What Is ICT: Information and Communication Technology (Ict)
What Is ICT: Information and Communication Technology (Ict)
ICT can be defined as all the digital devices, tools, content and resources which
are used to achieve the goals of teaching-learning process as we as
management of the education system. 11
ICTs can be divided into two components as
(i) Information Technology (IT) refers to the hardware and software of
information collection, storage, processing and presentation.
(ii) Information and Communication Infrastructure (ICI) refers to physical tele-
communications systems and networks and the services that utilize ICT tools.
What is ICT
ICTs are also used to refer to the convergence of media technology such as audio-visual and
telephone networks with computer networks, by means of a unified system of cabling
(including signal distribution and management) or link system. However, there is no
universally accepted definition of ICTs considering that the concepts, methods, and tools
involved in ICTs are steadily evolving on an almost daily basis.
COMPONENT OF ICT
1. E-mail – Refers to ICT in online communication
2. E-commerce – /Refers to ICT in business
3. Online Banking – Refers to ICT in banking
4. E-government – Refers to ICT in governance
5. E-learning – Refers to ICT in learning
6. Data
7. Hardware
8. Software
9. Information
Page | 1
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)
Internet
Internet stands for International Network, which began in 1950's by Vint Cerf
known as the Father of Internet. Internet is a 'network of networks that consists
millions of private and public networks of local to global scope. Basically,
network is a group of two or more computer systems linked together.
History of Internet
In 1969, the University of California at Los Angeles, the University of Utah were
connected as the beginning of the ARPANET (Advanced Research Projects
Agency Network) using 50 kbits circuits. It was the world's first operational
packet switching network. The goal of this project was to connect computers at
different universities and U.S. defence.
In mid 80's another federal agency, the National Science Foundationi, created a
new high capacity network called NSFnet, which was more capable than
ARPANET. The only drawback of NSFnet was that it allowed only the academic
research on its network and not any kind of private business on it. So, private
organisations and people started working to build their own networks, which
were later interconnected with ARPANET and NSFnet to form the Internet
Page | 2
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)
Internet Connections
Bandwidth and cost are the two factors that help you in deciding which Internet
connection is to use. The speed of Internet access depends on the bandwidth.
Some of the Internet connections available for Internet access are as follows
Dial-Up Connection A Dial-up is a method of connecting to the Internet using an
existing telephone.
Dial-up connection
uses the telephone line to connect to the Internet. When a user initiates a dial-
up connection, the modem dials a phone number of an Internet Service Provider
(ISP) that is designated to receive dial-up calls. The ISP then establishes the
connection, which usually takes about ten seconds and is accompanied by
several beeping and buzzing sounds
Broadband Connection
The term broadband commonly refers to high speed Internet access that is
always on and faster than the traditional dial-up access. It uses a telephone line
to connect to the Internet. Broadband access allows users to connect to the
Internet at greater speed than a standard 256 KB modem or dial-up access.
Broadband includes several high speed transmission technologies such as
follows
1. Digital Subscriber Line (DSL) It is a popular broadband connection. It provides
Internet access by transmitting digital data over the wires of a local telephone
network. DSL is the most common type of broadband service. It uses the existing
copper telephone limes.
Page | 3
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)
2. Cable Modem This service enables cable operators to provide broadband using
the same co-axial cables that deliver pictures and sound to your TV set. Most
cable modems are external devices that have two connections, one to the cable
wall outlet and the other to a computer. They provide transmission speed of 1.5
Mbps or more.
3. Broadband over Power Line (BPL) BPL is the delivery of broadband over the
existing low and medium voltage electric power distribution network. BPL is
good for areas, where there are no other broadband connections, but power
infrastructure exists. e.g. Rural areas.
Wireless Connection
Wireless broadband connects a home or business to the Internet using a radio
link between the customer's location and the service provider's facility. Wireless
broadband can be mobile or fixed. Unlike DSL and cable, wireless broadband
requires neither a modem nor cables. It can be easily established in areas, where
it is not feasible to deploy DSL or cable.
Some ways to connect the Internet wirelessly are as follows
Page | 4
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)
Extranet is a private network that uses the Internet protocol and the public
telecommunication system to security share part of a business information,
Interconnecting Protocols
A protocol is a set of rules that govern data communications. A protocol defines
what is communicated, how it is communicated and when it is communicated.
Generally, some of protocols used to communicate via an Internet are as follows
Page | 5
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)
Web browser how to display a Web page's words and images for the user. Each
individual markup code is referred to as an element or tag.
4. Telnet Protocol
Telnet is a program that runs on the computer and connects PC to a server on
the network. The protocol used on the Internet or Local Area Network, Telnet
session will started by entering valid username and password,
5. Usenet Protocol
The usenet service allows a group of Internet users to exchange their
views/ideas and information on some common topic that is of interest to all the
members belonging to that same group. Several such groups exist on the
Internet are called newsgroups. Usenet has no central server or administration.
Page | 6
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)
Web Page
The backbone of the world wide web is made of files, called pages or Web pages,
containing information and links to resources - both text and multimedia -
throughout the Internet. It is created using HTMD. There are basically two main
types of web page as static and dynamic. The main or first page of a Website is
known as home page.
Website
A group of Web pages that follow the same theme and are connected together
with hyperlinks is called Website. In other words, “A Website is a collection of
digital documents, primarily HTML files, that are linked together and that exist
on the Web under the same domain,"
e.g. http://www.carwale.com is a Website while
http://www.carwale.com/new/ is a Web page.
Web Browser
It is a software application that is used to locate) retrieve and also display
content on the world wide web, including Web pages. Web browsers are
programs used to explore the Internet. We can install more than one Web
browser on a single computer. The user can navigate through files, folders and
Websites with the help of a browser.
There are two types of Web browsers as follows
1. Text Web Browser) A Web browser that displays only text-based information is
known as text Web browser. e.g (Lynx, which provides access to the Internet in
the text mode only.
2. Graphical Web Browser A Web browser that supports both text and graphic
information is known as graphical Web browser. e.g. Internet Explorer, Firefox,
“Netscape, Safari, Google Chrome and Opera.
Note The first graphical Web browser was NCSA Mosaic.
Web Server
The Web browser is a client that requests HTML files from Web servers. The
server computer will deliver those Web pages to the computers that request
them and may also do other processing with the Web pages. Every Web server
that is connected to the Internet is given a unique address, i.e. IP address made
up of a series of four numbers between 0 to 255 separated by periods. e.g.
Apache HTTP Server, Internet Information Services (IIS), Lighttpd, etc.
A Web address identifies the location of a specific Web page on the Internet,
such as http://www.learnyoga.com, On the Web, Web addresses are called
URLS, URL stands for (Uniform Resource Locator.
It is the Web address for a Website or a Web page. Tim Berners Lee created
the first URL in 1991 to allow the publishing of hyperlinks on the world wide
web, e.g. "http://www.google.com/services/index.htm
hulp://n - Protocol identifier
Www - World Wide Web
google.com - Domain name
/services/ -Directory
index.htm -Web page
Domain Name
Domain is a group of network resources assigned to a group of users. A domain
name is a way to identify and locate computers connected to the Internet. A
domain name must be unique. It always have two or more parts, separated by
period/dot (-). e.g. google.com, yahoo.com, etc.
Domain Abbreviation
Page | 8
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)
Blogs
A blog is a Website or Web page in which an individual records opinions, links to
other site, oi regular basis, A typical blog combines text, images, and links to
other blogs, web pages and other media related to its topic.
Most blogs, are primarily textual, although some focus on art, photographs,
videos, music and audio. These blogs are referred to as edublogs. The entries of
blog is also known as posts.) Newsgroups
An area on a computer network especially the Internet, devoted to the
discussion of a specified topic is known as Newsgroup
Online discussion group that allows interaction through electronic bulletin
board system and chat sessions
Page | 9
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)
Search Engine
It is a Website that provides the required data on specific topics.
Search engines turn the Web into a powerful tool for finding
information on any topic.
When a search engine returns the links to web pages corresponding
to the keywords entered is called a hit, otherwise called a míss. Many
search engines also have directories or lists of topics that are
organised into categories. Browsing these directories, is also a very
efficient way to find information on a given topic.
Services of Internet
An Internet user can access to a wide variety of services such as electronic mail,
file transfer, interest group membership, multimedia displays, real-time
broadcasting, shopping, etc. Some of the important services provided by the
Internet are briefed in the following sections
Chatting
It is the online textual or multimedia conversation. It is widely interactive text-
based communication process that takes place over the Internet. Chatting, i.e.
a virtual means of communication that involves the sending and receiving of
messages, share audio and video between users located in any part of the world.
e.g. Skype, Yahoo, Messenger, etc.
Page | 10
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)
Video Conferencing
It is a communication technology that integrates video and audio to connect
users anywhere in the world as if they were in the same room. This term usually
refers to communication between three or more users who are in atleast two
locations. Each user or group of users who are participating in a video
conference typically must have a computer, a camera, a microphone, a video
screen and a sound system,
E-learning
E-learning (Electronic Learning) refers to the electronic mode of delivering
learning, training or educational programs to users. It is the mode of acquiring
knowledge by means of the Internet and computer based training programs.
E-banking
E-banking (Electronic Banking) is also known as Internet Banking or Online
Banking.
E-banking means any user with a personal computer and a browser can get
connected to his bank's Website to perform any of the virtual banking functions.
All the services that the bank has permitted on the Internet are displayed in
menu.
E-shopping
E-shopping (Electronic Shopping) or online shopping is the process of buying
goods and services from merchants who sell on the Internet.
Books, clothing, household appliances, toys, hardware, software and health
insurance are just some of the hundreds of products, consumers can buy from
an online store. Some E-shopping sites are Naaptol, Flipkart, Yebbi, Homeshop
18, etc.
E-reservation
Page | 11
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)
Social Networking
It is the use of Internet based social media programs to make connections with friends, family,
classmates, customers, clients etc. It can occur for social purposes, business purposes or
both.
