Class 12 Computer Notes by Binod Rijal
Class 12 Computer Notes by Binod Rijal
Information System
An information system is a computer based system which is an integrated set of
different components for collection, process, storage and transmission of data.
Simply, it us a system which processes supplied/collected data and generates
information that can be used for decision making at different levels for the betterment
of an organization. The types of information system are:
1. Transaction processing system: it processes data resulting from business
transactions, updates operational database such as sales and inventory
processing and accounting systems.
2. Management information system: it is the integrated modern approach of
management, information and computerized system. It provides information to
support the operations, management, decision making functions of an
organization.
3. Decision support system: It is the information system at the organization's
senior level management that combines data and sophisticated analytical
models or data analysis tools to support semi-structures and unstructured
decision makings.
To get Notes for School/College, Loksewa, and Banking Subscribe Binod Rijal On YouTube
System Analyst
System analyst is a people who is involved in analyzing, designing, implementing
and evaluating computer based information to support the decision making and
operation of an organization.
The roles of system analyst area as follows:
1. Change event
2. Investigator and event
3. Architect
4. Psychologist
5. Motivator
6. Defining and prioritizing the requirements
7. Analysis and evaluation
8. Designing system
The characteristics of system analyst are as follows:
1. Knowledge of organizations
2. Knowledge of computer system
3. Good inter-personal relation
4. Communication skills
5. Analytical skill
6. Breadth of knowledge
Waterfall model
it is a oldest type of model for software engineering. The fundamental processes of
waterfall model are as follows:
1. Requirements analysis and definition: it is the first stage of waterfall model. In
this stage, the developer should identify the actual requirements of the given
problem.
2. System design: in this stage the systems design process partition the
requirements to either hardware or software systems.
3. Implementation and unit system: During this stage, the system design is
realized and tested as a complete system to ensure that the software
requirements have been met.
To get Notes for School/College, Loksewa, and Banking Subscribe Binod Rijal On YouTube
4. Operation and maintenance: in this stage, the system is installed to the desire
location. The maintenance involves correcting errors which were not
discovered in earlier stages of the life cycle, improving the implementation of
system units and enhancing the system's service as new requirements are
discovered.
Prototyping model
It is the iterative process of system development which is more appropriate for
developing new system where there is no clear idea of requirements, inputs and
outputs.
1. Identify the user needs: the system analyst interviews the user to obtain an
idea of what is required from the system.
2. Develop a prototype: the system analyst, working uses one or more
prototyping tools to develop a prototype.
3. Determine if prototype is acceptable: the analyst educates the user in
prototype use and provides an opportunity from becoming familiar with the
system.
4. Use the prototype: the prototype becomes the operational system.
Spiral system
In this model, process is represented as a spiral rather than as a sequence of
activities with backtracking.
1. Planning: the project is reviewed and a decision made whether to continue
with a further loop of the spiral. If it is decided to continue, plans are drawn up
for the next phase of the project.
2. Risk analysis: for each of the identified project risks, a detailed analysis is
carried out. Steps are taken to reduce the risk. For example, if there is a risk
that the requirements are inappropriate, a prototype system may be
developed.
3. Software development: after risk evaluation, a development model for the
system is chosen.
4. User evaluation: specific objectives for the phase of the project are defined by
the evaluation of users. Constraints on the process and the product are
identified. And a detailed management plan is drawn up.
Prototyping
It is the iterative process of system development which is more appropriate for
developing new system where there is no clear idea of requirements, inputs and
outputs.
To get Notes for School/College, Loksewa, and Banking Subscribe Binod Rijal On YouTube
Advantages of Prototyping
1. Communications between the systems analyst and user are improved.
2. The expert system can do a better job of determining the user's needs.
3. The user plays a more active role in system development.
4. The expert and the user spend less time and effort in developing the system.
5. Implementation is much easier because the user knows what to expect.
6. A system is developed through operational prototyping is capable of easy
adaptation.
Disadvantages of Prototyping
1. Because of the iterative nature of prototyping, there is no definite deliverable
or competition deadline.
2. Code inefficiencies may be a drawback in terms of functionality.
3. The computer-human interface provided by certain prototyping tools may not
reflect good design techniques.
SDLC
SDLC consists of a set of development activities that have a prescribed order. It is
the development of software in chronological order.
The different phases of SDLC are as follows:
1. System study: A system is intended to meet the needs of an organization.
Thus the first step in the design is to specify these needs or requirements.
