Open navigation menu
Close suggestions
Search
Search
en
Change Language
Upload
Sign in
Sign in
Download free for days
0 ratings
0% found this document useful (0 votes)
224 views
41 pages
Ict Full Notes
Notes on information and communication technology
Uploaded by
lessonshepherdkaridza
AI-enhanced title
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here
.
Available Formats
Download as PDF or read online on Scribd
Download
Save
Save ICT FULL NOTES For Later
Share
0%
0% found this document useful, undefined
0%
, undefined
Print
Embed
Report
0 ratings
0% found this document useful (0 votes)
224 views
41 pages
Ict Full Notes
Notes on information and communication technology
Uploaded by
lessonshepherdkaridza
AI-enhanced title
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here
.
Available Formats
Download as PDF or read online on Scribd
Carousel Previous
Carousel Next
Download
Save
Save ICT FULL NOTES For Later
Share
0%
0% found this document useful, undefined
0%
, undefined
Print
Embed
Report
Download
Save ICT FULL NOTES For Later
You are on page 1
/ 41
Search
Fullscreen
UNIT-1 (FUNDAMENTAL OF INTERNET) What is Internet?, Internet applications, Internet Addressing Entering a Web Site Address,URL- ‘Components of URL, Searching the Internet, Browser —Types of Browsers, Introduction to Social Networking: Twitter, Tumblr, Linkedin, Facebook, flickr, Skype, yahoo, YouTube, WhatsApp1, DEFINE INTERNET? fin to information over the web (oR, defined as an information superhighway to access in formatior (on) Internet is defined a: global system of interconnected computers. areal work of billions of computers and other electronic devices. With the rl ‘The Internet is a global net aoe oe Internet, it's possible to access almost any information, communicate with anyor . world, and do much more. ; ; i lled goin; You can do all of this by connecting a computer to the Internet, which is also called going ie Me wean ‘online. When some one says a computer is online, it's just another way of saying it's connected totheinternet. 1. DEFINE Www? ‘The World Wide Web—usually called the Web for short: isa collection of different websites you can access through the Internet. ‘Awebsite is made up of related text, images, and other resources. Web Page * document that has information can be displayed in a web browser like Firefox, Chrome, etc. Its called just “pages.” Web Server Google ‘Where the web content i stored called a web server. The web server is used to host web sites. The web ‘5 collection of web pages, The web server isa software that responds to the request for web resources. 2. EXPLAIN ABOUT HISTORY OF INTERNET? The history of the internet timeline in a chronological view, 7 11969, MIT scientists invented adatatransmission method and the first datato send from one computer to another was LOG’. They converted the word ‘LOG into binary values andsent from one to another using the wired medium. In 1970, 13 com, puters at MIT were internally connected.¥ In 1974, the first email was sent using @ sign in ARPANET, In 1983, the TCP/IP protocols became more strong and sophisticated, Some attributes addition like acknowledgment (ACK) and reverse acknowledgment (RAK) made the internetworking as a good outlook. Im 1990, a CERN scientist Tim Berners-Lee proposed a markup language which is named HTTP later. Inthis proposed method, Lee connected CERN employees by sharing messages through this language platform. But this method was limited to CERN members only. In 1993, the proposed method of Lee was open to the public and the first website launched in the world. Although some say that the first website was launched in 1991 but that wasn't public or free. Y In 1995, famous market place and shop cart amazon.com made their first launch and still they're the best sellers in online shopping. Google introduced itself as a search engine in 1997 with yahoo. Both are top search engine now. Y Social media sites: Facebook, twitter, YouTube, Linkedin invented or created within 2000-2010 and now you cannot live a single day without it. Wort td com tecimes Tretestewr mere The Oorantime relist cormercal grocer The Wr Wie Web message sent Systeme tern fees macsiream 1969 1989 i 165: 1970-1975 1987 le Thetesteee WAN Therupclte LAN Cecoshesnestist rater Tin Berner Lue tat tat (Wide Area Nears) (Local Area Netwcrh) iments HTML was atoura tne gta ‘eewabisted ™ane re wns INTERNET WORKS? ; dthat the web M3Y bea global network of physical cables, Fiber Optic Cables. Even wireless access the web. per telephone wires aserver. Where 36/46 believe these ter sends an invita ur computer's disk d isthe right data back physical cables to ion over the wire to ‘A request arrives one which may include CoM connections like Wi-Fiand When opening asite, compu ed. It works tons like YO (rive. «the web site and send: ¥s injust a few seconds! web sites are stor time, The server retrieve computer. What's amazing is that ths all happen 4. EXPLAIN ABOUT ADVANTAGES OF INTERNET? (oR) EXPLAIN ABOUT APPLICATIONS OF INTERNET? Internet is ir is interconnection of large number of heterogeneous computer networks oe : works all hat can share information back and forth. These interconnected netw — yetwork exchange information by ust using same standards and products. The internet is treated as one of one of the biggest invention. It has a large number of uses. ‘Communication itis used for sending and rec eiving