ICT-Full Version-PDF-1
ICT-Full Version-PDF-1
COMMUNICATION TECHNOLOGY
(ICT)
NTA-UGC-NET-PAPER-1- UNIT- VIII
INTRODUCTION
• ICT : INFORMATION AND COMMUNICATION
TECHNOLOGY
• Evolution of technology and computing
• Meanings, advantages, disadvantages, uses of
information technology
• Number systems (binaries & decimals)
• Basics of internet
• Digital initiatives in higher education
• Information technology & governance
I.C.T: SPECIFICATIONS & EFFECTS
• Digital Transformation of the society
• Rapid interaction among people using advanced
communication methods
• Newer dimensions to R&D: Data (record & storage), analysis
and processing
• Multitasking
• Precision
• Learning facilities and Opportunities
INTRODUCTION TO COMPUTERS
• Computer: Fast and accurate electronic machine that converts data
into meaningful information
• Used to perform calculations, documenting texts, editing photos &
videos, accessing information online, educational requirements etc.
• Works with the help of a hardware and software
• Hardware: Physical components of a computer
• Software: Instructions & programs fed in a computer
• Evolution of computers through five generations
FIRST GENERATION
• Time Period: 1946 – 1959
• Basic Components: Vacuum tubes
• Language: Machine Language
• Memory: 4000 bits
• Size: Almost the size of a big room
• Examples: ENIAC, UNIVAC, IBM-701
Challenges:
• Vacuum tubes generated a lot of heat; decreased efficiency & reliability
• Supported machine language only
• Very costly; affordable only to large organisations
SECOND GENERATION
• Time Period: 1959-1965
• Basic Components: Transistors
• Language: Assembly Language
• Memory: 32,000 bits (Primary + Secondary)
• Primary Memory: Used Magnetic cores
• Secondary Memory: Used Magnetic Tapes & Magnetic Disks
• Size: Comparatively smaller in size
• Examples: IBM 400, IBM 1600
Features:
• Relatively faster and reliable than vacuum tubes
• Less heat, less electricity required, much faster
• Supported Machine & Assembly Languages
• Still Very Costly
THIRD GENERATION
• Time Period: 1965-1971
• Basic Components: Integrated Circuits (IC)
• Language: High Level; BASIC, PASCAL, FORTRAN, COBOL
• Memory: 1,28,000 bits
• Size: Relatively smaller than other two generations
• Examples: UNIVAC 9000, Personal Data Processor (PDP)
Features:
• Faster and Reliable; less maintenance and heating
• Lesser electricity required in comparison
• After all they were costly
FOURTH GENERATION
• Time Period: 1971-1980
• Basic Components: Large Scale Integrated Microprocessors(LSI) &
Very Large Scale Integrated Microprocessors (VLSI)
• Language: High Level; C, C++, DBASE
• Memory: 100 billion bits
• Size: Portable if required; Micro computers
• Examples: Personal Computers
Features:
• Very cheaper in comparison
• Concept of Internet was introduced after this
• Easy availability of computers
FIFTH GENERATION
• Time Period: 1980s to present and beyond
• Basic Components: Ultra Large Scale Integrated Microprocessors(ULSI) &
Artificial Intelligence (AI)
• Language: High level; SQL, Java, .net
• Memory: Beyond limits
• Size: Pocket sized and other gadgets
• Examples: Laptops, Smartphones, Robots etc.
Features:
• Robotics and Natural Language/Voice Recognitions
• User-friendly multimedia interfaces & parallel processing
• Availability at cheaper rates
TYPES OF COMPUTERS
OPERATION BASED CLASSIFICATION
ANALOG DIGITAL
• Process analogue data • Works on digital data
• Data is continuous and not • Only discrete values like ‗0‘ and
‗1‘
discrete
• Both numeric and non-numeric
• Can process numeric data alone data can be processed
• Better in terms of speed • Better in terms of memory and
accuracy
• Examples: Aircraft computers &
simulators, Speedometers etc. • Examples: Personal Computers
SIZE BASED CLASSIFICATION
• Supercomputers
• Mainframe Computers
• Mini Computers
(Mid-range Computers)
• Micro Computers
(Personal Computers)
SUPERCOMPUTERS
• High performance computers for specific purposes
• Computational tasks like weather forecast, research and development programmes,
earthquake studies etc.