The top manager of the organization takes the basic decision to use a
computer based (information) system for managing the organization.
2. System analysis: system analysis is the dissection of a system into its
component pieces to study how those component pieces interact and work.
System analysis is a term that collectively describes the early phases of
development. It is defined as those phases and activities that focus on the
business problem, independent of technology.
3. Feasibility study: feasibility study is the most important activity in the system
analysis phase. It analyses the proposed system from different aspects so
that it makes us clear that how practical or beneficial the system will be to the
organization. So it tells us whether the system is feasible to design nor not.
4. System design: the next step is to develop the logical design of the system.
During this phase, the logic of the system, namely, the information
requirement of users, and use this to find the necessary database.
5. System development: after designing a logical diagram of a system then next
step is to convert into program. This process is called system development.
Flowchart, algorithm, Pseudocode, etc. are the outlines the procedures for
taking the input data and processing it into usable output.
To get Notes for School/College, Loksewa, and Banking Subscribe Binod Rijal On YouTube
Feasibility study
Feasibility study is the most important activity in the system analysis phase. It
analyses the proposed system from different aspects so that it makes us clear that
how practical or beneficial the system will be to the organization. So it tells us
whether the system is feasible to design nor not. Thus it is necessary before system
design.
The different levels of feasibility study are as:
1. Economical feasibility: it concerns with cost effectiveness of the system. The
main objective of economical feasibility is to calculate approximate cost-both
the development cost and the operational cost and the benefits from the
system.
2. Technical feasibility: it concerns with the availability of the hardware, software
and the support equipments for the complete development of the system.
3. Operational feasibility: it concerns with smooth operation of the system. It is
all about the problems that may occur during operation of the system after its
development.
4. Behavior feasibility: it concerns with behavior of the users and the society
towards the new system. Generally, most of the traditional employees are not
easily ready to upgrade them with the new system.
5. Schedule feasibility: it is the process of splitting project into tasks and
estimate time and resources required to complete each task. It determines the
deadline to complete a system and schedule the task accordingly.
6. Legal feasibility: it concerns with legal issue of the system. If the system is
illegal then the system designing is meaningless. Everything is measured
whether it is legal or illegal. It considers copyright law, foreign law, foreign
trade, tax, etc.
System testing
To get Notes for School/College, Loksewa, and Banking Subscribe Binod Rijal On YouTube
Flowchart
System flowchart describes the internal architecture of a system that describes how
data are moved inside the internal components of a system. Program flowchart
describes to solve the application types of real world problem. The different symbols
used in system flowchart are defined below:
DFD
DFD is the logical diagram to describe the flow of data inside the components of
system. It is easier to understand or grasp when being explained and most important
to all, it is much more precise and less ambiguous than a narrative one. The main
components are: process, data store, data flow, external entities.
To get Notes for School/College, Loksewa, and Banking Subscribe Binod Rijal On YouTube
ER diagram
The E-R diagram is an overall logical structure of a database that can be expressed
graphically. It was developed to facilitated database design and the simplicity and
pictorial clarity of this diagramming technique have done great help in the designing
part of database. The main components are attributes, entities and relationship.
Case diagram
computer aided software engineering tool is automatic computer based program that
helps for software engineering and SDLC process. It us very fast and effective tools
for the development of big scale software. It helps in analysis, design,
implementation, testing and maintenance.
UML
Unified Modelling Language is a standardized general purpose modelling language
in the field of object-oriented software engineering. The standard is managed, and
was created by, the object management group. UML includes a set of graphic
notation techniques to create visual models of object-oriented software.
System flowchart
System flowchart describes the internal architecture of a system that describes how
data are moved inside the internal components of a system. Program flowchart
describes to solve the application types of real world problem.
To get Notes for School/College, Loksewa, and Banking Subscribe Binod Rijal On YouTube
Database
Relational Database Management System (RDBMS)
The database system which stores and displays data in tabular format of rows and
columns, like spreadsheet, is known as Relational Database Management System.
Advantages of database
1. Sharing data
2. Reduced data redundancy
3. Data backup and recovery
4. Inconsistency avoided
5. Data integrity
6. Data security
7. Data independence
8. Multiple user interfaces
9. Process complex query
Data and information: Data is defined as the raw facts and figures. It could be any
numbers, alphabets or any combination of it.
When data are processed using a database program or software, they are converted
to the meaningful result, called information.
