Unit 8 - Information and Communication Technology
Unit 8 - Information and Communication Technology
UNIT - 8
NET/JRF/SLET/SET/PhD Entrance
Computer: A computer is a truly amazing machine that performs a specified sequence of operations as per
the set of instructions (known as programs) given on a set of data (input) to generate desired information
(output).
Hardware: Hardware represents the physical and tangible components of the computer.
Software: Software is a set of electronic instructions consisting of complex codes (Programs) that make
the computer perform tasks.
User: The computer operators are known as users.
Data: Consists of raw facts, which the computer stores and reads in the form of numbers.
Functionalities of a computer
Speed Flexibility
Accuracy Low cost
Storage and Retrieval
Reliability Repeated Processing Capabilities
Applications of Computer
1. CPU and
2. Peripheral (Input & Output Devices)
1. CPU (Central Processing Unit): CPU is considered as the brain of the computer. It performs all types
of data processing operations, stores data, intermediate results and instructions (program).It controls
the operation of all parts of computer.
✓ ALU (Arithmetic Logic Unit): When the control unit encounters an instruction that involves
mathematical calculation or decision/logic, it passes the control to the second component, i.e., the
arithmetic logic unit (ALU). The ALU includes a group of registers - memory locations built directly
into the CPU - that are used to hold data that are being processed by the current instruction.
✓ Registers: The register is the smallest high-speed storage area in the CPU. All data must be
represented in a register before it can be processed.
✓ Control Unit: This unit controls the operations of all parts of computer but does not carry out any
actual data processing operations
1. Random Access Memory (RAM): RAM is the internal memory of the CPU for storing data,
program and program result. It is read/write memory which stores data until the machine is
working. As soon as the machine is switched off, data is erased.
RAM is volatile, i.e. data stored in it is lost when we switch off the computer or if there is a power
failure. Hence a backup uninterruptible power system (UPS) is often used with computers. RAM is
small, both in terms of its physical size and in the amount of data it can hold.
I. Dynamic Random Access Memory (DRAM): A type of physical memory used in most personal
computers. The term dynamic indicates that the memory must be constantly refreshed2 (reenergized)
or it loses its contents. This type of memory is more economical.
II. Static Random Access Memory (SRAM): A type of memory that is faster and less volatile than
DRAM, but requires more power and is more expensive. The term static is derived from the fact
that it does not need to be refreshed like DRAM.
III. Synchronous Dynamic Random Access Memory (SDRAM): A type of DRAM that can run at
much higher clock speeds.
2. Read Only Memory (ROM): The memory from which we can only read but can not write on it .
This type of memory is non-volatile. The information is stored permanently in such memories
during manufacture. A ROM, stores such instructions that are required to start a computer. This
operation is referred to as bootstrap.
There are mainly three types of ROM available:
a. MROM (Masked ROM): The very first ROMs were hard-wired devices that contained a pre-
programmed set of data or instructions. These kinds of ROMs are known as masked ROMs which
are inexpensive.
b. EPROM (Erasable and Programmable Read Only Memory): The EPROM can be erased by
exposing it to ultra-violet light for a duration of up to 40 minutes. Usually, an EPROM eraser
achieves this function.
c. EEPROM (Electrically Erasable and Programmable Read Only Memory): The EEPROM is
programmed and erased electrically. It can be erased and reprogrammed about ten thousand times.
Both erasing and programming take about 4 to 10 ms (milli second).
Memory
A memory is just like a human brain. It is used to store data and instructions. Computer memory is the
storage space in computer where data is to be processed and instructions required for processing are
stored. The memory is divided into large number of small parts called cells. Each location or cell has a
unique address which varies from zero to memory size minus one.
Primary Memory/Main Memory: Primary memory holds only those data and instructions on
which computer is currently working. It has limited capacity and data is lost when power is
switched off.
Secondary Memory: This type of memory is also known as external memory or non-volatile. It is
slower than main memory. These are used for storing data/Information permanently.
A. Secondary Storage (External Storage Devices): Floppy diskettes, hard disk, tapes and optical
disks come under the category of external storage devices or ancillary storage devices. These
devices are very sensitive to environmental conditions (humidity and temperature) as well as to
external magnetic fields and need to be stored carefully.
b. Hard Disk: It is a non-removable enclosed magnetic disk included in most PCs. It contains a
stack of metal platters, each coated with iron oxide, that spin on a spindle and the entire unit is
encased in a sealed chamber.
c. Magnetic Tape: This is plastic tape, usually made of Mylar that is coated with iron oxide,
thereby enabling the introduction (writing); retention (memory) and reading of magnetically
recorded information. The best use of tape storage is for data that you do not use very often.
A. Input Devices (How to tell it what to do): This unit makes link between user and
computer. The input devices translate the information into the form understandable by
computer.
a. Keyboard- The most common and very popular input device which helps in inputting data to the
computer
b. Mouse- Mouse is the most popular pointing device and cursor-control device having a small palm
size box with a round ball at its base which senses the movement of mouse and sends
corresponding signals to CPU when the mouse buttons are pressed.
c. Joy Stick- To move cursor position on a monitor screen. It is mainly used in Computer Aided
Designing (CAD) and playing computer games.
d. Light pen- It is used to select a displayed menu item or draw pictures on the monitor screen.
e. Track Ball- Mostly used in notebook or laptop computer, instead of a mouse. This is a ball which is half
inserted and by moving fingers on ball, pointer can be moved
f. Scanner- A scanner allows you to scan printed material and convert it into a file format that may be
used within the PC.
g. Digitizer- It converts analog information into digital form.
h. Microphone-Microphone is an input device to input sound that is then stored in digital form.
i. Magnetic Ink Card Reader (MICR)-MICR input device is generally used in banks because of a
large number of check to be processed every day.
j. Optical Character Reader (OCR)- OCR scans text optically character by character, converts them
into a machine readable code and stores the text on the system memory.
k.Bar Code Reader- A device used for reading bar coded data (data in form of light and dark lines).
Bar coded data is generally used in labeling goods, numbering the books.
l. Optical Mark Reader(OMR)- A special type of optical scanner used to recognize the type of mark
made by pen or pencil.
B. Output Devices: (How it shows you what it is doing) Output devices translate the computer's output
into the form understandable by users.
