MPPSCADDA

INFROMATION AND COMMUNICATION TECHNOLOGY CONTENTS

❖ Chapter 1 BASIC COMPUTER AND IT TERMS

❖ Chapter 2 COMPUTERS AND INFORMATION TECHNOLOGY

❖ Chapter 3 COMMUNICATION AND MOBILE TECHNOLOGIES

❖ Chapter 4 ROBOTICS, ARTIFICIAL INTELLIGENCE and CYBER SECURITY

❖ Chapter 5 E-GOVERNANCE

❖ Chapter 6 INTERNET AND SOCIAL NETWORKING SITES

❖ Chapter 7 E-COMMERCE

MPPSCADDA

1. BASIC COMPUTER AND IT TERMS

INTRODUCTION

There are three different types of computers and computer applications that we encounter in daily life.

• One, those machines which are dedicated to a limited set of tasks. Familiar domestic appliances like washing machines or microwave oven are operated by an electronic device embedded inside these gadgets. • Two, those that are used for specific and limited number of activities, like playing games and other forms of entertainment. • Third category includes versatile machines capable of doing a multitude of tasks, including surfing the Internet. • In our day-to-day life, we use various electrical and electronic devices such as computers, digital watches, audio systems, CD and DVD players, washing machines and so on. • Outside home we use lifts, metro trains, coin collection systems in public telephone booths, coffee and tea vending machines and so on. These are mostly computer controlled devices. We do not see the ‘computers’; they are embedded inside these devices. • Computers have brought in changes in art and music, photography and animation, editing and publishing. • Digital home theatre systems, DVD players, digital music devices of which the computer forms an integral part, makes entertainment low cost and of high quality. • The Internet has emerged as a convenient means of global communication, information sharing and services. The commonest mode of the Internet use includes e-mail, chat, surfing information, banking, reservations and many more. A huge network of millions of computer networks constitutes the Internet. These networks are connected by telephones, underwater cables and satellites.

Information Technology • Information Technology (IT) is a generic term that covers the acquisition, processing, storage and dissemination of information. • It involves the application of computers and communication technology in the task of information handling, information and information flow from the generation to the utilization levels. • It is restricted to systems dependent on microelectronics-based combination of computers and telecommunication technologies. • The IT is the boon for mankind. It gives accessibility to information at fingertips.

BASIC Computer and Information Technology Terms

Adware • It is a software package that automatically renders advertisements to generate revenue for its author.

Android • It is a Linux based operating system designed primarily for touchscreen mobile devices such as smartphones and tablets computers.

Algorithm • It is a step by step method of solving a problem. It is commonly used for data processing, calculation, and other related computer and mathematical operations.

Antivirus Software • It consists of computer programs that attempt to identify threatsand eliminate computer viruses and other malicious software (Malware).

Artificial Intelligence (AI) • Artificial Intelligence (AI) is the ability of a machine or a computer program to think and learn. The concept of AI is based on the idea of building machines capable of thinking, acting, and learning like humans

Augmented Reality • The word augment means to add or enhance something. In the case of Augmented Reality (also called AR), graphics, sounds, and touch feedback are added into our natural world to create an enhanced user experience. • An enhanced version of reality where live direct or indirect views of physical real-world environments are augmented with superimposed computer-generated images over a user’s view of the realworld, thus enhancing one’s current perception of reality.

API • API is the acronym for Application Programming Interface, which are software intermediary that allows two applications to talk to each other

Big Data • It is a phrase used to mean a massive volume of both structured and unstructured data that is so large that it is difficult to process using traditional database and software techniques. In most enterprise scenarios the volume of data is too big or it moves too fast or it exceeds current processing capacity.

Bandwidth • The maximum amount of data that can travel in a communication path in a given time, measured in bits per second (bps).

Bar Code • It is a machine-readable representation of information in a visual format on a surface. The first bar code system was developed by Norman Joseph Woodland and Bernard Silver in 1952.

Blog • It is a discussion or informational site published on the World Wide Web.

Bluetooth • A protocol that permits a wireless exchange of information between computers, cell phones, and other electronic devices within a radius of about 30 feet.

Cloud Computing • Cloud computing means storing and accessing data and programs over the Internet instead of your computer’s hard drive. The cloud is just a metaphor for the Internet. • Cloud computing is not about is your hard drive. When you store data on or run programs from the hard drive, that’s called local storage and computing. Everything you need is physically close to you, which means accessing your data is fast and easy, for that one computer, or others on the local network. • Working off your hard drive is how the computer industry functioned for decades. It is still superior to cloud computing

Common Cloud Examples Microsoft offers a set of Web-based apps, Office Online, Onedrive, Google drive that are Internet-only versions your Web browser without installing anything.

Cookie • A packet of information that travels between a browser and the webserver.

Cryptograph • The pre-fix “crypt” means “hidden” or “vault” and the suffix “graphy” stands for “writing”. Cryptography is a method of protecting information and communications through the use of codes so that only those for whom the information is intended can read and process it. • It includes techniques such as microdots, merging words with images, and other ways to hide information in storage or transit.

Data mining • It is defined as a process used to extract (mining) usable data from a larger set of any raw data. It implies analysing data patterns in large batches of data using one or more software. Data mining has applications in multiple fields, like science and research, business.

Digital locker • It is an online media storage service. Files stored include music, videos, movies, games, and other media. Most digital locker services require a user to register to avail of the service.

DigiLocker • DigiLocker is a “digital locker” service by the Government to enable citizens to store documents on a cloud. Itreduces need to carry physical documents. • It part of the government’s Digital initiative • 1 GB of storage space is offered to users to store identifi cation card issued by government agencies, education certifi cates, PAN cards, driving license, vehicle ownership documents and some other documents.

Digital Signature • A digital signature is a mathematical technique used to validate the authenticity and integrity of a message, software or digital document. • The digital equivalent of a handwritten signature or stamped seal, a digital signature offers far more inherent security, and it is intended to solve the problem of tampering and impersonation in digital communications.

Digital Divide • It refers to the difference between people who have easy access to the Internet and those who do not. A lack of access is believed to be a disadvantage to those on the disadvantaged side of the digital divide because of the huge knowledge base that can only be found online.

Digital divide can exist between those living in rural areas and those in urban areas, between educated & uneducated, between economic classes, and on a global scale between more and less industrially developed nations

Debugging • It is a methodical process of finding and reducing the number of bugs, or defects, in a computer program or a piece of electronic hardware, thus making it behave as expected.

Encryption • In cryptography, encryption is the process of encoding messages (or information) in such a way that hackers cannot read it, but authorised users can access it.

E governance • E governance:application of Information and Communications Technology to the processes of Government functioning in order to bring about ‘Simple, Moral, Accountable, Responsive and Transparent’ governance

Graphic Interchange Format (GIF) • A simple file format for pictures and photographs that are compressed so they can be sent quickly.

JPEG • It is a commonly used method of lossy compression for digital photography. The term ‘JPEG’ is an acronym for the Joint Photographic Experts Groups.

HyperText Transfer Protocol (HTTP) • It is an important protocol used on the World Wide Web for moving hypertext files across the internet. It requires an HTTP client program on one end and HTTP server program on the other end.

Internet • The Internet (also known simply as the net is the worldwide, publicly accessible system ofi nterconnected computer networks that transmit data by nacket switching using the standard

Internet of Things (IOT) • The Internet of Things (IoT) is a system of interrelated computing devices, mechanical and digital machines, objects, animals or people that are provided with unique identifiers and the ability to transfer data over a network without requiring human-to-human or human-to-computer interaction

Internet Protocol (IP) Address • IP addresses are assigned to every computer on a TCP/IP network. It ensures that data on a network goes where it is supported to go e.g., 192.168.2.250.

Internet Service Provider (ISP) • It is a business organization that offers users access to the Internet and related services.

Local Area Network (LAN) • In a LAN the connected computers are geographically close together. They are either in the same building or within a smaller area.

Metadata • It is data that describes other data. Meta is a prefix that is used in information technology implying “an underlying definition or description.”

• Metadata summarizes basic information about data, which can make finding and work with particular instances of data easier

Net Neutrality • It is a principle affirming that all ISP must treat all data on the internet equally. • They must not discriminate against certain services, users, content, applications, or methods of communication. • Under Net Neutrality regulations, an ISP is neither allowed to intentionally block, or slow down specific content or websites nor is an ISP is allowed to charge additional fees for access to certain internet services.

Internet.org renamed as Free Basics is a initiative of Facebook to bring affordable access to selected Internet services to less developed countries by increasing effi ciency, and facilitating the development of new business models around the provision of Internet access. It has been criticized for violating net neutrality, and by handpicking internet services that are included, for discriminating against companies not in the list, including Facebook’s rivals. In February 2016, regulators banned the Free Basics in India based on “Prohibition of Discriminatory Tariffs for Data Services Regulations”.

Open source software • Open source software is software with source code that anyone can inspect, modify, and enhance

Source code • “Source code” is the code computer programmers can manipulate to change how a piece of software—a “program” or “application”—works. Programmers who have access to a computer program’s source code can improve that program by adding features to it or fi xing parts that don’t always work correctly.

Difference between open source software and other types of software

• Some software has source code that only the person, team, or organization who created it—and maintains exclusive control over it—can modify. • People call this kind of software “proprietary” or “closed source” software.Only the original authors of proprietary software can legally copy, inspect, and alter that software. • And in order to use proprietary software, computer users must agree (usually by signing a license displayed the fi rst time they run this software) that they will not do anything with the software that the software’s authors have not expressly permitted.

• Microsoft Windows, Microsoft Office and Adobe Photoshop are examples of proprietary software.

m-Sakshi Is is an award-winning mobile phone app to help health workers (ASHA workers)in providing high-quality health care to the families in even the remotest villages in different parts of the country.

It is an open source application developed specifi cally for the health workers in India

Piracy • The illegal copying of software or other creative works.

Phishing • It is a fraudulent attempt whereby cybercriminals try to get sensitive information from you, like credit card numbers and passwords. • Some specific techniques include spear-phishing (targets specific people or departments), whale phishing (targets important people like CEOs), and Smishing (phishing via text messages) and vishing (voice phishing that takes place over the phone, usually through impersonation.

Ransomware • It is a subset of malware in which the data on a victim’s computer is locked, typically by encryption, and payment is demanded before the ransomed data is decrypted and access returned to the victim. • 3 types of Ransomware are RYUK , PURGA and STOP • The motive for ransomware attacks is nearly always monetary, and unlike other types of attacks, the victim is usually notified that an exploit has occurred and is given instructions for how to recover from the attack. • Payment is often demanded in a virtual currency, such as bitcoin so that the cybercriminal’s identity isn’t known.

WannaCry, Petya are some ransomware that India was badly affected in 2018

Router • A network device that enables the network to reroute messages it receives that are intendedfor other networks. • The network with the router receives the message and sends it on its way exactly as received. In normal operations. • They do not store any of the messages that they pass through.

Social media Social media is a catch-all term for a variety of internet applications that allow users to create content and interact with each other.

• This interaction can take many forms, but some common types include: • Sharing links to interesting content produced by third parties • Public updates to a profi le, including information on current activities and even location data • Sharing photos, • videos and posts • Commenting on the photos, posts, updates, videos and links shared by others

Facebook, Twitter, Instagram, Google+ are examples of social networking sites

Sextortion • Blackmail schemes that threaten to distribute your sensitive or embarrassing private material unless you pay a ransom or provide them with sexual images or favors

Spoofing • When cybercriminals try to get into your computer by masquerading as a trusted source. • Examples include email spoofing (using email header that appears to be from someone you trust), IP spoofing (using a fake IP address to impersonate a trusted machine), and address bar spoofing (using malware to force you to view a specific web page).

Spyware • Malware that gathers information about you, usually to track your internet use and deliver pop- up ads.

Spam • Irrelevant or unsolicited messages sent over the Internet, typically to large numbers of users, for advertising. Phishing spreading malware, etc

Uniform Resource Locator (URL) • The specifi c internet address for a resource such as an individualor an organization.

Unified Payment Interface • Unified Payment Interface, also known as UPI is a payments system launched in India which allows multiple bank accounts belonging to any participating bank to be controlled via a single mobile app. • The app merges a number of banking features, facilitating seamless and secure fund transfer and merchant payments at a single platform. • UPI allows payments to scheduled and executed as per convenience.

UPI 2.0 • UPI 2.0 is the new version of UPI payment system with improved features and benefi ts,more secure and comprehensive service with easier authentication process

Virtual Reality • An artificial environment created with computer hardware and software and presented to the user in such a way that it appears and feels like a real environment. • To create this effect, the user needs Hardware devices like goggles, gloves, and earphones etc inbuilt with sensors. It enables people to deal with information more easily.

Virus • A piece of computer code designed as a prank or malicious act to spread from one computer toanother by attaching itself to other programs

World Wide Web • World Wide Web (‘www or ‘The Web’): A network of servers on the Internet that use hypertext linked databases and files. • It was developed in 1989 by Tim Berners-Lee, a British computer • scientist and is now the primary platform of the Internet

Web 2.0 • Web 2.0 is the name used to the describe the second generation of the world wide web, where it moved static HTML pages to a more interactive and dynamic web experience. • Web 2.0 is focused on the ability for people to collaborate and share information online via social media, blogging and Web-based communities.

Worm • Malware that self-replicates and sends itself to other computers in your network.

Zombie • Malware used to take control of a system remotely at a later time.

MPPSCADDA

COMPUTERS History • The earliest known tool for computation was the Abacus. It was developed in China. • Blaise Pascal invented the second real mechanical calculator called Pascaline. • Father of Computer: Charles Babbage is considered as the 'Father of Computer' because he invented Difference Engine in 1822 and then analytical engine, which can store the information on punch cards in 1833. • Father of “Modern Computing”: Alan Turing is regarded as father of 'Modern Computing’ or “Modern Computer Science”. Characteristics Characteristics of computer are as follows: • Speed The computer uses the electronic pulse, the speed of those pulse is virtually instantaneous and process the inputs in micro, nano or picoseconds. • Storage It is also called as 'memory'. It consists of computer components and recording media used to retain digital data. • Accuracy Computers are error free and most of the errors are due to human negligence. • Versatility Computers are multi-tasking in nature. • Automation It is a field where the computer self executes all tasks automatically when inputs are provided to it. Limitations of Computer • No Self Intelligence Though computer is programmed to work efficiently, fast and accurately but it is programmed by human beings to do so. • Decision Making The concept of artificial intelligence shows that the computer is the decision maker. But it is still dependent on instructions provided by human being. • Self Care Computer cannot take care of itself like a human. It is dependent on human beings for this purpose. • Retrieval of Memory Computer can retrieve data very fast, but this technique is linear. Human mind does not follow this rule. • Sensation Computer cannot feel like a human.

Generations of Computer First Generation (Vacuum Tubes) 1940-56 • Technology Use of vacuum tubes in electronic circuit • Internal Operating Speed (IOS) Milliseconds • Operating Systems (OS) Batch processing • Languages Machine code and electric boards • Examples UNIVAC-I, IBM-701s Second Generation (Transistors) 1956-63 • Technology Use of transistor and diodes • IOS Microseconds • OS Batch processing • Languages Assembly language, high level language • Examples UNIVAC-1004, IBM-1401 Third Generation (Integrated Circuits) 1964-71 • Technology Use of integrated circuits • IOS Nano seconds • OS Time sharing • Languages High level language (FORTRAN, COBOL, BASIC) • Examples UNIVAC-1100, IBM-360, PDP-8 Fourth Generation (Microprocessors) 1971-89 • Technology Use of large integrated circuit • IOS Picoseconds • OS DOS, Windows • Languages High level language (Java, C++, Python etc) • Examples ALTAIL-8800, IBM-370, PDP-8 etc. Fifth Generation (Artificial Intelligence) 1989 - onwards • The present generation of computers are based on artificial intelligence – the ability to ‘think’ and ‘respond’ based on the context with machines that can process and respond to natural language and have capability to learn and organise themselves. • The future looks to be transformed with technologies like quantum computation, molecular and nano technology. • The fields of gaming, robotics, voice recognition and real-life simulation, centre on perfecting the science of artificial intelligence. • In this period, computing technology has achieved greater superiority and parallel processing, which was until limited to vector processing and pipelining. Thus, hundreds of processors could all work on various parts of a single programme. • Quantum computation, nanotechnology and supercomputing are going to enhance the fifth generation of computing.