To get Notes for School/College, Loksewa, and Banking Subscribe Binod Rijal On YouTube
Field and record: A column in a table is called field and it contains specific piece of
information within a record.
A row in a table is called record and it contains information about person, event, etc.
Another name of record is tuple.
Data dictionary: A data dictionary is a file which contains meta-data that is data
about data. It also called information system catalogue. It keeps all the data
information about the database system such as location, size of the database,
tables, records, fields, user information, recovery system, etc.
DDL: DDL is used by the database designers and programmers to specify the
content and structure of the table. It is used to define the physical characteristics of
records. It includes commands that manipulate the structure of objects such as
views, tables, and indexes, etc.
DML: DML is related with manipulation of records such as retrieval, sorting, display
and deletion of records of data. It helps user to use query and display reports of the
table. So it provides technique for processing the database.
Primary key: the field or fields that contain the unique value can be set as primary
key. It does not permit duplicate or null values.
3. Ring topology: In a ring network, every device has exactly two neighbors for
communication purposes. All messages travel through a ring in the same
direction (either "clockwise" or "counterclockwise"). A failure in any cable or
device breaks the loop and can take down the entire network.
4. Mesh topology: Mesh topologies involve the concept of routes. Unlike each of
the previous topologies, messages sent on a mesh network can take any of
several possible paths from source to destination. (Recall that even in a ring,
although two cable paths exist, messages can only travel in one direction.)
Some WANs, most notably the Internet, employ mesh routing.
5. Tree topology: Tree topologies integrate multiple star topologies together onto
a bus. In its simplest form, only hub devices connect directly to the tree bus,
and each hub functions as the root of a tree of devices. This bus/star hybrid
approach supports future expandability of the network much better than a bus
(limited in the number of devices due to the broadcast traffic it generates) or a
star (limited by the number of hub connection points) alone.
6. Hybrid topology: if two or more topologies are combined together then it is
called hybrid topology. So it is very difficult to design and to implement the
hybrid topology. It is expensive too.
Network architecture
Network architecture refers to the various services provided by the network and it
also deals with how data is transmitted from one computer to others.
Client server network: The client/server topology is the model for vertical scaling,
where clients typically host a small subset of the data in the application process
space and delegate to the server system for the rest. Compared to peer-to-peer by
itself, the client/server architecture provides better data isolation, high fetch
performance, and more scalability. If you expect data distribution to put a very heavy
load on the network, client/server architecture usually gives better performance. In
any client/server installation, the server system is itself a peer-to-peer system, with
data distributed between servers. Client systems have a connection pool, which it
uses to communicate with servers and other Gem Fire members. A client may also
contain a local cache.
Peer-peer network: The peer-to-peer distributed system is the building block for all
Gem Fire installations. Peer-to-peer alone is the simplest topology. Each cache
instance, or member, directly communicates with each every other member in the
distributed system. This cache configuration is primarily designed for applications
that want to embed a cache within the application process space and participate in a
cluster. A typical application example would be an application server cluster where
the application and the cache are co-located and share the same heap.
Signal modulation
In electronics and telecommunications, modulation is the process of varying one or
more properties of a periodic waveform, called the carrier signal (high frequency
signal), with a modulating signal that typically contains information to be transmitted.
Three forms of modulations are possible. They are as:
1. Amplitude Modulation (AM): Amplitude modulation is an increase or
decrease of the carrier voltage (Ec), will all other factors remaining constant.
2. Frequency Modulation (FM): Frequency modulation is a change in the
carrier frequency (fc) with all other factors remaining constant.
3. Phase Modulation (PM): Phase modulation is a change in the carrier phase
angle (θ). The phase angle cannot change without also affecting a change in
frequency. Therefore, phase modulation is in reality a second form of
frequency modulation.
To get Notes for School/College, Loksewa, and Banking Subscribe Binod Rijal On YouTube
Transmission media
A transmission media is defined as the means of communication between two
networking devices that helps to transfer data from sender to receiver and vice
versa.
Transmission media is broadly classified into two groups.
1. Wired or Guided Media or Bound Transmission Media: Bound transmission
media are the cables that are tangible or have physical existence and are
limited by the physical geography. Popular bound transmission media in use
are twisted pair cable, co-axial cable and fiber optical cable. Each of them has
its own characteristics like transmission speed, effect of noise, physical
appearance, cost etc.
