0% found this document useful (0 votes)
14 views89 pages

AL GIT Lesson 5 6 7 8

The document provides an overview of multimedia, focusing on digital graphics, including definitions of pixels, resolution, color, and size. It explains the differences between raster and vector graphics, their file formats, and compression techniques. Additionally, it outlines graphic types and their applications in various fields such as education and advertising.

Uploaded by

Jewin Arthur
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
14 views89 pages

AL GIT Lesson 5 6 7 8

The document provides an overview of multimedia, focusing on digital graphics, including definitions of pixels, resolution, color, and size. It explains the differences between raster and vector graphics, their file formats, and compression techniques. Additionally, it outlines graphic types and their applications in various fields such as education and advertising.

Uploaded by

Jewin Arthur
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 89

A/L GIT

TUTE 03
ictfromabc.com

Multimedia 1. Pixel / mslai,


nyqudOH
A pixel is the smallest part of a digital
Multimedia is the integration of text, audio, image, appearing as a tiny dot of color.
visuals, and video to convey information' mslai,hla hkq l=vd j¾K ;s;la f,i Èiajk
nyqudOH hkq f;dr;=re m%ldY lsÍu i|yd wxls; rEmhl l=vdu fldgihs'
fm<" Y%jH" oDYH iy ùäfhda tAldnoaO lsÍuhs'
When arranged in a grid, pixels form a pixel
It is used in education, entertainment, array, creating a full image.
business, and more to enhance cd,lhl ilik úg" mslai,, mslai,a wrdjla
communication and engagement' idohs" iïmQ¾K rEmhla ks¾udKh lrhs'
wOHdmkh" úfkdaodiajdoh" jHdmdr iy ;j;a
fndfyda foa ;=< ikaksfõokh iy kshe,Su jeä
ÈhqKq lsÍu i|yd Ndú;d fõ' Matrix Display
A 8×8 matrix display with a total of 64 pixels.
Digital graphic
wxls; .%dmsl

Digital graphics are visual content created array


using computers, divided into raster (pixel-
based, ex: JPEG) and vector (path-based, ex:
SVG).
wxls; .%dmsl hkq mß.Kl Ndú;fhka
ks¾udKh lrk ,o oDIH wka;¾.;hka jk Row
w;r th raster ^mslai,a-mdol" Wod( JPEG&
iy vector ^ud¾.-mdol" Wod: SVG& f,i
fnod we;'

Tools like Photoshop and Illustrator are column

used for creating graphics, which are


BPP (Bits Per Pixel) refers to the number of
applied in web design, advertising, and
bits used to represent the color of a single
more'
pixel in a digital image.
Photoshop iy Illustrator jeks fuj,ï
.%dmsl ks¾udKh lsÍu i|yd Ndú;d lrhs" BPP (Bits Per Pixel) hkq wxls; rEmhl ;ks
tAjd fjí ks¾udKlrKh" m%pdrKh iy ;j;a mslai,hl j¾Kh ksrEmKh lsÍug Ndú;d
foa i|yd fhdod .efka' lrk ìgq .Kkhs'

Basic elements of digital graphics • 1 BPP


wxls; .%dmslhl uQ,sldx. 0 black
1 white 2 colors (21)
1. Pixel / mslai,
2. Resolution / úfNaokh • 2 BPP
00 black
3. Color / j¾Kh
01
4. Size / m%udKh 10 4 colors (22)
11 white

• 24 BPP (True pixel - 224)


16.7 million colors
ictfromabc.com

2. Resolution / úfNaokh 3. Color / j¾Kh

Resolution refers to the number of pixels in In digital graphics, color in a pixel is


an image, defined by its physical represented using a combination of
dimensions (width × height). numerical values that define its hue,
úfNaokh hkq rEmhl we;s mslai, .Kk" tys saturation, and brightness.
fN!;sl udkhka ^m<, × Wi& u.ska w¾: wxls; .%dmsl j,§" mslai,hl j¾Kh tys
oelaùu. meyeh" ika;Dma;sh iy §ma;sh ks¾jpkh
lrk ixLHd;aul w.hkaf.a tl;=jla
• Higher resolution Ndú;fhka ksrEmKh lrhs'
by< úfNaokh
Each pixel stores color information using a
specific color model.
iEu mslai,hlau ksYÑ a ; j¾K wdlD;shla
Height 3072 Ndú;fhka j¾K f;dr;=re .nvd lrhs'
pixels
• RGB (Red, Green, Blue):
20.1 MB
96 dpi Colors are defined by mixing red, green,
24 bits and blue values (ex: (255, 0, 0) for pure
Width 5464 pixels red).
r;=" fld< iy ks,a w.hka ñY% lsÍfuka
Sharper, clearer images, but larger file sizes.
^Wod( ^255,0,0& msßisÿ r;= i|yd& j¾K
jvd ;shqKq" meyeÈ,s rEm" kuq;a f.dkq m%udKh
ks¾udKh lrhs'
úYd, fõ'

• Lower resolution
wvq úfNaokh

Height 46
pixels

1.4 KB
72 dpi
8 bits

Width 81 pixels
• CMYK (Cyan, Magenta, Yellow, Key /
Black):
Blurrier images, but smaller file sizes. Used for printing, where colors are
fkdmeyeÈ,s rEm" kuq;a f.dkq m%udKh l=vd defined by subtracting light.
fõ. fuh uqøK lghq;= i|yd Ndú;d lrk
w;r" j¾K w¾: oelafjkafka wdf,dalh
wvq lsÍfuks'
ictfromabc.com

4. Size / m%udKh Graphic Types


.%dmsl m%rEm
The size of a graphic is influenced by its
resolution and color depth (bits per pixel). Graphic types are categories of visual
.%dmsl tll m%udKh" tys úfNaokh ^m<,× content that are created, edited, and used
Wi& iy j¾K .eUqr ^mslai,hlg ìgq& u; for communication, design, or artistic
n,mdhs' purposes.
.%dmsl j¾. hkq ikakf s õokh" ks¾udK fyda
Larger dimensions and richer color details l,d;aul wruqKq i|yd idok" ixialrKh
lead to increased file sizes. lrk iy Ndú;d lrk oDYH wka;¾.;fha
úYd, udk ^m%udK& iy jvd;a ixlS¾K j¾K j¾.SlrKhka fõ'
úia;r" f.dkqfõ m%udKh jeä ùug fya;= fõ' 1. Raster graphics
Compression techniques are applied to 2. Vector graphics
reduce file size while maintaining 3. 3D graphics
acceptable quality'
iïmSvk ;dËK Ndú;d lr f.dkqfõ m%udKh They are defined by how they are created
wvq lrk w;r" ms<s.; yels .=Kd;aulNdjh (ex: pixels, vectors, or 3D models) and their
mj;ajd .kS'
purpose (ex: static images, animations, or
interactive media).
tAjd w¾: olajkafka tAjd iEfok wdldrh
^WodyrKhla f,i" mslai," fjlag¾" fyda 3D
wdlD;s& iy tAjdfha wruqK ^WodyrKhla
f,i" iaÓr rEm" animation" fyda
wka;¾l%shdldÍ udOH& wkqj h.

Raster Graphics Vector Graphics

Creation of the Created using pixels (tiny squares Created using mathematical
Graphic of color). equations (lines, curves, shapes).
.%dmsl ks¾udKh mslai,a ^j¾Kj;a l=vd p;=ri%& .‚;uh iólrK ^fraLd" jl%"
Ndú;d lr ks¾udKh lr we;' yev;,& Ndú;d lr ks¾udKh lr
we;'

File Formats JPEG, PNG, GIF, BMP, TIFF. SVG, AI, EPS, PDF.
f.dkq wdlD;s

Examples Photographs, web images, Logos, icons, infographics,


WodyrK scanned artwork. illustrations.
PdhdrEm" fjí rEm" ialEka l< l,d ,dxPk" whslk" f;dr;=re rEm iy
lD;s wdÈh i|yd Ndú;d fõ' ks¾udK i|yd Ndú;d fõ'
Memory Space Larger file sizes, especially at high Smaller file sizes due to
u;l wjldYh resolutions. mathematical data storage.
by< úfNaokhkays§ f.dkq m%udKh .‚;uh o;a; .nvd lsÍu ksid f.dkq
úYd, fõ' m%udKh l=vdhs'

Common Software Adobe Photoshop, GIMP, Corel Adobe Illustrator, CorelDRAW,


fmdÿ uDÿldx. PaintShop Pro. Inkscape.
ictfromabc.com

Lossy Compression Lossless Compression


ydks jk iïmSvkh ydks fkdjk iïmSvkh
Reduce file size by removing some data (sacrificing Reduce file size without losing any data (no quality
quality). loss).
iuyr o;a; bj;a lsÍfuka f.dkq m%udKh wvq lrhs' lsisÿ o;a;hla wysñ fkdù f.dkq m%udKh wvq lrhs'
^.=Kd;aulNdjh lem lsÍu&' ^.=Kd;aul w,dNhla fkdue;&'
1. Analyze image. / rEmh úYaf,aIKh lsÍu' 1. Analyze image. / rEmh úYaf,aIKh lsÍu'
The algorithm looks at the image and The algorithm looks for patterns or
identifies areas with fine details or subtle repetitions in the image (ex: large areas of
color variations. the same color).
we,af.dß;u rEmh foi n,d ishqï úia;r fyda we,af.dß;u" rEmfha rgd fyda mqkrdj¾;k
ishqï j¾K fjkialï iys; m%foaY y÷kd .kS' fidhhs' ^Wod( tlu j¾Kfhka" úYd, m%foaY&'
2. Remove less important data. 2. Store patterns efficiently.
wvq jeo.;a o;a; bj;a lrhs' rgd ld¾hlaIuj .nvd lrhs'
It removes details that are less noticeable to Instead of storing the same data multiple
the human eye (ex: tiny color changes or times, it uses shortcuts (ex: "100 red pixels"
textures in the background) instead of listing each pixel individually)
th ñksia weig wvqfjka fmfkk úia;r bj;a tlu o;a; lsysm j;djla .nvd lsÍu fjkqjg"
lrhs ^Wod'" l=vd j¾K fjkiaùï fyda miqìfï th fláux Ndú;d lrhs ^Wod'" tla tla mslai,
jhkh& ;ks ;ksj ,ehsia;=.; lsÍu fjkqjg —r;= mslai,
3. Compress / iïmSvkh 100—&
The remaining data is compressed using 3. Compress / iïmSvkh
mathematical techniques to make the file The data is compressed using mathematical
smaller. techniques, but no information is deleted.
f.dkqj l=vd lsÍu i|yd b;sß o;a; .‚;uh o;a; .‚;uh Ys,amSh l%u Ndú;fhka
Ys,amSh l%u Ndú;fhka iïmSvkh lrhs' iïmSvkh lr we;" kuq;a lsisÿ f;dr;=rla uld
fkdoukq ,efí'
4. Save / iq/lSu
The image is saved in a smaller file size, but 4. Save / iq/lSu
some quality is lost permanently. The image is saved in a smaller file size, but
rEmh l=vd f.dkq m%udKhlska iqrlsk kuq;a the original quality is preserved. When
iuyr .=Kd;aul Ndjh iaÓrju ke;s ù hhs' opened, the image is reconstructed perfectly.
rEmh l=vd f.dkq m%udKhlska iqrlsk kuq;a uq,a
.=K;ajh iq/fla' újD; l< úg" rEmh mßmQ¾K
f,i m%;sks¾udKh fõ'
• JPEG, MPEG, WEBP • PNG, GIF, TIFF, BMP
• Web images / fjí mska;+r, photos / • Graphics / .%dmsl, logos / ,dxPk,
PdhdrEm, videos / ùäfhda, audio / Y%jH professional editing / jD;a;Sh ixialrK'
• Much smaller file size. • No quality loss / .=Kd;aul Ndjh'
jvd l=vd f.dkq úYd,;ajh' • Perfect for editing and archiving.
• Ideal for web use. ixialrKh iy ixrlaIKh i|yd
fjí Ndú;h i|yd jvd;a iqÿiqh' mßmQ¾Khs'
• Permanent loss of data • Larger file size compared to lossy.
o;a; iaÓr ke;sùu' lossy yd ii|k úg úYd, f.dkq m%udKh'
• Lower image quality • Not ideal for web use.
rEmfha wvq .=Kd;aulNdjh' fjí Ndú;h i|yd iqÿiq fkdfõ'
• Permanently removes data to reduce file • Retains all data while reducing file size,
size, sacrificing quality. maintaining original quality.
f.dkq m%udKh wvq lsÍug" .=Kd;aul Ndjh f.dkq m%udKh wvq lrñka" uq,a .=K;ajh
lem lsÍug o;a; iaÓrju bj;a lrhs' mj;ajd .ksñka ish¨ o;a; r|jd .kS'
• Does not open in its original form. • Opens in its original form.
tys uq,a iajrEmfhka újD; fkdfõ' tys uq,a iajrEmfhka újD; fõ'
ictfromabc.com

Graphic File Formats 3. BMP (Bitmap)


.%dmsl f.dkq wdlD;s
Uncompressed image format for high-
1. JPG (Joint Photographic Experts quality storage.
Group) Wiia ;;a;ajfha .nvd lsÍu i|yd iïmSvkh
fkdl< rEm wdlD;shla fõ'
Best for photographs and realistic images
with gradients. 4. GIF (Graphics Interchange Format)
wkql%uK iys; h:d¾:jd§ rEm iy PdhdrEm
i|yd fyd|u fõ' Best for simple animations and low-color
images.
2. PNG (Portable Network Graphics) ir, iÔúlrK iy wvq j¾K rEm i|yd
fyd|u fõ'
Ideal for images requiring high quality and
transparency. 5. SVG (Scalable Vector Graphics)
Wiia ;;a;ajfhka iy úksúoNdjfhka hq;a
rEm i|yd jvd;a iqÿiqh' Vector-based format for scalable graphics.
mßudKh l< yels .%dmsl i|yd vector-
based wdlD;shla fõ'

Feature JPG PNG BMP GIF SVG


.

Compression Lossy Lossless Uncompressed Lossless Vector


(scalable)
.

Color Depth 24-bit 24-bit or 24-bit 8-bit Unlimited


8-bit
.

Transparency No Yes No Yes (basic) Yes


(alpha)
.

Animation No No No Yes No
.

Best For Photos Logos, Legacy systems Simple Vector


icons animations graphics
.

File Size Small Medium Very large Small Small to


to large medium
.
ictfromabc.com

Graphic design • Adobe Photoshop


.%dmsl ks¾udK Best for photo editing and raster-
based designs.
Graphic design is the process of creating PdhdrEm ixialrKh iy raster-
visual content to communicate ideas or mdol ks¾udK i|yd fyd|u fõ'
messages.
.%dmsl ks¾udKh hkq woyia fyda m‚jqv • Adobe Illustrator
ikakf s õokh lsÍu i|yd oDYH wka;¾.;h Ideal for vector graphics like logos
ks¾udKh lsÍfï l%shdj,shhs' and icons.
,dxPk iy whslk jeks vector .%dmsl
It combines text, images, colors, and
i|yd jvd;a iqÿiqh'
layouts to make designs that are both
attractive and meaningful. • Canva
th fm<" rEm" j¾K" iy msgq ie,iqï User-friendly, great for quick social
tAldnoaO lr wdl¾YkSh yd w¾:j;a ks¾udK
idohs' media and marketing designs.
mßYS,l-ys;ldó" blauka iudc udOH
iy wf,úlrK ie,iqï i|yd
Used in logos, posters, websites, and more, úYsIaghs'
it helps solve problems and convey
information clearly. • CorelDRAW
,dxPk" fmdaiag¾" fjí wvú" iy ;j;a Powerful for vector design and
fndfyda foaj,a i|yd th Ndú;d fõ' layout projects.
vector ie,iqï iy msßie,iqï
Graphic design isn’t just about aesthetics, jHdmD;s i|yd n,j;a'
it’s about making communication effective
and impactful. • GIMP
.%dmsl ks¾udKh hkq fi!kao¾hh muKla Free and open-source, great for
fkdj" ikakf s õokh M,odhS yd n,mEï iys; image editing and design.
lsÍfï l,djls' ksoyia iy újD; uQ,dY%" rEm
ixialrKh iy ie,iqï i|yd
Graphic Design Software úYsIaghs'
.%dmsl ks¾udK uDÿldx.

Graphic design software are tools used to


create and edit visual content for print and
digital media.
.%dmsl ks¾udK uDÿldx. hkq uqøs; yd wxls;
udOH i|yd oDYH wka;¾.;h ks¾udKh lsÍu
yd ixialrKh lsÍu i|yd Ndú;d jk
fuj,ï fõ'

They help designers work with images,


typography, layouts, and effects to produce
professional designs.
ks¾udKlrejkag jD;a;Sh ks¾udK ksIamdokh
lsÍug rEm" uqøK Ys,amh" msßie,iqï iy
n,mEï iuÕ jev lsÍug Wojq lrhs'
ictfromabc.com

GIMP After installation


(GNU Image Manipulation Program) ia:dmkh lsÍfuka miqj

Free, open-source image editor for photo


retouching, graphic design, and digital art.
PdhdrEm kej; ,nd .ekSu" .%dmsl ks¾udKh
iy wxls; l,dj i|yd fkdñf,a" újD; uQ,dY%
rEm ixialdrlhls'

Works on Windows, macOS, and Linux.


Windows, macOS iy Linux u; l%shd lrhs'

Supports various file formats, including


PSD, JPEG, PNG, and GIF, making it a
versatile choice for designers .
PSD, JPEG, PNG iy GIF we;=¿ úúO f.dkq
wdlD;s i|yd iyh olajhs" th
ks¾udKlrejka i|yd nyqld¾h f;aÍula
lrhs'

Widely used by beginners.


wdrïNlhska úiska nyq,j Ndú;d fõ.

Installing GIMP

Visit https://www.gimp.org Create a New File


https://www.gimp.org fj; msúfikak kj f.dkqjla idokak

1. File Menu
Download the correct version for your OS.
Tnf.a OS i|yd ksjerÈ wkqjdoh nd.; 2. New - Ctrl+N (Windows/Linux)
lrkak' Cmd+N (macOS).

Follow the installation prompts. 3. Set up new image - Image Size


ia:dmk úuiSï wkq.ukh lrkak'
Resolution,
4. Click OK
ictfromabc.com

Graphical User Interface


uDÿldx.fha Ñ;%l mßYS,l w;=reuqyqK;
Title bar

The main Brush tools


Menu bar
toolbox

Brush
Canvas settings

Text & tool


options
Layers
Status bar
panel

1. The Main Toolbox Selection Tools / f;aÍfï fuj,ï:


m%Odk fuj,ï ;Srej For selecting parts of an image.
(Edit → Preferences →Toolbox) rEmhl fldgia f;aÍu i|yd'

The Main Toolbox is the central hub for Paint Tools / j¾K .e,aùfï fuj,ï:
essential image editing tools. For drawing and filling.
m%Odk fuj,ï ;Srej rEm ixialrKh we£u iy msrùu i|yd'
i|yd w;HjYH fuj,ïj, flakø a Sh
ia:dkhhs' Transform Tools
mßñ;sh fjka lsÍfï fuj,ï:
Located on the left side, it includes For moving, resizing, or rotating (ex: Move,
tools for selection, painting, Scale, Crop).
transformation, and color adjustment. p,kh lsÍu" m%udKh fjkia lsÍu fyda
th fmkqfï jï me;af;a msyg s d we;s w;r" N%uKh lsÍu i|yd'
f;aÍï" msk;a dre lsÍu" mßj¾;kh iy
j¾K ixialrKh i|yd fuj,ï we;=<;a Color Tools / j¾K fuj,ï:
fõ' For color adjustments (ex: Color Picker).
j¾K ixialrKh i|yd'
Each tool has customizable options in
the Tool Options panel below. Text & Path Tools / fm< yd ud¾. fuj,ï:
iEu fuj,ulau fuj,ï úl,am mek,h For adding text or creating paths.
hgf;a wNsreÑlrKh l< yels úl,am fm, tl;= lsÍu fyda ud¾. iE§u i|yd'
we;'
Other Tools / fjk;a fuj,ï:
The tools in Main Toolbox are For advanced tasks.
categorized by function. ÈhqKq ld¾hhka i|yd'
m%Odk fuj,ï ;Srej ;=< we;s fuj,ï
ld¾hh wkqj j¾. lr we;'
ictfromabc.com

• Selection Tools / f;aÍfï fuj,ï:

Tool Name Icon Shortcut Description


.

Rectangle Selects rectangular or square areas in the image.


Select R rEmfha iDcqfldaKdi%dldr fyda p;=ri%dldr m%foaY
f;dard .kS'
.

Ellipse Selects circular or elliptical areas in the image.


Select E rEmfha jD;a;dldr fyda b,smaidldr m%foaY f;dard
.kS'
.

Free Select Allows freehand or polygonal selections by


(Lasso) drawing around an area.
F
m%foaYhla jgd w;ska we£u fyda nyqwi%dldr f;aÍï
lsÍug bv fohs'
.

Fuzzy Selects areas with similar colors based on a


Select tolerance threshold.
U
(Magic f;aÍï iSudj wkqj iudk j¾K we;s m%foaY f;dard
Wand) .kS'
.

Select by Selects all pixels in the image that match the


Color clicked color.
Shift + O
la,sla l< j¾Khg .e,fmk mslafi,a ish,a,
rEmfha f;dard .kS'
.

Scissors Creates selections by "snapping" to edges in the


Select I image.
rEmfha odrj,g —iakema— lrñka f;aÍï idohs'
.

Foreground Selects foreground objects by marking them


Select Shift + F with a brush.
mski
a ,la Ndú;fhka rEmfha miqìu f;dard.kS'
.
ictfromabc.com

• Paint Tools / j¾K .e,aùfï fuj,ï:

Tool Name Icon Shortcut Description


.

Paintbrush Paints with a brush stroke.


P f;dard .;a mski
a ,a m%udKhg wkqj iqug jQ bß
we£ug iy j¾K fh§ug'
.

Pencil Draws hard-edged lines.


N f;dard .;a fldgi u; j¾K fh§u iy f;dard
.;a mekai,a m%udKhg wkqj bß we£u'
.

Eraser Erases parts of an image or layer.


Shift + E idudkH ulkhla wdldrhg l%shdlrñka
.%dmslh u; we¢ bß uld oeóug'
.

Airbrush Paints with a soft, airbrushed effect.


A j¾K mski a ,h fuka .%dmslh u; j¾K ù§ula
f,i l%shdlrñka j¾K .e,aùug'
.

Ink Simulates calligraphy or ink strokes.


K j¾K mskia ,h fuka .%dmslh u; j¾K
.,ajhs'
.

MyPaint Uses MyPaint brushes for artistic painting.


Brush Y MyPaint nqreiq Ndú;d lrñka l,d;aul
msk;
a dre lsÍu'
.

Bucket Fill Fills areas with a color or pattern.


Shift + B m%foaY j¾Khla fyda rgdjlska mqrjd oeóu'
.

Gradient Fills areas with a gradient.


L m%foaY wkql%uKhlska mqrjhs'
.

Clone Copies from a pattern or image.


C rgdjla fyda rEmhlska msgm;a lsÍu'
.

Perspective Copies into a changed perspective.


Clone Shift + C fjkia jQ oDYH fldaKhlg msgm;a lsÍu'
.

Heal Corrects small defects.


H iq¿ fodaI ksjerÈ lsÍu'
.

Blur / Blurs or sharpens.


Shift + U
Sharpen wvq lsÍu fyda ;shqKq lsÍu'
.

Smudge Smears colors.


S j¾K .,d hdu'
.

Dodge / Lightens or darkens.


Shift + D
Burn wdf,dalu;a fyda w÷re lsÍu'
.
ictfromabc.com

• Transform Tools / mßñ;sh fjka lsÍfï fuj,ï:

Tool Name Icon Shortcut Description


.

Align Tool Align layers, selections, or paths.


Q ia:r" f;aÍï fyda ud¾. ixúOdkh lsÍu'
.

Move Move layers, selections, or paths.


M ia:r" f;aÍï fyda ud¾. p,kh lsÍu'
.

Crop Crop an image to a selected area.


Shift + C rEmhla f;dard.;a m%foaYhlg lemSu'
.

Rotate Rotate a layer, selection, or path.


Shift + R ia:rhla" f;aÍula fyda ud¾.hla N%uKh lsÍu'
.

Scale Resize a layer, selection, or path.


Shift + S ia:rhla" f;aÍula fyda ud¾.hla m%udKh
fjkia lsÍu'
.

Shear Slant an image horizontally or vertically.


Shift + H rEmhla ;sria fyda isria f,i we,ùu'
.

Perspective Adjust perspective distortion.


Shift + P oDYH wdjrkh ilia lsÍu'
.

Handle Transform using draggable handles.


