0% found this document useful (0 votes)
31 views162 pages

ICT-Full Version-PDF-1

The document provides an overview of Information and Communication Technology (ICT), detailing the evolution of computers through five generations, each characterized by distinct components and capabilities. It also categorizes computers based on operation and size, explaining the functions of various types of input devices. Additionally, it includes a series of questions and answers related to the content, reinforcing key concepts in ICT.

Uploaded by

Kalai mano
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
31 views162 pages

ICT-Full Version-PDF-1

The document provides an overview of Information and Communication Technology (ICT), detailing the evolution of computers through five generations, each characterized by distinct components and capabilities. It also categorizes computers based on operation and size, explaining the functions of various types of input devices. Additionally, it includes a series of questions and answers related to the content, reinforcing key concepts in ICT.

Uploaded by

Kalai mano
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

INFORMATION &

COMMUNICATION TECHNOLOGY
(ICT)
NTA-UGC-NET-PAPER-1- UNIT- VIII
INTRODUCTION
• ICT : INFORMATION AND COMMUNICATION
TECHNOLOGY
• Evolution of technology and computing
• Meanings, advantages, disadvantages, uses of
information technology
• Number systems (binaries & decimals)
• Basics of internet
• Digital initiatives in higher education
• Information technology & governance
I.C.T: SPECIFICATIONS & EFFECTS
• Digital Transformation of the society
• Rapid interaction among people using advanced
communication methods
• Newer dimensions to R&D: Data (record & storage), analysis
and processing
• Multitasking
• Precision
• Learning facilities and Opportunities
INTRODUCTION TO COMPUTERS
• Computer: Fast and accurate electronic machine that converts data
into meaningful information
• Used to perform calculations, documenting texts, editing photos &
videos, accessing information online, educational requirements etc.
• Works with the help of a hardware and software
• Hardware: Physical components of a computer
• Software: Instructions & programs fed in a computer
• Evolution of computers through five generations
FIRST GENERATION
• Time Period: 1946 – 1959
• Basic Components: Vacuum tubes
• Language: Machine Language
• Memory: 4000 bits
• Size: Almost the size of a big room
• Examples: ENIAC, UNIVAC, IBM-701

Challenges:
• Vacuum tubes generated a lot of heat; decreased efficiency & reliability
• Supported machine language only
• Very costly; affordable only to large organisations
SECOND GENERATION
• Time Period: 1959-1965
• Basic Components: Transistors
• Language: Assembly Language
• Memory: 32,000 bits (Primary + Secondary)
• Primary Memory: Used Magnetic cores
• Secondary Memory: Used Magnetic Tapes & Magnetic Disks
• Size: Comparatively smaller in size
• Examples: IBM 400, IBM 1600

Features:
• Relatively faster and reliable than vacuum tubes
• Less heat, less electricity required, much faster
• Supported Machine & Assembly Languages
• Still Very Costly
THIRD GENERATION
• Time Period: 1965-1971
• Basic Components: Integrated Circuits (IC)
• Language: High Level; BASIC, PASCAL, FORTRAN, COBOL
• Memory: 1,28,000 bits
• Size: Relatively smaller than other two generations
• Examples: UNIVAC 9000, Personal Data Processor (PDP)

Features:
• Faster and Reliable; less maintenance and heating
• Lesser electricity required in comparison
• After all they were costly
FOURTH GENERATION
• Time Period: 1971-1980
• Basic Components: Large Scale Integrated Microprocessors(LSI) &
Very Large Scale Integrated Microprocessors (VLSI)
• Language: High Level; C, C++, DBASE
• Memory: 100 billion bits
• Size: Portable if required; Micro computers
• Examples: Personal Computers
Features:
• Very cheaper in comparison
• Concept of Internet was introduced after this
• Easy availability of computers
FIFTH GENERATION
• Time Period: 1980s to present and beyond
• Basic Components: Ultra Large Scale Integrated Microprocessors(ULSI) &
Artificial Intelligence (AI)
• Language: High level; SQL, Java, .net
• Memory: Beyond limits
• Size: Pocket sized and other gadgets
• Examples: Laptops, Smartphones, Robots etc.
Features:
• Robotics and Natural Language/Voice Recognitions
• User-friendly multimedia interfaces & parallel processing
• Availability at cheaper rates
TYPES OF COMPUTERS
OPERATION BASED CLASSIFICATION
ANALOG DIGITAL
• Process analogue data • Works on digital data
• Data is continuous and not • Only discrete values like ‗0‘ and
‗1‘
discrete
• Both numeric and non-numeric
• Can process numeric data alone data can be processed
• Better in terms of speed • Better in terms of memory and
accuracy
• Examples: Aircraft computers &
simulators, Speedometers etc. • Examples: Personal Computers
SIZE BASED CLASSIFICATION

• Supercomputers
• Mainframe Computers
• Mini Computers
(Mid-range Computers)
• Micro Computers
(Personal Computers)
SUPERCOMPUTERS
• High performance computers for specific purposes
• Computational tasks like weather forecast, research and development programmes,
earthquake studies etc.
• Performance is measured in terms of Floating-Point Operations per second (FLOPS);
devices these days perform 100 PFLOPS
• They are expensive and huge in size
• Examples: Satellite launching supercomputers in NASA,
IBM Summit (2018, US), Dell Frontera (2019, US),
Fujitsu Fugaku (2020, Japan)
• First Supercomputer in India: PARAM 8000
• Latest Supercomputer: PRATYUSH & MIHIR (Estd. @ Indian [Link] Tropical
Meteorology, Pune and National Centre for Medium Range Weather Forecast
(NCMRWF), Noida respectively(As per Jan.2018, fastest in India)
MAINFRAME COMPUTERS
• Used to record huge amount data (big-data processing)
• Supports multiple operating systems – often used as servers
• Special features- virtual memory, hardware swapping without disruption
• High stability and reliability enable these machines to run uninterrupted
for very long periods of time (for decades)
• Fault-tolerant computing, support mixed workloads, assured integrity
• Examples: Servers for ATM transaction recording, student data in
universities, patient records in hospitals etc.
MINI COMPUTERS
• Also known as mid-range computers
• Used for scientific and engineering computations, business data
processing, file-handling and data management (mid-size servers)
• A midsize multiprocessing computer; consists of two or more
processors and can support 4 to 200 users at one time.
• Used in institutes and departments for tasks such as billing,
accounting and inventory management
• Example: IBM mid-range computers
WORKSTATIONS

• High-end, expensive computers that are made for more complex


procedures and are intended for one user at a time
• Science, math and engineering calculations– useful for computer
design and manufacturing
• Sometimes improperly named for marketing reasons
• Not usually sold in retail
• Example: Apple Mac Pro
MICROCOMPUTERS
• They are also known as Personal Computers
• Well-known pocket friendly type of computers
• Different varieties available in the market varying in size and price
• General-purpose computers designed for individual use
• Consists of a microprocessor as a central processing unit (CPU), memory,
storage area, input unit and output unit
• Mainly used as home computers, programming, gaming etc. – high end PCs
can be used in small scale businesses and offices.
• Examples: Desktops, Laptops, Modern Smartphones and Tablets
TIME FOR SOME QUESTIONS???
QUESTION 1:
• Which generation of computers used vacuum tubes as the basis of
operation?
1. First generation
2. Second generation
3. Third generation
4. Fourth generation
QUESTION 1:
• Which generation of computers used vacuum tubes as the basis of
operation?
1. First generation
2. Second generation
3. Third generation
4. Fourth generation
Answer: 1
QUESTION 2:
• What was the basis of second generation of computers?
1. Microprocessors
2. Integrated Circuits
3. Transistors
4. Vacuum tubes
QUESTION 2:
• What was the basis of second generation of computers?
1. Microprocessors
2. Integrated Circuits
3. Transistors
4. Vacuum tubes
Answer: 3
QUESTION 3:
• Which generation of computers is equipped with artificial
intelligence?
1. Third generation
2. Fourth generation
3. Fifth generation
4. Second generation
QUESTION 3:
• Which generation of computers is equipped with artificial
intelligence?
1. Third generation
2. Fourth generation
3. Fifth generation
4. Second generation
Answer: 3
QUESTION 4:
• Machine Languages are
1. High-level Languages
2. Medium Languages
3. Low-level Languages
4. None of the above
QUESTION 4:
• Machine Languages are
1. High-level Languages
2. Medium Languages
3. Low-level Languages
4. None of the above