message from on e and other throu igh internet by using 8 are yahoo mail. Com Hotmail. Com, electronic mail. Some of the web sites providing this ser rediffmail.com etc. Job searches7 Getting information regarding availability of job in different sectors and areas, You can Publishyour resume in online for prospective job some of the web sites providing this ser ‘naukri.com, monster. Com, summer job. etc. ‘+ Finding books and study material Books and other study material stared around the world can be easily located through internet. Latest encyclopedias are available online. © Health and Medicine Internet provides information and knowledge about field of health and medicine. People can have information about various diseases and can receive help. Patient can be taken to virtual check room where they can meet doctors. * Travel One can use internet to gather informat n about various tourist place. It can be used for booking holiday tours, hotels, train and flights. Some of the web sites providing this service air India travels. Org. com, raj travel. Com, make mytrip. Com. * Entertainment Songs, movies, latest sports update through internet some of the web sites providing this services are cricinfo.com. + Shopping Internet is also used for online shopping. By just giving accounts details you can perform thetransaction you can even pay your bills and perform bank related transaction. + Stock Market Updates You can sell or bases shares white sitting on computer through interest several websites likendin, tvprofit.com, money pore.com, provides information in investment. © Research ={ downtoa, ing i for research purposes you can : using internet Alarge number of people are any kind information by using internet. : it a ion about ¥ Different ways by which internet can be used for business are: Information about the ess use of interne! product can be provided online to the customer. , it le, ¥ Provide market information to the business. It helps business to recruit talented people. ¥ Helpin locating suppliers of the product. Fast information regarding customers view about company's product. Eliminate middle men and have a direct contact with customer Providing information to the investor by providing companies background and financial information on website. EXPLAIN ABOUT INTERNET ADDRESSING? ANY TYPES OF ADDRESSING AND CLASSIFICATION OF IP ADDRESSING Each computer and router on the int identified An Internet addressing or Interne! four bytes. IP addressesas four natural numbers from 0-255. Itis common to express IP addresses as fournatural numbers separatedby dots, The network interface card NIC of ev fernet must have a name so that it can be uniquely protocol address or IP address consists of 32 bits, or ‘ery computer that wants to send or receive least one address, ‘They are so many types of address are there 1) MAC-( Physical addressing ) 3) DNS- (Friendly addressing) 1) MAC-(PHYSICAL ADDRESSING); Within local networks, they are con 2) 1P-(Logical addressing) 'p addresses are used to communicate between networks. werted in MAC addresses (ARP for IPva) ARP (Address Resolution Protocol) will be convert an IP address t fo the corresponding MACaddress RARP-{Reverse Address Resolution) it fixes the ip address from the Ethernet ‘one. IPV6: It revealed works within IPva Pv6 addresses are not entirely logical9 2) P-(LOGICAL ADDRESSING}: Internet Protocols used for the interconnection of multiple local networks It is network of networks. Classification of IP Addresses Addressciss | RANGE — | Dafeut Subnet Mask . 126 285258255 255.0.0.0 8 191788 98 es 255.258.0.0 7 2238 256955 255.255.2550 D 2307499210... | Reserved for Multicasting| E 25426256955 Experimental Note: Class A. lresses 127.0.0.0 to 127.255.255.255 cannot 3) DNS (Domain Name System): Itis a distribution database used by TCP/IP applications to map between hostname and IP address and provide routing information. 6. Whatis URL? EXPLAIN COMPONENTS OF URL? ‘A URL (Uniform Resource Locator) is a unique identifier used to locate a resource on the Internet. Its also referred to as a web address. URLs consist of multiple parts including a protocol (http) and domain name (.com, .in) that tell a web browser how and where to retrieve a file, directory, HTML page, image, program, and so on. https://www.computerhope.com/jargon/u/url.htm ‘“Protecel’ Subdomain Domain and domain suff Direclones’ “Webpage” ‘Types of URL: - URL s varies depending on the location of the documents to which user will link. Basically URLS fall into two categories 1 Absolute URL 2 Relative URL Absolute URL: 1 absolute URL shows all the information about the full page address in the search ‘engine and all the steps you need to go through to get to the page, including the protocol and domain, Ex sour in comipage him! Relative URL: The relative URL shows where you are already located. Such addresses do not contain Information about the protocol and domain, They only show part of the path to the page, eesBc page-htm! cs ENTERING WEB ADDRESSES: © You can specify a URLin several ways, but three methods are most commonly used, 4. Typethe URLin the browser's address box. 4. Click a hyperlink thats linked to that URL. * \ 5 Store the URL in your browser's favorites’ ist, then select the URL from the list, \ COMPONENTS OF URL Protocol ‘The protocol or scheme of a URL indicates the method that will be used for transmitting or ‘exchanging