Social networking has grown to become one of the largest and most influential components
of the web. The most popular social networking sites are Facebook, MySpace, Orkut, etc.
Note Facebook was developed by Mark Zuckerberg.
E-commerce
E-commerce (Electronic Commerce) includes sharing business information,
maintaining business relationships and conducting business transactions by
means of telecommunication networks or process of trading goods over the
Internet. Electronic Data Interchange (EDI) is the electronic transfer of a
business transaction between sender or receiver computer.
Note E-trading is the process of trading the goods and items
over the Internet.
M-commerce
M-commerce (Mobile Commerce) provides the application for buying and
selling goods or services through wireless Internet enabled handheld devices. It
involves new technologies, services and business models.
Page | 12
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)
Components of ICT
There are 6 most common components that make up an ICT system:
• Data It includes raw facts/figures/ statistics.
• Hardware It contains physical components in a computer or peripherals such as
input/ output devices, storage, processor, etc.
• Software It is a set of computer programs which provides the step by step
instructions to get the job done.
• Information it is the result from processing data.
• Procedures These are actions conducted in a series of a certain order to ensure
the system
• will run smoothly. *
• People Individuals are needed to supply the data to the ICT system.
1. SWAYAM
o Ministry of education and NPTEL, IIT Madras with the help of Google Inc. and
Persistent Systems Ltd, developed this platform.
Page | 13
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)
o The platform is based on the three cardinal principles of the education policy
of India:- Access, Equity, and Quality.
o It provided all courses from Class 9 till post-graduation online to everyone free
of cost.
o The formats of study material provided under this platform are:
▪ Video Lecture
▪ Specially prepared reading material that can be downloaded/printed
▪ Self-assessment tests through tests and quizzes
▪ An online discussion forum for clearing the doubts
• Nine national coordinators that help in ensuring the quality of the content are:
▪ AICTE (All India Council for Technical Education) for self-paced and
international courses
▪ NPTEL (National Programme on Technology Enhanced Learning) for
Engineering
▪ UGC (University Grants Commission) for nontechnical post-graduation
education
▪ CEC (Consortium for Educational Communication) for under-graduate
education
▪ NCERT (National Council of Educational Research and Training) for school
education
▪ NIOS (National Institute of Open Schooling) for school education
▪ IGNOU (Indira Gandhi National Open University) for out-of-school students
▪ IIMB (Indian Institute of Management, Bangalore) for management studies
▪ NITTTR (National Institute of Technical Teachers Training and Research) for
Teacher Training Programme
• Students to get a SWAYAM Certificate have to pay a fee to register for the final
proctored examinations. The examinations take place at a designated venue.
2. iShare for India
• It is an initiative started by the Ministry of Human Resources and Development
(MHRD) to invite interested groups/agencies/organizations/communities to
participate in the creation of an educational resources pool for School and
Teacher Education.
• It allows contribution in the form of Mobile enabled Apps/ Web-based ICT
supplementary resources in any Indian Language for a school education or
teacher education.
Page | 14
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)
3. Shaala Siddhi
• It is a national programme on school standards and evaluation
• It is an initiative of the National Institute of Educational Planning and
Administration (NIEPA).
• It runs under the aegis of MHRD.
• It works to evaluate school performance using the School Evaluation
Dashboard called ‘e-Samiksha’.
4. Shaala Darpan
• It is used to monitor the primary and middle schools
5. Saransh Portal
• It is a web portal launched in 2015 by the Central Board of Secondary
Education (CBSE.)
• The primary aim of Saransh is to promote ICT in education in schools.
• It is a self-review tool for schools and parents.
• It is considered to be in alignment with the Digital India initiative.
• It has a provision to give access to all e-books of all classes.
6. e-Pathshala
• It is an initiative to provide educational resources online to students, teachers,
educators, and parents developed by NCERT and the Central Institute of
Educational Technology (CIET).
• It is available as an app in the Google Play app store and Windows.
• Among other educational resources it provides,
▪ CERT textbooks for classes 1-12
▪ Audio-visual resources by NCERT
▪ Periodicals
▪ Supplements
▪ Teacher training modules and,
▪ A variety of other print and non-print materials
7. Digital Gender Atlas
• It has been developed to identify the low-performing geographic pockets for
girls, particularly from marginalized groups such as scheduled castes,
scheduled tribes, and Muslim minorities, on specific gender-related education
indicators.
8. School GIS
Page | 15
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)
In Healthcare
• Through ICT, the data can be transferred to the patient or to the doctor for
consultation. The patient can have medical record in hand that can be used
anywhere, anytime.
• In light of COVID-19, where people are forced to stay healthy indoors, mobile
health (m Health) apps have come to our rescue. At present, there are approx
200,000 m-Health apps available in the apps stores which help people to know
their health status and also helps interaction between patients and doctors.
In Governance
• e e-Governance is about leading the transformation of government to provide
efficient, convenient and transparent services to citizens and businesses
through the use of ICT.
Page | 16
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)
Advantages of ICT
• Communication ICT offers a more efficient, time and money saving way of
communication through apps like Whatsapp, Zoom, Skype, GoTo Meeting, etc.
• Creation of Jobs The best advantage of ICT has been creation of new and
interesting jobs in IT sectors. Advancement of technology has created great
employment opportunities in fields such as web designing, database
administration, etc.
• Cost Effectiveness ICT has made everything cost effective. Nowadays, business
meetings take place over video-conferencing apps such as Zoom. ICT saves
money as it provides almost every facility including shopping.
• Bridging the Cultural Gap Greater access to the ICT has helped to bridge the
cultural gap by helping people from different cultures to communicate with each
another and allowing the exchange of views and ideas.
• Greater Availability ICT has made it possible for people to avail almost every
facility at any time 24 x 7.
• Education ICT has allowed educational facilities to reach everyone while making
learning easier and more effective.
Disadvantages of ICT
• Lack of Job Security Experts believe that ICT has made job security a big issue.
As technology keeps on changing nearly every day, individuals need to be
constantly studying the changes in their profession, if they want to feel secure
in their jobs.
• Overriding Cultures While ICT may have made the world a global village, it has
also contributed to one culture to predominate over others. As a result, many a
time, the traditional values of another comparatively weaker culture are lost.
• Privacy Though information technology may have made communication
quicker, easier and more convenient, it has also brought along privacy issues.
From cell phone signal interceptions to e-mail hacking, people are now worried
about their once private information becoming public knowledge,
Page | 17
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)
PROGRAMING CONCEPT
Program can be defined as a set of instructions that need to be executed to
accomplish a computing task. A person who writes or performs the program is
known as programmer. Programmer uses some specific languages to write
program which is known as programming languages e.g. C++, Java, etc.
Programming Language
It is a set of commands, instructions and other syntax use to create a software
program. Programming language must be simple, easy to learn and use. It must
be consistent in terms of syntax and semantics. Programming languages are
mainly categorised into three parts which are as follows
Page | 18
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)
Page | 19
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)
Language Translator
It helps in converting programming languages to machine language.
11100110101
.
01101111001
Language Transfer
01110001111
01010101010
The translated program is called the object code. Depending upon used
programming languages, language translator is divided into three categories.
which are as follows
• Assembler
It converts a program written in assembly language into machine language.
Assembly language consists of mnemonic code, which are difficult to learn and
are machine dependent.
• Interpreter
It converts a HLL program into machine language by converting it line-by-line. If
there is any error in any line, it stops the execution of the program immediately
and reports to the user at the same time. Program execution cannot resume
until the error is rectified by the user. Interpreter is very useful for debugging
Page | 20
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)
and suitable for novice programmer. This is a slow process and consumes less
memory space.
• Compiler
It converts HLL program into machine language, which can be understood by the
processor. For each high level language, the machine requires a separate
compiler. A compiler creates a unique object program, i.e. if a source program
is compiled, there is no need of that source program because output can be
obtained by executing that object program. Compiler converts the entire HLL
program in one go and reports all the errors of the program alongwith the line
numbers.
Generation of Languages
The concept of language generations, sometimes called levels, is closly
connected to the advances in technology that brought about computer
generations. The five generations of language are as follows
1. The first generation languages or 1 GLs are low level languages like machine
language.
2. The second generation languages or 2GLS are also low level languages that
generally consist of assembly language.
3. The third generation languages or 3GLs are high level languages such as Java.
4. The fourth generation languages or 4GLs are the languages that consist of
statements similar to the statements of human language 4GLs are commonly
used in database programming and scripting programming
5. The fifth generation languages or 5GLs are programming languages that
contain visual tools, which help to develop a program, A good example of 5GLs
is Visual Basic.
Error
An error in a program is called bug. It is a term used to describe any issue that
arises unexpectedly that cause a computers not function properly.
Types of Error The types of error are classified into four categories which are as
follows
1. Syntax Error When the rules of the programming language are not followed, the
compiler will show syntax error.
2. Semantic Error Semantic errors are reported by the compiler when the
statements written in the program are not meaningful to the compiler.
Page | 21
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)
3. Logical Error Logical errors are those errors that occur in the output of the
program. The presence of logical errors leads to undesired or incorrect output
4. Runtime Error Runtime errors are those errors that occur during the execution
of a program.It generally occurs due to some illegal operation performed in the
program.
Algorithm
An algorithm is a step by step method of solving a problem. It is commonly used
for data processing, calculation and other related computer and mathematical
operations.
The desirable features of an algorithm are
(i) Each step of algorithm should be simple.
(ii) It must be in a finite number of steps.
(iii) It should be as efficient as possible.
(iv) It should be clear in the sense,
(v) It should be effective, ie, it must lead to a unique solution of the problem.
DATA REPRESENTATION
It refers those methods which are used internally to represent information store
in a computer.
Number System
It defines a set of values that is used to represent quantity. Digital computers
internally use the binary number system to represent the data and perform
arithmetic calculations. The number systems generally used by a computer are
as follows:
Page | 22
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)
1. Binary Number System This system is very efficient for computers, but
not for humans. It contains only two unique digits Os and ls. It is also known as
Base 2 System. The binary numbers 0 and 1 are called a bit. The computer always
calculates input in binary form. e.g. (10101),
13 1101 D
14 1110 E
15 1111 F
1. Decimal to Binary
To convert decimal to binary, following steps are involved ;
Step 1 Divide the given number by 2.
