Information and Communication Technology. New-1
Information and Communication Technology. New-1
Section 1
In this section will discuss definition, aims, objects, strength and limitations of ICT
Definition
ICTs are basically information handling tools - a varied set of goods, applications, and
services that are used to produce, store, process, distribute,and exchange information.
ICT includes both old and new tools.
simple audio–visual aids such as transparencies, slides, cassette and video recorders, radio,
television, and film.
ICT, or information and communications technology (or technologies), is the
infrastructure and components that enable modern computing. Although there is no single,
universal definition of ICT, the term is generally accepted tomean all devices, networking
components, applications and systems that combined allow people and organizations (i.e.,
businesses, nonprofit agencies, governments and criminal enterprises) to interact in the
digital world.
1. To help students to become competent and confident users who can use the basic
knowledge and skills acquired to assist them in their dailylives.
2. To equip learners with the appropriate social skills required to cooperate with fellow
ICT learners for a more productive learning experience.
3. To help students become well-cultured citizens of the modern world.It achieves this as it
facilitates the discovery and appreciation of various culturalheritages of different countries
around the world.
STRENGTHS OF ICT
1. Individualization of learning: Individualization of learning means that people learn as
individuals and not as a homogenous group.
2. Interactivity: Through interactivity feature, the learner can relate to the content more
effectively, go forward and backward in the content, and start at any point,depending upon
prior knowledge and experience.
3. Uniform quality: If content is well produced and is of good quality, the same quality can
be delivered to the rich and the poor, the urban and the rural equally, and at the same low
cost. This way of using ICTs can be a great equalizer.
4. More economical, higher speed of delivery and wider reach: With increase in number
of learners.
5. Multiple teaching functions and diverse audiences: ICTs, especially the computer and
the Internet-based can be useful in drills and practices; to help
diagnose and solve problems, for accessing information and knowledge about various
related themes.
LIMITATIONS OF ICT
High infrastructure and start-up costs: It costs money to build ICT systems and to
maintain them. The cost of hardware and software can be very high.
Little attention towards individual differences in order to achieve economies of
scale: The higher the quantity, the lower will be the cost. To keep the costlow, we make
the content common.
Accessibility issue: Not everyone has equal access; therefore, not everyonebenefits
essentially meant only to deliver contents; they are not expected to majorattitudinal or
behavioral change.
Section 2
Now we goanna to discuss components of computers which includes introduction,
different types, and historical evolution of computer, Hardware, software.
A computer is an electronic device used for storing and processing data andcarrying out
sequence of operations. In short, it is a device which is invented to simplify the
complicated tasks.
Word computer 1st used in a book named as “The Yong Man’s Gleanings” By Richard
Braithwaite.
Father of computer Charles Babbage was considered to be the father of computing after
his invention and concept of the Analytical Engine in 1837.
ABACUS
First counting device in China.
Name Abacus was obtained from Greek word Abax means slab.
PASCALINE
first device with an ability to perform additions and subtractions on wholenumbers.
contains numbers 0 to 9 on its circumference.
TRANSISTORS
In 1947, Transistors were introduced into the computers. With theintroduction
First machine that could add, subtract, multiply and divide- FORTRAN
In 1960, Mainframe computer was designed which used IC for the first time.
In 1970, Memory chip with 1KB storage capacity was developed by Intel.
microcomputer).
FUNDEMENTALS OF COMPUTER:
Computer: A computer is a truly amazing machine that performs a specified sequence
of operations as per the set of instructions (known as programs) given on a set of data
(input) to generate desired information (output).
A complete computer system consists of four parts:
1. Hardware: Hardware represents the physical and tangible components of thecomputer.
4. Data: Consists of raw facts, which the computer stores and reads in the formof numbers.
GENERATION OF COMPUTER
Since its invention the computer technology has gone through regressive upgradation
process. Sometimes it even seems like the that this technological advancement in the field
of has not got any limits.
• As these small computers became more powerful, they could be linked together to form
networks, which eventually led to the development of theInternet.
• Fourth generation computers also saw the development of GUIs, the mouseand handheld
devices.
Advantages
• More powerful and reliable than previous generations.
• Small in size
• Fast processing power with less power consumption
Disadvantages
• The latest technology is required for manufacturing of Microprocessors
controlled robot, or a software think intelligently, in the similar manner the intelligent
humans think.
AI is accomplished by studying how human brain thinks, and how humans learn,
decide, and work while trying to solve a problem, and then using the outcomes ofthis
study as a basis of developing intelligent software and systems.
Goal of Artificial Intelligence:
• To Create Expert Systems − The systems which exhibit intelligent behavior,
learn, demonstrate, explain, and advice its users.
• To Implement Human Intelligence in Machines − Creating systems that
understand, think, learn, and behave like human
Types of Computers:
Computers can be classified on the basis of their functioning, their input process,their
output process, their size, their capabilities and their storage capacity. The different
types of computers are as follows:
• Analog Computers
• Digital Computers
• Hybrid Computers
• Super Computers
Analog computers
• Analog computers always take input in form of signals. Uses continuouslychangeable
velocity.
• Signals are continuous of (0 to 10 V).
Digital Computers
• These computers take the input in the form of digits & alphabets &converted it into
binary format.
• Numbers 0,1
Super Computer
• The biggest in size.
• Most Expensive
• It can process trillions of instructions in seconds.
• This computer is not used as a PC in a home neither by a student in acollege.
• Used by Govt. for different calculations and heavy jobs.
• Supercomputers are used for the heavy stuff like weather maps,construction of
atom bombs, earthquake prediction etc.
Mainframes
• It can also process millions of instructions per second.
• It can handle processing of many users at a time. Less expensive than
Supercomputer
• It is commonly used in Hospitals, Air Reservation Companies as it canretrieve data
on a huge basis.
• This is normally too expensive and out of reach from a salary-based person.
• It can cost up to thousands of Dollars.
Mini-Computer
• These computers are preferred mostly by small type of business personals,colleges etc.
• These computers are cheaper than above two.
• Its an intermediary between microcomputer and mainframe.
Micro Computer/ Personal Computer
• It is mostly preferred by Home Users.
• Cost is less compared to above.
• Small in size.
• A microcomputer contains a central processing unit on a microchip in the form of read-
only memory and random access memory, and a housed in aunit that is usually called a
motherboard.
Notebook Computers
• Notebook computers typically weigh less than 6 pounds and are smallenough to fit
easily in a briefcase.
• The principal difference between a notebook computer and a personal
computer is the display screen.
• Many notebook display screens are limited to VGA resolution.
Processing cycle in computer
• Input -Input data is prepared in some convenient form for processing. The form will
depend on the processing machine. For example, when electronic
computers are used, the input data could be recorded on any one of several types of
input medium, such as magnetic disks, tapes and so on. Device can send data to another
device, but it cannot receive data from another device. Examples of an input device
include a computer keyboard,scanner, joystick and mouse
• Processing - In this step input data is changed to produce data in a more useful form. For
example, paychecks may be calculated from the time cards,or a summary of sales for the
month may be calculated from the sales orders.