Monitors: Monitors, commonly called as Visual Display Unit (VDU), are the main output device of a
computer. It forms images from tiny dots, called pixels that are arranged in a rectangular form. The
Note:
✓ Data: Data can be defined as a representation of facts, concepts or instructions in a formalized manner
which should be suitable for communication, interpretation, or processing by human or electronic
machine.
✓ Information: Information is organized or classified data which has some meaningful values for
the receiver. Information is the processed data on which decisions and actions are based.
✓ Data Processing Cycle: Data processing is the re-structuring or re-ordering of data by people or machine
to increase their usefulness and add values for particular purpose. Data processing consists of basic steps
input, processing and output.
These three steps constitute the data processing cycle.
✓ Input -Input data is prepared in some convenient form for processing. The form will depend on the
processing machine. For example, when electronic computers are used, the input data could be
recorded on any one of several types of input medium, such as magnetic disks, tapes and so on.
✓ Processing - In this step input data is changed to produce data in a more useful form. For example,
paychecks may be calculated from the time cards, or a summary of sales for the month may be
calculated from the sales orders.
✓ Output - The result of the proceeding processing step are collected. The particular form of the output
data depends on the use of the data. For example, output data may be pay-checks for employees.
Language Processors:
Assembler: This language processor converts the program written in assembly language into machine
language.
Interpreter: This language processor converts an HLL (High Level Language) program into
machine language by converting and executing it line by line.
Compiler: It also converts the HLL program into machine language, but the conversion manner is
different. It converts the entire HLL program in one go, and reports all the errors of the program along
with the line numbers.
Classification of Computers:
Software
Software: software represents the set of programs that govern the operation of a computer system and make
the hardware run. There are two types of software
System Software: The system software is collection of programs designed to operate, control, and extend
the processing capabilities of the computer itself. System software are generally prepared by computer
manufactures. System software serves as the interface between hardware and the end users. Examples:
Operating System, Compilers, Interpreter, Assembler etc.
A. Packages:
Packages
Word Processing A package that process textual matter and creates
organized and flawless documents.
Spreadsheets An electronic spreadsheet is a program that
accepts data in a tabular form and allow users to
manipulate , calculate, analyze data in the desired
manner.
Database Management Systems DBMS is a package that can handle and manage
bulk of stored data.
Desktop Publishing Software Handles page layout by combining the functions of
a traditional typesetter and a layout artist.
Graphics, Multimedia and Presentation Application software that manipulates images is
applications known as Graphics software.
B. Utilities: Utilities are those application programs that assist the computer by performing
housekeeping functions like backing up disk or scanning viruses etc.
Utilities
Text Editor Program is used for creating, editing text files.
Backup Utility Program facilities the backing-up of disk.
Compression Utility Large files can be compressed so that it takes less
storage area.
Disk Defragmentor It speeds up disk access by rearranging the files
and free space on your computer.
Antivirus Software It scans yours disk for viruses and removes them if
any virus is found.
C. Customized Software: This type of software is tailor-made software according to a user’s requirement.
Number System
When we type some letters or words, the computer translates them in numbers as computers can understand
only numbers. A computer can understand positional number system where there are only a few symbols called
digits and these symbols represent different values depending on the position they occupy in the number.
A value of each digit in a number can be determined using
✓ The digit
✓ The position of the digit in the number
✓ The base of the number system (where base is defined as the total number of digits available in the
number system).
1. Decimal Number System: The number system that we use in our day-to-day life is the decimal
number system. Decimal number system has base 10 as it uses 10 digits from 0 to 9. In decimal
Number Conversion
There are many methods or techniques which can be used to convert numbers from one base to another.
We'll demonstrate here the following
✓ Binary to Decimal
Step 1 - Divide the decimal number to be converted by the value of the new base.
Step 2 - Get the remainder from Step 1 as the rightmost digit (least significant digit) of new base number.
Step 3 - Divide the quotient of the previous divide by the new base.
Step 4 - Record the remainder from Step 3 as the next digit (to the left) of the new base number.
Repeat Steps 3 and 4, getting remainders from right to left, until the quotient becomes zero in Step 3. The last
remainder thus obtained will be the most significant digit (MSD) of the new base number.
Example
Decimal Number: (29)10
Calculating Binary Equivalent:
Step 2 14 / 2 7 0
Step 3 7/2 3 1
Step 4 3/2 1 1
Step 5 1/2 0 1
As mentioned in Steps 2 and 4, the remainders have to be arranged in the reverse order so that the first
remainder becomes the least significant digit (LSD) and the last remainder becomes the most significant digit
(MSD).
Steps
Step 1 - Determine the column (positional) value of each digit (this depends on the position of the digit and
the base of the number system).
Step 2 - Multiply the obtained column values (in Step 1) by the digits in the corresponding columns.
Step 3 - Sum the products calculated in Step 2. The total is the equivalent value in decimal.
Example
Binary Number: (11101)2
Calculating Decimal Equivalent:
Networking
The basics of internet, intranet, email or audio and video conferencing can be better understood if we
understand first the computer network. A computer network is the backbone internet and related
activities.
Networking
A network is simply an interconnection of one or more computers for the purpose of sharing
information and resources (printers, storage devices, and application).
Computer Networks means interconnected set of autonomous system that permit distributed
processing to information.
Five components:
1. Sender Computer
2. Sender equipment (Modem)
3. Communication Channel (Telephone Cables or wireless device)
Metropolitan Area Network (MAN): MAN is defined for less than 50 Km and provides regional
connectivity within a campus or small geographical area.
Wide Area Network (WAN): A wide Area Network (WAN) is a group Communication
Technology provides no limit of distance.
Types of Network
1. Point to Point Network: When a packet is sent from one router to another intermediate
routers, the entire packet is stored at each intermediate router, stored there till the output line
is free and then forwarded. A subnet using this principle is called point to point or packet
switched network.
a) Star: Each device has a dedicated point to point link only to a central controller, usually called a
hub.
b) Tree: A tree topology is a variation of a star.
c) Ring: Each device has a dedicated point to point line configuration only with the two devices on
either side of it.
d) Bus: One long cable act as a backbone to link all the devices in the network.
Intranet
An intranet can be an excellent method for sharing organizational information and creating
internal communication channels. An intranet is an ideal way to communicate in a secure
environment
Intranet is:
Advantages of an Intranet:
Internet
The Internet is a global system of interconnected computer networks that use the
standard Internet protocol suite (TCP/IP) to link several billion devices worldwide. It
also known as “network of networks” that consists of millions of private, public,
academic, business, and government networks.