Step 2 Note the quotient and remainder.
Remainder should be 0 or 1.
Step 3 If quotient ≠ 0, then again divide the
quotient by 2 and back to step 2.
If quotient = 0, then stop the process.
Step 4 First remainder is called as 'Least
Significant Bit (LSB) and last remainder
is called as 'Most Significant Biť (MSB).
Step 5 Arrange all remainders from MSB to LSB.
Example (𝟒𝟑)𝟏𝟎 → (? )𝟐
remainder
2 43 1→LSB
2 21 1
2 10 0
2 5 1
2 2 0
2 1 1→MSB
0
2. Binary to Decimal
To convert binary to decimal, following steps are involved :
Step 1 Multiply all the binary digits by powers of 2.
Step 2 The power for integral part will be positive and for fractional part will be
negative.
Step 3 Add all the multiplying digits.
Page | 24
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)
Computer Codes
In computer, any characters like alphabet, digit or special character are
represented by collection of 1s and Os in a unique coded pattern.
The binary coding schemes that are most commonly used as follows:
BCD
It is a number system where four bits are used to represent each decimal digits.
BCD (Binary Coded Decimal) is a method of using binary digits to represent the
decimal digits (0-9).
ASCII
These are standard character codes used to store data so that it may be used by
other software programs. Basically, ASCII (American Standard Code for
Information Interchange) codes are of two types which are as follows:
ASCII-7 It is a 7-bits standard ASCII code.
It allows 27 = 128 (from 0 to 127) unique symbols.
ASCII-8 It is an extended version of
ASCII-7. It is an 8-bits code, allows 𝟐𝟖 = 256 (0 to 255) unique symbols or
characters.
EBCDIC
In EBCDIC (Extended Binary Coded Decimal Interchange Code), characters are
represented by 8-bits. These codes store information which is readable by other
computers. It allows 28 =256 (0-255) combinations of bits.
COMPUTER SOFTWERE
Software is a collection of computer programs and related data that provide the
instructions for telling computer what to do and how to do. A software is an
interface between the user and the computer hardware. It is responsible for
Page | 25
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)
Types of Software
Software can be divided into two major categories
1. System software 2 Application software
System Software
it consists of several programs, which are directly responsible for controlling,
integrating and managing the individual hardware components of a computer
system. System software also provides the interface between the user and
components of the computer. Depending on the functionality, the system
software can be further divided into following categories:
1. Operating System
It consists of programs which control, coordinate and supervise the activities of
the various components of a computer system. Its function is to provide link
between the computer hardware and the user. It provides an environment to
run the programs. e.g. MS-DOS, Windows XP/2000/98, Unix, Linux, etc.
The operating system performs the following functions
(i) It recognises input from keyboard, sends output to the display screen
(ii) It makes sure that programs running at the same time do not interfere with
each other.
(iii) It is also responsible for security) ensuring that unauthorised users do not
access the system.
2. Device Drivers
A software, which is written with the objective of making a device functional
when it is connected to the computer is called device driver. It is a system
software that acts like an interface between the device and the user. " Every
device, whether it is a printer, monitor, mouse or keyboard has a driver program
associated with it for its proper functioning.
Page | 26
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)
3. Language Translator
It helps in converting programming languages to machine language. The
translated program is called object code. There are three different kinds of
language translator : Assembler, Compiler and Interpreter.
Linker It is a system program that links together several object modules and
Libraries to form a single and coherent program (executable). The main purpose
of linker is to resolve references among files. Linker Is used to determine the
memory locations that code from each module will occupy and relates its
instruction by adjusting absolute references.
Application Software
It is a computer software designed to help the user to perform single or multiple
tasks. It is a set of instructions or programs designed for specific uses or
applications, that enable the user to interact with a computer. Application
softwares are also called the end-user programs. These programs do the real
work for users.
Page | 27
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)
3. Presentation Software
Presentation is the practice of showing and explaining the contents of a topic to
an audience or a learner visually. People, in a variety of settings and situations,
use presentation software to make their presentations more interesting and
professional.
e.g. Microsoft PowerPoint, Corel
Presentations, Lotus Freelance Graphics, OpenOffice.org Impress, etc.
7. Multimedia Software
Multimedia includes a combination of text, audio, still images, animation, video
or interactivity content forms,
Page | 28
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)
e.g, Macro-Media Flash, Xilisoft Video Converter, VLC Media Player, Nimbuzz,
etc.
Page | 29
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)
accounts receivable, payroll and trial balance. e.g. Tally. ERP9, HDPOS, MARG,
Profit book etc.
7. Billing System It refers to the software that is used to perform the billing
process. It handles the tracking of labled products and services delivered to a
customer or set of customers. e.g. Billing Manager, Billing Tracker, kBilling, etc
System Utilities
These programs perform tasks related to the maintenance of the computer
system. These are the packages which are loaded into computer during time of
installation of operating system. They are used to support, enhance, expand and
secure existing programs and data in the computer system.
System utility mainly consists of the following functions
2 Disk Fragmenter It detects computer files whose contents are broken across
several locations on the hard disk and moves the fragments to one location to
increase efficiency. It can be used to rearrange files and unused space on your
hard disk.
e.g. MyDefrag, Diskeeper, Defraggler, etc.
3. Backup Utilities It can make a copy of all information stored on a disk and
restore
either the entire disk or selected files)
4. Disk Cleaners It is used to find files that have not been used for a long time.
This utility also serves to increase the speed of a slow.computer,
e.g. Bleach Bit cleaner, etc.
5. Anti-virus IDis the utility which is used to scan computer for viruses and
prevent the computer system files from being corrupt.
e.g. Kaspersky, AVG, McAfee Avira) etc.
6. Text Editor It is a program that facilitates the creation and correction of tex
editor supports special commands for editing, i.e. you can write, delete, find and
Page | 30
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)
replace words, lines, paragraphs, etc. e.o. MS-Word, WordPad, Notepad etc, in
which Notepad is the most popular text editor.
Adobe Page Maker is a typesetting tool formely widely used for desktop publishing
Fully Backup contains a copy of every program, data and system file on a computer. Firmware is a
combination of software and hardware. eg. ROMS, PROMs and EPROM
Freeware is commonly used for copyrighted software that is given away for free
CAD (Computer Aided Design) Software by architects, engineers, drafters and create precision
drawings
Data Communication
It is the exchange of data between two devices using some form of transmission
media. It includes the transfer of data or information and the method of
preservation of data during the transfer process. Data is transferred from one
place to another in the form of signals. There are three types of signals
1. Digital Signal In this signal, data is transmitted in electronic form, i.e.
binary digits (0 or 1).
2. Analog Signal In this signal, data is transmitted in the form of radiowaves like
in telephone line.
3. Hybrid Signal These signals have properties of both analog signal and digital
signal.
Communication Channel
The communication channel refers to the direction of signal flow between two
devices.
There are mainly three types of communication channel as follows
1. Simplex Channel In this channel, the fl of data is always in one direction, with
no capability to support response in other direction. This communication is
unidirectional. Only one of the communicating devices transmits information
and the other can only receive it. e.g. Radio, Television, Keyboard, etc.
Page | 31
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)
2. Half Duplex Channel In this channel, the data can flow in both directions, but
not at a same time. When one device transmits information, then other can only
receive at
that point of time. e.g. Walkie - Talkie.
3. Full Duplex Channel In this channel, the flow of data is in both directions at a
time, i.e. both stations can transmit and receive information simultaneously. e.g.
Wireless handset (mobile phone)
Communication Media
Communication media of a network refer to the transmission media or the
connecting media used in the network. It can be broadly defined as anything
that can carry information from a source to destination. It refers to the physical
media through which communication signals can be transmitted from one point
to another.
Transmission media can be divided into two broad categories
3. Fibre Optic Cable It is made up of glass or plastic and transmits signals in the
form of light from a source at one end to another. Optical fibres allow
transmission over longer distance at higher bandwidth which is not affected by
Page | 32
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)
electromagnetic field. The speed of optical fibre is hundred of times faster than
co-axial cables.
Computer Network
Page | 33
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)
Note ARPANET stands for Advanced Research Projects Agency Network. It wag
the first network developed boy vint Cerf in 1969.
Benefits of Network
Some of the benefits of network are discussed below
1. File Sharing Networking of computer helps the users to share data files.
2. Hardware Sharing Users can share devices such as printers, scanners, CD-ROM
drives, hard drives, etc, in a computer network.
3. Application Sharing Applications can be shared over the network and this allows
implementation of client/server applications.
4. User Communication This allows users to communicate using E-mail,
newsgroups, video conferencing within the network.
Page | 34
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)
Like the Internet, most WANs are not owned by any one organisation, but rather
exisk under collective or distributed ownership and management. WANs usę
technology like ATM, Frame Relay and X.25 for connectivity,
Network Devices
These devices are required to amplify the signal to restore the original strength
of signal and to provide an interface to connect multiple computers in a
network. There are many types of network devices used in networking.
Some of them are described below
1. 1 Repeater Repeaters have two ports and can connect two segments of a LAN.
It amplifies thę signals when they are transported over a long distance so that
the signal can be as strong as the original signal. A repeater boosts the signal
back to its correct level.
2. Hub It is like a repeater with multiple ports used to connect the network
channels. It acts as a centralised connection to several computers with the
central node or server, When a hub receives a packet of data at one of its ports
Page | 35
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)
from a network channel, it transmits the packet to all of its ports to all other
network channel,
3. Gateway. It is an interconnecting device, which joins two different network
protocols together. They are also known as protocol converters. It accepts
packet formatted for one protocol and converts the formatted packet into
another protocol.
The gateway is a node in a network which serves as a proxy server and a firewall
system and prevents the unauthorised access.