• Output - The result of the proceeding processing step is collected. The particular form
of the output data depends on the use of the data. For example, output data may be pay-
checks for employees. Reproduces or displays the results of that processing, can receive
data from another device, but it cannot send data to another device. Examples of an
outputdevice include a computer monitor, projector and speakers
Input Devices are the units for making link between user and computer. The input
devices translate the information into the form understandable by the computer. Dueto ICT
revolution, we are day by day encountering different variety of Input devices around us.
These new generation of input devices are being created with the sole objective of
making Interaction between human a machine flawless.
• Keyboard: The most common and very popular input device which helpsin inputting data
to the computer.
• Mouse: Mouse is the most popular pointing device and cursor-controldevice having a
small palm size box with a round ball at its base which enses the movement of a mouse
and sends corresponding signals toCPU when the mouse buttons are pressed.
• Trackpad: Also known as a trackpad, a touchpad is a common substitutefor a computer
mouse. It is essentially a specialized surface that can detect the movement of a user's finger
and use that information to directa pointer and control a computer.
• Joy Stick: It is used to move cursor position on a monitor screen. It is mainly used in
Computer Aided Designing (CAD) and playing computergames.
• Light pen: It is used to select a displayed menu item or draw pictures onthe monitor
screen.
• Track Ball: Mostly used in notebook or laptop computer, instead of a mouse. This is a
ball which is half inserted and by moving fingers on theball, the pointer can be moved.
• Scanner: A scanner allows you to scan printed material and convert itinto a file format
that may be used within the Personal Computer.
• Graphic Tablet: Also known as digitizers, graphic tablets are input devices used for
converting hand-drawn artwork into digital images. It converts analog information into
digital form. The user draws with a stylus on a special flat surface as if they were drawing
on a piece of paper. The drawing appears on the computer screen and can be saved,
edited, or printed.
• Microphone: Microphone is an input device to input sound that is thenstored in digital
form.
• Magnetic Ink Character Recognition (MICR): MICR input device is generally used
in banks because of a large number of a cheque to be processed every day.
• Pen Input: Pen input refers to the way Windows lets you interact directlywith a computer
using a pen. A pen can be used for pointing and also forgestures, simple text entry, and
capturing free-form thoughts in digital ink.
• Electronic Whiteboard: An electronic whiteboard is a hardware device that is similar to
a whiteboard that is found in schools and businesses. It transmits any information written
it to a computer or multiple computers. They also allow live interaction with digital
objects on the screen.
• Punch card reader: It is a computer input device used to read computerprograms in either
source or executable form and data from punched cards.
• Optical mark recognition (OMR): the technology of electronically extracting intended
data from marked fields, such as checkboxes and fill- infields, on printed forms. OMR
technology scans a printed form and reads predefined positions and records where marks
are made on the form.
• Biometric scanner: Biometric input device measures a unique physical characteristic of
a person. The most common biometric devices are used to input a person's fingerprint into
a computer. More sophisticated devices use a camera to input a description of a person's
iris (the coloredpart of the eye).
Output devices translate the computer's output into the form understandable byusers.
• Monitors: Monitors, commonly called as Visual Display Unit (VDU) are the main
output device of a computer. It forms images from tiny dots, called pixels that are
arranged in a rectangular form. The sharpness of the image depends upon the number
of pixels. There are two kinds ofviewing screen used for monitors.
• Cathode-Ray Tube (CRT): The CRT display is made up of small picture elements called
pixels. The smaller the pixels, the better the image clarity,or resolution.
• Flat- Panel Display: The flat-panel display refers to a class of video devices that have
reduced volume, weight and power requirement incomparison to the CRT.
• Printers: Printer is an output device, which is used to print informationon paper. Which
are two types mainly.
1) Impact Printers: The impact printers print the characters by strikingthem on the ribbon
which is then pressed on the paper.
2) Non-Impact Printers: Non-impact printers print the characters without using ribbon.
These printers print a complete page at a time so they arealso called as Page Printers.
Laser Printers, Inkjet Printers.
• Plotters: Plotters are generally used with engineering applications, for generating a hard
copy of a digitally created design. In addition, Plottersare also often used by graphic artists,
architects, constructions engineers,etc.
• Projector: Projectors are output devices used mainly by companies, schools, and
churches to show information to a large body of people atthe same time. They are also
used during meetings or classes for presentations.
• Computer Output Microfilm (COM): COM machines were used to take print-image
output from the computer either online or via tape or disk and create a film image of each
page.
• Speaker(s): Every variety of Speaker are considered as out devices as they provide
musical output.
• Head Phone/Earphone: The Headphones, and Earphone frequently usedby us are also
output device like a speaker, they difference is that they are manufactured for individual
use.
• computer programs
• applications
• operating systems
Software is a set of programs containing data and instructions that perform operations and
tasks, basically telling a computer how to work. Computers, smartphones, and tablets use
software to perform or automate daily tasks. When software is integrated into a device or
appliance, such as in a calculator, television, car, or washing machine, it is called embedded
software. Some common software examples that many businesses use in daily operations
include Microsoft Office, Chrome, Safari, PowerPoints, and Excel.
There can be different types of business software applications that businesses can use for
varied operational purposes. Below are some common types of software available for use:
1. System software
System software manages a computer and its operating system. This software typically
manages the activities and controls the operations of computer hardware and enables an
environment for all other software to work efficiently. A good example of system software
is a computer's operating system, often called OS. Some common types of operating systems
include Microsoft Windows, Linux Mint, and Mac OS.
This OS typically communicates with the hardware and provides basic functionality for
devices such as your computer desktop, mobile phone, or tablet. OS also enables you to
manage files and folders and install programs.
2. Application software
In addition, the third type, i.e. business software, typically includes programs companies
use to run their daily operations. Some examples of this type are project management
tools, customer relationship management CRM) programs, ERP, and accounting systems.
3. Programming software
Programming is another name for software development, and a software developer usually
performs this function. Programming software is mainly used by computer programmers to
write code. Such tools, for the most part, help developers to create, write, test and also debug
different software programs.
With that said, while developing software, a programming language is used. This is a
language in the form of code that can later be converted into a software program. Some
examples of programming languages include Python, C and C++, Java, and SQL.
4. Driver software
This software can be considered a sub-type of system software. Driver software generally
controls the hardware devices attached to the computer, helping them perform their assigned
tasks. With that said, each device connected to a computer might require a device driver to
function correctly. Some devices requiring drivers include card readers, keyboards, USB
devices, speakers and game controllers.
CPU
The full form of CPU is Central Processing Unit. It is a brain of the computer. All
types of data processing operations and all the important functions of a computer are
performed by the CPU. It helps input and output devices to communicate with each other and
perform their respective operations. It also stores data which is input, intermediate results in
between processing, and instructions.
What is a CPU?
A Central Processing Unit is the most important component of a computer system. A CPU is
a hardware that performs data input/output, processing and storage functions for a computer
system. A CPU can be installed into a CPU socket. These sockets are generally located on
the motherboard. CPU can perform various data processing operations. CPU can store data,
instructions, programs, and intermediate results.
History of CPU
Since 1823, when Baron Jons Jakob Berzelius discovered silicon, which is still the primary
component used in the manufacture of CPUs today, the history of the CPU has experienced
numerous significant turning points. The first transistor was created by John Bardeen, Walter
Brattain, and William Shockley in December 1947. In 1958, the first working integrated
circuit was built by Robert Noyce and Jack Kilby.