Various applications of internet are:
The World Wide Web commonly known as the Web or www developed by Tim Berners –
Lee in 1989, is a system of interlinked hypertext documents that are accessed via the Internet.
These multimedia pages are ever changing.
Ex. WorldWideWeb (First Web Browser), Netscape, Internet Explorer, Opera, Mozilla
Firefox, Safari (Apple), Google Chrome, UC Browser etc.
Menu bar: The menu bar, located at the very top of the screen, can be accessed using the
mouse. Actions that are in black can be performed, while actions that cannot be performed will
be in gray or lightened.
Tool bar: The tool bar is located at the top of the browser; it contains navigational
buttons for the Web. Basic functions of these buttons include:
Command Function
Home Opens or returns to starting page
Back Takes you to the previous page
Forward Takes you to the next page
Print Prints current page
Stop Stops loading a page
Reload Refresh/redisplays current page
Search Accesses search engine
• Location bar: The location bar, below the tool bar, is a box labelled "Location,"
"GoTo," or "Address." You can type in a site's address and press the Return or Enter
key to open the site.
• Status bar: The status bar is located at the very bottom of the browser window. You
can watch the progress of a web page download to determine if the host computer has
been contacted and text and images are being downloaded.
• Scroll bar: The scroll bar is the vertical bar located on the right of the browser window.
You can scroll up and down a web page by placing the cursor on the slider control and
holding down the mouse button.
• A website is a set of related web pages served from a single web domain.
• Uniform Resource Locator abbreviated as URL is the Address for web sites. Most of
them begin with http (Hyper Text Transfer Protocol), followed by a colon and two
slashes. In most web browsers, the URL of a web page is displayed on top inside an
address bar. An example of a typical URL would be "http://www.scholarify.in".
• A Hyperlink is a reference to data that the reader can directly follow either by clicking
or by hovering or that is followed automatically.
• Downloading means to receive data to a local system from a remote system, or to
initiate such a data transfer.
• Uploading refers to the sending of data from a local system to a remote system such as
a server or another client with the intent that the remote system should store a copy of
Report any error at [email protected] 12 | P a g e
the data being transferred.
Electronic Mail (e-mail) was invented by "John Von Neumann". Electronic Mail transfers the
data from one system to another system in the form of messages (test), pictures (images),
multimedia messages.
An e-mail address normally consists of Three parts.
1. Name of the User
2. "@" Sign
3. It comes after @ sign and it is the name of the DNS.
In the e-mail window, you can find "folder Pane" at the left side of the window. It has
set of folders named as Composed mail, Inbox, Out Box, Sent Items, Drafts, Trash,
Spam etc.,
• Inbox: used to store incoming mail.
• Sent Items: used to store mail that has already been sent.
When you start to compose an e-mail, the following activities have to done:
• To: To type the e-mail address of the person to whom you want to send a mail in this box.
• Subject: To type a few words about the subject of the letter you want to write.
• CC (Carbon Copy): To type the e-mail address of the other recipients in this box, each
address is separated by a comma (,). When you complete the mail and click the "Send"
button, then the mail will automatically be sent to all the recipients. Here, all the recipients
will know who the other recipients are.
• Reply: You can send your reply using the same window. The subject box will have the same
subject, but with the words "Re:" before it.
• Forward: You can send the forward message using the same window. The subject box will
have the same subject, but with the words "Fwd:" before it.
• An email attachment is a computer file sent along with an email message. One or more
files can be attached to any email message and be sent along with it to the recipient. The first
email was sent by Ray Tomlinson to himself in 1971.
• The Drafts folder retains copies of messages that you have started but are not yet ready to
send.
Hotmail, a free e-mail service provided by Microsoft which was established in 1995 was
co - founded by an Indian American entrepreneur Sabeer Bhatia along with Jack Smith
in July of 1996.
Top-level domain: Each part of a domain name contains certain information. The first field is
the host name, identifying a single computer or organization. The last field is the top-level
domain, describing the type of organization and occasionally country of origin associated with
the address. For e.g. - .com – Commercial, .edu – Educational.
Protocols:
✓ Transmission Control Protocol (TCP)
✓ User Datagram Protocol (UDP)
✓ Internet Protocol (IP)
✓ Post Office Protocol (POP3)
✓ Hyper Text Transfer Protocol (HTTP)
✓ File Transfer Protocol (FTP)
✓ Internet Control Message Protocol (ICMP)
✓ Internet Message Access Protocol (IMAP)
Report any error at [email protected] 14 | P a g e
Audio conferencing is where two or more people in different locations use technology like a
conference bridge to hold an audio call. Audio conferencing is different from a traditional phone in
in that all participants dial into a central system that connects them instead of directly dialing each
other. Audio conferencing aims at achieving communications and collaboration simultaneously.
Many audio-conferencing products may also come with online collaboration elements standard or
optional, like screen-sharing capabilities, to further enhance the value of audio meetings.
Video conferencing is a technology-enabled type of meeting where two or more people, in different
geographic locations, conduct live visual conferences through the internet for the purpose of
communicating and collaborating. Video conferencing software (or hardware) enables transmission
of high-quality audio, static images—sometimes full-motion video images—and text-based
messages between multiple locations. As long as they have a webcam (an embedded camera), a
desktop, laptop or mobile phone device can be used for video conferencing.
Web Conferencing
Web Conferencing is an online service by which you can hold live meetings, conferencing,
presentations and trainings via the internet (particularly on TCP/IP connections). Users can connect
to the conference either by telephone or using the computer’s speakers and microphone through a
VoIP connection.
Web conferencing usually allows real time point-to-point communication as well as multitask
communications from one sender to many receivers in separate locations. Depending on the service,
either an application (additional software) is downloaded and installed or a web-based application is
launched in the attendee’s browser.
Web conferencing software or website makes collaboration easier, with the following common
features:
Whiteboard: which allows you or your attendees to draw or annotate a shared screen.
Screen sharing, so you can share with other conference attendees something on your local
workstation.
Online meetings, which are basically scheduled conferences that include the ability for you to send
out invitations and block off time on the requested attendees’ calendars.
Mobile access or apps, so that people can participate even when on the go.
Real-time chat, which allows people to text type during the conference. This is useful for sharing
links during discussions and making notes.
