0% found this document useful (0 votes)
12 views

What Is ICT: Information and Communication Technology (Ict)

Uploaded by

shireen4844
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
12 views

What Is ICT: Information and Communication Technology (Ict)

Uploaded by

shireen4844
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 152

UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)

INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)


ICT stands for Information and Communication Technology. The term gives a
broader meaning to Information Technology (IT). IT refers to all
communication technologies that are the tools to access, retrieve, store,
transmit and modify information digitally.

ICT can be defined as all the digital devices, tools, content and resources which
are used to achieve the goals of teaching-learning process as we as
management of the education system. 11
ICTs can be divided into two components as
(i) Information Technology (IT) refers to the hardware and software of
information collection, storage, processing and presentation.
(ii) Information and Communication Infrastructure (ICI) refers to physical tele-
communications systems and networks and the services that utilize ICT tools.

What is ICT
ICTs are also used to refer to the convergence of media technology such as audio-visual and
telephone networks with computer networks, by means of a unified system of cabling
(including signal distribution and management) or link system. However, there is no
universally accepted definition of ICTs considering that the concepts, methods, and tools
involved in ICTs are steadily evolving on an almost daily basis.

COMPONENT OF ICT
1. E-mail – Refers to ICT in online communication
2. E-commerce – /Refers to ICT in business
3. Online Banking – Refers to ICT in banking
4. E-government – Refers to ICT in governance
5. E-learning – Refers to ICT in learning
6. Data
7. Hardware
8. Software
9. Information

Internet And Its Services


The Internet has gained popularity and emerged as an important and efficient
means of communication. The idea of introducing the Internet was to allow
millions of people to share information and ideas, sound, video clips using their
computers across the world. The Internet is a world wide network of networked
computers those are able to exchange information with each other.

Page | 1
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)

Internet
Internet stands for International Network, which began in 1950's by Vint Cerf
known as the Father of Internet. Internet is a 'network of networks that consists
millions of private and public networks of local to global scope. Basically,
network is a group of two or more computer systems linked together.

The Internet, sometimes called simply "the Net," is a worldwide system of


computer networks -- a network of networks in which users at any one computer
can, if they have permission, get information from any other computer (and
sometimes talk directly to users at other computers). It was conceived by the
Advanced Research Projects Agency (ARPA) of the U.S. government in 1969 and
was first known as the ARPANET. The original aim was to create a network that
would allow users of a research computer at one university to "talk to" research
computers at other universities. A side benefit of ARPANet's design was that,
because messages could be routed or rerouted in more than one direction, the
network could continue to function even if parts of it were destroyed in the
event of a military attack or other disaster.

History of Internet
In 1969, the University of California at Los Angeles, the University of Utah were
connected as the beginning of the ARPANET (Advanced Research Projects
Agency Network) using 50 kbits circuits. It was the world's first operational
packet switching network. The goal of this project was to connect computers at
different universities and U.S. defence.

In mid 80's another federal agency, the National Science Foundationi, created a
new high capacity network called NSFnet, which was more capable than
ARPANET. The only drawback of NSFnet was that it allowed only the academic
research on its network and not any kind of private business on it. So, private
organisations and people started working to build their own networks, which
were later interconnected with ARPANET and NSFnet to form the Internet

Advantages of the Internet


The advantages of the Internet are as follows
(i) Allows you to easily communicate with other people.
(ii) Global reach enables one to connect anyone on the Internet.
(iii) Publishing documents on the Internet saves paper,
(iv) A valuable resource for companies to advertise and conduct business,

Page | 2
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)

(v) Greater access to information reduces research times.

Disadvantages of the Internet


The disadvantages of the Internet are as follows
I. It is a major source of computer viruses.
II. Messages sent across the Internet can be easily intercepted and are open to
abuse by others.
III. Much of the information is not checked and may be incorrect or irrelevant.
IV. Unsuitable and undesirable material available that sometimes are used
by notorious people such as terrorists.
V. Cyber frauds may take place involving Credit/Debit card numbers and details.

Internet Connections
Bandwidth and cost are the two factors that help you in deciding which Internet
connection is to use. The speed of Internet access depends on the bandwidth.
Some of the Internet connections available for Internet access are as follows
Dial-Up Connection A Dial-up is a method of connecting to the Internet using an
existing telephone.

Dial-up connection
uses the telephone line to connect to the Internet. When a user initiates a dial-
up connection, the modem dials a phone number of an Internet Service Provider
(ISP) that is designated to receive dial-up calls. The ISP then establishes the
connection, which usually takes about ten seconds and is accompanied by
several beeping and buzzing sounds

Broadband Connection
The term broadband commonly refers to high speed Internet access that is
always on and faster than the traditional dial-up access. It uses a telephone line
to connect to the Internet. Broadband access allows users to connect to the
Internet at greater speed than a standard 256 KB modem or dial-up access.
Broadband includes several high speed transmission technologies such as
follows
1. Digital Subscriber Line (DSL) It is a popular broadband connection. It provides
Internet access by transmitting digital data over the wires of a local telephone
network. DSL is the most common type of broadband service. It uses the existing
copper telephone limes.

Page | 3
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)

2. Cable Modem This service enables cable operators to provide broadband using
the same co-axial cables that deliver pictures and sound to your TV set. Most
cable modems are external devices that have two connections, one to the cable
wall outlet and the other to a computer. They provide transmission speed of 1.5
Mbps or more.
3. Broadband over Power Line (BPL) BPL is the delivery of broadband over the
existing low and medium voltage electric power distribution network. BPL is
good for areas, where there are no other broadband connections, but power
infrastructure exists. e.g. Rural areas.

Wireless Connection
Wireless broadband connects a home or business to the Internet using a radio
link between the customer's location and the service provider's facility. Wireless
broadband can be mobile or fixed. Unlike DSL and cable, wireless broadband
requires neither a modem nor cables. It can be easily established in areas, where
it is not feasible to deploy DSL or cable.
Some ways to connect the Internet wirelessly are as follows

1. Wireless Fidelity (Wi-Fi) It is a universal wireless networking technology


that utilises Radio frequencies to transfer data. Wi-Fi allows high speed Internet
connections without the use of cables or wires. Wi-Fi networks can be use for
public Internet access at 'hotspot' such as restaurants, coffee shops, hotels,
airports, convention centers and city parks.

2. Worldwide Interoperability for Microwave Access (WiMAX)


It is one of the hottest broadband wireless technologies around today. WiMAX
systems are expected to deliver broadband access services to residential and
enterprise customers in an economical way.
WiMAX has the ability to provide service even in areas that are difficult for wired
infrastructure to reach and the ability to overcome the physical limitations
of traditional wired infrastructure.

3. Mobile Wireless Broadband Services These services are also


becoming available from mobile telephone service providers and others. These
services are generally appropriate for mobile customers and require a special PC
card with a built-in antenna that plugs into a user's computer. Generally, they
provide lower speeds in the range of several hundred kbps.

Page | 4
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)

Intranet is a private network for Internet tools, but available within an


organisation, In large organisation, Intranet allows an easy access to corporate
information for employees,

Extranet is a private network that uses the Internet protocol and the public
telecommunication system to security share part of a business information,

Podcast is a programme either talk numeric that is made available in digital


format for automatic download over the Internet,

Interconnecting Protocols
A protocol is a set of rules that govern data communications. A protocol defines
what is communicated, how it is communicated and when it is communicated.
Generally, some of protocols used to communicate via an Internet are as follows

1. Transmission Control Protocol/Internet Protocol (TCP/IP)


The details of TCP/IP are as follows
(a) Transmission Control Protocol (TCP) It provides reliable transport service,
i.e. it ensures that message sent from sender to receiver is properly routed. TCP
converts messages into a set of packets at the source which are then
reassembled back into messages at the destination.
(b) Internet Protocol (IP) It allows different computers to communicate by
creatmsa network of networks. IP handles the dispatch of packets over the
network. It maintains the addressing of packets with multiple standards. Each IP
packet must contain the source and the destination addresses.
Note An IP address is 32 bit number.

2. File Transfer Protocol (FTP) It can transfer


files between any computers that have an Internet connection and also works
between computers using totally different operating systems. Some examples
of FTP software are FileZilla, Kasablanca, gFTP, konqueror, etc.

3. HyperText Transfer Protocol (HTTP)


HTTP defines how messages are formatted and transmitted and what actions
should be taken by the Web servers and browsers in response to various
commands.
HyperText Markup Language (HTML) It is used for designing Web pages. A
markup language is a set of markup (angular bracket, <>) tags which tells the

Page | 5
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)

Web browser how to display a Web page's words and images for the user. Each
individual markup code is referred to as an element or tag.

4. Telnet Protocol
Telnet is a program that runs on the computer and connects PC to a server on
the network. The protocol used on the Internet or Local Area Network, Telnet
session will started by entering valid username and password,

5. Usenet Protocol
The usenet service allows a group of Internet users to exchange their
views/ideas and information on some common topic that is of interest to all the
members belonging to that same group. Several such groups exist on the
Internet are called newsgroups. Usenet has no central server or administration.

6. Point-to-Point Protocol (PPP)


PPP is a dial account which puts your computer directly on the Internet. A
modem is required for such connection which transmits the data 9600 bits per
second.

7. Simple Mail Transfer Protocol (SMTP)


It is the standard protocol for E-mail services on a TCP/IP network. It provides
the ability to send and receive E-mail message.) Internet and Its Services

8. Wireless Application Protocol (WAP)


A WAP browser is a commonly used Web browser for small mobile devices such
as ce phones.

9. Voice over Internet Protocol (VoIP)


It allows delivery of voice communication ove ‘IP' Internet Protocol networks.
e.g. IP calls.

Terms Related to Internet World Wide Web (WWW)


WWW was introduced on 13th March, 1989. The world wide web is a system of
Internet servers that supports hypertext and multimedia to access several
Internet protocols on a single interface.
The world wide web is often abbreviated as the Web or WWW. The world wide
web is a way of exchanging information between computers on the Internet.

Page | 6
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)

Web Page
The backbone of the world wide web is made of files, called pages or Web pages,
containing information and links to resources - both text and multimedia -
throughout the Internet. It is created using HTMD. There are basically two main
types of web page as static and dynamic. The main or first page of a Website is
known as home page.

Website
A group of Web pages that follow the same theme and are connected together
with hyperlinks is called Website. In other words, “A Website is a collection of
digital documents, primarily HTML files, that are linked together and that exist
on the Web under the same domain,"
e.g. http://www.carwale.com is a Website while
http://www.carwale.com/new/ is a Web page.

Web Browser
It is a software application that is used to locate) retrieve and also display
content on the world wide web, including Web pages. Web browsers are
programs used to explore the Internet. We can install more than one Web
browser on a single computer. The user can navigate through files, folders and
Websites with the help of a browser.
There are two types of Web browsers as follows
1. Text Web Browser) A Web browser that displays only text-based information is
known as text Web browser. e.g (Lynx, which provides access to the Internet in
the text mode only.
2. Graphical Web Browser A Web browser that supports both text and graphic
information is known as graphical Web browser. e.g. Internet Explorer, Firefox,
“Netscape, Safari, Google Chrome and Opera.
Note The first graphical Web browser was NCSA Mosaic.

Web Server
The Web browser is a client that requests HTML files from Web servers. The
server computer will deliver those Web pages to the computers that request
them and may also do other processing with the Web pages. Every Web server
that is connected to the Internet is given a unique address, i.e. IP address made
up of a series of four numbers between 0 to 255 separated by periods. e.g.
Apache HTTP Server, Internet Information Services (IIS), Lighttpd, etc.

Web Address and URL


Page | 7
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)

A Web address identifies the location of a specific Web page on the Internet,
such as http://www.learnyoga.com, On the Web, Web addresses are called
URLS, URL stands for (Uniform Resource Locator.

It is the Web address for a Website or a Web page. Tim Berners Lee created
the first URL in 1991 to allow the publishing of hyperlinks on the world wide
web, e.g. "http://www.google.com/services/index.htm
hulp://n - Protocol identifier
Www - World Wide Web
google.com - Domain name
/services/ -Directory
index.htm -Web page

Domain Name
Domain is a group of network resources assigned to a group of users. A domain
name is a way to identify and locate computers connected to the Internet. A
domain name must be unique. It always have two or more parts, separated by
period/dot (-). e.g. google.com, yahoo.com, etc.

Domain Abbreviation

Page | 8
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)

Domains are organised by the type of organisations and by country. A three-


letter abbreviation indicating the organisation and usually two-letter
abbreviation indicating the country name.
Most common domain-abbreviations for organisation are as follows
.info Informational organisation
.com Commercial
.gov Government
.edu Educational
.mil Military
.net Network resources
.org Non-profit organisation

Some domain abbreviations for country are as follows


.in India Australia
.au Australia
.fr France
.nz New Zealand United Kingdom
.uk United Kingdom

Domain Name System (DNS)


DNS stores and associates.many types of information with domain names, but
most importantly, it translates domain names (computers host names) to IP
addresses. It also lists mail exchange servers accepting E-mail for each domain.
DNS is an essential component of contemporary Internet use

Blogs
A blog is a Website or Web page in which an individual records opinions, links to
other site, oi regular basis, A typical blog combines text, images, and links to
other blogs, web pages and other media related to its topic.
Most blogs, are primarily textual, although some focus on art, photographs,
videos, music and audio. These blogs are referred to as edublogs. The entries of
blog is also known as posts.) Newsgroups
An area on a computer network especially the Internet, devoted to the
discussion of a specified topic is known as Newsgroup
Online discussion group that allows interaction through electronic bulletin
board system and chat sessions

Page | 9
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)

Search Engine
It is a Website that provides the required data on specific topics.
Search engines turn the Web into a powerful tool for finding
information on any topic.
When a search engine returns the links to web pages corresponding
to the keywords entered is called a hit, otherwise called a míss. Many
search engines also have directories or lists of topics that are
organised into categories. Browsing these directories, is also a very
efficient way to find information on a given topic.

Here are some of the most popular search engines


Google http://www.google.com
AltaVista http://www.altavista.com
Yahoo http://www.yahoo.com
Hotbot http://www.hotbot.com
Lycos http://www.lycos.com
Excite http://www.excite.com
WebCrawler http://www.webcrawler.com

Services of Internet
An Internet user can access to a wide variety of services such as electronic mail,
file transfer, interest group membership, multimedia displays, real-time
broadcasting, shopping, etc. Some of the important services provided by the
Internet are briefed in the following sections

Chatting
It is the online textual or multimedia conversation. It is widely interactive text-
based communication process that takes place over the Internet. Chatting, i.e.
a virtual means of communication that involves the sending and receiving of
messages, share audio and video between users located in any part of the world.
e.g. Skype, Yahoo, Messenger, etc.

E-mail (Electronic mail)


E-mail is an electronic version of sending and receiving letter. Electronic mail lets
you send and receive messages in electronic form.

Page | 10
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)

E-mail is transmitted between computer systems, which exchange messages or


pass them onto other sites according to certain Internet protocols or rules for
exchanging E-mail. To use E-mail, a user must have an E-mail address. Emoticons
or smileys are used in an E-mail to express emotions or feelings clearly. Storage
area for E-mail messages is called mail box.
E-mail address consists of two parts separated by @ symbol – the first part is
user name and the second part is host name (domain name). However, spaces
are not allowed within the E-mail address. e.g. [email protected] Here,
arihantbooks is a username and gmail.com is a host name,

Video Conferencing
It is a communication technology that integrates video and audio to connect
users anywhere in the world as if they were in the same room. This term usually
refers to communication between three or more users who are in atleast two
locations. Each user or group of users who are participating in a video
conference typically must have a computer, a camera, a microphone, a video
screen and a sound system,

E-learning
E-learning (Electronic Learning) refers to the electronic mode of delivering
learning, training or educational programs to users. It is the mode of acquiring
knowledge by means of the Internet and computer based training programs.

E-banking
E-banking (Electronic Banking) is also known as Internet Banking or Online
Banking.
E-banking means any user with a personal computer and a browser can get
connected to his bank's Website to perform any of the virtual banking functions.
All the services that the bank has permitted on the Internet are displayed in
menu.

E-shopping
E-shopping (Electronic Shopping) or online shopping is the process of buying
goods and services from merchants who sell on the Internet.
Books, clothing, household appliances, toys, hardware, software and health
insurance are just some of the hundreds of products, consumers can buy from
an online store. Some E-shopping sites are Naaptol, Flipkart, Yebbi, Homeshop
18, etc.

E-reservation

Page | 11
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)

E-reservation (Electronic Reservation) means making a reservation for a service


via Internet. You need not personally go to an office or a counter to
book/reserve railways, airways tickets, hotel rooms, tourist packages, etc.
Examples of E-reservation sites are as follows
(i) www.irctc.com
(ii) www.makemytrip.com onward
(iii) www.yatra.com
(iv) www.bookingsite.com

Social Networking
It is the use of Internet based social media programs to make connections with friends, family,
classmates, customers, clients etc. It can occur for social purposes, business purposes or
both.
Social networking has grown to become one of the largest and most influential components
of the web. The most popular social networking sites are Facebook, MySpace, Orkut, etc.
Note Facebook was developed by Mark Zuckerberg.