2. Wireless or Unguided Media or Unbound Transmission Media: Unbound
transmission media are the ways of transmitting data without using any
cables. These media are not bounded by physical geography. This type of
transmission is called Wireless communication. Nowadays wireless
communication is becoming popular. Wireless LANs are being installed in
office and college campuses. This transmission uses Microwave, Radio wave,
Infra red are some of popular unbound transmission media.
Switching system
It provides a path between the two devices in a network. The process of transferring
data blocks from one node to another node is called data switching.
Types of switching system are as follows:
1. Circuit switching: It is the most familiar technique used to build a
communication network. Used in ordinary telephone lines and it allows
communications equipment and circuits to be shared among users. Each user
has the sole access to a circuit during network use.
2. Message switching: Message switching is a network switching technique in
which data is routed in its entirety from the source node to the destination
node, one hope at a time. During message routing, every intermediate switch
in the network stores the whole message. If the entire network's resources are
engaged or the network becomes blocked, the message-switched network
stores and delays the message until ample resources become available for
effective transmission of the message.
3. Packet switching: A network technology that breaks up a message into small
packets for transmission, unlike circuit switching, which requires the
establishment of a dedicated point to point connections each packet in a
packed switched network contains a destination address. Thus all packets in
a single message do not have to follow the same path. Packet can arrive out
of order. Destination computer reassembles the packets into their proper
sequence.
MAC address: Stands for "Media Access Control Address," and no, it is not related
Apple Macintosh computers. A MAC address is a hardware identification number
that uniquely identifies each device on a network. The MAC address is manufactured
into every network card, such as an Ethernet card or Wi-Fi card, and therefore
cannot be changed.
Repeater: Network repeaters regenerate incoming electrical, wireless or optical
signals. With physical media like Ethernet or Wi-Fi, data transmissions can only span
a limited distance before the quality of the signal degrades. Repeaters attempt to
preserve signal integrity and extend the distance over which data can safely travel.
Bridge: In telecommunication networks, a bridge is a product that connects a local
area network (LAN) to another local area network that uses the same protocol (for
example, Ethernet or token ring). You can envision a bridge as being a device that
decides whether a message from you to someone else is going to the local area
network in your building or to someone on the local area network in the building
across the street. A bridge examines each message on a LAN, "passing" those
known to be within the same LAN, and forwarding those known to be on the other
interconnected LAN (or LANs).
Protocol: A standard set of regulations and requirements that allow two electronic
items to connect to and exchange information with one another. Protocols regulate
data transmission among devices as well as within a network of linked devices
through both error control and specifying which data compression method to use. In
particular, protocols decide: the method of error checking, how to compact data (if
required), how the transmitting device signals that it has concluded sending data,
and how the receiving device signals that it has completed receiving data.
Wi-Fi: Wi-Fi is the name of a popular wireless networking technology that uses radio
waves to provide wireless high-speed Internet and network connections. A common
misconception is that the term Wi-Fi is short for "wireless fidelity," however this is not
the case. Wi-Fi is simply a trademarked phrase that means IEEE 802.11x.
To get Notes for School/College, Loksewa, and Banking Subscribe Binod Rijal On YouTube
Characteristics of OOP
Emphasis is on data rather than procedure.
Programs are divided into objects.
Data structures are designed such that they characterize the objects.
Functions that separate on the data of an object are tied together in the data
structure.
Data is hidden and cannot be accessed by external functions.
Objects may communicate with each other through functions.
New data and functions can be easily added whenever necessary.
Bottom-up approach is followed in program design.
Advantages of OOP:
We can eliminate redundant codes by using inheritance feature of OOP.
It is very easy for managing complex and large size problems.
The most important is the reusability of codes by using the features inheritance.
It takes very less time for the development and maintaining the software.
It is efficient for testing and implementation of the system.
It follows bottom up approach.
It can be implemented in the field of OODBMS, OOAD and different fields of
engineering.
OOP has several disadvantages which made it unpopular in the early years.
Size: Object oriented programs are much larger than other programs. In the early
days of computing, space on hard drives, floppy drives and in memory was at a
premium. Today we do not have these restrictions.
Effort: Object oriented programs require a lot of work to create. Specifically, a great
deal of planning goes into an object oriented program well before a single piece of
code is ever written. Initially, this early effort was felt by many to be a waste of time.
In addition, because the programs were larger (see above) coders spent more time
actually writing the program.
Speed: Object oriented programs are slower than other programs, partially because
of their size. Other aspects of Object Oriented Programs also demand more system
resources, thus slowing the program down.
inheritance. The newly created class is called derived class or child class and the
class from which new class is derived is called base class or parent class. It permits
the expansion and reuse of existing code without rewriting it hence, the concept of
inheritance supports the concept of reusability.