Transform Shift + L weof.k hd yels yiqre Ndú;fhka
mßj¾;kh lsÍu'
.

Flip Flip an image horizontally or vertically.


Shift + F rEmhla ;sria fyda isria f,i fmr<Su'
.

Cage Warp an area using a flexible cage.


Transform Shift + G kuHYS,S l+vqjla Ndú;fhka m%foaYhla
wdjrKh lsÍu'
.

Warp Smudge and distort areas interactively.


Transform No Default wka;¾l%shdldÍj m%foaY smudge lr distort
lsÍu'
.
ictfromabc.com

• Color Tools / j¾K fuj,ï:

Tool Name Icon Description Common Uses


.

Color Balance Adjusts the balance of colors in Correcting color casts or


shadows, midtones, and highlights. adding creative color effects.
fijke,s" uOHu wdf,dal" iy by< j¾K úlD;s ksjerÈ lsÍu fyda
wdf,dalj, j¾K iu;=,s;;djh ilia ks¾udKd;aul j¾K wdprK
lsÍu' tl;= lsÍu'
.

Hue- Changes the hue, saturation, and Enhancing or reducing color


Saturation lightness of colors in an image. intensity, changing color
rEmhl j¾Kj, j¾Kdj,sh" tones.
ix;Dma;;djh" iy wdf,dalu;a;djh j¾K ;Sj%;djh jeä lsÍu fyda
fjkia lsÍu' wvq lsÍu" j¾K iajrEm fjkia
lsÍu'
.

Colorize Applies a single hue to the entire Creating sepia tones or


image, creating a monochromatic tinted images.
effect. fimshd wdprK fyda j¾K
rEmfha iïmQ¾K m%foaYhg ;ks wdf,ams; rEm ks¾udKh lsÍu'
j¾Kdj,shla fh§u" tAlj¾K
wdprKhla ks¾udKh lsÍu'
.

Brightness- Adjusts the overall brightness and Fixing underexposed or


Contrast contrast of an image. overexposed images.
rEmfha iuia; wdf,dalu;a;djh iy wvq wdf,dal y< rEm ksjerÈ
;Sj%;djh ilia lsÍu' lsÍu'
.

Threshold Converts an image to black and white Creating high-contrast,


based on a brightness threshold. binary images
wdf,dalu;a;djfha iSudjla wkqj rEmhla (ex: silhouettes).
l¿ iy iqÿ meyehg mßj¾;kh lsÍu' by< ;Sj%;djfhka hq;a oaúuh
rEm ks¾udKh lsÍu ^Wod(
is,ajÜ&'
.

Levels Adjusts the tonal range (shadows, Fine-tuning exposure and


midtones, highlights) using a contrast.
histogram. wdf,dalu;a;djh iy
ysiafgda.%Euhla Ndú;fhka fijke,s" ;Sj%;djh iqlaIuj ilia lsÍu'
uOHu wdf,dal" iy by< wdf,dalj,
fgdak,a mrdih ilia lsÍu'
.

Curves Allows precise control over Advanced color correction


brightness and contrast using a curve and tonal adjustments.
graph. ÈhqKq j¾K ksjerÈ lsÍï iy
jl% m%ia;drhla Ndú;fhka fgdak,a ilia lsÍï'
wdf,dalu;a;djh iy ;Sj%;djh ms<sn|
ksYaÑ; md,kh ,nd §u'
.

Desaturate Removes color from an image, Creating black-and-white


converting it to grayscale. images.
rEmfhka j¾K bj;a lsÍu" th w¿ l¿ iy iqÿ rEm ks¾udKh
meyehg mßj¾;kh lsÍu' lsÍu'
.
ictfromabc.com

• Text & Path Tools / fm< yd ud¾. fuj,ï:

Tool name Icon Shortcut Description


.

Path Allows selecting and modifying paths.


B ud¾. f;dardf.k fjkia lsÍug bv fohs'
.

Color Picker Selects the color of any image opened on your


screen.
O
Tnf.a ;srfha újD; lr we;s ´kEu rEmhl j¾Kh
f;dard .kS'
.

Magnify Alters the zoom level of the image.


Z
(Zoom) rEmfha úYd,k uÜgu fjkia lrhs'
.

Measure Shows distances and angles.


Shift + M ÿr iy fldaK fmkajhs'
.

Text Places text into the image.


M rEmhg fm< we;=<;a lrhs'
.

2. Text & Tool Options 4. Canvas


fuj,ï úl,am lekajia

Displays settings for the active tool. The main working area where images
(ex: font for text) are created and edited.
il%Sh fuj,u i|yd ieliqï fmkajhs m%Odk jev lrk m%foaYh" rEm ks¾udKh
^Wod( fm< i|yd wl=re rgdj&' iy ixialrKh isÿ lrkq ,nhs'
• Windows → Dockable Dialogs • File → New
→ Tool Options. • Ctrl + N (to create a blank canvas
• Shift + Ctrl + T or File / ysia lekajia i|yd fyda
f.dkqjla idokak)
3. Menu Bar • File → Open or Ctrl + O (to open an
fukq ;Srej image / rEmhla újD; lsÍug).
Provides access to file operations,
One window can be kept open and use
editing tools, layers, filters, and settings.
f.dkq l%shdldrlï" ixialrK fuj,ï" others as necessary.
ia:r" fmryka" iy ieliqï fj; m%fõYh tla ljq¿jla újD;j ;ndf.k wfklaj
,nd fohs' wjYH mßÈ Ndú;d lrkak'

• Windows → Single-Window Mode


ictfromabc.com

5. Brush Basics of GIMP


mskai, GIMP uDÿldx.fha uQ,sldx.

They define how the paint is applied to Opening a New Graphic.


the canvas. kj .%dmsl tlla újD; lsÍu'
lekajia fj; msk;a dre fhoùfï wdldrh
w¾: olajhs' 1. Click File → New / press Ctrl + N
• Windows → Dockable Dialogs
→ Brushes. 2. Set Dimensions / udk ilia lrkak:
• Shift + Ctrl + B In the New Image dialog box
New Image ixjdo fldgqfõ:
6. Brush Settings • Adjust Width and Height
mskai,a ieliqï
manually.
Allows customization of brush m<, iy Wi w;ska ilia lrkak'
• Choose a template.
properties like size, hardness, and
wÉpqjla f;darkak'
dynamics.
(ex: A4, Web Banner)
mski
a ,aj, m%udKh" oeä nj" iy
.;sl;djh jeks .=Kdx. wNsreÑlrKh
3. Click OK to create the canvas.
lsÍug bv fohs.
lekajia idod .ekSug"OK la,sla lrkak
Opens when a brush tool is selected.
mski
a ," fuj,ula f;dard.;a úg wßkq Saving Graphic.
,efí' .%dmsl iq/lSu'
• Shift + Ctrl + T
• Windows → Dockable Dialogs 1. Click File → Save (or press Ctrl + S).
→ Tool Options.
2. Name Your File / f.dkqjg kula fokak:
7. Status Bar Enter a name in the Save Image dialog
;;aj ;Srej box.
save image ixjdo fldgqfõ kula
Shows zoom level, file size, and tooltips. we;=<;a lrkak'
Located at the bottom.
úYd,k uÜgu" f.dkq m%udKh" iy 3. Choose Location / ia:dkh f;darkak:
fuj,ï bÕs fmkajhs' my<ska msyg s hs' Select a folder under Places.
Always visible by default. ia:dk hgf;a nyd¨ula f;darkak.
fmrksñfhka ieuúgu oDYHudk fõ (ex: Documents, Desktop)
• Edit → Preferences → Interface
→ Show Status Bar. 4. Save as XCF / XCF f,i iq/lSu:
GIMP automatically saves in .xcf format.
8. Layers Panel GIMP iajhxl%Shj 'xcf wdlD;sfhka
ia:r mek,h iqrlaI;s lrhs'
(ex: design.xcf)
Manages image layers, blending
modes, and opacity.
rEm ia:r" ñY%K m%ldr" iy Click Save.
mdroDIH;djh l<ukdlrKh lrhs'
• Ctrl + L
• Windows → Dockable Dialogs
→ Layers
ictfromabc.com

Exporting for Sharing. Opening an Existing File.


fnod.ekSu i|yd Export lsÍu' mj;sk f.dkqjla újD; lsÍu'

1. Click File → Export As (or press Shift + 1. Click File → Open (or press Ctrl + O)
Ctrl + E).
2. Select File / f.dkqj f;darkak:
2. Name and Location / ku iy ia:dkh:
• Type a filename. • Browse to the location of the file.
f.dkqjla i|yd kula we;=<;a lrkak. f.dkqj msygs d we;s ia:dkhg .uka
lrkak'
(ex: final-image.png).
(ex: Desktop, Documents)
• Select a folder under Places.
• Choose the file you want to open.
ia:dk hgf;a nyd¨ula f;darkak'
újD; lsÍug wjYH f.dkqj
3. Choose File Format. f;darkak'
f.dkq wdlD;sh f;darkak. (ex: .jpg, .png, .xcf).

Under Select File Type, pick a format. • Click Open.


f.dkq j¾.h f;darkak hgf;a" wdlD;shla
f;darkak.
• JPEG (photos/PdhdrEm )
Creating a Graphic Using Multiple
• PNG (transparency/mdroDIH;d)
Images in GIMP.
• GIF (animations/iÔùlrK) rEm lsym
s hla Ndú;d lrñka .%dmslhla
ks¾udKh lsÍu'
4. Adjust Settings (if prompted):
ieliqï ilia lrkak ^wjYH kï&: Step 1:
• For JPEG: Set Up GIMP. / GIMP ilia lsÍu'
Set quality.
.=Kd;aulNdjh ilia lrkak' 1. Open GIMP. / GIMP újD; lrkak'
(ex: 90%).
• For PNG: 2. Switch to Single-Window Mode.
Enable transparency. ;ks ljq¿ m%ldrhg udre jkak'
mdroDIH;djh il%Sh lrkak'
3. Go to Windows → Single-Window
Click Export. Mode.

NOTE Step 2:
Exporting compresses the file for web / Open Your Images. / rEm újD; lsÍu'
print use.
wmkhkh lsÍfuka f.dkqj ^web$print& 1. Click File → Open.
Ndú;h i|yd ixhqla; (compress& fõ'
2. Select three images you want to use
(open them one at a time).
Ndú;d lsÍug wjYH rEm ;=k f;darkak
^tlska tl újD; lrkak&'
ictfromabc.com

Step 3: Step 5:
Create a New Canvas. Select and Feather. / f;aÍu iy Feather.
kj lekajihla ks¾udKh lsÍu'
1. Go to Select → Feather and set it to 10
1. Click File → New.
pixels. Click OK.
Select→ Feather fj; f.dia th 10 pixels
2. Set the canvas size (ex: Width: 1200px,
Height: 800px). f,i ilikak' OK la,sla lrkak'
lekajia m%udKh ilikak ^Wod: m<,(
1200px" Wi( 800px&' 2. Use a selection tool (Ellipse, Rectangle,
Free Select, or Scissors) to mark the
3. Click OK. area you want to use.
Ndú;d lsÍug wjYH m%foaYh i,l=Kq
lrkak" f;aÍï fuj,ula Ndú;d lrkak'

3. Copy the selection: Edit → Copy Visible.

Step 4:
Prepare the First Image.
m<uq rEmh ilia lsÍu

1. Select the first image in the Layers


Panel.
Layers Panel ys m<uq rEmh f;darkak'

2. Right-click the layer and choose Add


Alpha Channel (for transparency).
Layer u; ol=Kq la,sla lr Add Alpha
Channel f;darkak ^mdroDYH;djh
i|yd&'
ictfromabc.com

Step 6: Step 8:
Paste into the New Canvas. Add the Second Image.
kj lekajia fj; we;=<;a lsÍu' fojk rEmh tla lsÍu'

1. Go to the new canvas window. 1. Repeat Steps 4 to 7 for the second


kj lekajia ljq¿j fj; hkak' image.
m<uq rEmh i|yd l< mshjr 4 isg 7
2. Paste the copied image. kej; lrkak'
msgm;a l< rEmh we;=<;a lrkak'
Edit → Paste as → New Layer 2. Position and scale the second image on
the canvas.
fojk rEmh lekajia u; ia:dk.; lr
m%udKh lrkak'

Step 9:
Add the Third Image.
f;jk rEmh tla lsÍu'

1. Repeat Steps 4 to 7 for the third image.


m<uq rEmh i|yd l< mshjr 4 isg 7
kej; lrkak'
3. Use the Move Tool to position the
image. 2. Position and scale the third image on
rEmh ia:dk.; lrkak'
the canvas.
f;jk rEmh lekajia u; ia:dk.; lr
Step 7: m%udKh lrkak'
Resize the First Image.
m<uq rEmh kej; m%udKh lsÍu'

1. Select the Scale Tool.

2. Click on the image and set Width to


450px and Height to 600px or Hold Ctrl
and drag from a corner to scale
proportionally.
rEmh u; la,sla lr m<, 450px iy Wi
600px f,i ilikak fyda Ctrl Tnd
fl<jrla we§fuka iudkqmd;slj m%udKh
lrkak'

3. Click Scale.
ictfromabc.com

Step 10: Step 12:


Manage Layers. Crop and Add Borders.
Layers l<ukdlrKh lsÍu' lemSu iy rduq tla lsÍu'

1. Use the Layers Panel to organize all 1. Use the Crop Tool to remove
three images on separate layers. unnecessary parts.
Layers Panel Ndú;d lr rEm ;=k fjk Crop Tool Ndú;d lr wkjYH fldgia
bj;a lrkak'
fjku layers j,ska ixúOdkh lrkak'
2. Add a border.
2. Adjust Opacity to control visibility.
rduqjla tla lrkak:
mdroDYH;djh ilia lr oDYH;djh
md,kh lrkak'
(ex: 50%, 75%, 100 Filters → Decor → Add Border.

Set Border X and Border Y to 10 px,


choose a color (ex: blue), and click OK.
Border X iy Border Y 10px f,i
ilikak" j¾Khla f;darkak ^Wod( ks,a&"
OK la,sla lrkak'

Repeat with Border X and Border Y set


to 15px and a different color (ex:
yellow).
Border X iy Border Y 15px f,i ilid
fjk;a j¾Khla f;darkak ^Wod( ly&'

Step 11:
Merge Layers. / Layers tAldnoaO lsÍu'

1. Once editing is complete, right-click in


the Layers Panel.
ixialrKh wjika jQ miq, Layers Panel ys
ol=Kq la,sla lrkak'

2. Select Merge Visible.


Layers → Expand as Necessary → Merge
ictfromabc.com

Step 13: Creating graphics with texts.


Save and Export.
iq/lSu iy wmkhkh lsÍu' mdG iys; .%dmsl ks¾udKh'

1. Save your project: File → Save (as .xcf Step 1:


for future editing). Open GIMP Software.
Tfí jHdmD;sh iqrlskak( File → Save GIMP uDÿldx.h újD; lsÍu'
^wkd.; ixialrK i|yd .xcf f,i&'
Launch GIMP on your computer.
2. Export the final graphic: File → Export
As (choose .jpg or .png for sharing). Tfí mß.Klfha GIMP újD; lrkak'
wjidk .%dmsl tl wmkhkh lrkak( File
→ Export As ^fnod.ekSu i|yd jpg fyda Step 2:
png f,i f;darkak&' Create a New Canvas.
kj lekajia tlla ks¾udKh lsÍu'
Final Graphic / wjidk .%dmslh
1. Go to File → New.

2. Set the canvas size.


lekajia m%udKh ilikak:
• Width / m<,: 800px
• Height / Wi: 600px

3. Click OK.

Step 3:
Set Background Gradient.
miqìï Gradient ilia lsÍu'

1. Select the Gradient Tool from the


Toolbox.
Gradient Tool f;darkak'

2. In the Tool Options, choose a gradient


(ex: FG to BG (RGB)).
Tool Options ys gradient tlla f;darkak
^Wod: FG to BG (RGB)).

3. Set the Foreground Colo to #FFD700


(Gold) and the Background Color
To #FF4500 (Orange Red).
Foreground Color f,i #FFD700 (Gold)
iy Background Color f,i #FF4500
^Orange Red) ilikak'
ictfromabc.com

4. Select Blend tool, click and drag from


the top-left corner to the bottom-right
corner to apply the gradient.
Blend Tool Ndú;d lr" jï-by<
fl<jf¾ isg ol=Kq-my< fl<jr olajd
we§fuka gradient fhdokak'

Step 5:
Add Text. / fm< tla lsÍu'

1. Select the Text Tool from the Toolbox.


Text Tool f;darkak'
Foreground Background
2. In the Tool Options, set.
Tool Options ys ilikak.
Step 4:
• Font / fm<: Arial Bold
Add a Shape. / yevhla tla lsÍu'
• Size / m%udKh: 40px
1. Select the Ellipse Select Tool from the • Color / j¾Kh: Black
Toolbox.
Ellipse Select Tool f;darkak'

2. Draw a circle in the center of the canvas.


lekajia uOHfha jD;a;hla w¢kak.

3. Create a new layer: Layer → New Layer


(name it "Circle").
kj layer tlla idokak( Layer→New
Layer (th “Circle” f,i kï lrkak&'

4. Fill the selection with white.


f;aÍu iqÿ meyefhka mqrjkak'
Edit → Fill with FG Color (set FG color to 3. Click on the canvas and type: "DREAM
white / FG j¾Kh iqÿ f,i ilikak). BIG".
lekajia u; la,sla lr ^—DREAM BIG”&
5. Deselect. / f;aÍu bj;a lrkak. ghsma lrkak'
Select → None
4. Use the Move Tool to center the text
inside the circle.
Move Tool Ndú;d lr fm< jD;a;h
uOHfha ia:dk.; lrkak'
ictfromabc.com

Step 6: Step 8:
Add a Border to the Text. Add a Quote.
fm<g rduqjla tla lsÍu' Wmqgd oelaùula tla lsÍu'

1. Select the text layer in the Layers Panel. 1. Select the Text Tool again.
Layers Panel ys fm< layer tl f;darkak' Text Tool kej; f;darkak'
2. Right-click the layer and choose Alpha
to Selection. 2. Set / ilikak:
ol=Kq la,sla lr Alpha to Selection • Font / fm,: Times New Roman
f;darkak' • Size / m%udKh: 30px
3. Grow the selection. • Color / j¾Kh: White
f;aÍu j¾Okh lrkak'
Select → Grow → Set to 5 pixels → Click 3. Click below the circle and type: "Believe
OK. in yourself and all that you are.”
Select → Grow → 5 pixel f,i ilikak jD;a;hg my<ska la,sla lr —Believe in
→ OK la,sla lrkak' yourself and all that you are” ghsma
lrkak'
4. Create a new layer below the text layer
(name it "Text Border").
4. Use the Move Tool to position the
fm< layer hg kj layer tlla idokak.
quote.
th —Text Border— f,i kï lrkak'
Move Tool Ndú; lr Wmqgd oelaùu
5. Fill the selection with yellow. ia:dk.; lrkak'
f;aÍu ly meyefhka mqrjkak.
Edit → Fill with FG Color (set FG color to Step 9:
yellow). Merge Layers
layers tAldnoaO lsÍu
6. Deselect.
f;aÍu bj;a lrkak. 1. Right-click in the Layers Panel.
Select → None.
Layer Panel ys ol=Kq la,sla lrkak'

Step 7:
2. Select Merge Visible Layers → Expand
Add a Drop Shadow'
as Necessary → Merge.
Drop Shadow tla lsÍu'
Step 10:
1. Select the text layer.
Add a Border to the Poster
fm< layer tl f;darkak' fmdaiagrhg rduqjla tla lsÍu
2. Go to Filters → Light and Shadow →
Drop Shadow. 1. Go to Filters → Decor → Add Border.

3. Set the values. / w.hka ilikak. 2. Set. / ilikak.


• Offset X: 5px • Border X: 10px
• Offset Y: 5px • Border Y: 10px
• Blur Radius: 10px
• Color: Black
• Color: Black

4. Click OK. 3. Click OK.


ictfromabc.com

Audio Content
Y%jH ikaOdr

Audio content refers to any form of sound-


based media, such as music, voice
recordings, sound effects, or podcasts.
Y%jH ikaOdr hkq ix.S;h" l:k má.; lsÍï"
Yío m%fhda." fyda fmdâldiaÜ jeks Yío udOH
´kEu wdldrhls'

It is widely used in various fields, including


entertainment, education, marketing, and
communication.
th úfkdaoh" wOHdmk" wf,úlrK iy
Step 11: ikakf s õokh jeks úúO lafIa;%j, nyq,j
Save and Export. Ndú;d fõ'
iq/lSu iy wmkhkh lsÍu'
To create and refine audio content,
1. Save the project. specialized software is utilized.
jHdmD;sh iqrlskak: Y%jH wka;¾.;h ks¾udKh lsÍu iy m%Yia;
lsÍu i|yd úfYaIs; uDÿldx. Ndú;d lrhs'
File → Save (as .xcf for future editing).
These tools enable users to record, edit,
2. Export the final graphic. mix, and enhance audio files with precision.
wjidk .%dmsl tl wmkhkh lrkak. fuu fuj,ï u.ska mßYS,lhskg a Y%jH f.dkq
File → Export As (choose .jpg or .png for má.; lsÍu" ixialrKh lsÍu" ñY%Kh lsÍu
iy jeäÈhqKq lsÍu isÿ l< yel'
sharing).