• Performance is measured in terms of Floating-Point Operations per second (FLOPS);
devices these days perform 100 PFLOPS
• They are expensive and huge in size
• Examples: Satellite launching supercomputers in NASA,
IBM Summit (2018, US), Dell Frontera (2019, US),
Fujitsu Fugaku (2020, Japan)
• First Supercomputer in India: PARAM 8000
• Latest Supercomputer: PRATYUSH & MIHIR (Estd. @ Indian [Link] Tropical
Meteorology, Pune and National Centre for Medium Range Weather Forecast
(NCMRWF), Noida respectively(As per Jan.2018, fastest in India)
MAINFRAME COMPUTERS
• Used to record huge amount data (big-data processing)
• Supports multiple operating systems – often used as servers
• Special features- virtual memory, hardware swapping without disruption
• High stability and reliability enable these machines to run uninterrupted
for very long periods of time (for decades)
• Fault-tolerant computing, support mixed workloads, assured integrity
• Examples: Servers for ATM transaction recording, student data in
universities, patient records in hospitals etc.
MINI COMPUTERS
• Also known as mid-range computers
• Used for scientific and engineering computations, business data
processing, file-handling and data management (mid-size servers)
• A midsize multiprocessing computer; consists of two or more
processors and can support 4 to 200 users at one time.
• Used in institutes and departments for tasks such as billing,
accounting and inventory management
• Example: IBM mid-range computers
WORKSTATIONS
Answer: 3
QUESTION 5:
• Which among the following languages were used in second
generation of computers?
1. High-level Language
2. Machine Language
3. Assembly Language
4. Programming Language
QUESTION 5:
• Which among the following languages were used in second
generation of computers?
1. High-level Language
2. Machine Language
3. Assembly Language
4. Programming Language
Answer: 3
QUESTION 6:
• IBM 1401 is _______
1. First Generation Computer
2. Second Generation Computer
3. Third Generation Computer
4. Fourth Generation Computer
QUESTION 6:
• IBM 1401 is _______
1. First Generation Computer
2. Second Generation Computer
3. Third Generation Computer
4. Fourth Generation Computer
Answer: 2
QUESTION 7:
• Which of the following statements is true?
1. Minicomputer works faster than Microcomputer
2. Microcomputer works faster than Minicomputer
3. Speed of both the computers is the same
4. None of the above
QUESTION 7:
• Which of the following statements is true?
1. Minicomputer works faster than Microcomputer
2. Microcomputer works faster than Minicomputer
3. Speed of both the computers is the same
4. None of the above
Answer: 1
QUESTION 8: (JULY 2018)
• Which of the following statement regarding ICT is/are true?
P: ICT is an acronym that stands for Indian Classical Technology.
Q: Converging technologies that exemplify ICT include the merging of
audio-visual, telephone and computer networks through a common cable system.
1. Only P
2. Only Q
3. P & Q
4. Neither P nor Q
Answer: 2
MAJOR COMPONENTS IN A
COMPUTER
• Input devices
• Central processing unit (c.p.u)
• Output devices
• Memory unit primary memory (ram)
secondary memory
(storage or hard disk)
INPUT DEVICES
• Help users to enter data and commands into a computer system
• Data can be in the form of numbers, words, actions, commands, etc.
• The main function of input devices is to direct commands and data
into computers.
• Computers then use their CPU to process this data and produce
output.
• Certain Input Devices are as follows:
1. KEYBOARD
• A basic input device that is used to enter data into a computer or any other
electronic device by pressing keys.
• It has different sets of keys for letters, numbers, characters, and functions.
• Connected to a computer through USB or a Bluetooth device (for wireless
communication)
• Different types of keyboards based on region and language.
• Commonly used keyboard is the QWERTY keyboard
• The most frequently used letters are kept in a home row to improve typing
.
• AZERTY Keyboard – The standard French Keyboard developed in France as an
alternative to the QWERTY – mostly used in France and other European
countries.
• The output device displays the result of the processing of raw data that is entered
in the computer through an input device.
• There are a number of output devices that display output in different ways such as
text, images, hard copies, and audio or video.
1. MONITOR
• The display unit or screen of the computer.
• The main output device that displays the processed data or information as text, images,
audio or video.
• Early monitors called CRT monitors used Cathode Ray Tube that produces image in the
form of video signals.
• Later CRT monitors were replaced by LCD monitors that have a flat panel display and
is based on Liquid Crystal Display.
• Further, LCDs were replaced by LED screens– also have a flat panel display and use
liquid crystal display technology like the LCD monitors. The difference between them
lies in the source of light to backlight the display.