E-commerce
E-commerce (Electronic Commerce) includes sharing business information,
maintaining business relationships and conducting business transactions by
means of telecommunication networks or process of trading goods over the
Internet. Electronic Data Interchange (EDI) is the electronic transfer of a
business transaction between sender or receiver computer.
Note E-trading is the process of trading the goods and items
over the Internet.

M-commerce
M-commerce (Mobile Commerce) provides the application for buying and
selling goods or services through wireless Internet enabled handheld devices. It
involves new technologies, services and business models.

ICT is a common term which refers to the technologies us collecting, storing,


editing and communicating information 112 varte formats. It includes all
communication devices or applicatious radio, TV, cellular phones, computers,
networks, satellite system assus on. ICT plays a vital role in the current and
future development society and nation.
ICT can be defined as all the digital devices, tools, content and resources which
are used to achieve the goals of teaching-learning process as we as management
of the education system.
ICTs can be divided into two components as

Page | 12
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)

i. Information Technology (IT) refers to the hardware and software of information


collection, storage, processing and presentation.
ii. Information and Communication Infrastructure (ICI) refers to physical tele-
communications systems and networks and the services that utilize ICT tools.

Components of ICT
There are 6 most common components that make up an ICT system:
• Data It includes raw facts/figures/ statistics.
• Hardware It contains physical components in a computer or peripherals such as
input/ output devices, storage, processor, etc.
• Software It is a set of computer programs which provides the step by step
instructions to get the job done.
• Information it is the result from processing data.
• Procedures These are actions conducted in a series of a certain order to ensure
the system
• will run smoothly. *
• People Individuals are needed to supply the data to the ICT system.

Scope of ICT in Education


• Teaching models have changed with the induction of ICT, as now learners
participate actively on online computer based platforms instead of being passive
listeners.
• ICT makes learning interactive, self directed and independent. It facilitates
learner centered learning with the use of computer and internet.
• E-learning platforms have emerged as one of the best measures that can help
the students continue their studies during emergency situations like the COVID-
19 outbreak.
• Considering the impact of ICT, various digital initiatives are launched by Ministry
of HRD for school students and even those seeking UG and PG level education.
E.g. DIKSHA, e-Pathshala, Swayam, Swayam Prabha, etc.
Presently, the Central Government has subsumed ICT in schools under Rashtriya
Madhyamik Shiksha Abhiyan, a national drive for secondary education.
The initiatives to incorporate ICT in education are mentioned below:

1. SWAYAM
o Ministry of education and NPTEL, IIT Madras with the help of Google Inc. and
Persistent Systems Ltd, developed this platform.

Page | 13
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)

o The platform is based on the three cardinal principles of the education policy
of India:- Access, Equity, and Quality.
o It provided all courses from Class 9 till post-graduation online to everyone free
of cost.
o The formats of study material provided under this platform are:
▪ Video Lecture
▪ Specially prepared reading material that can be downloaded/printed
▪ Self-assessment tests through tests and quizzes
▪ An online discussion forum for clearing the doubts
• Nine national coordinators that help in ensuring the quality of the content are:
▪ AICTE (All India Council for Technical Education) for self-paced and
international courses
▪ NPTEL (National Programme on Technology Enhanced Learning) for
Engineering
▪ UGC (University Grants Commission) for nontechnical post-graduation
education
▪ CEC (Consortium for Educational Communication) for under-graduate
education
▪ NCERT (National Council of Educational Research and Training) for school
education
▪ NIOS (National Institute of Open Schooling) for school education
▪ IGNOU (Indira Gandhi National Open University) for out-of-school students
▪ IIMB (Indian Institute of Management, Bangalore) for management studies
▪ NITTTR (National Institute of Technical Teachers Training and Research) for
Teacher Training Programme
• Students to get a SWAYAM Certificate have to pay a fee to register for the final
proctored examinations. The examinations take place at a designated venue.
2. iShare for India
• It is an initiative started by the Ministry of Human Resources and Development
(MHRD) to invite interested groups/agencies/organizations/communities to
participate in the creation of an educational resources pool for School and
Teacher Education.
• It allows contribution in the form of Mobile enabled Apps/ Web-based ICT
supplementary resources in any Indian Language for a school education or
teacher education.

Page | 14
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)

3. Shaala Siddhi
• It is a national programme on school standards and evaluation
• It is an initiative of the National Institute of Educational Planning and
Administration (NIEPA).
• It runs under the aegis of MHRD.
• It works to evaluate school performance using the School Evaluation
Dashboard called ‘e-Samiksha’.
4. Shaala Darpan
• It is used to monitor the primary and middle schools
5. Saransh Portal
• It is a web portal launched in 2015 by the Central Board of Secondary
Education (CBSE.)
• The primary aim of Saransh is to promote ICT in education in schools.
• It is a self-review tool for schools and parents.
• It is considered to be in alignment with the Digital India initiative.
• It has a provision to give access to all e-books of all classes.
6. e-Pathshala
• It is an initiative to provide educational resources online to students, teachers,
educators, and parents developed by NCERT and the Central Institute of
Educational Technology (CIET).
• It is available as an app in the Google Play app store and Windows.
• Among other educational resources it provides,
▪ CERT textbooks for classes 1-12
▪ Audio-visual resources by NCERT
▪ Periodicals
▪ Supplements
▪ Teacher training modules and,
▪ A variety of other print and non-print materials
7. Digital Gender Atlas
• It has been developed to identify the low-performing geographic pockets for
girls, particularly from marginalized groups such as scheduled castes,
scheduled tribes, and Muslim minorities, on specific gender-related education
indicators.
8. School GIS
Page | 15
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)

• It is a portal launched in 2016 that enables locating the geographic coordinates


of the school in the countries.
• A map presents the information of the school by its village, district, taluka, and
grading.

ICT in School – Historical Context


• National Education Policy 1986 emphasized the need for education
technology to enhance the state of education in schools.
• Two centrally sponsored schemes that furthered the emphasis of NEP 1986
were:
o Educational Technology (ET) and
o Computer Literacy and Studies in Schools (CLASS)
• In 1998, an IT task force created by the Prime Minister recommended
introducing IT in the education sector.
• GyanDarshan was launched in 2000.
• A radio channel on education, GyanVani was launched in 2001
• Vidyavahini, a project to enable IT and IT-enabled education in 60000 schools
in three years, was initiated in 2002.
• India’s first dedicated education satellite called EduSat was launched in 2004.
• In 2005, the National Curriculum Framework was brought out by NCERT that
recommended ICT inclusion across the curriculum of schools.
• ‘ICT in Schools’ Scheme was launched in 2004 and enhanced the ICT skills of
secondary stage students.

In Healthcare
• Through ICT, the data can be transferred to the patient or to the doctor for
consultation. The patient can have medical record in hand that can be used
anywhere, anytime.
• In light of COVID-19, where people are forced to stay healthy indoors, mobile
health (m Health) apps have come to our rescue. At present, there are approx
200,000 m-Health apps available in the apps stores which help people to know
their health status and also helps interaction between patients and doctors.

In Governance
• e e-Governance is about leading the transformation of government to provide
efficient, convenient and transparent services to citizens and businesses
through the use of ICT.
Page | 16
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)

• Government launched MyGov.in app an innovative citizen engagement platform


for direct participation of citizens in governance. It provides avenue for
channelizing their ideas, comments and creative suggestions to central
ministries and associated organisations,
• Other apps which have been launched by the government are VIGILUMANG,
mAadhaar, mPassport Seva, etc.

Advantages of ICT
• Communication ICT offers a more efficient, time and money saving way of
communication through apps like Whatsapp, Zoom, Skype, GoTo Meeting, etc.
• Creation of Jobs The best advantage of ICT has been creation of new and
interesting jobs in IT sectors. Advancement of technology has created great
employment opportunities in fields such as web designing, database
administration, etc.
• Cost Effectiveness ICT has made everything cost effective. Nowadays, business
meetings take place over video-conferencing apps such as Zoom. ICT saves
money as it provides almost every facility including shopping.
• Bridging the Cultural Gap Greater access to the ICT has helped to bridge the
cultural gap by helping people from different cultures to communicate with each
another and allowing the exchange of views and ideas.
• Greater Availability ICT has made it possible for people to avail almost every
facility at any time 24 x 7.
• Education ICT has allowed educational facilities to reach everyone while making
learning easier and more effective.

Disadvantages of ICT
• Lack of Job Security Experts believe that ICT has made job security a big issue.
As technology keeps on changing nearly every day, individuals need to be
constantly studying the changes in their profession, if they want to feel secure
in their jobs.
• Overriding Cultures While ICT may have made the world a global village, it has
also contributed to one culture to predominate over others. As a result, many a
time, the traditional values of another comparatively weaker culture are lost.
• Privacy Though information technology may have made communication
quicker, easier and more convenient, it has also brought along privacy issues.
From cell phone signal interceptions to e-mail hacking, people are now worried
about their once private information becoming public knowledge,

Page | 17
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)

• Reliance on Technology With ICT, people relying on technology for everything.


Consequently, they become prone to sedentary lifestyle which can lead to
various problems,
• Reliability of Information Anyone with access to a computer and an internet
connection internet can start a blog or post something up on a website, so just
because something's on the web doesn't mean it's reliable. Hence, ICT is not a
reliable medium of data.
• Reduced Personal Interaction ICT makes working or communicating from
remote areas possible. This reduces all forms of personal interactions among
friends, families and even colleagues.

PROGRAMING CONCEPT
Program can be defined as a set of instructions that need to be executed to
accomplish a computing task. A person who writes or performs the program is
known as programmer. Programmer uses some specific languages to write
program which is known as programming languages e.g. C++, Java, etc.

Programming Language
It is a set of commands, instructions and other syntax use to create a software
program. Programming language must be simple, easy to learn and use. It must
be consistent in terms of syntax and semantics. Programming languages are
mainly categorised into three parts which are as follows

Low Level Language


(LLL) These programming languages are more difficult to understand. It is
designed to operate and handle the entire instruction set of a computer system
directly which are generally used to write the system software. e.g. Machine
language and Assembly language.

1. Machine Language It is the only language understood by the computers.


Sometimes, it referred to as mạchine code or object code or binary language. It
is a collection of binary digits. (0 or 1) or bits that the computer reads and
interprets.

2. Assembly Language It is a low level) programming language which is used as


an interface with computer hardwares. It uses structured commands as
substitutions for numbers, allowing humans to read the code easier than looking
at binary codes.

Page | 18
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)

Medium Level Language (MLL)


It serves as the bridge between raw hardware and programming layer of a
computer system. It is designed to improve the translated code before it is
executed by the processore.g. C.

High Level Language (HLL)


It is an advanced computer programming language that is not limited to one
computer, designed for a specific job and is easier to understand. The main
advantage of high level languages over low level languages is that they are easier
to read writ
BASIC, C, FORTRAN, Java, Pascal, etc.

Some High Level Languages and Their Application Areas


Language Year Developer Application Nature
Area
FORTRAN (Formula 1957 A team of Calculation Compiled
Translation) programmer at
IBM
ALGOL (Algorithmic 1958 A committee of Scientific Compiled
language) European and Purpose
American
computer scientist
LISP (List Processing) 1958 John McCarthy at Artifical Compiled and
the Massachusetts intelligence interpreted
Institute of
Technology (MIT)
COBOL (Common 1959 Grace Hopper Business Compiled
businessoriented management
language) sting oriented
BASIC (Beginner's All 1964 John G. Kemery Programming Interpreted
purpose symbolic and Thomas for educational
instruction code) E.Kurtz at purpose
Dartmouth college
in New Hampshire
Pascal 1970 Nikalus wirth Education Compiled
C 1972 Dennis Ritchie at System Compiled
Bell Labs programming
C++ 1985 Bjarne Stroustrup System object Compiled
at Bell Labs programming
Java 1995 James Gosling Sun Internet Compiled and
Microsystems oriented interpreted
programming

Page | 19
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)

Terms Related to Programming Program Documentation


It is a kind of documentation that gives a comprehensive procedural description
of a prograro. It shows as to how sofiware is written. The program
documentation describes what exactly a prograrn does by mentioning about the
requirements of the input data and effect of performing a prograrnming task.
OOPS
OOPs stands for Object Oriented Programming in which programs are
considered as a collection of objects. Eac object is nothing but an instance of a
class.
De-Bugging
It is the process of locating and fixing or bypassing bugs (errors) in computer
program code.

Language Translator
It helps in converting programming languages to machine language.

11100110101

.
01101111001
Language Transfer
01110001111
01010101010

The translated program is called the object code. Depending upon used
programming languages, language translator is divided into three categories.
which are as follows

• Assembler
It converts a program written in assembly language into machine language.
Assembly language consists of mnemonic code, which are difficult to learn and
are machine dependent.

• Interpreter
It converts a HLL program into machine language by converting it line-by-line. If
there is any error in any line, it stops the execution of the program immediately
and reports to the user at the same time. Program execution cannot resume
until the error is rectified by the user. Interpreter is very useful for debugging

Page | 20
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)

and suitable for novice programmer. This is a slow process and consumes less
memory space.

• Compiler
It converts HLL program into machine language, which can be understood by the
processor. For each high level language, the machine requires a separate
compiler. A compiler creates a unique object program, i.e. if a source program
is compiled, there is no need of that source program because output can be
obtained by executing that object program. Compiler converts the entire HLL
program in one go and reports all the errors of the program alongwith the line
numbers.

Generation of Languages
The concept of language generations, sometimes called levels, is closly
connected to the advances in technology that brought about computer
generations. The five generations of language are as follows
1. The first generation languages or 1 GLs are low level languages like machine
language.
2. The second generation languages or 2GLS are also low level languages that
generally consist of assembly language.
3. The third generation languages or 3GLs are high level languages such as Java.
4. The fourth generation languages or 4GLs are the languages that consist of
statements similar to the statements of human language 4GLs are commonly
used in database programming and scripting programming
5. The fifth generation languages or 5GLs are programming languages that
contain visual tools, which help to develop a program, A good example of 5GLs
is Visual Basic.

Error
An error in a program is called bug. It is a term used to describe any issue that
arises unexpectedly that cause a computers not function properly.
Types of Error The types of error are classified into four categories which are as
follows
1. Syntax Error When the rules of the programming language are not followed, the
compiler will show syntax error.
2. Semantic Error Semantic errors are reported by the compiler when the
statements written in the program are not meaningful to the compiler.

Page | 21
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)

3. Logical Error Logical errors are those errors that occur in the output of the
program. The presence of logical errors leads to undesired or incorrect output
4. Runtime Error Runtime errors are those errors that occur during the execution
of a program.It generally occurs due to some illegal operation performed in the
program.

Algorithm
An algorithm is a step by step method of solving a problem. It is commonly used
for data processing, calculation and other related computer and mathematical
operations.
The desirable features of an algorithm are
(i) Each step of algorithm should be simple.
(ii) It must be in a finite number of steps.
(iii) It should be as efficient as possible.
(iv) It should be clear in the sense,
(v) It should be effective, ie, it must lead to a unique solution of the problem.

Visual Basic is an interpreted language.


Reserved words are words that a programming language has set aside for its own use.
Pseudocode is not a programming language, but simply an informal way of describing
a program. It does not follow any syntax strictly.
Control structure is a statement or block of statements in a programming language
that determined the control flow or sequence of execution of other instructions or
statements,
Looping is a control structure which is used in a program to execute a particular set of
statements repeatedly

DATA REPRESENTATION
It refers those methods which are used internally to represent information store
in a computer.
Number System
It defines a set of values that is used to represent quantity. Digital computers
internally use the binary number system to represent the data and perform
arithmetic calculations. The number systems generally used by a computer are
as follows:

Page | 22
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)

1. Binary Number System This system is very efficient for computers, but
not for humans. It contains only two unique digits Os and ls. It is also known as
Base 2 System. The binary numbers 0 and 1 are called a bit. The computer always
calculates input in binary form. e.g. (10101),

2. Decimal Number System It consists of 10 digits from 0 to 9. These digits


can be used to represent any numeric value. It is I also known as base 10 system
or positional
number system. e.g. (1275),,(10406),
There are minimum 8 bits required to store any 3 digits decimal number,

3. Octal Number System It consists of 8 digits from 0 to 7. It is also known as


bases 8 system. Each position of the octal number represents a successive
power of eight.

4. Hexadecima Number System It provides us with a shorthand method of


working with binary number .It is represented by four binary digits.
These are 0 to 9 and A to F, where A Donotes 10, B denotes 11 ....... F denotes
15. It is also known as Base 16 System or simply Hex.
So, each position of the hexadecimal number represents a successive power of
16.