Final Graphic
wjidk .%dmslh
ictfromabc.com

Audio Editing Software Installing Audacity


Y%jH ixialrK uDÿldx.
1. Visit https://www.audacityteam.org/
Audio editing software is designed to
manipulate and improve audio files. 2. Click on the "Download".
Y%jH ixialrK uDÿldx. ks¾udKh lr
we;af;a Y%jH f.dkq ilia lsÍu iy jeäÈhqKq
lsÍu i|ydh' 3. The website will automatically detect
your operating system (Windows, Mac, or
Linux).).
fjí wvúh úiska iajhxl%Shj Tnf.a fufyhqï
moaO;sh yÿkd .kS'

Audacity
1. Audacity Audacity is one of the most widely used
A free, open-source software compatible with
audio editing tools due to its accessibility
Windows, Mac, and Linux.
ksoyia" újD; uQ,dY% uDÿldx.hla jk w;r th and robust features.
Windows, Mac iy Linux i|yd .e,fma' Audacity tys m%fõYH;djh iy ÈhqKq
úfYaIdx. ksid nyq,j Ndú;d jk Y%jH
It supports multi-track editing and a wide ixialrK fuj,uls'
range of audio formats.
th u,aá-g%ela ixialrKh iy úúO Y%jH • Live audio or computer playback can be
wdlD;s i|yd iyh olajhs' recorded directly.
iÔù Y%jH fyda mß.Kl maf,anela iDcqju
2. Adobe Audition má.; l< yel'
A professional-grade tool used for advanced • Tools for cutting, copying, trimming, and
audio editing and restoration. jD;a;Sh uÜgfï
merging audio clips are available.
fuj,ula jk w;r th Wiia Y%jH ixialrKh
lemSu" msgm;a lsÍu" á%ï lsÍu iy Y%jH
iy m%;sia:dmkh i|yd Ndú;d fõ'
la,sma tAldnoaO lsÍu i|yd fuj,ï we;'

3. GarageBand
• Built-in effects like noise reduction,
A user-friendly option for Mac users, ideal for
equalization, and reverb enhance audio
music creation and basic editing. mßYS,lhska
quality.
i|yd Ndú;hg ir, fuj,ula jk w;r ix.S;
Yío wvq lsÍu" iudk lsÍu" iy m%;sèjks
ks¾udKh iy uQ,sl ixialrKh i|yd iqÿiqh'
jeks iyc m%fhda. Y%jH .=Kd;aulNdjh
jeäÈhqKq lrhs'
4. FL Studio
A digital audio workstation (DAW) favored by • Multiple audio tracks can be layered and
musicians and producers for music edited simultaneously.
production. Y%jH mG lsysmhla tljr ia:r lr
ix.S;{hska iy ksIamdolhska úiska m%sh lrk ixialrKh l< yel'
wxls; Y%jH jevigykla (DAW) jk w;r • Audacity supports formats such as WAV,
ix.S; ksIamdokh i|yd fhdod .kS'
MP3, AIFF, and Ogg Vorbis.
5. WavePad • The interface is divided into toolbars,
A versatile editor suitable for both beginners tracks, and a timeline, making navigation
and professionals. intuitive.
wdrïNlhska iy jD;a;Shhska fomlaIhgu iqÿiq w;=reuqyqK; fuj,ï ;Sre" g%ela" iy
nyqld¾h ixialdrlhls' ld,f¾Ldjlska iukaú; jk w;r
ixpd,kh w;ahjYH lrhs'
ictfromabc.com

Audacity Graphical User Interface / Audacity Ñ;%l mßYS,l w;=re uqyqK;

1 2 3 7
4 5 6

18
9

15 17
5
1
6

12 10
14 1 11
3

1. Transport Toolbar 3. Tools Toolbar


mßjyk fuj,ï ;Srej fuj,ï iys; fuj,ï ;Srej
Controls for playback, recording, and Selection, envelope, zoom, and other
navigation are provided here. editing tools are housed here.
miqnEu" má.; lsÍu iy ixpd,kh f;aÍu" ,shqï ljrh" úYd,kh iy fjk;a
i|yd md,l fuys ,nd § we;' ixialrK fuj,ï fuys wvx.= fõ'

Essential actions like play, stop, and Switching between functions is made
record are accessible. efficient.
miqnEu" kj;ajkak iy má.; lsÍu jeks ld¾hhka w;r udreùu ld¾hlaIu lr
uQ,sl l%shdjkag m%fõY úh yelsh' we;'

2. Menu Bar 4. Edit Toolbar


fukq ;Srej ixialrK fuj,ï ;Srej
Various commands and settings are Undo, redo, cut, copy, and other
arranged in dropdown menus. fundamental actions are offered.
úúO úOdk iy ieliqï fv%dmavjqka fukq wfydais lsÍu" kej; lsÍu" lmd .ekSu"
j,ska ilid we;' msgm;a lsÍu iy fjk;a uQ,sl l%shdjka
,nd § we;'
Editing, effects, and preferences are
managed from this section. Quick access to essential modifications
ixialrKh" n,mEï iy ukdm
ixialrKh fuu fldgfika is ensured.
l<ukdlrKh lrkq ,efí' uQ,sl fjkialï i|yd blauka m%fõYh
iy;sl lr we;'
ictfromabc.com

5. Audio Setup Toolbar 9. Playback Meter Toolbar

Input and output devices, sample rate, and Output levels during playback are
host settings can be configured. displayed.
wdodk iy m%;sodk Wmdx." idïm,a wkqmd;h miqnEfï§ m%;sodk uÜgï fmkajhs'
iy Odrl ieliqï úkHdi l< yelsh'
Audio balance and loudness can be
Seamless audio routing is supported. observed.
iqug Y%jH fhduq lsÍu iyh olajhs' Y%jH iu;=,s;;djh iy Yíoh ksÍlaIKh
l< yelsh'
6. Share Audio Toolbar
10. Play-at-Speed Toolbar
Direct options for sharing audio via various
platforms are included. Playback speed is adjusted without altering
úúO fõÈld yryd Y%jH fnod.ekSu i|yd pitch.
iDcq úl,am we;=<;a fõ' miqnEfï fõ.h msÉ fjkia fkdlr ilia
lrhs'
Exporting and online distribution are
Slow-motion or accelerated review is
simplified.
wmkhkh iy ud¾..; fnodyeÍu ir, lr enabled.
we;' fiñka fyda fõ.j;a iudf,dapkh il%Sh lrhs'

7. Timeline 11. Selection Toolbar

Start and end points of selections, along


The project’s duration is displayed with
with length, are displayed numerically.
markers for navigation. f;aÍïj, wdrïNl iy wjidk ,laIH" È.
jHdmD;sfha ld,iSudj ixpd,kh i|yd iuÕ ixLHd;aulj fmkajhs'
i,l=Kq iuÕ fmkajhs'
Accurate editing is supported.
Precise alignment of audio clips is ksjerÈ ixialrKh iyh olajhs'
facilitated.
Y%jH la,sma ksjerÈj iïnkaO lsÍu myiq lrhs 12. Time Toolbar

8. Recording Meter Toolbar Current playhead position is indicated.


j;auka miqnEfï ia:dkh olajhs'
Real-time input levels are visually
Navigation through the project is made
represented.
efficient.
ienE ld,Sk wdodk uÜgï oDYHudk fõ'
jHdmD;sh yryd ixpd,kh ld¾hlaIu lrhs'

Clipping and distortions can be monitored. 13. Snapping Toolbar


la,sma lsÍu iy úlD;s ksÍlaIKh l< yelsh'
Audio clips and selections are aligned to
predefined points.
Y%jH la,sma iy f;aÍï mQ¾j ks¾jpkh l<
,laIH j,g iïnkaO lrhs'

Consistency in arrangement is ensured.


ieleiafï wkql+,;djh iy;sl lrhs'
ictfromabc.com

14. Time Signature Toolbar Basics of Audacity


Audacity uDÿldx.fha uQ,sldx.
Musical time signatures are set for projects.
jHdmD;s i|yd ix.S;uh ld, ix{d ilia Creating a New Audio Project.
lrhs' kj Y%jH jHdmD;shla ks¾udKh lsÍu'
Rhythm-based alignment is enhanced.
ßoauh u; mokï jQ iïnkaO;djh jeäÈhqKq 1. Open Audacity and go to File → New.
lrhs' Audacity újD; lr File→New fj;
hkak'
15. Track Control Panel A blank workspace will open for
creating audio content.
Settings for individual tracks, including Y%jH wka;¾.;h ks¾udKh lsÍu i|yd
mute, solo, and gain, are provided. ysia jev wjldYhla újD; fõ'
;ks g%ela i|yd ieliqï" ksYY a ío lsÍu"
;kslr lsÍu iy ,dNh we;=<;a fõ' 2. Set the sample rate and project settings
in the Preferences menu if needed.
Direct manipulation of tracks is possible.
g%ela iDcqju yiqrejd .; yelsh' wjYH kï" Preferences fukqfjka idïm,a
wkqmd;h iy jHdmD;s ieliqï ilikak'
16. Vertical Scale

Amplitude levels are displayed alongside Saving the Work.


tracks. jev iq/lSu'
úia;drK uÜgï g%ela iuÕ fmkajhs'
1. To save the project, go to File → Save
Audio intensity is visually represented. Project.
Y%jH ;Sj%;djh oDYHudk fõ' jHdmD;sh iq/lSu i|yd File → Save
Project fj; hkak'
17. Audio Track
Choose a location, enter a file name,
Recorded or imported sound is contained
and save in .aup format (Audacity’s
here.
má.; l< fyda wdhd; l< Yíoh fuys wvx.= native format).
fõ' ia:dkhla f;dardf.k" f.dkq kduhla
we;=<;a lr 'aup wdlD;sfhka ^Audacity
Waveforms are displayed for editing. ys iajNdúl wdlD;sh& iqrlskak'
ixialrKh i|yd ;rx. rEm fmkajhs'
Files saved in this format can be edited
18. Timeline Context Menu later.
fuu wdlD;sfhka iqrlsk ,o f.dkq miqj
Right-click options for managing time- ixialrKh l< yelsh'
related settings are available.
ld,h iïnkaO ieliqï l<ukdlrKh i|yd
2. To save a copy for sharing or exporting,
ol=Kq-la,sla úl,am ,nd .; yelsh'
go to File → Export.
Customization and adjustments are fnod.ekSu fyda wmkhkh lsÍu i|yd
simplified. msgm;la iq/lSug File → Export fj;
wNsreÑlrKh iy ilia lsÍï ir, lr we;' hkak'
ictfromabc.com

Exporting Audio to Other Formats. Recording Audio.


fjk;a wdlD;sj,g Y%jH wmkhkh lsÍu' Y%jH má.; lsÍu'

1. Open your saved project by going to 1. Connect your microphone or input


File → Open. device.
iqrlsk ,o jHdmD;sh File → Open u.ska Tfí uhsfl%df*dakh fyda wdodk Wmdx.h
újD; lrkak' iïnkaO lrkak'

2. To export, go to File → Export Audio. 2. Click the Record button on the


wmkhkh lsÍu i|yd File → Export Transport Toolbar to start recording.
Audio fj; hkak' má.; lsÍu wdrïN lsÍu i|yd
Transport Toolbar ys Record fnd;a;u
la,sla lrkak'
Choose a location, name the file, and
select the desired format (e.g., WAV,
3. Click Stop when finished, and save or
MP3, FLAC).
export the recording as needed.
ia:dkhla f;dardf.k" f.dkqjg kduhla
,nd§" wjYH wdlD;sh (Wod: WAV, MP3, wjika jQ miq Stop la,sla lrkak" iy
má.;h iqrlskak fyda wjYH wdldrhg
FLAC) f;darkak' wmkhkh lrkak'

In the Edit Metadata dialog box, Recording a Voice Memo with Audacity.
provide details like title, artist, and year, Audacity Ndú;fhka y~ má.; lsÍu'
then click OK.
Edit Metadata ixjdo fldgqfõ" ud;Dldj" 1. Open Audacity.
l,dlrejd iy j¾Ih jeks úia;r Audacity újD; lrkak'
we;=<;a lr OK la,sla lrkak'
Double-click the Audacity icon.
Playing and Editing Audio. Audacity whslkh u; fojrla la,sla
Y%jH Odjkh iy ixialrKh' lrkak'

1. Use the Transport Toolbar to play, 2. Set Up Microphone.


pause, or stop audio playback. uhsfl%df*dakh ilikak'
Y%jH Odjkh" úrduh fyda kej;=ï lsÍu
i|yd Transport Toolbar Ndú;d lrkak' Go to Device Toolbar, Select your
microphone, under Recording Device.
2. Use the Selection Tool to highlight Device Toolbar fj; hkak, Recording
sections of audio for editing. Device hgf;a Tfí uhsfl%df*dakh
ixialrKh i|yd Y%jH fldgia Woa§mkh f;darkak'
lsÍug Selection& Tool Ndú;d lrkak'

3. Apply effects like fade-in, fade-out, or


noise reduction from the Effects menu.
Effects fukqfjka fade-in, fade-out fyda
Yío wvq lsÍu jeks n,mEï fhdokak'
ictfromabc.com

3. Check Audio Levels. 7. Play Back.


Y%jH uÜgï mÍlaId lrkak' Odjkh lrkak'

Speak into the mic → Adjust the input Click the Green Triangle (Play) button to
volume slider if the bars turn red. listen.
uhsfl%df*dakhg l;d lrkak → ;Sre r;= fld, ;%sfldak (Play) fnd;a;u la,sla
jqjfyd;a wdodk mßudj ia,hsvrh lrkak'
Ndú;fhka ilikak'

4. Start Recording.
má.; lsÍu wdrïN lrkak'

Click the Red Circle (Record) button.


r;= mdg rjqï fnd;a;u la,sla
lrkak'^má.; lsÍug&

8. Save Your Recording.


má.;h iqrlskak'

Go to File → Export Audio → Choose


location → Name file → Select format
(ex: MP3) → Click Save.
File→Export Audio fj; hkak → ia:dkh
f;darkak → f.dkqjg kduhla fokak →
5. Speak Your Memo. wdlD;sh f;darkak ^Wod( MP3→Save
la,sla lrkak'
Talk clearly into the microphone.
uhsfl%df*dakhg meyeÈ,sj l;d lrkak'

6. Stop Recording.
má.; lsÍu kj;ajkak'

Click the Yellow (old version) Square


(Stop) button.
ly mdg fldgq fnd;a;u la,sla lrkak
(stop).

9. Add Metadata (Optional).


wNso;a; tla lrkak ^úl,am&'

Fill in details (ex: title, artist).


úia;r mqrjkak ^Wod( ud;Dldj"
l,dlrejd)

Click OK.
OK la,sla lrkak'
ictfromabc.com

10. Listen to Final Audio. 4. Select the Unnecessary Section.


wjidk Y%jH Odjkh lrkak' wkjYH fldgi f;darkak'

Find the saved file , Double-click to Use the Selection Tool (I-beam icon) →
play. Click and drag over the part you want
iqrlsk ,o f.dkqj fidhkak, fojrla to remove.
la,sla lrkak' Selection Tool (I-beam whslkh& Ndú;d
lrkak → bj;a lsÍug wjYH fldgi u;
Skip to la,sla lr weof.k hkak'
Pause Stop End Loop

5. Delete the Section.


fldgi bj;a lrkak'

Press the Delete key on your keyboard.


Play Skip to Record Tfí h;=remqjrefõ Delete h;=r Tnkak'
Start
6. Play Back the Edited Audio.
ixialrKh l< Y%jH Odjkh lrkak'
Editing recorded sound track to remove
unnecessary sections. Click the Green Triangle (Play) button to
ks¾udKh lr.;a Y%jH ikaOdrhl wkjYH check your edits.
fldgia lmd bj;a lr ixialrKh lsÍu' fld, ;%sfldaK (Play& fnd;a;u la,sla
lrkak'
1. Open Audacity.
Audacity újD; lrkak' 7. Save the Edited Audio.
ixialrKh l< Y%jH f.dkqj iqrlskak'
Double-click the Audacity icon.
Audacity whslkh u; fojrla la,sla
lrkak'

2. Import Your Audio.


Tfí Y%jH f.dkqj wdhd; lrkak'

Go to File → Import → Audio → Select


your audio file.
File→Import→Audio fj; hkak → Tfí
Y%jH f.dkqj f;darkak'

3. Play the Audio.


Y%jH Odjkh lrkak'

Click the Green Triangle (Play) button to


listen.
fld, mdg ;%sfldaK ^Play& fnd;a;u la,sla
lrkak'
ictfromabc.com

Audio File Formats 3. FLAC (Free Lossless Audio Codec)


Y%jH f.dkq wdlD;s
Lossless compression, maintains original
1. MP3 (MPEG Audio Layer III) audio quality.
ydks fkdjk iïmSvkh" uq,a Y%jH .=Kd;aul
Highly compressed format, widely nj mj;ajd .kS'
compatible.
by<ska iïmSvkh l< wdlD;shls" mq¿,a f,i 4. AAC (Advanced Audio Coding)
.e<fmhs'
Lossy compression, better quality than MP3
2. WAV (Waveform Audio File Format) at similar bitrates.
ydks jk iïmSvkh" iudk bitrate j, MP3 g
Uncompressed, high-quality audio, large jvd fyd| .=Kd;aul njla we;'
file size.
iïmSvkh fkdl<" Wiia ;;a;ajfha Y%jH fõ" 5. OGG (Ogg Vorbis)
f.dkq úYd,;ajh by< fõ'
Open-source, lossy compression, good
quality and compatibility.
újD; uQ,dY%" ydks jk iïmSvkh" fyd|
.=Kd;aul njla iy .e<mqula we;'

Feature MP3 WAV FLAC AAC OGG


.

Compression Lossy Uncompressed Lossless Lossy Lossy


.

Quality Good Excellent Excellent Very Good Good


.

File Size Small Very Large Large Small Small


.

Compatibility Very High High High High Medium


.

Best For General Professional Audiophiles Streaming Open Platforms


.
ictfromabc.com

Creating a Video Clip. 2. Adobe Premiere Pro


oDYH ikaOdr ks¾udKh' (Paid, Windows / Mac)
A video clip is a short sequence of visuals
A professional-grade tool for advanced
combined with audio to convey a message,
video editing.
tell a story, or showcase creativity. jD;a;Sh uÜgfï ixialrK fuj,uls'
oDYH ikaOdr hkq oDYH iy Y%jH wka;¾.;h
tAldnoaO lr we;s flá wkql%uhls' Features: Multi-track editing, color grading,
Video clips are widely used in social media, and special effects.
úfYaIdx.( u,aá-g%ela ixialrKh" j¾K
presentations, marketing, and fY%a‚.; lsÍu" iy úfYaI n,mEï'
entertainment.
th iudc udOH" bÈßm;a lsÍï" wf,úlrK 3. iMovie
iy úfkdaodiajdoh i|yd nyq,j Ndú;d fõ' (Free, Mac / iOS)
Creating a video clip involves combining
A simple and intuitive tool for Apple users.
images, video footage, audio, and effects
Apple mßYS,lhska i|yd ir, fuj,uls'
using video editing software.
ùäfhda la,sma ks¾udKh lsÍu i|yd rEm"
ùäfhda fldgia" Y%jH" iy n,mEï Ndú;d Features: Templates, transitions, and audio
lrkq ,efí' editing.
úfYaIdx.( wÉpq" ixl%uK" iy Y%jH
ixialrKh'
1. Windows Movie Maker
(Free, Windows) 4. DaVinci Resolve
(Free / Paid, Windows / Mac / Linux)
A beginner-friendly tool for basic video
editing. A powerful tool for both editing and color
wdrïNlhska i|yd ir, fuj,uls' correction.
ixialrKh iy j¾K ksjerÈ lsÍu i|yd
Features: Trimming, transitions, titles, and n,j;a fuj,uls'
audio mixing.
úfYaIdx.( lemSu" ixl%uK" text iy Y%jH Features: Advanced editing, visual effects,
ñY%Kh' and audio post-production.
úfYaIdx.( Wiia ixialrKh" oDYH n,mEï"
Windows Movie Maker is considered iy Y%jH miq-ksIamdokh'
outdated as Microsoft officially
discontinued it in 2017 5. Filmora
(Paid, Windows / Mac)

A user-friendly tool for beginners and


intermediate users.
wdrïNlhska iy uOHu uÜgfï mßYS,lhska
i|yd ir, fuj,uls'

Features: Drag-and-drop editing, effects,


and transitions.
úfYaIdx.( weof.k hdu iy ;eîu" n,mEï"
iy ixl%uK'
ictfromabc.com

Windows Movie Maker Apply visual effects (ex: black-and-white,


vintage filters).
Arrange clips, images, and audio on a drag- oDYH m%Ndjhka fhdohs' ^Wod( l¿-iqÿ"
and-drop timeline or storyboard. vintage filters&'
la,sma" rEm" iy Y%jH f.dkq weof.k heúh
yels ld,f¾Ldjl fyda l;d mqjrejl ilia Insert text overlays, credits, and captions
lrhs' with customizable fonts and styles.
wNsreÑ wl=re ud,d iy ú,dis;d iys; fm<
Trim, split, and merge video clips. w;sÉPdok" fl%äÜ" iy YS¾I we;=<;a lrhs'
ùäfhda la,sma lmd" fnod" iy tAldnoaO lrhs'
Save videos in formats like MP4, WMV, or
Adjust playback speed and volume. AVI.
miqìï fõ.h iy Yíoh ilia lrhs' MP4, WMV fyda AVI jeks wdlD;sj,ska ùäfhda
iqrlshs'
Add transitions (ex: fades, wipes) between
clips. Directly upload to YouTube, OneDrive, or
la,sma w;r ixl%uK tl;= lrhs' ^Wod: fade, burn to DVD.
wipe) YouTube, OneDrive fj; iDcqju Wvq.;
lrhs'

Windows Movie Maker Interface / úkafvdaia uQú fïl¾ Ñ;%l mßYS,l w;=reuqyK
q ;

Editing function panel

Preview / Player pane

Timeline stage
ictfromabc.com

1. Preview / Player Pane 2. Timeline Stage


mQ¾j o¾Yk $ l%shd lrùfï ljq¿j ld, ;Sr fõÈldj

The Timeline stage is where the video


The Preview / Player pane is used to
project is assembled and organized.
display a real-time preview of the video
ld,f¾Ldj hkq ùäfhda jHdmD;sh tl;=
project. lr ixúOdkh lrk ia:dkhhs'
Fmroiqka $ maf,ah¾ fmakh Ndú;d
lrkafka ùäfhda jHdmD;sfha ;;ald,Sk
fmroiqj fmkaùu i|yd h' Clips, images, audio, and other media
elements are arranged in a sequential
The currently selected clip or the entire order on the timeline.
timeline can be viewed here. la,sma" rEm" Y%jH" iy wfkl=;a udOH wx.
f;dard.;a la,sma tl fyda iïmQ¾K ld,f¾Ldj u; wkql%ñlj ilia lrkq
ld,f¾Ldj fuys§ oel.; yel' ,efí'

Playback controls such as play, pause, The timeline is divided into tracks, such
rewind, and fast-forward are provided as video and audio tracks, which allow
to navigate through the video. for precise editing.
ùäfhdaj yeisrùu i|yd play" úrduh" ld,f¾Ldj ùäfhda iy Y%jH g%ela j,g
wdmiq heùu" iy fõ.j;a bÈßhg heùu fnod we;s w;r" tuÕska ksjerÈ
jeks md,l we;' ixialrKhla isÿ l< yel'

Any changes made to the timeline, such Media elements can be dragged and
as trimming, transitions, or effects, are dropped onto the timeline, and their
reflected in this pane. duration, position, and order can be
ld,f¾Ldfõ lrk ,o lsisÿ fjkila" adjusted.
WodyrKhla f,i lmdoeóu" ixl%uK" udOH wx. ld,f¾Ldj u; weof.k heúh
fyda n,mEï" fuu fmakfha ms<sìUq fõ' yels w;r" tAjdfha ld,iSudj" ia:dkh" iy
wkqms<sfj, ilia l< yel'
The preview quality can be adjusted to
ensure smooth playback during editing. Transitions, effects, and text overlays
ixialrKh w;r;=r iqug fmroiqjla are also applied directly on the timeline.
iy;sl lsÍu i|yd fmroiq ixl%uK" n,mEï" iy fm< w;sÉPdok o
.=Kd;aulNdjh ilia l< yel' ld,f¾Ldj u; fhdokq ,efí'

The timeline provides a visual


representation of the project's structure
and flow.
ld,f¾Ldj jHdmD;sfha jHqyh iy m%jdyh
oDYHudk lrhs'
ictfromabc.com

3. Editing Function Panel Making a Video Clip with Windows


ixialrKh lsÍfï ljq¿j Movie Maker.
Windows Movie Maker Ndú;fhka ùäfhda
The Editing Function Panel contains la,sma tlla idod .ekSu'
tools and options for modifying and
enhancing the video project. Step 1:
ixialrK ld¾h mek,h ;=< ùäfhda Open Windows Movie Maker.
jHdmD;sh fjkia lsÍu iy jeäÈhqKq lsÍu
i|yd fuj,ï iy úl,am wvx.= fõ'
1. Open the Windows Movie Maker
Functions such as trimming, splitting, software.
uDÿldx.hg msúfikak'
and merging clips are accessed here.
la,sma lmdoeóu" fn§u" iy tAldnoaO
lsÍu jeks ld¾hhka fuys§ m%fõY fõ' Step 2:
Add Videos and Photos.
Visual effects, transitions, and text ùäfhda iy PdhdrEm tla lrkak'
overlays can be selected and applied
from this panel. 1. Go to Home → Add Videos and Photos.
oDYH n,mEï" ixl%uK" iy fm<
w;sÉPdok fuu mek,fhka f;dard fhdokq 2. Select and open the video clips and
,efí' images for your project.
Tnf.a jHdmD;sh i|yd ùäfhda la,sma iy
Playback speed, volume, and other PdhdrEm újD; lrkak'
properties of the media elements are
adjusted using the tools in this panel. Step 3:
udOH wx.j, miqìï fõ.h" Yíoh" iy Apply Transition.
wfkl=;a .=Kdx. fuu mek,fha fuj,ï ixl%uK fhdokak'
Ndú;fhka ilia lrkq ,efí'
1. Open the Animations menu.
The panel is designed to provide quick Animations fukqj újD; lrkak'
access to essential editing features,
ensuring a streamlined workflow. 2. Click on the first frame.
fuu mek,h ks¾udKh lr we;af;a m<uq rEmh u; la,sla lrkak'
w;HjYH ixialrK úfYaIdx.j,g
blauka m%fõYh ie,iSu i|yd h'
3. Hover over each transition to preview it.
ixl%uKhla u; uQislh f.khkak'
Changes made in this panel are
automatically reflected on the timeline 4. Click on a suitable transition.
and preview pane. iqÿiq ixl%uKhla u; la,sla lrkak'
fuu mek,fha lrk ,o fjkialï
ld,f¾Ldj iy fmroiqka fmakfha 5. Apply transitions to other images on
iajhxl%Shj ms<sìUq fõ'
the Timeline stage.
Timeline stage u; wfkl=;a rEmj,g
ixl%uK fhdokak'
ictfromabc.com

Step 4: Step 7:
Preview and Edit. Add a Title. / ud;Dldj tla lrkak'
fmroiqka iy ixialrKh'
1. Select the first frame.
1. Use the Preview / Player pane to play m<uq rEmh f;darkak'
your creation.
Preview / Player pane Ndú;fhka Tnf.a 2. Go to Home → Title.
ks¾udKh fmroiqka lrkak'
3. Type a suitable topic.
2. Edit as necessary. iqÿiq ud;Dldjla we;=<;a lrkak'
wjYH ;eka ixialrKh lrkak'
4. Use the Format menu to add effects to
Step 5: the title.
Adjust Display Duration. Format menu Ndú;fhka ud;Dldjg
fmkaùfï ld,h ilikak' n,mEï tla lrkak'

1. Go to Animations → Duration. Step 8:


Add Captions. / YS¾I tla lrkak'
2. Set the time period for displaying an
image frame. 1. Select an image frame.
rEmhla fmkaùfï ld,h ilikak' rEmh f;darkak'

3. Select Apply to all to use the same 2. Go to Home → Caption.


duration for all frames.
Apply to all f;darkak' 3. Type a suitable caption.
iqÿiq YS¾Ihla we;=<;a lrkak'
Step 6:
Move Image Frames. 4. Format the caption as needed.
rEm p,kh lrkak' YS¾Ih wjYH wdldrhg ilikak'

1. Select the image frame. Step 9:


rEmh f;darkak' Add Credits. / fl%äÜ tla lrkak'

2. Use Pan and Zoom to apply motion 1. Go to Home → Credits.


effects.
Pan and Zoom Ndú;fhka p,k n,mEï 2. Add information like direction, artists,
fhdokak'
music, and locations.
ÈYdj" l,dlrejka" ix.S;h" ia:dk
3. Click on a suitable motion. hkdÈh we;=<;a lrkak'
iqÿiq p,khla u; la,sla lrkak'
Example
• Copy
• Thanks
• Direction
• Contributing artistes
• Locations used
• Music
ictfromabc.com

Step 10: Saving the Video Project.