4. Switch It is a small hardware device that joins multiple computers together
within one LAN. It helps to reduce overall network traffic. Switch forwards a data
packet to a specific route by establishing a temporary connection between the
source and the destination. There is a vast difference between a switch and a
hub. A hub forwards each incoming packet (data) to all the hub ports, while a
switch forwards each incoming packet to the specifjed recipient.
5. Router It is a hardware device which is designed to take incoming packets,
analyse packets, moving and converting packets to the another network
interface, dropping the packets, directing packets to the appropriate locations,
etc.
6. Bridge It serves a similar function as switches. A bridge filters data traffic at a
network boundary. Bridges reduce the amount of traffic on a LAN by dividing it
into two segments. Traditional bridges support one network boundary, whereas
switches usually offer four or more hardware ports. Switches are sometimes
called multiport bridges.
7. Modem It is a device that converts digital signal to analog signal (modulator) at
the sender's end and converts back analog signal fo digital signal (demodulator)
at the receiver's end, in order to make communication possible via telephone
lines. A Modem is always placed between a telephone line and a computer.
NETWORK TOPOLOGY
Network Topology The term “topology' refers to the way a network is laid out,
either physically or logically. Topology can be referred as the geometric
arrangement of a computer system. Each computer system in a topology is
known as node.
Page | 36
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)
Page | 37
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)
5.Tree Topology
This is a network topology in which nodes are arranged as a tree. The function
of the central node in this topology may be distributed. Its basic structure is like
an inverted tree, where the root acts as a server. It allows more devices to be
attached to a single hub.
Memory Unit
Memory is a part of the computer, which holds data and instructions. This unit
is responsible to store programs or data on a temporary or permanenti basis.
it general, the memory is classified into two categories as follows:
→ Cache Memory
It is a storage buffer that stores the data which is used more often, temporarily
and makes them available to CPU at a fast rate. It compensates the gap in speeds
of processor and main memory.
Page | 38
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)
→ Virtual Memory
It is an illusion of extremely large main memory that allows the execution of
processes that are not completely in main memory.
(ii) Secondary or Auxiliary Memory
This memory stores much larger amount of data and information for extended
periods of time. Data in secondary memory cannot be processed directly by the
CPU, first it must be copied into primary storage, i.e. RAM. This memory is also
known as non-volatile memory.
Secondary memory devices are as follows:
(a) Hard Disk Drive (HDD)
It is a non-volatile, random access digital data storage device. HDD is a data
storage device used for storing and retrieving digital information using rotating
disks (platters) coated with magnetic material. Hard disk is divided into tracks
which are further subdivided into sectors.
Page | 39
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)
It is also known as Super Density Disc (SDD) or Digital Versatile Disc. DVDs offer
higher storage capacity than compact discs while having the same dimensions.
Depending upon the disc type, DVD can store several Gigabytes of data (4.7 GB-
17.08 GB).
DVDs come in three varieties as follows:
I. DVD-ROM (Digital Video Disc-Read Only Memory)
II. DVD-R (DVD-Recordable)
III. DVD-RW (DVD-ReWritable)
Note A new laptop has been produced using the solid state hard drive
technology. This technology weighs less, is smaller and uses less power.
Basic units of Memory Measurements
1 Bit Binary Digit (0 or
1)
4 Bit 1 Nibble
8Bit 1 Byte
1024 Byte 1 KB (kilo byte)
1024 KB 1 MB ( Mega Byte
)
1024 MB 1 GB (Giga Byte)
1024 GB 1 TB (Tera Byte)
1024 TB 1 PB (Peta Byte)
1024 PB 1 EB (Exa Byte)
Page | 40
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)
- Motherboard
The main circuit board contained in any computer called a Motherboard. It is
also known as the Man Board, Logic Board, System Board or Planar Board. All
other electronic devices and circuits of computer system are attached to this
board like CPU, ROM
expansion slots, PCI slots and USB ports.
INTRANET
An intranet can be an excellent method for sharing organizational information
and creating internal communication channels. An intranet is an ideal way to
communicate in a secure environment. An intranet provides a way to
communicate with a common technology.
Intranets allow organizations to make effective use of their digital organizational
information resources, offering interoperability, ease of use, security, and cost-
effectiveness.
Intranet is:
• A collection of resources to which only internal users have access.
• A private network inside an organization, similar to the Internet, but which is for
internal use only, and is not accessible to the public.
• Users of an Intranet can exchange electronic mail (email), send files (FTP),
browse web (WWW) pages, and connect to any other computer. Just like the
normal internet, however, only people within an organization can use the
intranet
• Intranets are often separated from the Internet by using a firewall.
• Organizations use Intranets to manage projects, provide employee information,
distribute data and information, internal communication
Advantages of Intranet
• Data can be stored centrally
• Allows easier maintenance of data
• Web-based interface for access o common technology for communication
Page | 41
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)
Page | 42
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)
• BCC (Band Carbon Copy) or (Blind Curtsey Copy): If you don't want them to know
who else have received copies, you can type the addresses in the BCC text, In
this case, only you (the sender) will know the identity of all the recipients of
mail.
• Reply: You can send your reply using the same The subject box will have the
same subject, but with the words "Re;" before it.
• Forward: You can send the forward message using the same The subject box will
have the same subject, but with the words "Fwd:" before it.
• An email attachment is a computer file sent along with an email message. One
or more files can be attached to any email message and be sent along with it.
The first email was sent by Ray Tomlinson to himself in 1971.
• The Drafts folder retains copies of messages that you have started but is not
yet ready to send.
Protocols:
• Transmission Control Protocol (TCP)
• User Datagram Protocol (UDP)
• Internet Protocol (IP)
• Post Office Protocol (POP3)
Page | 43
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)
Video conferencing
Video conferencing is a technology-enabled type of meeting where two or more
people, in different geographic locations, conduct live visual conferences
through the internet for the purpose of communicating and collaborating. Video
conferencing software (or hardware) enables transmission of high-quality audio,
static images-sometimes full-motion video images and text-based messages
between multiple locations. As long as they have a webcam (an embedded
camera), a desktop, laptop or mobile phone device can be used for video
conferencing.
Page | 44
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)
ABBREVIATION
A C
AD Active Directory Cc Carbon Copy
ADC Analog to Digital CMOS Complementary Metal Oxide
Convertor Semiconductor
ARP Address Resolution CAD Computer Aided Design
Protocol
AH Active Hub COBOL Common Business Oriented
Language
AI Artificial Intelligence CD Compact Disc
AL Active Link COMAL Common Algorithmic
Language
ALGOL Algorithmic Language CPU Central Processing Unit
ALU Arithmetic Logic Unit CRT Cathod Ray Tube
AM Active Monitor CSS Cascading Style Sheet
APCI Application layer CU Control Unit
Protocol Control
Information
API Application Program CTCP Client-To-Client Protocol
Interface
Page | 45
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)
Page | 46
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)
Page | 48
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)
Page | 49
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)
Page | 50
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)
History of Computer
Computer is not the creation of one day, rather it took a long period for the
development of modern computer. History of computer is described in this
table.
Invention Inventor Characteristics Applications
Abacus China • First mechanical • Used for addition and
(1602) calculating device. subtraction
• A horizontal rod operations.
represents the one, tens,• Calculation of square
hundred, etc. roots can also be
performed.
Napier’s John • Three • Perform multiplication
dimensional
Bones Napier structure. on numbers.
(1617) (Scotland• Holding numbers from •0 Technology used for
) to 9 to 9 only. calculation called
• Represent graphical Rabdologia.
structure of calculating
result.
Pascaline Blaise • First mechanical adding • Perform addition and
(1642) Pascal machine. subtraction of two
(France) • t was structured like numbers.
rectangular box, with
Page | 51
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)
Page | 52
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)
Generations of Computer
A generation refers to the state of improvement in the development of system.
Computers are built of electromechanical, before generation. Each generation
of computer is characterized by a major technological development that
fundamentally changed the way, computers operate.
Genera Switching Storage Operati Characteristics Applications
tion Device Device/S ng
peed System
First Vacuum Magnetic Batch • Fastest • Used for
(1940- tubes droms operati computing scientific
56) (333 ng device. purpose e.g.
micro system • Generate large ENIAC,UNIVAC
seconds) (Machin amount of heat. MARK-1 etc.
e • Non-portable.
languag
e Binary
number
0’s and
1’s)
Second Transistor Magnetic Time • More reliable • Used for
(1964- s core sharing and less prone commercial
63) (Made up technolo OS, to hardware production e.g.
of gy Multitas failure. PDPs IBM-
semicond (10 micro king OS• Portable and 1401.etc
uctor) seconds) Assembl generate less
y amount of heat
languag
Page | 53
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)
e high
level
languag
e.
Third Integrated Magnetic Real- • Consumed less • Database
(1964- Circuits core as time power management
71) (ICs) primary system • Highly system e.g.
(Made up storage High sophisticated NCR 395, B6
of silicon) medium level technology 500 etc.
(100 languag required
nano e
seconds) (FORTR
AN
COBOI
ALGOL)
Fourth Large Semi Time • More reliable • Distributed
(1971, Scale conducto sharing, and portable. system. E.g.
Present integrated r GUI • This generation Intel 4004
) (ISI) circuit memory, interfac leads to better chup,
micro- Winchest e communication Macintosh.
processor er disc (PASCAL and resource
(300 , sharing
nano ADA,
seconds) COBAL-
74,
FORTRA
N-4)
Fifth Super Optical Knowle• Parallel • Artificial
Present Large disc dge processing. intelligence
and Scale Informa• Intel core e.g. Robotics
Beyond Integrated tion micro-
) (SISI) chips Processi processor is
ng implemented.
System.• Enables mega
chips.
Page | 54
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)
• John Von Neumann was introduced first architecture of computer in the year
1948
• Transistors were invented by Bell Laboratory.
• In1958, Jack St. Clair Kilby and Robert Noyce invented the first IC.
• In latest generation computers, the instructions are executed parallel as well as
sequential.