Answer: 3
QUESTION 5:
• Which among the following languages were used in second
generation of computers?
1. High-level Language
2. Machine Language
3. Assembly Language
4. Programming Language
QUESTION 5:
• Which among the following languages were used in second
generation of computers?
1. High-level Language
2. Machine Language
3. Assembly Language
4. Programming Language

Answer: 3
QUESTION 6:
• IBM 1401 is _______
1. First Generation Computer
2. Second Generation Computer
3. Third Generation Computer
4. Fourth Generation Computer
QUESTION 6:
• IBM 1401 is _______
1. First Generation Computer
2. Second Generation Computer
3. Third Generation Computer
4. Fourth Generation Computer

Answer: 2
QUESTION 7:
• Which of the following statements is true?
1. Minicomputer works faster than Microcomputer
2. Microcomputer works faster than Minicomputer
3. Speed of both the computers is the same
4. None of the above
QUESTION 7:
• Which of the following statements is true?
1. Minicomputer works faster than Microcomputer
2. Microcomputer works faster than Minicomputer
3. Speed of both the computers is the same
4. None of the above

Answer: 1
QUESTION 8: (JULY 2018)
• Which of the following statement regarding ICT is/are true?
P: ICT is an acronym that stands for Indian Classical Technology.
Q: Converging technologies that exemplify ICT include the merging of
audio-visual, telephone and computer networks through a common cable system.
1. Only P
2. Only Q
3. P & Q
4. Neither P nor Q
Answer: 2
MAJOR COMPONENTS IN A
COMPUTER

• Input devices
• Central processing unit (c.p.u)
• Output devices
• Memory unit primary memory (ram)
secondary memory
(storage or hard disk)
INPUT DEVICES
• Help users to enter data and commands into a computer system
• Data can be in the form of numbers, words, actions, commands, etc.
• The main function of input devices is to direct commands and data
into computers.
• Computers then use their CPU to process this data and produce
output.
• Certain Input Devices are as follows:
1. KEYBOARD
• A basic input device that is used to enter data into a computer or any other
electronic device by pressing keys.
• It has different sets of keys for letters, numbers, characters, and functions.
• Connected to a computer through USB or a Bluetooth device (for wireless
communication)
• Different types of keyboards based on region and language.
• Commonly used keyboard is the QWERTY keyboard
• The most frequently used letters are kept in a home row to improve typing
.
• AZERTY Keyboard – The standard French Keyboard developed in France as an
alternative to the QWERTY – mostly used in France and other European
countries.

• DVORAK Keyboard – developed to increase the typing speed by reducing the


finger movement while typing.
2. MOUSE
• A hand-held input device used to move cursor or pointer across the screen.
• Designed to be used on a flat surface– generally has left and right buttons and a
scroll wheel between them.
• Laptop computers come with a touchpad that works as a mouse.
• Some mouse comes with integrated features such as extra buttons to perform
different functions
• Invented by Douglas C. Engelbart in 1963.
• Early mouse had a roller ball integrated as a movement sensor underneath the
device. Modern mouse devices come with optical technology that controls cursor
movements by a visible or invisible light beam
TYPES OF MOUSE
• Trackball Mouse: A stationary input device– ball mechanism to
move the pointer or cursor on the screen. The ball is half inserted–
can be easily rolled with finger, thumb or the palm to move the
pointer on the screen– ideal device if you have a limited desk space.
• Mechanical Mouse: It has a system of a ball and several rollers to
track its movement– A corded type of mouse– A mechanical mouse
used for high performance. The drawback is that they tend to get dust
into the mechanics and thus require regular cleaning
• Optical Mouse: Uses optical electronics to track its movement– more
reliable than a mechanical mouse– requires less maintenance–
performance is affected by the surface
• Cordless/Wireless Mouse: Lacks cable and uses wireless technology
such as IrDA (infrared) or radio (Bluetooth or Wi-Fi) to control the
movement of the cursor. It is used to improve the experience of using
a mouse. It uses batteries for its power supply
3. WEBCAM
• Any camera that is connected to a computer as an input device
• The in-built camera provided on a computer can also be considered a webcam.
• It can take pictures, and can be used to record videos if required.
• Pictures and videos are stored in the computer memory and can be displayed on
the screen if required.
• Works almost the same as the digital camera, but different from it, as it is designed
to take compact digital photos that can be uploaded easily on the webpages and
shared with others through the internet.
• Web Cams can be used along with microphones in video conferencing and video
presentations
4. MICROPHONE
• A computer input device that is used to input the sound.
• Receives the sound vibrations and converts them into audio signals or
sends to a recording medium.
• The audio signals are converted into digital data and stored in the
computer.
• The microphone also enables the user to telecommunicate with
others.
• It is also used to add sound to presentations and with webcams for
video conferencing.
5. SCANNER
• The scanner uses the pictures and pages of text as input.
• It scans the picture or a document.
• The scanned picture or document is then converted into a digital
format or file, and displayed on the screen as an output.
• It uses optical character recognition techniques to convert images into
digital ones.
• There are different scanners available like flatbed scanner, hand held
scanner, 3D scanners etc.
6. BARCODE READER
• A type of scanner which reads barcodes, hence also known as
Barcode Scanners
• Input devices that loads product information at the computer system
at the billing counters of shops
• They decode the information embedded in the barcodes and sends
the data into the computer
• Consists of a light source, a lens and a light sensor translating for
optical impulses into electrical signals.
• Additionally, nearly all barcode readers contain decoder circuitry
that can analyze the barcode's image data provided by the sensor
and sending the barcode's content to the scanner's output port
• Barcodes these days are replaced by QR codes, that are more secure
and user-friendly, serves the same purpose
7. MAGNETIC INK CHARACTER
RECOGNITION (MICR)
• An input device is designed to read the text printed with magnetic ink.
• MICR is a character recognition technology that makes use of special magnetized
ink which is sensitive to magnetic fields.
• Widely used in banks to process the cheques and in other organizations where
security is a major concern.
• It can process three hundred cheques in a minute with hundred-percentage
accuracy. The details on the bottom of the cheque (MICR No.) are written with
magnetic ink.
• A laser printer with MICR toner can be used to print the magnetic ink.
• The device reads the details and sends to a computer for processing. A document
printed in magnetic ink is required to pass through a machine which magnetizes
the ink, and the magnetic information is then translated into characters
8. OPTICAL CHARACTER READER (OCR)
• An input device is designed to convert the scanned images of
handwritten, typed or printed text into digital text.
• Widely used in offices and libraries to convert documents and books
into electronic files.
• It processes and copies the physical form of a document using a
scanner.
• After copying the documents, the OCR software converts the
documents into a two-colour (black and white), version called bitmap.
Then it is analyzed for light and dark areas, where the dark areas are
selected as characters, and the light area is identified as background.
• It is widely used to convert hard copy legal or historic documents into
PDFs.
.
TOUCHPADS TOUCHSCREEN
• Usually found in laptops as a • The display screen of a device such
substitute for the mouse. as a smartphone, tablet, etc., that
• Allows you to move or control the allows users to interact or provide
cursor on the screen using your inputs to the device by using their
finger. finger.
• It also has two buttons for right • Modern electronic devices use it as
and left click. an alternative to a mouse for
• Can perform all the tasks that you navigating a graphical user
do with a mouse, such as selecting interface.
an object on the screen, copy,
paste, delete, open a file or folder, • Used in lots of devices such as
and more Smartphones, Cameras, Car GPS,
Fitness machines etc.
CENTRAL PROCESSING UNIT
• Alternately referred to as a processor, central processor,
or microprocessor
• Referred to as the brain of the computer– handles all instructions it receives
from hardware and software running on the computer.
• Main function is to take input from a peripheral device (keyboard, mouse,
printer, etc.) or computer program, and interpret what it needs. The CPU
then either outputs information to your monitor or performs the peripheral's
requested task.
• The CPU has two components: Arithmetic Logic unit (ALU) and a
Control Unit (CU).
COMPONENTS OF CPU
Arithmetic Logic unit (ALU) Control Unit (CU)