Add Audio. ùäfhda jHdmD;sh iq/lSu'
Y%jH tla lrkak'
Step 1:
1. Select the first frame. Save the Project.
m<uq rEmh f;darkak' jHdmD;sh iqrlskak'

2. Go to Home → Add Music. 1. Go to File → Save Project.

3. Select and open a prepared audio file. 2. Select a location, give the file a name,
iQodkï lr we;s Y%jH f.dkqjla f;dard and click Save.
újD; lrkak' ia:dkhla f;darkak" f.dkqjg kula §
Save la,sla lrkak'
Step 11:
Preview and Finalize. The file is saved in .WLMP (Windows
fmroiqka iy wjidk lsÍu' Movie Maker Project) format for
editing.
1. Play the video content. f.dkqj ixialrKh lsÍu ioyd hk
ùäfhda wka;¾.;h fmroiqka lrkak' wdlD;sfhka iq/flkq ,efí'

2. Edit as necessary. Step 2:


wjYH ;eka ixialrKh lrkak' Save as a Video Clip.
ùäfhda la,sma f,i iqrlskak'

1. Go to File → Save Movie.

2. Select a location, name the file, and


click Save.
ia:dkhla f;darkak" f.dkqjg kula §
Save la,sla lrkak'

The video can now be viewed on


computers, TVs, mobile phones, or
shared on social media.
ùäfhdaj mß.Kl" rEmjdysk"S cx.u
ÿrl:k j, oelSug fyda iudc udOHj,
fnod.ekSug iqÿiq fõ'
ictfromabc.com

Video File Formats 3. MOV (QuickTime Movie)


ùäfhda f.dkq wdlD;s
Developed by Apple, high quality, often
1. MP4 (MPEG-4 Part 14) used in professional workflows.
Apple úiska ixj¾Okh lrk ,os" Wiia
Widely used, versatile format for web and ;;a;ajfha" jD;a;Sh jev m%jdyhkays nyq,j
devices. Ndú;d fõ'
fjí iy WmlrK i|yd nyq,j Ndú;d jk
nyqld¾h wdlD;shls' 4. MKV (Matroska Video)

2. AVI (Audio Video Interleave) Open-source, supports multiple audio and


subtitle tracks.
Older format, good quality, large file size. újD; uQ,dY% fõ" nyq Y%jH iy Wmis/is i|yd
mer‚ wdlD;shls" fyd| .=Kd;aul njla we;" iydh fõ'
f.dkq úYd,;ajh by<h'
5. WMV (Windows Media Video)

Developed by Microsoft, good


compression, often used for streaming.
Microsoft úiska ixj¾Okh lrk ,os" fyd|
iïmSvkhla we;" streaming i|yd nyq,j
Ndú; fõ'

Feature MP4 AVI MOV MKV WMV


.

Compression Lossy Lossless / Lossy Lossy Lossy


Lossy
.

Quality Good Good / Excellent Excellent Good


Excellent
.

File Size Medium Large Medium to Medium to Medium


Large Large
.

Compatibility Very High High High High Medium


.

Best For Web, Legacy Professional Versatile Streaming


Devices Systems
.
ictfromabc.com

What is a network? • LAN- Local Area Network


cd,hla hkq l=ulao@ ia:dkSh fmfoia cd,

A set of interconnected computers and This is a network that covers a relatively


computer hardware using communication small geographical area, such as a home,
media and communication devices is known office, or a university.
as a network. fuh ksjila" ld¾hd,hla fyda úYaj
ikakfs õok udOH iy ikakf s õok Wmdx. úoHd,hla jeks idfmalaIj l=vd N+f.da,Sh
Ndú;d lrk wka;¾ iïnkaê; mß.Kl iy m%foaYhla wdjrKh lrk cd,hls'
mß.Kl oDvdx. lÜg,hla cd,hla f,i
ye¢kafõ' • WAN- Wide Area Network
mq¿,a fmfoia cd,

This is a network that extends over a large


geographical area, often spanning cities,
countries, or even continents.
fuh úYd, N+f.da,Sh m%foaYhla mqrd úysfok
cd,hla jk w;r th fndfyda úg k.r"
rgj,a fyda uydoaùm mjd wdjrKh lrhs'
The internet is the most widely used Wide
Area Network (WAN)
wka;¾cd,h hkq f,dj nyq,ju Ndú;d jk
mq¿,a m%foaY cd,h (WAN) fõ'
Network Types
Mobile Communication
cd, j¾.
cx.u ikaksfõokh
Computer networks can be classified
Mobile communication refers to the ability to
according to their geographical span.
communicate over a wireless network
mß.Kl cd, tAjdfha N+f.da,Sh mrdih wkqj
j¾.SlrKh l< yelsh' without needing to be physically connected
to any communication cables.
• PAN- Personal Area Network cx.u ikakf s õokh hkq lsisÿ ikakf s õok
flan,hlg fN!;slj iïnkaO fkdù /yeka
mqoa., fmfoia cd,
rys; cd,hla yryd ikakf s õokh lsÍfï
yelshdjhs'
This is a small network used for
connecting devices within a very limited
What is GSM?
area, typically within the range of an
GSM hkq l=ulao@
individual.
fuh b;d iSñ; m%foaYhla ;=<" idudkHfhka
GSM or Global System for Mobile
mqoa.,fhl=f.a mrdih ;=< Wmdx. iïnkaO
lsÍu i|yd Ndú;d lrk l=vd cd,hls' communication is a widely-used digital
mobile telephony system for mobile
The size of a PAN can vary from a few communication.
centimeters to around 10 meters. GSM fyda cx.u ikaksfõokh i|yd jk
m%udKh fikaáógr lsym s hl isg óg¾ 10 la f.da,Sh moaO;sh hkq cx.u ikakf
s õokh i|yd
muK olajd fjkia úh yelsh' nyq,j Ndú;d jk äðg,a cx.u ÿrl:k
moaO;shls'
ictfromabc.com

What is GPRS? 1. Hub kdNsh


GPRS hkq l=ulao@
A hub is a basic network device that connects
GPRS or General Packet Radio Services is a multiple devices and broadcasting data to all
packet-switched communication technology devices connected to it.
that was developed to improve data kdNshla hkq Wmdx. lsyms hla iïnkaO lrk iy
transmission speeds over GSM networks. iïnkaO ish¨u Wmdx. fj; o;a; úldYkh
GPRS hkq GSM cd, yryd o;a; iïfm%aIK lrk uQ,sl cd, Wmdx.hls'
fõ.h jeä ÈhqKq lsÍu i|yd ixj¾Okh lrk
,o melÜ yqjudre ikakf s õok ;dlaIKhls'

Communication devices of a network


cd,hl ikaksfõok Wmdx.

Communication devices are hardware 2. Switch iaúph


components that enable the transmission
and reception of data between different A switch connects devices within a local area
systems, devices, or networks. network and uses MAC addresses to forward
ikakfs õok Wmdx. hkq úúO moaO;s" Wmdx.
fyda cd, w;r o;a; iïfm%aIKh il%Sh lrk data to the correct destination
oDvdx. fõ' iaúphla uÕska foaYhS m%foaY cd,hla ;=< Wmdx.
iïnkaO lrk w;r ksjerÈ .ukdka;hg o;a;
fhduq lsÍug MAC ,smsk Ndú;d lrhs'

Switch Hub kdNsh

Forward data to intended devices Broadcast data to all devices


wfmalaIs; Wmdx. fj; o;a; fhduq lrhs ish¨u Wmdx. fj; o;a; úldYkh lrhs
Reduce network congestion Causes more collisions
cd, ;onoh wvq lrhs .eàï we;s lrhs
More secure due to data is forwarded to intended Less secure due to broadcasting data to all devices
devices ish¨u Wmdx. fj; o;a; úldYkh lsÍu ksid
wfmalaIs; Wmdx. fj; o;a; fhduq lsÍu ksid jvd;a wdrlaIs; nj wvqh'
wdrlaIs;hs'
Faster in data transmission Slower in data transmission
o;a; iïfm%aIKfha§ fõ.j;ah o;a; iïfm%aIKh ukao.dó fõ

Support full duplex mode Support half duplex mode


mQ¾K oaúm: f,i l%shd lrhs w¾O oaúm: f,i l%shd lrhs
ictfromabc.com

3. Router 5. Wireless Access Point (WAP)


ux yiqrej
A WAP allows wireless devices to connect to
A router connects different networks and a wired network using Wi-Fi. It acts as a
It routes data packets between networks. bridge between the wireless and wired parts
ux yiqrejla úúO cd, iïnkaO lrk w;r th
o;a; melÜ cd, w;r yqjudre lrhs' of the network.
WAP uÕska /yeka rys; Wmdx.j,g Wi-Fi
It manages traffic and ensures that data Ndú;fhka, /yeka rys; cd,hlg iïnkaO
ùug bv i,ihs' th cd,fha /yeka rys; iy
reaches the correct destination.
/yeka.; fldgia w;r w;rueÈfhl= f,i l%shd
th .ukd.ukh md,kh lrk w;r o;a; lrhs'
ksjerÈ .ukdka;hg <Õd jk nj iy;sl lrhs'

4. Network Interface Card (NIC) 6. Modem fudvuh


cd, w;=reuqyK
q ;a ldâm;
A modem is used to convert digital signals
A NIC allows a computer or device to connect into analog signals and analog signals to
to a network. It can either be wired or digital signals for transmission.
wireless. iïfm%aIKh i|yd äðg,a ix{d m%;siu ix{d
NIC tlla uÕska mß.Klhlg fyda njg;a" m%;siu ix{d äðg,a ix{d njg;a
Wmdx.hlg, cd,hlg iïnkaO ùug bv mßj¾;kh lsÍug fudvuhla Ndú;d lrhs'
i,ihs' th /yeka.; fyda /yeka rys; úh
yelsh'

It provides the necessary interface for data


communication between a computer and a
network.
th mß.Klhla iy cd,hla w;r o;a;
ikakfs õokh i|yd wjYH w;=re uqyK q ;
imhhs'
ictfromabc.com

Transmission media 2. Unguided media (Wireless)


iïfm%aIK udOH kshuq fkdjk udOH (/yeka rys;)

Transmission media refers to the physical This refers to the transmission of data
pathway used to transmit data from one without the use of any physical medium.
device to another in a network. fuhska woyia lrkafka lsisÿ fN!;sl udOHhla
iïfm%aIK udOH hkq cd,hl tla Wmdx.hlska Ndú;fhka f;drj o;a; iïfm%aIKh lsÍuhs'
;j;a Wmdx.hlg o;a; iïfm%aIKh lsÍug
Ndú;d lrk fN!;sl ud¾.hhs' Unguided media provides less security. The
signals can be intercepted or disrupted easily
Transmission media can be classified into two by unauthorized entities.
categories, kshuq fkdjk udOH uÕska wvq wdrlaIdjla ,nd
iïfm%aIK udOH ldKav follg j¾. l< foa' wkjir wdh;k u.ska ix{d j,g
yelsh" myiqfjka ndOd lsÍug yelsh'

1. Guided media kshuq udOH Ex: Radio waves, Microwaves, Infrared waves
2. Unguided media kshuq fkdjk udOH .=jka úÿ,s ;rx." laIqø ;rx." wfOdarla;
;rx.
1. Guided media (Wired)
kshuq udOH (/yeka.;)

This refers to the transmission of data


through a physical medium.
fuh fN!;sl udOHhla yryd o;a;
iïfm%aIKhg lrhs'

Guided media provides more security and


reliability, as the signals are directed along a
defined route.
ix{d ksYÑ a ; ud¾.hla Tiafia fhduq lr we;s
neúka" kshuq udOH jeä wdrlaIdjla iy
úYajikSh;ajhla imhhs'

Ex: Fiber optic cables, Coaxial cables, Twisted


pair cables
m%ldY ;ka;=" iulaIl flan,h" weUß hq.,
ictfromabc.com

Aspect Guided Media Unguided Media


wx.h kshuq udOH kshuq fkdjk udOH

Definition Transmission occurs through Transmission occurs through the air


w¾: oelaùu physical mediums. or space.
iïfm%aIKh fN!;sl udOH yryd isÿ iïfm%aIKh jd;h fyda wjldYh yryd
fõ isÿ fõ'
Signal path Signals are confined to the Signals propagate freely in all
ix{d ud¾.h medium. directions.
ix{d udOHhg muKla iSud fõ' ix{d iEu ÈYdjlgu ksoyfia
m%pdrKh fõ'
Interference Less prone to external interference. More susceptible to interference
ueÈy;a ùu ndysr ndOl we;s ùug bvlv wvqh from external factors.
ndysr ndOl we;s ùug bvlv jeäh'
Cost Higher installation cost due to Lower setup cost but requires high-
msßjeh physical setup. tech equipment.
fN!;sl ieliqu ksid ia:dmk msßjeh ieliqï msßjeh wvqhs" kuq;a wê
jeähs' ;dË‚l WmlrK wjYHhs'
Mobility Limited mobility as physical Provides high mobility and flexibility
ixp,;dj connections are needed by< ixp,;dj iy kuHYS,S njla
fN!;sl iïnkaO;d wjYH neúka ,nd fohs'
iSñ; ixp,;djls'
Bandwidth Generally higher bandwidth. Bandwidth depends on
l,dm m<, by< l,dm m<,la we; environmental factors.
l,dm m<, mdßißl idOl u; r|d
mj;S'
Security More secure due to restricted Less secure as signals can be
wdrlaIdj signal path. intercepted.
iSñ; ix{d ud¾.h ksid jvd;a ix{d ndOd l< yels neúka wvq
wdrlaIs;hs' wdrlaIs;hs'

Guided media signal transmission Unguided media signal transmission


ictfromabc.com

Client server model Internet


fiajd.%dyl fiajdodhl wdlD;sh wka;¾cd,h

The client is a device that requests services or A collection of networks scattered all around
resources, while the server is a system that the world is known as the internet.
provides these resources or services to the f,dj mqrd úisÍ we;s cd, tl;=jla wka;¾cd,h
clients. f,i ye¢kafõ'
fiajd.%dylhd hkq fiajd fyda iïm;a b,a,d isák
Wmdx.hla jk w;r" fiajdodhlhd hkq fuu
iïm;a fyda fiajdjka fiajd .%dylhskg a imhk
moaO;shls'

Peer to Peer model


iu iu cd,

In this model, all devices act as both servers


and clients.
fuu wdlD;sfha §" ish¨u Wmdx. fiajdodhlhka
iy fiajd,dNSka hk folu f,i l%shd lrhs'
Services provided by internet
Each device can share resources or services wka;¾cd,h u.ska imhkq ,nk fiajdjka
with other devices, and they communicate
directly with each other, without needing a • WWW (World Wide Web)
f,dal úisß úhuk
central server.
iEu Wmdx.hlgu wfkl=;a Wmdx. iuÕ
iïm;a fyda fiajdjka fnod .; yels w;r" The World Wide Web is a system of
uOHu fiajdodhlhla fkdue;sj tlsfkld iuÕ interlinked hypertext documents and
fl,sku a ikakfs õokh lrhs' multimedia content that is accessed over the
internet using a web browser.
Hybrid network f,dal úisß úhuk hkq fjí w;sßlaiqjla
fouqyk
q a cd, Ndú;fhka wka;¾cd,h yryd m%fõY úh yels
wka;¾ iïnkaê; wêfm< f,aLk iy nyqudOH
A Hybrid Network combines elements of wka;¾.;hkaf.ka iukaú; moaO;shls'
both the Client Server and Peer to Peer
models. • Electronic Mail (E-mail)
fouqyk
q a cd,hla fiajd.%dyl fiajdodhl úoHq;a ;emE,
wdlD;sh iy iu iu cd, wdlD;sh hk
foflysu wx. tAldnoaO lrhs' E-mail is a method of exchanging digital
messages between people using electronic
devices. It allows users to send and receive
messages over the internet.
úoHq;a ;emE, hkq bf,lafg%dksl Wmdx. Ndú;d
lrk mqoa.,hska w;r äðg,a m‚úv yqjudre
lsÍfï l%uhls' th mßYS,lhskg a wka;¾cd,h
yryd m‚úv heùug iy ,nd .ekSug bv
i,ihs'
ictfromabc.com

• FTP (File Transfer Protocol) Accessing internet


f.dkq udre kshudj,sh wka;¾cd,hg msúiSu
To access the internet, the following basic
FTP is a standard internet protocol used to requirements are needed,
transfer files between a client and a server wka;¾cd,hg msúiSug my; i|yka uQ,sl
over the internet. wjYH;d wjYH fõ"
FTP hkq wka;¾cd,h yryd fiajd .%dylfhl=
iy fiajdodhlfhl= w;r f.dkq udre lsÍug • Device
Ndú;d lrk iïu; wka;¾cd, kshudj,shls' Wmdx.h
A device such as a computer,
• Voice / Video Communication smartphone, or any other internet-
yv ùäfhda ikakfs õokh capable device
mß.Klhla" iaud¾Ü cx.u ÿrl;khla
These services, such as Voice over IP and fyda fjk;a ´kEu wka;¾cd, yelshdj we;s
video calling enable real-time Wmdx.hla
communication between individuals using
audio and video. These services allow for • ISP (Internet Service Provider)
long-distance communication via internet. wka;¾cd, fiajd iemhqïlre
Voice over IP iy ùäfhda weu;=ï jeks fuu An ISP provides the internet connection.
fiajdjka uÕska Y%jH iy oDYH f,i mqoa.,hska wka;¾cd, iïnkaO;djh imhkafka
w;r ;;H ld,Sk ikaksfõokh il%Sh lrhs' wka;¾cd, fiajd iemhqïlre úisk's
fuu fiajdjka wka;¾cd,h yryd È.= ÿr
ikakfs õokh i|yd bv i,ihs' • Connecting device
iïnkaOl Wmdx.h
• IRC (Internet Relay Chat) Connecting device, such as a modem,
wka;¾cd, m%;sfhdacl l;dny router, and network interface card (NIC).
fudvuhla" rjqgrhla iy cd, w;=reuqyK q ;a
IRC is a protocol used for live, real-time text ldâm;la (NIC) jeks iïnkaOl Wmdx.'
messaging and chat in group discussions or
one-on-one conversations. • Web browser software
IRC hkq lKavdhï idlÉPd fyda ixjdo j,§ fjí w;sßlaiq uDÿldx.h
iÔù" ;;H ld,Sk flá m‚úv heùu iy A software application that is needed to
l;dnia lsÍu i|yd Ndú;d lrk kshudj,shls' navigate the web, access websites, and
use online services.
• Streaming Media fjí wvú fj; m%fõY ùug" ießieÍug"
m%jdy udOH iy ud¾..; fiajdjka Ndú;d lsÍug wjYH
uDÿldx. fhÿuls'
Streaming media refers to the continuous
transmission of audio and video files over the Ex: Mozilla Firefox, Google chrome,
internet. Microsoft Edge, Safari, Opera
m%jdy udOH hkq wka;¾cd,h yryd Y%jH iy
oDYH f.dkq wLKavj iïfm%aIKh lsÍuhs'
ictfromabc.com

Search engine Parts of an E-mail address


fijqï hka;% E-mail tll fldgia

A search engine is a software system that


allows users to search for information on the
internet.
fijqï hka;%hla hkq mßYS,lhskg a
wka;¾cd,fha f;dr;=re fiùug bv i,ik
uDÿldx. moaO;shls'
Ex: Google, Yahoo, Bing, Ask

Here, @ symbol separates the username and


the domain name.
fuys§ @ ixfla;h mßYS,l kduh iy jiï
kduh fjka lrhs'

The header of an E-mail


URL – Uniform Resource Locator To:
A URL (Uniform Resource Locator) is the This field is used for the primary recipients of
address you type into a browser to access a the email. These are the people who the
specific resource on the internet. email is directly intended for.
URL hkq Tn wka;¾cd,fha we;s ksYÑ a ; fuu lafIa;%h úoHq;a ;emEf,ys m%d:ñl
iïm;lg m%fõY ùug n%jqirhlg ghsma lrk ,nkakka i|yd Ndú;d fõ' fudjqka úoHq;a
,smskhhs ;emE, iDcqju ,nd .ekSug wjYH mqoa.,hska
fõ'
Parts of a URL
URL tll fldgia They will see everyone else listed in the "To"
field.
“To” lafIa;%fha ,ehsia;=.; lr we;s wfkla
ish,a,kau Tjqkga fmfkkq we;'

CC (Carbon Copy):
This field is used when you want to send a
copy of the email to others who are not the
primary recipients but should still be aware
of the content.
m%d:ñl ,nkakka fkdjk kuq;a, wka;¾.;h
E-mails
ms<sn|j oekqj;a úh hq;= fjk;a whg úoHq;a
Electronic mail (Email) is a way to send and ;emEf,ys msgm;la heùug wjYH úg fuu
receive digital messages over the Internet. lafIa;%h Ndú;d fõ'
You can send text, images, documents, and
other files to anyone with an email address. Recipients in the “CC" field can see all other
úoHq;a ;emE, (E-mail) hkq wka;¾cd,h yryd recipients in both the "To" and "CC" fields.
äðg,a m‚úv heùug iy ,eîug ud¾.hls' “CC” lafIa;%fha ,nkakkag “To” iy “CC” lafIa;%
Tng Bfï,a ,smskhla we;s ´kEu flfkl=g mdG, foflysu ish¨u ,nkakka oelsh yelsh'
msk;
a +r" f,aLk iy fjk;a f.dkq heúh yel'
ictfromabc.com

BCC (Blind Carbon Copy): Reply


This field is used to send a copy of the email A reply is a response to an email you
to other recipients without revealing their received. It allows the recipient to answer or
email addresses to anyone else. address the content of the original email.
fuu lafIa;%h Ndú;d lrkqfha fjk;a ,nkakkag Reply hkq Tng ,enqKq úoHq;a ;emE,lg
Tjqkfa .a úoHq;a ;eme,a ,smsk fy<s fkdlr úoHq;a ,efnk m%;spdrhls' th ,nkakdg uq,a úoHq;a
;emEf,ys msgm;la heùug h' ;emEf,ys wka;¾.;hg ms<s;=re §ug fyda
wduka;%Kh lsÍug bv i,ihs'
Recipients in the “BCC" field cannot see
anyone else's email address, including other Forward
"BCC" recipients. Forwarding is when a person sends an email
“BCC” lafIa;%fha ,nkakkag wfkl=;a “BCC” he received, to another person. This allows
,nkakka we;=¿j fjk;a lsisfjl=f.a úoHq;a you to share the information with someone
;eme,a ,smskh oelsh fkdyel' else without having to rewrite or copy it.
Forwarding hkq mqoa.,fhl= ;udg ,enqKq
úoHq;a ;emE,la ;j;a mqoa.,fhl=g heùuhs'
fuh Tng f;dr;=re kej; ,sùu fyda msgm;a
lsÍulska f;drj fjk;a flfkl= iuÕ fnod
.ekSug bv i,ihs'

Social networking
iudc cd,lrKh
Social networks are online platforms that
allow users to create profiles, connect with
others, and share content such as text,
images, videos, and updates.
Subject iudc cd, hkq mßYS,lhskg a me;slv ks¾udKh
The subject is a brief summary or heading of lsÍug" wka wh iuÕ iïnkaO ùug iy mdG,
msk;a +r" ùäfhda iy hdj;ald,Sk f;dr;=re jeks
the email content. It gives the recipient an wka;¾.;hka fnod .ekSug bv i,ik ine¢
idea of the email’s purpose before opening fõ'
it.
Subject hkq úoHq;a ;emEf,ys wka;¾.;h Ex: Facebook, Instagram, Tiktok, Youtube
ms<sn| flá idrdxYhla fyda YS¾Ihls' th
,nkakdg úoHq;a ;emE, újD; lsÍug fmr tys
wruqK ms<sn| woyila ,nd fohs'