data. The most familiar scheme is the Hypertext Transfer Protocol (HTTP) or Hypertext Transfer Protocol Secure (HTTPS) for the transmission of HTML files. FTP (for files) and Mailto (for mails) Domain ‘The domain or hostname of a URL is a user-friendly expression of the Internet Protocol (IP) address of a website. It points to the location of the website's host server. Path The path that follows the domain name insi fe a URL points to a specific file or other resourcelocation. It can also include a query string. Example: \ICTVICT-IISEM.htm! Query The query string, also known as a fragment identifier, is frequently used for internal searches and 1s commonly preceded by a question mark (2). ‘©: www.domain.com/?q=women-shoes / www.domain,com/men-shoes?color=Black _ 7. EXPLAIN ABOUT INTERNET SEARCH (OR) EXPLAIN ABOUT SEARCHING OF INTERNET? ‘Aweb search engine is a tool designed to search for information on the World Wide Web. The search results are usually presented in a list and are commonly called hit ae . That information ee may consist of web pages, images information and types of files. Search engine components are ___ {a) User interface: - The screen in which you type a very and which displays the search results. ee __{b) Searcher:- The part that searches a database for information to match your query.1 {c) Evaluator: - The functi 1 that assigns relevancy scores to the information retrieved. (4) Gatherer: - The components that traverses the web, collecting information about pages. (€) Indexer: - The function that categorize the data obtained by the gatherer. SEARCH ENGINE WORKS Search engines can differ from one to another in their ways of providing the answers to the user but all of them are built on the 3 fundamental principle 1. Crawling 2. Index 3. Ranking Crawling: The actual discovery of process in which search engines send out a team of robots (Known as crawlers or spiders)to find new and updated content new web pages on the internet starts with the process called crawling. Every time a web crawler finds a new webpage through a link, it scans and passes its content for further processing (called indexing). Indexing: Once the bots crawl the data, it’s time for indexing — the process of validating and storing the content from the web pages in the search engine's database called “index”. It is basically a big library of all the websites. Ranking: The last step includes picking the best results and creating a list of pages that will appear on the result page. 8. EXPLAIN DIFFERENT TYPES OF WEB BROSWERS? {All web browsers are application programs that are developed to access information on which World Wide Web. Although the primary application of the web browsers is the same, they differ from each other in more than one aspect. The distinguishing areas are: Platform: Linux, windows Mac, BSO and other UNIX protocols: FTP, SFTP, SAMBA, HTTP, IMAP, etc. Graphical user Interface. (GUI) racine @ It was developed by Microsoft in 1994 and released in 1995 as a supportive package to Microsoft windows line of operating systems. According to Statistics, its usage share from 1999 to 2003-04 was around 95%. Micros of occasionally releases updates for the previousncedcapabilities- Via version of IE, which have some enha wn, Mozilla Firefox was of experimentation firebir as there were around Moaila Firefox: (9 Itis owned by Mozilla Corporation 1004. It was us browser after Int id was the result a d, and eventually earlier nam ernet Explorer hoenix, offically announced in February 2 ed PI Firefox. Itis the Second ~ most famo .n downloads, within a year of its release. 100 millior hn Mac OS X , Microsoft Which is compatible wit 1003 as a public beta. This is a web browser from Apple inc. windows, and the ! phone 05. safari was released by Apple in January 2 Opera: oO ‘This browser was developed by Opera software. In 1996. It is 2 well ~ Known browser that and smart phones. Opera Mini phones, PDAS, hones. It is compatible with many and Microsoft windows mobile is mainly used ininternet activated mobile and Opera Mobile are the browsers used in smart P Linux, Mac OSX, operating systems such as sotaris, \d POA’. operating systems for smart phones an Google Chrome:- This web browser was deve released in sept 2008 for Microsoft windows. The browser versions for Mac OSX are under eloped by Google. Its beta and commercial versions were development. 2 Netscape Navigator:- “** Itwas devel i ae loped by Netscape Communications Corporation and was most popular in thi
29 toothers to fill out, click the Send Form button. You can copy the link and send it yourself, ‘or you can type in the e-mail addresses of those you want to take the survey. 14. DEFINE GOOGLE CLASSROOM? AND EXPLAIN HOW TO CREATE CLASSROOM AND SIGN INTO CLASSROOM? Google Classroom is a suite of online tools that allows teachers to set assignments, have work submitted by students, to mark, and to return graded papers. It was created as away toget eliminates paper in classes and to make digital learning possible. It was initially planned for use with laptops in schools, such as Chrome books, in order to allow the teacher and students to more efficiently share information and assignments. CREATE A CLASS To create your first class, follow the steps below: Go to classroom. google.com and sign in. © Enter the class name. © Select the Teacher role © Onthe Classroom Home page, click the+ symbol and then choose Create class30 Toenter: f your r class ti Sectionandenter | tera short description of your class grade level, 0 class time, click. ent 1L Toent the details. 