• The LED monitor has many LED panels, and each panel has several LEDs to backlight
the display, whereas the LCD monitors use cold cathode fluorescent light to backlight
the display. Modern electronic devices such as mobile phones, LED TVs, laptop and
computer screens, etc., use a LED display as it not only produces more brilliance and
greater light intensity but also consumes less power.
2. PRINTERS
• A printer produces hard copies of the processed data.
• It enables the user to print images, text or any other information onto paper.
• It can be directly connected to a computer or can be used by many
computers over a shared network.
• There are different types of printers like Dot Matrix Printer, Laser Printer,
Inkjet Printer, etc.
3. PROJECTORS
• An output device that enables the user to project the output
onto a large surface such as a big screen or wall.
• Can be connected to a computer and similar devices to
project their output onto a screen.
• It uses light and lenses to produce magnified texts, images, and videos. So, it is
an ideal output device to give presentations or to teach a large number of people.
• Modern projectors (digital projectors) come with multiple input sources such as
HDMI ports for newer equipment and VGA ports that support older devices.
Some projectors are designed to support Wi-Fi and Bluetooth as well.
• They can be fixed onto the ceiling or placed on a stand, and are frequently used
for classroom teaching, giving presentations, home cinemas, etc.
4. SPEAKERS
• Speakers are attached to computers to facilitate the output of sound;
• Sound cards are required in the computer for speakers to function.
• The different kinds of speakers range from simple, two-speaker output devices to
more advanced surround-sound multi-channel units.
MEMORY UNIT
• The storage component of a computer where data to be processed and instruction
required for processing are stored
• The memory is divided into a large number of small parts called cells.
• Each location or cell has a unique address.
• RAM, ROM and Hard Disks are components included in memory unit
• They can be categorized into:
1. Primary memory
2. Secondary memory and
3. Cache memory.
1. PRIMARY MEMORY
• It is generally made up of a semiconductor device.
• The data and instruction required to be processed resides in the main memory.
• It is divided into two subcategories RAM and ROM.
• Random Access Memory (RAM): It holds only those data and instructions on
which the computer is currently working ON. It has a limited capacity and data is
lost when power is switched off. Hence, it is a volatile memory.
• Read Only Memory (ROM): It is a permanent and internal memory that is used
for reading data. Once written data cannot be removed– can only be read. It does
not loose its content once the device is turned off– non-volatile memory. It is
used in booting.
2. SECONDARY MEMORY
• This type of memory is also known as external memory
• It is slower than the main memory. These are used for storing data/information
permanently.
• CPU directly does not access these memories; instead they are accessed via input-
output routines.
• The contents of secondary memories are first transferred to the main memory, and
then the CPU can access it.
• Example: Compact Disk, CD-ROM, DVD, USB etc.
3. CACHE MEMORY
• Cache memory is a very high-speed semiconductor memory which can speed up
the CPU.
• It acts as a buffer between the CPU and the main memory.
• It is used to hold those parts of data and program which are most frequently used
by the CPU.
• The parts of data and programs are transferred from the disk to cache memory by
the operating system, from where the CPU can access them.
MEMORY UNITS
Bit → Either ‘0’ nor ‘1’, i.e., a binary digit
1 Nibble = 4bits
1 byte = 8 bits
1 Kilobyte (KB) = 1024 bytes
1 Megabyte (MB) = 1024 KB
1 Gigabyte (GB) = 1024 MB
1 Terabyte (TB) = 1024 GB
1 Petabyte (PB) = 1024 TB
1 Exabyte (EB) = 1024 PB
1 Zettabyte (ZB) = 1024 EB
1 Yottabyte (YB) = 1024 ZB
1 Brontobyte (BB) = 1024 YB
1 Geopbyte = 1024 BB
TIME FOR SOME QUESTIONS???