• Skype
• Zoom
• GoToMeeting
• Workplace by Facebook
• CISCO WebEx
• Hangout Meets
• ZOHO
E-Commerce
E - Commerce (Electronic Commerce): E-Commerce is the buying and selling of goods and ser-
vices on the internet. The visitor to the site can sell or buy any product or service online. The
transactions are enabling through credit cards, Debit cards etc.
E-Business (Electronic Business): E-Business is the administration of conducting business via the
Internet. This would include the buying and selling of goods and services, along with providing
technical or customer support through the Internet. E-Business is used in conjunction with E-
Commerce but includes services in addition to the sale of goods.
E-Administration: The use of ICTs (Information and Communication technologies) to modernize the
state, the creation of data repositories for MIS (Management Information Systems), computerisation
of records.
E-Services: the emphasis here is to bring the state closer to the citizens. Examples include provision
of online services. E-Services and E-Administration together constitute what is generally termed e-
governance.
E-Governance: The use of IT to improve the ability of government to address the needs of society. It
includes the publishing of policy and programme related information to transact with citizens. It
extends beyond provision of on-line services and use of IT for strategic planning and reaching
development goals of the government.
Types of E-Commerce:
Business to Customer (B2C): The basic concept of this model is to sell the product online to the
customers. It provides direct selling through online. B2C is the indirect trade between the
company and consumers. Directly interact with the customers is the main difference with other
business model.
Business to Business (B2B): It is similar to manufacturer issuing goods to the retailer or wholesaler.
This model defines that Buyer and seller are two different entities. It consists of longest form of E-
Commerce. It is one of the cost-effective ways to sell out product throughout the world.
Customer to Customer (C2C): It helps the online dealing of goods or services among people. though
there are no major parties needed but the parties will not fulfill the transactions without the
program which is supplied by the online market dealer such as eBay.
Peer to Peer (P2P): It is a discipline that deal itself, which assists people to instantly shares related
computer files and computer sources without having to interact with central webserver.
M-Commerce: This model deals with conducting the transactions with the help of mobile. The
mobile consumers can interact each other and can lead the business. M-Commerce (Mobile Com-
merce) involves the change of ownership or rights to utilize goods and related services.
COMPUTER S E C U R I T Y
Security: Security controls access to data in files and permits only authorized use of terminals and
other equipment. Control is usually through various levels of passwords assigned on the basis of
need to know.
Security Tools:
Firewall: A firewall is a set of related programs, located at a network gateway server, that protects the
resources of a private network from users of other networks. Firewall can either be hardware devices
or software programs. They provide protection from Online intrusions. A firewall is designed to
pre- vent unauthorized Internet users from accessing your computer. All messages entering your
Computer from the Internet pass through the firewall which examines each message. The firewall
blocks any message that was not specifically requested by your system.
Encryption: It can be used to protect the message from unauthorized users. It can be done in
several ways by switching the characters around, replacing characters with others, and even
removing characters from the message.
Cryptographic Techniques: It can be used to defend data in transit between systems reducing the
probability that data exchanged between systems can be intercepted or modified. Secure
Intrusion - Detection - System: It can be scan a network for people that are on the network but who
should not be there or redoing things that they should not be doing. For example, trying a lot of
pass- words to gain access to the network.
Pinging: The Ping application can be used by potential crackers to find if an IP address is reachable. If
a cracker finds a computer, they can try a port scan to detect and attack services on that computer.
Anti-Virus Software: Anti-virus software consists of computer programs that attempt to identify,
thwart and eliminate computer viruses and other malicious software (Malware). The term
"Antivirus" is used because it is designed exclusively to combat computer viruses.
VIRUS (Vital Information Resource Under Siege): The full form is "Vital Information Resource
Under Siege". A computer virus is a computer program that spreads by inserting copies of itself into
other executable code or documents. Virus program that runs on your computer without your
knowledge and can cause damage to your files. A common way to receive a virus is through an
attachment via e-mail.
Worm: Worm is a self-replicating program. It replicates itself to new computers using the flaws and
then begins scanning and replicating again. The difference between a virus and worm is that a worm
does not create copies of itself on one system. It propagates through computer networks.
Trojan Horse : It is a program in which malicious or harmful code is contained inside apparently
harmless programming or data in such a way that it can get control and do its chosen form of dam-
age. Trojan Horses cannot replicate automatically. A Trojan horse can be used to setup a back door in a
computer system so that the intruder can return later and gain access.
Spyware: Spyware is a software that performs actions such as advertising, collecting personal data,
or changing the configuration of your computer, usually without obtaining your consent. Spyware
that displays advertisements and tracks your personal information is known as "Adware".
Spam: E-mail spam also known as "Junk e-mail" or "Unsolicited Bulk e-mail (UBE), is a subset of
spam that involves nearly identical messages sent to numerous recipients by e-mail.
Phishing: Phishing is a fraudulent activity of acquiring the sensitive information by the use of a fake
identity during electroniccommunication.
Key loggers : Key logger is a software program designed to record (log) every keystroke on the
machine on which it runs. Key logger is also known as "Key Stroke logger" or "System Monitor".
Packet Sniffer: A packet sniffer is an application that captures TCP/IP data packets, which can
maliciously be used to capture passwords and other data while it is in transit either within the
computer or over the network.
Root Kit: A root kit is a computer program that enable administrator - level access to a computer or
computer network. A cracker installs a root kit on a computer after first obtaining user-level access,
either by exploiting a known vulnerability or cracking a password. Once the root kit is installed, it allows
the hacker to mask intrusion and gain root or privileged access to the computer.
Cybercrime: It contains all criminal offences which are committed with the aid of communication
devices in a network.
example is:
Unauthorized access, malicious code, and denial-of-service attacks.
Theft of service and certain financial frauds.
Spamming and copyright crimes, particularly those facilitated through peer-to-peer networks.
Hacking, phishing, identify theft, child pornography, online gambling securities fraud.
Hacking: Hacking is the activity of programmatically gaining access to a computer application that is
otherwise in accessible. The act of gaining an unauthorised access to a computer is known as
"Hacking".
Hacker: A Hacker is someone involved in computer security specializing in the discovery of exploits
in systems orin obtaining or preventing unauthorized access to systems through skills, tactics and
detailedknowledge.
Polymorphic Virus: A polymorphic virus modifies its program code each time it attaches itself to
another program or file.
Animation: A simulation of movement created by displaying a series of pictures, or frames. For example,
cartoons on television.