•
Classification of Computer
Computers are mainly classified in three types as follows
BASED ON SIZE BASED ON WORK BASED ON PURPOSE
• Microcomputer • Analog Computer • General Purpose
• Mainframe Computer • Digital Computer Computer
• Minicomputer • Hybrid Computer • Special Purpose
• Supercomputer Computer
Based on Size
On the basis of size, computers are categorized as follows:
Microcomputer
These types of computers are the least powerful yet the most widely used and
are also called portable computers. Microcomputer consists of three basis
categories of physical equipment, i.e. system unit, input/output unit and
memory unit.
d) Tablet Computer They have key features of the notebook computer, but
these can accept input from a pen instead of the keyboard or mouse.
e) Workstation Computer These are computers dedicated to a user or group of
users engaged in business or professional work. It includes one or more high
resolution displays and a faster processor than a Personal Computer (PC).
Minicomputer
These are smaller in size, faster and cost lower than mainframe computers.
Initially, the minicomputer was designed to carry out some specific tasks, like
engineering and Computer Aided Design (CAD) calculations. But now, they are
being-used central computer which is know as Server. Minicomputers are IBM-
17, DEC PDP-11, HP-9000, etc.
Mainframe Computer
These types of computer having large internal memory storage and
comprehensive range of software. Mainframe computer serves as a backbone
for the entire business world. It is considered as the heart of a network of
computers or terminals that allow a large number of people to work at the same
time. Mainframe computers are IBM-370, IBM-S/390, UNIVAC-1110, etc.
Supercomputer
These are the fastest and most expensive machines. They have high processing
speed compared to other computers. Supercomputers are most powerful, large
in size and memory, compared to all other computers.
The speed of supercomputers are measured in LOPS Floating Point Operations
Per Second) Supercomputers are used for highly calculation intensive tasks, such
as weather forecasting. nuclear research, military agencies and scientific
research laboratories.
I) CRAY-1 was the world's first supercomputer introduced by Seymour R CRAY in
1976.
II) PARAM was the first supercomputer developed in India in 1990.
III) PARAM ISHAN is the latest machine in the series of PARAM made by C-DAC
and IIT Guwahati on 20th September, 2016.
Page | 56
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)
Based on Work
On the basis of work, computers are categorized as follows
Analog Computer
These computer carry out arithmetic and logical operations by manipulating and
processing of data e.g. Speedometers, seismograph etc. Analog computer can
perform several mathematical operations simultaneously. It uses continuous
variables for mathematical operations and utilises mechanical or electrical
energy.
Digital Computer
These do work by calculating the binary digits. A digital compute, not only
performs mathematical calculations, but also combines the bytes to produce
desired graphics sounds. e-g . Desktop (PC).
Hybrid Computer
These are the Combination of analog and digital computers. Machines used
hospitals like ECG and DIALYSIS are the commonly used hybrid computers.
Based on Purpose
On the basis of purpose, computers are categorized as follows
COMPUTER ARCHITECTURE
Computer architecture deals with the functional behaviour of a computer
system as viewed by a programmer. It can also be described as the logical
structure of the system unit that housed electronic components. The computer
Page | 57
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)
architecture forms the backbone for building successful computer systems The
first computer architecture was introduced in 1970.
Components of Computer
A computer consists of following three main components
1. Input/ Output (I/0) Unit.
2. Central Processing.
3. Memory Unit.
Note System units a metal or plastic case that holds all the physical parts of the
Me computer components that process data are located in it.
Input Unit
The computer accepts coded information through input unit by the user. It is a
device that is used to give required information to computer e.g. Keyboard,
Mouse, etc.
An input performs the following function
• It accepts the instruction and date in the user.
• It convert these instructions and data in computer in acceptable format.
• It supplies the converted instructions and data to the computer system for
futher processing
Output Unit
This unit sends the processed results to the user. It is mainly used to display the
desired result to the user as per input instruction. e.g. Monitor, printer, plotter,
etc.
The following functions are performed by an output unit
Page | 58
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)
• It accepts the results produced by the computer which are in coded form and
hence cannot be easily understood by user.
• It converts these coded results to human acceptable form.
• It supplies the converted results to the user
Registers
These are used to quickly accept, store and immediately by the CUP. These
registers are the top of the memory hierarchy and the fastest way for the system
to manipulate data. The number and size of registers very from Processor to
processor.
Page | 59
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)
Microprocessor
IT is the controlling element in a computer system and is sometimes referred to
as the chip Microprocessor is the main hardware that drives the computer. It is
a large Printed Circuit Board (PCB). Which is used in all electronic system such
as computer, calculator, digital system, etc. The speed of CPU depends upon the
type of microprocessor used.
• Intel 4004 was the first microprocessor made by intel in 1971 by scientist Ted
Holf and engineer Fredence Faggin.
• Some of the popular microprocessors are Intel, Intel core 17, Dual core, Pentium
IV etc.
Memory Unit
This unit is responsible to store programs or data on a temporary or permanent
basis. It has primary memory (main memory) and secondary memory (auxiliary
memory). Te input data which is to be processed is brought into main memory
before processing. Another kind of memory is referred to as secondary memory
of a computer system. This unit used to permanently store data programs and
output. This is does not deal directly with CP
Motherboard
The main circuit board contained in any computer is called a motherboard. It is
also known as the {main board or logic board or system board or 42lanar board.
All the other electronic devices and circuits of computer system are attached to
this board like. CPU. ROM , RAM, expansion slots, PCI slots and USB ports. It also
includes controllers for devices like the hard drive, DVD drive, keyboard and
mouse. In other words, motherboard makes everything in a computer work
together.
Page | 60
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)
COMPUTER SECURITY
The Internet has transformed our lives In many good ways. Unfortunately, this
vast network and its associated technologies also have brought In their wake,
the Increasing number of security threats. The most effective way to protect
yourself from these threats and attacks Is to be aware of standard cybersecurlty
practices. This article on 'What Is Computer Security?" presents an Introduction
to computer security and Its key concepts.
1. What Is Computer Security?
2. Computer Security Threats
3. Why Is computer security Important?
4. Best computer security practices.
Page | 61
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)
So, Computer security can be defined as controls that are put In place to provide
confidentiality, Integrity, and availability for all components of computer
systems. Let's elaborate the definition.
Viruses
A computer virus Is a malicious program which is loaded Into the user's
computer without user's knowledge. It replicates itself and Infects the files and
programs on the user's PC. The ultimate goal of a virus Is to ensure that the
victim's computer will never be able to operate properly or even at all.
Page | 62
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)
Computer Worm
A computer worm Is a software program that can copy Itself from one computer
to another, without human Interaction. The potential risk here Is that it will use
up your computer hard disk space because a worm can replicate In great volume
and with great speed.
Phishing
Disguising as a trustworthy person or business, phishers attempt to steal
sensitive financial or personal Information through fraudulent email or Instant
messages. Phishing in unfortunately very easy to execute. You are deluded Into
thinking It's the legitimate mall and you may enter your personal information.
Page | 63
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)
Page | 64
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)
• Taking the time to research the basic aspects of computer security and educate
yourself on evolving cyber-threats
• Perform dally full system scans and create a periodic system backup schedule
to ensure your data Is retrievable should something happen to your computer.
Apart from these, there are many ways you can protect your computer system.
Aspects such as encryption and computer cleaners can assist In protecting your
computers and Its files.
E Governance
E-government is also known as e-gov, electronic government, Internet
governance, digital government, online government, connected government. As
of 2014 the OECD still uses the term digital government, and distinguishes it
from e-government in the recommendation produced there for the Network on
E-Government of the Public Governance Committee. Several governments have
started to use the term digital government to a wide range of services involving
contemporary technology, such as big data, automation or predictive analytics.
Page | 65
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)
Types of E Governance
E-Governance can be considered as the social inclusive policy for development
of transparency and accountability of both people in society and administration.
This policy involves providing the services to the people with collection of
information through the institutional and communicational development.
It provides quality services in several ways. Those ways are also called as types
of e-governance. These are mentioned below:
Page | 66
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)
Page | 67
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)
Government 2.0
Government 2.0 or Gov 2.0 refers to government policies that aim to harness
collaborative technologies and interactive Internet tools to create an open-
source computing platform in which government, citizens, and innovative
companies can improve transparency and efficiency. Put simply, Gov 2.0 is
about "putting government in the hands of citizens".Gov 2.0 combines
interactive Web 2.0 fundamentals with e-government and increases citizen
participation by using open-source platforms, which allow development of
innovative apps, websites, and widgets. The government's role is to
provide open data, web services, and platforms as an infrastructure.
Page | 68
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)
e-Governance Initiatives
From the early 90s, information technologies were supplemented by ICT
technologies to extend its use for sector-wide applications with policy emphasis
on reaching out to rural areas and taking in greater inputs from NGOs and
private sector.
Page | 70
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)
Quick Revision
1. ICT includes both old and new tools. Old ICT tools mainly include radio, TV,
and telephone. New ICT tools mainly include computers, satellite, wireless
technology, and the Internet. ICTs not only refer to the latest computer and the
Internet-based technologies but also refer simple audio-visual aids such as
transparencies, slides, cassette and video recorders, radio, television, and film.
3. Objectives of Using ICT in Higher Education The objectives of using ICT are the
following:
• Improving access to the system through online education.
• Improving the quality of teaching, especially across remote locations.
• Increasing transparency and strengthening Information and Communication
Technology systems, processes, and compliance norms in higher education
institutes.
• Measuring the students' learning participation and effectiveness.
• Analyzing students' behaviour to maximize students' involvement, optimizing
retentions, and improving placements.
• Analyzing students' performance, placement, application volume, website
analytics, and social media metrics for brand audit.
6. Line access and avoidance of collision are the main functions of: network
protocols
Page | 71
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)
7. In the hypermedia database, information bits are stored in the form of: nodes
Page | 72
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)
16. Online Collaborative Learning involves interaction between the learners and
the faculty members through the web. This interaction can occur in one of the
following modes
(i) synchronous interaction and
(ii) asynchronous interaction, which have been discussed earlier.