2. Toadd a subject such as Algebra |, click Subject ‘and enter a name or click one from the \ list that appears when you enter text. 3, Toenter the room location for the class, click Room and enter the details. 4, Click Create. 15, EXPLAIN HOW TO ADD CONTACTS? IN GMAIL? ‘* Gotohttps://contacts google.com in a web browser. You can do this in any web browser ‘on your computer, phone, or tablet. ‘+ Click or tap the +. It's the plus sign at the bottom-right comer on a phone or tablet, or + Create contact at the top-left comer on a computer. * Click or tap Create a contact this opens the "Create new contact” window. If you have an Android, just move to the next step. * Enter the person's contact information. Enter their first name, last name, phone number, ‘and email address in each appropriate field, but they might be pre-filled if that contact's Gmail information is correct. * Glick or tap See more to expand more options, such as the option for phonetic spellings, nicknames, and more. Click or tap Save. i's at the bottom-right comer. Ths saves your new com Gmail contact list. tact to youra UNIT-II (OVERVIEW OF INTERNET SECURITY + Overview of Internet security, E-mail threats and secure E-mail, Viruses and antivirus software, Firewalls, Cryptography, Digital signatures, Copyright issues. itiatives in higher education? (SWAYAM, Swayam Prabha, © What are GO! digital National Academic Depository, National Digital Library of India, E-Sodh-Sindhu, Virtual labs, e-Acharya, e-Yantra and NPTEL).‘1, DEFINE INTERNET SECURITY? EXPLAIN TYPES OF INTERNET SECURITY THREATS? Internet security consists of @ range of security tactics for protecting activities ang transactions conducted online over the internet. These tactics are meant to safeguard users from threats such as hacking into computer systems, email addresses, or websites; malicious software that can infect and inherently damage systems; and ide theft by hackers who steal personal data such as bank account formation and credit card numbers. Internet security is a ‘Specific aspect of broader concepts such as cyber security and computer security, being focused on the Specific threats and vulnerabilities of online access and use of the internet. Malware: Short for “malicious software," malware comes in several forms, including computer viuses, worms, Trojans, and dishonest spyware, Computer worm: A computer worm isa software program that copies itself from one computer tothe next. It does not require human interaction to create these coy pies and can spread rapidly and in great volume. Spam: Spam refers to unwanted messages in your email inbox. In some cases, spam can simply include junk mail that advertises goods or services you aren't interested in, These are usually considered harmless, but some can include links that will install malicio us software on your computer if they're clicked on. Phishing: Phishing scams are created by cybercriminals attempting to solicit Private or sensitive Information. They can pose as your bank or web service and lure you into licking links to verify details like account information or passwords. Botnet: A botnet is a network of private computers that have been compromised. Infected with ‘malicious software, these computers are controlled by a single user and a re often prompted to engage in nefarious activities, Such as sending spam messages or. denial-of-service (DoS) attacks. DEFINE EMAIL THEART? EXPLAIN ABOUT VARIOUS TYPES EMAIL THEARTS AND HOW TO SECURE EMAIL?Ty 33 Email threats are becoming an increasingly large problem, both for companies and individuals. As our email addresses and personal information become more widely spread, it becomes easier to find this information online, which allows malicious actors to discover routes of attack more easily. For businesses, attacks such as phishing email threats, malware threats, and darknet email threats can leave vulnerable data and systems exposed and can cause major reputational and monetary losses. 1. Chain Mail ‘A chain mail/chain letter is a message that attempts to convince a recipient to make a given number of copies and pass them toa certain number of recipients. 2. Spoofing. spoofing is a technique used by cybercriminals to deceive the recipient into thinking they are communicating with someone they know. 3. Phishing Phishing is another type of attack cybercriminals use to steal user data, Such data often includes credit card numbers and login credentials. t ocurs when the attacker masquerades 25 atrusted entity and dupes the victim into opening an email 4, Ransomware ansomware isavicious malware that attacks your entire computer system. and blocks you from accessing your data until you pay the ransom demanded by the attacker, One way n which cyber attackers launch this malware is through emails. 5, Malicious Software/Files Mi cous fles/software isa virus that contains a code to attack and harm computers, data, or ‘even entire networks. They include Trojans, viruses, spyware, worms, and botnets. 6. Configuration Mishaps ‘A misconfigured email server or email security service can have severe repercussions for your business, given that It can allow malicious emails to be sent to you without authentication. 