The Intel 4004 was the company’s first microprocessor, which it unveiled in 1971. Ted
Hoff’s assistance was needed for this. When Intel released its 8008 CPU in 1972, Intel 8086
in 1976, and Intel 8088 in June 1979, it contributed to yet another win. The Motorola 68000,
a 16/32-bit processor, was also released in 1979. The Sun also unveiled the SPARC CPU in
1987. AMD unveiled the AM386 CPU series in March 1991.
In January 1999, Intel introduced the Celeron 366 MHZ and 400 MHz processors. AMD
back in April 2005 with it’s first dual-core processor. Intel also introduced the Core 2 Dual
processor in 2006. Intel released the first Core i5 desktop processor with four cores in
September 2009.
In January 2010, Intel released other processors like Core 2 Quad processor Q9500, the first
Core i3 and i5 mobile processors, first Core i3 and i5 desktop processors.
In June 2017, Intel released Core i9 desktop processor, and Intel introduced its first Core i9
mobile processor In April 2018.
Its size affects speed, power, and performance. There are two types of memory in the
computer, which are primary memory and secondary memory. Some main functions of
memory units are listed below:
Data and instructions are stored in memory units which are required for processing.
It also stores the intermediate results of any calculation or task when they are in process.
The final results of processing are stored in the memory units before these results are
released to an output device for giving the output to the user.
All sorts of inputs and outputs are transmitted through the memory unit.
Control Unit
As the name suggests, a control unit controls the operations of all parts of the computer but it
does not carry out any data processing operations. For executing already stored instructions,
It instructs the computer by using the electrical signals to instruct the computer system. It
takes instructions from the memory unit and then decodes the instructions after that it
executes those instructions. So, it controls the functioning of the computer. It’s main task is
to maintain the flow of information across the processor. Some main functions of the control
unit are listed below:
Controlling of data and transfer of data and instructions is done by the control unit among
other parts of the computer.
The control unit Is responsible for managing all the units of the computer.
The main task of the control unit is to obtain the instructions or data which is input from the
memory unit, interprets them, and then directs the operation of the computer according to
that.
The control unit Is responsible for communication with Input and output devices for the
transfer of data or results from memory.
The control unit Is not responsible for the processing of data or storing data.
Arithmetic Section
Logic Section
Note: CPU may contain more than one ALU and it can be used for maintaining timers that
help run the computer system.
Fetch: the first CPU gets the instruction. That means binary numbers that are passed from
RAM to CPU.
Decode: When the instruction is entered into the CPU, it needs to decode the instructions.
With the help of ALU(Arithmetic Logic Unit) the process of decode begins.
Execute: After decode step the instructions are ready to execute
Strore: After execute step the instructions are ready to store in the memory.
Types of CPU
We have three different types of CPU:
1) Single Core CPU: The oldest type of computer CPUs is single core CPU. These
CPUs were used in the 1970s. these CPUs only have a single core that preform
different operations. This means that the single core CPU can only process one
operation at a single time. Single core CPU CPU is not suitable for multitasking.
2) Dual-Core CPU: Dual-Core CPUs contain a single Integrated Circuit with two cores.
Each core has its cache and controller. These controllers and cache are work as a
single unit. Dual core CPUs can work faster than the single-core processors.
3) Quad-Core CPU: Quad-Core CPUs contain two dual-core processors present within a
single integrated circuit (IC) or chip. A quad-core processor contains a chip with four
independent cores. These cores read and execute various instructions provided by the
CPU. Quad Core CPU increases the overall speed for programs. Without even
boosting the overall clock speed it results in higher performance.
Section 3
COMPUTER MEMORY
• Store all instructions for CPU
• We will understand the concept of memory first before going for further details. Computer
memory is a physical device, where we can store the information temporarily or
permanently, namely- RAM (Random Access Memory), ROM (Read-Only Memory),
CD, DVD, HDD, and Flash Memory. Operating systems, software use it, and hardware
also utilizes to integrate thecircuits.
Levels of memory:
Level 1 or Register –
It is a type of memory in which data is stored and accepted that are immediatelystored
in CPU. Most commonly used register is accumulator, Program counter, address
register etc.
Level 2 or Cache memory –
It is the fastest memory which has faster access time where data is temporarily storedfor
faster access.
Level 3 or Main Memory –
It is memory on which computer works currently. It is small in size and once power isoff
data no longer stays in this memory.
Level 4 or Secondary Memory –
It is external memory which is not as fast as main memory but data stayspermanently in
this memory.
Types of memory
There are two types of memory-
1) Primary Memory 2) Secondary Memory.
1) Primary Memory
It is the memory that is accessed by the CPU (Central Processing Unit) straightforwardly.
It permits a processor to get to running execution applications andadministrations that are
incidentally put away in a particular memory area.
Primary memory is also known as primary storage or main memory. It is Volatile, and the
storage capacity is limited in Primary Memory.
ROM:
• ROM stands for Read Only Memory. The memory from which we can onlyread but
cannot write on it.
• It is a non-volatile memory. The information is stored permanently in suchmemories
during manufacture.
• A ROM stores such instructions that are required to start a computer. Thisoperation is
referred to as bootstrap.
• ROM chips are not only used in the computer but also in other electronic items like
washing machine and microwave oven.
Let us now discuss the various types of ROMs and their characteristics.
3) EPROM (Erasable and Programmable Read Only Memory): The EPROM can beerased by
exposing it to ultra-violet light for a duration of up to 40 minutes. Usually, an EPROM
eraser achieves this function.
2) Secondary Memory
• Secondary memory is termed as external memory and refers to the multiple storage media
on which a PC can store information and projects. It can be fixed or removable. Hard Disk
comes under the Fixed Storage Media, which isan Internal Storage Medium and set inside
the PC. It is versatile and can take outside the computer.
• Central Processing Unit (CPU) will not obtain the instant result to the Secondary
Memory. Alternatively, before sending it to the Processing Unit, theaccessed data will be
loaded first into the RAM (Random Access Memory).
Here, we are providing complete detail information, which comes under the
Secondary Storage Media.
The devices that come under the magnetic storage media are- Hard Disks, Floppy Disks,
and Magnetic Tapes. There are the devices that are coated with the magnetic layer,
magnetized in anti-clockwise, and clockwise directions. The head reads the information
stored at a particular area in binary 1s and 0s at reading while disks move or rotate.
Floppy Disk- It is flexibly coated by the magnet, which is packaged inside the
protective plastic envelope. It is the oldest device with a memory of 1.44 MB now,and
there is no use of the Floppy Disk because of the less memory.
Hard Disk- It is consists of more than one circular device coated with magnetic material,
which is known as Platters. The inner surfaced of the Disk can store the dataexcept for the
bottom and the top. The data will record by rotating magnetic reads/ write heads of the
disks.
Components of the Hard Disk
1. There are several disk Platters mostly in the basic types of Hard Disk, which placed
around the spindle in a sealed chamber. The chamber has the motors and reads/writes
head.
2. Data will store in each Disk of concentric circles called Tracks
one.
5. Data in the hard disk can store up to numerous terabytes.
Compact Disk (CD)- The Compact Device (CD) which uses optical rays, lasers, to read
and write data. It is a circular disk. It is a portable device as we can eject the drive and
remove it from the PC and carry it with us. The difference in the type of CDs mentioned
below-
CD-ROM
• Expanded Form of CD-ROM is Compact Disk-Read-Only Memory.