17. Distance Learning is a type of education, where students work on their own
at home or at office and communicate with the faculty and other students via e-
mail, electronic forums, video conferencing, chat rooms, instant messaging, and
other forms of computer-based communications. It is also known as open
learning.
19. In web search, finding a large number of documents with very little relevant
information is termed: poor recall
20. The concept of connect intelligence is derived from: value added networks
22. Video transmission over the internet that looks like delayed live casting is
called: real-time video
Page | 73
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)
31. The Internet Protocol Television (IPTV) is a digital TV (and not PC) that is
delivered through high-speed Internet (broadband) connection. In this service,
channels are encoded in IP format and delivered to the TV through a set-top box
that is required at the customer's location.
32. Registrar of Newspapers for India (RNI) came into being in 1956. It is
mandatory for all newspapers and magazines to get them registered with RNI.
Its head office is in New Delhi.
33. Press Information Bureau (PIB) is the nodal agency of the Government of
India to disseminate information to the print and electronic media on
government policies, programme initiatives, and achievements. It has its
headquarters in New Delhi and has eight regional offices.
34. The accounting software 'Tally' was developed by : TCS 35. Errors in
computer programmes are called: Bugs
39. Where does a computer add and compare its data?: CPU
Page | 74
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)
47. Analogue Computers are that in which data varies continuously, that is, the
movement of data is continuous. It is generally meant to measure physical
variables such as voltage, pressure, temperature, speed, and so on. It is mainly
used for communication and broadcast transmission.
48. Digital Computers are those computers in which data flow in discrete form.
These are high-speed programmable electronic devices that perform
mathematical calculations, compare values, and store the results.
49. A hybrid computer combines the desirable features of analogue and digital
computers. They combine the speed of analogue computers and accuracy of
digital computes. Now, analogue- to- digital and digital-toanalogue converters
are used for transforming data into suitable form for either type of computation.
50. Mainframe Computers can also process data at very high speed (million
instructions per second – MIPS). Mainframe computers are large sized,
powerful, multi-user computers that can support concurrent programs. They
can accommodate more than 1000 workstations simultaneously.
Page | 75
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)
51. Mini Computers have lesser speed and storage capacity in comparison to
mainframe computers. Hence, their performance also is less than that of
mainframes. They are mid-sized multiprocessing computers. They can perform
several actions at the same time and can support 4 to 200 users simultaneously.
Some of the features of mainframes are not available in minicomputers.
53. A peripheral device is any device that can be connected to a computer. This
term includes monitors, keyboards, mouse, webcams, drawing pads, joysticks,
modems, printers, scanners, interactive whiteboards, drive wheel and so on.
54. Input devices any device that is capable of inputting information into a
computer system, for example, keyboard, microphone, mouse, scanner,
webcam and so on.
55. Output devices are basically meant for anything that comes out of a
computer after being processed. These include monitor, headphone, printers,
speakers, plotters, and VDUs (visual display units).
56. Random Access Memory (RAM) is also termed as the main memory. It is the
temporary memory (volatile) that allows information to be stored randomly and
accessed quickly and directly (without the need to go through intervening data).
58. Primary storage consists of RAM and ROM. In primary memory, data are not
stored permanently, but temporarily. After getting off data are erased from the
memory of computer.
Page | 76
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)
60. Secondary memory devices include magnetic disks like hard drives and
floppy disks; optical disks such as CDs and CD-ROMs; and magnetic tapes, which
were the first forms of secondary memory.
62. System software provides the basic functions for computer usage and helps
to run the computer hardware and system. It includes a combination of devices,
drivers, operating systems, serves, utilities, and Windows systems. It manages
hardware devices. It is also responsible for resource allocation. The operating
system and utility software are the two major categories of system software.
65. A web browser is a software that permits a user, with the click of a mouse,
to locate, display, and download text, video, audio and graphics stored in a host
computer on the web.
66. The set of computer programs that manage the hardware/ software of a
computer is called: Operating System
67. S/MIME in internal technology stands for: Secure Multipurpose Internet Mail
Extension
69. The binary equivalent of (-19)10 in signed magnitude system is: 10010011
PRACTICE QUESTIONS
1. Read the following two statements.
I. Information and Communication Technology (ICT) is considered a subset of
Information Technology (IT).
II. The right to use' a piece of software is termed as copyright.
Which of the given statement(s) is/are correct?
(A) Both I and II
(B) Neither I nor II
(C) Only II
(D) Only I
3. Which of the following statements regarding the term ICT is/are TRUE?
P. ICT is an acronym that stands for Indian Classical Technology.
Q. Converging technologies that exemplify ICT include the merging of audio-
visual, telephone and computer networks through a common cabling system.
Select the correct answer using the codes given below.
(A) P and Q (B) Neither P nor Q
(C) Only P (D) Only Q
Page | 78
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)
7. Which of the following statements regarding the term generation is/are TRUE?
P. Third generation's computers have real time operating system.
Q. First generation's computers have time-sharing operating system.
Select the correct answer using the codes given below.
(A) Only P (B) Only Q
(C) Neither P nor Q (D) Both P and Q
8. Transistors are associated with which of the following?
(A) First generation (B) Fifth generation
(C) Second generation (D) None of these
11....... is not a microcomputer, which is least powerful, yet the most widely used
and fastest growing type of computers.
(A) Desktop computer
(B) Laptop
(C) Tablet PC
(D) Mainframe computer
Page | 79
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)
16.What is the temporary storage memory chips that form the computers primary
work space? The contents are lost if power is disrupted?
(A) Outputs (B) Windows
(C) ROM (D) RAM
17....... is a type of memory circuitry that holds the computer's start up routine.
(A) RIM (Read Initial Memory)
(B) RAM (Random Access Memory)
(C) ROM (Read Only Memory)
(D) Cache Memory
Page | 80
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)
20.Which of the following is the high speed memory which compensates the gap
in speeds of processor and main memory?
(A) Cache memory (B) PROM
(C) EPROM (D) SRAM
21.Put the following units of storage into the correct order, starting with the
smallest unit first and going down to the largest unit.
1. Kilobyte 2. Byte
3. Megabyte 4. Terabyte
6. Bit 5. Gigabyte
Choose the correct chronological order using the codes.
(A) 6, 2, 1, 3, 5, 4 (B) 6, 2, 1, 4, 3, 5
(C) 6, 2, 1, 3, 4, 5 (D) 6, 2, 1, 4, 5, 3
22.1 GB is equal to
(A) 2^30 bits (B) 2^30 bytes
(C) 2^20 bits (D) 2^20 bytes
23.Digital computers internally use the to represent data and perform arithematic
calculations.
(A) octal number system
(B) binary number system
(C) decimal number system
(D) hexa decimal number system
Page | 81
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)
27.It provides us with a shorthand method of working with binary numbers. What
does It here?
(A) Hexa decimal number system
(B) Decimal number system
(C) Binary number system
(D) None of the above
28.Which one of the following represents the binary equivalent of the decimal
number 25?
(A) 10101 (B) 01101
(D) 11011 (C) 11001
29.If the binary equivalent of the decimal /number 48 is 110000, then the binary
equivalent of the decimal number 51 is given by
(A) 110011
(B) 110010
(C) 110001
(D) 110100
Page | 82
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)
32.MSB refers as
(A) Most Significant Bit
(B) Many Significant Bit
(C) Multiple Significant Bit
(D) More Significant Bit
Page | 83
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)
37.It is the first program, runs on a computer, when the computer boots up
(A) System software
(B) Operating system
(C) System operations
(D) Processing system
Page | 84
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)
44.is a Windows utility program that locates and eliminates unnecessary fragment
and rearranges files and unused to disk space to optimise operations.
(A) Backup
(B) Disk cleanup
(C) Disk defragmenter
(D) Restore
45.Disk cleaner helps to free which also serves to increase the speed of a slow
computer.
(A) data (B) recycle bin
(C) spaces (D) information
46.Languages which can easily interact with the hardware are called
(A) high level languages
(B) low level languages
(C) middle level languages
(D) All of the above
Page | 85
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)
Page | 86
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)
61....... may be included in other folder while making hierarchical structure folder.
(A) Mini folder (B) Tiered folder
(C) Sub-folder (D) Object
Page | 87
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)
69........... are the building blocks or relation any relational database mode.
(A) Tables (B) Fields
(C) Queries (D) Forms
70.…….. are distinct items that don't have much meaning to you in a given
context.
(A) Fields (B) Data
Page | 88
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)
75.Which of the following places the common data elements in order from
smallest to largest?
(A) Character, File, Record, Field, Database
(B) Character, Record, Field, File, Database
(C) Character, Field, Record, File, Database
(D) Bit, Byte, Character, Record, Field, File, Database
Page | 89
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)
81.A(n) ...... area is a small group of computers and peripherals linked together in
a small geographic area.
(A) MAN (B) PAN
(C) CAN (D) LAN
83.There is a network that can connect networks ranging from small location or
area to a bigger range including public packet network and large corporate
networks. That network's enterprise allows users to share access to
applications, services and other centrally located resources. Its ability for a
huge geographical access has transformed networking. Which among the
following is that network?
(A) SAN (B) CAN
(C) LAN (D) WAN
Page | 90
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)
85.Choose the correct answer of the network according to their decreasing size of
extension/coverage.
(A) WAN, LAN, MAN, PAN
(B) WAN, MAN, LAN, PAN
(C) MAN, LAN, PAN, WAN
(D) MAN, PAN, WAN, LAN
87.The vast network of computers that connects millions of people all over the
world is called
(A) LAN (B) Web
(D) Internet (C) hypertext
Page | 91
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)
93.Protocol consists of ........., which suits are the set of communication protocols
used for the Internet.
(A) TCD/IT (B) TCP/IP
(C) TCP/IT (D) TCT/IP
Page | 92
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)
98.Which of the following is the communication protocol that sets the standard
used by every computer that accesses web-based information?