ANSI: American National Standards Institute, a powerful industry association of USA, promoting
Antivirus: Program A utility that searches a hard disk for viruses and removes any, that is found.
Architecture: A design. It can refer to either hardware or software or to a combination of hardware and
software. The architecture of a system defines its broad outlines.
ASCII: American Standard Code for Information Inter change. This is a seven/eight bit code widely used in
computers for the transfer of data.
Bandwidth: The amount of data that can be transmitted in a fixed amount of time. It is usually expressed
in bits per second (bps) or bytes per second.
Bit: The smallest unit of information in computer system. Bit is short for binary digit; either a "1” or a "0".
Byte: A byte is made up of 8 bits. The amount of memory it takes to store a single character.
Cache: A separate area of Primary Memory (RAM) where the computer stores a copy of frequently used
information for quick access. This is meant to speed up the operation of the hard disk.
CD-ROM: Compact Disk-Read Only Memory. This is a permanent storage device used to store large
quantities of information that need not be changed.
CGA: Color Graphics Adapter. Low-resolution screen (640x200 pixels) with color capability.
Chip: A small piece of silicon containing thousands or millions of electrical elements. Also called an
Integrated Circuit (IC).
Compatible: The ability of one device or program to work with another device or program. For example,
a printer and a computer are said to be compatible if they can be connected to each other.
Conventional Memory: The first 640K of electronic Memory (RAM) in a computer used to run OS and
applications.
Debug: In computer related systems, fixing software related problem is known as debugging.
Digitize To scan a piece of artwork in very fine detail and store it in a form that computer understands.
DOS: It stands for Disk Operating System. It is a single user operating system.
Dynamic: Refers to actions that take place at the moment they are needed rather than in advance.
E-Mail: Electronic Mail. A facility to send electronic messages to another person on a computer network.
End-User: The end user is the individual who uses the product after it has been fully developed and
EPROM: Erasable Programmable Read Only Memory. A type of ROM that can be programmed or
reprogrammed usually by exposing a normally covered sector to UV-Light.
Extended Memory: Memory in addition to conventional memory used to run and manage
applications; together with expanded memory, it helps PCs to address increased amounts of data in
memory.
Fax/Facsimile: A way of transmitting copies of documents over telephone lines. Fax is short for
Facsimile.
Gigabyte: Abbreviated as GB, is equal to 1024 MB. GUI Graphical User Interface. A user interface that works
visually and is based on the selection of actions using a mouse or a similar pointing device to click on icons
or to pick options from menus; see also icon.
High Density: The amount of information a disk can hold. High Density disks hold more information than
Double Density disks.
Hypertext: A method of presenting information so the user can view it in a non-sequential way, regardless
of how the topics were originally arranged. It has now evolved as a flexible software technology to create
electronic books provides fast and flexible access to search criteria and provides quick access to information
in large documents.
HTML: Hyper Text Markup Language. A markup or structuring language used to describe Web and
Intranet documents. It is used to define structure, appearance and placement of HTML elements
including, fonts, graphics, text, hypertext links to other sites and many more details.
Icon: A graphical screen element that executes one or more commands when selected with a mouse or other
pointing device
IDE: Integrated Device Electronics, a standard used for connecting hard drive to a computer. IDE hard
drives are very common and relatively inexpensive.
Internet: The world's largest computer network that links many of the scientific, research and educational
computers as well as commercial networks. The internet uses TCP/IP protocols, and computers on Internet
can run on any operating system, like, several variations of UNIX, Windows NT, and VMS etc.
Intranet: In the most general sense, a private corporate network that uses Internet technology based
software and TCP/IP protocol standards. Many companies use intranets for tasks as simple as distributing a
company letter and for tasks as complex as posting and updating technical support bulletins to service
personnel worldwide. An intranet does not always include permanent connection to Internet.
Laptop Computer: A portable computer, small enough to be held on a lap,but slightly larger than a
notebook computer.
LED: Light Emitting Diode. An electronic device that lights up when electricity is passed through it.
Light Pen: An input device that allows a user to write on or point to a special pad or the screen of a pen-
based computer, such as a PDA.
Macintosh: A PC based on a Motorola microprocessor employing GUI. Apple Macintosh has been in use
since late eighties.
Macro: A symbol, name, or key that represents a list of commands, actions or keystrokes.
Math co-processor: Part of the microprocessor; a companion chip designed to perform complex
calculations.
Megabyte (M, MB): Approximately one million characters; actually 1,048,576 bytes. A measure of
memory or storage.
Megahertz (MHz): A measure of processing speed. The higher the value, the faster a computer can work.
MIPS: Million Instructions Per Seconds, a unit for measuring the speed of a computer.
Mother Board: The main circuit board of a computer, which carries electrical signals to and from various
parts of the computer.
Multimedia: A computer system that combines text, graphics, animation, music, voice and video media;
may include stereo speakers as an output device.
Multiprocessing: It refers to a computer system’s ability to support more than one process at the same
time. It is also called multitasking.
Non-Volatile Memory: This is data storage that does not lose its contents on power off; for example,
ROM.
Numeric keypad: The part of a keyboard that looks like an adding machine, with 10 digits and
mathematical operators; usually located on the right side of the keyboard.
Office-Automation: The use of computer systems to execute a variety of office operations, such as word
processing, accounting and Email.
Pentium: The fifth generation of microprocessors. The Pentium is 2 to 3 times faster than the 80486, the
fourth generation of microprocessors.
Peripheral: Any piece of hardware attached to the outside of a computer. Examples are printers and
modems.
Pixel: Short for "Picture Element". A Pixel is the smallest dot the computer can control on the screen.
Portable computer: A small computer that usually runs on batteries. In the categories of portable
computers are laptop, notebook, sub-notebook and palmtop.
Protocol: In networking and communications, the formal specification that defines the procedures to
follow when transmitting and receiving data. Protocol defines the format, timing, sequence and error
checking used on the network.
Resolution: The size and quantity of dots that make up a printed page, screen or scanned image.
Scanner: An input device used to copy a printed document into a computer’s memory in digital form,
without requiring manual keying.
SCSI: Small Computer System Interface. A standard for connecting a hard drive to a computer.
Serial Port: An outlet on a computer used to attach a device, such as a modem. A serial port sends data
(bits) down the wire one at a time (in a series).
Service Pack: It is an update to a software version that fixes an existing problem, such as a bug or
provides enhancements to the product that will appear in the next version of the product.