Attachments
An attachment refers to a file that send along
with the email. This could be a document,
image, video, or any other file.
Attachment hkq úoHq;a ;emE, iuÕ hjk
f.dkqjls' fuh f,aLkhla" rEmhla" ùäfhdajla
fyda fjk;a ´kEu f.dkqjla úh yelsh
ictfromabc.com

Text messaging Cloud computing


flá m‚úv heùu j,dl=¿ mß.Kkh

Text messaging, also known as SMS (Short Cloud computing is the use of the internet to
Message Service), is a method of sending access and store data, run applications, and
short text-based messages. It allows users to use computing resources like storage and
communicate quickly and easily, often used processing power, instead of relying on your
for personal conversations, notifications, or computer or physical servers.
alerts. j,dl=¿ mß.Kkh hkq Tfí mß.Klh fyda
flá m‚úv heùu" SMS f,io ye¢kafõ" th fN!;sl fiajdodhlhka u; úYajdih ;eîu
flá m‚úv heùfï l%uhls' th mßYS,lhskg a fjkqjg o;a; fj; m%fõY ùug iy .nvd
blaukska iy myiqfjka ikakfs õokh lsÍug bv lsÍug" fhÿï Odjkh lsÍug iy .nvd lsÍu
i,ihs" fndfyda úg mqoa.,sl ixjdo" oekqï§ï iy ieliqï n,h jeks mß.Kl iïm;a Ndú;d
fyda weÕùï i|yd Ndú;d lrhs' lsÍug wka;¾cd,h Ndú;d lsÍuhs'
Ex: Google Drive, Dropbox, iCloud
Instant messaging services
laI‚l m‚úv heùu
Services of Cloud Computing
Two or many persons can exchange short j,dl=¿ mß.Klh u.ska bgq flfrk fiajd
messages very fast (chat) over the Internet
using the chat facility. 1. Infrastructure as a Service (IaaS)
mqoa.,hka fofofkl=g fyda fndfyda fofkl=g uDÿldx. fiajdjla f,i
peÜ myiqlu Ndú;fhka wka;¾cd,h yryd Provides virtualized computing resources
flá m‚úv ^chat& b;d fõ.fhka yqjudre lr like servers, storage, and networking.
.; yel' fiajdodhl" wdphkh iy cd,lrKh jeks
Ex: WhatsApp, Telegram, Viber, WeChat w:;H mß.Kl iïm;a imhhs'

2. Platform as a Service (PaaS)


ixj¾Ok mßir fiajdjla f,i
Offers a platform to build, deploy, and
manage applications without dealing
with the underlying infrastructure.
há;, myiqlï iuÕ .kqfokq fkdlr
fhÿï ;ekSug" fhoùug iy
Blogs l<ukdlrKh lsÍug fõÈldjla msßkuhs'
A blog is a regularly updated website or
online platform where individuals or groups 3. Software as a Service (SaaS)
share written content on various topics. uDÿldx. fiajdjla f,i
íf,d.a wvúhla hkq ksrka;rfhka hdj;ald,Sk Delivers software applications over the
jk fjí wvúhla fyda ud¾..; fõÈldjla jk
internet, so users don't need to install or
w;r tys§ mqoa.,hka fyda lKavdhï úúO
ud;Dld ms<sn| ,sÅ; wka;¾.;hka fnod .kS' maintain them locally.
wka;¾cd,h yryd uDÿldx. fhÿï ,nd
fohs" tneúka mßYS,lhskg a tAjd foaYh S j
ia:dmkh lsÍug fyda kv;a;= lsÍug wjYH
fkdfõ'
ictfromabc.com

Advantages of Cloud Computing Internet of Things (IoT)


j<dl=¿ mß.Kl Ndú;fha jdis The internet of things refers to everyday
objects that are equipped with sensors,
• Lower software cost software, and connectivity.
wvq uDÿldx. msßjeh id¾j øjH wka;¾cd,h hkq ixfõol" uDÿldx.
iy iïnkaO;d j,ska iukaú; tÈfkod
• Improve performance jia;+kh
a '
ld¾h idOkh jeä ùu
This allows them to be connected to the
• Fewer maintenance issues internet and share data with other devices
kv;a;= .eg¿ wvq ùu
and systems.
fuuÕska Tjqkga wka;¾cd,hg iïnkaO ùug
• Instant software updates
iy wfkl=;a Wmdx. iy moaO;s iuÕ o;a;
laI‚lj uDÿldx. hdj;ald,Sk ùu yqjudre lsÍug bv i,ih’

Disadvantages of Cloud Computing Characteristics of IoT


j<dl=¿ mß.Kl Ndú;fha wjdis IoT ys ,laIK

• Does not work well on low-speed internet • Interconnectivity


connection wka;¾ iïnkaO;djh
wvq fõ. wka;¾cd, iïnkaO;d u; fyd¢ka Devices, machines, and objects can be
ls%hd fkdlrhs interconnected with a global information
and communication network, such as the
• Security Concerns internet.
wdrlaIdldßhs Wmdx." hka;% iy jia;+ka wka;¾cd,h jeks
f.da,Sh f;dr;=re iy ikakf s õok cd,hla
• Limited Control iuÕ wka;¾ iïnkaO l< yelsh'
iSñ; md,kh
• Architecture
• Ongoing Costs (Subscription fees) ks¾udK Ys,amh
mj;sk úhoï ^odhl;aj .dia;=& Based on different hardware platforms
and networks, IoT devices can interact
with other devices or service platforms
through various networks.
úúO oDvdx. iy cd, u; mokïj" IoT
Wmdx.j,g úúO cd, yryd fjk;a Wmdx.
fyda fiajd fõÈld iuÕ wka;¾ l%shd l<
yelsh'

• Dynamic changes
.;sl fjkialï
IoT devices are not static, they often
change their states or behaviors in real
time.
IoT Wmdx. iaÓ;sl fkdfõ" tAjd fndfyda úg
;;H ld,Skj ;;ajhka fyda yeisÍï fjkia
lrhs'
ictfromabc.com

• Everything as a service Needs of IoT


iEu fohlau fiajdjla f,i IoT ys wjYH;d
IoT enables the concept of "as-a-service,"
where users can consume resources or 1. Smart Homes
services on demand. iqyqre ksjdi
—fiajdjla f,i— hk ixl,amh il%Sh lrhs"
tys§ mßYS,lhskg a b,a¨u u; iïm;a fyda This allows homeowners to control and
fiajdjka mßfNdackh l< yelsh'
monitor the home devices remotely to
enhance convenience, safety, and energy
• Time considerations
ld,h i,ld ne,Sï efficiency.
fuu.ska ksjdi ysñhkag myiqj" wdrlaIdj iy
It manages and processes a massive
n,Yla;s ld¾hlaIu;dj jeä ÈhqKq lsÍu iy
amount of data generated from numerous ÿria:j .Dy Wmdx. md,kh lsÍug iy
devices operating at the same time. ksÍlaIKh lsÍug bv i,ihs'
tljr l%shd;aul jk Wmdx. .Kkdjlska
ckkh jk o;a; úYd, m%udKhla Ex:
l<ukdlrKh lsÍu iy ieliSu isÿ lrhs'
Thermostats, Security systems, Sensors and
smart lights, Voice assistants
• Intelligence
nqoaêh ;dm ia:dh, wdrlaIl moaO;s, ixfõol iy
Abiliy to extract useful insights from the iaud¾Ü ,hsÜ, y~ iydhlhska
vast amounts of data that devices
generate. 2. Health Sector
Wmdx. ckkh lrk w;súYd, o;a; fi!LH i;aldr
m%udKhkaf.ka m%fhdackj;a wjfndaOhla ,nd
.ekSfï yelshdj'
IoT is transforming healthcare by enabling
remote monitoring, tracking, and real-time
data analysis, which improves patient care.
IoT u.ska ÿria: ksÍlaIK" ¨yqne£ï iy ;;H
ld,Sk o;a; úYaf,aIKh il%Sh lsÍfuka fi!LH
fiajd mßj¾;kh fjñka isák w;r tuÕska
frda.S i;aldr jeä ÈhqKq fõ'

Ex:
Remote Patient Monitoring, Fitness tracker
smart bands, Robotic surgeries
ÿria: frda.S ksÍlaIK, fhda.H;d ¨yqne£fï
iaud¾Ü má, frdfnda ie;alï
ictfromabc.com

3. Smart Cities 5. Manufacturing Industry


iqyqre k.r ksIamdok l¾udka;h

IoT helps to optimize services and improve IoT enabled machines, robotics, and sensors
the quality of life for residents. work together in a smart factory to monitor
IoT fiajdjka m%Yia; lsÍug iy production lines, optimize manufacturing
mÈxÑlrejkaf.a Ôjk ;;a;ajh jeäÈhqKq processes, and predict maintenance needs.
lsÍug WmldÍ fõ' ksIamdok fraLd ksÍlaIKh lsÍug" ksIamdok
l%shdj,Ska m%Yia; lsÍug iy kv;a;= wjYH;d
Ex: mqfrdal:kh lsÍug il%Sh hka;%" frdfnda úoHdj
Traffic management, Waste management, iy ixfõol l%shd lrhs'
Infrastructure management
r:jdyk l<ukdlrKh, wmøjH
l<ukdlrKh, há;, myiqlï l<ukdlrKh

4. Agriculture
lDIsl¾udka;h

IoT is revolutionizing agriculture by


providing farmers with tools to optimize crop
production, monitor livestock, and conserve
resources.
f.dùkag fnda. ksIamdokh m%Yia; lsÍu" mY=
iïm;a ksÍlaIKh lsÍu iy iïm;a ixrlaIKh
lsÍu i|yd fuj,ï ,nd §fuka
lDIsl¾udka;fha úma,ùh fjkila isÿ lrhs'

Ex:
Weather forecasting devices, Computerized
pest control devices, Automatic weed
removing machines, RFID(Radio Frequency
Identification)
ld,.=K wkdjels WmlrK, mß.Kl.;
m<sfndaO md,k WmlrK, iajhxl%Sh j,a me,Eá
bj;a lsÍfï hka;%
ictfromabc.com

HTML (Hyper Text Markup Language) Web pages are viewed using web browsers
like Google Chrome, Mozilla Firefox,
What is the Internet? Internet Explorer, and Safari.
wka;¾cd,h hkq l=ulao? Google Chrome, Mozilla Firefox, Internet
Explorer iy Safari jeks fjí w;sßlaiq
A collection of networks scattered all Ndú;fhka fjí msgq o¾Ykh lrhs'
around the world is known as the internet.
f,dj mqrd úisÍ we;s cd, tl;=jla
wka;¾cd,h f,i ye¢kafõ.

Internet enables businesses, organizations,


governments, and individuals to
communicate in a variety of ways.
wka;¾cd,h u.ska jHdmdr" ixúOdk" rchka
Web Site
iy mqoa.,hkag úúO wdldrj,ska
fjí wvúh
ikakfs õokh lsÍug yelshdj ,efí.
It is a collection of related Web pages under
One of the most popular ways users one domain name.
communicate on the Internet is by th tla jiu kduhla hgf;a wod< fjí msgq
publishing and interacting with Web pages. tl;=jls'
fjí msgq m%ldYkh lsÍu iy wka;¾ l%shd lsÍu
hkq wka;¾cd,h yryd mßYS,lhska
ikakfs õokh lrk jvd;a ckm%sh l%uj,ska Home Page
tlls' uq,a msgqj

The main page of any web site is called the


Web browser
fjí w;sßlaiqj home page. It is usually the first page a user
sees when visiting a web site.
Software used by users to request, view, ´kEu fjí wvúhl m%Odk msgqj uq,a msgqj
f,i ye¢kafõ' th idudkHfhka fjí
and interact with web content. wvúhlg msúfik úg mßYS,lfhl= olsk
fjí wka;¾.;hka b,a,Sug" keröug iy m<uq msgqjhs'
tAjd iu. wka;¾l%shd lsÍug mßYS,lhka
úiska Ndú;d lrk uDÿldx. fõ'
Usually, it contains general information
about the Web site and related links.
Web page idudkHfhka" tys fjí wvúh iy wod< ine¢
ms<sn| idudkH f;dr;=re wvx.= fõ'
fjí msgqj

Web pages are written in HTML.


Link Page
fjí msgq HTML j,ska ,shd we;' ine¢ msgqj

A web page consists of web objects such as Some links are found on web pages. They
HTML files, images, audio, video, or Java are used for opening pages within the same
applets. website or on other websites.
fjí msgqjla HTML f.dkq" msk;
a +r" Y%jH" oDYH iuyr ine¢" fjí msgq j, olakg ,efí'
fyda Java applets jeks fjí jia;= j,ska tlu fjí wvúfha fyda fjk;a fjí wvúj,
iukaú; fõ' msgq újD; lsÍu i|yd tAjd Ndú;d fõ'

These pages are referred to as link pages.


fuu msgq" ine¢ msgq f,i ye¢kafõ'
ictfromabc.com

Basic elements of a Web Page Organization of contents


fjí msgqjl uQ,sl wx. wka;¾.;j, ixúOdkh

1. Text: It consists of words, letters, The layout of a web page determines the
numbers, and other symbols. arrangement of the various elements and
mdG( th jpk" wl=re" wxl iy wfkl=;a sections.
ixfla; j,ska iukaú; fõ'
fjí msgqjl msßie,iqu úúO uQ,dx. iy
fldgiaj, ieleiau ;SrKh lrhs'
2. Graphics: Include drawings, charts,
diagrams, paintings, photographs, and Examples:
navigational buttons.
.%e*slaia( Ñ;%" m%ia:dr" rEm igyka" is;=jï" 1. Frames: Frame divides a Web page into
PdhdrEm iy ixp,k fnd;a;ï we;=<;a sections and allows users to access
fõ'
different pages and sites.
rduq( rduqjla u.ska fjí msgqjla
3. Audio: It is live or recorded sound. fldgiaj,g fnod mßYS,lhskg a úúO msgq
Y%jH wx.( th iÔù fyda má.; lrk ,o iy wvú fj; m%fõY ùug bv i,ihs'
Yíohls'

2. Lists: Lists are block formatting elements


4. Video: It is live or recorded movies.
that define a block structure.
ùäfhda wx.( th iÔù fyda má.; l<
,ehsia;=( ,ehsia;= hkq íf,dla jHqyhla
Ñ;%mg fõ'
ks¾jpkh lrk íf,dla wdlD;slrK wx.
fõ'
5. Animation: It refers to the movement
of text or graphics. 3. Tables: HTML tables enable users to
iÔúlrK( th mdG fyda .%e*slaia p,kh effectively present large amounts of
ms<sn| i|yka lrhs'
data in rows and columns.
j.=( HTML j.= uÕska mßYS,lhskg a fma<s
6. Hyperlinks: These are used to link
iy ;Sre wdldrfhka úYd, o;a; m%udKhla
webpage of the same web site, other M,odhS f,i bÈßm;a lsÍug yelshdj
web sites and another section of same ,efí'
web page.
wê ine¢( fïjd tlu fjí wvúfha fjí
msgqj" wfkl=;a fjí wvú iy tlu fjí
msgqfõ ;j;a fldgila iïnkaO lsÍug
Ndú;d lrhs'
ictfromabc.com

HTML Save
After writing the HTML code, it's saved with
A markup language used to write a ".html" extension (Ex. example.html).
instructions for web browsers on how to HTML fla;h ,sùfuka miq th ".html" È.=j
display the website's content, including iuÕ iqrlskq ,efí ^Wod' example.html&'
structure, text, and media.
jHqyh" mdG iy udOH we;=¿j fjí wvúfha
wka;¾.;h m%o¾Ykh lrkafka flfiao hkak
ms<sn| fjí w;sßlaiq i|yd Wmfoia ,sùug Open in Web Browser
Ndú;d lrk i,l=Kq NdIdjls' fjí w;sßlaiqfjkaa újD; lsÍu

NOTE: The saved HTML file is then opened in a


HTML is a mark-up language; it’s not a web browser, which reads and renders the
programming language. code to display the web page.
HTML hkq i,l=Kq NdIdjls¦ th l%uf,aLk iqrlsk ,o HTML f.dkqj miqj fjí
NdIdjla fkdfõ' n%jqirhla yryd újD; lrkq ,efí' th fjí
msgqj fmkaùug fla;h lshjd úoeyqï lrkq
,nhs'

HTML files and text editors


fla; iy mdG ixialdrl
Can Word Processing software be used
to write codes?
fla; ,sùug joka ieliqï uDÿldx. Ndú;d
l< yelso@

Yes, word processing software can be used


to write code as an alternative to text
editors, but it is not the standard or ideal
tool for this purpose.
Tõ" joka ieliqï uDÿldx. fm<
ixialdrlhkag úl,amhla f,i fla; ,sùug
Ndú;d l< yelsh' kuq;a th fï i|yd iïu;
fuj,u fkdfõ'
Text Editor
mdG ixialdrlh

A text editor is where a developer writes


HTML code.
mdG ixialdrlhla hkq ixj¾Olfhl= úiska
HTML fla;hla ,shk ia:dkhhs'

Ex. Sublime text, Visual Studio code, Atom,


Notepad, Notepad++, Brackets, Vim
ictfromabc.com

HTML tags Types of html tags


HTML Wiq,k html Wiq,k j¾.

Tags are the building blocks of an HTML 1. Container Tags


document. nyd¨ï Wiq,k
Wiq,k hkq HTML f,aLkhla f.dvkef.k
uQ,slu fldgia fõ' Container tags are elements that wrap
content and typically require both an
They are enclosed in angle brackets (such opening and a closing tag.
as <tagname>) and are used to define the nyd¨ï Wiq,k hkq wka;¾.;h jg lr we;s
structure and content of a webpage. uQ,dx. jk w;r idudkHfhka újD; lsÍfï
iy jid oeófï Wiq,khla wjYH fõ'
tAjd fldaK jryka ^<tagname> f,i& ;=<
ixjD; lr we;s w;r fjí msgqjl jHqyh iy
These tags are used to group elements
wka;¾.;h w¾: oelaùug Ndú;d lrhs'
together and structure content on the web.
fuu Wiq,k fjnfha uQ,dx. tlg iuQy.;
They often come in pairs, consisting of an lsÍug iy wka;¾.;h jHqy.; lsÍug
opening tag and a closing tag, with content Ndú;d lrhs'
in between.
tAjd fndfyda úg hq., jYfhka meñfKkafka Examples:
wdrïNl Wiq,khla iy wjika Wiq,khla
w;r wka;¾.;h we;=<;a lrñks'
<div>
<p>
For instance, in <p>Hello World</p>, <p>
This is inside a div
starts the element, and </p> ends it.
container.
WodyrKhla f,i" <p>Hello World</p>
ys" <p> u.ska uQ,dx.h wdrïN lrk w;r </p>
</p> u.ska th wjika lrhs' </div>

NOTE:
Incorrect tags are neglected by the web 2. Empty Tags (Self-Closing Tags)
browser, no errors are shown. ysia Wiq,k ^iajhx-jid oeófï Wiq,k&
jerÈ f,i Ndú; lrk Wiq,k fjí
w;sßlaiqj u.ska fkdi,ld yßk w;r fodaY Empty tags are elements that do not
m‚úvhla Èia fkdfõ.
contain content and do not require a
closing tag.
But they are still not displayed as content ysia Wiq,k hkq wka;¾.;h wvx.= fkdjk iy
because they are written inside angular jid oeófï Wiq,khla wjYH fkdjk uQ,dx.
brackets. fõ'
kuq;a tAjd fldaKsl jryka ;=, ,shk ,o
neúka, wka;¾.;hla f,i mßYS,lhdg Èia These tags are self-closing and are often
ùuo isÿ fkdfõ. used for inserting media, line breaks.
fuu Wiq,k iajhx wjika lsÍfï tAjd jk
Tags can be nested one in another. w;r fndfyda úg udOH" fma<s ì£ï we;=<;a
lsÍug Ndú;d lrhs'
Wiq,k tlsfklla ;=, l+vq l, yel.
ictfromabc.com

Examples Examples:

<img src="image.jpg" alt="A sample &nbsp;


image"> Used to prevent line breaks between words
or elements and to create extra spaces
<hr> where normal spaces would shrink.
jpk fyda uQ,dx. w;r fma<s ì£ï je<elaùug
iy idudkH ysia;eka m%udKj;a fkdjk
<input type="text" wjia:dj, wu;r ysia;eka ks¾udKh lsÍug
placeholder="Enter your name"> Ndú;d lrhs'

<link rel="stylesheet"
HTML comments
href="styles.css">
HTML újrK

<meta charset="UTF-8"> <!-- content -->

Content inside a comment will not be


3. Character Entity Tags shown on a webpage whatsoever.
újrKhla ;=, we;s wka;¾.;h lsisúfgl;a
Character entities are used to represent fjí w;sßlaiqjla u.ska o¾YKh fkdlrhs.
special characters that cannot be typed
directly in the HTML code, such as symbols, Comments are used to explain sectors of
punctuation marks, or characters reserved the code,
in HTML (ex: <, >, &). újrK Ndú; jkqfha fla; fldgia meyeÈ,s
Character entities, HTML fla;fha iDcqju lsÍu i|yd"
ghsma l< fkdyels úfYaI wkq,laIK
ksrEmKh lsÍug Ndú;d lrhs" tAjd kï • To own self
ixfla;" úrdu ,l=Kq fyda HTML ys fjka lr ;udgu
we;s wlaIr (Wod" <, >, &) fõ' • To third parties
;=kja k md¾Yjhlg
Character entities are written as &name; or Temporarily disable sectors of the code.
&#code;, where name is the entity name ;djld,slj fla; fldgia l%shd úrys; lsÍug.
and code is the numerical code for the
character.
Character entities, &name; fyda &#code;
f,i ,shkq ,efí. fuys name hkq entity
tflys ku jk w;r code hkq wkq,laIKh
ioyd jQ ixLHd;aul fla;hhs'
ictfromabc.com

Basic Structure of an HTML Document Text formatting tags


HTML f,aLkhl uQ,sl jHqyh mdG wdlD;SlrKh lsÍfï Wiq,k

<b> (Bold):
<!DOCTYPE html> Makes the text bold, useful for highlighting
<html> keywords or important information.
<head> mdG ;o wl=re njg m;a lrhs" uQ, mo fyda
<title>My First HTML jeo.;a f;dr;=re biau;= lsÍug m%fhdackj;a
fõ'
Page</title>
</head> <b> Ravindu Bandaranayake</b>
<body>
<h1>Welcome to HTML</h1>
<p>This is my first HTML <i> (Italic):
page.</p> Italicizes the text, often used for titles,
</body> quotes, or foreign words.
</html> ud;Dld" Wmqgd oelaùï fyda úfoaYh S jpk
i|yd fndfyda úg Ndú;d lrk mdG we,
wl=re njg m;a lrhs'
<!DOCTYPE html> Declaration
This declaration specifies the version of <i>Ravindu Bandaranayake</i>
HTML being used.
fuu m%ldYkh u.ska Ndú;d lrk HTML Ravindu Bandaranayake
wkqjdoh ioyka lrhs'

For modern webpages, it is always <u> (Underline):


<!DOCTYPE html>, indicating HTML5. Underlines the text to draw attention or
kùk fjí msgq i|yd" th ieuúgu
emphasize it.
<!DOCTYPE html> jk w;r" tu.ska HTML5
wjOdkh ,nd .ekSug fyda jeo.;a lr
olajhs' fmkaùug mdG háka brla wÈkq ,efí'

<html> Tag <u> Ravindu Bandaranayake</u>


This is the root element of the HTML
document. All other elements are nested Ravindu Bandaranayake
inside the <html> tag.
fuh HTML f,aLkfha uQ,slu wx.hhs'
wfkl=;a ish¨u uQ,dx. <html> Wiq,kh ;=< Line Breaks (<br>):
tla /ia lrkq ,efí' Adds a line break to start text on a new line.
kj fma<shla wdrïN lsÍug mdG ì£ula tla
<head> Tag lrhs'
The <head> tag contains metadata about
the document. Ravindu <br> Bandaranayake
<head> Wiq,kh ;=, f,aLkh ms<sn|
mdro;a; wvx.= fõ' Ravindu
Bandaranayake
<title> Tag
Defines the title of the document, which
appears on the browser tab.
fuu.ska w;sßlaiq má;af;ys Èiafjk
f,aLkfha ud;Dldj ks¾jpkh lrhs'
ictfromabc.com

<p> Tag Heading <h> Tags


<p> Wiq,kh
HTML heading tags are used to define
The <p> tag defines a paragraph, used to headings on a webpage.
structure and display text as separate fjí msgqjl YS¾I w¾: oelaùug HTML YS¾I
blocks with automatic new lines before and Wiq,k Ndú;d lrhs'
after.
These tags range from <h1> to <h6>,
<p> Wiq,kh u.ska fþohla ks¾jpkh lrhs"
where <h1> represents the highest (or
fmr iy miq iajhxl%Sh kj fma<s iys;j
fjku fldgia f,i mdG jHqy.; lsÍug iy most important) level of heading and <h6>
fmkaùug Ndú;d lrhs' represents the lowest (or least important)
level.
fuu Wiq,k <h1> isg <h6> olajd mrdihl
Attributes of <p> Tag mj;S" tys§ <h1> by<u ^fyda jeo.;au& YS¾I
<p> Wiq,kfha Wm,laIK uÜgu ksfhdackh lrk w;r <h6> my<u
^fyda wju jeo.;a& uÜgu ksfhdackh lrhs'
align
Specifies text alignment. (Deprecated in
<h1>This is Heading 1</h1>
HTML5)
mdG fm<.eiau kshu lrhs' <h2>This is Heading 2</h2>
<h3>This is Heading 3</h3>
(values: left, right, center, justify) <h4>This is Heading 4</h4>
<h5>This is Heading 5</h5>
<p align="center">This paragraph is <h6>This is Heading 6</h6>
centered.</p>

<hr> tag
<hr> Wiq,kh

The <hr> tag is used to create a horizontal


rule (line) that signifies a thematic break or
separation between sections of content.
wka;¾.;fha fldgia w;r f;aud;aul ì£ula
fyda fjkaùula olajk ;sria f¾Ldjla
ks¾udKh lsÍug <hr> Wiq,kh Ndú;d lrhs'

It is self-closing and does not require an


end tag.
th iajhx wjika lsÍfï Wiq,khla jk w;r
wjika Wiq,khla wjYH fkdfõ'
ictfromabc.com

<font> Tag 2. face


Specifies the font family.
used to change the appearance of text. wl=re j¾.h kshu lrhs'
mdGj, fmkqu fjkia lsÍug Ndú;d lrhs'
Example:
Attributes of the <font> tag
<font> Wiq,kfha Wm,laIK: <font face="Arial">
Text in Arial</font>
1. color
Defines the color of the text.
mdGfhys j¾Kh ks¾jpkh lrhs'
3. size
Indicates the size of the font.
• Named Colors: Predefined names like wl=re m%udKh olajhs'
red, blue, green.
red, blue, green jeks mQ¾j ksYÑ
a ; kï' Values range from 1 (smallest) to 7
(largest).
Example: w.hka 1 ^l=vdu& isg 7 ^úYd,;u& olajd
mrdihl mj;S'
<font color="red">
Red Text Example:
</font>
<font size="1"> Small Text </font>
<font size="4"> Medium Text </font>
• Hexadecimal Values: Codes like <font size="7"> Large Text </font>
#FF0000 for red and #0000FF for blue.
r;= i|yd #FF0000 iy ks,a i|yd
#0000FF jeks fla;'

Example:

<font color="#FF0000">
Red Text
</font>

• RGB Values: Values such as


rgb(255,0,0) for red.
r;= i|yd rgb(255,0,0) jeks w.hka'

Example:

<font color="rgb(255,0,0)">
Red Text
</font>
ictfromabc.com

Lists Attributes
,ehsia;= Wm,laIK

HTML provides three types of lists. type


HTML u.ska ,ehsia;= j¾. ;=kla imhhs. Defines the style of the bullet points.
Bullet points j, ú,dih ks¾jpkh lrhs'
1. Unordered Lists (<ul>)
Values
Used when the order of the items doesn't
matter. • disc (default): A solid circle.
whs;uj, wkqms<sfj, jeo.;a fkdjk úg • circle: An empty circle.
Ndú;d fõ' • square: A square bullet.