Decimal, Binary, Octal and Hexadecimal Equivalent


Decimal Binary Octal Hexadecimal
0 000 0 0
1 001 1 1
2 0010 2 2
3 0011 3 3
4 0100 4 4
5 0101 5 5
6 0110 6 6
7 0111 7 7
8 1000 8
9 1001 9
10 1010 A
11 1011 B
12 1100 C
Page | 23
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)

13 1101 D
14 1110 E
15 1111 F

Conversion Between the Number Systems


Different types of conversion between the number systems are discussed
below:

1. Decimal to Binary
To convert decimal to binary, following steps are involved ;
Step 1 Divide the given number by 2.
Step 2 Note the quotient and remainder.
Remainder should be 0 or 1.
Step 3 If quotient ≠ 0, then again divide the
quotient by 2 and back to step 2.
If quotient = 0, then stop the process.
Step 4 First remainder is called as 'Least
Significant Bit (LSB) and last remainder
is called as 'Most Significant Biť (MSB).
Step 5 Arrange all remainders from MSB to LSB.

Example (𝟒𝟑)𝟏𝟎 → (? )𝟐
remainder
2 43 1→LSB
2 21 1
2 10 0
2 5 1
2 2 0
2 1 1→MSB
0
2. Binary to Decimal
To convert binary to decimal, following steps are involved :
Step 1 Multiply all the binary digits by powers of 2.
Step 2 The power for integral part will be positive and for fractional part will be
negative.
Step 3 Add all the multiplying digits.

Page | 24
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)

Example (𝟏𝟏𝟎𝟏. 𝟏𝟎)𝟐 → (? )𝟏𝟎


(1101.10)2 = 1 × 23 + 1 × 22 + 0 × 21 + 1 × 20 + 1 ×
2−1 + 0 × 2−2
=8+4+0+0.5+0
=13.5
Then, (1101.10)2 → (13.5)10

Computer Codes
In computer, any characters like alphabet, digit or special character are
represented by collection of 1s and Os in a unique coded pattern.
The binary coding schemes that are most commonly used as follows:

BCD
It is a number system where four bits are used to represent each decimal digits.
BCD (Binary Coded Decimal) is a method of using binary digits to represent the
decimal digits (0-9).

ASCII
These are standard character codes used to store data so that it may be used by
other software programs. Basically, ASCII (American Standard Code for
Information Interchange) codes are of two types which are as follows:
ASCII-7 It is a 7-bits standard ASCII code.
It allows 27 = 128 (from 0 to 127) unique symbols.
ASCII-8 It is an extended version of
ASCII-7. It is an 8-bits code, allows 𝟐𝟖 = 256 (0 to 255) unique symbols or
characters.

EBCDIC
In EBCDIC (Extended Binary Coded Decimal Interchange Code), characters are
represented by 8-bits. These codes store information which is readable by other
computers. It allows 28 =256 (0-255) combinations of bits.

COMPUTER SOFTWERE
Software is a collection of computer programs and related data that provide the
instructions for telling computer what to do and how to do. A software is an
interface between the user and the computer hardware. It is responsible for

Page | 25
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)

controlling, integrating and managing the hardware components of a computer


system and for accomplishing specific tasks.

Types of Software
Software can be divided into two major categories
1. System software 2 Application software

System Software
it consists of several programs, which are directly responsible for controlling,
integrating and managing the individual hardware components of a computer
system. System software also provides the interface between the user and
components of the computer. Depending on the functionality, the system
software can be further divided into following categories:
1. Operating System
It consists of programs which control, coordinate and supervise the activities of
the various components of a computer system. Its function is to provide link
between the computer hardware and the user. It provides an environment to
run the programs. e.g. MS-DOS, Windows XP/2000/98, Unix, Linux, etc.
The operating system performs the following functions
(i) It recognises input from keyboard, sends output to the display screen
(ii) It makes sure that programs running at the same time do not interfere with
each other.
(iii) It is also responsible for security) ensuring that unauthorised users do not
access the system.

BIOS The Basic Input/Output System (BIOS) is commonly known as System


BIOS. The BIOS controls various electronic components within the main
computer system. The initial function of the BIOS is to initialise system devices
such as the RAM, hard disk, CD/DVD drive, video display card and other
hardwares.

2. Device Drivers
A software, which is written with the objective of making a device functional
when it is connected to the computer is called device driver. It is a system
software that acts like an interface between the device and the user. " Every
device, whether it is a printer, monitor, mouse or keyboard has a driver program
associated with it for its proper functioning.

Page | 26
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)

3. Language Translator
It helps in converting programming languages to machine language. The
translated program is called object code. There are three different kinds of
language translator : Assembler, Compiler and Interpreter.

Linker It is a system program that links together several object modules and
Libraries to form a single and coherent program (executable). The main purpose
of linker is to resolve references among files. Linker Is used to determine the
memory locations that code from each module will occupy and relates its
instruction by adjusting absolute references.

Loader It is a kind of system software which is responsible for loading and


relocation of the executable program in the main memory. It is a part of
operating system that brings an executable file residing on disk into memory and
starts its execution process.

Application Software
It is a computer software designed to help the user to perform single or multiple
tasks. It is a set of instructions or programs designed for specific uses or
applications, that enable the user to interact with a computer. Application
softwares are also called the end-user programs. These programs do the real
work for users.

There are two types of application software


General Purpose Software
These softwares are those softwares which are used for any general purpose.
They allow people to do
simple computer tasks,

Some of the general purpose software are as follows


1. Word Processing Software
A word processor is a software program capable of creating, storing and printing
of documents. Word processors have the ability to create a document and make
changes anywhere in the document. Today, the word processor is one of the
most frequently used programs or online services used on a computer system.
e.g. Microsoft Word WordPerfect (Windows only), AppleWorks (Mac only),
OpenOffice.org Writer, etc.

Page | 27
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)

2. Electronic Spreadsheets Spreadsheet "


applications (sometimes referred to simply as spreadsheets) are the computer
programs that accept data in a tabular form and allow you to create and
manipulate spreadsheets electronically,
The relationship between cells are called
Formulas and the names of the cells are called Labels, e., Microsoft Extel, Corel
Quattro Pro, Lotus 1-2-3, OpenOffice.org Calc, etc.

3. Presentation Software
Presentation is the practice of showing and explaining the contents of a topic to
an audience or a learner visually. People, in a variety of settings and situations,
use presentation software to make their presentations more interesting and
professional.
e.g. Microsoft PowerPoint, Corel
Presentations, Lotus Freelance Graphics, OpenOffice.org Impress, etc.

4. Database Management System (DBMS)


A DBMS refers to the software that is responsible fof sorting, maintaining and
(utilising a database.
It enables a user to define, create and maintain the database and provide
controlled access on it, e,g, Microsoft Access, Corel Paradox, MySQL,
OpenOffice.org Base, etc

5. Desktop Publishing (DTP) Software


It is a tool for graphic designers and non-designers to create visual
communications for professional or desktop printing as well as for online or on
screen electronic publishing.
e.g. Quark XPress, Adobe PageMaker, 3B2, CorelDraw, Corel Ventura, Illustrator,
etc.

6.Graphics Software (Image Editing)


It is an application program or collection of programs that enables a person to
manipulate visual images on a computer system. Most graphics softwares have
the ability to import and export one or more graphics file formats. e.g. DirectX,
Adobe Photoshop, piZap, for Microsoft Publisher, Picasa, etc.

7. Multimedia Software
Multimedia includes a combination of text, audio, still images, animation, video
or interactivity content forms,

Page | 28
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)

e.g, Macro-Media Flash, Xilisoft Video Converter, VLC Media Player, Nimbuzz,
etc.

specific Purpose Software


These softwares are designed to perform specific asks. This type of application
software generally has one purpose to execute.
Some of the specific purpose application softwares are described below

1. Inventory Management System and Purchasing System Inventory is a list of


goods and materials available in a stock. Inventory management system is
generally used in departmental stores or in an organisation to keep the records
of the stock of all the physical resources.
e.g. Fishbowl, AdvancePro, etc.

2. Payroll Management System It is used by all modern organisations to


encompass every employee of the organisation who receives a regular wages or
other compensation, e.g, Namely, UltiPro, etc.

3. Hotel Management System It refers to the management techniques used in the


hotel sector. These can include hotel
administration, accounts, billing, marketing, housekeeping, front office or front
desk. e.g. Djubo,
Aatithya HMS, Hotelogix PMS, etc.

4. Reservation System A reservation system or Central Reservation System (CRS)


is a computerised system used to store and retrieve information and conduct
transactions related to air travel, hotels, car rental or other activities. Today,
number of websites like www.yatra.com,
www.makemytrip.com provide online booking for tourists.

5. Report Card Generator It is an application software which is commonly used in


schools by the examination department to prepare and generate the report
cards of the
students.

6. Accounting Software It is an application software that records and processes


accounting transactions within functional modules such as accounts payable,

Page | 29
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)

accounts receivable, payroll and trial balance. e.g. Tally. ERP9, HDPOS, MARG,
Profit book etc.

7. Billing System It refers to the software that is used to perform the billing
process. It handles the tracking of labled products and services delivered to a
customer or set of customers. e.g. Billing Manager, Billing Tracker, kBilling, etc

System Utilities
These programs perform tasks related to the maintenance of the computer
system. These are the packages which are loaded into computer during time of
installation of operating system. They are used to support, enhance, expand and
secure existing programs and data in the computer system.
System utility mainly consists of the following functions

1. Disk Compression It increases the amount of information that can be stored


on a hard disk by compressing all information stored on a hard disk,
e.g. DiskDoubler, SuperStor Pro, DoubleDisk Gold , etc.

2 Disk Fragmenter It detects computer files whose contents are broken across
several locations on the hard disk and moves the fragments to one location to
increase efficiency. It can be used to rearrange files and unused space on your
hard disk.
e.g. MyDefrag, Diskeeper, Defraggler, etc.

3. Backup Utilities It can make a copy of all information stored on a disk and
restore
either the entire disk or selected files)

4. Disk Cleaners It is used to find files that have not been used for a long time.
This utility also serves to increase the speed of a slow.computer,
e.g. Bleach Bit cleaner, etc.

5. Anti-virus IDis the utility which is used to scan computer for viruses and
prevent the computer system files from being corrupt.
e.g. Kaspersky, AVG, McAfee Avira) etc.

6. Text Editor It is a program that facilitates the creation and correction of tex
editor supports special commands for editing, i.e. you can write, delete, find and

Page | 30
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)

replace words, lines, paragraphs, etc. e.o. MS-Word, WordPad, Notepad etc, in
which Notepad is the most popular text editor.
Adobe Page Maker is a typesetting tool formely widely used for desktop publishing
Fully Backup contains a copy of every program, data and system file on a computer. Firmware is a
combination of software and hardware. eg. ROMS, PROMs and EPROM
Freeware is commonly used for copyrighted software that is given away for free
CAD (Computer Aided Design) Software by architects, engineers, drafters and create precision
drawings

DATA COMMUNICATION AND NETWORKING


The term communication means sending or receiving information. When we
communicate, we share information or data. A communication system can be
defined as the collection of hardware and software that facilitates intersystem
exchange of information between different devices.

Data Communication
It is the exchange of data between two devices using some form of transmission
media. It includes the transfer of data or information and the method of
preservation of data during the transfer process. Data is transferred from one
place to another in the form of signals. There are three types of signals
1. Digital Signal In this signal, data is transmitted in electronic form, i.e.
binary digits (0 or 1).
2. Analog Signal In this signal, data is transmitted in the form of radiowaves like
in telephone line.
3. Hybrid Signal These signals have properties of both analog signal and digital
signal.

Communication Channel
The communication channel refers to the direction of signal flow between two
devices.
There are mainly three types of communication channel as follows

1. Simplex Channel In this channel, the fl of data is always in one direction, with
no capability to support response in other direction. This communication is
unidirectional. Only one of the communicating devices transmits information
and the other can only receive it. e.g. Radio, Television, Keyboard, etc.

Page | 31
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)

2. Half Duplex Channel In this channel, the data can flow in both directions, but
not at a same time. When one device transmits information, then other can only
receive at
that point of time. e.g. Walkie - Talkie.

3. Full Duplex Channel In this channel, the flow of data is in both directions at a
time, i.e. both stations can transmit and receive information simultaneously. e.g.
Wireless handset (mobile phone)

Communication Media
Communication media of a network refer to the transmission media or the
connecting media used in the network. It can be broadly defined as anything
that can carry information from a source to destination. It refers to the physical
media through which communication signals can be transmitted from one point
to another.
Transmission media can be divided into two broad categories

Guided Media or Wired Technologies


The data signal in guided media is bound by the cabling system that guides the
data signal along a specific path. It consists of a cable composed of metals like
copper, tin or silver.

Basically, they are divided into three categories


1. Ethernet Cable or Twisted Pair Cable In this cable, wires are twisted together,
which are surrounded by an insulating material and an outer layer called jacket.
One of the wires is used to carry signals to the receiver and the other is used
only as a ground reference,
e.g. Local area networks use twisted pair cable.

2. Co-axial Cable It carries the signal of higher frequency data communication


through the network. It has a single inner conductor that transmits electric
signals and the outer conductor acts as a ground and is wrapped in a sheet of
teflon or PVC, Co-axial cable is commonly used in transporting multi-channel
television Simuals in cities.
eg. Cable TV network.

3. Fibre Optic Cable It is made up of glass or plastic and transmits signals in the
form of light from a source at one end to another. Optical fibres allow
transmission over longer distance at higher bandwidth which is not affected by

Page | 32
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)

electromagnetic field. The speed of optical fibre is hundred of times faster than
co-axial cables.

Unguided Media or Wireless Technologies


It is the transfer of information over a distance without the use of enhanced
electrical conductors or wires. When the computers in a network are
interconnected and data is transmitted through waves, then they are said to be
connected through unguided media. Some commonly used unguided media of
transmission are

1. Radio wave Transmission When two terminals communicate by using radio


frequencies then such type of communication is known as radio wave
transmission. This transmission is also known as Radio Frequency (RF)
transmission. These are omnidirectional. Radio waves, particularly those waves
that propagate in the sky mode, can travel long distances.

2. Microwave Transmission Microwaves are electromagnetic waves having


frequencies range from 0.3 to 300 GHz. Microwaves are unidirectional.
Microwaves have a higher frequency than that of radio wave. Microwave is one
of the fastest media for data transmission over communication channel. It is
used in cellular network and television broadcasting
3. Infrared Wave Transmission Infrared waves are the high frequency waves used
for short-range communication. These waves do not pass through the solid-
objects. They are mainly used in TV remote wireless speakers.

4. Satellite Communication The communication across longer distances can be


provided by combining radio frequency transmission with satellites. It works
over a long distance and fast communication. It is used for communication to
ships, vehicles, planes and handheld terminals,
Bluetooth is a wireless technology used for exchanging data over short
distances to create a Personal Area Network (PAN).)
Bandwidth determines the data transfer rate which is measured in Cycle Per
Second (CPS) or Hertz (Hz).
Throughput is the amount of data that is actually transmitted between the two
computers. It is specified in bits per second (bps). Giga bits per second (Gbps)
is the fastest speed unit per data transmission.

Computer Network

Page | 33
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)

It is a collection of two or more computers, which are connected together to


share information and resources. Computer network is a combination of
hardware and software that allows communication between computers over a
network.

Note ARPANET stands for Advanced Research Projects Agency Network. It wag
the first network developed boy vint Cerf in 1969.

Benefits of Network
Some of the benefits of network are discussed below
1. File Sharing Networking of computer helps the users to share data files.
2. Hardware Sharing Users can share devices such as printers, scanners, CD-ROM
drives, hard drives, etc, in a computer network.
3. Application Sharing Applications can be shared over the network and this allows
implementation of client/server applications.
4. User Communication This allows users to communicate using E-mail,
newsgroups, video conferencing within the network.

Types of Computer Network


Computer network is broadly classified into various types as follows
Local Area Network (LAN)
LAN is a small and single-site network. It connects network devices over a
relatively short distance.
It is system in which computers are interconnected and the geographical area
such as home, office, buildings, school may be within building to 1 km. On most
LANs, cables are used to connect the computers. LANs are typically owned,
controlled and managed by a single person or organisation. They also use certain
specific connectivity technologies, primarily Ethernet and Token Ring LAN
provides a sharing of peripherals in an efficient or effective way.

Wide Area Network (WAN)


WAN is a geographically dispersed collection of LANs. A WAN like the Internet
spans most of the world. A network device called a router connects LANs to a
WAN.

Page | 34
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)

Like the Internet, most WANs are not owned by any one organisation, but rather
exisk under collective or distributed ownership and management. WANs usę
technology like ATM, Frame Relay and X.25 for connectivity,

Metropolitan Area Network (MAN)


It is a data network designed for a town or connects an area larger than a LAN,
but small than a WAN.
Its main purpose is to share hardware and software resources by the various
users Cable Tv network is an example of metropolitan area network. The
computers in a MAN are connected using co-axial cables or fibre optic cables.