TCP/IP: Transmission Control Protocol / Internet Protocol is a set of communication protocols that
encompass media access, packet transport, session communications, file transfer, e-mail, and terminal
emulation. TCP/IP is supported by a large number of H/W and S/W vendors and is available on many
computer systems, from PCs to mainframes.
Troubleshoot: To isolate the source of a problem and fix it. In case of computer systems, troubleshoot is
usually used when the problem is hardware related.
Upgrade: A new version of a software or hardware product designed to replace an older version of the
same product.
UPS: Uninterruptible Power Supply. It is a power supply that includes a battery to maintain power in the
event of a power cut for several minutes to some hours.
Utility: A program that performs a very specific task, usually related to managing system resources.
Video Card: An electronic circuit board inside a computer, which controls the display on the Monitor, i.e. the
computer screens. Video cards are usually add-on cards inserted into expansion slots, although sometimes
video circuitry is incorporated into the Motherboard. Usually referred to as a graphics card these days.
Videodisc: A technically obsolete Storage Medium, an Optical Disc, 12 inches in diameter, used mainly to
store still images or video clips. Now replaced by CD-ROMs and DVDs. See CD-ROM, Digital Video Disc,
Interactive Video (IV).
Videodisc Player: Equipment used for accessing information - usually still images or video clips - stored on
videodiscs. Now technically obsolete.
Video Memory: The dynamic memory available for the computer's Display Screen. The greater the amount
of memory, the greater the possible colour depth and resolution of the display. Also known as Video RAM
(VRAM).
Virtual Learning Environment (VLE): A VLE is a Web-based package designed to help teachers create online
courses, together with facilities for teacher-learner communication and peer-to-peer communication.
Virtual Reality: The simulation of an environment by presentation of 3D moving images and associated
sounds, giving the user the impression of being able to move around with the simulated environment. Users
wear helmets and visors that convey the images and sound and gloves that give them the experience of
touching objects.
Virtual World: A type of online three-dimensional imaginary world or game in which participants and players
adopt amazing characters or avatars and explore the world, engaging in chat or playing complex games. See
Avatar, MMORPG, MUVE.
Virus: A virus is a nasty program devised by a clever programmer, usually with malicious intent. Viruses can
be highly contagious, finding their way onto your computer's hard drive without your being aware of it and
causing considerable damage to the software and data stored on it.
Visual Display Unit (VDU): A Monitor connected to larger computers. Usually referred to as VDU. Rather an
old-fashioned term nowadays, Display Screen being the current favoured term.
Vodcast: A contraction of Video Podcast. A type of Podcast that incoporates video as well as audio.
VoIP: Abbreviation for Voice over Internet Protocol, i.e. audio communication using the Internet instead of
telephones. Skype and Ventrilo are examples of VoIP.
W3C: Abbreviation for World Wide Web Consortium. An international non-profit organisation which acts as
a resource centre for the World Wide Web, and is active in setting technical standards.
WAN: Abbreviation for Wide Area Network. A network of computers located at geographically separate
sites.
WAP: Abbreviation for Wireless Application Protocol. A system that enables you to browse online services,
e.g. relating to information about the weather, traffic conditions, shopping, etc via a special type of mobile
phone. WAP is the mobile phone equivalent of the World Wide Web.
WAV: Short for Waveform Audio Format. A format for storing high-quality audio files. Somewhat hungry in
terms of storage space compared to the MP3 and WMA audio file formats.
Web 2.0: Contrary to what many people think, Web 2.0 is not a new version of the World Wide Web. The
term arose as the name of a series of conferences, the first of which was held in 2004:
http://www.web2summit.com. Essentially, Web 2.0 is an attempt to redefine what the Web is all about
and how it is used, for example new Web-Based communities using Blogs, Podcasts, Wikis and Social
Networking websites that promote collaboration and sharing between users.
Webcam: A camera connected to a computer that enables it to transmit images and videos to the Internet.
WebCT: A Virtual Learning Environment (VLE). Blackboard and WebCT announced an agreement to merge
in October 2005. Effectively, Blackboard has now taken over WebCT.
Webmail: A facility for creating, sending and and receiving messages via the Internet. Webmail offers an
alternative to using email software such as such as Outlook or Eudora.
Webquest: A webquest is a task-oriented activity in which the learner draws on material from different
websites in order to achieve a specific goal.
Web Server or Webserver: A computer or a software package running on a computer that delivers, i.e.
serve. Every Web server has an IP Address and possibly a Domain Name. For example, if you enter the URL
https://www.scholarify.in in your Browser, this sends a request to the Server whose domain name is
scholarify.in. The server then fetches the page named index.htm and sends a copy of it to your browser. By
far the most popular Web server software in use worldwide is the Open Source Apache software.
Website: An area on the World Wide Web where an organisation or individual stores a collection of pages
of material - Web pages. The pages are usually interlinked with one another and with other websites. Every
website has a unique Web Address or URL. The full URL of the Scholarify website is
https://www.scholarify.in
Wifi: Wireless Fidelity, also known as wireless networking, a way of transmitting information without
cables that is reasonably fast and is often used for laptop computers within a business or a university or
school campus instead of a Local Area Network (LAN) that uses cable connections.
Wild Card or Wildcard: In a question-answer dialogue which aims not to be over-sensitive about spelling,
the teacher may decide to allow for aberrations by declaring certain characters "wild".
Windows: The name of a range of several different Graphical User Interface (GUI) operating systems
produced by the Microsoft Corporation. Windows 3.0 and Windows 3.1 were the first operating systems of
this type, produced by Microsoft, to appear in the early 1990s. Microsoft Windows is currently the most
widely used GUI for personal computers. It exists in various versions, e.g.Windows 95, 98, ME, NT, 2000
and XP.
Windows Explorer: Microsoft's tool, provided as part of Windows, that enables you to inspect and manage
folders and files stored on your computer. My Computer is an alternative tool, also provided as part of
Windows.
Wireless Mouse: A Mouse that does not require a cable connection to a computer, but which operates via
infrared or radio signals.
Wizard: Software that guides the user step-by-step through a complex task, such as setting up software on
a network or configuring a printer to output data in a special format, e.g. for printing labels from a
database program.
WMA: Abbreviation for Windows Media Audio. Microsoft's audio encoding format which offers high
quality output with lower file sizes. See MP3, WAV, which are alternative audio file formats.