• In this Disk, once the data are written in the disk, it cannot be changed.
• These are usually used for text, audio, and video for games, encyclopedia, andapplication
software.
CD-R
• CD-R stands for Compact Disk- Recordable.
• In this Disk, the data can be recorded only once.
• Once the data can be written or recorded, it cannot be erased or modified.CD-
RW
• Full-Form of CD-RW is Compact Disk-Rewritable.
• It can be write and read multiple times.
Solid-State Memory
• It will be work based on the electronic circuits, not like the other devices like- a reel of
tape, magnet coating, or spinning disks, etc. The Solid-State Storages devices use a special
kind of memory to store data called Flash Memory. Examples of Flash Memory Devices
are- Digital Cameras, Pen Drives, or USB Flash Drives.
Pen Drives
• Pendrives are also known as Thumb Drives or Flash Drives, which are added asan emerged
portable storage media recently.
• The memory in the Pen drive accompanied by the USB connector, whichenables it
to connect with any device which has the USB portal.
• It has a capacity greater than the CD but smaller than the Hard Disk.
Advantages of Pen drive
1. Transfer File- When the Pen drive will connect to any of the USB port either in the
computer or any other device, we can use it to transfer the files, pictures, documents,
videos. Also, the selected data can be transferred between any workstation and a Pen
drive.
2. Portability- Pen drive is lightweight and portable to carry, which makes data
transportation easier and convenient.
3. Backup Storage- Nowadays, there is the feature of having password encryption,
important information related to family, medical reports, pictures, videos, etc. can
bestrode as a backup.
4. Data Transportation- The advantage of transferring the data is more useful for the
CACHE
• Cache Memory is a special very high-speed memory. It is used to speed up and
synchronizing with high-speed CPU. Cache memory is costlier than main memory or disk
memory but economical than CPU registers. Cache memory isan extremely fast memory
type that acts as a buffer between RAM and the CPU. It holds frequently requested data
and instructions so that they are immediately available to the CPU when needed.
• Cache memory is used to reduce the average time to access data from the Main memory.
The cache is a smaller and faster memory which stores copiesof the data from frequently
used main memory locations. There are various different independent caches in a CPU,
which store instructions and data.
Units of Memory
The storage capacity of the memory is expressed in various units of memory. These are
as follows:
Bit
A microprocessor uses binary digits 0 and 1 to decide the OFF and ON state respectively,
of various circuits.
Byte
A byte is the representation of a group of 8 bits. Moreover, a byte is a unit that expresses
any word, symbol, or character in the computer language.
Word
At the same time it varies from computer to computer. Besides, the length of a computer
word is the word-size or word length. Therefore, a computer stores information in the
form of computer word.
It is the most common unit of memory which is the smallest of all. But, it is greater than
the byte.
It contains 1000 bytes. Besides, it is synonyms to kibibytes which contain 1024 (2^10)
bytes.
Kilobytes usually measure the size of large files. For example high-resolution images,
songs, storage of compact disks, etc.
Megabyte
Megabytes usually measures the size of text documents, graphics of websites, individual
files, etc.
Gigabyte
Terabyte
Petabyte
It contains 10^15 bytes. Besides, it is synonyms to pebibytes which contains 2^50 bytes.
Petabytes usually measure the total data storage in large networks or server farms. For
example, the data in Google or Facebook data servers is around more than 10 PBs.
Exabyte
It contains 10^18 bytes. Besides, it is synonyms to exbibytes which contains 2^60 bytes.
The exabyte unit is so large that it does not even measure the storage of large cloud
servers. Rather, it can be used to measure the amount of data transfer over the internet for
a certain time limit.
Zettabyte
It contains 10^21 bytes. Besides, it is synonyms to zebibytes which contains 2^70 bytes.
It can measure a huge amount of data. In fact, the whole data in the world is just a few
zettabytes.
Yottabyte
When we type some letters or words, the computer translates them in numbers as
computers can understand only numbers. A computer can understand the positional number
system where there are only a few symbols called digits and these symbols represent
different values depending on the position they occupy in the number.
• The digit
• The position of the digit in the number
• The base of the number system (where the base is defined as the total number of digits
available in the number system)
The number system that we use in our day-to-day life is the decimal number system.
Decimal number system has base 10 as it uses 10 digits from 0 to 9. In decimal number
system, the successive positions to the left of the decimal point represent units, tens,
hundreds, thousands, and so on.
Each position represents a specific power of the base (10). For example, the decimal number
1234 consists of the digit 4 in the units position, 3 in the tens position, 2 in the hundreds
position, and 1 in the thousands position. Its value can be written as
Example
Binary addition
The binary addition operation works similarly to the base 10 decimal system, except that it
is a base 2 system. The binary system consists of only two digits, 1 and 0.
You can see from the above table, x and y are the two binary numbers.
So when we give the input for x = 0 and y = 0, then the output is equal to 0.
When x = 0 or 1 and y = 1 or 0, then x+y = 1.
But when both x and y are equal to 1, then their addition equals to 0, but the carryover
number will equal to 1, which means basically 1 + 1 = 10 in binary addition, where 1 is
carry forwarded to the next digit.
Now, look at the example of the binary addition:101 + 101
101
(+) 101
Step 1: First consider the 1’s column, and add the one’s column,( 1+1 ) and it gives the
result 10 as per the condition of binary addition.
Step 2: Now, leave the 0 in the one’s column and carry the value 1 to the 10’s column.
1
101
(+) 101
0
Step 3: Now add 10’s place, 1+( 0 + 0 ) = 1. So, nothing carries to the 100’s place and
leave the value 1 in the 10’s place
1
101
(+) 101
10
Step 4: Now add the 100’s place ( 1 + 1 ) = 10. Leave the value 0 in the 100’s place and
carries 1 to the 1000’s place.
1
101
(+) 101
1010
So, the resultant of the addition operation is 1010.
1 Reminder
10001
(+) 1 1 1 0 1
1 0 1 1 1 0 Answer
Solution:
111
10111
(+) 1 1 0 0 0 1
1001000
Binary Subtraction
Remember!
0–0=0
1–0=1
1–1=0
0 – 1 = 1 (Borrow 1)
when we subtract 1 from 0, we need to borrow 1 from the next higher order digit, to
reduce the digit by 1 and the remainder left here is also 1.
11 Borrow
0011010
(-) 0 0 1 1 0 0
0001110
AND
When we use the AND operator, we are effectively saying, if the first argument and the
second argument are true, then the result is true, or 1. Otherwise the result is false, or 0.
0 AND 0 = 0
1 AND 0 = 0
0 AND 1 = 0
1 AND 1 = 1
OR
Now the OR operator is saying, if the first argument or the second argument are true, then
the result is true.
0 OR 0 = 0
1 OR 0 = 1
0 OR 1 = 1
1 OR 1 = 1
Lastly, the XOR (exclusive OR) operator is saying, if either input is true, then the result is
true, but if both inputs are true, then the result is false.
Another way to say it is, if one, but not both arguments are true, then the result is true.
Or, we could say, if the number of true inputs is odd, then the result will be true.
You choose.