The meaning of polymorphism is having many forms. It is an important feature of
OOP which refers to the ability of an object to take on different forms depending
upon situations. It simplifies coding and reduces the rework involved in modifying
and developing an application.
Object: An object is any entity, thing or organization that exits in real world. It
consists of two fundamentals characteristics: its attributes and behaviors. For
example: a dog is an object having attributes such as color, weight, age, etc. and
behaviors such as barking, wagging tail, etc. In OOP, attributes are represented by
data and behaviors are represented by functions.
Information Communication
Technology and Cyber Law
Term Ict and it's impacts on society
ICT is applied area of computer science, electronics, telecommunication, business
and of every fields that deal with processing, storing and transmitting information.
Positive impacts:
Education
Medicine
Banks
Business
Communication
Multimedia
Employment
Productivity
Ecommerce
Entertainment
Negative impacts:
Health problem
Piracy
Pornography
Computer viruses
Hacking
Privacy
Cost
Less employment
Loss of information
Digital socialization
Conceptualization:
Means of connectivity or how individuals and their associates are connecting and to
what like infrastructure, location, and network availability.
Intensity of connectivity, or how sophisticated are the usage like mere access,
retrieval, interactivity, innovative contributions.
Purpose of connectivity or why individuals and their associates are connecting like
the reasons why individuals are online and use the internet and ICT's.
Lack of connectivity which means that why individuals and their associates are not
connecting.
To get Notes for School/College, Loksewa, and Banking Subscribe Binod Rijal On YouTube
Cyber law
Cyber law is a type of law which rules in the internet to prevent internet related
crime.
posting offensive information are capable of criminal and civil sanctioning under the
new cyber law.
The government can punish cyber offenders with up to 5 years of imprisonment and
/or fine of up to Rs. 50,000. However, much depends on the harshness of the crime.
The law has tightened the security for banking transactions through electronics
means, which should boost the economic activities across the internet via Nepal.
It gives legal status to information posted on the websites of government offices,
government run corporations and local bodies.
It has also granted legal status to digital signatures sent through the electronic media
like e-banking, e-commerce, etc.
The law has also made a new judicial body to listen to complaints, cases and
matters concerning cyber crime.
Computer Crime
Computer crime has been defined broadly as a criminal act that has been committed
using a computer as the primary tool.
IT policies
The policies of IT are the action adopted for the implementation of strategies to
achieve goals and fulfill the objectives. Some of the policies of IT are as follows:
To declare information technology sectors a prioritized sector.
To provide internet facilities to all village development committees.
To render assistance to educational institutions and encourage native and foreign
training.
To computerize the records of each governmental office.
To increase the use of computers in the private sector.
To develop physical and virtual information technology park.
To use information-technology to promote e-commerce, e-education, e-health,
among others.
To establish National Information Technology Centre.
To establish a national level fund by mobilizing the resources.
To establish Nepal in the global market through the use of information technology.
To get Notes for School/College, Loksewa, and Banking Subscribe Binod Rijal On YouTube
Multimedia
Term multimedia
The term multimedia is simply a combination of multiple forms of media which
includes text, graphics, audio, video, animation, etc.
Components of multimedia
Text
Graphics or images
Audio
Video
Animation
Hypermedia
Artificial Intelligence
Artificial Intelligence (AI) and it's application areas
Artificial Intelligence (AI) is a branch of computer science which is concerned with
programs that solves and analyze problems intelligently.
components of AI
Search: this intelligence is used to search solution of particular problem like
possibilities of moves on chess playing game. Searching is very important and needs
to be very fast and must search with accuracy. So AI based system is useful for
particular problem oriented search easily.
Pattern recognization: it is used to recognize some type of figures, images or audio
sounds. Its application is used for the authentication like face detection, iris
detection, voice recognization, etc.
Logic generate: as the name suggest, AI is intelligence with creating logic in different
problems. Logic in terms of predicate basis or whatever, this system creates logic for
solving the any kind of related problems as per the AI related system and software.
Common sense and reasoning: the main goal of AI is to produce good reasoning
power and produce logic. This reasoning power and logic made machines like
human.
To get Notes for School/College, Loksewa, and Banking Subscribe Binod Rijal On YouTube
Learning from experience: AI programming is built to learn from the experiences like
human being. Although learning are limited with comparison to the human beings
and also depends on the programming language used.