7. Domain Squatting Domain squatting is the act of using someone's dom: name with the intent of profiting from their trademark. This type of threat can have adverse effects on businesses and their customers= 34 8, Client-Side Attacks i CCybercriminals use client-side attacks to intercept user sessions, conduct phishing attacks, and insert malicious content into emails, 9. Business Email Compromise (BEC) and Spear-Phishing Attacks Given that most people around cannot identify a sophisticated phishing email, cyber attackers take advantage of this by launching attacks that bypass all security protocols of a device. Many email users are therefore caught off-guard by these attacks. 10. Browser Exploit Kit Emails with internet browser vulnerabilities can lead to data leakage, identity theft, and access 'ssues in your accounts, Sometimes a lnk in your browser kit may contain an abused code that Cybercriminals can use to exploit your email, 11. File Format Exploits ‘rigger flaws in these applications. 3. WRITE THE STEPS TO SECURE E-MAIL?SECURE E-MAIL, 1. Always enable Two-Factor authentication Some forms of authentication, such as SMS or ema ‘verification, are less secure than others 2. Take password security seriously Everyone says this,35 numbers, letters, and punctuation. In this way you can fend off brute force attacks. Avoid writing down your passwords, and never share them with anyone. 3. Use encrypted email Corporate data breaches have affected millions of people. Hackers have gotten into the servers of some of the largest companies in the world, including Yahoo! Linkedin, and Tumblr, stealing passwords, phone numbers, and credit cards. Switching to an encrypted email provider, specifically one with end-to-end encryption and zero access encryption 4, DEFINE VIRUS? EXPLAIN ABOUT DIFFERENT TYPES OF VIRUS? ‘A computer virus is a kind of malicious computer program, which when executed replicates itself and inserts its own code. When the replication is done, this code infects the other files and program present on your system. File Virus: ‘This type of virus infects the system by appending itself to the end ofa file It changes the start of a program so that the control jumps to its code. Boot sector Virus: Itinfects the boot sector of the system, executing every time system is booted and before the operating system is loaded. It infects other bootable media like floppy disks. These are also known as memory viruses. Macro Viru: Unlike most viruses which are written in a low-level language(like C or assembly language), these are written in a high-level language like Visual Basic. These viruses are triggered when a program capable of executing. Source code Virus: It looks for source code and modifies it to include virus and to help spread it. Browser Hijacker: ‘This virus is coded to target the user's browser and can alter the browser settings. Multipartite Virus ‘type of virus thats very infectious and can easily spread on your computer system. It can infect36 multiple parts of a system including memory, files, and boot sector which makes it difficult to contain. 5. WHAT IS ANTIVIRUS? AND EXPLAIN VARIOUS TYPES OF ANTIVIRUS? Antivirus software is a type of program designed and developed to protect computers from malware like viruses, computer worms, spyware, botnets, rootkits, keyloggers and such, Antivirus programs function to scan, detect and remove viruses from your computer. All antivirus programs can be organized into the following three categories: Standalone Antivirus Software Standalone antivirus software isa specialized tool designed to detect and remove certain viruses. Itis commonly referred to as portable antivirus software because it can also be installed on a USB drive and used by administrators to run an emergency scan of an infected system Security Software Suites ‘As mentioned above, security software suites are more than just antivirus programs. In addition to being able to detect and remove viruses, they are also equipped to fight all other types of malicious software and provide round-the-clock protection for your computer and files. Cloud-Based Antivirus Software Cloud-based antivirus software is a fairly new type of antivirus technology that analyzes your files in the cloud rather than your computer in order to free up your computational resources and allow for a faster response. These programs typically consist of two parts - the client that is installed on your computer and runs periodic virus and malware scans without taking up too much memory and the web service that processes the data gathered by the client and inspects it for matches in its virus and malware database.