QUESTION 1:
• Half byte is ________
1. Bits
2. Nibble
3. Petabyte
4. Yotobyte
QUESTION 1:
• Half byte is ________
1. Bits
2. Nibble
3. Petabyte
4. Yotobyte
Answer: 2
QUESTION 2:
• MICR stands for ________
1. Magnetic Ink Character Reader
2. Magnetic Ink Code Reader
3. Magnetic Ink Character Recognition
4. Magnetic Ink Cases Reader
QUESTION 2:
• MICR stands for ________
1. Magnetic Ink Character Reader
2. Magnetic Ink Code Reader
3. Magnetic Ink Character Recognition
4. Magnetic Ink Cases Reader
Answer: 3
QUESTION 3: (JULY 2018)
• Put the following units of storage into the correct order, starting with the smallest unit first and going
down to the largest unit:
a. Kilobyte
b. byte
c. Megabyte
d. Terabyte
e. Gigabyte
f. Bit
• Give your answer from the following code:
1. (f), (b), (a), (c), (d), (e)
2. (f), (b), (a), (d), (e), (c)
3. (f), (b), (a), (c), (e), (d)
4. (f), (b), (a), (d), (c), (e)
QUESTION 3: (JULY 2018)
• Put the following units of storage into the correct order, starting with the smallest unit first and going
down to the largest unit:
a. Kilobyte
b. byte
c. Megabyte
d. Terabyte
e. Gigabyte
f. Bit
• Give your answer from the following code:
1. (f), (b), (a), (c), (d), (e)
2. (f), (b), (a), (d), (e), (c)
3. (f), (b), (a), (c), (e), (d)
4. (f), (b), (a), (d), (c), (e) Answer: (3)
QUESTION 4: (JULY 2018)
• With regard to computer memory, which of the following statement(s)
is/are TRUE?
P: Read Only Memory (ROM) is ‗volatile‘ memory.
Q: Random Access Memory (RAM) is ‗volatile‘ memory.
R: Secondary Memory is ‗volatile‘ memory
1. P only
2. Q only
3. P and Q only
4. P and R only
QUESTION 4: (JULY 2018)
• With regard to computer memory, which of the following statement(s)
is/are TRUE?
P: Read Only Memory (ROM) is ‗volatile‘ memory.
Q: Random Access Memory (RAM) is ‗volatile‘ memory.
R: Secondary Memory is ‗volatile‘ memory
1. P only
2. Q only
3. P and Q only
4. P and R only
Answer: 2
QUESTION 5: (DEC. 2015)
• Which of the following is not an input device?
1. Microphone
2. Keyboard
3. Joystick
4. Monitor
QUESTION 5: (DEC. 2015)
• Which of the following is not an input device?
1. Microphone
2. Keyboard
3. Joystick
4. Monitor
Answer: 4
END OF PART-1
INFORMATION &
COMMUNICATION TECHNOLOGY
(ICT)
NTA-UGC-NET-PAPER-1- UNIT- VIII
PART-2
SOFTWARE
• A collection of data or computer instruction that tells the computer how to work.
• They are the non-physical part of a computer.
• The programs involving a set of instructions that guide the hardware how to do
• Examples: Adobe Photoshop, MS Office, McAfee Antivirus etc.
• There are two types of software:
1. System Software
2. Application Software
1. SYSTEM SOFTWARE
• System Software is the type of software which is the interface between
application software and system.
• Low level languages are used to write the system software.
• System Software maintains the system resources and gives the path for
application software to run.
• Without system software, the system cannot run. It is a general-purpose software.
• Examples: Operating Systems (OS) like Windows, Linux, iOS etc.
APPLICATION SOFTWARE
• Application Software is the type of software which runs as per user request.
• It runs on the platform which is provided by system software.
• High level languages are used to write the application software. It is a specific
purpose software.
• The main difference between System Software and Application Software is that
without system software, system cannot run; on the other hand, even without
application software, system always runs.
• Open Source Software doesn‘t require permissions/payments for installation
• Examples: VLC media player, Adobe Reader, Google Chrome etc.
SOME BASIC FILE FORMATS
Word processor and text file formats by .doc and .docx - Microsoft Word file
.odt – Open Office Writer document file
file extension .pdf - PDF file
.rtf - Rich Text Format
.tex - A LaTeX document file
.txt - Plain text file
.wpd - WordPerfect document
.ai - Adobe Illustrator file
.bmp - Bitmap image
.gif - GIF image
Image Files Extensions .ico - Icon file
.jpeg or .jpg - JPEG image
.png - PNG image
.ps - PostScript file
.psd - PSD image
.svg - Scalable Vector Graphics file
.tif or .tiff - TIFF image
= 1000 + 200 + 30 + 4
= 123410
2. BINARY NUMBER SYSTEM
• A Binary number system has only two digits that are 0 and 1. Every number (value) is
represented with 0 and 1 in this number system. The base of binary number system is
2, because it has only two digits.