Classification of Computer Based on Size • Nano Computer It is a computer whose physical dimensions are microscopic. • Micro Computer It is a complete computer and is generally a synonym for Personal Computer. • Mini Computer These computers are smaller in size, faster and cost lower than mainframes computer. • Mainframe Computer They are powerful computers used primarily by corporate and governmental organizations for critical applications, bulk data processing such, as census, industry and consumer statistics, enterprise resource planning and transaction processing. • Laptop A laptop has most of the components as of a desktop computer, including a display, keyboard, pointing device such as touch pad and a pointing stick and speakers into a single unit. • Net Book It is a small, light weight and inexpensive laptop computer suited for general computing and accessing web-based applications. • Palmtop/PDA (Personal Digital Assistant) These are very small computers that have been designed to allow people to keep necessary information at hand. • iPad It is a line of tablet computers designed and marketed by Apple corporation. • iPod It is a line of portable media players designed and marketed by Apple corporation. • Tablet Computer It is a mobile computer larger than a mobile phone or personal digital assistant, integrated into a flat touch screen and operated by touching the screen rather than using a physical keyboard. • Simputer It is a low-cost portable alternative to PCs, by which the benefits of IT can reach the common man. It is linux based. • The super computers remain at the top of the heap in power and expense. They are used for the tasks that require massive calculations, like engineering design and testing, - forecasting, economic forecasting, serial decryption etc.

Classification of Computer Based on Work • Digital Computer It operates on data, including symbols, letters and magnitudes that are expressed in binary form by using only the two digits i.e. 0 and 1. • Analog Computer An analog computer is a form of computer that uses continuously variable mechanical, hydraulic or electrical quantities to simulate the problem being solved, rather than symbolic numerical values of digital computers. • Hybrid Computer It is a digital computer that accepts Analog signals and converts and processes them as digital signals.

Other Computers Optical or Photonic Computer • It is a device that uses the photons in visible light or infrared (IR) beams, rather than electric current, to perform digital computations. Atomic Computer • It describes a unitary action or object that is essentially indivisible, unchangeable whole, and irreducible. Virtual Computer • It allows different OS to run in the same computer at the same time without interfering each other. Chemical Computer • It is an unconventional computer based on semi-solid chemical soup where data is representated by varying concentrations of chemicals. DNA Computer • It uses DNA, biochemistry and molecular biology hardware instead of traditional silicon based computer technologies. Neuro Computer • It is also known as Wetware computer/Organic computer/ Artificial Organic Brain. It is built from living neurons. Quantum Computer • It uses the quantum mechanical phenomenon such as superposition and entanglement to perform operations on data. Embedded Computer • System It is designed for specific control functions within a larger system. It is embedded as a part of a complete device often including hardware and mechanical parts. Membrane Computing • It is an area within computer science that seeks to discover new computational models from the study of biological cells, particularly the cellular membranes.

COMPUTER Hardware

Computer Hardware is the collection of physical elements, which comprises a computer. Hardware can be divided into following parts: • Input device • Output device • Memory • Processing unit 1. Input Device In computing an input device is any peripheral (piece of computer hardware equipment) used to provide data and control signals to a computer. Keyboard • A keyboard is a human interface device which is represented as a layout-of buttons. Mouse • It is the most used input pointing device. Magnetic Ink Character Recognition (MICR) • It is used to read the characters which are written in the magnetised ink. Optical Mark Recognition (OMR) • It is used to read the special pre-printed forms designed with boxes marked by a dark pencil or pen. Optical Character Recognition (OCR) • It is an optical scanner used to read an image, convert it into a set of Os and is and store that in computer's memory. Bar Code Reader • In this method, the optical reader recognises the small bars of varying thickness and spacing printed on packages, badges, tag-and converted into electrical pulses. Speech Input Unit • It is an input unit to take in the input in the form of spoken words and convert them to a form which can be understood by a computer. Touch Screen • The touch screen makes selection by just touching the screen. Trackball • Instead of moving the whole mouse around, the user rolls the trackball Only, which is on the top or side. It is mainly used in laptops. Joystick • It gives a more natural feeling of control for motion in games, especially when we are flying a plane or spaceship.

2. Output Device In computing, an output device is any piece of computer hardware equipment used to communicate the results of data processing carried out by a computer to the outside world. Visual Display Unit (VDU) • It is also called monitor. It displays what computer is doing. Printers • It is a peripheral which produces a text or graphics of documents or pictures stored in electronic form, usually on physical print media such as paper or transparencies. Plotters • It is a kind of printer that interprets commands from a computer to make line drawings on paper. Plotters are used in engineering applications e.g. drawing maps and .technical drawings. Graphic Display Device • It is the video terminal capable of displaying graphs and pictorial data.. Speech Output Unit • It is the one which reads the strings of characters stored in the computer's memory and converts them into spoken sentences. 3. MEMORY It stores all the data and the programmes. It receives, holds and delivers data according to the instruction from the control unit. It is of two types:

Primary Memory It is the computer's memory which is accessible directly by processing unit. It is basically of two types which are as follows: Read Only Memory (ROM)

• It is non-volatile and resident memory of the computer. • The information and instructions needed to operate a computer is present in it. • Types of ROM: o Programmable ROM (PROM) It is a form of digital memory, where the setting of each bit is locked by a fuse or anti-fuse. It is a Programmable ROM but not alterable. o Erasable Programmable ROM (EPROM) it is non-volatile memory. It can be erased by exposing it to strong ultraviolet light source. o Electrically Erasable Programmable ROM (EEPROM) The electric pulse is used to erase the ROM instead of Ultraviolet (UV) light.

Random Access Memory (RAM) It is a temporary and volatile memory. Its contents are lost when power is switched off. It is also called as temporary memory.

• Types of RAM o Static RAM (SRAM) A bit of data is stored using the state of a flip-flop. It has no need to refresh the memory. o Dynamic RAM (DRAM) It stores a bit of data using a transistor and capacitor pair which together comprise a memory cell. It must be periodically refreshed to access a data. • Cache Memory o It is a RAM that a computer can access more quickly than it can access regular RAM. o This memory is typically integrated directly with the CPU chip.

Secondary Memory Secondary Memory is not directly accessible by the CPU. Secondary memory is non-volatile, and it does not lose the data when the power is switched off. Types of Secondary Memory

Magnetic Storage • It refers to any type of data storage using a magnetised medium. Two types of magnetic polarities are used to read the binary information representing either zero or one. Types of magnetic storage are as follows Hard Disk Drive (HDD) • It is a data storage device used for storing and retrieving digital information using rapidly rotating discs (plotters) coated with magnetic material. Generally, the capacity of HDD is 512 GB to many TB. Micro SD (Storage Disk) Card • It is a non-volatile card format for use in portable devices such as mobile phones, digital camera, GPS navigation devices and tablet computers. Floppy Disk (FD) • It is a disk storage medium composed of a disk of thin and flexible magnetic storage medium, sealed in a rectangular plastic carrier lined with fabric that removes dust particles. Optical Storage • It stores the information in deformities on the surface of a circular disc and reads this information by illuminating the surface with a laser diode and observing the reflection. • Four types of optical storage media which are as follows: a. Compact Disc (CD) is an optical disc used to store digital data. b. Digital Versatile Disc (DVD) is an optical disc storage format. DVDs offer higher storage capacity than compact disks while having the same dimensions. c. Blue-ray Disc (BD) is optical disc storage medium designed to supersede the DVD format. The term Blue-Ray is used to refer the blue laser, which is used to read the disc. d. Holographic Versatile Disc is an optical disc technology that can store 1 TB of data on an optical disc of 10 cm in diameter.

Other types of storage media are as follows:

USB Flash Drive • It is a data storage device that includes flash memory with an integrated Universal Serial Bus (USB) interface. Tertiary Storage or Tertiary Memory • It provides a third level of storage and involves a robotic mechanism which will mount (insert) and dismount (remove) mass storage media according to the system's demand. 4. Central Processing Unit (CPU) • It is the brain of the computer. • It handles all the instructions given to your computer. • CPU is divided mainly into three parts 1. Control Unit 2. Arithmetic Logic Unit 3. Memory

Dual Core Technology

• It basically consists of two processors running parallel to each other.

Quad Core Technology

• It basically consists of four processors running parallel to each other

Octa Core Technology

• It basically consists of eight processors running parallel to each other

COMPUTER Software

Computer Software is a set of instructions that directs the computer to process information. It can be classified into four types :

1. System software 2. Utility software 3. Application software 4. General purpose software

1. System Software It is computer software designed to operate and control the computer hardware and to provide a platform for running application software. System software can be divided into two parts:

1. Operating system 2. Language translator

Operating System (OS) • An Operating System is the most important software that runs on a computer. It manages the computer's memory, processes and all its software and hardware. Functions of OS o Process Management o Device Management o Memory Management o Application Program Interface Types of OS o Real-time operating system o Multi-tasking and single-tasking operating system o Distributed operating system o Network operating systems Examples of OS

• Disk Operating System (DOS) It is a single user, single tasking operating system with basic Kernel's functions and only one program at a time can run on it. • UNIX It is a multi-tasking, multi-user computer operating system, that is widely used in work stations and servers. • LINUX It is a UNIX like computer operating system assembled under the model of free and open source software development and distribution. • Mac OS It is a line of open core graphical operating systems developed marketed and sold by Apple Incorporation. Mac OS is a UNIX based operating system. • MICROSOFT WINDOWS It is a graphical interface operating systems developed, marketed and sold by Microsoft.

• WINDOWS 10 It Released in July 2015, Windows 10 is a computer operating system, having universal application architecture can be run across PCs, tablets, small phones, Xbox One, etc • ANDROID It is an operating system based on Linux kernel and designed primarily for touch screen mobile devices such as smart phones and tablet computers. Initially, it was developed by Android Inc. which Google bought in 2005.

Language Translator Assembler • An assembler translates the symbolic codes of programs of assembly language into machine language. Compiler • A program that translates whole source program written in some high-level language into machine code at a time. Interpreter • A program that executes the instructions written in a high-level language into machine code as line by line instructions.

MANTRA MANTRA Rajbhasha is a Machine Assisted Translation Tool, which translates documents pertaining to Personnel Administration, Finance, Small Scale Industries, Agriculture, Information Technology, Health Care, Education and Banking domains-from English to

2. Utility Software • Utility software helps to manage, maintain and control computer resources. Examples of utility software are as follows:

o Antivirus software o Disk tools o Backup software 3. Application Software • It is user defined specific of computer software that employs the capabilities of a computer directly to a task that the user wishes to perform. 4. General Purpose Software • A general-purpose software would be anything that aids in allowing user to accomplish simple computer related task.

COMPUTER Network Local Area Network (LAN) • It is a computer network covering a small physical area (one km or less) like a home, office or small groups of buildings, such as school or an airport Metropolitan Area Network (MAN) • It is a larger computer network that usually spans a city or a larger campus (5 to 15 km) Wide Area Network (WAN) • It is a computer network that covers a broad area (Le. any network whose communications links cross metropolitan, regional or national boundaries). Personal Area Network (PAN) • It is the interconnection of information technology devices or gadgets within the environment of an individual user. (Typically within 10 meters). Wireless Personal Area Network • It is a PAN carried over wireless network technologies such as Infrared Data Association (IRDA), Bluetooth, Wireless USB, Z-Wave, ZigBee or even Body Area Network. Body Area Network • It is the application of wearable computing devices. It enables wireless communication between several miniaturised body sensor units, worn on human body. Virtual Private Network (VPN) • It is a technology for using, the Internet or another intermediate network to connect computers to isolated remote computer networks that would otherwise be inaccessible. Ethernet Networking • It provides the local area networking technology that has spread the Internet throughout our offices and cities.

COMPUTER AND INFORMATION TECHNOLOGY - CURRENT TRENDS 1. • Supercomputers are the fastest computing machines. Recent supercomputers are capable of performing quadrillions of calculations per second or petaflops. • A petaflop is the ability of a computer to do one quadrillion floating-point operations per second (FLOPS). Additionally, a petaflop can be measured as one thousand teraflops. • CDC 6600 is considered the worlds first supercomputer.

S.No. MAINFRAME COMPUTERS SUPERCOMPUTERS 1. It is a large computer which is used as a It is an extremely fast compute capable large server and for intensive business of performing hundreds of millions of applications. instructions per second. Ex: IBM ES/9000 Ex: cray Supercomputer 2. Its components are multiple input/output A supercomputer usually includes more devices, magnetic disk, tape storage and than one many banks of internal storage. CPU. 3. It can typically run a variant of linux as an It can run many types of operating operating system system

4. It can do floating-point operations per It can do millions of instructions per second second.

5. It is used for bulk data processing like It is used for nuclear weapon consumer statistics, ERP and financial development, , transaction processing. host processes for a local computer.

Applications of Supercomputers Supercomputers are essential in all the fields, where a large amount of data is required to be processed. Some examples are given below:

1. Academic research: Supercomputers are used for observing and simulating any phenomena which are too large and complex. For example, astrophysicists use supercomputers as ‘time machines’ to explore the past and the future of our universe. 2. Weather and modelling: Supercomputers provide accurate weather forecasts by analysing multiple factors and their interrelationships that affect weather conditions. Supercomputers are also used to predict long-term impacts of climate change. 3. Space projects: Supercomputers are used to handle large data generated under space projects such as by telescope or probe. 4. Defence: Supercomputers are used to design defence equipment, monitor its production, etc. They process the large data generated from testing of various weapons.

Examples of super computers are as follows:

(i) SAGA-220 It stands for supercomputer for aerospace with GPU Architecture-220 Teraflops. It is a supercomputer built by Indian Space and Research Organisation (ISRO) in 2011 wish speed upto 2020 TeraFLOPS (Floating-Point Operations Per Seconds.) (ii) PARAM It is a low-cost super computing solution based on C-DAC's unique open frame architecture. (CDAC is Centre for Development of Advanced Computing in ) (iii) Titan It is the first supercomputer, which is based on GPU (Graphic Processing Unit) system and the working power of this supercomputer is upto seventeen peta FLOPS. (iv) Tianhe-2 China's Tianhe-2 supercomputer, capable of operating at 33.86 peta flop/second is world's fastest supercomputer. (v) Blue Gene Computer It is a supercomputer project at IBM for a series of high-performance System-On-a -Chip (SOC) architectures with minimal power demands. It runs on Linux and employs thousands of processors, each of which demands minimal electric power.

Top-5 Super Computers of the World

RANK NAME COUNTRY 1. Fugaku Jointly developed by RIKEN and JAPAN

2. Summit US (Built by IBM)

3. Sierra US (Built by IBM)

4. Sunway Taihulight China

5. Tianhe-2 (MilkyWay 2) China

The Top 500 List

• It is one of the most authoritative and prestigious ranking list of the worlds supercomputers published biannually. • The list is compiled on the basis of the performance of supercomputers by experts from the United States and Germany.

INDIA'S SUPERCOMPUTERS Aaditya

• The Indian Institute of Tropical Meteorology in Pune has a supercomputer called Aaditya, which has a computational speed of 790.7 teraflops. It is used for climate research and operational forecasting.

PARAM Yuva II

• In the government sector, Centre for Development of Advanced Computing (C-DAC) is responsible for developing supercomputers. • It has developed PARAM series of supercomputers. In 2013, it launched PARAM Yuva II that has a computational speed of 524 teraflops.