> a ae 37 6. WHAT IS FIREWALL? EXPLAIN ABOUT FUNCTIONS & TYPES OF FIREFALL? | A Firewall is a security system to protect an internal network from unauthorized servers and networks basedon predefined rules. it acts as a barrier and only allows the secured network to send or receive data FUNCTIONS + Any data which enters or exits a computer network has to pass through the Firewall semester Y sspears ‘+ Allthe valuable information stays 3 sRerineted Unknown Tame intact if the data packets are securely passed through the Firewall + Every time a data packets passed through a Firewall it records it which allows the User to record thenetwork activity = Nodata can be modified as itis held securely within the data packets 1. Packet ‘+ One of the oldest types of Firewall ring Firewall « Thistype of Firewall creates a checkpoint atthe traffic router. Only the secure and verified IP address or networks are allowed for the further flow of data «The data packets are not verified, Le. the information or datais not opened at the Firewall stage They are easy to use and do not overload the device and do not affect its processing or functioning speed 2. Application Level Gateway Firewall ‘+ Itis also known as Proxy Firewall ‘© When the user connects with the destination server, it forms a connection with the application gateway ‘The proxy then connects with the destination server and takes up the decision of forwarding the data packets Its a bit more secure in comparison to Packet Filtering Firewall* Strong Memory and processors are required for using this Firewall 3. Circuit Level Gateway Firewall * This works as the Sessions layer of the OS! Model * Using this, two Transmission Control Protocol (TCP) connections can be set up together * It can easily let the flow of data packets continue without consuming major computer resources * These Firewalls are not much efficient as they do not check the data packets and incase a data packet comprises malware, it will allow it to pass if the TCP connections are successfully done 4. Stateful Inspection Firewall * tis combination of data packet inspection and TCP connection. Until both the fields are verified, the information cannot be approved * They are less straining for the computer resources * However, they are a bit slow in comparison to other Firewalls 5. Next-Generation Firewall * The recently launched Firewall systems are known as the Next-Gen Firewalls ‘* Under this, the data packets are also thoroughly checked before being passed on to the destination address * These are still on the platform of improving and evolving and intend to use modern technology for automatic detection of errors and network safety 6. Software Firewall * Any firewall which is installed in a local device or a cloud server is called a Software Firewall * They can be the most beneficial in terms of restricting the number of networks being i eb connected to a single device and control the in-flow and out-flow of data packets - Software Firewall also time-consuming| Itensures that the malicious data indpoint of the 's stopped bef pa fore It reaches the e t of t FINE CRYP1 8. DEI ae TOGRAPHY? EXPLAIN IT FUNCTIONS (OR) FEATURES OF CRYPTOGRAPHY? Cryptography is technique of securing information and communications through use of codes 50 that only that person for whom the information is intended can understand it and process it. Thus preventing unauthorized access to information. The prefix “crypt” means “hidden” and suffix graphy means “writing” Features of Cryptography are as follows: Confidentiality: Information can only be accessed by the person for whom it is intended and no other person except him can access it. Integrity: Information cannot be modified in storage or transition between sender and intended receiver without any addition to information being detected. Non-repudiation: The creator/sender of information cannot deny his intention to send information at later stage. ‘Authentication: The identities of sender and receiver are confirmed. As well as destination/origin of information is confirmed. EXPLAIN THE TYPES OF CRYPTOGRAPHY ‘There are three types of cryptography: 1. Symmetric Key Cryptography: Itis an encryption system where the sender and receiver of mess to encrypt and decrypt messages. Symmetric Key Systems are faster and simpler but the age use a single common key problem is that sender and receiver have to somehow exchange key in a secure manner. The most popular symmetric key cryptography system is Data Encryption System(DES). 2. Hash Functions: ‘There is no usage of any key in this algorithm. A hash value with fixed length is calculated as per the plain text which makes it impossible for contents of plain text to be recovered. Many ‘operating systems use hash functions to encrypt passwords.40 3. Asymmetric Key Cryptography: Under this system a pair of keys is used to encrypt and decrypt information. A public key is used for encryption and a private key is used for decryption. Public key and Private Key are different. Even if the public key is known by everyone the intended receiver can only decode it because he alone knows the private key. 9. DEFINE DIGITAL SIGNATURES? TYPES OF CERTIFICATES? AA digital signature is a mathematical technique used to validate the authenticity and integrity of a message, software or digital document. It's the di | equivalent of a handwritten signature or stamped seal, but it offers far more inherent security. A digital signature is intended to solve the problem of tampering and impersonation in digital communications. Digital Signatures can provide evidence of origin, identity and status of electronic documents, transactions or digital messages. Type 1 Certificates These are given to the person or private users that are used to verify that perhaps the recipient'sname and contact details from the clearly specified subject area in the certifying agency's database. ‘Type 2 Certificates ‘These are issued tothe director or signatory authority of the organizations for ‘e-filing with ROC (Registrar of Companies). Type 2 certification is mandatory for people who have had to sign manual documents when submitting ROC returns. Type 3 Certificates These certificates are used for