Wordsnake: An exercise in which all the spaces in a sentence have been removed, the learner's task being
to put the spaces back into the correct positions in the sentence.
Workstation: A term that is rather loosely used these days. Most people use it in the context of any
computer that forms part of a Network. Formerly, this term was applied to a particular type of powerful
computer used for scientific and engineering calculations, e.g. the Sun Workstation.
WorldCALL: The worldwide umbrella association for CALL. http://www.worldcall.org, which has the aim of
helping countries that are currently underserved in the applications of ICT. The First World Conference on
CALL was held at the University of Melbourne, Australia, in 1998. The Second World Conference on CALL
took place in Banff, Canada, in 2003. The 2008 WorldCALL conference will take place in Japan.
World Wide Web: Usually referred to simply as the Web. This is the most powerful and fastest growing
Internet service. The World Wide Web was the brainchild of Tim Berners-Lee, who in 1989 invented the
HTML coding language that is the basis of the Web. The Web became a public service in 1993. It is a huge
collection of resources of information, including learning materials, which is accessed by means of a
computer program known as a Browser. The World Wide Web is only part of the Internet, but many people
treat both terms as synonyms.
Worm: A computer worm is a self-replicating hostile computer program, similar to a computer Virus. A
virus attaches itself to and becomes part of another program, but a worm is self-contained and does not
need to be part of another program to propagate itself. Worms can cause considerable damage to
computers.
WORM: Acronym for Write Once Read Many. Now a rather dated term, originally applied to a type of
Optical Disc on which information could be written just once and could not be amended or erased.
Write Protect: To protect a Storage Device, File or Folder so that its contents cannot normally by altered or
erased. This may be done physically, e.g. by moving a notch on a floppy disc's casing, or more commonly
these days - through software that designates the device, file or folder as read-only.
WYSIWYG: Acronym for What You See Is What You Get, dating back to the pre-Windows and preMac
period, when what you saw on the screen, e.g. in a Word document, was not necessarily what appeared on
your Printer - something we now take for granted.
XML: Abbreviation for eXtensible Markup Language. XML is a specification emanating from the World Wide
Web Consortium (W3C) that allows Web designers to create their own language for displaying documents
on the Web. XML is an extension to the standard language for creating Web pages, HTML, and makes it
possible to create websites containing more complex interactivity.
YouTube: A website to which you can upload your own video clips and view video clips uploaded by others
Zip Disc: A portable type of disc used to store around 100Mb of data. Zip discs have become obsolete since
the arrival of smaller and more convenient storage devices with much greater storage capacity, e.g. the
increasingly popular Flash Drive or Memory Stick.
Zip Drive: A type of disc drive that accepts portable zip discs. Zip drives themselves are also portable and
can be connected to almost any computer.
Zip: Used as a verb to describe the process of compacting files or programs in order to cut down the
amount of storage space they require by compressing them into one tightly-packed file and thus to make it
easier for them to be transported on floppy discs or transmitted electronically to other locations, e.g. via
the Internet. Proprietary programs, such as WinZip or WinRar, can be used to zip data and files.
The abbreviations and terminologies are all correct. If you find any human error, or wrong
abbreviations, please inform us through email.
Digital revolution is bringing in sweeping changes in the Higher Education landscape. Every
institute is taking various initiatives in promoting digital education.
The technology of online education and all the digital initiatives have the possibility to
revolutionize higher education scenario in the near future.
The use of technology through online education in higher education also becomes imperative due
to the following factors:
a) Affordable: Online education is cheaper than formal education without compromising on
quality, thanks to low infrastructure costs and large learner base.
b) High Quality: Online Education is directly delivered by the best teachers, assuring high
quality of instruction.
c) Inclusive: Online Education addresses the rural-urban divide which is manifested by the fact
that at present India has 4.5% graduates in rural areas as against 17% in urban areas. For females,
the disparity is starker: 2.2% female graduates in rural areas, as against 13% female graduates in
the urban areas.
d) Employability: By a flexible curriculum that is in line with the current market requirements,
the online education can enhance the employability quotient in the youth.
e) Uses internet: The penetration of IT infrastructure is expected to increase the internet users
from 40.9 Cr in 2016 to 73.5 Cr by 2021. This will enhance access to online courses to the youth.
f) Smart Phones: Increasing penetration of smart phones, which is expected to increase to more
than 60 Cr (2021), would further facilitate the use of the online courses using the telecom
spectrum.
g) Higher spend: The households spend on higher education is going to increase in future,
affording opportunity for the hitherto unreached population to the portals of higher education.
h) Retraining the workforce: The pressing need of the employment sector for re-training and
career upgradation as per the needs of the market is best served by online education leading to
Life-long learning.
Talk to a Teacher developed by IIT Bombay, is an initiative of the National Mission on Education through
ICT, funded by MHRD to provide free access to a few selected graduate and postgraduate courses,
taught at IIT Bombay by distinguished faculty members and scholars at large. It uses A-View
collaboration tool developed by Amrita University for providing virtual classrooms to the faculty across
the country.
Campus Connectivity
E-Kalpa: It is another MHRD/ NMEICT initiative for creating Digital-Learning Environment for Design in
India. It has successfully achieved the following project objectives, on completion of its phase I:
1. Digital online content for learning Design with e-Learning programs on Design
3. Social networking for Higher Learning with collaborative Learning Space for Design
e-Pathshala:
The digital India campaign has promoted extensive use of ICTs in the teaching learning process.
The e-Pathshala, a joint initiative of Ministry of Human Resource Development (MHRD), Govt.
of India and National Council of Educational Research and Training (NCERT) has been
developed for showcasing and disseminating all educational e-resources including textbooks,
audio, video, periodicals, and a variety of other print and non-print materials for Students,
Teachers, Parents, researchers and educators.
It provides access to digital textbooks for all classes, graded learning materials and enables
participation in exhibitions, contests, festivals, workshops, etc.
e-Basta:
e-Basta is a framework to make schoolbooks accessible in digital form as e-books to be read and
used on tablets and laptops. The main idea is to bring various publishers (free as well as
commercial) and schools together on one platform.
Besides the portal, a back-end framework to facilitate the organization and easy management of
such resources has also been made, along with the web-based applications that can be installed
on tablets for navigating the framework.
Sugamya Pustakalaya:
Sugamya Pustakalaya is an online library that contains books accessible to the blind, people
with low vision or to persons with any other print disability.