• A complex digital circuit; one of • A control unit or CU is circuitry


many components within a
computer's central processing unit. that directs operations within a
computer's processor. It lets the
• It performs both bitwise and
mathematical operations on binary computer's logic unit, memory, as
numbers and is the last component to well as both input and output
perform calculations in the processor. devices know how to respond to
• The ALU uses operands and code instructions received from a
that tells it which operations to program
perform for input data. After the
information is processed by the ALU,
it is sent to the computer's memory
PLOT DIAGRAM:
Step 3: Execute commands
Step 2: Decode instructions
into commands CONTROL UNIT:
• Works by receiving input
information that it
converts into control
signals
Step 4: Store results
• They are then sent to the
in memory
Step 1: Fetching instruction from central processor.
memory • The computer's processor
then tells the attached
hardware what operations
to carry out.
• The functions that a
control unit performs are
dependent on the type of
CPU, due to the variance
of architecture between
different manufacturers.
OUTPUT DEVICES

• The output device displays the result of the processing of raw data that is entered
in the computer through an input device.
• There are a number of output devices that display output in different ways such as
text, images, hard copies, and audio or video.
1. MONITOR
• The display unit or screen of the computer.
• The main output device that displays the processed data or information as text, images,
audio or video.
• Early monitors called CRT monitors used Cathode Ray Tube that produces image in the
form of video signals.
• Later CRT monitors were replaced by LCD monitors that have a flat panel display and
is based on Liquid Crystal Display.
• Further, LCDs were replaced by LED screens– also have a flat panel display and use
liquid crystal display technology like the LCD monitors. The difference between them
lies in the source of light to backlight the display.
• The LED monitor has many LED panels, and each panel has several LEDs to backlight
the display, whereas the LCD monitors use cold cathode fluorescent light to backlight
the display. Modern electronic devices such as mobile phones, LED TVs, laptop and
computer screens, etc., use a LED display as it not only produces more brilliance and
greater light intensity but also consumes less power.
2. PRINTERS
• A printer produces hard copies of the processed data.
• It enables the user to print images, text or any other information onto paper.
• It can be directly connected to a computer or can be used by many
computers over a shared network.
• There are different types of printers like Dot Matrix Printer, Laser Printer,
Inkjet Printer, etc.
3. PROJECTORS
• An output device that enables the user to project the output
onto a large surface such as a big screen or wall.
• Can be connected to a computer and similar devices to
project their output onto a screen.
• It uses light and lenses to produce magnified texts, images, and videos. So, it is
an ideal output device to give presentations or to teach a large number of people.
• Modern projectors (digital projectors) come with multiple input sources such as
HDMI ports for newer equipment and VGA ports that support older devices.
Some projectors are designed to support Wi-Fi and Bluetooth as well.
• They can be fixed onto the ceiling or placed on a stand, and are frequently used
for classroom teaching, giving presentations, home cinemas, etc.
4. SPEAKERS
• Speakers are attached to computers to facilitate the output of sound;
• Sound cards are required in the computer for speakers to function.
• The different kinds of speakers range from simple, two-speaker output devices to
more advanced surround-sound multi-channel units.
MEMORY UNIT
• The storage component of a computer where data to be processed and instruction
required for processing are stored
• The memory is divided into a large number of small parts called cells.
• Each location or cell has a unique address.
• RAM, ROM and Hard Disks are components included in memory unit
• They can be categorized into:
1. Primary memory
2. Secondary memory and
3. Cache memory.
1. PRIMARY MEMORY
• It is generally made up of a semiconductor device.
• The data and instruction required to be processed resides in the main memory.
• It is divided into two subcategories RAM and ROM.
• Random Access Memory (RAM): It holds only those data and instructions on
which the computer is currently working ON. It has a limited capacity and data is
lost when power is switched off. Hence, it is a volatile memory.
• Read Only Memory (ROM): It is a permanent and internal memory that is used
for reading data. Once written data cannot be removed– can only be read. It does
not loose its content once the device is turned off– non-volatile memory. It is
used in booting.
2. SECONDARY MEMORY
• This type of memory is also known as external memory
• It is slower than the main memory. These are used for storing data/information
permanently.
• CPU directly does not access these memories; instead they are accessed via input-
output routines.
• The contents of secondary memories are first transferred to the main memory, and
then the CPU can access it.
• Example: Compact Disk, CD-ROM, DVD, USB etc.
3. CACHE MEMORY
• Cache memory is a very high-speed semiconductor memory which can speed up
the CPU.
• It acts as a buffer between the CPU and the main memory.
• It is used to hold those parts of data and program which are most frequently used
by the CPU.
• The parts of data and programs are transferred from the disk to cache memory by
the operating system, from where the CPU can access them.
MEMORY UNITS
Bit → Either ‘0’ nor ‘1’, i.e., a binary digit
1 Nibble = 4bits
1 byte = 8 bits
1 Kilobyte (KB) = 1024 bytes
1 Megabyte (MB) = 1024 KB
1 Gigabyte (GB) = 1024 MB
1 Terabyte (TB) = 1024 GB
1 Petabyte (PB) = 1024 TB
1 Exabyte (EB) = 1024 PB
1 Zettabyte (ZB) = 1024 EB
1 Yottabyte (YB) = 1024 ZB
1 Brontobyte (BB) = 1024 YB
1 Geopbyte = 1024 BB
TIME FOR SOME QUESTIONS???
QUESTION 1:
• Half byte is ________
1. Bits
2. Nibble
3. Petabyte
4. Yotobyte
QUESTION 1:
• Half byte is ________
1. Bits
2. Nibble
3. Petabyte
4. Yotobyte

Answer: 2
QUESTION 2:
• MICR stands for ________
1. Magnetic Ink Character Reader
2. Magnetic Ink Code Reader
3. Magnetic Ink Character Recognition
4. Magnetic Ink Cases Reader
QUESTION 2:
• MICR stands for ________
1. Magnetic Ink Character Reader
2. Magnetic Ink Code Reader
3. Magnetic Ink Character Recognition
4. Magnetic Ink Cases Reader