• Characteristics of the binary number system are as follows −
• • Uses two digits, 0 and 1
• • Also called as base 2 number system
• • Each position in a binary number represents a 0 power of the base (2).
Example 20
• • Last position in a binary number represents a x power of the base (2).
Example 2x where x represents the last position - 1.
BINARY CONVERSION
• To convert a binary number 110010102 into its decimal equivalent, multiply each digit of the
given number with raised to the power 0,1,2,…. starting from right to left, as shown:
= 128 + 64 + 8 + 2
= 202
2 202
2 6 0
= 3423210
A CAN is the interconnection of different LANs within a specific area like a campus.
METROPOLITAN AREA NETWORK
(MAN)
• A metropolitan area network is a network that covers a larger geographic area by
interconnecting different LANs to form a larger network.
• Government agencies use MAN to connect to the citizens and private industries.
• In MAN, various LANs are connected to each other through a telephone exchange
line.
• The most widely used protocols in MAN are RS-232, Frame Relay, ATM, ISDN,
OC-3, ADSL, etc.
• It has a higher range than Local Area Network(LAN).
WIDE AREA NETWORK (WAN)
• A Wide Area Network is a network that extends over a large geographical area
such as states or countries.
• It is a much bigger network than the LAN.
• A Wide Area Network is not limited to a single location, but it spans over a large
geographical area through a telephone line, fibre optic cables or satellite links.
• The internet is one of the biggest WAN in the world.
• A Wide Area Network is widely used in the field of
Business, government, and education.
NETWORK TOPOLOGIES
• The layout pattern using which devices are interconnected is called as network
topology.
• There are different types of networks such as Bus, Star, Mesh, Ring, Daisy chain.
TIME TO YELL OUT SOME
ANSWERS
QUESTION 1: (DEC.2014)
• Symbols A-F are used in which one of the following?
1. Binary number system
2. Decimal number system
3. Hexadecimal number system
4. Octal number system
Answer: 3
QUESTION 2: (DEC.2014)
• gif, jpg, bmp, .png are used as extensions for files which store
____________
1. Audio data
2. Image data
3. Video data
4. Text data
Answer: 2
QUESTION 3: (DEC.2014)
• Binary equivalent of decimal number 35 is __________
1) 100011
2) 110001
3) 110101
4) 101011
Answer: 1)
QUESTION 4: (JULY 2016)
• If the binary equivalent of the decimal number 48 is 110000, then the binary
equivalent of the decimal number 51 is given by
1. 110011
2. 110010
3. 110001
4. 110100
Answer: 1
QUESTION 5: (JUNE 2019)
• A computer has a main memory of 960 Kbytes. What is the exact number of
bytes contained in this memory?
1. 960 x 8
2. 960 x 1000
3. 960 x 1024
4. 960 x 1024 x 1024
Answer: 3
QUESTION 6: (DEC. 2015)
• Which of the following is an open source software?
1. MS Word
2. Windows
3. Mozilla Firefox
4. Acrobat Reader
Answer: 3
END OF PART-1
INTERNET
INTERNET
• Internet revolutionized the computer and communication-world further
• Invention of telegraph, telephone, radio, and computer set the stage for this
unprecedented integration of capabilities.
• Internet is at once a world-wide broadcasting capability, a mechanism for
information dissemination, and a medium for collaboration and interaction
between individuals and their computers without regard for geographic location.
• Internet represents one of the most successful examples of the benefits of
sustained investment and commitment to research and development of
information infrastructure.
REQUIREMENTS IN INTERNET
• In order to connect to the Internet, you must have access to an Internet service
provider (ISP), which acts as the middleman between you and the Internet.
• Most ISPs offer broadband Internet access via a cable, DSL, or fiber connection
called the Ethernet cable.
• When you connect to the Internet using a public Wi-Fi signal,
the Wi-Fi router is still connected to an ISP
that provides Internet access.
• Even cellular data towers must connect to an
Internet service provider to provide
connected devices with access to the Internet.
ONLINE SERVICES IN INTERNET
• Web – a collection of billions of webpages that you can view with a web
browser
• Email – the most common method of sending and receiving messages online
• Social media – websites and apps that allow people to share comments,
photos, and videos
• Online gaming – games that allow people to play with and against each
other over the Internet
• Software updates – operating system and application updates can
typically be downloaded from the Internet
EVOLUTION
• Early days of the Internet– most people connected to the Internet
using a home computer and a dial-up modem.