0 XOR 0 = 0
1 XOR 0 = 1
0 XOR 1 = 1
1 XOR 1 = 0
01011000
XOR 10111001
11100001
Example
Example
The process of converting binary to decimal is quite simple. The process starts from multiplying
the bits of binary number with its corresponding positional weights. And lastly, we add all
those products.
Let's take an example to understand how the conversion is done from binary to decimal.
Example 1: (10110.001)2
We multiplied each bit of (10110.001)2 with its respective positional weight, and last we add
the products of all the bits with its weight.
(10110.001)2=(1×24)+(0×23)+(1×22)+(1×21)+(0×20)+ (0×2-1)+(0×2-2)+(1×2-3)
(10110.001)2=(1×16)+(0×8)+(1×4)+(1×2)+(0×1)+(0×1⁄2)+(0×1⁄4)+(1×1⁄8)
(10110.001)2=16+0+4+2+0+0+0+0.125
(10110.001)2=(22.125 )10
Binary to Octal Conversion
The base numbers of binary and octal are 2 and 8, respectively. In a binary number, the pair of
three bits is equal to one octal digit. There are only two steps to convert a binary number
into an octal number which are as follows:
In the first step, we have to make the pairs of three bits on both sides of the binary point. If
there will be one or two bits left in a pair of three bits pair, we add the required number of
zeros on extreme sides.
In the second step, we write the octal digits corresponding to each pair.
Example 1: (111110101011.0011)2
1. Firstly, we make pairs of three bits on both sides of the binary point.
On the right side of the binary point, the last pair has only one bit. To make it a complete pair
of three bits, we added two zeros on the extreme side.
(111110101011.0011)2=(7653.14)8
The base numbers of binary and hexadecimal are 2 and 16, respectively. In a binary number,
the pair of four bits is equal to one hexadecimal digit. There are also only two steps to
convert a binary number into a hexadecimal number which are as follows:
In the first step, we have to make the pairs of four bits on both sides of the binary point. If there
will be one, two, or three bits left in a pair of four bits pair, we add the required number of
zeros on extreme sides.
In the second step, we write the hexadecimal digits corresponding to each pair.
Example 1: (10110101011.0011)2
1. Firstly, we make pairs of four bits on both sides of the binary point.
111 1010 1011.0011
On the left side of the binary point, the first pair has three bits. To make it a complete pair of
four bits, add one zero on the extreme side.
0111 1010 1011.0011
2. Then, we write the hexadecimal digits, which correspond to each pair.
(011110101011.0011)2=(7AB.3)16
The decimal number can be an integer or floating-point integer. When the decimal number is a
floating-point integer, then we convert both part (integer and fractional) of the decimal
number in the isolated form(individually). There are the following steps that are used to
convert the decimal number into a similar number of any base 'r'.
In the first step, we perform the division operation on integer and successive part with base 'r'.
We will list down all the remainders till the quotient is zero. Then we find out the remainders
in reverse order for getting the integer part of the equivalent number of base 'r'. In this, the
least and most significant digits are denoted by the first and the last remainders.
In the next step, the multiplication operation is done with base 'r' of the fractional and successive
fraction. The carries are noted until the result is zero or when the required number of the
equivalent digit is obtained. For getting the fractional part of the equivalent number of base
'r', the normal sequence of carrying is considered.
For converting decimal to binary, there are two steps required to perform, which are as follows:
In the first step, we perform the division operation on the integer and the successive quotient
with the base of binary(2).
Next, we perform the multiplication on the integer and the successive quotient with the base of
binary(2).
Example 1: (152.25)10
Step 1:
Divide the number 152 and its successive quotients with base 2.
Operation Quotient Remainder
152/2 76 0 (LSB)
76/2 38 0
38/2 19 0
19/2 9 1
9/24 1
4/22 0
2/21 0
1/20 1(MSB)
(152)10=(10011000)2
Step 2:
Now, perform the multiplication of 0.27 and successive fraction with base 2.
Operation Resultcarry
0.25×20.50 0
0.50×20 1
(0.25)10=(.01)2
In the first step, we perform the division operation on the integer and the successive quotient
with the base of octal(8).
Next, we perform the multiplication on the integer and the successive quotient with the base of
octal(8).
Example 1: (152.25)10
Step 1:
Divide the number 152 and its successive quotients with base 8.
Step 2:
Now perform the multiplication of 0.25 and successive fraction with base 8.
Operation Resultcarry
0.25×80 2
(0.25)10=(2)8
For converting decimal to hexadecimal, there are two steps required to perform, which are as
follows:
In the first step, we perform the division operation on the integer and the successive quotient
with the base of hexadecimal (16).
Next, we perform the multiplication on the integer and the successive quotient with the base of
hexadecimal (16).
Example 1: (152.25)10
Step 1:
Divide the number 152 and its successive quotients with base 8.
Operation Quotient Remainder
152/16 9 8
9/16 0 9
(152)10=(98)16
Step 2:
Now perform the multiplication of 0.25 and successive fraction with base 16.
Operation Resultcarry
0.25×16 0 4
(0.25)10=(4)16
Like binary and decimal, the octal number can also be converted into other number systems.
The process of converting octal to decimal differs from the remaining one. Let's start
understanding how conversion is done.
Let's take an example to understand how the conversion is done from octal to decimal.
Example 1: (152.25)8
Step 1:
We multiply each digit of 152.25 with its respective positional weight, and last we add the
products of all the bits with its weight.
(152.25)8=(1×82)+(5×81)+(2×80)+(2×8-1)+(5×8-2)
(152.25)8=64+40+2+(2×1⁄8)+(5×1⁄64)
(152.25)8=64+40+2+0.25+0.078125
(152.25)8=106.328125
The process of converting octal to binary is the reverse process of binary to octal. We write the
three bits binary code of each octal number digit.
Example 1: (152.25)8
We write the three-bit binary digit for 1, 5, 2, and 5.
(152.25)8=(001101010.010101)2
For converting octal to hexadecimal, there are two steps required to perform, which are as
follows:
In the first step, we will find the binary equivalent of number 25.
Next, we have to make the pairs of four bits on both sides of the binary point. If there will be
one, two, or three bits left in a pair of four bits pair, we add the required number of zeros on
extreme sides and write the hexadecimal digits corresponding to each pair.
Example 1: (152.25)8
Step 1:
(152.25)8=(001101010.010101)2
Step 2:
1. Now, we make pairs of four bits on both sides of the binary point.
0 0110 1010.0101 01
On the left side of the binary point, the first pair has only one digit, and on the right side, the
last pair has only two-digit. To make them complete pairs of four bits, add zeros on extreme
sides.
0000 0110 1010.0101 0100
The process of converting hexadecimal to decimal is the same as binary to decimal. The process
starts from multiplying the digits of hexadecimal numbers with its corresponding positional
weights. And lastly, we add all those products.
Let's take an example to understand how the conversion is done from hexadecimal to decimal.
Example 1: (152A.25)16
Step 1:
We multiply each digit of 152A.25 with its respective positional weight, and last we add the
products of all the bits with its weight.