The items are typically displayed with bullet Example:


points.
whs;u idudkHfhka nq,Ü fmdhskÜ a iuÕ <ul type="square">
m%o¾Ykh flf¾'
<li>Apple</li>
<li>Banana</li>
Syntax:
<li>Cherry</li>
<ul> </ul>
<li>Item 1</li>
▪ Apple
<li>Item 2</li>
▪ Banana
<li>Item 3</li> ▪ Cherry
</ul>
2. Ordered Lists (<ol>)
• Item 1
• Item 2 An ordered list is used when the sequence
• Item 3 or order of the items is important. Items are
displayed with numbers, letters, or Roman
numerals by default.
<ul> whs;uj, wkqms<sfj, jeo.;a jk úg
Defines the start of the unordered list. ordered ,ehsia;=jla Ndú;d fõ' whs;u wxl"
unordered ,ehsia;=fõ wdrïNh ks¾jpkh wl=re fyda fmrksñfhka frdau b,lalï iuÕ
lrhs' m%o¾Ykh flf¾'

<li> Syntax:
Specifies individual list items. Each <li>
represents one item in the list. <ol type="A" start="3">
;ks ,ehsia;= whs;u kshu lrhs' iEu <li> <li>Item 1</li>
tllau ,ehsia;=fõ tla whs;uhla ksfhdackh <li>Item 2</li>
lrhs' <li>Item 3</li>
</ol>

C. Item 1
D. Item 2
E. Item 3
ictfromabc.com

<ol> <dd>
Defines the start of the ordered list. Defines the description or value for the
Ordered ,ehsia;=fõ wdrïNh ks¾jpkh topic.
lrhs' ud;Dldj i|yd úia;rh fyda w.h w¾:
olajhs'
<li>
Specifies individual list items, numbered Example:
sequentially.
wkqms<sfj,ska wxlkh lr we;s ;ks ,ehsia;= <dl>
whs;u kshu lrhs'
<dt>Python</dt>
Attributes <dd>Uses Interpreters</dd>
Wm,laIK

type <dt>Java</dt>
Defines the numbering style. <dd>Uses Compilers</dd>
wxlkh lsÍfï ú,dih ks¾jpkh lrhs'
<dt>SQL</dt>
Values: <dd>A query based language</dd>

1 (default): Numbers (1, 2, 3...). </dl>


A: Uppercase letters (A, B, C...).
a: Lowercase letters (a, b, c...). Python
I: Uppercase Roman numerals (I, II, III...). Uses Interpreters
i: Lowercase Roman numerals (i, ii, iii...). Java
Uses Compilers
3. Definition Lists SQL
A query based language
w¾: oelaùï ,ehsia;= (<dl>)

A description list is used to define terms


and their corresponding descriptions. It
is useful for displaying definitions or
key-value pairs.
ud;Dld iy tAjdg wkqrEm úia;r w¾:
oelaùug description list tlla Ndú;d lrhs'
th w¾: oelaùï fyda h;=re-w.h hq.,
fmkaùu i|yd m%fhdackj;a fõ'

<dl>
Defines the start of the description list.
Description list tflys wdrïNh ks¾jpkh
lrhs'

<dt>
Defines a heading or topic.
YS¾Ihla fyda ud;Dldjla ks¾jpkh lrhs'
ictfromabc.com

Displaying Multimedia Objects <audio> Tag


nyqudOH jia;=ka m%o¾Ykh lsÍu
The <audio> tag in HTML is used to embed
<img> Tag sound content (such as music or audio files)
into a web page.
used to embed images in an HTML HTML ys <audio> Wiq,kh Ndú;d lrkqfha
document. Yío wka;¾.;hka ^ix.S;h fyda Y%jH f.dkq
HTML f,aLkhl rEm we;=<;a lsÍug Ndú;d jeks& fjí msgqjlg we;=<;a lsÍughs'
lrhs'
Syntax
It is a self-closing tag, meaning it does not
require a closing tag. <audio src="audio.mp3" controls>
th iajhx wjika lsÍfï Wiq,khls" tkï </audio>
thg wjika lsÍfï Wiq,khla wjYH fkdfõ'
Attributes for <audio> tag
Syntax:
<audio> Wiq,kh ioyd jQ Wm,laIK
<img src="image.jpg"
src
alt="Description of the image"
Specifies the audio file location.
width="500" height="300">
Y%jH f.dkq ia:dkh kshu lrhs.

Attributes
controls
Wm,laIK
Adds playback controls for user interaction.
mßYS,l wka;¾l%shdj i|yd Odjkh lsÍfï
src (Required Attribute): md,k tla lrhs'

Specifies the path to the image file. autoplay


rEm f.dkqjg hk ud¾.h kshu lrhs' Automatically starts playing the audio
when the page loads.
The value can be: msgqj mQrKh jk úg iajhxl%Shj Y%jH jdokh
w.hka my; mßÈ úh yelsh( wdrïN fõ'

• A relative URL.
idfmalaI URL tlla.
(ex: images/photo.jpg)

• An absolute URL.
ksrfmalaI URL tlla.
(ex: https://example.com/photo.jpg)

width
Sets the width of the image.
rEmfha m<, ilihs'

height
Sets the height of the image.
rEmfha Wi ilihs'
ictfromabc.com

<video> Tag Web authoring tools


fjí msgq iïmdok fuj,ï
used to embed video content into a web
page. Software used to create or modify web
fjí msgqjlg ùäfhda wka;¾.;h we;=<;a content, simplifying the complexities of
lsÍug Ndú;d lrhs' HTML coding through user-friendly
interfaces.
Syntax HTML fla;lrKh ir, lrñka mßYS,l-ñ;%
w;=reuqyKq ;a yryd fjí wka;¾.;hka
<video src="video.mp4" controls> ks¾udKh lsÍu fyda fjkia lsÍu ioyd Ndú;d
lrk uDÿldx. fõ'
</video>
They eliminate the need for extensive
coding knowledge, speed up development,
Attributes for <video> tag reduce errors, and allow for visual design.
tAjd u.ska mq¿,a fla;SlrK oekqu i|yd we;s
<video> Wiq,kh ioyd jQ Wm,laIK
wjYH;djh bj;a lsÍu" ixj¾Okh fõ.j;a
lsÍu" fodaI wvq lsÍu iy oDYH ks¾udKh
src (Required Attribute): i|yd bv ,nd foa'
Specifies the path to the video file.
ùäfhda f.dkqjg hk ud¾.h kshu lrhs' Examples:

controls WYSIWYG HTML Editors:


Adds playback controls for user interaction. (What You See Is What You Get)
mßYS,l wka;¾l%shdj i|yd Odjkh lsÍfï Visual tools to design web pages without
md,k tla lrhs'
coding.
fla;SlrKhlska f;drj fjí msgq ie,iqï
autoplay lsÍu ioyd jQ oDYH fuj,ï fõ'
Automatically starts playing the video when
the page loads. • Adobe Dreamweaver
msgqj mQrKh jk úg iajhxl%Shj ùäfhdaj • BlueGriffon
jdokh ùug mgka .kS'
• Webflow
• Google Web Designer
width
Sets the width of the video.
ùäfhdafõ m<, ilihs'

height
Sets the height of the video.
ùäfhdafõ Wi ilihs'
ictfromabc.com

Application of ICT 4. Web based training ( WBT )


f;dr;=re yd ikaksfõok ;dlaIKfha fh§ï fjí mdol lr.;a mqyqKqùï
Web-Based Training delivers training
Education programs online, allowing users to
wOHdmkh
access interactive materials like videos
and quizzes at their convenience. It is
1. Learning management systems
bf.kqï l<uKdlrK moaO;s cost-effective, self-paced, and
Learning Management Systems (LMS) accessible from anywhere, making it
provide a central hub for online ideal for professional development.
fjí mdol mqyqKqj wka;¾cd,h yryd
learning, accessible 24/7. mqyqKq jevigyka ,nd fohs" mßYS,lhskag
bf.kqï l<ukdlrK moaO;s (LMS) Tjqkaf.a myiqj wkqj ùäfhda iy
ud¾..; bf.kSu i|yd flakaøSh m%Yakdj,sh jeks wka;¾l%shdldÍ øjH fj;
uOHia:dkhla imhk w;r" meh 24/7 m%fõY ùug bv i,ihs' th ,dNodhS"
mqrdu m%fõY úh yelsh' iajhx-fõ.j;a iy ´kEu ;ekl isg
m%fõY úh yels w;r th jD;a;Sh
2. For classroom education ixj¾Okh i|yd jvd;a iqÿiq fõ'
mka;sldurfha wOHdmkh i|yd
Smart classrooms use technology to 5. Web based learning ( WBL)
fjí mdol lr.;a b.ekaùï
enhance teaching and learning. Tools
like interactive whiteboards, projectors, Web-Based Learning uses the internet
internet-enabled devices, and for education, offering resources like
multimedia resources help teachers online lectures and e-books. It enables
deliver engaging lessons and explain flexible, interactive learning, allowing
complex topics. learners to study at their own pace and
iaud¾Ü mka;s ldur b.ekaùu iy bf.kSu location.
jeä ÈhqKq lsÍu i|yd ;dlaIKh Ndú;d fjí mdol bf.kSu wOHdmkh i|yd
lrhs' wka;¾l%shdldÍ jhsÜfndaâ" wka;¾cd,h Ndú;d lrhs" ud¾..;
fm%dfclag¾" wka;¾cd,-il%Sh Wmdx. iy foaYk iy úoHq;a fmd;a jeks iïm;a ,nd
nyqudOH iïm;a jeks fuj,ï .=rejrekag fohs' th kuHYS,S" wka;¾l%shdldÍ
is;a weo.kakd mdvï ,nd §ug iy bf.kSu il%Sh lrhs" bf.k .kakkag
ixlS¾K ud;Dld meyeÈ,s lsÍug Wojq Tjqkaf.au fõ.fhka iy ia:dkfhka
lrhs' bf.kSug bv i,ihs'

6. Higher education for everyone


3. Anytime anywhere learning
ieug Wiia wOHdmkh
´kEu ;ekl ´kEu fõ,djl wOHdmkh
,eîu Can connect with any educational
Freely accessible, openly licensed institute from a selected country and
educational materials that can be used get distant learning for an affordable
for teaching, learning, and research are price
open education resources. ´kEu rgl isg ;udg leu;s wOHdmk
b.ekaùu" bf.kSu iy m¾fhaIK i|yd wdh;khla iu. iïnkaO fjñka
Ndú;d l< yels ksoyfia m%fõY úh yels" ud¾..; ÿria: wOHdmkh yryd wvq
újD;j n,m;%,dNS wOHdmk øjH újD; úhoñka Wiia mdGud,djla yeoEßh yel
wOHdmk iïm;a fõ'
ictfromabc.com

Advantages of ICT in the Education Health sector


Sector fi!LH lafIa;%h
wOHdmk fËa;%fha f;dr;=re yd ikaksfõok
;dlaIKh we;s jdis 1. Diagnostic systems
frda. úksYaph moaO;sh
• Access Anytime, Anywhere
´kEu ;ekl isg ´kEu fõ,djl m%fõY Computerized Axial Tomography (CAT)
ùfï yelshdj
The machine consists of a rotating X-ray
• Higher Engagement and Interactivity tube and detectors that capture multiple
by< kshe,Su iy wka;¾ l%shdldÍ;ajh images as the patient lies on a moving
table.
• Enhanced Collaboration Opportunities fuu hka;%h N%uKh jk X-ray k,hlska iy
iyfhda.S;d wjia:d jeäÈhqKq ùu frda.shd p,kh jk fïihla u; je;sr isák
úg nyqúO PdhdrEm .%yKh lrk wkdjrl
• Variety of Resources j,ska iukaú; fõ'
iïm;a j, úúO;ajh
The collected data is processed by a
• Digital Skill Development computer to produce 2D and 3D images of
äðg,a l=i,;d ixj¾Okh the scanned area, allowing for precise
visualization of internal structures.
• Cost-Effective and Environmentally
2D iy 3D rEm ksmoùu i|yd tl;= lrk ,o
Friendly o;a; mß.Klhla uÕska ielfik w;r
msßjeh-M,odhS;djh iy mßir ys;ldó tuÕska wNHka;r jHqyhka ksjerÈj
nj oDYHlrKhg bv i,ihs'

• Streamlined Administration
úêu;a mßmd,kh

Disadvantages of ICT in the Education


Sector
wOHdmk fËa;%fha f;dr;=re yd ikaksfõok
;dlaIKh we;s wjdis

• Addiction to technology
;dlaIKhg weíneys ùu

• Expensive setup and maintenance.


ñ, wêl ieliqu iy kv;a;= lsÍu'

• Teachers often lack ICT skills.


.=rejrekag fndfyda úg f;dr;=re yd
ikaksfõok ;dlaIK l=i,;d fkdue;s ùu'
ictfromabc.com

Magnetic Resonance Imaging (MRI) Positron Emission Tomography (PET)

Magnetic Resonance Imaging (MRI) Positron Emission Tomography (PET)


provides detailed images of inside of the creates images of the body that help
body using powerful magnets and radio doctors diagnose diseases like cancer, heart
waves. conditions, and brain disorders.
pqïNl wkqkdo rEm (MRI) n,.;= pqïnl iy Positron Emission Tomography (PET) u.ska
.=jkaúÿ,s ;rx. Ndú;fhka isrefra ms<sld" yDo frda. iy fud<fha wdndO jeks
wNHka;rfha iúia;rd;aul rEm imhhs' frda. y÷kd .ekSug ffjoHjrekag Wmldr
jk YÍrfha rEm ks¾udKh lrhs'
MRI is useful for diagnosing various
conditions, such as neurological disorders, The PET scanner detects gamma rays
joint injuries, and cancers, without using emitted when the radiotracer interacts with
harmful radiation. body electrons, using this data to create a
MRI hkq ydkslr úlsrK Ndú;d fkdlr iakdhq 3D image of internal functions.
wdndO" ikaê ;=jd, iy ms<sld jeks úúO PET ialEkrh fraäfhda fÜ%i¾ YÍrfha
;;ajhka y÷kd .ekSu i|yd m%fhdackj;a bf,lafg%dak iuÕ wka;¾l%shd lrk úg ksl=;a
;dËKhls' jk .eud lsrK y÷kdf.k" wNHka;r
l%shdldrlïj, ;%sudK rEmhla ks¾udKh
lsÍug fuu o;a; Ndú;d lrhs'

Ultra sound scans

Used to visualize internal body structures,


including organs, tissues, and blood flow,
and are commonly used for monitoring
pregnancies and diagnosing medical
conditions.
wjhj" mgl iy reêr m%jdyh we;=¿
wNHka;r YÍr jHqyhka ksÍlaIKh lsÍug
Ndú;d lrk w;r .eí.ekSï ksÍlaIKh lsÍu
iy ffjoH ;;ajhka y÷kd .ekSu i|yd
nyq,j Ndú;d fõ'
ictfromabc.com

Electroencephalography (EEG) Cardiac screening machine

Electroencephalography (EEG) uses sensors Used to examine the heart health.


in a cap to capture brain signals, helping yDoh fi!LHh mÍlaId lsÍug Ndú;d lrhs'
scientists study brain activity and
understand functions like sleep, memory,
and certain disorders.
úoHq;a tkafi*f,da.%e*s (EEG) fud<fhka úoHq;a
ix{d .%yKh lr .ekSug ixfõol iys;
f;dmamshla Ndú;d lr" fud<fha l%shdldß;ajh
ksÍlaIKh lsÍug" kskao" u;lh jeks
l%shdldrlï iy we;eï wdndO f;areï
.ekSug úoHd{hskag bv i,ihs'

Patient Monitoring System


frda.S ksÍlaIK moaO;s

A patient monitoring system includes


devices with real-time monitoring, ensures
continuous observation and immediate
alerts if conditions change.
The Electrocardiogram (ECG) machine frda.S ksÍlaIK moaO;shlg ;;H ld,Sk
wëËKh iys; Wmdx. we;=<;a fõ" wLKav
The ECG machine records the heart's ksÍËKh iy;sl lsÍu iy fldkafoais fjkia
electrical activity, turning it into visual jqjfyd;a laI‚l weÕùï isÿlrhs'
graphs that accurately interpret heart
rhythms.
Blood Glucose Monitors
ECG hka;%h yDofha úoHq;a l%shdldrlï jd¾;d
reêr .aÆfldaia ksÍlaIl
lr" yDo ßoau ksjerÈj w¾:l:kh lrk
oDYH m%ia:dr njg m;a lrhs'

Measures glucose levels in the blood to


help monitor and manage diabetes.
Èhjeähdj ksÍlaIKh lsÍu iy
l<ukdlrKh lsÍu i|yd reêrfha .aÆfldaia
uÜgu uekSu'
ictfromabc.com

2. Telemedicine Home Health Supervision


ÿria: fi!LH /ljrKh ksjfia isg fi!LH wëlaIKh

Providing remote medical consultations, Devices are used to monitor patients'


diagnosis, and treatment through video health remotely.
calls, apps, or other digital communication frda.Skaf.a fi!LHh ÿria:j ksÍlaIKh lsÍug
tools is known as telemedicine. Wmdx. Ndú; flfra'
ùäfhda weu;=ï" fhÿï fyda fjk;a äðg,a
ikaksfõok fuj,ï yryd ÿria: ffjoH Improves patient comfort and proactive
WmfoaYk" frda. úksYaph iy m%;sldr iemhSu management of chronic illnesses, enabling
ÿria: fi!LH /ljrKh f,iska ye¢kafõ' easy access to hospital care if needed.
frda.shdf.a iqjmyiqj jeä ÈhqKq lsÍu iy
Emergency Telemedicine ksoka.; frda. l%shdYS,Sj l<ukdlrKh
(Remote clinical care) lsÍug" wjYH kï frday,a m%;sldr i|yd
ÿria: fi!LH Wjgeka myiqfjka m%fõY ùug yelshdj ,nd fohs'

A trained medical personal giving Telemedicine Consultation


Wmfoia ,nd.ekSu
emergency medical treatment to a patient
who cannot contact with a main hospital by
Taking advice from the specialist for the ICU
taking medical advice from a specialist over
when he is not available at the hospital over
communication media.
frda.sfhl=g m%Odk frday,la yd iïnkaO ùug communication media
fkdyels wjia:djl§ tys isák fi!LH mqyqKqj úfYaI{ ffjoHjrhd frdayf,a ke;s wjia:d
,enQ wfhla ikaksfõok udOHhla Tiafia j,§ ikaksfõok udOH u.ska oeä i;aldr
úfYaI{ ffjoH Wmfoia wkqj yÈis m%;sldr tallhg wjYH Wmfoia Tyqf.ka ,nd.ekSu
,nd§ frday, fj; heùu.
Remote surgery
ÿria: Y,Hl¾u

Surgeries carried out by doctors by taking


advice from specialists over
communication media.
ikaksfõok udOHhla Tiafia úfYaI{ ffjoH
Wmfoia ,nd.ksñka idudkH ffjoHjre
Y,Hl¾uhla isÿlsÍu.