Pratyush and Mihir

• Pratyush and Mihir are the supercomputers established at Indian Institute of Tropical Meteorology (IITM), Pune and National Centre for Medium Range Weather Forecast (NCMRWF), Noida respectively. • Till recent, Pratyush and Mihir were the fastest supercomputer in India with a maximum speed of 6.8 PetaFlops at a total cost of INR 438.9 Crore. • Pratyush consists of several computers that can deliver a peak performance of 6.8 Petaflops. It is the first multi-petaflop supercomputer built in India. One petaflop stands for million billion floating point operations per second. The word ‘Pratyush’ literally means Sun. • The two supercomputers are used to help the quality of not just weather forecasts like but also of , and other extreme events. • They can also help forecast air quality, , among other things.

PARAM Siddhi Ai

• India’s newest and fastest supercomputer, PARAM-Siddhi AI, has been ranked 63rd in the Top500 list of most powerful supercomputers in the world (2020) . • The supercomputer was established earlier this year, under the National Supercomputer Mission (NSM) and is going to be installed in the Centre for Development of Advanced Computing’s (C-DAC) unit.

National Supercomputing Mission

• National Supercomputing Mission is to connect national academic and R&D institutions with a grid of over 70 high-performance computing facilities at an estimated cost of Rs 4,500 crore. • These supercomputers will also be networked on the National Supercomputing grid over the National Knowledge Network (NKN). • The Mission also includes development of highly professional High-Performance Computing (HPC) aware human resource for meeting challenges of development of these applications

2. Quantum Computing • A quantum computer employs the principles of quantum mechanics to store and process information in ‘qubits’. • Regular computers store and process information in ‘bits’ of 1 and 0. Qubits work faster. They can do large information processing much more efficiently than the fastest comparable computers. • For instance, in order to sort billion numbers, a quantum computer would take only 31,623 steps to arrive at solution, 3.5 million less steps than a traditional computer.

D-Wave Systems - A pioneer of Quantum Computers Canada’s D-Wave Systems is a pioneer in developing quantum computers. However, experts say that ‘true quantum computers’ are yet to be developed. Existing computers use quantum computing to solve limited number of problems. Status in India As of February 2018, Department of Science and Technology (DST) is planning to fund a project to develop quantum computers in India. 3. Cloud Computing • The cloud is just a metaphor for the Internet • In simple terms, cloud computing refers to the practice of using computing services of others (usually over the internet) instead of using our own to run a software, store a data or perform some other task. • Simple example of cloud computing is Dropbox, Google Calendar, Google sheet and so on. At a more complex level, it might include anything ranging from supplying data to supplying testing environments.

Benefits of Cloud Computing

• Businesses have access to many more computing services than they would otherwise, and for much lower cost. • It allows computing resources to be minimised or shared. Instead of 100 organisations running one server each, these 100 organisations could instead use cloud computing services offered by a cloud computing provider, who would run just one server to serve each of the 100 organisations.

Downside of Cloud Computing 1. There is an issue of data security. 2. They may compromise with our data.

• Cloud computing is not about is your hard drive. When you store data on or run programs from the hard drive, that’s called local storage and computing. Everything you need is physically close to you, which means accessing your data is fast and easy, for that one computer, or others on the local network. • Instead of local storage on computer hard drives, companies will be freeing their space and conserving funds. • According to Forbes, 83 percent of enterprise workloads will be in the cloud by 2022, which means 2020 will show an increasing trend in closing in on this statistic. • Cloud storage and sharing is a popular trend many companies have adopted and even implemented for employee interaction.

Cloud computer related terminologies • Software-as-a-Service (SaaS) is a method of software delivery and licensing in which software is accessed online via a subscription, rather than bought and installed on individual computers • Platform-as-a-Service (PaaS) is a cloud computing model in which a third-party provider delivers hardware and software tools -- usually those needed for application development -- to users over the internet. A PaaS provider hosts the hardware and software on its own infrastructure. As a result, PaaS frees users from having to install in-house hardware and software to develop or run a new application • Infrastructure-as-a-Service (IaaS), where players like Amazon, Microsoft, Google, and Rackspace provide a backbone that can be “rented out” by other companies. (For example, Netflix provides services to you because it’s a customer of the cloud services at Amazon)

Common Cloud Examples • Microsoft offers a set of Web-based apps like Office Online, Onedrive, Google offers Google drive.

4. Mobile Computing and Applications • Mobile phones, tablets, and other devices have he number of applications in recent years. • Fastest-growing companies have already established their mobile websites, marketing, and apps for maximized security and user-friendliness. • Cloud apps are also available for companies to use for on-the go capabilities.

5. Big Data Analytics • Big data is a trend that allows businesses to analyze extensive sets of information to achieve variety in increasing volumes and growth of velocity. • Big data has a high return on investment that boosts the productivity of marketing campaigns, due to its ability to enable high-functioning processing. • Data mining is a way companies can predict growth opportunities and achieve future success. • Examination of data to understand markets and strategies is becoming more manageable with advances in data analytic programs.

• This practice in information technology can be observed for its potential in data management positions for optimal organizations. Database maintenance is a growing sector of technology careers.

6. Automation • Another current trend in the IT industry is automated processes. • Automated processes can collect information from vendors, customers, and other documentation. • Automated processes that check invoices and other accounts-payable aspects expedite customer interactions. Machine processes can automate repetitive manual tasks, rather than assigning them to employees. • This increases organization-wide productivity, allowing employees to use their valuable time wisely, rather than wasting it on tedious work. • Automation can even produce more job opportunities for IT professionals trained in supporting, programming, and developing automated processes. • Machine learning can enhance these automated processes for a continually developing system. • Automated processes for the future will extend to groceries and other automatic payment methods to streamline the consumer experience.

INFORMATION TECHNOLOGY - EMERGING TRENDS Trends in information technology emerging in 2020-21 are new and innovative ways for the industry to grow. These devlopments in information technology are the areas expected to generate revenue and increase demand for IT jobs. Some of the emerging Trends in Information Technology are: 1. Artifical Intelligence (AI) 2. Virtual Reality (VR) 3. Augmented Reality (AR) 4. Blockchain Data 5. Internet of Things (IOT) 6. Cyber Privacy and Security 7. Digital Convergence 8. Cyber Security

We will discuss the above topic in the following chapters

MPPSCADDA

COMMUNICATION TECHNOLOGY 1. Bandwidth • The capacity of a telecom line to carry signals. The necessary bandwidth is the amount of spectrum • required to transmit the signal without distortion or loss of information. FCC rules require • suppression of the signal outside the band to prevent interference.

2. Broadband • Broadband is a descriptive term for evolving digital technologies that provide consumers a signal • switched facility off ering integrated access to voice, high-speed data service, video-demand • services, and interactive delivery services.

3. Wi-Fi • Wi-Fi stands for Wireless Fidelity. Wi-Fi works with no physical wired connection. • It is a form of wireless communication system in which internet signals are transmitted in the form of radio waves in a range of about 100 m. • A device such as a personal computer, video game console, smartphone, or digital audio player, when enabled with WiFi, can connect to the Internet via a wireless network access point. • It uses radio frequency (RF) technology, RF being a frequency within the electromagnetic spectrum associated with radio wave propagation. • Wi-Fi is supported by many applications and devices including video game consoles, home networks, PDAs, mobile phones, major operating systems, and other types of consumer electronics. • Wi-Fi allows cheaper deployment of local Area Networks (LANs). Unlike mobile phones, any standard Wi-Fi device will work anywhere in the world

4. Bluetooth • Bluetooth is the name for a short-range radio frequency (RF) technology that operates at 2-4 GHz and is capable of transmitting voice and data. • The effective range of Bluetooth devices is 32 feet (10m). • Bluetooth transfers data at the rate of 1 Mbps. • The heart of the Bluetooth brand identity is the name, which refers to the Danish Icing Harald “Bluetooth” Blaatand who unified Denmark and Norway.

• In the beginning of the Bluetooth wireless technology era, Bluetooth was aimed at unifying the telecom and computing industries. • Bluetooth can be used to wirelessly synchronize and transfer data among devices. • Bluetooth can be thought of as a cable replacement technology. Bluetooth can also be used to access a network or the Internet with a notebook computer by connecting wirelessly to a cellular phone.

5. Wi MAX • It stands for worldwide interoperability for microwave access. WiMAX system sends signals at high- frequency range of about 2 GHz to 11 GHz. It is a wireless communication designed for creating Metropolitan Area Networks (MANs). It is considered to be similar to the Wi-Fi standard, but its range of coverage is far more. • A Wi-Fi signal can cover a radius of several hundred feet only, whereas a fixed WiMAX station can cover a range of up to 50 Ion. Mobile WiMAX stations have strength to broadcast up to 16 km. • Setting up of Wi-Fi is a good option, but it is an impractical idea for larger areas, because to cover a large area, multiple Wi-Fi repeaters need to be set up at consistent intervals. Also, it requires a lot of maintenance. On the other hand, WiMAX can cover several miles using a single station. This makes it much easier to maintain and to offer more reliable coverage.

6. Li-Fi • A German physicist, Herald Hass has evolved a method to transfer data through illumination, which is called D-light (or Li-Fi). • Li-Fi is a very advanced version of Wi-Fi. • It uses visible light to transfer data instead of radio wave communication as used in Wi-Fi. • As speed of light is much faster than radio waves, Li-Fi will have the speed of around 250 times more than any high speed broadband.

Working of Li-Fi • A new era of large, bright light-emitting diode (LED) forms the core part of Li-Fi technology. If the LED light is on, a digital 1 is transmitted. If the LED light is off, a digital 0 is transmitted. These large, bright LED lights can be switched on and off very quickly which gives us a very good chance for transmitting data through light. • There is a light emitter on one corner, for example, an LED, and a photo detector (light sensor) on the other corner. The photo detector registers a binary 1 when the LED is on and a binary 0 if the LED is off, just like a microprocessor. To generate any message, the LED is flashed numerous times or array of LEDs are used to obtain data rates in the range of hundreds of megabits per second.

Advantages of Li-Fi Technology 1. Capacity: Light itself has 10,000 times wider bandwidth than the radio waves. Thus, large amount of data can be transmitted at multiple frequencies. 2. Efficiency: LED lights consume less energy and are very efficient. As Li-Fi system is based on LED lights, it is cheaper. 3. Availability: As light is present everywhere, Li-Fi can be made available almost everywhere. 4. Security: Light waves cannot penetrate through walls. Thus, data transmitted through light waves is difficult to be hacked. 5. Low cost: Li-Fi requires very few components. Thus, the cost of Li-Fi is comparatively low as compared to the existing internet systems.

Limitation of Li-Fi 1. Li-Fi works in direct line of light. So, il the receiver is blocked by any physical obstruction, then the signal will immediately stop. 2. External light from sources such as sunlight, normal bulbs and opaque materials can interfere with Li-Fi network.

Applications of Li-Fi Li-Fi has application in all the fields which use internet. Some of the important applications of Li-Fi are as follows: 1. Medical applications: Unlike Wi-Fi, Li-Fi does not cause electromagnetic interference and thus, does not interfere with medical instruments such as MRI scanners. Wi-Fi cannot be used in such facilities. 2. Internet in aircrafts: In aircrafts, Wi-Fi cannot be used, as it can interfere with the navigational systems of the pilots. But, Li-Fi can be used in aircrafts. 3. Underwater applications: Light can pass through water. Thus, Li-Fi can work underwater, whereas Wi-Fi fails completely. Thus, Li-Fi provides endless opportunities for ocean exploration with the help of internet-enabled . 4. Disaster management: Li-Fi can be powerful means of communication in times of earthquakes or hurricanes when normal electricity grid is disrupted. Li-Fi bulbs could provide cheap high speed web access to every street corner. 5. Applications in sensitive areas: Radio frequencies used under Wi-Fi can cause accidents in power plants, petroleum pumps or chemical plants. But, Li-Fi can be used safely even at such places.

7. NEAR FIELD COMMUNICATION (NFC) • NFC stands for ‘Near Field Communication; and it enables short-range communication between compatible devices. • This requires at least two devices, one to transmit the signal, and another to receive the signal.

• A range of devices can use the NFC standard and depending on how the device works, can be considered either passive or active. • Passive NFC devices do not need a power source of their own. They include tags and other small transmitters that can send information to other NFC devices. They do not really process any information sent from other sources and also cannot be connected to other passive components. • Active devices are able to do both—send and receive data. Unlike passive NFC, active NFC devices can communicate with each other as well as with the passive devices. Smartphones are by far the most common implementation of active NFC devices. Some other examples of this technology are public transport card readers and touch payment terminals.

NFC versus Bluetooth • The two function similarly – both are wireless technologies and operate in close proximity. However, the range of a Bluetooth connection outdoes that of the NFC. While you can pair a Bluetooth headset and walk about 20-30 metres away from your handset while still on a call, your NFC device is restricted in a virtual 10 cm radius around the device it’s paired up with. • As far as security, Bluetooth has an upper hand because data transfer on Bluetooth is heavily encrypted

8. IPTV • Internet Protocol television (IPTV) is the process of transmitting and broadcasting television programs through the Internet using Internet Protocol (IP). • IPTV gives dynamic features to the user to improve the user experience compared to a traditional television transmission such as radio frequency broadcast, satellite broadcast and/or cable • television. • A broadband connection is used as the medium of transmission for IPTV, which is very effi cient compared to earlier transmission mode • IPTV enables two-way interactivity, in contrast to traditional one way cable or satellite broadcast network. The two-way IPTV network means viewers have more options to personalize interact and control their viewing experience. • Because IPTV is based on internet protocol, it is sensitive to packet loss and delays if the IPTV connection is not fast enough

9. VOIP (Voice over Internet Protocol) • VOIP is IP enabled voice calling technology over internet. Example: Skype, Yahoo messenger, MSN • messenger. • It requires broadband connectivity to make a call along with IP enables devices like Computers, • Smartphone etc. • The voice is converted into digital packets and transmitted to destination over packet switched • network.

MOBILE CELLULAR TECHNOLOGIES 1. GSM • GSM is a second generation or 2G mobile phone system. Originally introduced in 1991, it is still used for many voice calls and some low data rate services that require its use. • One of the basic aims of any cellular service is to provide a system that would enable greater capacity than the previous fi rst generation analogue systems. • GSM achieved this by using a digital TDMA (time division multiple access approach). By adopting this technique more users could be accommodated within the available bandwidth. • In addition to this, ciphering of the digitally encoded speech was adopted to retain privacy. Using the earlier analogue cellular technologies it was possible for anyone with a scanner receiver to listen to calls and a number of famous personalities had been “eavesdropped” with embarrassing consequences. • GSM digitizes and compresses data, then sends it down a channel with two other streams of user data, each in its own time slot. • It operates at either the 900 MHz or 1800 MHz frequency band. • The key advantage of GSM systems to consumers has been higher digital voice quality and low cost alternatives to making calls, such as the Short message service (SMS, also called “text messaging”).

2. CDMA • Code-Division Multiple Accessis a digital cellular technology that uses spread spectrum techniques. • It transmits over the entire frequency range available. • Meaning ,it does not assign a specific frequency (like GSM )to each user on the communications network. This method, called multiplexing, is what made the transmissions diffi cult to jam during World War II. • Because CDMA does not limit each user’s frequency range, there is more bandwidth available. • This allows more users to communicate on the same network at one time than if each user was allotted a specific frequency range. • Because CDMA is a digital technology, analog audio signals must be digitized before being transmitted on the network. • CDMA is used by 2G and 3G wireless communications and typically operates in the frequency range of 800 MHz to 1.9 GHz. • The technology is used in ultra-high-frequency (UHF) cellular telephone systems in the 800-MHz and 1.9-GHz bands.