Answer: 3
QUESTION 3: (JULY 2018)
• Put the following units of storage into the correct order, starting with the smallest unit first and going
down to the largest unit:
a. Kilobyte
b. byte
c. Megabyte
d. Terabyte
e. Gigabyte
f. Bit
• Give your answer from the following code:
1. (f), (b), (a), (c), (d), (e)
2. (f), (b), (a), (d), (e), (c)
3. (f), (b), (a), (c), (e), (d)
4. (f), (b), (a), (d), (c), (e)
QUESTION 3: (JULY 2018)
• Put the following units of storage into the correct order, starting with the smallest unit first and going
down to the largest unit:
a. Kilobyte
b. byte
c. Megabyte
d. Terabyte
e. Gigabyte
f. Bit
• Give your answer from the following code:
1. (f), (b), (a), (c), (d), (e)
2. (f), (b), (a), (d), (e), (c)
3. (f), (b), (a), (c), (e), (d)
4. (f), (b), (a), (d), (c), (e) Answer: (3)
QUESTION 4: (JULY 2018)
• With regard to computer memory, which of the following statement(s)
is/are TRUE?
P: Read Only Memory (ROM) is ‗volatile‘ memory.
Q: Random Access Memory (RAM) is ‗volatile‘ memory.
R: Secondary Memory is ‗volatile‘ memory
1. P only
2. Q only
3. P and Q only
4. P and R only
QUESTION 4: (JULY 2018)
• With regard to computer memory, which of the following statement(s)
is/are TRUE?
P: Read Only Memory (ROM) is ‗volatile‘ memory.
Q: Random Access Memory (RAM) is ‗volatile‘ memory.
R: Secondary Memory is ‗volatile‘ memory
1. P only
2. Q only
3. P and Q only
4. P and R only
Answer: 2
QUESTION 5: (DEC. 2015)
• Which of the following is not an input device?
1. Microphone
2. Keyboard
3. Joystick
4. Monitor
QUESTION 5: (DEC. 2015)
• Which of the following is not an input device?
1. Microphone
2. Keyboard
3. Joystick
4. Monitor

Answer: 4
END OF PART-1
INFORMATION &
COMMUNICATION TECHNOLOGY
(ICT)
NTA-UGC-NET-PAPER-1- UNIT- VIII

PART-2
SOFTWARE
• A collection of data or computer instruction that tells the computer how to work.
• They are the non-physical part of a computer.
• The programs involving a set of instructions that guide the hardware how to do
• Examples: Adobe Photoshop, MS Office, McAfee Antivirus etc.
• There are two types of software:
1. System Software
2. Application Software
1. SYSTEM SOFTWARE
• System Software is the type of software which is the interface between
application software and system.
• Low level languages are used to write the system software.
• System Software maintains the system resources and gives the path for
application software to run.
• Without system software, the system cannot run. It is a general-purpose software.
• Examples: Operating Systems (OS) like Windows, Linux, iOS etc.
APPLICATION SOFTWARE
• Application Software is the type of software which runs as per user request.
• It runs on the platform which is provided by system software.
• High level languages are used to write the application software. It is a specific
purpose software.
• The main difference between System Software and Application Software is that
without system software, system cannot run; on the other hand, even without
application software, system always runs.
• Open Source Software doesn‘t require permissions/payments for installation
• Examples: VLC media player, Adobe Reader, Google Chrome etc.
SOME BASIC FILE FORMATS

.aif - AIF audio file


Audio Formats .cda - CD audio track file
.mid or .midi - MIDI audio file.
.mp3 - MP3 audio file
.mpa - MPEG-2 audio file
.ogg – Ogg Vorbis audio file
.wav - WAV file
.wma - WMA audio file
.wpl - Windows Media Player playlist

Presentation File Formats .key - Keynote presentation


.odp – Open Office Impress presentation file
.pps - PowerPoint slide show
.ppt - PowerPoint presentation
.pptx - PowerPoint Open XML presentation
Video Files Extension .3g2 - 3GPP2 multimedia file
.3gp - 3GPP multimedia file
.avi - AVI file
.flv - Adobe Flash file
.h264 - H.264 video file
.m4v - Apple MP4 video file
.mkv - Matroska Multimedia Container
.mov - Apple QuickTime movie file
.mp4 - MPEG4 video file
.mpg or .mpeg - MPEG video file
.rm - RealMedia file
.swf - Shockwave flash file
.vob - DVD Video Object
.wmv - Windows Media Video file

Word processor and text file formats by .doc and .docx - Microsoft Word file
.odt – Open Office Writer document file
file extension .pdf - PDF file
.rtf - Rich Text Format
.tex - A LaTeX document file
.txt - Plain text file
.wpd - WordPerfect document
.ai - Adobe Illustrator file
.bmp - Bitmap image
.gif - GIF image
Image Files Extensions .ico - Icon file
.jpeg or .jpg - JPEG image
.png - PNG image
.ps - PostScript file
.psd - PSD image
.svg - Scalable Vector Graphics file
.tif or .tiff - TIFF image

.cgi or .pl - Perl script file


.css - Cascading Style Sheet file
.htm and .html - HTML file
Internet related Files .js - JavaScript file
.jsp - Java Server Page file
.part - Partially downloaded file
.php - PHP file
.py - Python file
.rss - RSS file
.xhtml - XHTML file
Executable File extension .apk - Android package file
.bat - Batch file
.bin - Binary file
.cgi or .pl - Perl script file
.com - MS-DOS command file
.exe - Executable file
.gadget - Windows gadget
.jar - Java Archive file
.msi - Windows installer package
.py - Python file
.wsf - Windows Script File

Data and Database Files .csv - Comma separated value file


.dat - Data file
.db or .dbf - Database file
.log - Log file
.mdb - Microsoft Access database file
.sav - Save file (e.g., game save file)
.sql - SQL database file
.tar - Linux / Unix tarball file archive
.xml - XML file
E-mail File Extension .email - Outlook Express e-mail message file.
.eml - E-mail message file from multiple e-mail
clients, including Gmail.
.emlx - Apple Mail e-mail file.
.msg - Microsoft Outlook e-mail message file.
.oft - Microsoft Outlook e-mail template file.
.ost - Microsoft Outlook offline e-mail storage file.
.pst - Microsoft Outlook e-mail storage file.
.vcf - E-mail contact file.

Programming Files Extension .c - C and C++ source code file


.class - Java class file
.cpp - C++ source code file
.cs - Visual C# source code file
.h - C, C++, and Objective-C header file
.java - Java Source code file
.pl - Perl script file.
.sh - Bash shell script
.swift - Swift source code file
.vb - Visual Basic file
.
.bak - Backup file
.cab - Windows Cabinet file
.cfg - Configuration file
System Files Extension .cpl - Windows Control panel file
.cur - Windows cursor file
.dll - DLL file
.dmp - Dump file
.drv - Device driver file
.icns - macOS X icon resource file
.ico - Icon file
.ini - Initialization file
.lnk - Windows shortcut file
.msi - Windows installer package
.sys - Windows system file
.tmp - Temporary file
NUMBER SYSTEMS
1. DECIMAL NUMBER SYSTEM
• The number system that we use in our day-to-day life is the decimal number system.
Decimal number system has base 10 as it uses 10 digits from 0 to 9. In decimal number
system, the successive positions to the left of the decimal point represent units, tens,
hundreds, thousands, and so on.
• Each position represents a specific power of the base (10). For example, the decimal
number 1234 consists of the digit 4 in the units position, 3 in the tens position, 2 in the
hundreds position, and 1 in the thousands position. Its value can be written as

• (1 x 1000)+ (2 x 100)+ (3 x 10)+ (4 x l)

= (1 x 103)+ (2 x 102)+ (3 x 101)+ (4 x l00)

= 1000 + 200 + 30 + 4

= 123410
2. BINARY NUMBER SYSTEM
• A Binary number system has only two digits that are 0 and 1. Every number (value) is
represented with 0 and 1 in this number system. The base of binary number system is
2, because it has only two digits.
• Characteristics of the binary number system are as follows −
• • Uses two digits, 0 and 1
• • Also called as base 2 number system
• • Each position in a binary number represents a 0 power of the base (2).
Example 20
• • Last position in a binary number represents a x power of the base (2).
Example 2x where x represents the last position - 1.
BINARY CONVERSION

• To convert a binary number 110010102 into its decimal equivalent, multiply each digit of the
given number with raised to the power 0,1,2,…. starting from right to left, as shown:

• (27 x1) + (26 x 1) + (25 x 0) + (24 x 0) + (23 x 1) + (22 x 0) + (21 x 1) + (20 x 0)

= (27) + (26) + 0 + 0 + (23) + 0 + 2 + 0

= 128 + 64 + 8 + 2

= 202

So the Decimal equivalent of Binary number 110010102 is 20210.