DSL and cable modems eventually provided users with
"always-on" connections.
• Now mobile devices, such as tablets and smartphones, make it
possible for people to be connected to the Internet at all times.
• The Internet of Things (IOT) has turned common appliances and
home systems into "smart" devices that can be monitored and controlled over
the Internet.
• As the Internet continues to grow and evolve, you can
expect it to become an even more integral part of daily
life.
ABOUT ‘WEB’
• World Wide Web (WWW) – founded by Sir Tim Berners-Lee, a British
computer scientist
• The leading information retrieval service of the Internet (the worldwide
computer network).
• Gives users access to a vast array of documents that are connected to each
other by means of hypertext or hypermedia links—i.e., hyperlinks,
electronic connections that link related pieces of information in order to
allow a user easy access to them.
.
• Hypertext allows the user to select a word or phrase from text and thereby
access other documents that contain additional information pertaining to that
word or phrase.
• Hypermedia documents feature links to images, sounds, animations, and
movies.
• The Web operates within the Internet‘s basic client-server format;
• Servers are computer programs that store and transmit documents to other
computers on the network when asked to, while clients are programs that
request documents from a server as the user asks for them.
• Browser software allows users to view the retrieved documents.
INTERNET GLOSSARY
1. Modem:
• The short form for Modulator-Demodulator
• Used to convert analog signals from a telephone or cable wire to digital signals so
that the computer can recognise them.
• Converts digital data from a computer or other device into an analog signal that
can be sent over standard telephone lines.
• Modern Modems are DSL or cable modems, which are considered ‗broadband‘
devices. They operate over telephone wires that use a wider frequency line.
• Now a days ‗Optical Fibre Cables‘ are used instead of ‗Coaxial Cables‘ for
efficient and high speed data transfer.
• Some modems have built-in routers that support Wi-Fi, which enables the
connection of more than one device at a time.
INTERNET GLOSSARY
2. Repeater
• A device that accepts, cleans and retransmits electronic signals at a
higher power level.
• Repeaters are required so that the signals can travel a longer distance
without degrading.
3. Hub
• Also called a Network Hub– a common connection point for devices in a network
• Commonly used to connect segments of a LAN
• Contains multiple ports.
• When a packet arrives at one port, it is copied to the other ports
so that all segments of the LAN can see all packets
INTERNET GLOSSARY
4. Switches
• Networking hardware that connects devices on a computer network by using packet
switching to receive and forward data to the destination device
• Like hubs, switches are used to receive and send data to ports.
• Used for a large number of devices– better performance than hubs
• Hubs share data with all ports, while switches send it to only the intended port.
5. Bridges
• Operates at the data link layer.
• Actually a repeater, with the add-on functionality of filtering content by reading the
MAC addresses of source and destination.
• Also used for interconnecting two LANs working on the same protocol.
• It has a single input and single output port, thus making it a 2-port device.
INTERNET GLOSSARY
6. Gateways
• A passage to connect two networks together that may work upon different
networking models.
• Basically work as the messenger agents that take data from one system, interpret it,
and transfer it to another system.
• Gateways are also called protocol converters and can operate at any network layer.
FTP: File Transfer Protocol (FTP) is a set of rules that ensure safe and secure
transfer of files.
PPP: Point to Point Protocol (PPP) is a data link layer protocol that enables
transmission of TCP/IP traffic over serial connection, like a telephone line.
9. NETWORK PROTOCOLS
HTTP: Hyper Text Transfer Protocol (HTTP) is the protocol that governs
webpages on the internet.
SSL: Secure Sockets Layer (SSL) is used for sending private documents via the
internet.
TFTP: Trivial File Transfer Protocol (TFTP) is used for transferring files
between network devices
SMTP: Simple Mail Transfer Protocol (SMTP) is used for sending mails.
• Typically, bandwidth is expressed as a bitrate and measured in bits per second (bps).
• The content of a blog can vary from cooking recipes to making a bomb.
• Hash tags are used in social media to mark a keyword in a post. There are millions of
posts and status updates online; with the use of hash-tags searching them will be easy.
For example, if you want to see updates about a recent movie you can search it as
# <the movie name>.
.
17. Hyperlink
• Hyperlinks are found in nearly all Web pages, allowing users to click their way
from page to page.
• Text hyperlinks are often blue and underlined, but don't have to be.
• When you move the cursor over a hyperlink, whether it is text or an image, the
arrow should change to a small hand pointing at the link.