(152A.25)16=(1×163)+(5×162)+(2×161)+(A×160)+(2×16-1)+(5×16-2)
(152A.25)16=(1×4096)+(5×256)+(2×16)+(10×1)+(2×16-1)+(5×16-2)
(152A.25)16=4096+1280+32+10+(2×1⁄16)+(5×1⁄256)
(152A.25)16=5418+0.125+0.125
(152A.25)16=5418.14453125
Example 1: (152A.25)16
For converting hexadecimal to octal, there are two steps required to perform, which are as
follows:
In the first step, we will find the binary equivalent of the hexadecimal number.
Next, we have to make the pairs of three bits on both sides of the binary point. If there will be
one or two bits left in a pair of three bits pair, we add the required number of zeros on
extreme sides and write the octal digits corresponding to each pair.
Example 1: (152A.25)16
Step 1:
Step 2:
Then, we make pairs of three bits on both sides of the binary point.
(001010100101010.001001010)2 = (12452.112)8
BASICS OF INTERNET
• Internet word is derived from the word internetworking which is a collection of
individual networks connected by intermediate networking device but they function
together as one large unit.
• Network is a collection of terminals, various computer servers and other components. It
ensures easy flow of data between the various nodes or participants. The Internet is a
such global interconnected computer networks using a common language called a
protocol, standard internet protocol. Theprotocol is TCP/IP.
• The ARPANET was launched by launched by the Department of defense of USA. While
first such inter-connected network was SPUTNIK by the Soviet Union in the year 1957.
ARPANET became the only official protocol after 1983.
• Any machine on the internet can communicate with other if it has following:
o An IP address, enable it to send IP Packets
o A medium to send and receive data in form of signals
o Rules to decide the transmission of data.
o An IP address is a 32 bits long address, consisting of four sets ofnumbers separated
by dots. It is called as dotted decimal representation.
• Example: 127.0.0.1 (loopback address)
• Each host on the network has an IP consisting of a ‘Net id’ and a ‘Host-id’. T
• The Physical address or the MAC address is assigned by the NetworkInformation
Centre (NIC).
• WHO GOVERN THE INTERNET?
o There is no single authority or a President governing it.
o The ultimate authority of the internet rest with Internet Society (ISOC), a voluntary
organization). Another authority is a group of invited volunteers called as Internet
Architecture Board (IAB).
The Internet Engineering Task Force (IETF) discuss the technical and
operationalproblem.
HARDWARE REQUIREMENTS FOR THE INTERNET
Introduction of Computer Networks
• Computer Network is a collection of computers those are able to communicatewith each
other through some medium, using hardware and software.
• Two computers are said to be connected, if they are able to exchange informationor able
to communicate.
• Network is connected by the set of nodes via communication links where a nodecan be
any device capable of sending &/or receiving data to &/or from other nodes in the
network.
• Data Source: Provides the data to transmit.
• Sender (Transmitter): Converts data to signals for transmission.
• Data Transmission System: Transmits the data i.e., converted in signals.
• Receiver: Converts received signals to data.
• Destination: Receives and uses incoming data.
• Node: A device with independent communication ability and unique networkaddress.
• Protocol: A formal description, comprising rules and conventions defines themethod
of communication between networking devices.
• Components of a Network:
There are five basic components of a network. Clients, Servers, Channels, Interface
devices, and Operating Systems.
• Methods of Message Delivery: A message can be delivered in the followingways
• Unicast: One device sends message to the other to its address.
• Broadcast: One device sends message to all other devices on the network. Themessage
is sent to an address reserved for this goal.
• Multicast: One device sends message to a certain group of devices on thenetwork.
Types of network
PAN
o Personal Area Network
o Data transmission
o In Computer ,Telephone
• WLAN
o Wireless Local Area Network
o Link 2 or more devices
o Adopted in School , home
• CAN
o Campus Area Network
o Inter connection of local area
o multiple interconnected local area networks (LAN) in a limited geographical area.
When you send an email, you need to select the address that will receive it (that is what
‘recipient’ means). You can add them to one of three fields: To, Cc and Bcc. All three
fields can send an email to several recipients in one go, however, they work slightly
differently.
To: The "To" line is for the primary recipient. Put the email address here if the message
is for this recipient’s action and attention only. This line is visible to all other recipients
(Cc, and Bcc) by default.
CC: Stands for Carbon copy. Put email address(es) here if you plan to send a copy to
other recipients in addition to those listed in the ‘To’ field. This is used if you don’t
mind that recipients seeing who else is getting a copy, because the list of recipients is
included in the header message. By the way, if you want to send a copy to some or all
of your employees, it’s possible to address a group in the email (like
[email protected]). Instead of adding tons of email addresses to group
emails, you’ll only need to add one, and every employee gets it delivered to their
mailbox.
BCC: Similar to Cc, Blind Carbon Copy sends a copy of a message for the information
of a large number of people. It is used if you are sending someone a copy of an email,
and you don’t want the other recipients to see that it was also sent to this email address
because the message doesn’t include that information in its header fields. Bcc recipients
can see those listed in the To and Cc list. However, if the recipients (who were added
to the ‘To’ and ‘CC’ fields) reply, their emails won’t be seen by the ‘BCC’ recipient.
From: As you might have expected, the From header field contains the messages
author. The authors email address is always included in the From field. You can also
include a name to appear alongside your email address by updating the Personal
Information settings in your email client. Including your name will not only look more
professional to outsiders, it remove any ambiguity over who is sending the message.
Email Abuse and Spam
While the prevalence of email has increased enormously over the last few decades, it
has also become a perfect environment for abuse. Given the enormous use of emails sent
and received worldwide every day, they have become a target for abuse and spam. Think
about how cost-effective sending large amounts of email messages is to many recipients
online. For this reason, it’s never been more important to choose an email provider who
guarantees reliable spam protection and use filters that sort legitimate email from spammers.
Spam, also known as junk email is when unsolicited messages are sent by email. To be
classified as spam an email should have fraudulent or malicious content. These are often
sent in bulk (the act of spamming) by people you don’t know. Many spam emails contain
links to familiar websites but in fact lead to sites that are hosting malware of phishing sites.
Spam is delivered in various ways. These messages are orchestrated by a spammer. A
spammer is an individual or an entity (group of individuals or a company) that sends spam
emails.
There are several types of fraudulent spam practices that email users and email
administrators need to watch out for:
1) Email Phishing; where private data is captured. The user clicks on an email designed
to look the same as that of a trusted party, your bank for example. The website asks for
login and personal information. The most common phishing email involves a message
alerting you to a problem with a sensitive account. Users click the link, enter their login
and password details in the fraudulent site, and by doing so , hand them over to the
scammer.
2) Email Spoofing is when an email message is sent with a forged sender address. Most of
us know spam when we see it, but seeing a strange email from a friend or recognized
third-party can be quite disconcerting. Even if it looks like it’s come from a recognized
place (spammers go to huge lengths to use the appropriate email lingo to give their
message authenticity), it doesn't mean your friend, bank, etc. has been hacked. Spoofing
is commonly used in tandem with spam and phishing emails to mislead recipient over
the origin of the message.
3) Email Worms: An email worm is a nasty piece of work. It distributes copies of itself in
an email attachment. The infected emails are sent email addresses that the worm has
harvested from files on the infected computer. This can amount to thousands of infected
computers and many more compromised emails being sent.
• 1st Recorded cyber-crime was committed by Joseph Mary.
• Important sections (in hacking, identity theft, violations of privacy) in cybercrime
• Asian school of cyber law is situated in Pune.