online participation or bidding at online tenders & e-auctions all around India, Sellers persue: certificate. ing to participate in online bidding should have a Type 3 digital tal signatures, like handwritten signatures, are unique to each signer. Digital signature providers, such as Docusign, foow ae Specific protocol, called PKI. PKI requires theeee. der to use am prov fathematical algorithm to generate two long numbers, called keys. One key 's public, and one key is private, When a signer el i igner electronically signs a document, the signature is created using the signer’s rivate key, which : ‘ey, which Is always securely kept by the signer. The mathematical algorithm acts like @ it data. The her, i cipher, creating data matching the signed document, called a hash, and encrypting that resulting encrypted datas the digital signature. The signature is also marked with the time that the document was signed. Ifthe document changes after signing, the digital signature invalidated. As an example, Jane signs an agreement to sell a timeshare using her private key. The buyer receives the document. The buyer who receives the document also receives a copy of Jane's public key. I the publickey can't decrypt the signature (via the cipher from which the keys were created), it means the signature isn't Jane’s, or has been changed since it w25 signed. The signature is then considered invalid. keys be created, conducted, To protect the integrity of the signature, PKI requires that the liable Certificate Authority and saved in a secure manner, and often requires the services of 2 (cA). Digital signature providers, ke Docusign, meet PKI requirements for safe digital signing. 11. EXPLAIN ABOUT COPYRIGHT ISSUE? Copyright infringement is the use or production of copyright-protected material without the copyright holder. Copyright infringement means that the rights afforded to the permission of th such as the exclusive use of a work for a set period of time, are being breached copyright holder, by athird party. Music and moves re two ofthe most well-known forms of entertainment that suffer from significant amounts of copyright infringement. Infringement cases may lead to which are amounts set aside in case of a possible lawsuit. contingent liabilities, 42, WHATARE GO! DIGITAL INITIATIVES IN HIGHER EDUCATION? Education, like virtually every other aspect of life today, has been influenced by technological advancements. The digital revolution is transforming the educational scene, particularly in higher education. Technology is providing new opportunities for kids to be4 enriched and stimulated. As a result, every educational institution is implementing a variety of digital initiatives in higher education to create a technology-based education system 1) SWAYAM-(Study Webs of Active Learing for Young Aspiring Minds) SWAYAM is a technical MOOC platform developed in India that aims to provide high-quality education to everyone, anytime, and anywhere via the internet. MOOCs are online courses that ive interactive learning content to numerous people at the same time 2) SWAYAM Prabha SWAYAM Prabha is a set of 32 Direct-To-Home (DTH) channels dedicated to providing high- quality edu n to students 24 hours a day, 7 days a week via the GSAT-15 satellite. Every day, students will be exposed to a new subject for at least 4 hours, which will be repeated 5 more times during the day, allowing them to learn at their own pace. 3) National Digital Library ‘The NDL is a government platform that collects metadata from presti international educational institutions. It is a digital library that houses textbooks, films, articles, simulations, lectures, fiction, and other forms of educational content. 4) E-Vidwan Itis agovernment-sponsored database of specialists and researchers that compiles academic and research profiles of scientists, faculty, and others working in prominent organizations in India and overseas, 5) Saransh Saransh isan education tool allowing CBSE-affliated schools and parents to conduct performance analyses and self-reviews. It enables them to assess pupi action as needed. 6) Ask A Question ' performance and take corrective—_ 7 43 jamya Pustakalya i its ag i re 'ya is the latest digital initiative in higher education. It is an online library with 0 ur i es accessible to people who have low vision blind or any other disability. The library has public in'ovork library has publications in a variety of disciplines, languages, and forms. It was produced by the and Daisy Forum of India (DF!) with Department of Empowerment of Persons with Disal assistance from Tata Consultancy Services (TCS) Access. 9) The National Programme on Technology Enhanced Learning (NPTEL) £1) was initiated by seven ‘The National Programme on Technology Enhanced Learning (NPT! Madras, Guwahati and Indian Institutesof Technology (Bombay, Delhi, Kanpur, Kharagpur, Roorkee) along with the Indian Institute of Science, Bangalore in 2003. civil engineering, com engineering and .d in this phase. Five core disciplines were identified, namely, puter science and engineering, electrical engineering, electronics and _ communi mechanical engineering and 235 courses in web/video format were develope’ The main goal of NPTEL To build on the engineering and core science courses launched previously in NPTEL Phases, at theundergraduate and postgraduate levels and management courses at the postgraduate level.