• When you click it, a new page or place in the current page will open.
.
18. Instant Messaging
• IM uses a shared software client between or among two or more people using personal
computers, smartphones or other devices.
• The communication is done over a network, often the Internet, and may include
advanced modes with live voice or video.
• File transfers are also sometimes allowed but are limited in size.
• It allows a system to be recognized by other systems connected via the Internet protocol.
• It‘s similar to our house address which is used by the postman to identify our house;
similarly, the internet uses IP address to identify a system.
• The set of professional and social etiquettes practiced and advocated in electronic
communication over any computer network.
• Common guidelines include being courteous and precise, and avoiding cyber-bullying.
• Netiquette also dictates that users should obey copyright laws and avoid overusing emoticons.
21. Phishing
• Phishing is a cybercrime in which a target or targets are contacted by email, telephone or text
message
• Done by someone pretending as a legitimate institution to lure individuals into providing
sensitive data such as personally identifiable information, banking and credit card details, and
passwords.
• Example: Spam mails that claim that you have won a lottery worth 10 million
COMMONLY USED DOMAINS
.com: Commercial content or business
.org: Organisation
.net: Network
.gov: Governmental
END OF PART-1
INTRANET
• A private network that can only be accessed by authorized users.
• The prefix "intra" means "internal" and therefore implies an
intranet is designed for internal communications.
• "Inter" (as in Internet) means "between" or "among‖.
• Some intranets are limited to a specific local area network (LAN), while others
can be accessed from remote locations over the Internet.
• Local intranets are generally the most secure since they can only be accessed
from within the network.
• In order to access an intranet over a wide area network (WAN), you typically
need to enter login credentials.
BENEFITS OF THE INTRANET
• It helps in getting the message across the staff members in the organization.
• Productivity: Information can be accessed anywhere and at any time– Workers can view the information faster, and use it as
per their needs.
• Time-saving: It helps people in the organization get information based on their needs– only the required amount of
information is being given to the employees and it takes very less time to process it. The employees may link this
information to a relevant one based on their convenience.
• Reduces cost: Anytime the information is needed, employees can access using their desktop or the smartphone– helps the
company in saving the extra space which is required in the form of the physical documents being stored in the organization.
• Various information like internal phone numbers, procedure materials– required on a daily basis. When this information is
available on hand, it can essentially save time as well as money. The organization is freed from costs like printing,
maintenance, and so on.
• Communication: It can save time by making the communications quick– works as a powerful tool for an organization
horizontally as well as vertically. It can initiate the strategic communications within the company and as it is secure,
companies can rely on it. Every member of the team can be up to date with just a single click.
BASIS FOR COMPARISON INTERNET INTRANET
Accessibility Anyone can access the Internet Accessible only by the organization
members, having login details.
Information Provided Unlimited, and can be viewed by Limited, and circulates among the
everyone members of an organization
EXTRANET
• A controlled private network allowing customers, partners, vendors, suppliers and other businesses to gain information,
typically about a specific company or educational institution
• Done without granting access to the organization's entire network. An extranet is often a private part of a website. It is
restricted to select users through user IDs, passwords and other authentication mechanisms on a login page.
• An extranet may be viewed as an intranet mapped onto the public Internet or onto some other private network.
Advantages:
The ability to exchange large volumes of data using electronic data interchange
• Disadvantages: Expensive implementation and maintenance if hosted internally and the potential for compromised
sensitive or proprietary information. Alternately, it may be hosted by an application service provider.
E-MAIL
• Short for "electronic mail,―– one of the most widely used features of the Internet, along with the web–
allows you to send and receive messages– to and from anyone with an email address, anywhere in the
world.
• Uses multiple protocols within the TCP/IP suite. For example, SMTP is used to send messages, while the
POP or IMAP protocols are used to retrieve messages from a mail server.
• When you configure an email account, you must define your email address, password, and the mail
servers used to send and receive messages.
• Fortunately, most webmail services configure your account automatically, so you only need to enter your
email address and password.
• However, if you use an email client like Microsoft Outlook or Apple Mail, you may need to manually
configure each account.
• Besides the email address and password, you may also have to enter the incoming and outgoing mail
servers and enter the correct port numbers for each one.
COMPONENTS OF AN E-MAIL MESSAGE
1. HEADERS: Contain information concerning the sender and recipients– the exact content of mail headers can vary
depending on the email system that generated the message.