Personal Area Network (PAN)


PAN refers to a small network of communication. These are used in a few limited
range, which is in reachability of individual person. Few examples of PAN are
Bluetooth, wireless USB, Z-wave and Zig Bee.
Server is a system that responds to requests across a computer network to
provide a network service. It can be run on a dedicated computer. It is one of
the most powerful and typical computer
File Servers is a type of computer used on network that provides access to files.
It allows users to share programs and data over LAN network
Protocols are the set of rules used by a network for communication. It is mainly
used to connect all the computers to the network,

Network Devices
These devices are required to amplify the signal to restore the original strength
of signal and to provide an interface to connect multiple computers in a
network. There are many types of network devices used in networking.
Some of them are described below
1. 1 Repeater Repeaters have two ports and can connect two segments of a LAN.
It amplifies thę signals when they are transported over a long distance so that
the signal can be as strong as the original signal. A repeater boosts the signal
back to its correct level.
2. Hub It is like a repeater with multiple ports used to connect the network
channels. It acts as a centralised connection to several computers with the
central node or server, When a hub receives a packet of data at one of its ports

Page | 35
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)

from a network channel, it transmits the packet to all of its ports to all other
network channel,
3. Gateway. It is an interconnecting device, which joins two different network
protocols together. They are also known as protocol converters. It accepts
packet formatted for one protocol and converts the formatted packet into
another protocol.
The gateway is a node in a network which serves as a proxy server and a firewall
system and prevents the unauthorised access.
4. Switch It is a small hardware device that joins multiple computers together
within one LAN. It helps to reduce overall network traffic. Switch forwards a data
packet to a specific route by establishing a temporary connection between the
source and the destination. There is a vast difference between a switch and a
hub. A hub forwards each incoming packet (data) to all the hub ports, while a
switch forwards each incoming packet to the specifjed recipient.
5. Router It is a hardware device which is designed to take incoming packets,
analyse packets, moving and converting packets to the another network
interface, dropping the packets, directing packets to the appropriate locations,
etc.
6. Bridge It serves a similar function as switches. A bridge filters data traffic at a
network boundary. Bridges reduce the amount of traffic on a LAN by dividing it
into two segments. Traditional bridges support one network boundary, whereas
switches usually offer four or more hardware ports. Switches are sometimes
called multiport bridges.
7. Modem It is a device that converts digital signal to analog signal (modulator) at
the sender's end and converts back analog signal fo digital signal (demodulator)
at the receiver's end, in order to make communication possible via telephone
lines. A Modem is always placed between a telephone line and a computer.

NETWORK TOPOLOGY
Network Topology The term “topology' refers to the way a network is laid out,
either physically or logically. Topology can be referred as the geometric
arrangement of a computer system. Each computer system in a topology is
known as node.

Page | 36
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)

The most commonly used topology are described below


1. Bus Topology
It is such that there is a single line to which all nodes are connected. It is usually
used when a network installation is small, simple or temporary. In bus topology,
all the network components are connected with a same (single) line.
2. Star Topology.
In this network topology, the peripheral nodes are connected to a central node,
which rebroadcasts all transmissions received from any peripheral node to all
peripheral nodes across the network. A star network can be expanded by placing
another star hub.
3. Ring or Circular Topology
This topology is used in high-performance networks where (arge bandwidth is
necessary, The protocols used to implement ring topology are (Token Ring and
Fiber Distributed Data Interface (FDDI) In ring topology, data is transmitted in
the form of Token over a network.
4. Mesh Topology
It is also known as completely interconnected topology. In mesh topology, every
node has a dedicated point-to-point link to every other node.

Page | 37
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)

5.Tree Topology
This is a network topology in which nodes are arranged as a tree. The function
of the central node in this topology may be distributed. Its basic structure is like
an inverted tree, where the root acts as a server. It allows more devices to be
attached to a single hub.

Memory Unit
Memory is a part of the computer, which holds data and instructions. This unit
is responsible to store programs or data on a temporary or permanenti basis.
it general, the memory is classified into two categories as follows:

(i) Primary or Main Memory


The memory unit that communicates directly in the CPU is called the main
memory or the internal memory.
Primary memory can be further classified in two categories which are as follows:

(a) Random Access Memory (RAM)


It is also known as read/write memory or volatile memory that allows CPU to
read as well as write data and instructions into it. It is used for the temporary
storage that means it loses its content when the power supply button is
switched off.
There are two categories of RAM as follows:
I. Dynamic RAM (DRAM)
II. Static RAM (SRAM)

(b) Read Only Memory (ROM)


It is also known as non-volatile memory or permanent storage. It does not lose
its content when the power is switched off. It holds the computer startup
routine... When a computer is booting, BIOS (Basic Input/Output System) is
loaded to the memory by ROM.
There are three categories of ROM as follows:
I. Programmable Read Only Memory (PROM)
II. Erasable Programmable Read Only Memory (EPROM)
III. Electrically Erasable Programmable Read Only Memory (EEPROM)

→ Cache Memory
It is a storage buffer that stores the data which is used more often, temporarily
and makes them available to CPU at a fast rate. It compensates the gap in speeds
of processor and main memory.
Page | 38
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)

→ Virtual Memory
It is an illusion of extremely large main memory that allows the execution of
processes that are not completely in main memory.
(ii) Secondary or Auxiliary Memory
This memory stores much larger amount of data and information for extended
periods of time. Data in secondary memory cannot be processed directly by the
CPU, first it must be copied into primary storage, i.e. RAM. This memory is also
known as non-volatile memory.
Secondary memory devices are as follows:
(a) Hard Disk Drive (HDD)
It is a non-volatile, random access digital data storage device. HDD is a data
storage device used for storing and retrieving digital information using rotating
disks (platters) coated with magnetic material. Hard disk is divided into tracks
which are further subdivided into sectors.

(b) Floppy Disk (Diskette)


It is used to store small amount of data and is slower to access than hard disks.
They are composed of a thin and flexible disk of a magnetic storage medium of
square shape.

(c) Magnetic Tapes


These tapes are made of a thin, magnetizable coating on a long, narrow strip of
plastic film to store data permanently. Data can be read as well as recorded.
These tapes can store data in a sequential manner,

(d) Compact Disc (CD)


It is the most popular and the least expensive type of optical disc which is used
as a data storage device.
CDs are categorised into three main types as follows:
I, CD-ROM (Compact Disc-Read Only Memory)
II. CD-R (Compact Disc- Recordable)
III. CD-RW (Compact Disc- Rewritable)

(e) Digital Video Disc (DVD)

Page | 39
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)

It is also known as Super Density Disc (SDD) or Digital Versatile Disc. DVDs offer
higher storage capacity than compact discs while having the same dimensions.
Depending upon the disc type, DVD can store several Gigabytes of data (4.7 GB-
17.08 GB).
DVDs come in three varieties as follows:
I. DVD-ROM (Digital Video Disc-Read Only Memory)
II. DVD-R (DVD-Recordable)
III. DVD-RW (DVD-ReWritable)

(f) Blu-ray Disc (BD)


It is an optical disc storage medium designed to recapture the data normally in
DVD format. Blu-ray dise contains 25 GB (23.31 GB) per layer space. Blu-ray can
hold almost 5 times more data than a single layer DVD.

(g) Pen/Thumb Drive


Pen drive is also known as flash drive. A flash drive is a data storage device that
consists of flash memory (key memory) with a portable USB
(Universal Serial Bus) interface.

Note A new laptop has been produced using the solid state hard drive
technology. This technology weighs less, is smaller and uses less power.
Basic units of Memory Measurements
1 Bit Binary Digit (0 or
1)
4 Bit 1 Nibble
8Bit 1 Byte
1024 Byte 1 KB (kilo byte)
1024 KB 1 MB ( Mega Byte
)
1024 MB 1 GB (Giga Byte)
1024 GB 1 TB (Tera Byte)
1024 TB 1 PB (Peta Byte)
1024 PB 1 EB (Exa Byte)

Page | 40
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)

1024 EB 1 ZB (Zetta Byte )


1024 ZB 1 YB (Totta Byte)
1024 YB 1 BB (Bronto Byte)
1024 BB 1 Geop Byte

- Motherboard
The main circuit board contained in any computer called a Motherboard. It is
also known as the Man Board, Logic Board, System Board or Planar Board. All
other electronic devices and circuits of computer system are attached to this
board like CPU, ROM
expansion slots, PCI slots and USB ports.

INTRANET
An intranet can be an excellent method for sharing organizational information
and creating internal communication channels. An intranet is an ideal way to
communicate in a secure environment. An intranet provides a way to
communicate with a common technology.
Intranets allow organizations to make effective use of their digital organizational
information resources, offering interoperability, ease of use, security, and cost-
effectiveness.

Intranet is:
• A collection of resources to which only internal users have access.
• A private network inside an organization, similar to the Internet, but which is for
internal use only, and is not accessible to the public.
• Users of an Intranet can exchange electronic mail (email), send files (FTP),
browse web (WWW) pages, and connect to any other computer. Just like the
normal internet, however, only people within an organization can use the
intranet
• Intranets are often separated from the Internet by using a firewall.
• Organizations use Intranets to manage projects, provide employee information,
distribute data and information, internal communication

Advantages of Intranet
• Data can be stored centrally
• Allows easier maintenance of data
• Web-based interface for access o common technology for communication

Page | 41
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)

• Ability to access from anywhere in the world

Electronic Mail (e-mail)


Electronic Mail (e-mail) was invented by "John Von Neumann“. Electronic Mail
transfers the data from one system to another system in the form of messages
(test), pictures (images), multimedia messages.

An e-mail address normally consists of three parts.


1. Name of the User
2. "@" Sign
3. It comes after @sign and it is the name of the DNS.
Example: [email protected]
Scholarify (user name)
Gmail.com (Domain name System)
In the e-mail window, you can find "folder Pane at the left side of the
window. Composed mail, Inbox, Out Box, Sent Items, Drafts, Trash,
Spam etc.,
• Inbox used to store incoming
• Sent Items: used to store mail that has already been
• Deleted Items (Trash) used to store deleted mail up to 30.
• Draft folder: use to store mail that is not yet
• Spam: used to store the unsolicited bulk e-mail up to 30
• Compose Mail: use to create a new

When you start to compose an e-mail, the following activities have to


do:
• To: To type the e-mail address of the person to whom you want to send a mail-
in this box.
• Subject: To type a few words about the subject of the letter you want to write.
• CC (Carbon Copy): To type the e-mail address of the other recipients in this box,
each address is separated by a comma (,). When you complete the mail and click
the "Send" button, then the mail will automatically be sent to all the recipients.
Here, all the recipients will know who the other recipients are.

Page | 42
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)

• BCC (Band Carbon Copy) or (Blind Curtsey Copy): If you don't want them to know
who else have received copies, you can type the addresses in the BCC text, In
this case, only you (the sender) will know the identity of all the recipients of
mail.
• Reply: You can send your reply using the same The subject box will have the
same subject, but with the words "Re;" before it.
• Forward: You can send the forward message using the same The subject box will
have the same subject, but with the words "Fwd:" before it.
• An email attachment is a computer file sent along with an email message. One
or more files can be attached to any email message and be sent along with it.
The first email was sent by Ray Tomlinson to himself in 1971.
• The Drafts folder retains copies of messages that you have started but is not
yet ready to send.

Important points of e-mail


Hotmail, a free e-mail service provided by Microsoft which was established in
1995 was co-founded by an Indian American entrepreneur Sabeer Bhatia along
with Jack Smith in July of 1996.

An Internet Protocol address (also known as an IP address) is a numerical


label assigned to each device (e.g., computer, printer) participating in a
computer network. It acts as an identifier for a computer. It is a unique address
for every computer.

Top-level domain: Each part of a domain name contains certain information.


The first field is the hostname, identifying a single computer or organization. The
last field is the top-level domain, describing the type of organization and
occasionally country of origin associated with the address.

For e.g. - .com - Commercial,


.edu - Educational,
.org - organisation,
.net - Network,
.in - India etc.

Protocols:
• Transmission Control Protocol (TCP)
• User Datagram Protocol (UDP)
• Internet Protocol (IP)
• Post Office Protocol (POP3)

Page | 43
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)

• HyperText Transfer Protocol (HTTP)


• File Transfer Protocol (FTP)
• Internet Control Message Protocol (ICMP)
• Internet Message Access Protocol (IMAP)

Audio and Video Conferencing


Audio conferencing
Audio conferencing is where two or more people in different locations use
technology like a conference bridge to hold an audio call. Audio conferencing is
different from a traditional phone in that all participants dial into a central
system that connects them instead of directly dialling each other. Audio
conferencing aims at achieving communications and collaboration
simultaneously. Many audio-conferencing products may also come with online
collaboration elements standard or optional, like screen-sharing capabilities, to
further enhance the value of audio meetings.

Video conferencing
Video conferencing is a technology-enabled type of meeting where two or more
people, in different geographic locations, conduct live visual conferences
through the internet for the purpose of communicating and collaborating. Video
conferencing software (or hardware) enables transmission of high-quality audio,
static images-sometimes full-motion video images and text-based messages
between multiple locations. As long as they have a webcam (an embedded
camera), a desktop, laptop or mobile phone device can be used for video
conferencing.

Web Conferencing (Internet Based)


Web Conferencing is an online service by which you can hold live meetings,
conferencing, presentations and training via the internet (particularly on TCP/IP
connections). Users can connect to the conference either by telephone or using
the computer's speakers and microphone through a VoIP connection.

Web conferencing usually allows real-time point-to-point communication as


well as multitask communications from one sender to many receivers in
separate locations. Depending on the service, either an application (additional
software) is downloaded and installed or a web-based application is launched in
the attendee's browser.

Page | 44
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)

Web conferencing software or website makes collaboration easier,


with the following common features:

• Whiteboard: which allows you or your attendees to draw or annotate a shared


screen.
• Screen sharing, so you can share with other conference attendees something
on your local workstation.
• Audio conferencing, for times when an audio-only call is sufficient.
• Webinars, which allows you to present to a group while maintaining control
over who can contribute (i.e every attendee can hear you, but no one else can
present during the session).
• Online meetings, which are basically scheduled conferences that include the
ability for you to send out invitations and block off time on the requested
attendees' calendars,
• Mobile access or apps, so that people can participate even when on the go.
• Real-time chat, which allows people to text type during the conference. This is
useful for sharing links during discussion and making notes

ABBREVIATION
A C
AD Active Directory Cc Carbon Copy
ADC Analog to Digital CMOS Complementary Metal Oxide
Convertor Semiconductor
ARP Address Resolution CAD Computer Aided Design
Protocol
AH Active Hub COBOL Common Business Oriented
Language
AI Artificial Intelligence CD Compact Disc
AL Active Link COMAL Common Algorithmic
Language
ALGOL Algorithmic Language CPU Central Processing Unit
ALU Arithmetic Logic Unit CRT Cathod Ray Tube
AM Active Monitor CSS Cascading Style Sheet
APCI Application layer CU Control Unit
Protocol Control
Information
API Application Program CTCP Client-To-Client Protocol
Interface

Page | 45
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)

ASCII American Standard CD-R Compact Disc Recordable


Code for Information
Interchange
ATM Automated Teller CD-ROM Compact Disc Read Only
Machine Memory
ADF Automatic Document CD-RW Compact Disc Rewritable
Feeder
B CD-R/W Compact Dise-Read/Writ
BINAC Binary Automatic CG Computer Graphics
Computer
Bcc Blind Carbon Copy CGI Common Gateway interface
AMP Bitmap COM Common Object Mode
BASIC Beginners All purpose CLI Command Line Interface
Symbolic Instruction
Code
BCD Binary Coded Decimal CLR Common Language Runtime
BCR Bar Code Reader CDMA Code Division Multiple
Access
BD Blu ray Dise D
Bin Binary DAC Digital to Analog Convertor
BIOS Basic Input Output DAP Directory Access Protocol
System
B2B Business to Business DB Database
Bit Binary Digit DBA Database Administrator
LOG Web Log DNMS Database Management
System
BPI Bytes/Bits Per D inch DCC Direct Client-to-Client
BPL Broadband over Power DCL Data Control Language
Line
BPS Bits DE Per Second DFS Distributed File System
BSNL Bharat Sanchar D DHTML Dynamic Hyper Text Markup
Nigam Limited Language

DLL Dynamic Link Library F


DLP Digital Light Processing FAT File Allocation Table
DMA Direct Memory Access FAX Facsimile
DNS Domain Name System FDC Floppy Disk Controller
DPI Dots Per Inch FDD Floppy Disk Drive

Page | 46
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)