Tele training
ÿria: mqyqKqj

Training doctors by contacting a resource


person over communication media using
screens and projectors.
ikaksfõok udOHhla Tiafia iïm;a odhlfhla
iïnkaO lr.ksñka ffjoH mqyqKqj ,nd§u.
ictfromabc.com

3. Wearable Health Trackers 5. Patient / medical report database


me<¢h yels fi!LH ksÍlaIK Wmdx. frda.Skaf.a $ ffjoH jd¾;d o;a;mdol

A wearable health tracker is a device, like a A patient/medical report database is a


smartwatch or fitness band, that monitors digital system for storing and managing
health metrics such as heart rate and sleep healthcare information, such as patient
patterns, syncing with smartphones to details, medical histories, and treatments. It
provide real-time insights for better health enhances accuracy, speeds up data
management. retrieval, reduces errors, and ensures data
me<¢h yels fi!LH ksÍlaIK Wmdx.hla hkq security.
iaud¾Ü Trf,daiqjla fyda fhda.H;d máhla frda.s$ffjoH jd¾;d o;a; iuqodhla hkq
jeks Wmdx.hla jk w;r th yDo iamkaok frda.Skaf.a úia;r" ffjoH b;sydih iy
fõ.h iy kskao rgd jeks fi!LH m%ñ;sl m%;sldr jeks fi!LH fiajd f;dr;=re .nvd
ksÍlaIKh lrhs" jvd fyd| fi!LH lsÍu iy l<ukdlrKh lsÍu i|yd jk
l<ukdlrKhla i|yd ;;H ld,Sk äðg,a moaO;shls' th ksrjoH;djh jeä ÈhqKq
wjfndaOhla ,nd §ug iaud¾Üf*daka iuÕ lrhs" o;a; ,nd .ekSu fõ.j;a lrhs" fodaI
iuuqyq¾; lrhs' wvq lrhs" iy o;a; wdrlaIdj iy;sl lrhs

6. Robotic surgeries
frdfnda ie;alï

With robotic assistance, surgeons can


perform complex procedures with smaller
incisions, leading to faster recovery times
and improved outcomes for patients.
frdfnda wdOdrfhka" Y,H ffjoHjrekag l=vd
lemqï iys; ixlS¾K l%shd mámdá isÿ l<
yels w;r" fõ.j;a iqjh ,eîfï ld,hka iy
frda.Skaf.a m%;sM, jeäÈhqKq fõ'

7. Surgical Imaging Tools


ie;alï i|yd Ndú;d lrk leurd WmlrK

Surgeons can get real-time, detailed views


of a patient's internal structures during
operations.
Y,H ffjoHjrekag Y,Hl¾ufha§ frda.shdf.a
wNHka;r jHqyhka ms<sn| ;;H ld,Sk
iúia;rd;aul oiqka ,nd .; yel'
4. E-channeling

E-channeling is an online system that


simplifies appointment scheduling with
healthcare providers.
E-channeling hkq fi!LH fiajd imhkakka
iuÕ yuqùï ld,igyklg wkqj isÿ lrk
ir, ud¾..; moaO;shls'
ictfromabc.com

Agricultural Industry ● Meteorological Devices


lDIsld¾ñl l¾udka;h ld,.=‚l WmlrK

Information and Communication These devices play a crucial role in


Technology (ICT) has revolutionized the assessing weather conditions, climatic
field of agriculture in recent years. changes, rainfall, wind direction and
f;dr;=re yd ikaksfõok ;dlaIKh uE; other environmental factors.
jirj,§ lDIsld¾ñl lafIa;%fha úma,ùh ld,.=‚l ;;a;ajhka" foaY.=‚l
fjkila isÿ lr we;' úm¾hdi" j¾Idm;kh" iq<x ÈYdj iy
wfkl=;a mdßißl idOl ;lafiare
ICT is now extensively used across lsÍfï§ fuu WmlrK ;SrKd;aul
agriculture, animal husbandry and fisheries ld¾hNdrhla bgq lrhs'
industries to improve efficiency,
productivity and sustainability. The data collected by these devices is
lDIsld¾ñl" i;a;aj md,k iy ëjr extremely valuable in making informed
l¾udka;j, ld¾hlaIu;dj" M,odhs;dj iy decisions about crop cultivation and
;sridr nj jeäÈhqKq lsÍu i|yd f;dr;=re harvesting times to maximize yield and
yd ikaksfõok ;dlaIK oeka nyq,j Ndú;d minimize losses due to adverse
fõ'
weather.
whym;a ld,.=Kh fya;=fjka wiajekak
ICT for Farming Wmßu lr .ekSug iy mdvq wju lr
f.dú;ek i|yd f;dr;=re ;dlaIKh .ekSug fnda. j.dj iy wiajkq fk,k
ld,h ms<sn|j oekqj;a ;SrK .ekSfï§
A wide range of automated machines and fuu WmlrK u.ska /ia lrk o;a;
devices have been developed to ease the w;sYhska jeo.;afõ'
work of farmers who previously had to rely
● Automated Insect Control Devices
on manual labor in the fields.
iajhxl%Sh lDñ md,k WmlrK
óg fmr l=Uqrej, Y%ñl Y%uh u; hemSug isÿ
jQ f.dùkaf.a jev myiq lsÍu i|yd mq¿,a
mrdihl iajhxl%Sh hka;% iy Wmdx. Help minimize this damage by
ixj¾Okh lr we;' monitoring insect populations and
providing real-time data on their
These technologies not only reduce the growth and movement. This allows
physical workload on farmers but also farmers to take timely action to control
enable them to produce higher quality pests before they cause too much harm.
yields more consistently. lDñ .%ykh ksÍlaIKh lsÍfuka iy
fuu ;dlaIKhka f.dùka u; fN!;sl jev nr Tjqkaf.a j¾Okh iy p,kh ms<sn| ;;H
wvq lrkjd muKla fkdj" Wiia ;;a;ajfha ld,Sk o;a; ,nd §fuka fuu ydksh wju
wiajekakla jvd;a ia:djr f,i ksIamdokh lsÍug WmldÍ fõ' fuu.ska f.dùkag
lsÍug Tjqkag yels fõ' m<sfndaO ydks jeä ùug fmr tAjd md,kh
lsÍug ldf,daÑ; mshjr .ekSug yels fõ'
Below are some examples of such machines
being used in both developed and
developing countries.
ixj¾ê; iy ixj¾Okh fjñka mj;sk
rgj, Ndú;d lrk tjeks hka;% ms<sn|
WodyrK lsysmhla my; olajd we;'
ictfromabc.com

● Robotic Seedling Planters For Farmhouse Management


frdfnda îc me, j.d lrkakka f.dúm, l<ukdlrKh i|yd

Transplanting seedlings across large Apart from aiding in field operations, ICT
tracts of land can be a time and labor- also plays a key role in managing various
intensive process. activities within the farmhouse itself,
úYd, bvï yryd îc me, noaO lsÍu especially in the rearing of livestock. Some
ld,h yd Y%uh-oeä l%shdj,shla úh
examples are,
yelsh' lafIa;% fufyhqï i|yd iydh ùug wu;rj"
f.dúm< ;=<u úúO l%shdldrlï
Robotic seedling planters automate l<ukdlrKh lsÍfï§" úfYaIfhkau mY=
this task, using robotic arms to pick up iïm;a we;slsÍfï§ f;dr;=re yd ikaksfõok
seedlings from a tray and plant them in ;dlaIK m%Odk ld¾hNdrhla bgq lrhs' iuyr
WodyrK f,i"
the field at pre-determined intervals
and depths.
frdfnda îc me, jeú,slrejka fuu ● Using radio frequency identification
ld¾hh iajhxl%Sh lrhs" frdfnda wdhqO devices (RFID) to count and locate
Ndú;d lr nkafoaishlska îc me, animals.
,ndf.k l,ska ;SrKh l< ld, i;=ka .Kkh lsÍu iy msysàu
mr;rhka yd .eUqßka tAjd lafIa;%fha y÷kd.ekSu i|yd .=jkaúÿ,s ix{d
isgqjhs' yeÿkqïm;a WmlrK Ndú;h.

● Automated Milking and Health


Examination Systems
iajhxl%Sh lsß ,nd.ekSó iy ;;a;aj
mÍlaYd lsÍfï WmlrK
● Greenhouses
yß;d.dr

Greenhouses provide a controlled


environment to grow crops, shielding
them from the vagaries of weather like
excessive heat, cold, rain or pests.
yß;d.dr u.ska fnda. j.d lsÍug md,s;
mßirhla imhk w;r" wêl ;dmh"
iS;," jeis fyda m<sfndaO jeks ld,.=‚l
úp,Hhkaf.ka tAjd wdrlaId lrhs' ● CCTV Surveillance
wëlaYKh i|yd CCTV Ndú;h

● Using databases and computer


equipment for farm management.
f.dúm, l<ukdlrKh i|yd o;a;
iuqodhka iy mß.Kl WmlrK Ndú;d
lsÍu.
ictfromabc.com

ICT in the Fishing Industry ICT in Manufacturing and Business


ëjr l¾udka;fha f;dr;=re ;dlaIKh ksIamdok iy jHdmdr ms<sn| f;dr;=re
;dlaIKh
The fishing industry too is increasingly
relying on ICT to make operations more The manufacturing sector is one of the
targeted and efficient. biggest beneficiaries of ICT integration.
ëjr l¾udka;h o fufyhqï jvd;a b,lal.; ksIamdok wxYh f;dr;=re yd ikaksfõok
yd ld¾hlaIu lsÍug f;dr;=re yd ;dlaIK tAldnoaO;djfha úYd,;u
ikaksfõok ;dlaIKh u; jeä jeäfhka r|d m%;s,dNSkaf.ka tlls'
mj;S'
ICT enables the automation of various
One of the key applications here is the use production processes, minimizing the need
of underwater sensors to map fish for human labor while ensuring consistent
populations. quality.
fuys we;s tla m%Odk fhÿula jkafka u;aiH f;dr;=re ;dlaIKh u.ska úúO ksIamdok
.ykh is;shï .; lsÍu i|yd Èh hg l%shdj,Ska iajhxl%Sh lsÍu" ia:djr .=Kd;aul
ixfõol Ndú;d lsÍuhs' Ndjh iy;sl lrk w;ru ñksia Y%ufha
wjYH;djh wju lrhs'
These sensors are placed in different parts
of the water body and use sonar Some key applications include,
m%Odk fhÿï lsysmhla we;=<;a fõ tkï"
technology to detect the presence and
concentration of fish in the vicinity. ● Robotics
fuu ixfõol c, lf|a úúO ia:dkj,
;ekam;a lr we;s w;r tA wjg uiqkaf.a programmed to quickly switch between
meje;au iy idkaøKh y÷kd .ekSug fidakd¾ different product lines, providing much
;dlaIKh Ndú;d lrhs' more flexibility than human labor.
ñksia Y%uhg jvd fndfyda kuHYS,S njla
This data is then relayed in real-time to ,nd foñka úúO ksIamdok f¾Ld w;r
blaukska udre ùug jevigyka.; lr
computers on the fishing vessels via
we;'
satellite internet.
fuu o;a; miqj pkaøsld wka;¾cd,h yryd
● Supply Chain Management
ëjr hd;%dj, we;s mß.Kl fj; ;;H
iemhqï odu l<ukdlrKh
ld,Skj iïfm%aIKh flf¾'
Enables the real-time tracking of
Armed with this information, fishing crews inventory levels, incoming and
can directly navigate to the locations with outgoing shipments, and more.
the highest fish populations, rather than bkafjkagß uÜgï" meñfKk iy msg;g
hk keõ.; lsÍï iy ;j;a foa ;;H
casting their nets blindly and hoping for a ld,Sk g%ela lsÍu in, lrhs
good catch.
fuu f;dr;=rej,ska ikakoaOj" ëjr
ld¾huKav,hg ;u oe,a wkaOj t<jd fyd| ● Quality Control
uiqka n,dfmdfrd;a;=fjka isákjdg jvd" ;;a;aj md,kh
jeäu u;aiH .ykhla we;s ia:dk fj;
iDcqju hd;%d l< yelsh' Allows a higher sampling rate than
manual inspection, catching more
defects and more good quality of
output.
w;ska mÍlaIdjg jvd by< ksheÈ
wkqmd;hla" jeä fodaI w,a,d .ekSu iy
ksuejqfï jvd fyd| .=Kd;aul Ndjhg bv
i,ihs'
ictfromabc.com

● Video Conferencing E-government


ùäfhda iïuka;%K b-rdcH md,kh
Allows geographically dispersed teams
to communicate and collaborate in ICT plays a pivotal role in the development
real-time without the need for travel. and implementation of e-government,
N+f.da,Sh jYfhka úisÍ isák which aims to improve the efficiency,
lKavdhïj,g ixpdr wjYH;djhlska accessibility, transparency, and quality of
f;drj ;:H ld,Skj ikaksfõokh lsÍug
iy iyfhda.fhka lghq;= lsÍug bv government services.
i,ihs' ICT u.ska úoHq;a rdcH ixj¾Okh iy
l%shd;aul lr rdcH fiajdjkays
ld¾hlaIu;dj" m%fõYH;dj" úksúoNdjh iy
● Cloud Computing
.=Kd;aul nj jeä ÈhqKq lrhs'
j<dl=¨ mß.Kl ;dlaIKh
Allows small businesses to leverage 'big https://www.gov.lk/
compute' for complex data processing
and analysis.
There are essentially four types of
ixlS¾K o;a; ieliSu iy úYaf,aIKh
i|yd zúYd, .Kkhz Ndú;d lsÍug l=vd e-governance.
jHdmdrj,g bv i,ihs' uQ,slj b-rdcH md,k j¾. y;rla we;'

● E-commerce ● Government to Government (G2G)


B-jd‚cHh rchlska rchlg
This has opened up new markets and
growth opportunities, especially for Facilitates smooth interaction among
businesses in developing countries. different government entities.
úfYaIfhkau ixj¾Okh fjñka mj;sk úúO rdcH wdh;k w;r iqug wka;¾l%shd
rgj, jHdmdr i|yd fuh kj i|yd myiqlï imhhs'
fjf<|fmd< iy j¾Ok wjia:d újD; lr
we;' Visa Information
ùid f;dr;=re
https://www.immigration.gov.lk/

Aid for Tourists


ixpdrlhska i|yd Wmldr
https://www.srilanka.travel/

Government Law
rcfha kS;sh

Sri Lanka Custom information


› ,xld fra.=j ms,sno f;dr;=re

Map of Srilanka
› ,xld is;shu
ictfromabc.com

● Government to Citizens (G2C) ● Government to Business (G2B)


rchlska mqrjeishkag rchlska jHdmdrj,g

This ensures that citizens can access a It allows businesses to engage with the
wide range of public services efficiently. government through e-governance
fuu.ska mqrjeishkag mq¿,a mrdihl tools.
uyck fiajdjka ld¾hlaIuj ,nd .; th jHdmdrj,g b-md,k fuj,ï yryd
yels nj iy;sl lrhs' rch iuÕ iïnkaO ùug bv i,ihs'

List of Sri Lanka government Licensing


departments and agencies. n,m;% ,nd §u
› ,xld rcfha fomd¾;fïka;= iy
wdh;k ,ehsia;=. Procurement
https://www.gov.lk/government/web- m%iïmdokh
sites https://www.promise.lk

Educational Resources. Revenue collection


wOHdmksl iïm;a. wdodhï tl;= lsÍu
https://www.e-thaksalawa.moe.gov.lk/
Payment Services
f.ùï fiajd
Payment of utility bills.
Wmfhda.s;d ì,am;a f.ùu.
Banking Information
https://payment.ceb.lk/instantpay nexl= f;dr;=re
https://www.cbsl.gov.lk/
Renewal of Vehicle Licenses
jdyk n,m;% w¨;a lsÍu
Business Registration
jHdmdr ,shdmÈxÑh
Public Health Services https://www.drc.gov.lk
uyck fi!LH fiajd
Business and investments
Government Information Services jHdmdr iy wdfhdack
rcfha f;dr;=re fiajd
Information on Business Organization
Constitution jHdmdr ixúOdkh ms<sn| f;dr;=re
wdKavql%u jHjia:dj

Social Welfare Programs


iudc iqnidOk jevigyka
https://wbb.gov.lk/

Legal Systems
kS;s moaO;s
ictfromabc.com

● Government to Employees (G2E) Disadvantages of usage of ICT in


rchlska fiajlhkag governance
rdcH md,kfha§ ICT Ndú;fha wjdis
Here ICT tools aid in making interaction
between the government and its ● Digital Divide
employees quick and efficient, thereby wxls; fnÈu
boosting employee satisfaction levels.
fuys ICT fuj,ï rch iy tys fiajlhska ● Security Risks
w;r wka;¾l%shd blauka yd ld¾hlaIu wdrlaIl wjodkï
lsÍug WmldÍ jk w;r, tuÕska fiajl
;Dma;su;a uÜgu by< kxjhs' ● Technological Obsolescence
;dlaI‚l h,amek hdu
Forms
wdlD;s m;% ● Resistance to Change
fjkia lsÍug m%;sfrdaOh
Gazettes
.eiÜ ● Reliability Issues
https://documents.gov.lk/en/gazette.php úYajikSh;ajh ms<sn| .eg¿

Circulars
pl%f,aL
IT related employment opportunities
;dlaIKfhka ire /lshd wjia:d
Information on loan facilities
Kh myiqlï ms<sn| f;dr;=re
The main skills valuable in the ICT field
lafIa;%fha jeäu jákdlula we;s ksmqK;d
Advantages of usage of ICT in
• Technical skills (Coding)
governance ;dlaI‚l l=i,;d ^fla;kh&
rdcH md,kfha§ ICT Ndú;fha we;s jdis
• Analytical skills
● Increased Accessibility úYaf,aIKd;aul Ñka;kh
m%fõYH;dj jeä lsÍu
• Logical thinking
● Improved Service Delivery ;d¾lsl Ñka;kh
jeäÈhqKq l< fiajd iemhSu
• Adapting and learning new
● Enhanced Citizen Engagement technologies
jeäÈhqKq l< mqrjeis iyNd.S;ajh kj ;dlaIKhka wkqj¾;kh ùu iy
bf.kSfï yelshdj
● Increased Transparency
úksúoNdjh jeä lsÍu • Working in tight deadlines and
working under pressure
● Cost Savings mgq ld,iSudjka ;=< jev lsÍu iy
msßjeh b;sßlsÍï mSvkh hgf;a jev lsÍu

The above mentioned are the common


skills required for an IT job but the other
requirements change according to the job.
by; i|yka lr we;af;a f;dr;=re ;dlaIK
/lshdjla i|yd wjYH fmdÿ l=i,;d jk
w;r wfkl=;a ksmqK;d /lshdj wkqj fjkia
fõ'
ictfromabc.com

Some high-level, prosperous and well-paid Problems associated with the use of ICT
employment opportunities for those with f;dr;=re yd ikaksfõokh ;dlaIkh
Ndú;fha§ we;s jk .eg¨
knowledge of and the ability to handle ICT
are listed as follows.
Legal Issues
f;dr;=re yd ikaksfõok ;dlaIKh ms<sn|
ffk;sl .eg¨
oekqula iy yelshdjla we;s wh i|yd by<
uÜgfï" iuDoaêu;a iy fyd| jegqma iys;
/lshd wjia:d lsysmhla my; mßÈ 1. Data thefts
,ehsia;=.; lr we;' o;a; fidrlï

• Computer programmer (Software Personally Identifiable Information (PII)


Engineer) refers to any data that can potentially
mß.Kl l%uf,aLl (uDÿldx. identify a specific individual. This
bxðfkare) information can be used to distinguish one
person from another or could be used to
• Computer/Information Systems
trace an individual's identity.
Analyst
mqoa.,fhl=f.a wkkH;dj oelafjk f;dr;=re
mß.Kl moaO;s úYaf,aIl
hkq ksYaÑ; mqoa.,fhl= y÷kd.; yels ´kEu
• Data Analyst/Data Scientist/Data o;a;hls' fuu f;dr;=re tla mqoa.,fhl=f.ka
Engineer ;j;a mqoa.,fhl= fjkalr y÷kd .ekSug fyda
mqoa.,fhl=f.a wkkH;djh fidhd .ekSug
• Database Administrators Ndú;d l< yelsh'
o;a; iuqodh l%uf,aLl iy
úYaf,aIl Ex: Full name, ID number, bank account
number, passport number and etc.
• Mobile Application Developer uq¨ ku" ye÷kqïm;a wxlh" nexl= .sKqï
cx.u ÿrl:k uDÿldx. wxlh" úfoia .uka n,m;% wxlh
ks¾udKlrejka
• Network and Systems Security Stealing personally identifiable information
Specialist from a computer or any other device can be
cd,lrK iy moaO;s wdrlaIl considered as data theft.
úfYaI{ mß.Klhlska fyda fjk;a Wmdx.hlska hï
mqoa.,fhlaf.a wkkH;dj oelafjk f;dr;=re
• Network Managers and fidrlï lsÍu o;a; fidrlu f,i ye¢kaúh
Administrator yel'
cd, l,ukdldr iy mßmd,l
• Telecommunication Engineer • Using malware
úÿ,s ikafoaY l,ukdlre ydkslr ïDÿldx. Ndú;fhka
• Hacking into someone’s account
• Business Analyst/ Project Manager .sKqula yela lsÍu u.ska
• Fullstack Web Developers • Phishing
fjí wvú ks¾udKlrejka
The stolen information is used for identity
• Cyber security analyst theft, which is when a person pretends to
• Machine Learning Engineer be someone he’s not and uses someone
else's information to engage in illegal
• AI engineer activities.
fuu fidrlï lrk ,o f;dr;=re
fhdod.ksñka fjk;a flfkla f,i fmkSisàug
W;aiy orhs' fuh wkkH;dj fidrlï lsÍu
f,i ye¢kafõ'
ictfromabc.com

2. Unauthorized access to computer Patent


systems mfgkaÜ n,m;%
mß.Kl moaO;s j,g wkjirfhka we;=,a
ùu A patent is a legal right granted for an
invention. Essentially, it gives the patent
Accessing a personal computer or a holder exclusive rights to make use or sell
network of computers without the owner's the invention for a specific period of time.
consent is illegal. In most cases, the user's fmagkaÜ n,m;%hla hkq kj ksmehqula i|yd
information is disclosed or stolen. ,nd fok kS;Hdkql+, whs;shls' uQ,sl jYfhka"
ysñlref.a oekqulska f;drj fm!oa.,sl th fmagkaÜ n,m;%,dNshdg ksYaÑ; ld,hla
mß.Klhlg fyda mß.Kl cd,hlg we;=,a i|yd kj ksmehqu Ndú;d lsÍug fyda
ùu kS;s úfrdaë fõ' fndfyda wjia:dj, úlsŒug iqúfYaIS whs;sjdislï ,nd fohs'
ysñlref.a o;a; fidrlï lsÍu fyda m%pdrKh
lsÍu isÿfõ' This exclusivity prevents others from
copying, manufacturing, or selling the
Many well-known companies such as invention without the patent holder's
Yahoo, Google, and Facebook have permission.
experienced hacking incidents. Former fuu iqúfYaI;ajh fmagkaÜ n,m;%,dNshdf.a
President Maithripala Sirisena’s Facebook wjirhlska f;drj fjk;a wh kj ksmehqu
page was also hacked. This happens msgm;a lsÍu" ksIamdokh lsÍu fyda úlsŒu
j<lajhs'
frequently, and numerous companies have
fallen victim to these attacks attacks. Trademarks
hdyQ, .+.,a uqyqKqfmd; jeks oejeka; wdh;k fj<o ,l=K
mjd yelaù we;' ffu;%Smd, isßfiak uy;df.a
ks, fjí msgqjo yelajqks' fïjd ks;r isÿfõ' A trademark typically protects brand names
and logos used on goods and services. This
3. Intellectual property rights means that another party cannot use the
nqoaêuh foam, iïnkaO whs;Ska same brand name logo, etc.
NdKav yd fiajdjkays Ndú;d lrkq ,nk
Intellectual property rights are legal rights fj,| kduhla fyda fj,| ,dxckhla fjk;a
wdh;khlg fyda mqoa.,fhlag Ndú;d lsÍug
that protect the intangible things created in bv fkdfok kS;suh rduqj fj,| ,l=K fõ'
an individual’s mind, such as inventions,
literary and artistic works, designs, symbols, Copywrites
poetry, etc. l;= ysñlu
nqoaêuh foam< whs;sjdislï hkq kj ksmehqï"
idys;H yd l,d;aul lD;s" ks¾udK" ixfla;" A copyright typically gives the owner the
lú hkd§ mqoa.,fhl=f.a ukfiys ks¾udKh
exclusive right to make copies of creative
jk iamrY l, fkdyels foaj,a wdrlaId lrk
kS;suh whs;sjdislï fõ' work, usually for a limited time. Rights
consist of reproduction, control over
It can be a creation of a single person or an derivative works, distribution, and public
organization. These rights grant creators performance. Copyrights are mostly used
exclusive control over the use of their for artistic work.
l;= ysñlu u.ska fndfydaúg wdrlaId lrkafka
creations for a certain period of time. l,d;aul ks¾udK fõ' fuu.ska ysïlreg
th ;ks mqoa.,fhl=f.a fyda ixúOdkhl muKla ks¾udKh wkqmsgm;a lsÍfï wjia:dj
ks¾udKhla úh yelsh' fuu whs;sjdislï ,ndfoa' l;=ysñlu u.ska ks¾udKh weiqfrka
ks¾udKlrejkag hï ld,hla i|yd Tjqkaf.a fjk;a ks¾udK lsÍu" ks¾udKh fnod yeÍu
ks¾udK Ndú;h flfrys iqúfYaIS md,khla iy m%ix. meje;aùfï whs;sh l;D g muKla
,nd fohs' ,ndfoa'
ictfromabc.com

Copyleft Issues related to values


iodpdrd;aul .eg¨
The name for a type of license for free
Plagiarism
content or free software. It is not the
,sÅ; oE fidrlu
opposite of copyright.
´kEu flkalag Ndú;d l, yels ïDÿldx. iy
Plagiarism is the representation of another
fjk;a ks¾udK fuu kñka y÷kajhs'
author's language, thoughts, ideas, or
No Copywrite Sounds (NCS) expressions as one's original work.
l;= ysñlu fkdue;s ix.S;h ;j;a rplfhlaf.a NdIdj" woyia" m%ldYkhka
;ud úiska fhdod.kakd ,o fhÿï f,i Ndú;d
lsÍuhs'
No copyright sounds are free to use tracks
and melodies created to be used in content Cyber Crime
such as YouTube videos. ihsn¾ wmrdO
hQ áhqí ùäfhda jeks wka;¾.;hka iE§fï§
fhdod.ekSu i|yd ks¾udKlrejka úiska Cyber Crime is a broad term that
fkdñf,a Ndú;d lsÍug ksmojd we;s YíO" .S;
iy ;kq' encompasses any illegal activity involving a
computer, network, or internet-connected
4. Fraud device. It's a growing threat in our
jxpd increasingly digital world, affecting
individuals, businesses, and governments
Manipulating or altering data in a alike.
computer to harm a person or an ihsn¾ wmrdO hkq mß.Klhla" cd,hla fyda
organization can be identified as fraud. wka;¾cd,hg iïnkaO Wmdx.hla iïnkaO
Most of the time, the person committing ´kEu kS;s úfrdaë l%shdldrlula we;=<;a mq¿,a
fhÿuls' th wmf.a jeä jeäfhka äðg,a
the fraud gets benefited from this. f,dalfha j¾Okh jk ;¾ckhla jk w;r th
;j;a mqoa.,fhlag fyda wdh;khlg ydkshla mqoa.,hkag" jHdmdrj,g iy rchkag tlfia
lsÍfï wruq‚ka mß.Klhl we;s o;a; n,mdhs'
yeisrùula fyda úlaD;s lsÍulg ,la lsÍu
jxpdjla fõ' fuu jxpdj lrkq ,nk
mqoa.,hdg fndfyda úg jdishla ysñfõ What is Cyber Security?
ihsn¾ wdrlaIdj hkq l=ulao@