TO CONVERT DECIMAL NUMBER TO BINARY NUMBER

• Convert Decimal Number 202 10 to Binary Number

2 202

2 101 0 If the number gets perfectly divided by 2 write the remainder

2 50 1 If the number does not get divided by 2 write 1 as


2 25 0 remainder
2 12 1

2 6 0

2 3 0 Then write the number starting from the bottom to top.


1 1 So the binary number equivalent to ‗20210‘ is ‗110010102‘
3. OCTAL NUMBER SYSTEM
• Octal number system has only eight (8) digits from 0 to 7. Every number (value)
is represented with 0,1,2,3,4,5,6 and 7 in this number system. The base of octal
number system is 8, because it has only 8 digits.

• Example: To convert Octal Number: 1257088 to Decimal

• (1 x 85) + (2 x 84) + (5 x 83) + (7 x 82) + (0 x 81) + 8 x 80

= (4096 + 1024 + 320 + 56 + 0 + 64)

= 3423210

• Thus Octal number 1257088 is 3423210 in decimal.


4. HEXADECIMAL NUMBER SYSTEM

• A Hexadecimal number system has sixteen (16) alphanumeric values from 0 to 9


and A to F.
• Every number (value) represents with 0,1,2,3,4,5,6, 7, 8, 9, A, B, C, D, E and F in
this number system.
• The base of hexadecimal number system is 16, because it has 16 alphanumeric
values.
• Here A is 10, B is 11, C is 12, D is 13, E is 14 and F is 15.
NETWORKING
NETWORKING
• A computer network is a group of computers linked to each other that enables
the computer to communicate with another computer and share their resources,
data, and applications. A computer network can be categorized by their size. A
computer network is mainly of four types:
• • LAN(Local Area Network)
• • PAN(Personal Area Network)
• • MAN(Metropolitan Area Network)
• • WAN(Wide Area Network)
LOCAL AREA NETWORK (LAN)
• Local Area Network is a group of computers connected to each other in a
small area such as a building or an office.
• It is used for connecting two or more personal computers through a
communication medium such as twisted pair, coaxial cable, etc.
• It is less costly as it is built with inexpensive hardware such as hubs, network
adapters, and Ethernet cables.
• The data is transferred at an extremely faster rate in Local Area Network and
provides higher security.
PERSONAL AREA NETWORK (PAN)
• Personal Area Network is a network arranged for personal use only,
typically within a range of 10 meters.
• It is used for connecting the computer devices of personal use, known as
Personal Area Network.
• Thomas Zimmerman was the first research scientist to bring the idea of the
Personal Area Network.
• Personal Area Network covers an area of 30 feet.
• Personal computer devices that are used to develop the personal area
network are the laptop, mobile phones, media player and play stations.
CAMPUS AREA NETWORK [CAN]

A CAN is the interconnection of different LANs within a specific area like a campus.
METROPOLITAN AREA NETWORK
(MAN)
• A metropolitan area network is a network that covers a larger geographic area by
interconnecting different LANs to form a larger network.
• Government agencies use MAN to connect to the citizens and private industries.
• In MAN, various LANs are connected to each other through a telephone exchange
line.
• The most widely used protocols in MAN are RS-232, Frame Relay, ATM, ISDN,
OC-3, ADSL, etc.
• It has a higher range than Local Area Network(LAN).
WIDE AREA NETWORK (WAN)
• A Wide Area Network is a network that extends over a large geographical area
such as states or countries.
• It is a much bigger network than the LAN.
• A Wide Area Network is not limited to a single location, but it spans over a large
geographical area through a telephone line, fibre optic cables or satellite links.
• The internet is one of the biggest WAN in the world.
• A Wide Area Network is widely used in the field of
Business, government, and education.
NETWORK TOPOLOGIES
• The layout pattern using which devices are interconnected is called as network
topology.
• There are different types of networks such as Bus, Star, Mesh, Ring, Daisy chain.
TIME TO YELL OUT SOME
ANSWERS
QUESTION 1: (DEC.2014)
• Symbols A-F are used in which one of the following?
1. Binary number system
2. Decimal number system
3. Hexadecimal number system
4. Octal number system

Answer: 3
QUESTION 2: (DEC.2014)
• gif, jpg, bmp, .png are used as extensions for files which store
____________
1. Audio data
2. Image data
3. Video data
4. Text data

Answer: 2
QUESTION 3: (DEC.2014)
• Binary equivalent of decimal number 35 is __________
1) 100011
2) 110001
3) 110101
4) 101011

Answer: 1)
QUESTION 4: (JULY 2016)
• If the binary equivalent of the decimal number 48 is 110000, then the binary
equivalent of the decimal number 51 is given by
1. 110011
2. 110010
3. 110001
4. 110100

Answer: 1
QUESTION 5: (JUNE 2019)
• A computer has a main memory of 960 Kbytes. What is the exact number of
bytes contained in this memory?
1. 960 x 8
2. 960 x 1000
3. 960 x 1024
4. 960 x 1024 x 1024

Answer: 3
QUESTION 6: (DEC. 2015)
• Which of the following is an open source software?
1. MS Word
2. Windows
3. Mozilla Firefox
4. Acrobat Reader

