow down the presentation or skip to different
segments.

   
  %
  

In Non Linear ultimedia the end user is given navigational control to wander through
multimedia content at will. The user can control what is seen and when it will be seen.
Non-linear content offers user interactivity to control progress as used with a computer
game or used in self-paced computer based training. , interactive multimedia
combines the same technologies as linear ones, but with a twist. The viewer is hands-on,
controlling what is viewed. Nonlinear multimedia is more complex to produce, because
cogent vignettes must be worked through and likely viewer choices must be logically
mapped out before the presentation. Distribution is also then limited to technology that can
be dynamic in the presentation. For this category, one must pay greater attention to the
interface methodology used that will let the viewer control the experience.
Linear multimedia can be distinguished from non-linear multimedia because it has literally
no interactivity of any kind. It lacks any extra features that a user can take advantage of,
such as the ability to choose different options, click on icons, control the flow of the media,
or change the pace at which the media is displayed.


 Y 

c c  cc
  
 
p Y
Y

Y


p Y    2 &
 % %  
 
  p 


 

Y
Y

 YYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYY Y




  




 




YY  Y  Y
Y
c c cc  
       
p 








p3Y    
 % 
 %  p

àormula: 0+0= 0

0+?= ?

?+0= ?

?+?= ?0

4Y p p 5 $ p 


p 6 p 6 p6 

pp p  pp ppp 




, pp p p 

 p 6 6 

 p p  p p 

p7Y  
 
   

'
%% 

 

    'p0

÷   are a computer program that translates whole set of instructions written in a
higher-level symbolic language into machine language or "code" that a computer's
processor uses before the instructions can be performed. Every high-level programming
language comes with a compiler. So, the compiler is the language, because it defines which
instructions are acceptable. any compilers are available for the same language. For
example, there is a FORTRAN compiler for PCs and another for Apple acintosh
computers.


 Y 

c c cc  
       
p 
Ê  
are a high-level programming language translator that translates and runs the
program at the same time. It translates one program statement into machine language,
performs it, and then continues to the next statement. This differs from regular executable
programs that are presented to the computer as binary-coded instructions. Interpreted
programs remain in the source language the programmer wrote in, which is human
readable text. Because it is understood line by line, it is a much slower way of running a
program than one that has been compiledbut is easier for learners because the program can
be stopped, modified and rerun without timewasting compiles.


A   translates a complete source program into machine code. The whole source
code file is compiled in one go, and a complete, compiled version of the file is produced.
This can be saved on some secondary storage medium (e.g. floppy disk, hard disk...). This
means that:

Y The program can only be executed once translation is complete


Y ANY changes to the source code require a complete recompilation.

An   , on the other hand, provides a means by which a program written in source
language can be understood and executed by the CPU line by line. As the first line is
encountered by the interpreter, it is translated and executed. Then it moves to the next line
of source code and repeats the process. This means that:

Y The interpreter is a program which is loaded into memory alongside the source
program
Y Statements from the source program are fetched and executed one by one
Y No copy of the translation exists, and if the program is to be re-run, it has to be
interpreted all over again


p8Y& 
 
   


    
% 
   %
 %    


p Y

  

d directory name
E.g. C :\> md sports (then press enter key).


 Y 

c c cc  
       
p 


pY
   


Cd directory name

E.g. C :\> cd sports (then press enter key)

p.Y

  % 
Copy con (file name.txt)
Eg: C :\> copy con sports.txt (then press enter key).

p1Y
 
  
% 
Edit (file name)
Eg: C :\>edit sports (then press enter key).

p0Y
 
 % 
Type (file name)
Eg: C :\> sports (then press enter key).

p3Y
    % 
Ren (file name)
Eg: C:\>ren sports (then press enter key).

p7Y
  % %    

 
 
Copy <patch source-file <patch target file>
Eg: copy file1.txt file2.txt (then press enter key).


 Y 

c c cc  
       
p 


p8Y
 
 

 
Time
Eg: C:\>:time (then press enter key).

p9Y
 
 


Date
Eg: C:\>date (then press enter key).

pY
  
 %  %    

Dir
Eg: C:\>dir (then press enter key).

Y
  
 %  %  

   
Dir/p
Eg: C:\>dir/p (then press enter key).

Y
  
 %  %  


 
Dir/w
Eg: C:\>dir/w (then press enter key).

.Y
 
   
 %  %   
 
  
 
Dir/on
Eg: C:\>dir/on (then press enter key).


 Y 

c c cc  
       
p 


1Y
 
   
 %  %   
 
  
   &    
Dir/o-n
Eg: C:\>dir/o-n (then press enter key).

0Y
 
    %
 % 
Dir/q
Eg :\>dir/q (then press enter key).

3Y
    
    
 & 
Dir/d
Eg :\>dir/d (then press enter key).

7Y
  
  
  & 
Dir/s
Eg: D:\>dir/s (then press enter key).

8Y


   %
 

  :  %
 
  

Color
Eg: D:\>color 47 (then press enter key).


 Y 

c c cc  
       
p 
9Y
  %   


Attrib+h (file name) (then press enter key).

pY
  %   

Attrib-h (file name) (then press enter key).

 Y
 :  %      


"#"# 56#

Y
 : % 
 
  

Attribute-r


 Y 


You might also like