DRAM Dynamic Random FIFO First In First Out


Access Memory
DRDO Defence Research and FORTRA Formula Translation
Development N
Organisation
DSL Digital Subscriber Line FPU Floating Point Unit
DTP Desktop Publishing FS File System
DVD Digital Video FTP File Transfer Protocol
Disc/Digital Versatile
Disc
DVD-R Digital Video Disc- FPS Frame Per Second
Recordable
DVD- DVD-Read Only FLOPS Floating Point Operations
ROM Memory Per Second
DVD-RW DVD-Rewritable FAQ Frequently Asked Question
DVR Digital Video Recorder Gb Gigabit
DOS Disk Operating System GB Gigabyte
E GIF Graphics Interchange Format
EBCDIC Extended Binary Coded GIGO Garbage in Garbage Out
Decimal Interchange
Code
E- Electronic Commerce GPU Graphics Processing Unit
Commer
ce
EDO Extended Data Out GSM Global System For Mobile
communication
EDP Electronic Data GUI Graphical User Interface
Processing
EDSAC Electronic Delay Storage H
Automatic Calculator
EEPROM Electrically Erasable HLL High Level Language
Programmable Read
Only Memory
E-Mail Electronic Mail HPFS High Performance File
System
ENIAC Electronic Numerical HDD Hard Disk Drive
Integrator And
Computer
EOF End Of File HSM Hierarchical Storage
Management
Page | 47
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)

EPROM Erasable Programmable HTML Hyper Text Markup


Read Only Memory Language
EXE Executable HTTP Hyper Text Transfer Protocol
EDI Electronic Data J
Interchange
I JPEG Joint Photographic Experts
Group
IBM International Business JRE Java Runtime Environment
Machine
IS Information System JS Java Script
IM Instant Message K
IMPA Internet Message Kb Kilobit
Access Protocol
iO S iphone Operating KB Kilobyte
System
IP Internet Protocol KHz Kilohertz
ISDN Integrated Services Kbps Kilobit Per Second
Digital Network
ISOC Internet Society L
ISP Internet Service LAN Local Area Network
Provider
ISR Interrupt Service LCD Liquid Crystal Display
Routine
IT Information Technology LDU Liquid Display Unit
M LED Light Emitting Diode
MAN Metropolitan Area LIFO Last In First Out
Network
Mb Megabit LPI Lines Per Inch
MB Megabyte LIPS List Processing
MBR Master Boot Record N
MAC Media Access Control NFS Network ROM File System
MPEG Moving Picture Experts NIC Network Interface Card
Group
MMS Multimedia Messaging NOS Network Operating System
Service
MIME Multipurpose Internet O
Mail Extensions
MSN Microsoft Network OCR Optical Character
Recognition

Page | 48
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)

MDI Multiple Document OMR Optical Mark Reader


Interface
MICR Magnetic Ink Character P
Recognition
MIMO Multiple-Input Multiple- P2P Peer-to-Peer
Output
MIPS Million Instructions Per PAN Personal Area Network
Second
MIDI Musical Instrument PAP Password Authentication
Digital Interface Protocol
Q PC Personal Computer
QDR Quad Data Rate PCL Printed Command Language
QoS Quality of Service PDF Portable Document Format
QBE Query By Example PDL Program Design language
R PIO Programmed Input/ Output
RAM Random Access PLA Programmable Logic Array
Memory
RARP Reverse Address PL 1 Programming Language 1
Resolution Protocol
RDBMS Relational Database PnP Plug and Play
Management System
RIP Routing Information POS Point Of Sales
Protocol
ROM Read Only Memory PPM Pages Per Minute
ROMB Read Out Motherboard PPP Point-to-Point Protocol
RPG Report Program PPTP Point to-Point Tunneling
Generalor Protocol
RTOS Real Time Operating PROM Programmable Read Only
System Memory
RTF Rich Text Format PSTN Public Switched Telephone
Network
S PSU Power Supply Unit
SaaS Software as a Service POST Power On Self Test
SAN Storage Area Network T
SCSI Small Computer System TCP Transmission Control
Interface Protocol
SDL Simple Direct Media TDMA Time Division Multiple
Layer Access

Page | 49
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)

SMTP Simple Mail Transfer TTA True Tap Audio


Protocol
SNOBOL String Oriented and TTF True Type Font
Symbolic Language
SP Service Pack TTS Text-To-Speech
SQL Structured Query TY Tele Type
Language
SRAM Static Random Access TFT Thin-Film Transistor
Memory
SVD Structured VLSI Design TB Terabytes
SNMP Simple Network U
Management Protocol
SIM Subscriber UAC User Account Control
Identification Module
UI User Interface V
UPS Uninterruptible Power VAR Variable
Supply
URI Uniform Resource VB Visual Basic
Identifier
URL Uniform Resource VDD Virtual Device Driver
Locator
URN Uniform Resource VGA Video Graphics Array
Name
USB Universal Serial Bus VLAN Virtual Local Area Network
ULSI Ultra Large Scale VM Virtual Memory
Integration
UNIVAC Universal Automatic VMS Video Memory System
Computer
UTP Unshielded Twisted Pair VPN Virtual Private Network
W VT Video Terminal
WAN Wide Area Network VSNL Videsh Sanchar Nigam
Limited
WAP Wireless Application VDU Visual Display Unit
Protocol
Wi-Fi Wireless Fidelity VLSI Very Large Scale Integration
WiMax Worldwide VRAM Video Random Access
Interoperability for Memory
Microwave Access

Page | 50
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)

WINS Windows Internet X


Naming Service
WLAN Wireless Local Area XHTML eXtensible HyperText
Network Markup Language
WMA Wireless Media Audio XML eXtensible Markup Language
WMV Wireless Media Video XNS Xerox Network Services
WPA Wi-Fi Protected Access XUL XML User interface Language
WWAN Wireless Wide Area Y
Network
WWW World Wide Web YB Yottabyte
WLL Wireless Local Loop Z
WORM Write Once Read Many ZIFS Zero Insertion Force Socket
ZIP Zone Information Protocol
ZISC Zone Instruction Set ZNA Zone Network
Computer Administration
ZMA Zone Multicast Address ZB Zettabyte

History of Computer
Computer is not the creation of one day, rather it took a long period for the
development of modern computer. History of computer is described in this
table.
Invention Inventor Characteristics Applications
Abacus China • First mechanical • Used for addition and
(1602) calculating device. subtraction
• A horizontal rod operations.
represents the one, tens,• Calculation of square
hundred, etc. roots can also be
performed.
Napier’s John • Three • Perform multiplication
dimensional
Bones Napier structure. on numbers.
(1617) (Scotland• Holding numbers from •0 Technology used for
) to 9 to 9 only. calculation called
• Represent graphical Rabdologia.
structure of calculating
result.
Pascaline Blaise • First mechanical adding • Perform addition and
(1642) Pascal machine. subtraction of two
(France) • t was structured like numbers.
rectangular box, with
Page | 51
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)

eight disc (represent • Mainly designed with


number of units). regard to the pressure
of liquid.
Jacquard’s Joseph • Mainly weaved a silk • Simplified the process
Loom Marie based pattern. of Textiles
1801 Jacquard• Used punched card for the
(France) sequence of operation.
Analytical Charles • First general-purpose• It was a decimal
Engine Babbage computer. machine used sign and
(1837) (Father • Stored program in the magnitude for
of form of pegs also called representation of a
Compute barrels. number.
r London)

• It used punched cards • Read one card at a


Tabulating Herman with round holes. time.
Machine Hollerith• It was the first
(1890) (America electromechanical
) machine, designed to
process the data for
census in 1890.
MARK-1 Howard • Consists of interlocking • Mainly used in the war
(1944) Aiken panels of small glass, effort during World
(America counters, switches and War-II
) control circuits. • Magnetic drums are
• Data can be entered used for storage.
manually.
ENIAC JP Eckert• It is a combination of • Used for weather
(1946) and JW twenty accumulators. prediction, glomic
Mauchly.• First electronic digital energy calculation and
(America computer. other scientific users.
)
EDSAC John Von • It was first computer • Capable of storing
(1949) Neuman which provided storage instructions and data
n capacity. in memory.
(America• First computer program • Used mercury delay
) was run on machine. lines for memory,
vacuum tubes for
logic.

Page | 52
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)

UNIVAC J.Presper• First • Used magnetic tapes


general-purpose
(1951) Eckert electronic computer wit as input and output.
and John large amount of input and
Mauchly output.
(America
)
IBM-650 IBM • Provided •
input/output Payroll processing
Computer Company units •
converting Oil refinery design
(1953) alphabetical and special• Market research
characters to two-digit analysis.
decimal code.

Generations of Computer
A generation refers to the state of improvement in the development of system.
Computers are built of electromechanical, before generation. Each generation
of computer is characterized by a major technological development that
fundamentally changed the way, computers operate.
Genera Switching Storage Operati Characteristics Applications
tion Device Device/S ng
peed System
First Vacuum Magnetic Batch • Fastest • Used for
(1940- tubes droms operati computing scientific
56) (333 ng device. purpose e.g.
micro system • Generate large ENIAC,UNIVAC
seconds) (Machin amount of heat. MARK-1 etc.
e • Non-portable.
languag
e Binary
number
0’s and
1’s)
Second Transistor Magnetic Time • More reliable • Used for
(1964- s core sharing and less prone commercial
63) (Made up technolo OS, to hardware production e.g.
of gy Multitas failure. PDPs IBM-
semicond (10 micro king OS• Portable and 1401.etc
uctor) seconds) Assembl generate less
y amount of heat
languag

Page | 53
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)

e high
level
languag
e.
Third Integrated Magnetic Real- • Consumed less • Database
(1964- Circuits core as time power management
71) (ICs) primary system • Highly system e.g.
(Made up storage High sophisticated NCR 395, B6
of silicon) medium level technology 500 etc.
(100 languag required
nano e
seconds) (FORTR
AN
COBOI
ALGOL)
Fourth Large Semi Time • More reliable • Distributed
(1971, Scale conducto sharing, and portable. system. E.g.
Present integrated r GUI • This generation Intel 4004
) (ISI) circuit memory, interfac leads to better chup,
micro- Winchest e communication Macintosh.
processor er disc (PASCAL and resource
(300 , sharing
nano ADA,
seconds) COBAL-
74,
FORTRA
N-4)
Fifth Super Optical Knowle• Parallel • Artificial
Present Large disc dge processing. intelligence
and Scale Informa• Intel core e.g. Robotics
Beyond Integrated tion micro-
) (SISI) chips Processi processor is
ng implemented.
System.• Enables mega
chips.

• Siddhartha was the first computer developed in India.


• Alan Turing is known as the father of the modern computer.

Page | 54
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)

• John Von Neumann was introduced first architecture of computer in the year
1948
• Transistors were invented by Bell Laboratory.
• In1958, Jack St. Clair Kilby and Robert Noyce invented the first IC.
• In latest generation computers, the instructions are executed parallel as well as
sequential.

Classification of Computer
Computers are mainly classified in three types as follows
BASED ON SIZE BASED ON WORK BASED ON PURPOSE
• Microcomputer • Analog Computer • General Purpose
• Mainframe Computer • Digital Computer Computer
• Minicomputer • Hybrid Computer • Special Purpose
• Supercomputer Computer

Based on Size
On the basis of size, computers are categorized as follows:

Microcomputer
These types of computers are the least powerful yet the most widely used and
are also called portable computers. Microcomputer consists of three basis
categories of physical equipment, i.e. system unit, input/output unit and
memory unit.

Some types of microcomputer are as follows


a) Desktop Computer or Personal Computer(PC) These are small, relatively
economical computers. These are based on the microprocessor technology
(Integrated Circuit-IC).
b) Laptop These computers are also known as ultra book or notebook. These are
portable and light weighted. They include rechargeable battery. So these can
work anywhere.
c) Handheld or Palmtop Computer These are the smallest and are designed to
fit into the palm. So, these are also known as Palmtop. They are practical for
certain functions such as phone books and calendars. They use the pen for input
instead of keyboard. E.g. PDA (Parsonal Digital Assistant) tablets, etc.
Page | 55
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)

d) Tablet Computer They have key features of the notebook computer, but
these can accept input from a pen instead of the keyboard or mouse.
e) Workstation Computer These are computers dedicated to a user or group of
users engaged in business or professional work. It includes one or more high
resolution displays and a faster processor than a Personal Computer (PC).

Minicomputer
These are smaller in size, faster and cost lower than mainframe computers.
Initially, the minicomputer was designed to carry out some specific tasks, like
engineering and Computer Aided Design (CAD) calculations. But now, they are
being-used central computer which is know as Server. Minicomputers are IBM-
17, DEC PDP-11, HP-9000, etc.

Mainframe Computer
These types of computer having large internal memory storage and
comprehensive range of software. Mainframe computer serves as a backbone
for the entire business world. It is considered as the heart of a network of
computers or terminals that allow a large number of people to work at the same
time. Mainframe computers are IBM-370, IBM-S/390, UNIVAC-1110, etc.

Supercomputer
These are the fastest and most expensive machines. They have high processing
speed compared to other computers. Supercomputers are most powerful, large
in size and memory, compared to all other computers.
The speed of supercomputers are measured in LOPS Floating Point Operations
Per Second) Supercomputers are used for highly calculation intensive tasks, such
as weather forecasting. nuclear research, military agencies and scientific
research laboratories.
I) CRAY-1 was the world's first supercomputer introduced by Seymour R CRAY in
1976.
II) PARAM was the first supercomputer developed in India in 1990.
III) PARAM ISHAN is the latest machine in the series of PARAM made by C-DAC
and IIT Guwahati on 20th September, 2016.

Page | 56
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)

Based on Work
On the basis of work, computers are categorized as follows
Analog Computer
These computer carry out arithmetic and logical operations by manipulating and
processing of data e.g. Speedometers, seismograph etc. Analog computer can
perform several mathematical operations simultaneously. It uses continuous
variables for mathematical operations and utilises mechanical or electrical
energy.

Digital Computer
These do work by calculating the binary digits. A digital compute, not only
performs mathematical calculations, but also combines the bytes to produce
desired graphics sounds. e-g . Desktop (PC).

Hybrid Computer
These are the Combination of analog and digital computers. Machines used
hospitals like ECG and DIALYSIS are the commonly used hybrid computers.

Based on Purpose
On the basis of purpose, computers are categorized as follows

General Purpose Computer


General purpose computers are those computers. which are used to solve
variety of problems by changing the program or instructions. e.g. To make small
database, calculations, accounting, etc

Special Purpose Computer


Special purpose computer are those computers which are used to solve a
single and dedicated types of problem e.g. Automatic aircraft landing,
multimedia computer, etc.

COMPUTER ARCHITECTURE
Computer architecture deals with the functional behaviour of a computer
system as viewed by a programmer. It can also be described as the logical
structure of the system unit that housed electronic components. The computer

Page | 57
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)

architecture forms the backbone for building successful computer systems The
first computer architecture was introduced in 1970.

Components of Computer
A computer consists of following three main components
1. Input/ Output (I/0) Unit.
2. Central Processing.
3. Memory Unit.
Note System units a metal or plastic case that holds all the physical parts of the
Me computer components that process data are located in it.

Input Unit
The computer accepts coded information through input unit by the user. It is a
device that is used to give required information to computer e.g. Keyboard,
Mouse, etc.
An input performs the following function
• It accepts the instruction and date in the user.
• It convert these instructions and data in computer in acceptable format.
• It supplies the converted instructions and data to the computer system for
futher processing

Output Unit
This unit sends the processed results to the user. It is mainly used to display the
desired result to the user as per input instruction. e.g. Monitor, printer, plotter,
etc.
The following functions are performed by an output unit

Page | 58
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)

• It accepts the results produced by the computer which are in coded form and
hence cannot be easily understood by user.
• It converts these coded results to human acceptable form.
• It supplies the converted results to the user

Central Processing Unit (CPU)


It consists a set of registers, arithmetic logic unit and control unit, which
together interpret and execute instruction in assembly language.

The primary functions of the CPU are as follows


• The CPU transfers instruction and input data main memory to registers i.e.
internal memory
• The CPU executes the instructions in the stores sequence.
• When necessary, CPU transfers output data from register to main memory.
Central Processing Unit Is often called the brain of computer. The CPU is
fabricated as a single Integrated Circuit (IC) and is also known as microprocessor.
A CPU controls all the internal and external devices and performs arithmetic and
logic operations.
The CPU consists of following main sub-systems.

Arithmetic Logic Unit (ALU)


ALU contains the electronic circuitry that executes all arithmetic and logical
operations on the available data. "ALU uses registers to hold the data that is
being processed . Most ALUs can perform the following operations.
• Logical operation (AND,NOT,OR,XOR)
• Arithmetic operations (addition, subtraction, multiplication and division).
• Bit-shifting operation (shifting or rotating a word by a specified number of bit to
the left or right with or without sign extension)
• Comparison operations (=, <, < =, >, > =)

Registers
These are used to quickly accept, store and immediately by the CUP. These
registers are the top of the memory hierarchy and the fastest way for the system
to manipulate data. The number and size of registers very from Processor to
processor.

Page | 59
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)

Control Unit (CU)


CU coordinates with the input and output devices of a compute . directs the
computer to carry out stored Program instructions by communicating with the
ALU and the registers. It organises the processing of data and instructions. The
basic function of control unit is to fetch the instruction stored in the main
memory. identify the operations and the devices involved in it and accordingly
generate control signals.