• 1st cyber post office-Chennai
• 1st Cybercrime police station in Kerala-Pattom ,Thiruvananthapuram
• Indian computer emergency response team comes in 2004
• India 1st cyber security chief Gulshan rai
• India 1st cyber village Melli Dara Paiyong
• 1st cyber case reported in France
• 1st cyber court in India Delhi
1.modem
• Also called as a Modulator and Demodulator. It converts computer data into
signals that can be transmitted over a telephone line. It is also capable of
converting a signal coming over a telephone line to be understood by the
computer.
2. HUB
• A hub is a place of convergence where data arrives from various directions
and is forwarded out to different directions and destinations. It is a common
point for connecting the devices on a LAN. It can connect various cables
likecoaxial and twisted pair at the same time.
• It is the most basic networking device that connects multiple computers or
other network devices together. Unlike a network switch or router, a
network hub has no routing tables or intelligence on where to send
information and broadcasts all network data across each connection.
3. BRIDGE
• A Bridge is a device that connects two or more networks, such a one LAN
withanother. It creates a single aggregate network from multiple networks
rather than being a connection to help them pass information from one part
to another like a router.
• A bridge is a repeater, with add on the functionality of filtering content
byreading the MAC addresses of source and destination.
• Routers are physical or virtual devices that determines the next network point
to which the data packet should be forwarded. They forward the data packets
as per their IP address. In OSI MODEL routers are found at the layer 3 i.e.
Network layer.
• A router forwards the packets seeing its destination IP address and matching
it with the IP address mentioned in the routing table with the router.
• It uses various protocols to forward the packets which gives the best possible
path also reduces the cost of the transmission. The various routing protocols
are OSPF, BGP, RIP etc.
TERMINOLOGIES IN COMPUTER
1. Domain Name
It is the unique name that identifies an Internet site. Domain Names always
have twoor more parts, separated by dots. The part on the left is the most
specific, the part on the right is the most general.
.org- Organisation
.net -Network
.com- Commercial
.edu- Education
.gov -Government
.mil- Military
2. Computer Memory:
Blue ray disk : Blu-ray (not Blue-ray) also known as Blu-ray Disc (BD), is
the name of anew optical disc format which is jointly developed by the Blu-
ray Disc Association (BDA), The format offers more than 5 times the storage
capacity of older DVDs and can hold up to 25GB on a single-layer disc &
50GB on a dual layer disc.
3. Software terms:
• HTTP - Hyper Text Transmission Protocol
• IMAP - Internet Message Access Protocol
• SSL - Secure Socket Layer
• TCP - Transmission Control Protocol
• FTP - File Transfer Protocol
• TFTP - Trivial File Transfer Protocol
• SMTP - Simple Mail Transfer Protocol
• SGML - Standard Generalized Mark-up
• Language HTML - Hyper Text mark-up language
• ASCII - American Standard Code for Information
• Interchange ACPI - Advanced Configuration Power Interface
• ANSI - American National Standard
• Institute CGA - Computer Graphic Application
• CSS - Cascading Style Sheets
• DOS - Disc Operating System
Repeaters attempt to preserve signal integrity and extend the distance over
which data/information can travel safely.
• Channel Capacity: It is the speed of transmission of information. Often refer
asdata rate in digital terminology.
• Bandwidth: The physical limitation of underlying media.
• Error-rate: Incorrect reception of information due of noise.
• Encoding: The number of levels used for signalling.
• Meta Search Engines: They automatically enters search queries into a
numberof other search engines and return the results
Section 8
CYBERSPACE:
A global domain within the information environment consisting of the
interdependent network of information technology infrastructures,
including theInternet, telecommunications networks, computer systems,
and embedded
processors and controllers.“
There are many digital initiatives by the government of India. Some of them are
listed below ;
unauthorized usage of removable USB storage media devices like pen drives,
set of executable files for execution and protects desktops from suspicious
3 ) M-Kavach, a device for security of Android mobile devices has also been
personal data & credentials, misuse Wi-Fi and Bluetooth resources, lost or stolen
incoming calls.
detects and defends malicious HTML & JavaScript attacks made through the web
browser based on Heuristics. It alerts the user when he visits malicious web pages
providing best quality education that can be accessed by anyone, anytime and
simultaneously.
(MHRD) and All India Council for Technical Education (AICTE) with the help of
Microsoft.
It’s ultimately capable of hosting 2000 courses and 80000 hours of learning:
professional courses.
All the courses on this platform are interactive, prepared by the best teachers in
the country and are available, free of cost to the students in India.
More than 1,000 specially chosen faculty and teachers from across the
For each level, there is a National Coordinator, who would be responsible for the
quality of content:
1. Out of school Children: for classes 9th to 12th (National Coordinator: National
1) Video tutorials: Video tutorials covering a whole course — normally having about
2) E-Content: reading material that could add to the learning imparted through the
video tutorials.
All the courses delivered through SWAYAM are available free of cost to the learners,
e- Granthalaya
• The software provides Web based Data Entry solution to the libraries.
Technology (NMEICT)
• NDL is the Single Window Platform that collects and collates metadata from
books, lectures, simulations, fiction and all other kinds of learning media.
• NDL India is designed to hold content of any language and provides interface
support for leading Indian languages. It is being arranged to provide support for
all academic levels including researchers and life-long learners, all disciplines, all
• National Digital Library in India aims to collect, preserve and disseminate entire
intellectual output of our country and provide online access from school level to
1 Overall framework to collate large number of e-contents for school, college and
differing abilities.
Indexed etc.
4 Collect resources from other Ministries such as Ministry of Culture, Health, Rural
• More than 15,000 international electronic journals and e-books are made available
to all the higher educational institutions through the e-shodh Sindhu initiative.
• This allows access to be best education resources in the world using digital
mode.
e- Yantra
programs on 24X7 basis using the GSAT-15 satellite. Every day, there will be new
content for at least (4) hours which would be repeated 5 more times in a day,
• School education (9-12 levels) modules; for teacher training as well as teaching
and learning aids to children of India to help them understand the subjects
better and also help them in better preparedness for competitive examinations
• Curricula and courses that can meet the needs of life-long learners or Indian
• IIT-PAL — to assist the students in the Classes 11 and 12 aspiring to join IITs by
the 'tough' questions of JEE Advanced, so that good quality students enter the
portals of IITs. The four channels under this would be on Mathematics, Physics,
Let,s check the ten channels by CEC-UGC which are show in the table below;-
virtual classrooms to the faculty across the country. These courses can be viewed
process. The courses are recorded live in the classrooms of IIT Bombay and may
• Apart from the core courses in engineering and computer science disciplines, the
program also covers Humanities & Social Sciences discipline. More than 80,000
teachers have been trained, so far, under this project, involving synchronous
Ask a Question
• Ask a Question is a unique platform through which students from science and
engineering colleges all over India can ask questions and faculty from IIT Bombay
answers them.
interactive live session. Interactive live sessions are held on every Thursday from
4:00 PM to 5:00 PM in the field of Electrical Engineering and every Friday from
e-Acharya
put at this Repository platform at INFILIBNET Centre Gandhi nagar, so to apply basic
different types for the digital content and ensure their long-term availability.