You might also like
Study Materials
PDF
No ratings yet
Study Materials
194 pages
Grade 8 - Exploring The Internet
PDF
No ratings yet
Grade 8 - Exploring The Internet
22 pages
L.I.T.E. Chapter 3 The Internet and The World Wide Web
PDF
No ratings yet
L.I.T.E. Chapter 3 The Internet and The World Wide Web
65 pages
Internet
PDF
No ratings yet
Internet
50 pages
Internetbasics SB
PDF
No ratings yet
Internetbasics SB
59 pages
Week 1 Internet
PDF
No ratings yet
Week 1 Internet
66 pages
Basics of Internet (Handouts)
PDF
No ratings yet
Basics of Internet (Handouts)
31 pages
Internet Technolgies & Web Design
PDF
No ratings yet
Internet Technolgies & Web Design
66 pages
Internet & WWW
PDF
No ratings yet
Internet & WWW
55 pages
Unit - 1 (Important Questions)
PDF
No ratings yet
Unit - 1 (Important Questions)
46 pages
Internet Basics
PDF
No ratings yet
Internet Basics
42 pages
Ict Unit 1-1
PDF
No ratings yet
Ict Unit 1-1
8 pages
ComApp Net S20
PDF
No ratings yet
ComApp Net S20
39 pages
The History of Internet
PDF
No ratings yet
The History of Internet
10 pages
Syllabus E - Commerce: B-Com Vi Sem (Hons) Subject - E-Commerce
PDF
No ratings yet
Syllabus E - Commerce: B-Com Vi Sem (Hons) Subject - E-Commerce
36 pages
Internet
PDF
No ratings yet
Internet
25 pages
Internet and Browsing
PDF
No ratings yet
Internet and Browsing
21 pages
Introduction To Internet Materials For First Two Units
PDF
No ratings yet
Introduction To Internet Materials For First Two Units
28 pages
HTML Unit1
PDF
No ratings yet
HTML Unit1
30 pages
Week 1 Internet
PDF
No ratings yet
Week 1 Internet
20 pages
ICT Material
PDF
No ratings yet
ICT Material
53 pages
Basic Networks
PDF
No ratings yet
Basic Networks
54 pages
LECTURE 01 Internet Basics
PDF
No ratings yet
LECTURE 01 Internet Basics
34 pages
Internet and World Wide Web
PDF
No ratings yet
Internet and World Wide Web
46 pages
M Unit-3 PDF
PDF
No ratings yet
M Unit-3 PDF
43 pages
Chap 1 PDF
PDF
No ratings yet
Chap 1 PDF
15 pages
Unit 1 (Basic)
PDF
No ratings yet
Unit 1 (Basic)
23 pages
Chapter 1 Internet Basics Class 10
PDF
No ratings yet
Chapter 1 Internet Basics Class 10
21 pages
Chapter - 1
PDF
No ratings yet
Chapter - 1
55 pages
Unit 1 Ip
PDF
No ratings yet
Unit 1 Ip
15 pages
It Assingment Raviraj Bonge Updated
PDF
No ratings yet
It Assingment Raviraj Bonge Updated
22 pages
School of Social Science Assignment of M.B.A. (1 Sem) : Jay Banjara
PDF
No ratings yet
School of Social Science Assignment of M.B.A. (1 Sem) : Jay Banjara
29 pages
Project Report "On Internet": Master of Management Studies I Year
PDF
No ratings yet
Project Report "On Internet": Master of Management Studies I Year
23 pages
Lecture 10 Networking Part 2
PDF
No ratings yet
Lecture 10 Networking Part 2
37 pages
FCET Unit 3
PDF
No ratings yet
FCET Unit 3
23 pages
Internet Administration
PDF
No ratings yet
Internet Administration
6 pages
Internet: Ravi Bhushan
PDF
No ratings yet
Internet: Ravi Bhushan
53 pages
The Internet Basics
PDF
No ratings yet
The Internet Basics
29 pages
Introduction To Computer Science Unit 2 Part 2
PDF
No ratings yet
Introduction To Computer Science Unit 2 Part 2
13 pages
Internet and WWW
PDF
No ratings yet
Internet and WWW
3 pages
Internet and World Wide Web: Sahithi Rao J Class: V-E, Roll No: 14
PDF
No ratings yet
Internet and World Wide Web: Sahithi Rao J Class: V-E, Roll No: 14
40 pages
Internet Introduction
PDF
No ratings yet
Internet Introduction
8 pages
Chapter 3 Internet
PDF
No ratings yet
Chapter 3 Internet
33 pages
Introduction To The Internet and Web
PDF
No ratings yet
Introduction To The Internet and Web
23 pages
The Intranet Extranet and Internet
PDF
No ratings yet
The Intranet Extranet and Internet
8 pages
CH 6 Internet-1
PDF
No ratings yet
CH 6 Internet-1
22 pages
Presentation On Internet
PDF
No ratings yet
Presentation On Internet
18 pages
Internet Technology (DCA-104) - Points To Remember
PDF
No ratings yet
Internet Technology (DCA-104) - Points To Remember
8 pages
Introduction To The Internet and Web
PDF
No ratings yet
Introduction To The Internet and Web
21 pages
Chapter 02 - Introduction To Technology
PDF
No ratings yet
Chapter 02 - Introduction To Technology
14 pages
11th Comp CH 10 Long Q
PDF
No ratings yet
11th Comp CH 10 Long Q
5 pages
Ict Unit 1
PDF
No ratings yet
Ict Unit 1
9 pages
E-Commerce Unit 2
PDF
No ratings yet
E-Commerce Unit 2
10 pages
Internet Concepts Inter Refers To International I.E. Global and Net Is Network Which Is A
PDF
No ratings yet
Internet Concepts Inter Refers To International I.E. Global and Net Is Network Which Is A
9 pages
Ge Elec M3
PDF
No ratings yet
Ge Elec M3
3 pages
Q What Are The Basic Building Blocks of Packets? A Packets Are Made Up of A Number of 0s and 1s in A Unique
PDF
No ratings yet
Q What Are The Basic Building Blocks of Packets? A Packets Are Made Up of A Number of 0s and 1s in A Unique
5 pages