Microprocessor
IT is the controlling element in a computer system and is sometimes referred to
as the chip Microprocessor is the main hardware that drives the computer. It is
a large Printed Circuit Board (PCB). Which is used in all electronic system such
as computer, calculator, digital system, etc. The speed of CPU depends upon the
type of microprocessor used.
• Intel 4004 was the first microprocessor made by intel in 1971 by scientist Ted
Holf and engineer Fredence Faggin.
• Some of the popular microprocessors are Intel, Intel core 17, Dual core, Pentium
IV etc.

Memory Unit
This unit is responsible to store programs or data on a temporary or permanent
basis. It has primary memory (main memory) and secondary memory (auxiliary
memory). Te input data which is to be processed is brought into main memory
before processing. Another kind of memory is referred to as secondary memory
of a computer system. This unit used to permanently store data programs and
output. This is does not deal directly with CP

Motherboard
The main circuit board contained in any computer is called a motherboard. It is
also known as the {main board or logic board or system board or 42lanar board.
All the other electronic devices and circuits of computer system are attached to
this board like. CPU. ROM , RAM, expansion slots, PCI slots and USB ports. It also
includes controllers for devices like the hard drive, DVD drive, keyboard and
mouse. In other words, motherboard makes everything in a computer work
together.

Page | 60
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)

COMPUTER SECURITY
The Internet has transformed our lives In many good ways. Unfortunately, this
vast network and its associated technologies also have brought In their wake,
the Increasing number of security threats. The most effective way to protect
yourself from these threats and attacks Is to be aware of standard cybersecurlty
practices. This article on 'What Is Computer Security?" presents an Introduction
to computer security and Its key concepts.
1. What Is Computer Security?
2. Computer Security Threats
3. Why Is computer security Important?
4. Best computer security practices.

What is computer security?


Computer security basically is the protection of computer systems and
information from harm, theft, and unauthorized use. It is the process of
preventing and detecting unauthorized use of your computer system.
There are various types or computer security which Is widely used to protect the
valuable Information of an organization.

What is Computer Security and its types?


One way to ascertain the Similarities and differences among Computer Security
Is by asking what Is being secured. For example,
• Information security is securing Information from unauthorized access,
modification & deletion
• Application Security is securing an application by building security features
to prevent from Cyber Threats such as SQL Injection, Dos attacks, data breaches
and etc.
• Computer Security means securing a standalone machine by keeping It
updated and patched
• Network Security is by securing both the software and hardware technologies
• Cybersecurity is defined as protecting computer systems, which communicate
over the computer networks.
It's Important to understand the distinction between these words, though there
isn’t necessarily a clear consensus on the meanings and the degree to which they
overlap or are Interchangeable.

Page | 61
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)

So, Computer security can be defined as controls that are put In place to provide
confidentiality, Integrity, and availability for all components of computer
systems. Let's elaborate the definition.

Components of computer system


The components of a computer system that needs to be protected are:
• Hardware, the physical part of the computer, like the system memory and disk
drive
• Firmware, permanent software that Is etched Into a hardware device's
nonvolatile memory and Is mostly Invisible to the user
• Software, the programming that offers services, like operating system, word
processor, internet browser to the user

The CIA Triad


Computer security Is mainly concerned with three main areas:
• Confidentiality is ensuring that Information Is available only to the Intended
audience
• Integrity is protecting Information from being modified by unauthorized parties
• Availability is protecting Information from being modified by unauthorized
parties
In simple language, computer security Is making sure Information and computer
components are usable but still protected from people or software that
shouldn't access It or modify It.
Now moving forward with this 'What is Computer Security?" article let's look at
the most common security threats.

Computer security threats


Computer security threats are possible dangers that can possibly hamper the
normal functioning of your computer. In the present age, cyber threats are
constantly increasing as the world Is going digital. The most harmful types of
computer security are:

Viruses
A computer virus Is a malicious program which is loaded Into the user's
computer without user's knowledge. It replicates itself and Infects the files and
programs on the user's PC. The ultimate goal of a virus Is to ensure that the
victim's computer will never be able to operate properly or even at all.

Page | 62
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)

Computer Worm
A computer worm Is a software program that can copy Itself from one computer
to another, without human Interaction. The potential risk here Is that it will use
up your computer hard disk space because a worm can replicate In great volume
and with great speed.

Phishing
Disguising as a trustworthy person or business, phishers attempt to steal
sensitive financial or personal Information through fraudulent email or Instant
messages. Phishing in unfortunately very easy to execute. You are deluded Into
thinking It's the legitimate mall and you may enter your personal information.

Cyber Security Training


i) Botnet A botnet is a group of computers connected to the Internet, that have
been compromised by a hacker using a computer virus. An Individual computer
Is called 'zombie computer'. The result of this threat Is the victim's computer,
which Is the bot will be used for malicious activities and for a larger scale attack
like DDoS.
ii) Rootkit A rootklt Is a computer program designed to provide continued
privileged access to a computer while actively hiding Its presence. Once a rootklt
has been Installed. the controller of the rootklt will be able to remotely execute
files and change system configurations on the host machine.
iii) Keylogger Also known as a keystroke logger, keyloggers can track the real-time
activity of a user on his computer. It keeps a record of all the keystrokes made
by user keyboard. Keylogger Is also a very powerful threat to steal people's login
credential such as username and password.
iv) Trojan A Trojan, or Trojan Horse, is a non-self replicating type of malware
which appears to perform a desirable function but instead facilitates
unauthorised access to the user’s computer system. Trojans do not attempt to
inject themselves into other files like a computer virus.
v) Spyware It is a program which is installed on a computer system to spy on the
system owner's activity and collects all the information which is misused
afterwards.
vi) Spoofing It is the technique to access t he unauthorized data wiiJ1out
concerning to the authorized user.

Page | 63
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)

vii) Hacking It is an act of intruding in to someone else's computer or network. A


hacker is someone, who does hacking process.
viii) Cracking It is an act of breaking into computers. Cracking tools include
password crackers. trojans, virus. War-dialers, etc.
ix) Spam It is the abuse of messaging systems to send unsolicited bulk message in
the form of E-mails. It is also called junk E-mails.
These are perhaps the most common security threats that you'll come across.
Apart from these, there are others like spyware, wabbits, scareware,
bluesnarflng and many more. Fortunately, there are ways to protect yourself
against these attacks.

Why Is Computer Security Important?


In this digital era, we all want to keep our computers and our personal
Information secure and hence computer security is important to keep our
personal Information protected. It 1s also Important to maintain our computer
security and Its overall health by preventing viruses and malware which would
Impact on the system performance.

Computer Security Practices


Computer security threats are becoming relentlessly Inventive these days. There
Is much need for one to arm oneself with Information and resources to
safeguard against these complex and growing computer security threats and
stay safe online. Some preventive steps you can take Include:

• Secure your computer physically by:


o Installing reliable, reputable security and anti-virus software
o Activating your firewall, because a firewall acts as a security guard between the
Internet and your local area network
• Stay up-co-date on the latest software and news surrounding your devices and
perform software updates as soon as they become available
• Avoid clicking on email attachments unless you know the source
• Change passwords regularly, using a unique combination of numbers, letters
and case types
• Use the Internet with caution and ignore pop-ups, drive-by downloads while
surfing

Page | 64
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)

• Taking the time to research the basic aspects of computer security and educate
yourself on evolving cyber-threats
• Perform dally full system scans and create a periodic system backup schedule
to ensure your data Is retrievable should something happen to your computer.
Apart from these, there are many ways you can protect your computer system.
Aspects such as encryption and computer cleaners can assist In protecting your
computers and Its files.

Solutions to Computer Security Threats


Some safeguards to protect a computer system from accidental access are :
1. Antivirus Software It is an application software that is designed to prevent,
search for, detect and remove viruses and other malicious software’s. e.g. Avast,
McAfee. Quick heal. Avg, etc.
2. Digital Signature It is an electronic form of a signature that can be used to
authenticate the identity of the sender of a message.
3. Firewall Its primary objective is to control the incoming and outgoing network
traffic by analysing the data packets and determining whether it should be
allowed through or not, based on a predetermined rules..
4. Password It is a secret word or a string of characters used for user
authentication to prove identity or access approval to gain access to resources,
which should be kept secret from those who are not allowed to get access.

E Governance
E-government is also known as e-gov, electronic government, Internet
governance, digital government, online government, connected government. As
of 2014 the OECD still uses the term digital government, and distinguishes it
from e-government in the recommendation produced there for the Network on
E-Government of the Public Governance Committee. Several governments have
started to use the term digital government to a wide range of services involving
contemporary technology, such as big data, automation or predictive analytics.

E-gov strategies (or digital government) is defined as "The employment of the


Internet and the world-wide-web for delivering government information and
services to the citizens." (United Nations, 2006; AOEMA, 2005). Electronic
government (or e-government) essentially refers to "utilization of Information
Technology (IT), Information and Communication Technologies (ICT s), and

Page | 65
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)

other web-based telecommunication technologies to improve and/or enhance


on the efficiency and effectiveness of service delivery in the public sector". E-
government promotes and improves broad stakeholders contribution to
national and community development, as well as deepen the governance
process.

In electronic government systems, government operations are supported by


web-based services. It involves the use of information technology, specifically
the Internet, to facilitate the communication between the government and its
citizens.
e-Government and e-Governance
The two terms 'e-Government' and 'e-Governance' are independent concepts.
e-Government is understood as the use of Information and Communication
Technology (ICT) to promote more efficient and cost effective government,
facilitate more convenient government services and allow greater public access
to information, and make government more accountable to citizens.

Types of E Governance
E-Governance can be considered as the social inclusive policy for development
of transparency and accountability of both people in society and administration.
This policy involves providing the services to the people with collection of
information through the institutional and communicational development.

It provides quality services in several ways. Those ways are also called as types
of e-governance. These are mentioned below:

Page | 66
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)

1. G2C (Government to Citizen)


2. G2G (Government to Government)
3. G2B (Government to Business)
4. G2E (Government to Employee)

1. G2C (Government to Citizen)


As people are the key concept of politics and government as well as governance,
the government is compelled to connect with citizens through the transparent
and accountable order. In this connection the government is responsible for
promoting the social opportunities and public services in the field of-
• Transportation (Registration of motor vehicles, Issue of driving licenses, Issue of
plying permissions, Tax and fee collection through cash and bank challans and
control of pollution etc.),
• hospitals {linking of various hospitals in different parts of the country to ensures
better medical services to citizens),
• education ( availability of the e-learning modules to the citizens, right to
education),
• online job portal and various customer services.
also ensures services such as issue of certificates, job cards, passport, ration
cards, payments of bills and filing the taxes from the door step through e-
governance platform. The main objectives of the G2C services are to ensure
equitable distribution of information for all, acceptance of citizen's feedback,
and improving welfare services.

2. G2G (Government to Government)


G2G has been referring to raising the quality of the government process by cost
cutting, managing performance,, and making strategic connections within
government.
It enables government institutions to be more efficient and more effective by
the use of IT tools such as-
• Live fingerprints scanning and verification,
• Electronic entry of reports and paperwork etc.
The major key areas in this type of e-governance are
• E-Secretariat (all the valuable information regarding the function of the
government are interlinking throughout the various departments),

Page | 67
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)

• E-Police (police personnel records, criminal records etc), and


• E-Court (creating a database of all the previous cases, pending and ongoing
cases) and Statewide Networks

3.G2B (Government to Business)


G28 is mainly concerned with these things-
• E-taxation,
• Getting a license from the government etc.
• Secure Electronics Transactions.
It has included the policy of government with business. According to S.P Kumar,
'the essentials for achievement of G28 services for secure and authentic
transactions include: Standards for electronic transactions, a secure payment
mechanism and Public key infrastructure'

4.G2E (Government to Employee)


The G2E model refers to providing Information and services from government
to employee and employee to government as well. It involves training through-
• e-learning methods;
• Consolidating the employee and
• Share of knowledge among the employees.
It has also facilitated the employee to access information regarding pay and
benefit policies and manage their profits through online.

Government 2.0
Government 2.0 or Gov 2.0 refers to government policies that aim to harness
collaborative technologies and interactive Internet tools to create an open-
source computing platform in which government, citizens, and innovative
companies can improve transparency and efficiency. Put simply, Gov 2.0 is
about "putting government in the hands of citizens".Gov 2.0 combines
interactive Web 2.0 fundamentals with e-government and increases citizen
participation by using open-source platforms, which allow development of
innovative apps, websites, and widgets. The government's role is to
provide open data, web services, and platforms as an infrastructure.

WHAT IS SMART GOVERNANCE ?

Page | 68
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)

Simple — implies simplification of rules and regulations of the


government and avoiding complex processes with the application of
ICTs and therefore, providing a user-friendly government.

Moral — meaning the emergence of a new system in the administrative


and political machinery with technology interventions to improve the
efficiency of various government agencies.

Accountable — develop effective information management systems and


other performance measurement mechanisms to ensure the
accountability of public service functionaries.

Responsive — Speed up processes by streamlining them, hence making


the system more responsive.

Transparent — providing information in the public domain like websites


or various portals hence making functions and processes of the
government transparent.

e-Governance Initiatives
From the early 90s, information technologies were supplemented by ICT
technologies to extend its use for sector-wide applications with policy emphasis
on reaching out to rural areas and taking in greater inputs from NGOs and
private sector.

Steps taken to promote e-governance in India are as follows:


• A National Task Force on Information Technology and Software Development
was set-up in 1998.
• The Ministry of Information Technology was created at the Centre in 1999.
• A 12-point agenda was listed for e-Governance for implementation in all the
central ministries and departments.
• The Information Technology Act (2000) was enacted. This Act was amended in
2008.
• The first National Conference of States’ IT Ministers was organised in the year
2000, for arriving at a Common Action Plan to promote IT in India.
• Government set-up NISG (National Institute for Smart Government).
• The state governments launched e-Governance projects like e-Seva (Andhra
Pradesh), Bhoomi (Karnataka), and so on.
Page | 69
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)

• The National e-Governance Plan (NeGP) was launched. It consists of 31 Mission


Mode Projects (MMPs) and 8 support components.
• The National Policy on Information Technology (NPIT) was adopted in 2012.
• The National e-Governance Plan (NeGP)
• The National e-Governance Plan (NeGP), provides a holistic view of e-
Governance initiatives across the country.
• Around this idea, a massive countrywide infrastructure reaching down to the
remotest of villages is evolving, and large-scale digitization of records is taking
place to enable easy, reliable access to the internet.
• The Government has proposed to implement “e-Kranti: National e-Governance
Plan (NeGP) 2.0” under the Digital India programme.
• E-Courts It is launched by Department of Justice, Ministry of Law and Justice. Its
aim is improve the provision of judicial services to citizens.
• E-District It is launched by Department of Information Technology. Its aim is to
deliver citizen centric services at the district level such as issue of birth/death
certificate, income and caste certificates etc.
• E-Office It is launched by Department of Administrative Reforms and Public
Grievances. It aim is significantly improve the operational efficiency of the
government by transistioning to a less paper office.
• MCA 21 It is launched by the Ministry of Corporate Affairs. The project aims to
provide electronic services to the companies registered under the Companies
Act,

Page | 70
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)

Quick Revision
1. ICT includes both old and new tools. Old ICT tools mainly include radio, TV,
and telephone. New ICT tools mainly include computers, satellite, wireless
technology, and the Internet. ICTs not only refer to the latest computer and the
Internet-based technologies but also refer simple audio-visual aids such as
transparencies, slides, cassette and video recorders, radio, television, and film.

2. Target Community of IT in India as far as India's demographic profile is


concerned, almost half of India's population is below 25' years of age, 70%
people live in rural areas, literacy rate is around 60%, and people speak 15 major
languages.

3. Objectives of Using ICT in Higher Education The objectives of using ICT are the
following:
• Improving access to the system through online education.
• Improving the quality of teaching, especially across remote locations.
• Increasing transparency and strengthening Information and Communication
Technology systems, processes, and compliance norms in higher education
institutes.
• Measuring the students' learning participation and effectiveness.
• Analyzing students' behaviour to maximize students' involvement, optimizing
retentions, and improving placements.
• Analyzing students' performance, placement, application volume, website
analytics, and social media metrics for brand audit.

4. The potential threat of plagiarism is high as students can copy information


rather than learning and developing their own skills.

5. Synchronous media requires all participants to be together at the same time


even though they are in different locations. Asynchronous media allows
participants in the learning process to be at different times and at different
places.

6. Line access and avoidance of collision are the main functions of: network
protocols

Page | 71
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)

7. In the hypermedia database, information bits are stored in the form of: nodes

8. Networked media exist in interconnected: technological environments

9. The combination of computing, telecommunications and media in a digital


atmosphere is referred to as: convergence

10. A dialogue between a human-being and a computer programme that occurs


simultaneously in various forms is described as: interactivity

11. Using websites to pour out one's grievances is called: cyberventing.

12. E-Leaning or Electronic Learning is also known as online learning and is


commonly associated with the field of advanced learning technology (ALT),
which deals with both the technologies and associated methodologies in
learning using networked and/ or multimedia technologies. Distance education
provided the base for elearning's development.

13. Blended Learning is a combination of multiple approaches to learning. It is


usually used to define a situation where different delivery methods are
combined together to deliver a particular course. These methods may include a
mixture of face-to-face learning, self-paced learning, and online classrooms.