NMEICT have been requested to ensure the deliverables are placed, at the
• Further the NCERT shall provide e-content Links to e-Acharya and the NOIS shall
providing the content on HDD to the e-Acharya repository and both shall ensure
that all the content including e-Books are made available on e- Acharya.
• The eAcharya besides a repository of content shall also have the Metadata of all
these contents and it shall form a vertical of 'National Digital Library (NDL), being
• The e-Acharya shall be backed by a robust 24X7 Data Centre, which shall be
integrated with NMEICT, Cloud network, set up at MC / NKN Data Centre by the
IIT-Delhi and called baadal". The MOOCs being produced under NMEICT shall
• The Mission also aims to provide 20 Broadband connections of 512 Kbps speed
to over 25,000 colleges and 2000 polytechnics and optical fiber connectivity
one Gbps to 419 universities/ university level institutions in the country which
• On the lines of 'Digital India' initiative of the PMO, the MHRD has now decided
that the campuses of universities, (having 1 Gbps bandwidth) shall be made WiFi
enabled campus. Already all the IITs, IIMs, and NITs have established WiFi
campuses.
• The process of laying the optical fiber and provision of the Wi-Fi in Central
Institutions.
• NAD is a Unique, Innovative and Progressive initiative under 'Digital India' theme
make the vision of Digital Academic Certificates for every Indian a reality.
• This touches the lives of Indian youth and empowers them with Digital, Online,
Trusted, Verifiable Certificates which are accessible in a secure manner at all times.
Virtual labs
• Web enabled experiments can be designed for remote operation and viewing so
• This would help in learning basic and advanced concepts through remote
experimentation.
• Today most equipment has computer interface for control and data storage. It is
software, and data available on the web, apart from encouraging skillful
• Virtual Lab does not require any additional infrastructural setup for
experiments remotely.
• Over 205 virtual labs in 9 Engineering & Science disciplines, comprising about
1515 experiments are operational and currently being accessed by more than 6
lakh students.
• FOSSEE project sanctioned to IIT Bombay has been promoting use of open-
• About 2,000 college students and teachers have participated in this activity &
close to 1,000 TBCs have been created in Scilab and Python alone.
VIDWAN
The 'Information and Library Network' (INFLIBNET) Centre took the initiative called
"Vidwan: Expert Database and National Researchers Network" with the financial
abroad;
• Establish communication directly with the experts who possess the expertise
needed by research scholars as identify peer reviewers for review of articles and
• The database can be used for selection of panels of experts for various
Spoken Tutorial
• Here one can learn various Free and Open-Source Software all by oneself.
• Our self-paced, multi-lingual courses ensure that anybody with a computer and
a desire for learning, can learn from any place, at any time and in a language
of their choice
• The Spoken Tutorial project is the initiative of the 'Talk to a Teacher' activity of the
Government of India.
• Spoken Tutorial Forums is a friendly online discussion forum. You can join
existing discussions or start new topics, and get lots of replies from the Spoken
Tutorial community. Registration to Forums is completely free and takes only one
minute
• Forums are very easy to use, even for computer newbies. It's very easy to format
forum posts with fonts, colors, and many other options. You can attach files to your
1. Digital online content for learning design with e-Learning programs on design
3. Social networking for higher learning with collaborative learning space for
design.
agencies.
Why e-governance?
Emergence of E-Governance in India
• National Informatics center (NIC) in 1977 was the first major step towards e-
Kerala.
Setting up of E-Governance
3. Priority areas
4. Studying existing status
5. Formulating policy
6. Infrastructure creation
7. Standardization
4 Models of E-Governance
• e-tender
• GST
• IRCTC
• e- Panchayat
assist citizens in the fastest and most appropriate way, speed-up administrative
G2G is aimed at efficient file routing, quick search and retrieval of files and office
orders, digital signatures for authentication, forms and reporting components etc.
departments.
Models of E-Governance
1. National Level
2. State Level
• Developing e-Governance in rural India is the biggest challenge for the Indian
government.
public.
SMART GOVERNANCE
Simple
Moral
Accountable
Responsive
Transparent
E Government Portals
Digital India
making the country digitally empowered in the field of technology. The initiative
Broadband Highways
• This covers three sub components, namely broadband for all rural, broadband for
• The aim of broadband for all rural is that 250 thousand village panchayats should
be covered by December, 2016. dot will be the nodal department and the project
• Under broadband for all urban, virtual network operators would be leveraged for
NKN and NOFN along with cloud enabled national and state data centers. It will
also have provision for horizontal connectivity to 100, 50, 20 and 5 government
offices/ service outlets at state, district, and block and panchayat levels
respectively. Deity will be the nodal department and the project is estimated to
cost around Rs. 15,686 Cr for implementation in 2 years and maintenance &
The initiative is to focus on network penetration and fill the gaps in connectivity
in the country, and make sure that there is better network coverage in the country.
All together 42,300 uncovered villages will be covered for providing universal
Dot will be the nodal department and project is estimated to cost Rs. 16,000 Cr
during 2014-18.
The two main sub components of public internet access program are common
A total of 150,000 post offices are proposed to be converted into multi service
scheme.
E-governance: reforming government through technology
Form Simplification and Field Reduction – forms should be made simple and easy
• Use of online repositories like school certificates, voter id cards, etc. should be
physical form.
businesses.
• Electronic Databases – All databases and information should be electronic and not
manual.
There are 31 mission mode projects under different stages of e-governance project
lifecycle. Further, 10 new mmps have been added to e-kranti by the apex
committee on national e-governance plan (negp) headed by the cabinet secretary
in its meeting held on 18th march 2014. Some of the important modes are: –
Justice
The focus will be on online internet website hosting service of data and realistic
participation through social media and web-based systems like MyGov. The aim
Electronics Manufacturing
Devices, Intelligent Energy Meters, Smart Cards and Micro ATMs. For this the
The Government is planning on training one crore learners from small towns
and villages for it industry. Plans are also to exercise 300,000 assistance
and telecoms companies to train 500,000 rural workers in 5 years. BPOS would
states. Deity would be the nodal department for this scheme. Digital marketing
Early Harvest
application software system will allow online documenting of attendance and it’s
being recognized, to improve its utilization within government program for 50 lakh
workers by march, 2015. All guides will be E-Books and SMS based climate
and hosted by the National Informatics Centre (NIC), a premier ICT organization
Information Technology.
The Portal has been developed as a Mission Mode Project (MMP) under the
National E-Governance Plan (NEGP) of the Government. The objective behind the
Portal is to provide a single window access to the information and services being
India.gov.in has sections for people living abroad, business persons, government
OGPL is a joint product from India and United States to promote transparency and
analysts, media & academia to develop new applications and insights that will help
The site was launched in October 2012 and is a part of the Open Government
Initiative
.
Challenges in E-Governance
1. Technical Issues
2. Organizational issues
3. Economic issues
4. Management Issues
5. Legal Issues
6. Technical Challenges
• Interoperability
• Privacy
• Security
• Multiservice
• Interaction
7. Organizational Challenges
• Population
• Different Languages
8. Economic Challenges
• Cost
• Maintainability
• Reusability
• Portability
Section 11
44. Gb – Gigabit
45. GB – Gigabyte
57. Kb – Kilobit
58. KB – Kilobyte
66. Mb – Megabit
67. MB – Megabyte