(A) XML (B) DML
(C) HTTP (D) HTML
101. is collection of web pages and is the very first of website. page that we
seen on opening
(A) Home page, web page
(B) Website, home page
(C) Web page, home page
(D) Web page, website
Page | 93
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)
(B) [email protected]
(C) 202-50-20-148
(D) 202-50-20-148
106. URL identifies the location of a specific web page on the Internet, here
URL stands for
(A) Uniform Read Locator
(B) Uniform Resource Locator
(C) Unicode Research Location
(D) United Research Location
108. Which one of the following is not the same as the other three?
(A) MAC address
(B) Hardware address
(C) Physical address
(D) IP address
Page | 94
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)
111. If you are allowing a person on the network based on the credentials to
maintain the security of your network, then this act refers to the process of
(A) authentication (B) automation
(C) firewall (D) encryption
115. A program designed to destroy data on your computer which can travel
to infect other computers, is called a
(A) disease (B) torpedo
(C) hurricane (D) virus
122. A person who uses his or her expertise to gain access to other people
computers to get information illegally or do damage is a
(A) spammer (B) hacker
(C) instant messenger (D) All of the above
123. ...... are often delivered to PC through an e-mail attachment and are
often designed to do harm.
(A) Viruses (B) Spams
Page | 96
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)
127. ......... primary objective is to control the incoming and outgoing network
traffic by analysing the data packets.
(A) Firewall (B) Password
(C) Antivirus (D) Phishing
129. A term used to describe the location or folder where E-mail is stored
before being sent.
(A) Inbox (B) Draft
(C) Outbox (D) Sent Items
Page | 97
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)
131. The online portal presents the list of all courses and related information
that can be accessed online.
(A) swayam.gov.in (B) ndl.itkgp.ac.in
(C) course.gov.in (D) None of these
132. It is a DTH channel service in which new academic content will be aired
by the universities and they will be regularly updated.
(A) Swayam (B) NDL
(C) Swayamprabha (D) NAD
133. On institution future plan, which of the following is correct matching?
List I List II
A. 15 year'vision 1. For immediate
improvement of the
quality of learning.
B. 7 year vision II. To work out medium
term plants to reach
there.
C. 3 year vision III. To determine where
the institution would like
to be.
Codes
ABC ABC
(A) I II III (B) II III I
(C) I III II (D) III II I
134. .....is an initiative of the UGC that provides an online store house of all
academic awards i.e. certificates, diplomas etc.
(A) National Academic Depository
(B) National Digital Library
(C) Swayam
(D) Swayamprabha
Page | 98
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)
138. Which of the following require technology experts to curb the electronic
cyber crimes?
(A) Police (B) Expert police
(C) Cyber police (D) None of the above
139. ......... can help to enable the true democratic process including voting,
public opinion, feedback and Government accountability.
(A) IT (B) ICT
(C) NDL (D) NAD
140. Which of the following aims to reduce the reaction time of the
government to the people's queries and problems?
(A) e-Registration (B) e-Help
(C) e-Governance (D) e-Health
Page | 99
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)
142. DMS and workflow technologies are usually used in those departments
where there is a lack of workforce. What does DMS stand for?
(A) Data Management Service
(B) Document Management Service
(C) Document Management System
(D) Data Management System
144. Which of the following correctly lists computer memory types from
highest to lowest speed ?
(A) Secondary Storage; Main Memory (RAM); Cache Memory; CPU Registers
(B) CPU Registers; Cache Memory; Secondary Storage; Main Memory (RAM)
(C) CPU Registers; Cache Memory; Main Memory (RAM); Secondary Storage
(D) Cache Memory; CPU Registers; Main Memory (RAM); Secondary Storage
Page | 100
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)
147. DVD technology uses an optical media to store the digital data. DVD is an
acronym for
(A) Digital Vector Disc
(B) Digital Volume Disc
(C) Digital Versatile Disc
(D) Digital Visualization Disc
149. If the binary equivalent of the decimal number 48 is 110000, then the
binary equivalent of the decimal number 51 is given by
(A) 110011 (C) 110001
(B) 110010 (D) 110100
152. ________ is a type of memory circuitry that holds the computer’s start-
up routine.
(A) RIM (Read Initial Memory)
(B) RAM (Random Access Memory)
(C) ROM (Read Only Memory)
(D) Cache Memory
Page | 101
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)
158. Which of the following enables us to send the same letter to different
persons in MS Word
(A) Mail join (C) Mail insert
(B) Mail copy (D) Mail merge
Page | 102
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)
163. Which one of the following represents the binary equivalent of the
decimal number 25 ?
(A) 10101 (C) 11001
(B) 01101 (D) 11011
168. gif. jpg, bmp, png are used as extensions for files which store
(A) audio data (C) video data
(B) image data (D) text data
Page | 103
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)
172. Which one of the following is not. the same as the other three ?
(A) MAC address
(B) Hardware address
(C) Physical address
(D) IP address
175. Which one of the following is not a/an image/graphic file format ?
(A) PNG
(B) GIF
(C) BMP
(D) GUI
Page | 104
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)
(D) Twitter
180. A hard disk is divided into tracks which is further subdivided into
(A) Clusters
(B) Sectors
(C) Vectors
(D) Head
Page | 105
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)
191. Each character on the keyboard of computer has an ASCII value which
stands for
(A) American Stock Code for Information Interchange
(B) American Standard Code for Information Interchange
Page | 106
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)
193. Minimum number of bits required to store any 3 digit decimal number is
equal to
(A) 3 (C) 8
(B) 5 (D) 10
Page | 107
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)
201. IPv4 and IPv6 are addresses used to identify computers on the internet.
Find the correct statement out of the following :
(A) Number of bits required for IPv4 address is more than number of bits required
for IPv6 address.
(B) Number of bits required for IPv4 address is same as number of bits required
for IPv6 address.
(C) Number of bits required for IPv4 address is less than number of bits required
for IPv6 address.
(D) Number of bits required for IPv4 address is 64.
203. Which one of the following represent the binary equivalent of the
decimal number 23 ?
(A) 01011
(B) 10111
(C) 10011
(D) None of the above
Page | 108
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)
211. A compiler is used to convert the following to object code which can be
executed
(A) High-level language
(B) Low-level language
(C) Assembly language
(D) Natural language
212. What do you need to put your web pages on the www ?
Page | 109
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)
217. Which one of the following is not an Internet Service Provider (ISP) ?
(A) MTNL
(B) BSNL
(C) ERNET India
(D) Infotech India Ltd.
218. 1 GB is equal to
(A) 2^30 bits (C) 2^20 bits
(B) 2^30 bytes (D) 2^20 bytes
Page | 110
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)
Page | 111
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)
226. Which one of the following processes is the main task for the computer
in mapping the geographical data?
(A) Data storage
(B) Data visualization
(C) Data retrieving and drawing
(D) Data Collection
229. Most World Wide Web pages contain commands in the language
_______________
(A) NIH (C) HTML
(B) URL (D) IRC
Page | 112
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)
234. Which of the following statements, regarding the term ICT is/are TRUE ?
P : ICT is an acronym that stands for Indian Classical Technology.
Q : Converging technologies that exemplify ICT include the merging of audio-
visual, telephone and computer networks through a common cabling system.
(A) P only
(B) Q only
(C) P and Q
(D) Neither P nor Q Answer
235. A new Laptop has been produced that weighs less, is smaller and uses
less power than previous Laptop models. Which of the following technologies
has been used to accomplish this ?
(A) Universal Serial Bus Mouse
(B) Faster Random Access Memory
(C) Blu Ray Drive
(D) Solid State Hard Drive
236. Given the following email fields, which of the email addresses will
‘swami’ be able to see when he receives the message ?
To… [email protected]
Cc… [email protected]; [email protected]
Bcc… [email protected]; [email protected]
(A) [email protected]
(B) [email protected]; [email protected]; [email protected]
(C) [email protected]; [email protected]
(D) [email protected]; [email protected]; [email protected]; [email protected]
Page | 113
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)
237. Put the following units of storage into the correct order, starting with
the smallest unit first and going down to the largest unit :
(a) Kilobyte (b) Byte
(c) Megabyte (d) Terabyte
(e) Gigabyte (f) Bit
Give your answer from the following code :
(A) (f), (b), (a), (c), (d), (e)
(B) (f), (b), (a), (d), (e), (c)
(C) (f), (b), (a), (c), (e), (d)
(D) (f), (b), (a), (d), (c), (e)
Page | 114
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)
(C) URL
(D) Domain
246. Which of the following file format is not a video file format?
(A) .AVI (C) .MP4
(B) .MOV (D) .JPEG
Page | 115
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)
248. A computer has a main memory of 960 Kbytes. What is the exact
number of bytes contained in this memory?
(A) 960 × 8
(B) 960 × 1000
(C) 960 × 1024
(D) 960 × 1024 × 1024
249. The convenient place to store contact information for quick retrieval in
email is:
(A) Address box (C) Address book
(B) Message box (D) Message book
251. Jatin’s laptop has an LCD screen. The acronym LCD stands for:
(A) Light Crystal Display
(B) Liquid Compact Display
(C) Light Compact Display
(D) Liquid Crystal Display
253. Which was the first company to launch mobile phone services in India ?
(A) Essar (C) Hutchison
(B) BPL (D) Airtel
Page | 116
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)
Page | 117
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)
(B) Multifacet
(C) Multimedia
(D) Multiprocess
Page | 118
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)
268. The ‘brain’ of a computer which keeps peripherals under its control is
called :
(A) Common Power Unit
(B) Common Processing Unit
(C) Central Power Unit
(D) Central Processing Unit
272. The process of laying out a document with text, graphics, headlines and
photographs is involved in
(A) Deck Top Publishing
(B) Desk Top Printing
(C) Desk Top Publishing
(D) Deck Top Printing
Page | 119
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)
(B) 2 only
(C) Both 1 and 2
(D) Neither 1 nor 2
275. Which of the following given statements is/are not true about India’s
supercomputer Param Siddhi?
1. It is ranked 3rd among top 500 most powerful non-distributed computer
systems in the world.
2. It has been developed under the National Supercomputing Mission.
Which of the given statements is/are correct?