Answer: 3
END OF PART-1
INTERNET
INTERNET
• Internet revolutionized the computer and communication-world further
• Invention of telegraph, telephone, radio, and computer set the stage for this
unprecedented integration of capabilities.
• Internet is at once a world-wide broadcasting capability, a mechanism for
information dissemination, and a medium for collaboration and interaction
between individuals and their computers without regard for geographic location.
• Internet represents one of the most successful examples of the benefits of
sustained investment and commitment to research and development of
information infrastructure.
REQUIREMENTS IN INTERNET
• In order to connect to the Internet, you must have access to an Internet service
provider (ISP), which acts as the middleman between you and the Internet.
• Most ISPs offer broadband Internet access via a cable, DSL, or fiber connection
called the Ethernet cable.
• When you connect to the Internet using a public Wi-Fi signal,
the Wi-Fi router is still connected to an ISP
that provides Internet access.
• Even cellular data towers must connect to an
Internet service provider to provide
connected devices with access to the Internet.
ONLINE SERVICES IN INTERNET
• Web – a collection of billions of webpages that you can view with a web
browser
• Email – the most common method of sending and receiving messages online
• Social media – websites and apps that allow people to share comments,
photos, and videos
• Online gaming – games that allow people to play with and against each
other over the Internet
• Software updates – operating system and application updates can
typically be downloaded from the Internet
EVOLUTION
• Early days of the Internet– most people connected to the Internet
using a home computer and a dial-up modem.
DSL and cable modems eventually provided users with
"always-on" connections.
• Now mobile devices, such as tablets and smartphones, make it
possible for people to be connected to the Internet at all times.
• The Internet of Things (IOT) has turned common appliances and
home systems into "smart" devices that can be monitored and controlled over
the Internet.
• As the Internet continues to grow and evolve, you can
expect it to become an even more integral part of daily
life.
ABOUT ‘WEB’
• World Wide Web (WWW) – founded by Sir Tim Berners-Lee, a British
computer scientist
• The leading information retrieval service of the Internet (the worldwide
computer network).
• Gives users access to a vast array of documents that are connected to each
other by means of hypertext or hypermedia links—i.e., hyperlinks,
electronic connections that link related pieces of information in order to
allow a user easy access to them.
.
• Hypertext allows the user to select a word or phrase from text and thereby
access other documents that contain additional information pertaining to that
word or phrase.
• Hypermedia documents feature links to images, sounds, animations, and
movies.
• The Web operates within the Internet‘s basic client-server format;
• Servers are computer programs that store and transmit documents to other
computers on the network when asked to, while clients are programs that
request documents from a server as the user asks for them.
• Browser software allows users to view the retrieved documents.
INTERNET GLOSSARY
1. Modem:
• The short form for Modulator-Demodulator
• Used to convert analog signals from a telephone or cable wire to digital signals so
that the computer can recognise them.
• Converts digital data from a computer or other device into an analog signal that
can be sent over standard telephone lines.
• Modern Modems are DSL or cable modems, which are considered ‗broadband‘
devices. They operate over telephone wires that use a wider frequency line.
• Now a days ‗Optical Fibre Cables‘ are used instead of ‗Coaxial Cables‘ for
efficient and high speed data transfer.
• Some modems have built-in routers that support Wi-Fi, which enables the
connection of more than one device at a time.
INTERNET GLOSSARY
2. Repeater
• A device that accepts, cleans and retransmits electronic signals at a
higher power level.
• Repeaters are required so that the signals can travel a longer distance
without degrading.
3. Hub
• Also called a Network Hub– a common connection point for devices in a network
• Commonly used to connect segments of a LAN
• Contains multiple ports.
• When a packet arrives at one port, it is copied to the other ports
so that all segments of the LAN can see all packets
INTERNET GLOSSARY
4. Switches
• Networking hardware that connects devices on a computer network by using packet
switching to receive and forward data to the destination device
• Like hubs, switches are used to receive and send data to ports.
• Used for a large number of devices– better performance than hubs
• Hubs share data with all ports, while switches send it to only the intended port.
5. Bridges
• Operates at the data link layer.
• Actually a repeater, with the add-on functionality of filtering content by reading the
MAC addresses of source and destination.
• Also used for interconnecting two LANs working on the same protocol.
• It has a single input and single output port, thus making it a 2-port device.
INTERNET GLOSSARY
6. Gateways

• A passage to connect two networks together that may work upon different
networking models.

• Basically work as the messenger agents that take data from one system, interpret it,
and transfer it to another system.

• Gateways are also called protocol converters and can operate at any network layer.

• Gateways are generally more complex than switch or router.


INTERNET GLOSSARY
7. Brouter

• Also known as bridging router

• A device that combines the features of both bridge and router.

• It can work either at data link layer or at network layer.

• Working as a router, it is capable of routing packets across networks and


working as a bridge, it is capable of filtering local area network traffic.
INTERNET GLOSSARY
8. Network Protocols: The set of rules for governing exchange of information on
the internet. Some common rules are:

 TCP/IP: Transmission Control Protocol/Internet Protocol (TCP/IP) is a set of


layered protocols used for communication over the Internet.

 FTP: File Transfer Protocol (FTP) is a set of rules that ensure safe and secure
transfer of files.

 PPP: Point to Point Protocol (PPP) is a data link layer protocol that enables
transmission of TCP/IP traffic over serial connection, like a telephone line.
9. NETWORK PROTOCOLS

 HTTP: Hyper Text Transfer Protocol (HTTP) is the protocol that governs
webpages on the internet.

 SSL: Secure Sockets Layer (SSL) is used for sending private documents via the
internet.

 TFTP: Trivial File Transfer Protocol (TFTP) is used for transferring files
between network devices

 SMTP: Simple Mail Transfer Protocol (SMTP) is used for sending mails.

 TELNET: It is used for connecting to remote host.


INTERNET GLOSSARY
9. HTML
• It stands for Hyper Text Mark-up Language (HTML)
• The most widely used language on the Web.
• It is used to develop webpages.
10. SGML
• It stands for Standardised General Markup Language (SGML)
• It is a meta language used for structuring documents.
11. URL
• It stands for Uniform Resource Locator (URL)
• It is the address of a webpage.
.
[Link] Engine
• A service that enables the users to search for information in the World Wide Web
(WWW).
• A user enters keywords or key phrases into a search engine and receives a list of
Web content results in the form of Webpages, images, videos etc.
• The list of content the user gets is known as Search Engine Result Page.
• Search engines utilize automated software applications (referred to as robots,
bots, or spiders) that travel along the Web, following links from page to page, site
to site.
• The information gathered is used to create a searchable index of the Web.
• Popular search engines are Google, Yahoo, MSN.
.
[Link] Browser
• A software that is used to access the internet.
• Browsers are used primarily for displaying and accessing websites on
the internet, as well as other content created using language like
Hypertext Markup Language (HTML).
• A user can type in the URL of the website they want to visit in a
browser to go to that page.
• Users can also enter keywords/ phrases into a browser.
• Some common browsers that are available are
Google Chrome, Microsoft Edge, Apple Safari,
Mozilla Firefox.
.
14. Bandwidth
• The amount of data that can be transferred from one point to another within a network
in a specific amount of time.

• Typically, bandwidth is expressed as a bitrate and measured in bits per second (bps).

• The term bandwidth refers to the transmission capacity of a connection


• An important factor when determining the quality and speed of a network or the
internet connection.
• It measures how much data can be sent over a specific connection in a given amount
of time.
• For example, a gigabit Ethernet connection has a bandwidth of 1,000 Mbps (125
megabytes per second). An Internet connection via cable modem may provide 25
Mbps of bandwidth
15. Blog
• Shortening of ―weblog‖– an online journal or informational website displaying
information in the reverse chronological order, with the latest posts appearing first.

• A platform where a writer or even a group of writers share their views on an


individual subject.

• The content of a blog can vary from cooking recipes to making a bomb.

16. Hash tags

• Hash tags are used in social media to mark a keyword in a post. There are millions of
posts and status updates online; with the use of hash-tags searching them will be easy.
For example, if you want to see updates about a recent movie you can search it as
# <the movie name>.
.
17. Hyperlink

• A word, phrase, or image that you can click on to


jump to a new document or a new section within the current document.

• Hyperlinks are found in nearly all Web pages, allowing users to click their way
from page to page.

• Text hyperlinks are often blue and underlined, but don't have to be.

• When you move the cursor over a hyperlink, whether it is text or an image, the
arrow should change to a small hand pointing at the link.

• When you click it, a new page or place in the current page will open.
.
18. Instant Messaging

• A real-time, text-based communication similar to chat.

• IM uses a shared software client between or among two or more people using personal
computers, smartphones or other devices.

• The communication is done over a network, often the Internet, and may include
advanced modes with live voice or video.

• File transfers are also sometimes allowed but are limited in size.

• Examples: WhatsApp, Messenger, Hike, Telegram, Google Hangouts


.
19. IP Address

• A unique address that identifies a device on the Internet or a local network.