Genetic programming: AI programs are used to solve relationship between humans.
As we see in genetically there is inheritance properties that can help the future
prediction.
Neural network: AI technique that mimics the operation of the human brain that
refers to nerves and neurons, and comprises of densely interconnected processors
working simultaneously that means parallel.
Ethical aspect of AI
AI can be used for good or bad. This is why it's important to think about what AI is,
and how we want it to be used.
Some ethical aspects of AI are:
AI builders have an obligation not to exploit people's ignorance and make them think.
AI is human.
Robots are not really your friends. They may be harmful for individuals. So
developers should be ethical. Use of AI must obey the social norms and values.
Use of AI should be under the intellectual property rights.
To get Notes for School/College, Loksewa, and Banking Subscribe Binod Rijal On YouTube
Contemporary Technology
e-Commerce and e-business
E-commerce refers to online transactions, buying and selling of goods and/or
services over the internet.
E-business covers online transactions, but also extends to all internets based
interactions with business partners, suppliers and customers.
Advantages of e-commerce:
a. It makes buying selling procedure faster, as well as easy to find products.
b. It makes buying/selling possible 24/7.
c. There are no theoretical geographical limitations hence more reach to customers.
d. It reduces operational costs and provides better quality of services.
e. It does not require physical company set ups.
f. It is easy to start and manage a business.
Disadvantages of e-commerce:
a. Any one, good or bad can easily start a business. And there are many bad sites
which eat up customer's money.
b. There is no guarantee of product quality.
c. Mechanical failures can cause unpredictable effects on the total processes.
d. As there is minimum chance of direct customer to company interactions, customer
loyalty is always on a check.
e. There are many hackers who look for opportunities and thus an ecommerce site,
service payment gateways all are always prone attack.
E-learning
E-learning is a new concept of delivering digital contents in learner oriented
environment using information and communication te4chnology (ICT). Delivery of the
digital content is the main characteristic of e-learning.
Advantages of e-learning:
It maintains the consistency of content.
It is easy for customization.
There is no any geographical limitation for learning.
To get Notes for School/College, Loksewa, and Banking Subscribe Binod Rijal On YouTube
It is quite favorable for learner as it can happen at any time and anywhere.
It reduces or eliminates travel costs to attend learning events.
It reduces or eliminates need for classroom/instructor infrastructure.
Disadvantages of e-learning:
Learners with low motivation or bad study habits may fall behind
Without the routine structures of a traditional class, students may get lost or
confused about course activities and deadlines
Students may feel isolated from the instructor and classmates
Instructor may not always be available when students are studying or need help
Slow Internet connections or older computers may make accessing course materials
frustrating
Managing computer files and online learning software can sometimes seem complex
for students with beginner-level computer skills
Hands-on or lab work is difficult to simulate in a virtual classroom.
E-governance
E-governance is the application of electronic means to improve the interaction
between government and citizens; and to increase the administrative effectiveness
and efficiency in the internal government operations.
Despite the government of Nepal has positively giving attention towards the
development of ICTs and subsequent implementing e-governance, a number of
issues has yet addressed. Some of the challenges for successful implementation of
e-governance are presented as:
Information transparency
Legal issues
Resources availability
Infrastructure including connectivity in rural area
Capacity and awareness
Political will and government action
Advantages of E-governance
E-Governance offers many benefits and advantages for the government, corporate
sector and society. E-Governance facilitates better delivery of government services
to citizens, improved interactions with business and industry, citizen empowerment
through access to information, or more efficient government management. It
simplifies internal operations and improves performance of government departments
To get Notes for School/College, Loksewa, and Banking Subscribe Binod Rijal On YouTube
while helping all sections of society to avail government services at lower cost with
maximum ease of use.
Virtual reality
Virtual reality is a new computational paradigm that redefines the interface between
human and computer becomes a significant and universal technology and
subsequently penetrates applications for education and learning.
E-medicine
E-medicine refers to an approach that provides medical services whenever and
wherever required using information and communication technology.
With the help of this approach, even small number of doctors can provide medical
service to large number of people scattered in different locations. The people of rural
areas who are unable to get service of doctors can be benefitted from this approach.
The patients share his/her medical problems to the doctors. This approach is now
getting more popularity among the doctors too. They can post their experiences and
issues in the online discussion forum. Without good facility of information and
communication technology, e-medicine cannot be effective. This is the problem
facing in the developing countries like Nepal.