Cybersecurity is the application of


technologies, processes, and controls to
safeguard systems, networks, programs,
devices, and data from cyberattacks. It aims
to minimize the risk of cyberattacks and
prevent unauthorized exploitation of
systems, networks, and technologies.
ihsn¾ wdrlaIdj hkq moaO;s" cd," jevigyka"
Wmdx. iy o;a; ihsn¾ m%ydrj,ska wdrlaId
lsÍu i|yd ;dlaIKhka" l%shdj,Ska iy md,k
fh§uhs' tys wruqK jkafka ihsn¾ m%ydr
wjodku wvq lsÍu iy moaO;s" cd, iy
;dlaIKhka wksis Ndú;fhka wdrlaId lsÍuhs.
ictfromabc.com

Agencies in Sri Lanka responsible for the De-Skilling


security of information exchange yiqre l=i,;d wfydais ùu
wka;¾cd, f;dr;=re yqjudrej i|yd ›
,xldj ;=, wdrlaIdj imhk wdh;k De-skilling refers to the process where
skilled labor in an industry or economy is
There are various organizations replaced by the introduction of
implemented by the government to technologies that are fully or
minimize cyber-attacks in Sri Lanka. semi-automated.
,xldj ;=< ihsn¾ m%ydr wju lsÍu i|yd yiqre l=i,;d wfydais ùu hkq l¾udka;hla
rch úiska l%shd;aul lrk ,o úúO wdh;k fyda wd¾Ólhl isák mqyqKq lïlrejka"
y÷kajd § we;' iajhxl%Sh fyda w¾O iajhxl%Sh ;dlaI‚l
Wmdx. u.ska m%;sia:dmkh ùuhs'
• Sri Lanka Computer Emergency
Readiness Team (CERT) De-Skilling causes unemployment.
• National Cyber Security Index (NCSI) De-Skilling directly affects the labor force
• ICTA working in large manufacturing plants.
fuu.ska ú/lshdj by, hEu isÿfõ' fuh
jeämqru n,mdkafka úYd, l¾udka;Yd,d j,
Social issues related with ICT /lshdfõ ksr; jk lïlrejkag fõ'
ICT ksid we;sjk iudÔh .eg¨
Environmental issues
mdßißl .eg¨
Digital divide
wxls; fnÿu
Electronic products are referred to as e-
The digital divide can be identified as the waste when their working period is over.
bf,lafg%dksl WmlrK j, l%shdldÍ ld,h
socio-economic gap between those who
wjika jQ úg tAjd bf,lafg%dksl wmøjH f,i
benefit from information and technology yÿkajhs'
and those who do not. Inequality has been
created in society as some have access to The improper disposal of e-waste causes
the IT platforms and others don’t. harm to the environment and people.
f;dr;=re ;dlaIkh ksid jrm%ido ,nk iy Mainly they contain mercury.
fkd,nk msßi w;r we;s iudc wd¾Óluh úoHq;a wmøjH wksis f,i neyer lsÍu
mr;rh wxls; fnÿu fõ' fuu wiudk;dj mßirhg iy ñksiqkagu ydks lrhs' fïjd
we;sjkafka msßilg fuu ;dlaIkh yd .eàug m%Odk jYfhka riÈh mßirhg tl;= lrhs'
wjldYh fkd;sîu iy wfkl=;a msßig
wjldY ;sîu ksidh'
Some harmful elements in electronics are
as follows
bf,lafg%dksl wmøjH ;=, mj;sk ydkslr
uq,øjH lsysmhla my; mßÈ fõ

Arsenic Cadmium
Beryllium Dioxin
Chromium Barium
Lead Selenium
Heavy metals
ictfromabc.com

Proper disposal of e-waste Health issues related with computers


bf,lafg%dksl wmøjH ksis mßÈ neyer mß.Kl wdY%s; fi!LH .eg¨
lsÍu
1. Repetitive Stress Injury (RSI)
1. Reduce mqk¾j¾;S wd;;s mSvdj
Ndú;h wvq lsÍu
Causes swelling, hardness, numbness, and
Reduce unnecessary purchasing by pain from the shoulders up to the fingertips
maintaining existing electronic devices. due to maintaining the same posture for an
mj;sk bf,lafg%dksl Wmdx. kv;a;= extended period period.
lsÍfuka wkjYH ñ,§ .ekSï wvq lsÍu' È.= ld,hla tlu bßhõj wkq.ukh lsÍu
ksid Wrysia isg weÕs,s ;=vq olajd bÈóu" ;o
2. Reuse nj" ysßjeàu iy fõokdj we;s lrhs'
kej; m%fhdackhg .ekSu

Reselling or donating old functioning


electronic devices.
mer‚ l%shdldÍ bf,lafg%dksl WmlrK
kej; úlsŒu fyda mß;Hd. lsÍu'

3. Recycle
m%;spl%SlrKh

Directing broken devices into a


recycling plant.
w¿;ajeähd l< fkdyels Wmdx.
m%;spl%SlrK wdh;khlg fhduq lsÍu'

2. Carpel Tunnel Syndrome (CTS)


ldm, fodakd iy,laIKh

Feeling of numbness and pain in fingers


due to pressure exerted on wrist.
ue‚la lgqj u; we;s lrk mSvkh ksid
weÕs,sj, ysßjeàula iy fõokdjla oekSu'
ictfromabc.com

3. Headache 6. Musculoskeletal problems


ysfia lelal=u udxYfmaYs iy wiaÓ wdY%s; .eg¨

Occurs due to neck muscle pressure. Caused by wrong postures


Tiredness of eyes and mental stress also ksjerÈ bßhjq j,ska fkdisàu ksid yg.kS
affects this.
fn,af,a udxY fmaYs mSvkh ksid we;sfõ' weia Methods of overcoming health issues
fjfyig m;aùu iy udkisl wd;;sh o fi!LH .eg¨ u.yrjd .ekSfï l%u
fuhg n,mdhs'
• Engage in correct postures
ksjerÈ bßhõ Ndú;h

• Adjusting the brightness of the screen


mß.Kl ;srfha wdf,dalh md,kh lsÍu

• Blinking and looking far away from the


screen
úáka úg ;srfhka msg; ÿr ne,Su yd
wisms,s fy,Su
4. Stress
wd;;sh • Taking breaks and walking short
distances
Sleeplessness, lack of appetite and úfõl .ekSu iy flá ÿr weú§u
tiredness are symptoms of this.
kskao fkdhdu" wdydr reÑh fkdue;slu iy • Wearing protective glasses for
f;fyÜgqj fuys frda. ,laIK fõ'
computers
mß.Kl ;srhg iqúfYaIS jQ lKaKdä
5. Computer Vision Syndrome (CVS) me<§u
mß.Kl oDIaá iy,laIKh
• Using a blue light filter at night
Staring at a screen for an extended period ks,a wdf,dal fmrk Ndú;h
can cause dryness, redness, tearing, and
blurred vision. Additionally, back and neck
pain can also occur.
È.= fõ,djla ;srhla foi n,d isàu ksid
weia úh<s ùu" r;= ùu" l÷¿ .e,Su iy
fmkSu fnd| ùu' tfiau fldkafoa fõokdj
iy fn,af,a fõokdj o we;s fõ'
ictfromabc.com

Physical and Logical security issues 2. Limiting and monitoring access


fN!;sl yd ;d¾lsl wdrlaIdj ms<sn| .eg¨ m%fõYh iSud lsÍu iy wëlaIKh lsÍu

Physical security issues Stealing computer hardware and data in


fN!;sl wdrlaIdj ms,sn| .eg¨ computers is a common issue faced by
users. Installing a door and keeping it
Physical security issues are the various
locked to prevent unauthorized people
insecurities that can cause harm to a
from accessing the computer room. It can
computer.
fN!;sl wdrlaIK .eg¨ hkq mß.Klhg also improve safety and other accessories
ydks l< yels úúO wkdrlaIs; Ndjhka fõ' while protecting the information contained.
mß.Kl oDvdx. yd mß.Klj, o;a;
1. Sudden power outages fidrlï lsÍu mßYS,lhka uqyqK fok fmdÿ
yÈis úÿ,sh wekysàï .eg¨jlss' wkjir mqoa.,hska mß.Kl
ldurhg we;=¿ ùu je<elaùu i|yd fodrla
2. Issues caused by thieves iú lsÍu iy th w.=¨ oeóu wka;¾.;
fydre ksid we;sfjk m%Yak f;dr;=re wdrlaId lrk w;ru wdrlaIdj iy
3. Power surges wfkl=;a Wmdx. jeäÈhqKq l< yel'
úÿ,s i¾ck
4. Change in climatic conditions Installing CCTV (Closed-Circuit Television) in
foaY.=‚l ;;a;ajhka fjkia ùu
the computer room can help to monitor the
people accessing the room and their ac9ons
Measures taken to control the damage
as well.
caused by physical security issues
fN!;sl wdrlaIl .eg¿ fya;=fjka isÿjk mß.Kl ldurh ;=< CCTV ia:dmkh
ydksh md,kh lsÍug .; yels mshjr lsÍfuka ldurhg m%fõY jk mqoa.,hska iy
Tjqkaf.a l%shd ksÍlaIKh lsÍug WmldÍ fõ'
1. UPS (Uninterrupted Power Supply)
wkjr; n, imhqu

UPS contains a battery that provides


backup power to your computer, allowing
you to save your work and shut down safely
during a power outage.
UPS ys Tnf.a mß.Klhg Wmia: n,h
imhk negßhla wvx.= jk w;r" Tnf.a
ld¾hh iq/lSug iy úÿ,sh wekysàul§
wdrlaIs;j jid oeóug Tng bv i,ihs'
ictfromabc.com

3. Power surge protectors 4. Climatic conditions and


úÿ,s n, i¾ck environmental factors
foaY.=‚l ;;a;ajhka iy mdßißl idol
Power surge protectors are devices that
help protect your electronic devices from Computers are sensitive to their
damage caused by sudden spikes in environment, and certain climatic
electrical voltage, called power surges. conditions and environmental factors can
These surges can happen due to lightning significantly impact their performance,
strikes, problems with the electrical grid, or lifespan, and reliability.
even when large appliances turn on or mß.Kl tAjdfha mßirhg ixfõ§ jk w;r
off. we;eï foaY.=‚l ;;a;ajhka iy mdßißl
n, i¾Ê wdrlaIlhka hkq úÿ,s idOl tAjdfha l%shdldß;ajh" wdhq ld,h iy
fjda,aàh;djfha yÈis by, hdu ksid we;sjk úYajikSh;ajhg ie,lsh hq;= f,i n,mE
ydksj,ska Tfí bf,lafg%dksl Wmdx. wdrlaId yelsh'
lsÍug WmldÍ jk Wmdx. jk w;r tAjd n,
i¾c f,i ye¢kafõ' wl=Kq ier je§u" úÿ,s Moisture, dirt, dust and lightning can cause
cd,fha .eg¨ fyda úYd, WmlrK il%sh fyda damage to computer hardware. A clean
wl%sh jQ úg mjd fuu i¾c isÿúh yel' computer room should be maintained and
dust should be removed using a vacuum
cleaner.
f;;ukh" wmsßisÿlu" ¥ú,s yd wl=Kq uÕska
mß.Kl oDvdx. j,g ydks isÿúh yelsh'
msßisÿ mß.Kl ldurhla mj;ajd .; hq;=
w;r jel=ï la,Sk¾ Ndú;fhka ¥ú,s bj;a l<
hq;=h'

AC can be used to maintain the moisture


level and a lightning conductor (lightning
rod) can be used to minimize the damage
caused due to lightning.
f;;ukh uÜgu mj;ajd .ekSu i|yd jdhq
iólrK Ndú;d l< yels w;r wl=Kq uÕska
isÿjk ydksh wju lsÍu i|yd wl=Kq
ikakdhlhla Ndú;d l< yelsh'
ictfromabc.com

Logical Security Issues Measures taken to minimize logical


;d¾lsl wdrlaIdj ms,sno .eg¨ security issues .eg¨ wju lsÍu i|yd .;
yels mshjr
Logical security refers to the protection of
computer systems, networks, and data 1. Passwords and Biometrics
through non-physical means, such as uqrmo iy ffcjñ;sl
software, protocols, and procedures. It
A password is used as an authentication
focuses on controlling access to
measure that allows only the authorized
information and preventing unauthorized
users to enter the computer. A strong
activities.
;d¾lsl wdrlaIdj hkq uDÿldx." fm%dfgdaflda, password consists of UPPERCASE,
iy l%shd mámdá jeks fN!;sl fkdjk l%u lowercase, letters, numbers and characters.
yryd mß.Kl moaO;s" cd, iy o;a; wdrlaId wjir ,;a mßYS,lhskag muKla mß.Klhg
lsÍuhs' th f;dr;=re fj; m%fõYh md,kh we;=¿ ùug bv i,ik i;Hdmk mshjrla
lsÍu iy wkjir l%shdldrlï je<elaùu f,i uqrmohla Ndú;d flfra' Yla;su;a
flfrys wjOdkh fhduq lrhs' uqrmohla wl=re" wxl iy ixfL; j,ska
iukaú; fõ'
Ways that can harm the data inside a
computer can be considered as Logical Biometrics is a much-advanced technology
security issues. The main issues are, that uses a unique physical feature of the
mß.Klhla ;=< we;s o;a; j,g ydks l< user to authenticate. Fingerprint scanners,
yels l%u ;d¾lsl wdrlaIl .eg¨ f,i Voice recognition, Retina (Eye) scanners can
ie,lsh yelsh' m%Odk .eg¨ jkafka" be iden9fied as the most widely used biometric
technologies.
1. Unauthorized local access to a ffcjñ;sl hkq mßYS,lhdf.a wkkH fN!;sl
computer ,laIKhla i;Hdmkh lsÍu i|yd Ndú;d
mß.Klhlg wkjirfhka msúiSu lrk b;d ÈhqKq ;dËKhls' weÕs,s i,l=Kq
iqmßlail, y~ y÷kd.ekSu" oDIaá ú;dkh
2. Unauthorized remote access to a iqmßlail nyq,j Ndú;d jk ffcjñ;sl
;dËKhka f,i y÷kd.; yelsh'
computer
mß.Klhlg ud¾..;j wkjirfhka
ÿria: ;ekl isg m%fõYh fõu

3. Malicious software
ydkslr uDÿldx.
ictfromabc.com

2. Firewalls 3. Backups
.sks mjqre wkqmsgm;a

Software and hardware firewalls can be A backup is a copy of computer data that
identified as technologies that are used to is taken and stored in a secure storage
prevent unauthorized personnel from location so it can be used to restore the
accessing our computers via the internet. original data in the event of a data loss
wka;¾cd,h yryd wkjir mqoa.,hska wmf.a wkqmsgm;la hkq mß.Kl o;a; ,ndf.k
mß.Klj,g m%fõY ùu je<elaùu i|yd wdrlaIs; .nvd ia:dkhl .nvd lr we;s
Ndú;d lrk ;dlaIKhka f,i uDÿldx. iy msgm;la jk w;r tuÕska o;a; ke;sùul§
oDvdx. .sks mjqre y÷kd.; yelsh' uq,a o;a; m%;sia:dmkh lsÍug Ndú;d l<
yelsh'
A hardware firewall should be installed on
There are 2 types of backups.
the router and a software firewall should be wkqmsgm;a j¾. 2ls
installed on the computer.
rjqgrh u; oDvdx. .sks mjqr ia:dmkh l< • Backups can be created in physical
hq;= w;r mß.Klfha uDÿldx. .sks mjqr
ia:dmkh l< hq;=h' devices such as CD, DVD, Flash drives,
External hard drives, etc.
fN!;sl Wmdx.j, wkqmsgm;a iEÈh yel'
• Backups can be made in a cloud
environment.
j,l=¨ mß.kl ;=, wkqmsgm;a iEÈh
yel'

Ex: Google Cloud, One back up, Back


Blaze
ictfromabc.com

4. Antivirus software Difficulties faced by Malicious software


m%;s - ffjri uDÿldx. ydkslr uDÿldx. ksid we;sjk wmyiq;d

Antivirus software is like a security guard • Minimizing efficiency of the computer


for your computer. It's a program designed mß.Klfha ld¾hlaIu;dj wju lsÍu
to protect your computer from malicious
software, also known as malware. • Restarting the computer time to time
m%;s-ffjri uDÿldx. hkq Tfí mß.Klh mß.Klh jßka jr kej; mk.kaùu
i|yd wdrlaIlfhl= jeksh' th Tfí
mß.Klh ydkslr uDÿldx. j,ska wdrlaId • Malfunctioning of other software
lsÍug ks¾udKh lr we;s jevigykls' wfkl=;a uDÿldx. wl¾ukH lsÍu

• Sabotage of networks
Malicious software/ Malware cd, lvdlmam,a lsÍu
ydkslr uDÿldx.
• Data theft and destruction
Malware is a software designed to harm or o;a; fidrlï lsÍu iy úkdY lsÍu
gain unauthorized access to a computer
system. It's like a digital troublemaker that • Weakening hardware
oDvdx. wvmK lsÍu
can cause all sorts of problems, from
stealing your personal information to • Storing unnecessary data in HDD oDv
completely destroying your computer. ;eá ;=< wkjYH o;a; .nvd lsÍu
ydkslr uDÿldx. hkq mß.Kl moaO;shlg
ydks lsÍug fyda wkjirfhka m%fõY ùug • Displaying random error messages
ks¾udKh lr we;s uDÿldx.hls' th Tfí wyUq fodaI m‚úv fmkaùu
mqoa.,sl f;dr;=re fidrlï lsÍfï isg Tfí
mß.Klh iïmQ¾Kfhkau úkdY lsÍu olajd
ish¨ wdldrfha .eg¨ we;s l< yel'
ictfromabc.com

Types of malicious software and their Worms


harms Same as a virus, but they can function and
ydkslr uDÿldx. j¾. iy tAjdf.ka isÿjk spread on their own without a host
ydks ffjrihla yd iudkhs" kuq;a tAjdg
Odrlfhl= fkdue;sj ;ksju l%shd lr me;sr
Bots hd yelsh'
Bots are available as both harmful and
non-harmful
fndÜia ydkslr iy ydkslr fkdjk f,i
mj;S

Harmful bots act on their own to collect


personal information. Non-harmful bots
are used to perform various tasks which
should be done by the user without the
presence of him.
ydkslr fndÜia iajhxl%Shj l%shd lr mqoa.,sl
f;dr;=re /ia lrhs' ydkslr fkdjk fndÜia Ransomware
Ndú;d lrkqfha mßYS,lhd fkdue;sj l< hq;= Encrypts the data of an infected computer
úúO ld¾hhka bgq lsÍug h' and requests the user money for
decrypting them
wdidÈ; mß.Klhl o;a; ixfla;kh lr
tAjd úfla;kh lsÍug mßYS,lhdf.kaa uqo,a
b,a,d isà'

Virus
Connects with executable (.exe) files and
spreads through networks, external storage
devices and email aDachments. Destroys data,
soFware and hardware. Spyware
l%shdldÍ f.dkq iuÕ iïnkaO jk w;r cd," Spyware is a type of malicious software, or
ndysr .nvd Wmdx. iy úoHq;a ;eme,a malware, that secretly monitors your
weuqKqï yryd jHdma; fõ' o;a;" uDÿldx. computer activity without your consent.
iy oDvdx. úkdY lrhs'
Spyware hkq Tfí wjirhlska f;drj Tfí
mß.Kl l%shdldrlï ryis.;j ksÍlaIKh
lrk ydkslr uDÿldx. j¾.hls.
ictfromabc.com

1. Trojan horse Phishing


Presents itself as a useful software and does These acts as the original website and
data destruction, stealing and deleting collects users login and credit card
when it is installed. It also allows other information by requesting him to fill forms.
harmful software to enter the computer. It fuh i;H fjí wvúh f,i l%shd lrk w;r
does not spread. fmdaru mqrjk f,i b,a,d isàfuka
mßYS,lhskaf.a msúiqï iy fl%äÜ ldâ
m%fhdackj;a uDÿldx.hla f,i bÈßm;a jk
f;dr;=re /ia lrhs'
w;r th ia:dmkh l< úg o;a; úkdY lsÍu"
fidrlï lsÍu iy uld oeóu isÿ lrhs' th
fjk;a ydkslr uDÿldx. mß.Klhg we;=¿
ùug o bv i,ihs' th me;sfrkafka ke;'

Hijacker
This is capable of misdirecting the user to a
different website through the internet
2. Key loggers when connecting.
Available as hardware and software. mßYS,lhd wka;¾ch,h yd iïnkaO jk
Records all the keystrokes of a keyboard in wjia;dfõ§ Tyq fkdu. hjñka fjk;a fjí
a computer and later gives them to a third msgq fj; iïnkaO;dj fhduq lrhs.
party.
oDvdx. iy uDÿldx. jYfhka mj;S' Spam
mß.Klhl h;=remqjrejl ish¨u h;=re Spam refers to unsolicited, often bulk,
tîï má.; lr miqj tAjd f;jk electronic messages that are commonly
md¾Yjhlg ,nd foa' used for advertising, phishing, spreading
malware, or other malicious activities.
Spam hkq b,a¨ula fkdue;s" fndfyda úg
f;d. jYfhka fnod yßk ,o" úoHq;a m‚úv
jk w;r" tAjd fj<| oekaùï" ;;=nEï,
ydkslr uDÿldx. me;srùu fyda fjk;a
oafõIiy.; wruqKq i|yd ks;r Ndú; fõ'

Adware
Displays unwanted advertisements on the
screen. This is not harmful, but it causes
distractions and annoys the user.
;srh u; wkjYH fj<| oekaùï fmkajhs'
fuh ydkslr fkdfõ" kuq;a th wjOdkh
fjk;lg fhduq lrk w;r mßYS,lhdg
lror lrhs'
ictfromabc.com

Protecting a computer from malware Popular antivirus software


ydkslr uDÿldx. j,ska mß.Klhla m%p,s; m%;sffjri uDÿldx.
wdrlaId lr.ekSu
• Bitdefender
Internet is a common tool used in the • Avast
modern world. Every device is connected to
• Malware bytes
the internet. Therefore, the risk of getting
malware on a device is high. There are • McAfee
various guidelines provided to help the • Safer-Networking
users be safe. Some of these are, • Webroot
wka;¾cd,h hkq kQ;k f,dalfha nyq,j • Avira
Ndú;d jk fuj,uls' iEu Wmdx.hlau
wka;¾cd,hg iïnkaO lr we;' tneúka" • Sophos
Wmdx.hlg ydkslr uDÿldx. we;=,a ùfï • Kaspersky
wjodku by< h' mßYS,lhskag wdrlaIs;j
isàug Wmldr lsÍu i|yd úúO ud¾f.damfoaY • Microsoft security essentials
imhd we;' • Norton
• Panda
• Installing and activating an antivirus
• Norman
software
m%;sffjri uDÿldx.hla ia:dmkh lsÍu
iy il%sh lsÍu

• Installing authorized software


iEu úgu kS;Hdkql+, uDÿldx. ia:dmkh
lsÍu

• Scanning external storage devices


when using
Ndú;d lrk úg ndysr .nvd Wmdx.
mßlaId lsÍu

• Accessing into secured websites only


wdrlaIs; fjí wvú j,g muKla msúiSu

• Scanning downloaded files before


opening
nd.; l< f.dkq újD; lsÍug fmr
mßlaIdlsÍu

• Avoid clicking on suspicious


advertisements
iel iys; fj<| oekaùï u; la,sla
lsÍfuka je<lSu

• Avoid inserting personal information


on insecure websites
wkdrlaIs; fjí wvú j,g mqoa.,sl
f;dr;=re we;=<;a lsÍfuka je<lSu

You might also like