• It allows a system to be recognized by other systems connected via the Internet protocol.

• It‘s similar to our house address which is used by the postman to identify our house;
similarly, the internet uses IP address to identify a system.

• An example for IP address is [Link].


.
20. Netiquette

• Represents the importance of proper manners and behaviour online.

• The set of professional and social etiquettes practiced and advocated in electronic
communication over any computer network.

• Common guidelines include being courteous and precise, and avoiding cyber-bullying.

• Netiquette also dictates that users should obey copyright laws and avoid overusing emoticons.
21. Phishing
• Phishing is a cybercrime in which a target or targets are contacted by email, telephone or text
message
• Done by someone pretending as a legitimate institution to lure individuals into providing
sensitive data such as personally identifiable information, banking and credit card details, and
passwords.
• Example: Spam mails that claim that you have won a lottery worth 10 million
COMMONLY USED DOMAINS
 .com: Commercial content or business

 .edu: educational content

 .org: Organisation

 .net: Network

 .gov: Governmental
END OF PART-1
INTRANET
• A private network that can only be accessed by authorized users.
• The prefix "intra" means "internal" and therefore implies an
intranet is designed for internal communications.
• "Inter" (as in Internet) means "between" or "among‖.
• Some intranets are limited to a specific local area network (LAN), while others
can be accessed from remote locations over the Internet.
• Local intranets are generally the most secure since they can only be accessed
from within the network.
• In order to access an intranet over a wide area network (WAN), you typically
need to enter login credentials.
BENEFITS OF THE INTRANET
• It helps in getting the message across the staff members in the organization.

• Productivity: Information can be accessed anywhere and at any time– Workers can view the information faster, and use it as
per their needs.

• Time-saving: It helps people in the organization get information based on their needs– only the required amount of
information is being given to the employees and it takes very less time to process it. The employees may link this
information to a relevant one based on their convenience.

• Reduces cost: Anytime the information is needed, employees can access using their desktop or the smartphone– helps the
company in saving the extra space which is required in the form of the physical documents being stored in the organization.

• Various information like internal phone numbers, procedure materials– required on a daily basis. When this information is
available on hand, it can essentially save time as well as money. The organization is freed from costs like printing,
maintenance, and so on.

• Communication: It can save time by making the communications quick– works as a powerful tool for an organization
horizontally as well as vertically. It can initiate the strategic communications within the company and as it is secure,
companies can rely on it. Every member of the team can be up to date with just a single click.
BASIS FOR COMPARISON INTERNET INTRANET

Meaning Connects different networks of It is a part of the Internet which is


computers together privately owned by a particular firm

Accessibility Anyone can access the Internet Accessible only by the organization
members, having login details.

Safety Is not as safe as the Intranet Safe

No of Users Unlimited Limited

Visitors Traffic More Less

Network Type Public Private

Information Provided Unlimited, and can be viewed by Limited, and circulates among the
everyone members of an organization
EXTRANET
• A controlled private network allowing customers, partners, vendors, suppliers and other businesses to gain information,
typically about a specific company or educational institution

• Done without granting access to the organization's entire network. An extranet is often a private part of a website. It is
restricted to select users through user IDs, passwords and other authentication mechanisms on a login page.

• An extranet may be viewed as an intranet mapped onto the public Internet or onto some other private network.
Advantages:

 The ability to exchange large volumes of data using electronic data interchange

 Sharing product data or catalogues with business partners

 Joint company collaboration and training

 Sharing services such as online banking applications among affiliated banks

• Disadvantages: Expensive implementation and maintenance if hosted internally and the potential for compromised
sensitive or proprietary information. Alternately, it may be hosted by an application service provider.
E-MAIL
• Short for "electronic mail,―– one of the most widely used features of the Internet, along with the web–
allows you to send and receive messages– to and from anyone with an email address, anywhere in the
world.

• Uses multiple protocols within the TCP/IP suite. For example, SMTP is used to send messages, while the
POP or IMAP protocols are used to retrieve messages from a mail server.

• When you configure an email account, you must define your email address, password, and the mail
servers used to send and receive messages.

• Fortunately, most webmail services configure your account automatically, so you only need to enter your
email address and password.

• However, if you use an email client like Microsoft Outlook or Apple Mail, you may need to manually
configure each account.

• Besides the email address and password, you may also have to enter the incoming and outgoing mail
servers and enter the correct port numbers for each one.
COMPONENTS OF AN E-MAIL MESSAGE
1. HEADERS: Contain information concerning the sender and recipients– the exact content of mail headers can vary
depending on the email system that generated the message.

Generally, headers contain the following information:

 Subject: A description of the topic of the message– displayed in most email systems that list email messages individually.

 Sender (From): Sender's Internet email address. It is usually presumed to be the same as the Reply-to address, unless a
different one is provided.

 Date and time received (On): The date and time the message was received.

 Reply-to: This is the Internet email address that will become the recipient of your reply if you click the Reply button.

 Recipient (To:): First/last name of email recipient, as configured by the sender.

 Recipient email address: The Internet mail address of the recipient, or where the message is actually sent.

• Attachments: Files that are attached to the message


2. BODY

• The body of a message contains text that is the actual content

• The message body also may include signatures or automatically generated text that is
inserted by the sender's email system.

• CC: CC stands for ―carbon copy,‖

 Using the CC field in an email– the CC list is visible

to all other recipients.

 Example: If you CC ‗bob@[Link]‘ and ‗jake@[Link]‘ on an email, Bob


and Jake will both know that the other received the email, as well.
2. BODY

• BCC: BCC stands for ―blind carbon copy.‖

• Unlike with CC, no one but the sender can see the list of BCC recipients.

• Example: If you have ‗bob@[Link]‘ and ‗jake@[Link]‘ in the


BCC list, neither Bob nor Jake will know that the other received the email.
ADVANTAGES OF E-MAIL
 Emails are delivered extremely fast when compared to traditional post.

 Emails can be sent 24 hours a day, 365 days a year.

 Webmail means emails can be sent and received from any computer, anywhere in the
world, that has an internet connection.

 Cheap - when using broadband, each email sent is effectively free. Dial-up users are
charged at local call rates but it only takes a few seconds (for conventional email, e.g.
text only) to send an email.

 Emails can be sent to one person or several people.


DISADVANTAGES OF E-MAIL
 The recipient needs access to the internet to receive email.

 Viruses are easily spread via email attachments (most email providers scan emails for
viruses on your behalf).

 Phishing - sending an email to a user falsely claiming to be a legitimate company to


scam the user into providing information, such as personal information and bank
account numbers, on a bogus website. The details will then be used for identity theft.

 No guarantee the mail will be read until the user logs on and checks their email.

 Spam - unsolicited email, i.e. junk mail.


AUDIO AND VIDEO CONFERENCING
• Audio conferencing: Conduct of an audio conference (also
called a conference call or audio teleconference) between two
or more people in different locations using a series of devices
that allow sounds to be sent and received, for the purpose of
communication and collaboration simultaneously.

