Mp History, Art & Culture
Total Page:16
File Type:pdf, Size:1020Kb
MPPSCADDA INFROMATION AND COMMUNICATION TECHNOLOGY CONTENTS ❖ Chapter 1 BASIC COMPUTER AND IT TERMS ❖ Chapter 2 COMPUTERS AND INFORMATION TECHNOLOGY ❖ Chapter 3 COMMUNICATION AND MOBILE TECHNOLOGIES ❖ Chapter 4 ROBOTICS, ARTIFICIAL INTELLIGENCE and CYBER SECURITY ❖ Chapter 5 E-GOVERNANCE ❖ Chapter 6 INTERNET AND SOCIAL NETWORKING SITES ❖ Chapter 7 E-COMMERCE MPPSCADDA 1. BASIC COMPUTER AND IT TERMS INTRODUCTION There are three different types of computers and computer applications that we encounter in daily life. • One, those machines which are dedicated to a limited set of tasks. Familiar domestic appliances like washing machines or microwave oven are operated by an electronic device embedded inside these gadgets. • Two, those that are used for specific and limited number of activities, like playing games and other forms of entertainment. • Third category includes versatile machines capable of doing a multitude of tasks, including surfing the Internet. • In our day-to-day life, we use various electrical and electronic devices such as computers, digital watches, audio systems, CD and DVD players, washing machines and so on. • Outside home we use lifts, metro trains, coin collection systems in public telephone booths, coffee and tea vending machines and so on. These are mostly computer controlled devices. We do not see the ‘computers’; they are embedded inside these devices. • Computers have brought in changes in art and music, photography and animation, editing and publishing. • Digital home theatre systems, DVD players, digital music devices of which the computer forms an integral part, makes entertainment low cost and of high quality. • The Internet has emerged as a convenient means of global communication, information sharing and services. The commonest mode of the Internet use includes e-mail, chat, surfing information, banking, reservations and many more. A huge network of millions of computer networks constitutes the Internet. These networks are connected by telephones, underwater cables and satellites. Information Technology • Information Technology (IT) is a generic term that covers the acquisition, processing, storage and dissemination of information. • It involves the application of computers and communication technology in the task of information handling, information and information flow from the generation to the utilization levels. • It is restricted to systems dependent on microelectronics-based combination of computers and telecommunication technologies. • The IT is the boon for mankind. It gives accessibility to information at fingertips. BASIC Computer and Information Technology Terms Adware • It is a software package that automatically renders advertisements to generate revenue for its author. Android • It is a Linux based operating system designed primarily for touchscreen mobile devices such as smartphones and tablets computers. Algorithm • It is a step by step method of solving a problem. It is commonly used for data processing, calculation, and other related computer and mathematical operations. Antivirus Software • It consists of computer programs that attempt to identify threatsand eliminate computer viruses and other malicious software (Malware). Artificial Intelligence (AI) • Artificial Intelligence (AI) is the ability of a machine or a computer program to think and learn. The concept of AI is based on the idea of building machines capable of thinking, acting, and learning like humans Augmented Reality • The word augment means to add or enhance something. In the case of Augmented Reality (also called AR), graphics, sounds, and touch feedback are added into our natural world to create an enhanced user experience. • An enhanced version of reality where live direct or indirect views of physical real-world environments are augmented with superimposed computer-generated images over a user’s view of the realworld, thus enhancing one’s current perception of reality. API • API is the acronym for Application Programming Interface, which are software intermediary that allows two applications to talk to each other Big Data • It is a phrase used to mean a massive volume of both structured and unstructured data that is so large that it is difficult to process using traditional database and software techniques. In most enterprise scenarios the volume of data is too big or it moves too fast or it exceeds current processing capacity. Bandwidth • The maximum amount of data that can travel in a communication path in a given time, measured in bits per second (bps). Bar Code • It is a machine-readable representation of information in a visual format on a surface. The first bar code system was developed by Norman Joseph Woodland and Bernard Silver in 1952. Blog • It is a discussion or informational site published on the World Wide Web. Bluetooth • A protocol that permits a wireless exchange of information between computers, cell phones, and other electronic devices within a radius of about 30 feet. Cloud Computing • Cloud computing means storing and accessing data and programs over the Internet instead of your computer’s hard drive. The cloud is just a metaphor for the Internet. • Cloud computing is not about is your hard drive. When you store data on or run programs from the hard drive, that’s called local storage and computing. Everything you need is physically close to you, which means accessing your data is fast and easy, for that one computer, or others on the local network. • Working off your hard drive is how the computer industry functioned for decades. It is still superior to cloud computing Common Cloud Examples Microsoft offers a set of Web-based apps, Office Online, Onedrive, Google drive that are Internet-only versions your Web browser without installing anything. Cookie • A packet of information that travels between a browser and the webserver. Cryptograph • The pre-fix “crypt” means “hidden” or “vault” and the suffix “graphy” stands for “writing”. Cryptography is a method of protecting information and communications through the use of codes so that only those for whom the information is intended can read and process it. • It includes techniques such as microdots, merging words with images, and other ways to hide information in storage or transit. Data mining • It is defined as a process used to extract (mining) usable data from a larger set of any raw data. It implies analysing data patterns in large batches of data using one or more software. Data mining has applications in multiple fields, like science and research, business. Digital locker • It is an online media storage service. Files stored include music, videos, movies, games, and other media. Most digital locker services require a user to register to avail of the service. DigiLocker • DigiLocker is a “digital locker” service by the Government to enable citizens to store documents on a cloud. Itreduces need to carry physical documents. • It part of the government’s Digital India initiative • 1 GB of storage space is offered to users to store identifi cation card issued by government agencies, education certifi cates, PAN cards, driving license, vehicle ownership documents and some other documents. Digital Signature • A digital signature is a mathematical technique used to validate the authenticity and integrity of a message, software or digital document. • The digital equivalent of a handwritten signature or stamped seal, a digital signature offers far more inherent security, and it is intended to solve the problem of tampering and impersonation in digital communications. Digital Divide • It refers to the difference between people who have easy access to the Internet and those who do not. A lack of access is believed to be a disadvantage to those on the disadvantaged side of the digital divide because of the huge knowledge base that can only be found online. Digital divide can exist between those living in rural areas and those in urban areas, between educated & uneducated, between economic classes, and on a global scale between more and less industrially developed nations Debugging • It is a methodical process of finding and reducing the number of bugs, or defects, in a computer program or a piece of electronic hardware, thus making it behave as expected. Encryption • In cryptography, encryption is the process of encoding messages (or information) in such a way that hackers cannot read it, but authorised users can access it. E governance • E governance:application of Information and Communications Technology to the processes of Government functioning in order to bring about ‘Simple, Moral, Accountable, Responsive and Transparent’ governance Graphic Interchange Format (GIF) • A simple file format for pictures and photographs that are compressed so they can be sent quickly. JPEG • It is a commonly used method of lossy compression for digital photography. The term ‘JPEG’ is an acronym for the Joint Photographic Experts Groups. HyperText Transfer Protocol (HTTP) • It is an important protocol used on the World Wide Web for moving hypertext files across the internet. It requires an HTTP client program on one end and HTTP server program on the other end. Internet • The Internet (also known simply as the net is the worldwide, publicly accessible system ofi nterconnected computer networks that transmit data by nacket switching using the standard Internet of Things (IOT) • The Internet of Things (IoT) is a system of interrelated computing devices, mechanical and digital machines, objects, animals or people that are provided with unique identifiers and