3. Enhanced Data Rates for Global/GPRS Evolution (EDGE) • The GSM EDGE cellular technology is an upgrade to the existing GSM/GPRS networks. • GSM EDGE evolution can provide data rates of up to 384 kbps, and this means that it offers a significantly higher data rate than GPRS. • The GSM EDGE evolution systems may also be known as EGPRS or Enhanced General Packet Radio Service systems. Strictly speaking a ‘2.75G’ system that uses the GSM EDGE cellular technology is capable of providing data rates which are much more than those that could be supported by GPRS. • The EDGE evolution is projected to construct on the improvements provided by the addition of General Packet Radio Service (GPRS), where packet switching is applied to a network. • This means that the speed at which the data can be transferred increases three-fold by adopting a new form of modulation. • GSM uses a form of modulation known as Gaussian Minimum Shift Keying (GMSK), but EDGE evolution changes the modulation to 8 Phase Shift Keying (PSK) and thereby enabling a significant increase in data rate to be achieved. • This makes it a particularly attractive option proving virtually 3G data rates for a small upgrade to an existing GPRS network.

4. Long-Term Evolution (LTE) • The LTE is a 4G wireless broadband technology. It has been named ‘Long-Term Evolution, because it represents the next step (4G) in a progression from GSM, a 2G standard, to Universal Mobile Telecommunications Service (UMTS), the 3G technologies based upon GSM. • The LTE provides significantly increased peak data rates, with the potential for 100 Mbps downstream and 30 Mbps upstream, reduced inactivity, accessible bandwidth capacity, and backwards compatibility with existing GSM and UMTS technology. • The upper layers of LTE are based upon TCP/IP, which will likely result in an all-IP network similar to the current state of wired communications. The LTE will support mixed data, voice, video and messaging traffic. • The LTE uses Orthogonal Frequency Division Multiplexing (OFDM) and, in later releases, Multiple Input Multiple Output (MIMO) antenna technology. • The higher Signal to Noise Ratio (SNR) at the receiver enabled by MIMO, along with OFDM, provides improved coverage and material, especially in dense urban areas.

5. GPRS • General Packet Radio Services (GPRS) is a packet-based wireless communication service that promises data rates from 56 up to 114 Kbps and continuous connection to the Internet for mobile phone and computer users.

• GPRS facilitates instant connections whereby information can be sent or received immediately as the need arises, subject to radio coverage. No dial-up modem connection is necessary. This is why GPRS users are sometimes referred to be as being “always connected”. • Packet switching means that GPRS radio resources are used only when users are actually sending or receiving data. Rather than dedicating a radio channel to a mobile data user for a fi xed period of time, the available radio resource can be concurrently shared between several users.

6. Generation of mobile technologies • 1G: The mobile technology started from 1G, the fi rst generation analog mobile having voice call only. There was no any data service in 1G. • 2G: After some technology advancement, in early 1990s the world got to see 2G, the first digita mobile standard. 2G has voice, SMS and slow data service whereas the addition of GPRS and EDGE enhanced the speed too some extent. Remember G and E sign on the top which actually means GPRS and EDGE. GPRS and EDGE also adds Multimedia messaging service aka MMS. • 3G came in early 2000, which can provide voice, video call and fast data. With several addition o technology, 3G can even provide up to 42 Mbps speed. But a customer gets around 4 to 7 Mbps in average. You can see either 3G or H or H+ sign for 3G. • 4G: Lastly the fastest available speed from a commercial network is with 4G in 2009. Which can provide data speed up to 100 Mbps but it depends on several other factors. Customers using 4G can get speed from 10 to 15 Mbps in average. You also cannot get the regular voice calls in 4G, so the calls happen from 2G, 3G or need to add VoLTE (Voice over LTE). You can see 4G or LTE sign in the top for 4G. We also have a post regarding expectations for 4G in people. • 5G is yet to be available in the world. But it may reach the developed world in 2019.

Comparison of 1G to 5G mobile technologies Here is a table for the comparison of all generation mobile technologies:

Mobile S.No. Launch Year Services Speed Technologies

1 1 G 1980s Voice only NA 100 kbps to 300 2 2 G 1990s Voice, SMS, MMS, and slow Data kbps Voice, Video Call, MMS, and faster 2 Mbps to 21 3 3 G 2000s Data Mbps All fast data and more multimedia 100 Mbps to 1 4 4 G 2010s services Gbps Fastest Data and low latency 5 5 G 2020 -- 10 Gbps services

7. Radio-Frequency Identification: • RFID is an acronym for “radio-frequency identification” and refers to a technology whereby digital data encoded in RFID tags or smart labels (defi ned below) are captured by a reader via radio waves. • RFID is similar to barcoding in that data from a tag or label are captured by a device that stores the data in a database. RFID, however, has several advantages over systems that use barcode asset tracking software. The most notable is that RFID tag data can be read outside the line- ofsight, whereas barcodes must be aligned with an optical scanner

8. FASTag Vehicles What Are Fast Tags? The fast tag is a RFID. The card is pasted on the front side of the vehicle usually at the windscreen. The system operates just like a prepaid phone card. One can charge the RFID card to make payments at toll. How Does It Work? An RFID reader is installed at the toll plaza. The reader would pick up the radio frequency ID, veryify the validity of ID and identify the class of vehicle and the account balance in the card of the vehicle. If the amount is available with the prepaid card, the vehicle may pass through. Hybrid Electronic Toll Collection (ETC) Network Hybrid ETC requires integration of Radio Frequency Identification Card (RFID) readers in the toll plaza lanes. Of all the lanes, at least one shall be exclusive to FASTag vehicles. In this lane, no other mode of toll payment shall be accepted.

Other LATEST Technologies 1. Direct to Home Technology (DTH) • Direct to Home technology refers to the satellite television broadcasting process which is actually intended for home reception. This technology is originally referred to as direct broadcast satellite (DBS) technology. The technology was developed for competing with the local cable TV distribution services by providing higher quality satellite signals with more number of channels. • In short, DTH refers to the reception of satellite signals on a TV with a personal dish in an individual home. The satellites that are used for this purpose is geostationary satellites. The satellites compress the signals digitally, encrypt them and then are beamed from high powered geostationary satellites. They are received by dishes that are given to the DTH consumers by DTH providers.

DTH in India • India is one of the biggest DTH service providers in the world. The requirement is very high because of the high population and the increased number of viewers. The low cost of DTH when compared to other local cable providers is also one main reason for this substantial growth. • The idea of DTH was fi rst provided to India in 1996. But it was not approved then as there were concerns about national security.

Some of the common DTH providers in India are 1. TATA Sky 2. BIG TV 3. Sun Direct DTH 4. Dish TV 5. Airtel DTH 6. Videocon DTH

Advantages of DTH Technology • The main advantage is that this technology is equally benefi cial to everyone. As the process is wireless, this system can be used in all remote or urban areas. • High quality audio and video which are cost eff ective due to absence of mediators. • Almost 4000 channels can be viewed along with 2000 radio channels. Thus the world’s entire information including news and entertainment is available to you at home. • As there are no mediators, a complaint can be directly expressed to the provider. • With a single DTH service you will be able to use digital quality audio, video and also high speed broadband

2. Quick Response: Q R code • QR stands for “Quick Response”, which refers to the instant access to the information hidden in the Code. • The QR Code is a two-dimensional version of the barcode • QR Codes are gaining popularity because the technology is “open source”, i.e. available for everyone. • Signifi cant advantages of QR Codes over conventional barcodes are larger data capacity and high fault tolerance.

3. LIGHT EMITTING DIODE • A light emitting diode (LED) is a basic semiconductor device. A P-type semiconductor material, containing positively charged carriers called holes, is combined with an N-type semiconductor material, containing negatively charged carriers called electrons. This combination of P-type semiconductor material and N-type semiconductor material is called diode. • When current is applied to a diode, the negatively charged electrons and the positively charged holes move towards each other. When a free electron comes near the hole, it combines with the hole. The hole exists at a lower energy level than that in a free electron. Thus, the electron must lose energy to combine with the hole. This energy is released in the form of photons (light particles). The amount of photon energy released determines the frequency or colour of the light. • The type of material and the process of creating the N-type and P-type semi-conductor material dictate the colour of photons as well as the efficiency and other performance characteristics of an LED. The LED chip is installed in an outer covering that allows electrical connection and directs light in the desired direction.

Advantages of LED • Unlike ordinary incandescent bulbs, the LED do not have a filament that burns out, and thus, they do not get especially hot. As a result, LED are energy-efficient, because electricity is not wasted into heat energy. • The LEDs are illuminated solely by the movement of electrons and holes present in the semiconductor material, and thus, they last just as long as a standard transistor. The lifespan of an LED surpasses the short life of an incandescent bulb by thousands of hours.

Applications of LED LED have applications in numerous devices as follows: 1. LEDs form numbers on digital clocks. 2. LEDs transmit information from remote controls. 3. LEDs are used to light up watches, traffic signals and even TV screens.

Tiny LEDs have replaced the tubes that light up LCD TVs to make dramatically thinner televisions with far better display of colours. 4. Video Displays Video Displays are two-dimensional displays that cover a full area, basically as rectangle. The diff erent types of video displays are

CRT display A Cathode-Ray Tube(CRT) is a display device used in television sets and computer monitors. It is a kind of vacuum tube which contains one or more electron guns, electrostatic defl ection plates and a phosphor target which is located at the back of the glass screen. A cathode for which the CRT got its name is a positive terminal at which electrons may enter. LED Display • It is a type of display that uses light emitting diodes(LEDs). • This flat panel display is used in many applications like to display traffi c signs, displays of railway stations, television display etc.

Organic LED (OLED) • OLEDs work in a similar way to conventional diodes and LEDs, but instead of using layers of n- type and p-type semiconductors, they use organic molecules to produce their electrons and holes • A simple OLED is made up of six diff erent layers. On the top and bottom there are layers of protective glass or plastic. • The top layer is called the seal and the bottom layer the substrate. In between those layers, there’s a negative terminal (sometimes called the cathode) and a positive terminal (called the anode). Finally, in between the anode and cathode are two layers made from organic molecules called the emissive layer (where the light is produced, which is next to the cathode) and the conductive layer (next to the anode)

AMOLED • AMOLED is a display device technology used in smart-watches, mobile devices, laptops, and televisions.

Liquid Crystal Display(LCD) • This display generally depends upon the light modulating properties of liquid crystals. • The low power consumption makes it good to use in all types of electronic equipments that are battery powered. • LCDs are electronically modulated and are made of liquid crystals which are arrayed in front of the light source to produce images in color.

TFT LCD Display TFT LCD displays are another type of LCD display that uses the thin fi lm transistor technology. This display helps to improve the quality of the image, contrast, addressability. Generally, TFT LCD is an active matrix LCD display Plasma Display • A plasma display is a computer video display in which each pixel on the screen is illuminated by a tiny bit of plasma or charged gas, somewhat like a tiny neon light. Plasma displays are thinner than cathode ray tube ( CRT ) displays and brighter than liquid crystal displays (LCD). • Between the glass panels there are display and address electrodes which form the grid. Electrodes intersect at a particular cell will get charged and excites neon and xenon gas within each cell.

• When the gas gets excited, it creates plasma and releases the UV light and thereafter releases the phosphor electrodes which are located on the sides of the cell. When these electrodes come back to the original state, light is emitted. • Plasma panel displays text or graphics using the light from large number of tiny plasma cells. Each pixel is made up of three sub cells which emit red, green and blue lights for colour display. Plasma display is thinner than its CRT counter parts and wider display panels can be created using plasma technology. • Plasma is an ionized gas containing free-fl owing ions and electrons. Under normal condition, gas inside the chamber is neutral. Plasma is created by applying very high voltage across the electrodes on the sides of the gas chamber.

Quantum Dot Display • Quantum dot display is a type of display technology similar to the OLEDs. Here the light is supplied earlier, so that more effi cient displays are obtained. Quantum dots are considered to be electro- active and photo-active which makes them to be a better display technology

Electroluminescent Display • Electroluminescent display is a flat panel display that works on the principle ofelectroluminescence. • Electroluminescence is a phenomenon where materials can emit light in response to the electric current. • To make use of this phenomenon, electroluminescent display uses gallium arsenide (GaAs) as an electroluminescent material. The basic structure of electroluminescent display consists of electrode layers at the top and bottom

5. Electronic Paper • Electronic paper (e-paper) is a technology that mimics the appearance of ordinary ink on paper. The paper’ is similar to the Kindle tablet. • It is not lit up like a standard display, but rather reflects the external light which illuminates it. Therefore, it works very well where there is bright light, such as out in the sun, in contrast to standard LED displays that work best in darkness. • At the same time, it needs only a tenth of the energy that a Kindle tablet uses, which itself uses much less energy than a tablet LED display. • The e-paper is less than a micrometer thin, bendable and gives all the colours that a regular LED display does. 6. Electronic Cigarette An electronic cigarette or e-cigarette is a handheld electronic device that vaporises a flavoured liquid which may have a nicotine base. The user inhales the vapour. The fluid in the e-cigarette is called e- liquid. The health risks of e-cigarettes are uncertain. While they are likely to be safer than tobacco cigarettes, the long-term health effects are not known. These health effects also depend upon the e-liquid used in them.

MPPSCADDA

4. ROBOTICS, ARTIFICIAL INTELLIGENCE AND CYBER SECURITY

ROBOTICS Robotics It is the field of science and technology which deals with the design, manufacture and use of robots in various fields. • It is a system that contains sensors, control systems, manipulators, power supplies and software all working together to perform a task. • Its an an automatically operating machine which replaces human effort.

Humanoid Robot Among other robots, has been a special area of interest. A humanoid robot has the overall appearance of the human body. It has the following features:

• The humanoid robot can maintain itself, i.e., it recharges its own battery by connecting to a power plug or a battery. • It has a learning ability to develop new capabilities and adjust itself to the surrounding environment. • It avoids harmful situations and engages in safe interaction with human beings and other components in its environment.

The humanoid robots have the following components: i. Advanced software: The humanoid robots possess advanced software. This advanced software has algorithms not only to carry routine tasks, but also to learn new tasks. ii. Control system: The humanoid robot has a control system which uses feedback from its own experiences. The robots brain consists of a silicon chip called a Central Processing Unit (CPU). It is like the chip that runs a computer. The robot’s CPU decides what to do and how to react to the world based on the feedback collected by devices called sensors. iii. Sensors: Robots receive feedback from the sensors. These sensors mimic human senses such as video cameras that function like eyes and microphones that act as ears. Some robots even have the sense of touch, taste and smell. The robot’s CPU, interprets signals from these sensors and adjusts its actions accordingly. iv. Actuators: A humanoid robot has a body consisting of metal, plastic and similar materials. Inside these bodies are small motors called actuators. These actuators mimic the muscles of our body

and help move the various parts of the robot’s body. The simplest robots consist of an arm with a tool attached for a task v. Power supply: Most robots get their energy from electricity. A humanoid robot detects its own battery status and attaches itself to the source of electricity to charge its battery. vi. End effectors: In order to carry out the assigned tasks, robots are equipped with tools called end effectors. The nature of end effectors depends upon the designated task of a robot.

Important Robots and their Functions Advanced Step in Innovation Mobility (ASIMO) • It is a humanoid robot created by Honda. It was created as a helper to people. Femi Sapien • It is a female humanoid robot. It can respond to sight, sound and touch and can be programmed with a sequence of movements. HRP-2M Choromet • It runs on Linux. It recognises objects, performs human Motions and follows commands using sensors. Ibn Sina Robot • It is the world's first android robot with Arabic language conversational abilities. Swarm Robotics • It is the coordination of multi-robot systems which consist of large numbers of mostly simple physical robots. Bionic Man • Scientists have developed the world's first human robot made entirely of prosthetic parts and it can walk, talk and even has a beating heart. Famous Robotic Machines • Unmanned Aerial Vehicle (UAV) UAV, also known as drone is an aircraft without a human pilot on board. • Its flights are controlled either autonomously by computers in the vehicle or under the remote control of a pilot on the ground or in another vehicle. Curiosity (rover) • It is a car-sized robotic-rover exploring Gale Crater on Mars as part of NASA's Mars Science Laboratory Mssion. • It is Japan's first robot astronaut, to accompany Koiche Wakata, the first Japanese commander of the International Space Station.