• Involve two or more parties at the same time– can be conducted


either through telephone line or the Internet by using devices
such as phones or computers. If one only wants to listen, he/she
just need speakers. If he/she decides to speak as well, he/she
may need a microphone as well.
AUDIO AND VIDEO CONFERENCING
• Video conferencing: Conducting a video conference or video
teleconference in which two or more sets of hardware and
software interact while simultaneously transmitting and
receiving video and audio signals from two or more
geographic locations.
• Also involve sharing documents, various presentation materials,
whiteboards, flip charts and similar group presentation visual aids.
• A telepresence system is most often used at the corporate or
enterprise level and represents high-end
video conferencing systems.
• Video conferencing is differentiated from video
phone calls, which serve individuals as opposed to
a conference
SYNCHRONOUS & ASYNCHRONOUS
COMMUNICATION
Synchronous Communication Asynchronous Communication
• Two-way communications in which
• One-way communications that can be
participants can converse with each
received by an audience at their
other in real-time.
convenience.
• Synchronous communication
• It can be viewed at any time, from any
happens live with no delay.
location, and it can be searched and
• Examples: Virtual meetings over watched again later
Zoom and other telecommunications
• Examples: Email, Text Messages,
platforms, live online classes via
Recorded Meetings, Live-Streaming
video conferencing, chats, threaded
discussions, VOIP and video calls
ROLE OF ICT IN HIGHER EDUCATION
• Technology as a driving force– ICT can be used as an effective tool in higher education– Videos,
slides, audio, graphics etc. used to capture attention and interest of the learners– they can even be
posted online to make learning more widely available– student-centred
• Removing the geographical barrier in teaching and learning

• A three-dimensional model for teaching– Demonstrations that are too big or dangerous for class
room teaching can be projected– can also be used for enrolling students online– will save time,
labour and money.

• Plays a significant role in research work as well. It can be used for collecting,
processing, storing, and interpreting data.

• Access e-books, e-libraries and other resources online. Making use of


these facilities promotes self-learning
ADVANTAGES:
• Individualising of learning: People learn individually and not in a homogenous
group
• Interactivity: Learners can relate to the content more effectively, go forward
and backward in the content, and start at any point– no need to be sequential
• Distance and climate insensitive: Can take place outside of the conventional
educational system of schools and colleges. Teaching can be individualised and
geo-climatic conditions can be overcome as a result of ICT.
• Uniform quality: Same quality can be delivered to the rich and the poor, the
urban and the rural equally, and at the same low cost– a great equaliser.
LIMITATIONS:
i) High infrastructure and start-up cost

ii) Little attention towards individual differences in order to achieve economies of


scale: do not take into account individual differences among students. It may create a
digital divide within the class

iii) Accessibility issue

iv) ICT is basically a delivery system: ICTs are essentially meant only to deliver
content; they are not expected to measure attitudinal or behaviour changes

v) Difficulty in performance evaluation

vi) Continuous training requirement for teachers


DIGITAL INITIATIVES IN HIGHER
EDUCATION
• SWAYAM & SWAYAMPRABHA
• NATIONAL DIGITAL LIBRARY (NDL)
 NATIONAL ACADEMIC DEPOSITORY (NAD): An initiative of MHRD to
facilitate digital issuance, storage, access and verification of Academic Awards issued by
Academic Institutions
 e-ShodhSindhu
 Virtual Labs: Over 205 virtual labs in 9 Engineering & Science disciplines
 E-Yantra
 e-Vidwan: to create information exchanges and networking opportunities among scientists
 Central cloud Infrastructure: A project under IIT Delhi– a robust 24X7 backed Data
Centre– The cloud is called ‗Baadal‘
ICT AND GOVERNANCE
• Emergence of the demand for better services on the part of government
departments
• E-governance: A paradigm shift over the traditional approaches in Public
Administration– rendering of government services and information to the public
using electronic means
• Ushered transparency in the governing process– saving time due to provision of
services through a single window– simplification of procedures– better office and
record management– reduction in corruption;
• Improved attitude, behaviour and job handling capacity of the dealing personnel.
E-GOVERNANCE INITIATIVES
 Aadhar, Digital Locker and  Mobile Seva
E-Signature
 MyGov
 BharatNet
 National Digital Literacy Mission
 Common Service Centre
 National e-Governance Action Plan
 [Link]
 Online Passport application
 Digital India
 Online voter registration
 E-courts
 PayGov
 E-Districts
 Saaransh
 E-Sampark
 BHIM UPI
 E-taal

 Jan Dhan Yojana


COMMONLY ASKED ABBREVIATIONS
IN I.C.T
.
• BIOS – The Basic Input and Output System that controls the [Link] tells us about the
operations to be performed on the System. The Instructions are embedded on a chip
connected to the Motherboard.

• PDF – When the File is to be stored in the Portable Document Format, the term PDF is used

• VGA – The System that is used for displaying the graphics is known as Video Graphics
Array or VGA. It was developed by IBM.

• MAC - The common abbreviation used for a type of personal computer, Macintosh made by
the Apple Computer Company

• OS – OS is the Operating System of the Computer. It is the main program that runs on the
Computer and begins automatically when the Computer is turned on.
LIST OF ABBREVIATIONS

• .
ABBREVIATION FULL-FORM
HDD Hard Disk Drive
UNIVAC Universal Automatic Computer
GUI Graphic User Interface
USB Universal Serial Bus
VGA Video Graphic Array
ASCII American Standard Code for
Information Interchange
DVD Digital Versatile Disc
URL Universal Resource Locator
FORTRAN Formula Translator
SIM Subscriber Identification Module
ABBREVIATION FULL-FORM
HDMI High Definition Multimedia
Interface
VPN Virtual Private Network
PHP Hypertext Pre-processor
SQL Structured Query Language
CMD Command
BASIC Beginner All-purpose Symbolic
Instruction Code
HTTP Hypertext Transfer Protocol
Wi-Fi Wireless Fidelity
ATM Automated Teller Machine
VIRUS Vital Information Resources Under Siege

UPS Uninterrupted Power Supply


TIME TO YELL OUT SOME
ANSWERS
QUESTION 1:

Which of the following software allows users to surf the Internet?

1. Search engine

2. Internet service provider

3. Multimedia

4. Browser

Answer: 4
QUESTION 2: [JUNE 2019]

• SMTP is an acronym for _______


1. Simple Mail Transport Protocol
2. Simple Mail Terminal Protocol
3. Simple Mail Transfer Protocol
4. Simple Mail Transition Protocol

Answer: 3
QUESTION 3: [DEC 2019]
• A small text file stored on user‘s computer by some websites in order to
recognize and keep track of user‘s preferences is called:
1. Cookie
2. Report
3. Log
4. History

Answer: 1
QUESTION 4: [JULY 2018]
1. Given the following email fields, which of the email addresses will ‗Swami‘ be able
to see when he receives the message? Mail-
To… ram@[Link]
Cc… raj@test. com; ravi@[Link]
Bcc… swami@test. com; rama@test. com
Codes:
1. ram@test. com
2. ram@test. com; raj@test. com; ravi@test. com
3. ram@test. com; rama@test. com
4. ram@test. com; rama@test. com; raj@test. com; ravi@test. Com

Answer: 2
QUESTION 4: [JULY 2018]
• In the context of e-mail, what is ‗spam‘?
1. The act of overloading an e-mail server by using denial-of-service attacks
2. E-mail messages that are infected with viruses
3. A large quantity of messages that do not reach the recipient
4. Unsolicited advertising sent to a large number of recipients

Answer: 4
QUESTION 5: [NOV. 2017]
• What is the full form of USB as used in computer related activities?
1. Universal Security Block
2. Universal Serial Bus
3. United Serial Bus
4. Ultra Security Block

Answer: 2
QUESTION 6: [DEC. 2019]
1. Which of the following communication technologies employ only asynchronous
communication?
• 1. Video conferencing
• 2. Email
• 3. Forums
• 4. Instant messaging
• Choose the correct option:
• 1. (a) and (c) only
• 2. (b) and (d) only
• 3.(b) and (c) only
• 4. (a) and (d) only
• Answer: 3

END OF UNIT-8

You might also like