Subject: A description of the topic of the message– displayed in most email systems that list email messages individually.
Sender (From): Sender's Internet email address. It is usually presumed to be the same as the Reply-to address, unless a
different one is provided.
Date and time received (On): The date and time the message was received.
Reply-to: This is the Internet email address that will become the recipient of your reply if you click the Reply button.
Recipient email address: The Internet mail address of the recipient, or where the message is actually sent.
• The message body also may include signatures or automatically generated text that is
inserted by the sender's email system.
• Unlike with CC, no one but the sender can see the list of BCC recipients.
Webmail means emails can be sent and received from any computer, anywhere in the
world, that has an internet connection.
Cheap - when using broadband, each email sent is effectively free. Dial-up users are
charged at local call rates but it only takes a few seconds (for conventional email, e.g.
text only) to send an email.
Viruses are easily spread via email attachments (most email providers scan emails for
viruses on your behalf).
No guarantee the mail will be read until the user logs on and checks their email.
• A three-dimensional model for teaching– Demonstrations that are too big or dangerous for class
room teaching can be projected– can also be used for enrolling students online– will save time,
labour and money.
• Plays a significant role in research work as well. It can be used for collecting,
processing, storing, and interpreting data.
iv) ICT is basically a delivery system: ICTs are essentially meant only to deliver
content; they are not expected to measure attitudinal or behaviour changes
• PDF – When the File is to be stored in the Portable Document Format, the term PDF is used
• VGA – The System that is used for displaying the graphics is known as Video Graphics
Array or VGA. It was developed by IBM.
• MAC - The common abbreviation used for a type of personal computer, Macintosh made by
the Apple Computer Company
• OS – OS is the Operating System of the Computer. It is the main program that runs on the
Computer and begins automatically when the Computer is turned on.
LIST OF ABBREVIATIONS
• .
ABBREVIATION FULL-FORM
HDD Hard Disk Drive
UNIVAC Universal Automatic Computer
GUI Graphic User Interface
USB Universal Serial Bus
VGA Video Graphic Array
ASCII American Standard Code for
Information Interchange
DVD Digital Versatile Disc
URL Universal Resource Locator
FORTRAN Formula Translator
SIM Subscriber Identification Module
ABBREVIATION FULL-FORM
HDMI High Definition Multimedia
Interface
VPN Virtual Private Network
PHP Hypertext Pre-processor
SQL Structured Query Language
CMD Command
BASIC Beginner All-purpose Symbolic
Instruction Code
HTTP Hypertext Transfer Protocol
Wi-Fi Wireless Fidelity
ATM Automated Teller Machine
VIRUS Vital Information Resources Under Siege
1. Search engine
3. Multimedia
4. Browser
Answer: 4
QUESTION 2: [JUNE 2019]
Answer: 3
QUESTION 3: [DEC 2019]
• A small text file stored on user‘s computer by some websites in order to
recognize and keep track of user‘s preferences is called:
1. Cookie
2. Report
3. Log
4. History
Answer: 1
QUESTION 4: [JULY 2018]
1. Given the following email fields, which of the email addresses will ‗Swami‘ be able
to see when he receives the message? Mail-
To… ram@[Link]
Cc… raj@test. com; ravi@[Link]
Bcc… swami@test. com; rama@test. com
Codes:
1. ram@test. com
2. ram@test. com; raj@test. com; ravi@test. com
3. ram@test. com; rama@test. com
4. ram@test. com; rama@test. com; raj@test. com; ravi@test. Com
Answer: 2
QUESTION 4: [JULY 2018]
• In the context of e-mail, what is ‗spam‘?
1. The act of overloading an e-mail server by using denial-of-service attacks
2. E-mail messages that are infected with viruses
3. A large quantity of messages that do not reach the recipient
4. Unsolicited advertising sent to a large number of recipients
Answer: 4
QUESTION 5: [NOV. 2017]
• What is the full form of USB as used in computer related activities?
1. Universal Security Block
2. Universal Serial Bus
3. United Serial Bus
4. Ultra Security Block
Answer: 2
QUESTION 6: [DEC. 2019]
1. Which of the following communication technologies employ only asynchronous
communication?
• 1. Video conferencing
• 2. Email
• 3. Forums
• 4. Instant messaging
• Choose the correct option:
• 1. (a) and (c) only
• 2. (b) and (d) only
• 3.(b) and (c) only
• 4. (a) and (d) only
• Answer: 3
•
END OF UNIT-8