Telerobotics • It is the area of robotics concerned with the control of robots from a distance, chiefly using wireless connections (like Wi-Fi, Bluetooth, the Deep Space Network and similar), 'tethered' or the. Internet. Robotics in India • The Robotics Society of India (RSI) is an academic society aimed at promoting Indian Robotics and automation activities by serving as bridge between research centres and industries

APPLICATIONS OF ROBOTS Robots have applications in almost all the fields. Robots can carry out tasks with precision, at faster speed and at lower cost than humans themselves can carry.

1. Automobile industry: Robots are used in the manufacturing of automobiles such as welding, painting and assembling of various parts. 2. Electronics: Robots are used in mass-production of circuit boards and can keep tiny components on circuit boards with great accuracy. 3. Military: Robots such as unmanned aerial vehicle can be used to perform dangerous tasks at enemy locations. They are used to diffuse bombs and remove already laid land mines. 4. Medicine: Robots are used to conduct surgery in human beings with minimal cuts. 5. Environment: Robots are used to clean oil spills, dispose off nuclear waste and other hazardous waste. 6. Disaster management: Robots are designed to explore abandoned mines. Abandoned mines are at the risk of explosion due to the presence of methane gas. Robots are also used in fire- fighting operations.

.

COMPUTER CONTROLLED DEVICES • These devices are termed as computer controlled devices that have become part of our daily living in many ways; some of them are simple while on the other hand some are very complex in their functions. • “A computer controlled device is a device that accepts physical inputs from external source and pairs this information with computer controlled instructions to perform specific functions.” • These devices are not necessarily desktop computers that we are familiar with, but are embedded in other systems, controlling and coordinating their functioning.

SENSORS • Some popular forms of computer controlled devices that we readily encounter are sensors of a wide variety. • A sensor is defined as “a device that receives signal or stimulus (as heat, pressure, light etc.) and responds to it in a distinctive manner”. • These sensors are used at railway stations in escalators, in weighing machines, and also in robots that have specific functions. • It is to be noted that the way robots function is not the same as the way sensor operated devices function. However sensors are also used extensively as embedded component in robots that have to perform complex functions like surgery or detection of explosive in public places. • An example of computer controlled devices that we come across in our day to day lives. • We all have been familiar with robots, which are able to perform a host of tasks; this is one of the most common example of such a device. • It is programmed to move, manipulate objects, and accomplish work while interacting with its environment. • Robots mostly work on a pre-installed instruction program that has a control through a computer assembly whereas sensors function on the inputs that they receive in physical form from the external environment and then they convert this input into electronic signals and that finally leads to a desired action or response.

Usage of sensors as computer-controlled devices in and around us. • A sensor is a device that senses and measures physical attributes like temperature, pressure etc. and converts it into a signal which is read by an observer or by an instrument particularly.

Barcodes

• The commonly used barcode is perhaps the most common example of how a sensor collects data and makes it computer readable. • Barcodes are familiar black and white stripes on packaged goods, containing information on the type of an item, identity of its manufacturer, its price,etc.

• A barcode is read by shining light at it. • A barcode scanner, which is an optical device, reads the barcode. It requires a line-of-sight condition; there should not be any obstruction between the barcode and the beam of light. • Parts of the code reflect the light and parts do not. • The barcode communicates its fixed information by spatially modulating the incident light. The communication is read by a computer and displayed in a language understood by all.

Motion Detection

• Motion of an object is detected electronically using infrared light or laser technology and acoustic devices. • Motion detectors have sensors that detect movement and send a signal to a sound device that produces a sound alarm. • There are motion detectors that employ cameras to capture images and send them to a computer. Such sensors are used in banks, shopping malls etc.

Parking Sensors (Based on Distance Sensors)

• Parking sensors are a technology that allows the driver of an automobile, truck, or commercial vehicle to be alerted to nearby objects in their path. • Parking sensors are also known as backup sensors, parking sonar or just sonar depending on the automaker. • These sensors send ultrasonic waves 40,000 times per second that detect obstacles behind the vehicle. • A controller installed inside the vehicle then receives the signal from the sensors and transmits it to a speaker that emits a tone, or to a combination of speaker and display unit. • A smart sensor collects data and converts it into result in a unit appropriate for the particular physical attribute that is being measured. • A smart sensor can monitor voltage, radiation, temperature, humidity, etc. and process the information by itself and adjust the system.

Location Tracking (GPS)

• A wide variety of amazingly powerful antennas are used to locate objects of various kinds that are often dynamic and change their position with time. • The Global Positioning System (GPS) tells us where we are on earth by generating absolute location data. GPS satellites orbit the earth twice a day and transmit signals to GPS receivers on

earth. These receivers are equipped with smart sensors to capture the signals and calculate the exact location of an object. • Once the position of the object is established, the GPS unit can calculate other information, like speed at which it is moving, the track it follows, the places it has been through during the trip, its distance to destination, and more. • GPS has three segments. o The space segment consists of 28 satellites that are 11,000 nautical miles above the earth. o The user segment consists of receivers, which one can hold in ones hand or mount in the car. The third one, the control segment, consists of five ground stations around the world. • GPS devices are installed in cars and taxis and in all aircrafts.

AUTOMATED TELLER MACHINE (ATM)

• So far we had seen various types of robots and sensor devices. Now we would also try to understand another very common example of computer-controlled device that we keep using frequently in our daily lives, the ATM. • From the ATM teller we get access to a host of services like bank account related information, cash deposit, cash withdrawal etc. try to understand how this computer-controlled device functions in a slightly greater detail.

• An ATM is a computer controlled machine designed to dispense cash, and other bank information without going to the bank. • The ATM can also take deposits, transfer money between bank accounts along with basic banking services. • This electronic machine is connected to the bank database through a computer controlled system that has capability to perform functions based upon the information that is provided by the customer through its banking card, it can be a debit card or credit card. • The magnetic tape on the card is read by the ATM machine that checks the credentials of the user, once it is verified, a list of services is visible on the screen of the ATM. • The customer as per his requirement can choose one option at a time, further this request of customer is taken by the machine and it then processes it and delivers the service requested by the customer.

Here interestingly we can see how effectively computer controlled devices can be synchronised between the service provider (that is the bank in this case) and the customer and make the entire banking service very much convenient and can be utilised by the customer round the clock suiting his/her convenience.

• The following figures display an ATM, the block diagram and a systems overview of an ATM which is computer controlled and organsation of different units and their workings through a computer instucted program mechanism.

ARITIFICIAL INTELLIGENCE

• Artificial intelligence (AI) is an area of computer science that emphasizes the creation of intelligent machines which can work and react like humans. • In other words, the term ‘artificial intelligence; is used when a machine performs ‘cognitive’ functions such as ‘learning’ and ‘problem solving’ that we associate with human minds. • The concept of AI is based on the idea of building machines capable of thinking, acting, and learning like humans. • Artificial Intelligence is an interdisciplinary concept that studies the possibility of creating machines capable of interacting with their environment and acting upon the received data in the a manner considered intelligent. AI intelligence harnesses algorithms and machine learning to predict useful patterns humans normally identify. • AI based Smart machines take human decision-making out of the equation so intelligent machines can instigate changes and bring forward solutions to basic problems

Some of the applications are: 1. Computer games: Programming computers to play games against human opponents. 2. Expert systems: Programming computers to make decisions in real-life situations (for example, expert systems in the field of medicine help doctors diagnose diseases based on symptoms). 3. Language translation software: Programming computers to understand multiple human languages and possess the ability to convert the text written in one language into another language. 4. Industry: Through AI, an entire manufacturing process can be automated, controlled and maintained by the computer system. 5. Finance: Banks use intelligent software application to screen and analyse financial data. Software that can predict trends in stock market have been created, which have been known to beat humans in the predictive power. 6. Weather forecast: AI is used for predicting weather conditions. Previous weather data and factors affecting weather are fed to a network which learns the pattern and uses that knowledge to predict the weather pattern. 7. Healthcare sector: AI is used for faster, cheaper and more accurate diagnosis, improving patient outcomes and reducing costs. 8. Education sector: AI can make some of the educational processes automated such as grading and rewarding marks. Further, AI can assess students and adapt to their needs, helping them work at their own pace.

Risks of Artificial Intelligence (AI) 1. There is decrease in demand for human labour due to machines and intelligent robots taking over jobs. Such a trend may create large-scale unemployment.

2. There are existential risks due to the usage of AI. Stephen Hawking once said, ‘the development of full artificial intelligence could spell the end of the human race. Once humans develop artificial intelligence, it will take off on its own and redesign itself at an ever-increasing rate. Humans who are limited by slow biological evolution, can not compete and would be superseded by AI machines’. 3. AI technologies falling into terrorist hands may unleash modern terror network

Current situation • Companies are rallying around artificial intelligence in the workplace because it allows employees to use their abilities for the most worthwhile tasks, along with the management of these smart machines for a more successful system. • AI face recognition is beginning to help with missing people reports, and it even helps identify individuals for criminal investigations when cameras have captured their images. • Medical AI is another trend that reflects surprising success. Given patient information and risk factors, AI systems can anticipate the outcome of treatment and even estimate the length of a hospital visit. • Deep learning is one-way AI technology gets applied to health records to find the likelihood of a patient’s recovery and even mortality. Experts evaluate data to discover patterns in the patient’s age, condition, records, and more. • Home AI systems are also increasingly popular to expedite daily tasks like listening to tunes, asking for restaurant hours, getting directions, and even sending messages. • Many problem-solving AI tools also help in the workplace, and the helpfulness of this technology will continue to progress in 2019. • AI careers are increasing in demand, but the nature of AI skills is shifting. • AI projects have caught on throughout many businesses • Project Maven of Google is will use AI to make it easier to classify images of people and objects shot by drones.

SIRI and ALEXA • Artificial Intelligence is an interdisciplinary concept that studies the possibility of creating machines capable of interactingwith their environment and acting upon the received data in the a manner considered intelligent • Other examples of artifi cial intelligence in use today include smart home devices like Google’s NEST, self-driving cars like those produced by Tesla, and online games

Virtual Reality • An artificial environment created with computer hardware and software and presented to the user in such a way that it appears and feels like a real environment. • To create this effect, the user needs Hardware devices like goggles, gloves, and earphones etc inbuilt with sensors. It enables people to deal with information more easily. • The medical profession is projected to use virtual reality for some treatments and interactions with patients in the coming years. • Virtual training sessions for companies can cut costs, fi ll in the need for personnel, and increase education. • According to Gartner, by 2023, virtual simulations for selected patients with specific illnesses will reduce emergency room visits in America by 20 million. • These simulations will have intelligence capabilities, so virtual-reality care can still provide patients with proper attention. • Specialized fields are the main places where virtual reality has caught on, but experts project it will become more applicable to other technological advances.

Augmented Reality • The word augment means to add or enhance something. In the case of Augmented Reality (also called AR), graphics, sounds, and touch feedback are added into our natural world to create an enhanced user experience. • An enhanced version of reality where live direct or indirect views of physical real-world environments are augmented with superimposed computer-generated images over a user’s view of the realworld, thus enhancing one’s current perception of reality • Augmented reality is a more versatile and practical version of virtual reality, as it does not fully immerse individuals in an experience. • Augmented reality features interactive scenarios that enhance the real world with images and sounds that create an altered experience. • The most common current applications of this overlay of digital images on the surrounding environment include the recent Pokémon Go fad.

Augmented reality can impact many industries in useful ways. • Airports are implemening augmented-reality guides to help people get through their checks and terminals as quickly and effi ciently as possible. • Retail and cosmetics are also using augmented reality to let customers test products, and furniture stores are using this mode to lay-out new interior design options. • The possibilities for augmented reality in the future revolve around mobile applications and health care solutions. Careers in mobile app development and design will be abundant, and information technology professionals can put their expertise to use in these interactive experiences.

CYBER CRIMES Cyber Crimes Cybercrime or computer-related crime, is a crime that involves a computer and a network. The computer may have been used in the commission of a crime or it may be the target. Cybercrimes can be defined as: offences that are committed against individuals or groups of individuals with a criminal motive to intentionally harm the reputation of the victim or cause physical or mental harm or financial loss to the victim directly or indirectly, using modern telecommunication networks such as internet. Types of Cyber Crimes • Computer as a target: Using a computer to attack other computers e.g. hacking, virus/worm attacks, Denial of Service (DoS) attack etc. • Computer as a weapon: Using a computer to commit real world crimes. i.e. cyber terrorism, IPR recognitions, credit card frauds, electronic fund transfer frauds, pornography etc.

1. Hacking Hacking refers to gain unauthorised access to data in a system or computer. Such data may pertain to commercially important information, data with wide ranging security implications, legally sensitive information, etc. 2. Spamming: It is an unwanted e-mail sent with commercial or some other objective. Spamming does not cause direct loss to the target, but it uses network resources such as storage space of the user and so on. 3.E-mail spoofing: It refers to an e-mail which originates from one source, but appears to have originated from another source. For instance, an e-mail from a third party may attempt to create an impression that it is from the bank of a person. E-mail spoofing is often used to carry out phishing attacks. 4.Phishing: It is a cybercrime in which spoofed e-mail directs the user to a fraudulent website, with similar appearance as the original website, in order to obtain sensitive information from the user such as bank account password. Let us continue with the above example. The spoofed e-mail in the above example may create an impression that it is from the bank. The person will be directed to a website which will appear like the bank’s website. The user will be asked to log into the bank account. As the user submits the details, his details will be taken. Thereafter, the details are used to withdraw money from the user’s bank account. 5. Cyberstalking: Cyberstalking is a crime in which the attacker harasses a victim using electronic communication, such as e-mail or Instant Messaging (IM), or messages posted to a social networking website or a discussion group. A cyberstalker relies upon the anonymity afforded by the internet to allow them to stalk their victim without being detected.

Cyberstalking messages differ from an ordinary spam. A cyberstalker targets a specific victim with often threatening messages, while the spammer targets a multitude of recipients with simply annoying messages. 6. Cybersquatting: It refers to obtaining domain names related to established businesses in order to seek large payments from these businesses for exchange of domain names. The intention behind cybersquatting is to sell the domain names later at premium prices. 7.Typosquatting: It refers to obtaining domain name which is similar to existing popular domain name. The typo squatted domain name has minor difference with the existing popular domain name such as differences in spelling with the same pronunciation. 8.Denial-of-service attacks: A denial-of-service (DoS) attack occurs when multiple systems flood the bandwidth or resources of a targeted system, usually one or more web servers. A DoS attack blocks the server space and thus reduces its capacity to serve genuine users. 9.Malwares: It is a malicious software introduced into the computer system or network with mala-fide intention. Types of MALWARES 1. Virus: It is a computer program or software which infects other computer programs or data by modifying them in unwanted ways. A virus can be attached with software, e-mail or file stored in the computer and thus, a single virus can infect millions of software, files and other computer system resources. 2. Worm: It is a self-propagating malware which over the time grows bigger in size and infects other programs of the computer in unwanted ways. Worm does not attach itself with other programs or files. However, it grows in size and thus reduces the processing power of a computer system. 3. Trojan horse: It is a malicious program contained within the apparently desired program or data. When a user downloads the desired program or data, the malicious program is also downloaded along with it. Trojan horse can be used to affect files or programs, spy sensitive information or even undertake remote control of a computer. 4. Spyware: These are used to keep track of the user and his activities on a computer network. Spyware may be used to fetch confidential commercial information such as passwords. 5. Keyloggers: These are forms of spyware which track keystrokes made by the user. Keyloggers are used to gain access to passwords or other sensitive information. 6. Adware: These are programs which recurrently appear on the screen of the user to promote a particular product or service. 7. Ransomware: It is a malicious software that blocks access to computers and data until a particular sum of money is paid. 8. Botnets

9. Nagware/Begware/Annoyware/ Nagscrum 10. Web Crawler/Spidler 11. Grayware 12. /Flamer/Skywiper/Skywlper 13. Root kits

Ransomware Attack Wannacry/Not Petya/Petya

• All are ransomwares. • Not Petya is the second major global ransomware since WannaCry, which had infected about 3,00,000 computers across 200 countries in May 2017. • The Petya ransomware not only encrypts files, but also overwrites and encrypts the master boot record. It shuts down the system about an hour after the infection and asks for ransom on rebooting. • Users will not be able to access the system till the infection is removed. The PC might be protected from the malware in case the user is able to disrupt the system reboot.