(A) 1 only
(B) 2 only
(C) Both 1 and 2
(D) Neither 1 nor 2
Page | 121
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)
Page | 122
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)
Page | 123
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)
7. Given below are two statements, one is labeled as Assertion A and the
other is labeled as Reason R
Assertion A:- VisiCalc, the first spreadsheet software application, is a
commonly cited example of one of the first killer applications.
Reason R:- VisiCalc helped in bringing PCs into the business realm.
choose the correct answer from the options given below
A. A is false but R is true
B. A is true but R is false
C. Both A and R are true and R is the correct explanation of A
D. Both A and R are true but R is NOT the correct explanation of A
9. Which of the following statements about desktop and laptop computers are
TRUE?
A. Most modern laptop computers have built-in webcams
B. Desktop computers are not very portable
C. All desktop computers have built-in touchpad
D. Laptop computers are rarely supplied with a mouse
Choose the correct answer from the options given below:
A. A, B and D only
B. A, B and C only
C. A, B, C and D
D. B, C and D only
Page | 124
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)
10.Given below are two statements, one is labelled as Assertion A and the
other is labelled as Reason R
Assertion A: - A good computer networking solution can be very much
beneficial for your business.
Reason R: - With computer networking, you can cut back on costs and allow
for efficient use of resources.
In light of the above statements, choose the correct answer from the options
given below:
A. A is false but R is true
B. A is true but R is false
C. Both A and R are true and R is the correct explanation of A
D. Both A and R are true but R is NOT the correct explanation of A
Page | 125
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)
D. A - III, B - II, C - I, D – IV
Page | 126
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)
(D) Pentium-III
Choose the correct answer from the options given below :
A. (D), (C), (B), (A)
B. (C), (D), (A), (B)
C. (C), (D), (B), (A)
D. (B), (D), (C), (A)
Page | 127
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)
C. Magnetic Tape
D. Floppy Disk
Choose the correct answer from the options given below
A. A, B, C, D
B. A, B, D, C
C. A, C, D, B
D. B, A, D, C
21.With respect to computer storage devices, which of the following is/are
magnetic storage device(s)?
A. CD-R
B. DVD-RW
C. Flash memory stick
D. External Hard Drive
Choose the correct answer from the options given below:
A. A and B only
B. C and D only
C. C only
D. D only
22.What type of non-volatile memory would most likely store firmware, like a
computer's BIOS?
A. EEPROM
B. Hard Disk
C. RAM
D. Tape Drive
Page | 128
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)
24.What is a blog?
A. Internet
B. Online journal
C. Personal website in the form of a journal
D. Search engine
Page | 129
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)
29.Data of research take the forms of words or pictures with the researcher as
the key instrument in which of the following studies?
A. Participant observation based Studies
B. Ex Post Facto Studies
C. Experimental Studies
D. Descriptive survey Studies
Page | 130
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)
2. Python is a/an
(i) Programming language
(ii) Operating system
(iii) Search engine
(iv) Snake
Choose the correct answer from the options given below:
(A) (ii) only
(B) (i) only
(C) (ii) and (iii) only
(D) (iii) and (iv) only
4. Given below are two statements, one is labelled as Assertion A and the
other is labelled as Reason R
Assertion A : E-commerce companies require personal data to serve the
stakeholders better. Reason R : It In this process, privacy may get
compromised.
In light of the above statements, choose the most appropriate answer from the
options given below
(A) Both A and R are correct and R is the correct explanation of A
(B) Both A and R are Correct but R is NOT the correct explanation of A
(C) A is correct but R is not correct
(D) A is not correct but R is correct
Page | 131
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)
5. Multimedia comprises of
(A) Text and Audio
(B) Video and Audio
(C) Video only
(D) Text, Audio and Video
8. Given below are two statements, one is labelled as Assertion A and the
other is labelled as Reason R
Assertion A: Use of ICT is justified during teaching with a view to optimize
learning outcomes Reason R: Learning outcomes are contingent on use of ICT
during teaching In light of the above statements,
Page | 132
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)
choose the most appropriate answer from the options given below
(A) Both A and R are correct and R is the correct explanation of A
(B) Both A and R are correct but R is NOT the correct explanation of A
(C) A is correct but R is not correct
(D) A is not correct but R is correct
Page | 133
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)
17.The scope for employing ICT support is relatively more in which of the
following stages of research?
a. Problem formulation
b. Hypo thesis making
c. Data collection
d. Data analysis
e. Data interpretation
Choose the correct answer from the options given be low:
(A) a and b only
(B) b and d only
(C) c and d only
(D) d and e only
Page | 134
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)
Page | 135
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)
(D) dpi
24.Given below are two statements, one is labelled as Assertion A and the other is
labelled as Reason R
Assertion A: Machine Learning requires good quality and sufficient data to t
rain and test the algorithm
Reason R: For correct classification, good quality data which is free from noise,
and sufficient data is required for training and testing of the algorithm
In light of the above statements, choose the most appropriate answer from the
options given below
(A) Both A and R are correct and R is the correct explanation of A
(B) Both A and R are correct but R is NOT the correct explanation of A
(C) A is correct but R is not correct
(D) A is not correct but R is correct
27.Which of the following correctly lists computer memory types from lowest
to highest speed?
(A) Main Memory, Cache Memory, Secondary Storage
(B) Cache Memory, Secondary Storage, Main Memory
(C) Secondary Storage, Main Memory, Cache Memory
(D) Secondary Stage, Cache Memory, Main Memory
Page | 136
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)
(b).Video (ii).mp3
(c).Audio (iii).jpeg
(d).Word processing (iv). mpeg
Choose the correct answer from the options given below:
(A) a - i, b - ii, c - iii, d - iii
(B) a - iii, b - iv, c - ii, d - i
(C) a - ii, b - iii, c - iv, d - i
(D) a - i, b - iv, c - iii, d – ii
1. Video conferencing
2. Email
3. Forums
4. Instant messaging
Choose the correct optione
(A) (1) and (3) (B) (2) and (4)
(C) (2) and (3) (D) (1) and (4)
2 Select the option that includes file formats suitable for distributing sound
files across the Internet
(A) www, mp4, wma, mp3 ales
(B) avi, midi, wav, mp3 a
(C) avi, mov, wmv, mp3 boriti
(D) inidi, wav, wma, mp3
Page | 138
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)
8 Select the option that lists components for cyberspace address (URL) in
the correct order from beginning to end?
(A) Protocol, domain name of the host, path/file
(B) Path/file, protocol, domain name of th-host
(C) Protocol, path/file, domain name of th: host
(D) Domain name of the host, protocol, path/file
Page | 139
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)
12 What is SWAYAM?
(A) Non-Governmental organisation
(B) Digital programme to achieve the principles of education
(C) on line platform
(D) Name of a web site
Page | 140
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)
2. Recipients in the Cc: field can see the email addresses that are in the To: and
BCC : fields
3. Recipients in the Bec: field can see the email addresses that are in the To: and
CCc: fields
4. Only the recipients in the Cc: field can see
the other email addresses in the Bcc : field
(A) 1 (B) 2 (C) 3 (D) 4
17 Software that you can download for free, but have to pay to continue its
use after a trial period is called
1. Public domain software
2. Freeware
3. open source software
4. shareware Options
(A) 1 (B) 2 (C) 3 (D) 4
19 A terabyte is equal to
(A) 1024 megabytes (B) 1024 kilobytes
Page | 141
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)
24. Which one of the following is not part of suite of products of Microsoft
Office?
(A) Microsoft Excel (B) Microsoft PowerPoint
(C) Microsoft Publisher (D) Microsoft Window
Page | 142
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)
27 Bluetooth is an example of
(A) PAN (B) LAN
(C) MAN (D) WAN
29 A new laptop has been produced that weigh less, is smaller and uses less
power than previous laptop models,
Which of the following technologies has been used to accomplish this too
(A) Universal Serial Bus Mouse
(B) Faster Random Access Memory
(C) Blue Ray Drive Motor
(D) Solid State Hard drive mere
30 Given the following email fields, which of the email addresses will swami
be able to see when he receives the massage
To.... ram@test. com
Cc... a raj@test. com; ravi@test. com
Bcc... [email protected];[email protected]
(A) [email protected]
(B) [email protected]; [email protected];
[email protected] tono v
(C) [email protected]; [email protected]
(D) [email protected]; [email protected];
[email protected]; [email protected]
31 Put the following units of storage into the correct order, starting with the
smallest unit first and going down to the largest unit.
(a) Kilobyte (b) byte
Page | 143
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)
Page | 144
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)
40 Which of the following correctly lists the types of the computer memory
from highest to lowest speed?
(1) Secondary storage
(ii) Main memory (RAM)
(iii) Cache memory
(iv) CPU registers anos 2001
Codes
(A) (i), (ii), (iii), (iv) (B) (iv), (iii), (i), (ii)
(C) (iv), (iii), (ii), (i) (D) (iii), (iv), (ii), (i)
43 DVD technology uses an optical media to store the digital data. DVD is an
acronym for
(A) Digital Vectors Disco
(B) Digital Volume Disc
(C) Digital Versatile Disc
(D) Digital Visualization Disc
Page | 146
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)
Page | 147
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)
Page | 148
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)
65 The terms gif, jpmg, bmp, png are used as extensions for files which store
(A) audio data (B) image data
(C) video data (D) text data
70 Which one of the following is not the same as the other three
(A) MAC address (B) Hardware address
(C) Physical address (D) IP address
Page | 149
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)
Page | 150
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)
Page | 151
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)
A D B A D C D B C A
221 222 223 224 225 226 227 228 229 230
A D B D A C C B C C
231 232 233 234 235 236 237 238 239 240
B D A B D B C B C A
241 242 243 244 245 246 247 248 249 250
B C C D A D C B C A
251 252 253 254 255 256 257 258 259 260
D C D B C D B C A B
261 262 263 264 265 266 267 268 269 270
C B B B A A C D C A
271 272 273 274 275 276 277 278 279 280
D C A B B C B D C B
Page | 152