14. Face-To-Face Learning refers to learning that occurs in a traditional


classroom setting where a faculty member delivers instructions to a group of
learners. This could include lectures, workshops, presentations, tutoring,
conferences, and so on.

15. Self-Paced Learning provides the flexibility to learn according to the


availability of learners' own time and pace. It occurs in a variety of ways, such as
reading specific chapters from the text book, studying the course material
presented through web-based or CD-based courses, attending prerecorded
classes or sessions, reading articles referred by the faculty members, working on
assignments and projects, and searching and browsing the Internet.

Page | 72
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)

16. Online Collaborative Learning involves interaction between the learners and
the faculty members through the web. This interaction can occur in one of the
following modes
(i) synchronous interaction and
(ii) asynchronous interaction, which have been discussed earlier.

17. Distance Learning is a type of education, where students work on their own
at home or at office and communicate with the faculty and other students via e-
mail, electronic forums, video conferencing, chat rooms, instant messaging, and
other forms of computer-based communications. It is also known as open
learning.

18. National Mission on Education through Information and Communication


Technology (NMEICT): NMEICT is a centrally sponsored scheme to realize the
potential of ICT in teaching/ learning process for benefit of all the learners in
higher education institutions anytime and anywhere.

19. In web search, finding a large number of documents with very little relevant
information is termed: poor recall

20. The concept of connect intelligence is derived from: value added networks

21. Use of an ordinary telephone as an internet appliance is called: voice line

22. Video transmission over the internet that looks like delayed live casting is
called: real-time video

23. WYSIWYG – describes the display of a document on screen as it will actually


print: what you see is what you get

24. UNIX is not a Computer language.

25. A key-board has atleast: 101 keys.

26. An e-mail address is composed of: two parts.

27. Corel Draw is a popular: Illustration programme.

Page | 73
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)

28. Firewalls are used to protect a communication network system against:


Unauthorized attacks
29. Under the N-list program of INFLIBNET (under NMEICT), lakhs of e-books and
thousands of high-quality paid e-journals have been made available to colleges
and universities with a view to inculcate research culture in teachers and
students.

30. Frequency Modulation (FM) is a form of modulation that conveys


information over a carrier wave by varying its frequency (contrast this with
amplitude modulation, in which the amplitude of the carrier is varied while its
frequency remains contestant).

31. The Internet Protocol Television (IPTV) is a digital TV (and not PC) that is
delivered through high-speed Internet (broadband) connection. In this service,
channels are encoded in IP format and delivered to the TV through a set-top box
that is required at the customer's location.

32. Registrar of Newspapers for India (RNI) came into being in 1956. It is
mandatory for all newspapers and magazines to get them registered with RNI.
Its head office is in New Delhi.

33. Press Information Bureau (PIB) is the nodal agency of the Government of
India to disseminate information to the print and electronic media on
government policies, programme initiatives, and achievements. It has its
headquarters in New Delhi and has eight regional offices.

34. The accounting software 'Tally' was developed by : TCS 35. Errors in
computer programmes are called: Bugs

36. HTML is basically used to design: Web-page

37. 'Micro Processing' is made for: Computer

38. Information, a combination of graphics, text, sound, video and animation is


called: Multimedia

39. Where does a computer add and compare its data?: CPU

Page | 74
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)

40. Computers on an internet are identified by: IP address

41. Infotech India Ltd. Is not an Internet Service Provider (ISP)?:

42. The hexadecimal number system consists of the symbols: 0 – 9, A – F

43. The binary equivalent of ( - 15)10 is (2's complement system is used):


11110001

44. 1 GB is equal to : 230 bytes

45. NAM News Network (NNN) is the Internet-based news and


photographexchange arrangement of news agencies of non-aligned movement
countries.

46. Basic Computer Terms is a programmable machine. It allows the users to


store all sorts of information and then process that information, or data, or carry
out actions with the information, such as calculating numbers or organizing
words.

47. Analogue Computers are that in which data varies continuously, that is, the
movement of data is continuous. It is generally meant to measure physical
variables such as voltage, pressure, temperature, speed, and so on. It is mainly
used for communication and broadcast transmission.

48. Digital Computers are those computers in which data flow in discrete form.
These are high-speed programmable electronic devices that perform
mathematical calculations, compare values, and store the results.

49. A hybrid computer combines the desirable features of analogue and digital
computers. They combine the speed of analogue computers and accuracy of
digital computes. Now, analogue- to- digital and digital-toanalogue converters
are used for transforming data into suitable form for either type of computation.

50. Mainframe Computers can also process data at very high speed (million
instructions per second – MIPS). Mainframe computers are large sized,
powerful, multi-user computers that can support concurrent programs. They
can accommodate more than 1000 workstations simultaneously.

Page | 75
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)

51. Mini Computers have lesser speed and storage capacity in comparison to
mainframe computers. Hence, their performance also is less than that of
mainframes. They are mid-sized multiprocessing computers. They can perform
several actions at the same time and can support 4 to 200 users simultaneously.
Some of the features of mainframes are not available in minicomputers.

52. A microcomputer is also called a personal computer (PC). It is a small and


relatively inexpensive computer, commonly consisting of a display screen, a
keyboard, a CPU (central processing unit), one or more disk drives, and a printer,
with limited storage, based upon a microprocessor. It is designed for an
individual user.

53. A peripheral device is any device that can be connected to a computer. This
term includes monitors, keyboards, mouse, webcams, drawing pads, joysticks,
modems, printers, scanners, interactive whiteboards, drive wheel and so on.

54. Input devices any device that is capable of inputting information into a
computer system, for example, keyboard, microphone, mouse, scanner,
webcam and so on.

55. Output devices are basically meant for anything that comes out of a
computer after being processed. These include monitor, headphone, printers,
speakers, plotters, and VDUs (visual display units).

56. Random Access Memory (RAM) is also termed as the main memory. It is the
temporary memory (volatile) that allows information to be stored randomly and
accessed quickly and directly (without the need to go through intervening data).

57. Read-only Memory (ROM) is the permanent memory of a computer; a set of


instructions that has been built into the computer by the manufacturer and
cannot be accessed or changed by the user.

58. Primary storage consists of RAM and ROM. In primary memory, data are not
stored permanently, but temporarily. After getting off data are erased from the
memory of computer.

59. Secondary storage termed as auxiliary storage. Secondary memory/ storage


is the slowest and the cheapest form of memory. It cannot be processed directly
by the CPU. It must first be copied into primary storage (RAM).

Page | 76
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)

60. Secondary memory devices include magnetic disks like hard drives and
floppy disks; optical disks such as CDs and CD-ROMs; and magnetic tapes, which
were the first forms of secondary memory.

61. Software is a set of programs, procedures, algorithms, and associated


documents that provide instructions for telling a computer what to do, when to
do, and how to do. It can also be defined as computerized instructions that
operate a computer, manipulate the data, and execute particular functions or
tasks.

62. System software provides the basic functions for computer usage and helps
to run the computer hardware and system. It includes a combination of devices,
drivers, operating systems, serves, utilities, and Windows systems. It manages
hardware devices. It is also responsible for resource allocation. The operating
system and utility software are the two major categories of system software.

63. Topology: The physical topology of network refers to the configuration of


cables, computers, and other peripherals or simply as arrangement of
computers. Here, workstation or node refers to computer systems which are in
the network.

64. The Internet is a global system of interconnected computer networks that


use the standard Internet Protocol Suite (TCP/IP) to serve millions of users
worldwide. It is probably the largest WAN in the world.

65. A web browser is a software that permits a user, with the click of a mouse,
to locate, display, and download text, video, audio and graphics stored in a host
computer on the web.

66. The set of computer programs that manage the hardware/ software of a
computer is called: Operating System

67. S/MIME in internal technology stands for: Secure Multipurpose Internet Mail
Extension

68. The octal number system consists of the following symbols: 0 -7

69. The binary equivalent of (-19)10 in signed magnitude system is: 10010011

70. DNS in internet technology stands for: Domain Name System.


Page | 77
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)

PRACTICE QUESTIONS
1. Read the following two statements.
I. Information and Communication Technology (ICT) is considered a subset of
Information Technology (IT).
II. The right to use' a piece of software is termed as copyright.
Which of the given statement(s) is/are correct?
(A) Both I and II
(B) Neither I nor II
(C) Only II
(D) Only I

2. Information and Communication Technology includes


(A) online learning
(B) web based learning
(C) learning through the use of EDUSAT
(D) All of the above

3. Which of the following statements regarding the term ICT is/are TRUE?
P. ICT is an acronym that stands for Indian Classical Technology.
Q. Converging technologies that exemplify ICT include the merging of audio-
visual, telephone and computer networks through a common cabling system.
Select the correct answer using the codes given below.
(A) P and Q (B) Neither P nor Q
(C) Only P (D) Only Q

4. Match the following.


Invention Inventor
A. Pascaline 1. John von
Neurmann
B. Difference II. Blaise Pascal
Engine
C. EDVAC III. Charles
Babbage
Select the correct match using the codes given below.
ABC ABC
(A) I II III (B) II III I
(C) III II I (D) I III II

Page | 78
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)

5. First generation computer systems used


(A) transistors (B) vaccum tubes
(C) magnetic cores (D) silicon chips

6. Computer size was very large in


(A) first generation (B) second generation
(C) third generation (D) fourth generation

7. Which of the following statements regarding the term generation is/are TRUE?
P. Third generation's computers have real time operating system.
Q. First generation's computers have time-sharing operating system.
Select the correct answer using the codes given below.
(A) Only P (B) Only Q
(C) Neither P nor Q (D) Both P and Q
8. Transistors are associated with which of the following?
(A) First generation (B) Fifth generation
(C) Second generation (D) None of these

9. Speed of third generation computer is


(A) milli second (10−3 )
(B) micro second (10−6 )
(C) nano second (10−9 )
(D) pico second (10−12 )

10.Artificial intelligence is an example of


(A) first generation computer
(B) second generation computer
(C) third generation computer
(D) fifth generation computer

11....... is not a microcomputer, which is least powerful, yet the most widely used
and fastest growing type of computers.
(A) Desktop computer
(B) Laptop
(C) Tablet PC
(D) Mainframe computer

Page | 79
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)

12.A computer also known as server computer is


(A) super computer
(B) mainframe computer
(C) mini computer
(D) micro computer

13.Which of the following is the fastest and most expensive computer?


(A) Super computer
(B) Micro computer
(C) Mini computer
(D) None of these

14.The...... is responsible for performing calculations and contains decision making


mechanisms.
(A) CPU (B) MU
(C) ALU (D) CU

15.Control unit of a digital computer is often called the


(A) clock (B) nerve centre
(C) Both (A) and (B) (D) IC

16.What is the temporary storage memory chips that form the computers primary
work space? The contents are lost if power is disrupted?
(A) Outputs (B) Windows
(C) ROM (D) RAM

17....... is a type of memory circuitry that holds the computer's start up routine.
(A) RIM (Read Initial Memory)
(B) RAM (Random Access Memory)
(C) ROM (Read Only Memory)
(D) Cache Memory

18.When a computer is booting, BIOS is loaded to the memory by


(A) RAM (B) ROM
(C) CD-ROM (D) TCP

Page | 80
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)

19.With regard to computer memory, which of the following statements is TRUE?


P. Read Only Memory (ROM) is 'volatile' memory.
Q. Random Access Memory (RAM) is 'volatile' memory,
R. Secondary Memory is 'volatile' memory.
Select the correct answer using the codes given below.
(A) P and Q (B) P and R
(C) Only P (D) Only Q

20.Which of the following is the high speed memory which compensates the gap
in speeds of processor and main memory?
(A) Cache memory (B) PROM
(C) EPROM (D) SRAM

21.Put the following units of storage into the correct order, starting with the
smallest unit first and going down to the largest unit.
1. Kilobyte 2. Byte
3. Megabyte 4. Terabyte
6. Bit 5. Gigabyte
Choose the correct chronological order using the codes.
(A) 6, 2, 1, 3, 5, 4 (B) 6, 2, 1, 4, 3, 5
(C) 6, 2, 1, 3, 4, 5 (D) 6, 2, 1, 4, 5, 3

22.1 GB is equal to
(A) 2^30 bits (B) 2^30 bytes
(C) 2^20 bits (D) 2^20 bytes

23.Digital computers internally use the to represent data and perform arithematic
calculations.
(A) octal number system
(B) binary number system
(C) decimal number system
(D) hexa decimal number system

24.Decimal number system is the numbers. group of


(A) 0 or 1 (B) 0 to 9
(C) 0 to 7 (D) 0 to 9 and A to F

Page | 81
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)

25.Minimum number of bits required to store any 3 digits decimal number is


equal to
(A) 3 (B) 5
(C) 8 (D) 10

26.A hexadecimal number is represented by


(A) three digits
(B) four binary digits
(C) four digits
(D) All of the above

27.It provides us with a shorthand method of working with binary numbers. What
does It here?
(A) Hexa decimal number system
(B) Decimal number system
(C) Binary number system
(D) None of the above

28.Which one of the following represents the binary equivalent of the decimal
number 25?
(A) 10101 (B) 01101
(D) 11011 (C) 11001

29.If the binary equivalent of the decimal /number 48 is 110000, then the binary
equivalent of the decimal number 51 is given by
(A) 110011
(B) 110010
(C) 110001
(D) 110100

30.Which one of the following is correct?


(A) (17)10 = (17)16
(B) (17)10 = (17)8
(C) (17)10 = (10111)2
(D) (17)10 = (10001) 2

Page | 82
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)

31.Which one of the following is correct?


(A) (1101.10)2 (12.5) 2
(B) (1011.10)2 (13.5) 10
(C) (1101.10)2 (13.5) 10
(D) (1001.10)2 (11.5) 10

32.MSB refers as
(A) Most Significant Bit
(B) Many Significant Bit
(C) Multiple Significant Bit
(D) More Significant Bit

33.Match the following.


List I
A. (43)10 1. (99)10
B. (1100011)2 II. (110101)2
C. (1000000)2 III. (101011)2
D. (53) 10 IV. (64)2
Select the correct match using the codes given below.
ABCD
(A) III I IV II
(B) I II III IV
(C) I IV III II
(D) III I II IV

34.An ASCII is a character-encoding scheme that is employed by personal


computers in order to represent various characters, number and control keys
that the computer user selects on the keyboard. ASCII is an acronym for
(A) American Standard Code for Information Interchange
(B) American Standard Code for Intelligent Information
(C) American Standard Code for Information Integrity
(D) American Standard Code for Isolated Information

35.is a method of using binary digits to represent the decimal digits.


(A) ASCII (B) BCD
(C) EBCDIC (D) Hexadecimal system

Page | 83
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)

36.It runs on computer hardware which performs various type of functions in


order to manage and organise file
(A) operating system
(B) application software
(C) programs
(D) peripherals

37.It is the first program, runs on a computer, when the computer boots up
(A) System software
(B) Operating system
(C) System operations
(D) Processing system

38.Which one of the following is not the function of operating system?


(A) Resource management
(B) File management
(C) Networking
(D) Processor management

39.Which of the following operating systems is also known as single user


operating system?
(A) Windows (B) Linux
(C) Unix (D) MS-DOS

40.Windows XP is the name of a/an


(A) application software
(B) hardware
(C) system software
(D) None of the above

41.The primary purpose of the Windows operating system is


(A) to make the most efficient use of the computer hardware
(B) to allow people to use the computer
(C) to keep system programmer's employed
(D) to make computers easier to use

Page | 84
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)

42.The simultaneous processing of two or more programs by multiple processors,


is
(A) Multi-programming
(B) Multi-tasking
(C) Time-sharing
(D) Multi-processing

43.Utility programs include


(A) virus scanning software
(B) backup software
(C) disk defragmenter
(D) All of the above

44.is a Windows utility program that locates and eliminates unnecessary fragment
and rearranges files and unused to disk space to optimise operations.
(A) Backup
(B) Disk cleanup
(C) Disk defragmenter
(D) Restore

45.Disk cleaner helps to free which also serves to increase the speed of a slow
computer.
(A) data (B) recycle bin
(C) spaces (D) information

46.Languages which can easily interact with the hardware are called
(A) high level languages
(B) low level languages
(C) middle level languages
(D) All of the above

47.Match the following.


List I List II
A. C++ 1. Vint Cerf
B. Java II. Bjarne Stroustrup
C. Internet III. Tim Berners Lee
D. WorldWide Web IV. James Gosling

Page | 85
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)

Select the correct match using the codes given below.


ABCD
(A) I II IV III
(B) III II I IV
(C) IV II I III
(D) II IV I III

48.Computer language used for calculation is


(A) LOGO (B) FORTRAN
(C) BASIC (D) C++

49.A computer program used for business application is


(A) LOGO (B) COBOL
(C) BASIC (D) FORTRAN

50.C language developed by Dennis Ritchie in


(A) 1970 (B) 1971
(C) 1972 (D) 1973

51.The language used for development of various games is


(A) C (B) C++
(C) Java (D) SQL

52.Which of the following is not a programming language?