Eternal Blue Exploit

• Eternal Blue is a vulnerability that exists in Windows 10, 8, 7 and even XP. • Eternal Blue was developed by the US National Security Agency (NSA) along with other hacking tools. But it was leaked online. • Eternal Blue was used to carry out recent ransomware attacks.

Computer Virus • A computer virus is a malware program that, when executed, replicates by inserting copies of itself into other computer programs, data files or the boot sector of the hard drive. When this replication succeeds, the affected areas are then said to be infected.

Firewall • The primary objective of a firewall is to control the incoming and outgoing network traffic by analyzing the data packets and determining whether it should be allowed through or not based on a pre-determined rule set.

CYBER SECURITY Security Management • Facial Recognition A facial recognition system is a computer application for automatically identifying or verifying a person from a digital image or a video frame from a video source. • Biometric Passport A biometric passport, also known as an e-passport or a digital passport is a combined paper and electronic passport that contains biometric information that can be used to authenticate the identity of travellers. • Iris Recognition It is an automated method of biometric identification that uses mathematical pattern-recognition techniques on video images of the I, is of an individual's eyes, whose complex random patterns are unique and can be seen from distance. • Smart Card A smart card, chip card, on Integrated Circuit Card (ICC) is any pocket sized card with embedded' integrated circuits. Smart cards are made of plastic, generally polyvinyl chloride. BIOMETRICS The word ‘biometrics’ is made up of two words: ‘bio’ referring to ‘biological’ and ‘metric’ referring to ‘measurement’. Thus, biometrics refers to biological measurements. What Can Be Used as a Biometric? Most of the biometrics are unique for each individual and so are particularly suitable for identification. Some of the biometrics used are visible from outside (called visible biometrics) and easy to see such as facial patterns, iris scan, retinal scan and fingerprints. Other biometrics are not visible (called invisible biometrics) from outside. For instance, voice recognition rely on the uniqueness of each individual’s voice. It further combines the uniqueness of your lungs, larynx and other vocal organs. Unique electrocardiograph readings similarly verify an identity by measuring a human heart via the user’s wrist. Invisible biometrics even include behavioural identification. It includes measuring your typical behaviour with internet-connected devices (computers, tablets, smartphones). Smart software can then compare the way you usually type, use a mouse or scroll on a page with inputs from own past activity to detect unauthorised access of computer network. How Does a Biometric Authentication Work? Every time an individual seeks access, the biometrics generated compare them to previously stored information called a template. A template is not a whole image, but rather a code that describes certain unique features of the said image. These unique features were analysed during enrolment. Enrolment is the process in which a biometric is initially scanned into a system to derive a template. This template is stored in a secure environment. What Is the Difference between Biometric Authentication and Biometric Identification? Authentication involves matching the submitted biometric feature with the already stored template.

When it comes to identification, the aim of the biometric technology is to simply find a match within a database. For instance, law enforcement officials scan biometrics and compare them with the biometrics associated with wanted criminals. In other words, the difference between biometric authentication and biometric identification can be learnt by asking the following questions: Is a user requesting access to a secure physical or digital process? That is authentication. Is the person using the technology trying to discover something about a scanned individual? That is identification.

Facial Authenication How Does Facial Authentication Actually Work? Facial authentication is a technology to recognize face based on the spatial geometry of distinguishing features. It is preferred over other biometric means because it is widely believed to be the least intrusive and fastest biometric technology. There are different versions of facial authentication. For instance, Apple uses Face lD on iPhone X smartphones that have the TrueDepth camera. This camera captures face data by projecting and analysing over 30,000 invisible dots to create a depth map of the face plus an infrared image. One Plus has Face Unlock, which uses over “100 identifiers” such as distance between the eyes or the nose and upper lip. Can Face Authentication Be Faked? Face authentication is as unique as fingerprints. Face authentication cannot be replaced by photograph of the user or by scanning a sleeping persons face. This is because face authentication considers liveliness as a factor for authentication, which is judged by attentiveness of the subjects eyes. However, it is not a foolproof. There have been cases when people with similar faces, especially twins have been able to unlock devices with face authentication.

Blockchain Data • Blockchain data, like the new cryptocurrency Bitcoin, is a secure method that will continue to grow in popularity and use in coming future. • This system allows us to input additional data without changing, replacing, or deleting anything. • In the influx of shared data systems like cloud storage and resources, protecting original data without losing important information is crucial. • For transaction purposes, blockchain data offers a safe and straightforward way to do business with suppliers and customers. • Private data is particularly secure with blockchain systems, and the medical and information technology industries can benefit from added protection.

Digital Signature Digital signature is used to authenticate both the sender of the message. The authentication is done in such a manner that it is provable to the third party. Let us understand the following terms to understand digital signature. Steps in Digital Signature 1. Sender of the document applies hash function in the document. 2. Sender uses private key to create digital signature and encrypt the document. 3. The document is transmitted to the receiver. 4. The receiver of the document applies public key corresponding to the particular private key to confirm the identity of the sender. 5. The receiver applies the same hash algorithm in the document as applied by the sender. If the hash result is identical, then it authenticates the originality of the document.

Thus, digital signature authenticates both the sender of the document and the content of the message. Cryptology It is required for the safe transfer of data. It involves encoding of data by the sender and decoding of the encoded data by the receiver to convert data into original form. Encoding or encryption involves conversion of plain text to cipher text (encoded text). Decoding or decryption is done by the receiver of the message to convert cipher text into the original text. Types of Cryptology There are two types of cryptology. 1. Symmetric cryptography: It is a system in which both the sender and the receiver of the message use a common secret key for both encryption as well as decryption of message. For instance, you and your bank has the common password to access your bank account. 2. Asymmetric cryptography: It involves a pair of keys i.e., a public key and a private key. A private key is a secret key used by the signer of the document to create digital signature, whereas the public key, which is corresponding to a particular private key, is open to public and is used by the other party (receiver of the document) to verify the user of private key.

Hash function is used to authenticate the contents of the document. Hash function involves an algorithm which reveals the same result every time it is used in the documents. National Cyber Security Policy, 2013 • It is a policy framework by Deptt of Electronics and Information Technology; . It aims at protecting the public and private infrastructure from cyber attacks. The policy also intends to safeguard information such as personal information (of web users), finance and banking information and sovereign data.

MPPSCADDA

5. E-GOVERNACE

Internet in India • The history of internet in India started with the launch of internet services by Videsh Sanchaar Nigam Limited VSNL on 15th August, 1995. • In 2004, Government formulated its Broadband Policy, which defined the broadband as an always on internet connection with download speed of 256 kbit/s or above. From 2005 onwards the growth of broadband sector in the country attained acceleration.

E-GOVERNACE The ‘e’ in e-governance stands for ‘electronic’. It refers to the use of information technology to deliver services to citizens in time bound manner, increase accessibility of services to citizens and make administration more accountable. 1. Interactions in_e-Governance There are four types of interactions in e-Governance namely, government to citizens (G2C), government to business (G2B), government to government (G2G), that is, inter-agency interactions and government to employees (G2E). 1. G2C: An online interface is created between the government and citizens. Though almost all the government services are available online, some of the example are: o Tax and bill payments. o Registration of vehicles and lands. o Request for driving license and passports. o Information about employment, business opportunities and government schemes.

2. G2B: It is used to aid the business community (providers of goods and services) to seamlessly interact with the government. The objective is to cut red tapism, save time, reduce operational costs and create a more transparent business environment when dealing with the government. 3. G2G: In this case, the Information and Communications Technology (ICT) is used not only to restructure the government processes involved in the functioning of government entities, but also to increase the flow of information and services within and between different government entities. 4. G2E: The government is by far the biggest employer and like any other organisation, it has to interact with its employees on a regular basis. Benefits of e-Governance The benefits (or advantages or goals) of e-Governance are as follows:

• Better delivery of government services to citizens. • Improved interactions with business and industry.

• Citizen empowerment through access of information. • Less corruption and increased transparency in administration. • Greater convenience to citizens and businesses. • Reduction in the cost of delivering services. • Reduced paper work and red-tapism in the administrative process. • Greater citizen participation in the governance process. • Improved relations between the public authorities and civil society.

Challenges to e-Governance 1. The biggest challenge before e-governance is digital divide. Large section of Indian population does not have access to internet. E-governance does not cater to this section and this is the section which requires maximum access to government services. 2. Implementation of e-governance projects are costly and often require re-training of government employees and awareness among common public. 2. Digital Divide Digital divide refers to the gap between those who have ready access to computers and the internet and those who do not have access. 3. State of Digital Divide in India There is a huge digital divide between the rural and urban India. According to statistics, more than 75% of the broadband connections in the country are in the top 30 cities. Internet use is primarily associated with a large section of the English-knowing urban population. The most important reason of digital divide in India is the knowledge divide. Knowledge divide is both a cause and an effect of digital divide. Knowledge divide leads to digital divide and digital divide further enhances the knowledge divide.

DIGITAL INDIA MISSION Digital India is a campaign launched by the Government of India to ensure that Government services are made available to citizens electronically and to increase internet connectivity and digital literacy in order to empower people. It was launched in July 2015 by Prime Minister Narendra Modi. Thereafter, numerous programmes have been added to it. Date of Launch : 1st July, 2015. Website : digitaIndia.gov.in Mission statement : 'Power to Empower'

Digital India consists of three core components. They are: 1. The creation of digital infrastructure Bharat Broadband Network Limited (BBNL), the Government of India entity which executes the National Optical Fibre Network Project is the custodian of Digital India (DI) Project. It has an objective to connect 250,000 villages through broadband network. This will provide the first basic setup to achieve towards Digital India and is expected to be completed by 2017. The government is planning to set up at least one common service centre in each of the Gram Panchayats in the state. 2. Digital literacy: Digital literacy mission will cover six crore rural households. To connect rural India with the Digital India, the Government of India impelled e-mail service provider giants including Gmail, Office and Rediff to provide e-mail address in regional languages. 3. Delivery of services digitally: Some of the facilities which will be provided through this initiative are DigiLocker, e-education, e-health, e-sign, National Scholarship portal and e-Sampark. DigiLocker facility will help citizens to digitally store their important documents like PAN card, passport, mark sheets and degree certificates. DigiLocker will provide secure access to government- issued documents. It uses authenticity services provided by Aadhaar. It is aimed at eliminating the use of physical documents and enables the sharing of verified electronic documents across government agencies. Three key stakeholders of DigiLocker are: Citizen, Issuer and Requester. ‘Attendance.gov.in’ is a website to keep a record of the attendance of government employees on a real¬time basis. This initiative started with implementation of a common biometric attendance system (BAS) in the central government offices located in Delhi. ‘Mygov.in’ is a platform to share inputs and ideas on matters of policy and governance. It is a platform for citizen engagement in governance. Swachh Bharat Mission (SBM) Mobile app is being used by people and government organisations for achieving the goals of SBM. The e-Sign framework allows citizens to digitally sign a document online using Aadhaar authentication. The e-Hospital application provides important services such as online registration, payment of fees and appointment, online diagnostic reports, enquiring availability of blood online, etc. National Scholarship Portal is a one-step solution for end-to-end scholarship process, right from submission of student application, verification, sanction and disbursal to end beneficiary for all the scholarships provided by the Government of India. The e-Sampark is a mechanism to contact citizens electronically, sending informational and public service messages via e-mails, SMS and outbound dialing.

ELECTRIC VEHICLES IN INDIA Government of India introduced a scheme with effect from 1st April 2015 namely Faster Adoption and Manufacturing of Hybrid & Electric vehicles in India [FAME-India] for a period of 6 years, till 2020. This scheme is a part of the National Electric Mobility Mission Plan 2020 (NEMMP 2020). The scheme is intended to support the manufacturing and development of hybrid/electric vehicles to achieve self- sustenance at the end of the stipulated period. The scheme has 4 focus areas, i.e., technology development, demand creation, pilot projects and charging infrastructure. For demand creation, incentive will be available for buyers in the form of an upfront reduced purchase price to enable wider adoption. 4. What Are the Challenges? There are several challenges in achieving the target. 1. Battery technology cannot support electric vehicles. While the battery cost has fallen over the years, its capacity has not changed drastically. 2. The other major issue is the lack of charging stations. EVs battery can be charged full at home using AC power in about 5-8 hours. On the other hand, DC chargers can charge the full battery in a fraction of the time. However, most of the installed chargers across the country are AC chargers. Presently, people are still reluctant to shift to all-electric vehicles because they fear the long charge duration of the batteries. They are more likely to try hybrid vehicles which will run on both fossil fuels and battery. 2030 Target By the year 2030, electric cars shall make 40 per cent of new car sales. 5. Tesla Roadster Tesla Roadster is an electric supercar manufactured by Tesla Company found by Elon Musk. Tesla Company produces electric cars. The car will be available for purchase after 2020 with a base price of $200,000. The car can accelerate from zero to 60mph in 1.9 seconds. This acceleration rate is far higher than the existing cars. The Roadster will have a top speed of over 250mph. According to Tesla Company, the Roadster would be able to cover 630 miles with a single recharge of 200kWh battery. Information Technology Act, 2000 (IT Act, 2000) • It is an Act of the Indian Parliament fortified on. 17th October, 2000 This Act addresses the following issues: o Legal recognition of electronic documents. o Legal recognition of digital signatures. o Offenses and contravention. o Justice Dispensation Systems for cyber crimes

• This Act has been amended in 2008, by formulating the information Technology (Amendment) Act, 2008. • Changes in the amendment include redefining terms such as 'communication device'; to reflect current use, validating digital signatures and contracts, making the owner of a given IP address responsible for content accessed or distributed through it and making corporations responsible for implementing effective data security practices and liable for breaches.

MPPSCADDA

6. INTERNET AND SOCIAL NETWORKING SITES HISTORY OF THE INTERNET • The Internet, often referred to as the ‘Net’, consists of a complex network of computers connected by high-speed communication technologies like satellites, microwave devices, etc. • It allows easy and quick access to a huge amount of information/resources stored at many different locations around the world. • The Internet was developed over many years. In 1969, the American Department of Defense (DOD) started a network of devices called ARPANET (Advanced Research Projects Administration Network) with one computer in California and three in Utah. • As the use of the network gradually increased, other universities, research organisations, and private and commercial organisations also started using this technology. • The actual term “Internet” was finally coined in 1995 by the FNC (Federal Networking Council, USA).

How the internet functions? • A corporate network may have its computers connected through a local area network, governed by certain rules. Further, this network may relate to other networks. • Functioning of the Internet is not controlled by any one particular organisation. It is managed by a group of voluntary organisations. These voluntary organisations have formed the Internet Society. They decide on the rules, known as protocols, for communication over the Internet

HOW TO WORK WITH THE INTERNET? In order to work with the Internet, we need to know certain related terms like www, web browsers, web pages, websites, etc. Most of the terms on the Internet are prefixed with the term web. Web Pages The electronic pages seen on the Internet are known as web pages. A web page can be defined as the document that we see on the Internet. Website Many web pages linked with each other combine to form a website. HTML • A web page can be written in the language known as HTML (Hyper Text Markup Language). HTML is a very simple language having a number of options to represent text. • Many other scripting languages have now been developed which can be embedded into HTML, giving it the power to interact with the users.