The library houses publications across diverse subjects and languages and multiple accessible
formats. It has been created by Department of Empowerment of Persons with Disabilities
(Divyangjan), Ministry of Social Justice and Empowerment in collaboration with member
organizations of Daisy Forum of India (DFI) and powered by TCS Access.
Diksha:
National Teacher Platform (NTP) branded as "Diksha" is an initiative of the Ministry of Human
Resource Development, Government of India. It is a state-of-the-art platform built to host Open
Educational Resources (OER) and tools for Teachers in Schools, Teacher Educators in Teacher
Education Institutes (TEIs) and Student Teachers in TEIs. It is built considering the whole
teacher’s life cycle - from the time student teachers enroll in TEIs to after they retire as teachers.
Saransh:
Saransh is a tool for comprehensive self-review and analysis for CBSE affiliated schools and
parents. It enables them to analyse students' performance in order to take remedial measures.
ICT and Governance: According to revised syllabus, ICT and Governance is a new topic of
UGC NET paper 1. Before the discussion of the topic, get familiar with the term “ICT” and
“Governance”.
Information and Communication Technology (ICT):
According to UNESCO, “ICT is a scientific, technological and engineering discipline and
management techniques used in handling information and application and association with
social, economic and cultural matters”.
World Bank defined as “ICT consists of hardware, software, networks, and media for collection,
storage, processing, transmission, and presentation of information (voice, data, text, images).”
American Library Association (1983) defined information communication technology (ICT) as
the application of computers and other technologies to the acquisition, organization, storage,
retrieval, and dissemination of information. The computers are used to process and store data,
while telecommunication technology provides information communication tools, which make it
possible for users to access databases and link them with other computer networks at different
locations.
Governance:
According to United Nations Development Programme (UNDP), governance is the exercise of
economic, political and administrative authority to manage a country’s affairs at all levels. It
comprises the mechanisms, processes and institutions through which citizens and groups
articulate their interests, exercise their legal rights, meet their obligations and mediate their
differences.
World Bank defined governance as the method through which power is exercised in the
management of a country’s political, economic and social resources for development.
In brief, governance is the systems and processes that ensure the overall effectiveness of an
entity whether a business, government or multilateral institution.
E-Governance:
World Bank defined as “E-Government refers to the use by government agencies of information
technologies (such as Wide Area Networks, the Internet, and mobile computing) that have the
ability to transform relations with citizens, businesses, and other arms of government. These
technologies can serve a variety of different ends: better delivery of government services to
citizens, improved interactions with business and industry, citizen empowerment through access
to information, or more efficient government management. The resulting benefits can be less
Report any error at [email protected] 36 | P a g e
corruption, increased transparency, greater convenience, revenue growth, and/or cost
reductions.”
According to United Nations; “E-government is defined as utilizing the Internet and the world-
wide-web for delivering government information and services to citizens.”
So, we can define, “E-government involves using information technology, and especially the
Internet, to improve the delivery of government services to citizens, businesses, and other
government agencies. E-government enables citizens to interact and receive services from the
federal, state or local governments twenty-four hours a day, seven days a week.”
Objectives of e-Governance
The following are the objectives e-Governance:
To build an informed society – An informed society is an empowered society. Only informed
people can make a responsible Government. Access to every piece of information of the
Government and of public importance is one of the basic objectives of E-Governance.
To increase Government and Citizen Interaction - E-Governance aims at building a feedback
framework, to get feedback from the people and to make the government aware of people's
problems and to find solutions with their active involvement. To encourage citizen participation -
E-governance aims to restore democracy to its true meaning by improving citizen participation in
the Governing process, by improving the feedback, access to information and overall
participation of the citizens in the decision making.
To bring transparency in the governing process - E-governance carries an objective to make
the Governing process transparent by making all the Government data and information
accessible to people. It is to make people know the decisions, and policies of the Government.
To make the Government accountable - Government is responsible and answerable for every
decision taken by it. E-Governance aims to help the Government to be more accountable than
now by bringing transparency and making the citizens more informed.
To reduce the cost of Governance - E-Governance also aims to reduce cost of governance by
cutting down expenditure on physical delivery of information and services particularly by cutting
down on stationary, which amounts to most of the government expenditure.
To reduce the reaction time of the Government – Normally due to red-tapism and other
reasons, the Government takes long to reply to people's queries and problems. E-Governance
aims to reduce the reaction time of the Government to the people's queries and problems.
Scope of e-Governance
Governance is all about flow of information between the Government and Citizens, the
Government and Businesses and the Government and Government. E- Governance covers all
these relationships as follows:
• Government to Citizen (G2C)
• Citizen to Government (C2G)
• Government to Government (G2G)
• Government to Business (G2B)
Government to Citizen:
Government to Citizen relationship is the most basic aspect of E-Governance. The G2C relation
includes the services provided by the Government to the Citizens. In modern times, Government
deals with many aspects of the life of a citizen which include the public utility services i.e.
Telecommunication, Transportation, Post, Medical facilities, Electricity, Education and some of
the democratic services relating to the citizenship such as Certification, Registration, Licensing,
Taxation, Passports, Aadhar Card, ID Cards etc. The relation of a citizen with the Government
starts with the birth and ends with the death of the citizen. Therefore E-Governance in G2C
relationship will involve facilitation of the services flowing from Government towards Citizens
with the use of Information and Communications Technology (ICT). Some of the emerging areas
in G2C can be listed as follows:
E-Health: E-Health services includes ICT enabled health services of the Government. Under
this, interconnection of all hospitals may take place. Patient database and local pharmacy
database may also be created.
E-Education: E-Education would cover the implementation of ICT in education. Distant as well
as classroom education needs facilitation through the use of ICT. For instance, use of internet
reduces the communication time required in distance education. Internet may also help in
conducting online classes.
E-Help: E-Help refers to the facilitation of disaster and crisis management using ICT. It includes
the use of technologies like internet and SMS for the purpose of reducing the response time of
the Government agencies to the disasters. Online information relating to disasters, warnings and
calls for help can assist the Government and the NGOs to coordinate their work and speed up the
rescue work.
E-Taxation: E-Taxation will facilitate the taxing process by implementing ICT in the taxing
process. Online tax due alerts and online payment of taxes would help transact faster.
Citizen to Government
Citizen to Government relationship will include the communication of citizens with the
Government arising in the Democratic process like voting, campaigning, feedback, etc.