• These dynamic web pages can take inputs from users and give information accordingly – taking in the location of the user before displaying the weather forecast. • For example, a protocol called Hyper Text Transfer Protocol (HTTP) is used to transmit and receive the web pages.

Web Browsers • The web is a collection of a huge amount of information. Every single web page consists of some information and also a number of links, which connects us to other related web pages. • To visit the linked web pages, just click over the linked text and the next web page opens. • Just like a word processing application is needed to open a word processor document, an application is needed to view an HTML document. • To view a web page we need special software called web browser. • Mosaic was the first web browser developed by National Centre for Supercomputing Application (NCSA). • This browser didn’t have any special features like present day web browsers. It was not possible to view pictures or use any present day font formatting features in the web pages. Initially, the browsers were designed to show plain text, without any formatting. • With the increasing use, the need to incorporate additional features like text formatting, viewing images, playing sound, etc. was felt. Most modern day browsers incorporate all these features.

Some other commonly used browsers • Chrome • Netscape Navigator • Mozilla FireFox, • Opera, • Safari, • MSIE (Microsoft Internet Explorer), etc.

WWW (WORLD WIDE WEB) • One Internet application that is currently drawing a lot of attention is the World Wide Web (WWW), also known as W3. WWW is a hypermedia-based software technology allowing consolidation of hypertext, graphics, audio, video and multimedia to provide information on almost each and every topic/subject/area. • WWW was started in 1989 at CERN (European Center for Nuclear Research). The motivation was the need to interact with each other by the group of researchers at far off places. This demand for interaction and communication led to the rapid growth in this area of communication. • Any website located on the Internet has an address associated with it indicating the location of the website. Every page has an address associated with it. This address is known as the URL.

URL (UNIFORM RESOURCE LOCATOR) • URL stands for Uniform Resource Locator. Every web page that is displayed on the Internet has a specific address associated with it. • This address is known as the URL. It tells us the location of the web page being displayed and other related information. • As the postal address is required to reach a letter to a person staying anywhere on earth, a unique location (address) of a web element which may be a website or a web page is required in the World Wide Web to view it in the browser. This unique address of the web elements is referred to as a URL. • The URL consists of four basic parts, namely, server type, hostname, folder name and the filename. Each one of these has a specific function. • The “server type” indicates the type of Internet server (Protocol) being accessed. • The server type is always followed by “://” and the host name. The host name is the Internet address of a remote computer on which the files reside. The folder name indicates the name of the directory in which the files are located. The filename specifies the name of the specific document to be displayed in the browser. The filename itself consists of two pieces of information, the name of the file to be displayed and the file extension, which specifies the file type (.htm for HTML file, .txt for a text file, .bmp for a bitmap image, etc.)

The structure of a URL can be represented as follows:

Server type://Hostname/directory/sub-directory/.../filename

A URL is illustrated in figure 7.3.

Many other protocols exist apart from http. Table below lists some common protocols. Name Used for

http Hyper Text Transfer Protocol is used to transfer the hypertext

ftp File Transfer Protocol is used to transfer binary and text files over the Internet

file Local file

news News group /News article

telnet For remote login over a TCP/IP connection

TCP/IP Transmission Control Protocol Internet Protocol. TCP/IP consists of a set of two protocols i.e. Transfer Control Protocol and Internet Protocol. Transfer Control Protocol controls the flow of data and is a reliable service protocol. Every computer in a network has a unique IP address associated with it. IP identifies and reach the target computer on the network.

UDP User Datagram Packet is used to transfer data between two computers. It is an unreliable protocol, offering no guarantee for data delivery.

• There are other protocols also like SLIP (Serial Line Internet Protocol), SMTP (Simple Mail Transfer Protocol) ARP (Address Resolution Protocol) PPP (Point to Point Protocol), etc.

CONNECTING TO THE INTERNET • In order to activate Internet services on any computer, it requires an Internet connection from an Internet Service Provider • There are several Internet Service Providers (ISPs) in India like VSNL, BSNL, Airtel, Reliance, etc. They charge some nominal fee for installation and connection. • Depending on the requirement we can get an Internet connection in any of the following ways:

1. Dial-up connection : We can get connected to the Internet by dialing the ISP’s number. This is useful if the network is either confined to small group of computers or for a single PC (Figure 7.4). 2. Leased lines : A dedicated line is laid specifically for the connection. This provides a fairly high speed, but is expensive. This is suitable for an organisation requiring uninterrupted, high speed Internet connection. 3. Broadband : This also provides a good speed. While leased line requires a separate telephone line, broadband can be delivered using an existing telephone line. This is ideal for home and small businesses requiring high speed Internet

4. WiFi Broadband : These days even wireless connections are available. For this we need to have a Wi Fi card attached to the computer and a wireless modem. Bandwidth • When we connect to the Internet, we must know its speed parameters. The speed of the Internet is measured in the number of bits transferred per unit time. • Generally, the speed of the Internet is measured in kbps (kilo bits per second), but these days some organisations are providing high speed connections in Mbps (Mega bits per second).

Bandwidth : In context of the Internet, the number of bits transferred by a channel per unit time is the bandwidth.

Modem • In order to have a connection we need a device called the modem. • This device converts the digital signal from the computer into an analogue signal that can travel through the telephone line. • On the other end, this analogue signal is again converted back to digital form by the modem at the destination end. • Some computer systems have internal modems (built-in within the motherboard) while in some systems there might be a need to have an external modem to have an Internet connection.

Router • Another device called a router can be attached to the computer to access the Internet. The router is a device used for connecting two different networks.

DOMAIN NAMES • All the websites on the Internet have unique names associated with them. • To launch a website, we must have a unique domain name. In order to avoid any conflict within the names of the websites the concept of domain names was developed. • There are certain websites which have .ac which indicates academic organisations, .in suffixed to their name indicating that they belong to India • For example: www.ignou.ac.in, www.ncert.nic.in, and many more. websites having .au as a suffix indicate Australia, .jp indicates Japan and so on. However, there is no such suffix for USA.

A domain can be generic or according to the names of the country. Some common domain names are: 1. in – stands for India (country name) 2. gov – indicates government agencies 3. net – network organisations 4. org – non-profit organisations 5. edu – educational organisations 6. com – commercial organisations 6. mil – military or defence

USES OF THE INTERNET SEARCH FOR INFORMATION A number of programs called search engines are available to search for the information on any topic. Some famous search engines are provided by: www.google.com, wikipedia.com, webopedia.com, MSN.com, Yahoo.com, etc. Search Engines A search engine is a complex program that searches documents containing a specified set of keywords. A search engine basically works in three phases: 1. The search engine sends a program (called the spider) that searches the web pages in the Internet for the keyword. 2. After the spider fetches the result, another software called the indexer reads these results. The indexer then creates an index based on the words contained in each of the documents returned by the spider. 3. After indexing, the search engine presents only the documents matching the search criteria to the user.

The relevance of the result returned by the search engine depends on how you frame the query. To search any information, connect to any of the searchengine websites like: www.msn.com, www.google.com, www.webopedia.com, www.yahoo.com. E-MAIL (ELECTRONIC MAIL) SERVICES The Internet is commonly used for sending and receiving e-mails. We can send a message electronically to any person on the globe, provided that person has an e-mail-id. This service is fast and economical. CHATTING Chatting Involves textual exchange of message in real time. Chat servers provide facility to create virtual chat rooms and only the members associated with these rooms are allowed to share messages. Chat works best if the time is scheduled by both the parties who are willing to chat – as both the parties must be connected to the Internet while chatting. Some common chat engines are : Yahoo Messenger, Google Talk, Rediff Bol, etc. INSTANT MESSENGER SERVICES • These tools can be used to send messages instantly. It also allows us to talk to anyone anywhere in the world. • This is a cheaper and quicker method compared to other services. Unlike chatting, it is not necessary to have an account with the same provider. Additionally, both the users need not be connected while sending messages.

• We can easily download the messenger software from Internet e.g. MSN Messenger, Yahoo Messenger, etc.

NEWSGROUP • Newsgroup is an e-service hosted by many newsgroup organisations. One can become a member of a newsgroup and read and share current affairs and messages. • Newsgroups cover a broad domain of interests including education, science and technology, medicine, arts, sports, etc. USENET is one such example.

TELECONFERENCING • People can have a conference or meeting sitting at different locations with a microphone attached to their computers.

VIDEO-CONFERENCING • In teleconferencing we are able to talk to each other sitting at different places but in video- conferencing we can also see what is happening at the other side. • We have observed that the anchor, panelists and experts sitting at different locations across the globe communicate and share their views in many news channels. • For this, we need a web-camera and a microphone connected to the computer system, high bandwidth connection, and video-conferencing software.

E-COMMERCE • E-commerce or Electronic-Commerce means online transactions of business. In this, the vendor and customer conduct a transaction sitting at different geographical locations, connected through the Internet. • The customer need not strain himself by visiting a number of shops outside in scorching heat or heavy rains. He can do shopping by sitting at home, visiting the desired e-commerce site and placing an order online. • E.g. http://shopping.indiatimes.com, http://ebay.com, http:/ /shopping.rediff.com, etc.

M-COMMERCE • It is an acronym for mobile commerce. It is an upcoming technology after e-commerce. • It involves buying and selling of goods and services electronically through wireless handheld devices at any place. • We can do transactions through our mobile phones also.

E-BANKING • Almost all the nationalised banks have started providing their services online. This means you can have a bank transaction through Internet.

• E-banking is a facility that allows you to conduct your banking transactions online with a laptop or computer with an Internet connection. Every user is allotted a unique user id and password by the bank for this purpose. • The account holder can view account balances and transaction statements, transfer money between accounts in the bank, pay utility bills at any time of the day and from any place, can take printouts of financial-statements, and many more.

E-LEARNING • E-learning deals with educating people online with the help of the Internet. • Development in this field has led to the formation of virtual classes and online sessions. • A teacher can teach many students at the same time sitting at different geographical locations. Such classes may be open to all, or may require prior student registration.

E-Learning can be delivered in different ways: At the time of learning teacher and students both are to be online.

• Video Lecture : The teacher or instructor can take a class while students can see and listen to him/her. For such a classroom a web camera is required at every terminal. • Textual Lecture : The teacher can take a class by passing his lectures as text and students providing textual response. Students can post their queries online and can get the response instantly.

At the time of class both teacher and student need not be online at the same time. The teacher can send the lecture using tools like explain these and blogs online to the students. The students can read their lessons online. If they have any queries then they can mail their queries to the teacher’s account E-MAIL ACCOUNT E-MAIL ADDRESS • An e-mail addess (account) consists of two main parts, the username and the domain-server name with the symbol @ in between.

<@ Username> @

• Username can be any name but domain-name is fixed for a particular website on which we have our e-mail account. For example, [email protected], [email protected] or [email protected], etc

Virtual Private Network • A virtual private network (VPN) is a technology that creates a safe and encoded connection over a less secure network. It is a method used to add security and privacy to private and public networks, such as the internet or Wi-Fi hotspots. • VPN extends a private network across a public network. It enables remote users to share data across shared or public networks as if their computing devices were directly connected to the

private network. Data flows through secure tunnels to ensure security and the VPN users have to go through authentication process to get access to the data.

Advantages of VPN • Helps in establishing long-distance secured network connections. • Cost saving as it reduces the long-distance telephone charges. • Cost of maintenance is low.

Disadvantages of VPN • Requires detailed understanding of network security issues and careful installation. • Reliability and performance of an internet-based VPN is not under direct control of an organisation.

Types of Area Networks Local Area Network (LAN) A LAN connects network devices over a relatively short distance. LAN is usually used in office building, school or home. Sometimes, one building may contain a few small LANs (perhaps one per room), and occasionally a LAN will spread across a group of nearby buildings. In an IP networking, LANs are usually controlled by single administrator and often they do not have more than one sublet. They do not have to be connected to the internet to work. Wide Area Network (WAN) As the term implies, a WAN spreads over large physical distance. The Internet is the largest WAN, spreading all over the earth, connecting all the computers around the world. A network device called a router connects LANs to a WAN to transfer information quickly and securely. In IP networking, the router maintains both the LAN address and the WAN address. Most WANs (like the internet) are not owned by any one organisation, but rather exist under collective or distributed ownership and management. 3Metropolitan Area Network (MAN) This is a network which is larger than a LAN, but smaller than a WAN, and incorporates the elements of both. It typically spreads over a town or city and is owned and operated by a single person or company such as a local council or a large company. Firewalls This is a system of hardware and software that blocks unauthorised user from outside the network to enter into an organisations network. It also prevents the transfer of sensitive information from private network to other networks. Usually, firewall is located at the network gateway. Common uses of firewall include: • Prevents unauthorised person from accessing the network. • Blocks access to undesirable websites. • Filters incoming e-mail, etc.

Internet Protocol The Internet Protocol (IP) refers to a set of rules governing the format of data sent over the internet or other network. Traditionally, data such as written information, video and audio were shared over the internet. In recent times, the IP is used to transfer live voice signals and broadcast television signals. These applications are called Voice over Internet Protocol (VoIP) and Internet Protocol Television (IPTV), respectively. VoIP The VoIP refers to telephony through the IP. The VoIP requires conversion of voice signals into digital signals at the senders end and re-conversion of digital signals into voice signals at the receivers end. The VoIP has certain advantages over the traditional telephony. Voice calling through VoIP is far cheaper than calling from a telephone. VoIP is possible even in those regions, where telephone lines are not laid. Video calling is also possible through VoIP. IPTV IPTV is a TV based IP. The IPTV converts television signals into digital signals and re-converts these digital signals into television signals. The IPTV also has advantages over the traditional television transmission. The IPTV enables access to larger number of channels. As IPTV runs through internet, it is available even in regions, where cable television network is not present. High Definition Television High Definition Television (HDTV) refers to digital TV broadcasting system offering higher picture resolution as compared to regular TV systems. The quality of picture and sound is better as compared to the cable TV. HDTV is enabled through a geostationary satellite. 6. Net Neutrality Net neutrality refers that internet service providers should facilitate equal access to all content and websites regardless of its source. Internet service providers should not favour any source or websites at the cost of others. Net neutrality is also called network neutrality, internet neutrality or net equality. The Telecom Regulatory Authority of India (TRAI) has favoured net neutrality. It has warned against any practice such as blocking, slowing down or granting preferential speeds to any content. TRAI had also barred telecom providers from charging differential rates for data services in its Prohibition of Discriminatory Tariffs for Data Services Regulations, 2016. Web Search Engine • It is designed to search for information on the World Wide Web. Following are the main search engines:

o Google It is a web search engine owned by Google incorporation. Google search is most used search engine on the Internet. o Google + It is a multilingual social networking and identity service owned and operated by Google Incorporation. o Google Earth It is a virtual globe map and geographical information program that was originally called Earth Viewer 3D and was created by Keyholr Incorporation. o Google Chrome It is a freeware web browser developed by Google that uses the webkit layout engine. It was released as a beta version for Microsoft Windows on 2nd September, 2008. o Gmail It is a free, advertising supported email service provided by Google. o Youtube It is a video sharing website under the Google Incorporation, developed in 2005. Other Search Engines Some other search engines are as follows: o Lycos It is a search engine and web portal established in 1994. o Altavista It helps you find exactly what you are looking for. It provides information in all languages. o Hot Bot It is mainly used to search media files, geographical websites and multimedia files. o Bing It is a web search engine developed by Microsoft Incorporation.

Internet of Things (IOT) • The Internet of Things (IoT) is a system of interrelated computing devices, mechanical and digital machines, objects, animals or people that are provided with unique identifi ers and the ability to transfer data over a network without requiring human-to-human or human-to-computer interaction • It is an emerging movement of products with integrated Wi-Fi and network connectivity abilities. • Cars, homes, appliances, and other products can now connect to the Internet, making activities around the home and on the road an enhanced experience. • Use of IoT allows people to turn on music hands-free with a simple command, or lock and unlock their doors even from a distance. • IoT enriches the IT industry, especially in job creation.

Centre of Excellence on Internet of Things (IoT)

In partnership with NASSCOM, DeitY and ERNET in Bangalore, Centre of Excellence will enable rapid adoption of IoT technology and encourage a new growth strategy. IoT will help the citizens in services like transport system, parking, electricity, waste management, water management and women’s safety to create smart cities, smart health services, smart manufacturing and smart agriculture, etc

Digital Convergence Digital Convergence is the tendency for different technologies, media, content, services and applications to become more similar with time. In other words, digital convergence refers to the convergence of four industries into one conglomerate, that is, information technologies, telecommunication, consumer electronics and entertainment. It is a long-term trend that has several elements: Technology With the span of time, technologies which are viewed to be very different, develop features which are similar and hence the differences are blurred. In 1995, a television and a mobile phone were completely different devices. In recent years, they may have similar features such as the ability to connect to Wi-Fi, play rich internet-based media and run apps. People may use either their television or phone to play a game or communicate with relatives, using the same software. Media & Content Television and internet services were once viewed as separate services, but have begun to come together. It is likely that music, movies, video games and informational content will eventually converge to the point that they are no longer distinct formats. For example, future music may always come with an interactive music video that resembles a game. Likewise, movies are likely to become interactive with time to the point that they also resemble games. Services & Applications In the late 1990s, there was a large difference between business and consumer software and services. With time, this difference has blurred. Technology tends to move from a large number of highly specific tools towards a small set of flexible tools with broad applications. Robots & Machines It is increasingly common for machines such as vehicles or appliances to have semi-autonomous features that technically make them robots. Virtual reality Virtual reality can be viewed as the convergence of real life with digital entities such as games and information environments. DIGITAL CONVERGENCE Digital Convergence is the tendency for different technologies, media, content, services and applications to become more similar with time. In other words, digital convergence refers to the convergence of four industries into one conglomerate, that is, information technologies, telecommunication, consumer electronics and entertainment. It is a long-term trend that has several elements: Technology

With the span of time, technologies which are viewed to be very different, develop features which are similar and hence the differences are blurred. In 1995, a television and a mobile phone were completely different devices. In recent years, they may have similar features such as the ability to connect to Wi-Fi, play rich internet-based media and run apps. People may use either their television or phone to play a game or communicate with relatives, using the same software. Media & Content Television and internet services were once viewed as separate services, but have begun to come together. It is likely that music, movies, video games and informational content will eventually converge to the point that they are no longer distinct formats. For example, future music may always come with an interactive music video that resembles a game. Likewise, movies are likely to become interactive with time to the point that they also resemble games. Services & Applications In the late 1990s, there was a large difference between business and consumer software and services. With time, this difference has blurred. Technology tends to move from a large number of highly specific tools towards a small set of flexible tools with broad applications. Robots & Machines It is increasingly common for machines such as vehicles or appliances to have semi-autonomous features that technically make them robots. Virtual reality Virtual reality can be viewed as the convergence of real life with digital entities such as games and information environments. 7. Important Services of Internet E-mail (Electronic Mail) • It is a method of exchanging digital, messages 'from one person to another. It Isla part of the standard TCP/IP set of protocols. P-Commerce • Place commerce is specialized form of mobile commerce that uses mobile internet access, Global Positioning System (G IS) information and Bluetooth to assist and enhance the retail shopping experience of customer based on their location and individual shopping behavior. Video Conferencing or Videotele Conference • This is a system that allows us to conduct meeting or trainings at different places simultaneously. It incorporates audio and video so that we could talk and send data. Important Terms

File Transfer Protocol (FTP) • It is a standard network protocol used to transfer files from one host to another host over a TCP based network, such as the internet. World Wide Web (WWW) • The web was developed in 1989. People use the terms internet and World Wide Web or just the web interchangeably but the two terms are not synonymous. Telnet • It is a network protocol that allows one to connect to remote computers over a TCP/IP network (such as the Internet). Usenet • It is a world-wide distributed discussion system. It consists a set of newsgroups with names that are classified hierarchically by subject.. • The very first tool used for searching on the internet was Archie.

Social Networking Sites • A social networking service is an online service, platform or site that focuses on facilitating the building of social networks or social relations among people who, share. interests, activities, backgrounds or real-life-connections. Some social networking sites are as follows: • Facebook It is a social networking service launched in February 2004, owned and operated by facebook incorporation. Facebook was established by the Mark Zuckerberg. • Linkedin It is a social networking website for people in professional occupations. • Myspace It is a social networking that allows its users to create WebPages to interact with other users. • Twitter It is an online social networking service and micro blogging service that enables its User to send and read text based message of upto 140 characters known as tweets. • Tumbler It is a micro blogging platform and, social networking website founded by David Karp. Most Popular Social Media Sites 1. Facebook • Facebook is one of the most recognizable social media platforms in the world. • With 2.7 billion monthly active users, more than a third of the world’s population uses Facebook. • Founded on February 4, 2004 • Facebook has consistently evolved through the years to fit the needs of its users and attract new ones. This includes the acquisition of Instagram and WhatsApp.

2. Twitter • Twitter a microblogging site that just included text posts of up to 140 characters. • launch in 2006, it has raised that character limit and now lets a user share other media like photos and videos. • With about 330 million monthly active users

3. LinkedIn • LinkedIn is the most popular social media site for professional networking. • The platform has over 700 million registered users, with about 300 million active each month. Launched in 2003 • LinkedIn allows a user to add their resumes, connect with others in their industry, and even post and respond to job listings. • In a marketing sense, LinkedIn is often especially useful for B2B businesses. • It even offers paid ads and content publishing options.

4. YouTube • YouTube isn’t just the most popular video-sharing website in the world. • It’s also the second most popular search engine behind Google. • The company was founded in 2005

• Eventually bought by Google. • YouTube has over 2 billion logged-in visitors per month. • The site also provides analytics, facilitates interaction between users, and lets you embed videos in other websites.

5. Pinterest • Pinterest is one part social media site, one part search engine. It consists of digital bulletin boards where a user can save products, project ideas, and inspirational images. • Pinterest launched in 2010 and has since amassed more than 400 million monthly active users.

6. Instagram • Instagram is another social media channel with a heavy emphasis on visuals. • The site launched in 2010 and was later purchased by Facebook. • It has more than 1 billion monthly active users and is mainly a mobile platform. • Like Facebook, Instagram offers targeted advertising options to help business users reach a specific user. • Instagram also offers various posting options, including photos, videos, slideshows, stories, and live streams.

7. Tumblr • Tumblr is a blogging platform that allows several different post formats. • You can include quotes, chats, videos, photos, and even audio content. • Launched in 2007 and is now owned by Automattic.

8. Flickr • Flickr is a popular platform for sharing photos and videos. • Launched in 2004, the site was purchased by Yahoo in 2005 and is now owned by SmugMug. • It’s especially popular for photographers or businesses that want to see their images shared around the web. • You can also use it to find royalty-free images for use in content.

9. Reddit • Reddit is a social news and entertainment website with tons of sub-communities dedicated to specific interests. • A registered user can submit content and comment on threads to interact with other users. • Launched in 2005

10. Snapchat • Snapchat is a mobile messaging social media platform. A user can share one-time content with friends or post stories that go out to all that users followers. • Released in 2011 • The app quickly became popular, especially with young consumers.

11. WhatsApp • WhatsApp is a popular mobile messaging app. You can use it to send images, texts, documents, audio, and video content to another user individually or in groups. • Launched in 2010, the company is now owned by Facebook along with Instagram. • WhatsApp now has more than 2 billion monthly active users. Small businesses can use the app to easily communicate with customers and prospects on a personal level.

12. Quora • Quora allows users to ask questions and share answers on a variety of topics. • Originally launched in 2009, it now has more than 300 million monthly users.

13. TikTok • TikTok app lets a user create short, creative videos.

14. Vimeo • Vimeo is a professional video platform. Though not as widely used as YouTube, it offers quality features perfect for videographers and those who want to share cinematic content.

15. Medium • Medium is a platform for creating and sharing long-form content. • Twitter co-founder Evan Williams founded Medium in 2012.

16. WeChat • WeChat is a multi-purpose mobile messaging app. People can send text messages, voice calls, video content, and even make payments. • There are group and individual chat options. And there are about 1 billion monthly active users around the world. • WeChat offers official business accounts. As a result, brands can use the service to easily facilitate communication with customers and send out messages as part of a social media campaign.

MPPSCADDA

7. E-COMMERCE E-Commerce • E-Commerce or Electronic Commerce is defined as the buying and selling of goods and services including digital products over digital and electronic networks. • E-commerce employs computers in different areas of commerce such as marketing, customer visit, product browsing, shopping basket checkout, tax and shopping, receipt and process order

E Business • E-business offers services pertaining to processing transactions, documentation, presentations, financial analysis, home based services, inventory management and gathering product information using CCT. • All leading banks, including the State Bank of India provide Internet banking facility. With this facility one can check account balance and perform bank transactions from anywhere. • We can see account details, pay a bill and print account statement online. • Also, the bank provides SMS alert service, so that, whenever bank transaction takes place, an SMS is sent by the bank to our mobile phones.

Different types of e-commerce models

There are a total of 4 types of e-commerce models. These include:

• Business to Business (B2B) • Business to Consumer • Consumer to Consumer (C2C) • Consumer to Business

Business to Business (B2B) • The selling of products between the manufacturer, retailers and wholesalers is called the B2B model of e-commerce. Here the customer is not involved in the transfer of products or goods

Business to Consumer • This is the generally used online portals where the e-commerce company sells directly to the consumer

Consumer to Consumer (C2C) • The best example of this is OLX, where consumer can upload their old products and resale them directly to the buyer. There is no interference of the manufacturers or retailers

Consumer to Business • When a person designs or creates something new, they can sell it to the e-commerce company for further sales. This is called the Consumer to Business model

What are the benefits of E-Commerce? E-Commerce has benefitted both the consumer and the seller/manufacturer equally. • Less Start-up cost for the seller • 24×7 online access to shop and order • Goods can be delivered Nationally and Internationally • One does not need to be physically present at the store to shop • Easy Access to e-commerce websites and application

How does e-commerce works?

• The E-commerce companies create websites and applications where all the available products and goods are uploaded. • A consumer can scroll through the products, choose the ones

E-Commerce in India • As in 2019, India has an internet user base of about 40% of the total Indian population, especially with regard to e-commerce. • E-commerce in India has been budding since 2009 and many major e-commerce companies have grown their businesses in India.

There are typically two patterns in which e-commerce works in India:

1. Multi-product E-Commerce – The portals which sell multiple products on the same website or application are Multi-product E-Commerce companies. This includes Amazon, Flipkart, Snapdeal, where garments, furniture, books, stationery, etc. are all available at a single platform 2. Single Product E-Commerce – Under this, the companies which sell only a single type of product online are called Single-Product E-commerce companies. This includes portals like Makemytrip which enables all kinds of tourism-related services, similarly specific e-commerce companies for eyewear, furniture, gadgets, automobiles, etc.

Government Initiatives Regarding E-Commerce in India In February 2019, a draft National e-Commerce policy has been prepared and placed in the public domain, which addresses six broad issues of the e-commerce ecosystem viz. e-commerce marketplaces; regulatory issues; infrastructure development; data; stimulating domestic digital economy and export promotion through e-commerce. • The Department of Commerce initiated an exercise and established a Think Tank on ‘Framework for National Policy on e-Commerce’ and a Task Force under it to deliberate on the challenges confronting India in the arena of the digital economy and electronic commerce (e-commerce). • Propelled by rising smartphone penetration, launch of 4G network and increasing consumer wealth, the Indian E-commerce market is expected to grow to US$ 200 billion by 2026 from US$ 38.5 billion in 2017. •

Top E commerce Sites in India 1. Amazon India • Founded in the US in 1994 • Amazon started as an online bookstore that later diversified to products including media, electronics, apparel, furniture, food, toys, and jewelry. Having expanded to many countries, including India.

2. Flipkart • Flipkart is the national leader of e-commerce in India. • Founded in 2007, Flipkart was initially selling books, before it expanded to other popular categories including mobile phones, electronics, fashion, and lifestyle products. • In 2018, Walmart, one of the largest American companies and leading platforms of e- commerce in the US, acquired 77% of Flipkart for 16 Billion US $.

3. IndiaMart • Founded in 1999, IndiaMart is an online B2B marketplace for Indian companies. • A competitor of Alibaba, IndiaMart allows manufacturers, suppliers, and exporters to propose their products directly through the platform to get contacted by its visitors. • Since 2014, IndiaMart has launched its e-commerce retail platform, Tolexo.

4. Myntra • Myntra is a specialized online fashion, home and lifestyle retailer in India. • Launched in 2007, Myntra has developed a strong online presence, especially through its mobile applications. • Acquired by the Indian e-commerce company Flipkart in 2014, Myntra has consolidated its presence in fashion e-commerce through the acquisition of its competitor Jabong.com.

5. Snapdeal • Snapdeal is a diversified online shopping platform, offering products ranging from electronics and fashion to home and appliances. • Founded in 2010, Snapdeal has received several rounds of funding from famous investors, including Alibaba Group, Foxconn, and SoftBank, to fuel its growth and compete for the top spots in India’s e-commerce landscape.

6. Firstcry • A specialized e-commerce platform for baby care products, kids’ clothes, and toys, Firscry is a pioneer of e-commerce in India offering products from thousands of brands. • Having expanded into franchised stores, Firstcry now also offers its products through tens of stores across numerous Indian cities.

7. 1mg • 1mg is an online pharmacy and healthcare information website.

• Founded in 2015, 1mg provides online consultations, lab tests and a mine of medical information in order to better serve the Indian market and population’s need, and be able to direct its visitors to the right medicine or product from its shop.

8. BookMyShow • BookMyShow is the leading show ticketing portal and retailer in India. • Since its launch in 2007, BookMyShow has expanded to sell millions of tickets every month for movies, sports events, plays, and more. • With the company’s success, BookMyShow has also expanded to other, opening subsidiaries in Indonesia, the United Arab Emirates, Sri Lanka, and West Indies.

9. Nykaa • Nykaa is a beauty retailer selling cosmetics, clothes and wellness products to Indian customers. • Founded in 2012, Nykaa is originally a specialized store for beauty e-commerce selling products from multiple brands. Since then Nykaa has developed its own line of cosmetics and opened multiple brick-and-mortar stores across India.

10. 2GUD • 2GUD is originally an e-commerce shop dedicated to refurbished goods, offering a wide range of mobile phones and electronics that have already been used and restored to original condition. • Launched in 2018 by Flipkart which was later acquired the American retail giant Walmart, 2GUD has now extended to more categories including lifestyle, fashion, and home decoration to compete against other online platforms.

E Commerce Sites and Acquisition

Date Merger/Acquisition Companies Involved

May 2014 Acquisition Flipkart acquires Myntra

March 2015 Acquisition Snapdeal acquires Unicommerce

April 2015 Acquisition Snapdeal acquires FreeCharge

April 2016 Acquisition Flipkart acquires PhonePe

June 2016 Acquisition Myntra (owned by Flipkart) acquires Jabong

July 2017 Acquisition Axis Bank acquires FreeCharge

May 2018 Acquisition Walmart acquires Flipkart

January 2020 Acquisition Zomato acquires Uber Eats

Notes