(A) Pascal (B) Microsoft Office
(C) Java (D) C++

53.Computer language used on Internet is


(A) PASCAL (B) Java
(C) BASIC (D) LOGO

54.The function of an assembler is


(A) to convert basic language into machine language
(B) to convert high level language into machine language
(C) to convert assembly language into machine language
(D) to convert assembly language into low level language

Page | 86
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)

55.The program is used to convert mnemonic code to machine code.


(A) debug (B) C++
(C) FORTRAN (D) assembler

56.Which one of the following is a file?


(A) Floppy disk (B) Magnetic drum
(C) Magnetic tape (D) None of the above

57.What are .bas, .eml, .htm examples of in computing?


(A) Extensions (B) Protocols
(C) Database (D) Domains

58.Which of the following statements is a false conceiving file name?


(A) Every file in the same folder must have a unique name
(B) The file name comes before the dot (.)
(C) The extension is another name for the type
(D) The file extension comes before the dot (.) followed by the file name

59.Which one of the following is not an/a image/graphic file format?


(A) PNG (B) GIF
(C) BMP (D) GUI

60.You organise files by storing them in


(A) archieves (B) lists
(C) indexes (D) folders

61....... may be included in other folder while making hierarchical structure folder.
(A) Mini folder (B) Tiered folder
(C) Sub-folder (D) Object

62.Microsoft Office was developed by........


(A) Microsoft Inc, 1970s
(B) Microsoft Inc, 1980s
(C) Sun Microsoft, 1980s
(D) Sun Microsoft, 1970s

Page | 87
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)

63.Which of the following is a collection of softwares, based on specific purpose


and mainly used in office work
(A) MS-Word (B) MS-Excel
(C) MS-PowerPoint (D) All of the above

64.Read the following three statements.


I. MS-Word provides tool for composing, editing, formating and printing of
documents.
II. Mail merge denotes the distance text boundaries and page margins.
III. Word offers Portrait-horizontally oriented.
Which of the given statement(s) is/are correct?
(A) Only I (B) Only II
(C) I and II (D) II and III

65.You can start Microsoft Word by using


(A) New (B) Start
(C) Program (D) All of these
66.When you start MS-Word, the opening document has the name as
(A) DOC-1 (B) Document 1
(D) Workbook (C) Document

67.The file extension of MS-Word document in Office 2007 is


(A).pdf (B) .doc
(C).docx (D) .txt

68.A collection of inter-related records is called a


(A) utility file (B) database
(C) spreadsheet (D) datasheet

69........... are the building blocks or relation any relational database mode.
(A) Tables (B) Fields
(C) Queries (D) Forms

70.…….. are distinct items that don't have much meaning to you in a given
context.
(A) Fields (B) Data

Page | 88
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)

(C) Queries (D) Properties

71.A collection of related files is called a


(A) character (B) field
(C) database (D) record
72.Rows of a relation are called
(A) relation (B) tuples
(C) data structure (D) entity

73.What is a stored question about information in a database?


(A) Query (B) Sort
(C) Report (D) Record

74.Which of the following objects is/are contained in database?


(A) Table (B) Query
(C) Form (D) All of these

75.Which of the following places the common data elements in order from
smallest to largest?
(A) Character, File, Record, Field, Database
(B) Character, Record, Field, File, Database
(C) Character, Field, Record, File, Database
(D) Bit, Byte, Character, Record, Field, File, Database

76.The data storage hierarchy consists of


(A) bits, bytes, fields, records, files and database
(B) bits, bytes, records, files and database
(C) bits, bytes, fields, files, records and database
(D) bytes, bits, fields, records, files and database

77.A combination of hardware and software that allows communication and


electronic transfer of information between computers is a
(A) network (B) backup system
(C) server (D) peripheral

78.A computer connected to another computer for sharing information form


(A) node (B) router

Page | 89
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)

(C) server (D) network

79.What type of resource is most likely to be a shared common resource in a


computer network?
(A) Printers (B) Speakers
(C) Floppy disk drives (D) Keyboards

80.What do we call a network whose elements may be separated by some


distance? It usually involves two or more network and dedicated high speed
telephone lines.
(A) LAN (B) WAN
(C) URL (D) Server

81.A(n) ...... area is a small group of computers and peripherals linked together in
a small geographic area.
(A) MAN (B) PAN
(C) CAN (D) LAN

82.Which of following types of network is a data network designed for a town or a


city?
(A) LAN (B) MAN
(C) PAN (D) WAN

83.There is a network that can connect networks ranging from small location or
area to a bigger range including public packet network and large corporate
networks. That network's enterprise allows users to share access to
applications, services and other centrally located resources. Its ability for a
huge geographical access has transformed networking. Which among the
following is that network?
(A) SAN (B) CAN
(C) LAN (D) WAN

84.Which of the following refers to a small, single-site network?


(A) PAN (B) DSL
(C) RAM (D) USB

Page | 90
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)

85.Choose the correct answer of the network according to their decreasing size of
extension/coverage.
(A) WAN, LAN, MAN, PAN
(B) WAN, MAN, LAN, PAN
(C) MAN, LAN, PAN, WAN
(D) MAN, PAN, WAN, LAN

86.Geometric arrangement of devices on the network is called


(A) topology (B) protocols
(C) media (D) LAN

87.The vast network of computers that connects millions of people all over the
world is called
(A) LAN (B) Web
(D) Internet (C) hypertext

88.Which is not the feature of Internet?


(A) E-mail
(B) News groups
(C) Chat
(D) Designing

89.The Internet allows to


(A) send electronic mail.
(B) view web pages.
(C) connect to servers all around the world
(D) All of the above

90.Internet was developed in the


(A) 1950s (B) 1960s
(C) 1970s (D) 1980s

91.A/An is a private network that is contained within an enterprise.


(A) Intranet (B) Internet
(C) Extranet (D) Logical net

92.Consider the following statements about Internet facility.

Page | 91
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)

I. It serves as the largest online information system.


II. It provides the most dependable and latest mode for sending e-mail,
III. Recurring expenditure on communicating e-mail is very high.
IV. It is often misused and has triggered cyber-crimes.
Which of these statement are correct?
(A) I, II and IV (B) I and IV
(C) II, III and IV (D) II and III

93.Protocol consists of ........., which suits are the set of communication protocols
used for the Internet.
(A) TCD/IT (B) TCP/IP
(C) TCP/IT (D) TCT/IP

94.TCP/IP is necessary if one is to connect to the


(A) phone lines (B) LAN
(C) Internet (D) a server

95....... is a protocol used by e-mail clients to download e-mails to your computer.


(A) TCP (B) FTP
(C) SMTP (D) POP

96.POP3 and IMAP are e-mail accounts in which


(A) one automatically gets one's mail everyday
(B) one has to be connected to the server to read or write one's mail UNE20
(C) one only has to be connected to the server to send and receive email
(D) one does not need any telephone lines

97.The acronym FTP stands for


(A) File Transfer Protocol
(B) Fast Transfer Protocol
(C) File Tracking Protocol
(D) File Transfer Procedure

Page | 92
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)

98.Which of the following is the communication protocol that sets the standard
used by every computer that accesses web-based information?
(A) XML (B) DML
(C) HTTP (D) HTML

99.WWW' stands for


(A) Work With Web
(B) Word Wide Web
(C) World Wide Web
(D) Worth While Web

100. The Internet service that provides a multimedia interface to available


resources is called
(A) FTP
(B) World Wide Web
(C) Domain name
(D) Web Browser

101. is collection of web pages and is the very first of website. page that we
seen on opening
(A) Home page, web page
(B) Website, home page
(C) Web page, home page
(D) Web page, website

102. The first web browser is


(A) Internet explorer
(B) Netscape
(C) World Wide Web
(D) Firebox

103. Internet explorer is a type of


(A) operating system (B) compiler
(C) browser (D) IP address

104. identify the IP address from the following.


(A) 300-215-317-3

Page | 93
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)

(B) [email protected]
(C) 202-50-20-148
(D) 202-50-20-148

105. What is the name for a web page address?


(A) Directory (B) Protocol
(D) Domain (C) URL

106. URL identifies the location of a specific web page on the Internet, here
URL stands for
(A) Uniform Read Locator
(B) Uniform Resource Locator
(C) Unicode Research Location
(D) United Research Location

107. Which of the following domains is used for profit business?


(A) .net (B).edu
(C).com (D) .org

108. Which one of the following is not the same as the other three?
(A) MAC address
(B) Hardware address
(C) Physical address
(D) IP address

109. Which is an instant messenger that is used for chatting?


(A) Alta Vista (B) MAC
(C) Microsoft (D) Google Talk

110. Which of the following is an instant messaging application?


1. WhatsApp 2. Google Talk
3. Skype
Select the corrrect answer using the codes given below.
(A) Only 1 (B) land 2
(C) 2 and 3 (D) 1, 2 and 3

Page | 94
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)

111. If you are allowing a person on the network based on the credentials to
maintain the security of your network, then this act refers to the process of
(A) authentication (B) automation
(C) firewall (D) encryption

112. Encoding or scrambling data for transmission across a network is known


as
(A) protection (B) detection (CS)
(C) encryption (D) decryption

113. If your computer rebooting itself then it is likely that


(A) it has a virus.
(B) it does not have enough memory.
(C) there is not printer.
(D) there has been a power surge.

114. Match the following.


List I List II
A. Virus 1. They are hard to
detect
B. Worms II. It is copied itself
C. Trojan III. Non-self replicating
type of malware
Select the correct match using the codes given below.
ABC ABC
(A) II I III (B) I II III
(C) II III I (D) I III II

115. A program designed to destroy data on your computer which can travel
to infect other computers, is called a
(A) disease (B) torpedo
(C) hurricane (D) virus

116. Which of the following refers to dangerous programs that can be


'caught' of opening e-mail attachments and downloading software from the
Internet?
Page | 95
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)

(A) Utility (B) Virus


(C) Honey Pot (D) Spam

117. Viruses, trojan horses and worms are


(A) able to harm computer system
(B) unable to detect if present on computer
(C) user-friendly applications
(D) harmless applications resident on computer

118. It is a self-replicating program that infects computer and spreads by


inserting copies of itself into other executable code or documents.
(A) Keylogger (B) Worm
(C) Virus (D) Cracker

119. A computer virus normally attaches itself to another computer program


is known as a
(A) host program (B) target program
(C) backdoor program (D) trojan horse

120. It is the technique to access the unauthorized data without concerning


to the authorized user.
(A) Spoofing (B) Forging
(C) IP spoofing (D) All of these

121. It is an act of intruding into someone else's computer or network.


(A) Hacking (B) Cracking
(C) Adware (D) Spyware

122. A person who uses his or her expertise to gain access to other people
computers to get information illegally or do damage is a
(A) spammer (B) hacker
(C) instant messenger (D) All of the above

123. ...... are often delivered to PC through an e-mail attachment and are
often designed to do harm.
(A) Viruses (B) Spams

Page | 96
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)

(C) Portals (D) E-mail messages

124. An unsolicited e-mail, message many recipients at once is a


(A) worm (B) virus
(C) threat (D) spam

125. An antivirus is a(n)


(A) program code (B) computer
(C) company name (D) application software

126. A digital signature is


(A) scanned signature
(B) signature in binary form
(C) electronic form of signature
(D) handwritten signature

127. ......... primary objective is to control the incoming and outgoing network
traffic by analysing the data packets.
(A) Firewall (B) Password
(C) Antivirus (D) Phishing

128. It is a secret word or a string of characters used for user authentication


to prove identity or access approval.
(A) Mailer (B) Password
(C) Macro (D) Firewall

129. A term used to describe the location or folder where E-mail is stored
before being sent.
(A) Inbox (B) Draft
(C) Outbox (D) Sent Items

130. NMEICT stands for


(A) National Mission on E-learning through ICT
(B) National Mission on Education through ICT
(C) National Mission on E-governance through ICT
(D) National Mission on E-governance through ICT

Page | 97
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)

131. The online portal presents the list of all courses and related information
that can be accessed online.
(A) swayam.gov.in (B) ndl.itkgp.ac.in
(C) course.gov.in (D) None of these

132. It is a DTH channel service in which new academic content will be aired
by the universities and they will be regularly updated.
(A) Swayam (B) NDL
(C) Swayamprabha (D) NAD
133. On institution future plan, which of the following is correct matching?
List I List II
A. 15 year'vision 1. For immediate
improvement of the
quality of learning.
B. 7 year vision II. To work out medium
term plants to reach
there.
C. 3 year vision III. To determine where
the institution would like
to be.
Codes
ABC ABC
(A) I II III (B) II III I
(C) I III II (D) III II I

134. .....is an initiative of the UGC that provides an online store house of all
academic awards i.e. certificates, diplomas etc.
(A) National Academic Depository
(B) National Digital Library
(C) Swayam
(D) Swayamprabha

135. Higher education needs to evolve to ensure that it meets the


requirements of the ........
(A) Forcasting
(B) Future workforce
(C) Future needs
(D) All of these

Page | 98
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)

136. Government to citizen relationship is the most basic aspect of


(A) e-Government
(B) e-Governance
(C) e-Citizenship
(D) e-Relationship

137. Which of the following statements regarding the term e-Governance


is/are True?
M. e-Citizenship will include the implementation of ICT for facilitation of
government services relating to citizenship.
N. e-Help refers to the facilitation of disaster and crisis management using ICT.
Select the correct answer using the codes given below:

(A) Both M and N (B) Only M


(C) Only N (D) Neither M nor N

138. Which of the following require technology experts to curb the electronic
cyber crimes?
(A) Police (B) Expert police
(C) Cyber police (D) None of the above

139. ......... can help to enable the true democratic process including voting,
public opinion, feedback and Government accountability.
(A) IT (B) ICT
(C) NDL (D) NAD

140. Which of the following aims to reduce the reaction time of the
government to the people's queries and problems?
(A) e-Registration (B) e-Help
(C) e-Governance (D) e-Health

141. Which of the following is/are advantage(s) of e-Governance which


make(s) e-Governance more informative?
(A) Speed (B) Cost reduction
(C) Transparency (D) All of the above

Page | 99
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)

142. DMS and workflow technologies are usually used in those departments
where there is a lack of workforce. What does DMS stand for?
(A) Data Management Service
(B) Document Management Service
(C) Document Management System
(D) Data Management System

143. Which of the following represents billion characters?


(A) Megabytes
(B) Kilobytes
(C) Gigabytes
(D) Terabytes

144. Which of the following correctly lists computer memory types from
highest to lowest speed ?
(A) Secondary Storage; Main Memory (RAM); Cache Memory; CPU Registers
(B) CPU Registers; Cache Memory; Secondary Storage; Main Memory (RAM)
(C) CPU Registers; Cache Memory; Main Memory (RAM); Secondary Storage
(D) Cache Memory; CPU Registers; Main Memory (RAM); Secondary Storage

145. Which of the following statement(s) is/are TRUE ?


S1 : The decimal number 11 is larger than the hexadecimal number 11.
S2 : In the binary number 1110.101, the fractional part has the decimal value
as 0.625.
(A) S1 only (C) Both S1 and S2
(B) S2 only (D) Neither S1 nor S2

146. With regard to a word processing software, the process of combining


static information in a publication together with variable information in a
data source to create one merged publication is called
(A) Electronic mail
(B) Data sourcing
(C) Mail merge
(D) Spam mail

Page | 100
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)

147. DVD technology uses an optical media to store the digital data. DVD is an
acronym for
(A) Digital Vector Disc
(B) Digital Volume Disc
(C) Digital Versatile Disc
(D) Digital Visualization Disc

148. The statement “the study, design, development, implementation,


support or management of computer-based information systems,
particularly software applications and computer Hardware” refers to
(A) Information Technology (IT)
(B) Information and Collaborative Technology (ICT)
(C) Information and Data Technology (IDT)
(D) Artificial Intelligence (AI)

149. If the binary equivalent of the decimal number 48 is 110000, then the
binary equivalent of the decimal number 51 is given by
(A) 110011 (C) 110001
(B) 110010 (D) 110100

150. The process of copying files to a CD-ROM is known as


(A) Burning (C) Digitizing
(B) Zipping (D) Ripping Answer

151. An unsolicited e-mail message sent to many recipients at once is a


(A) Worm (C) Threat
(B) Virus (D) Spam

152. ________ is a type of memory circuitry that holds the computer’s start-
up routine.
(A) RIM (Read Initial Memory)
(B) RAM (Random Access Memory)
(C) ROM (Read Only Memory)
(D) Cache Memory

153. NMEICT stands for :


(A) National Mission on Education through ICT
(B) National Mission on E-govemance through ICT
(C) National Mission on E-commerce through ICT
(D) National Mission on E-learning through ICT

Page | 101
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)

154. Which of the following is an instant messaging application ?


(a) WhatsApp (b) Google Talk (c) Viber
Select the correct answer from the codes given below :
(A) (a) and (b) only
(B) (b) and (c) only
(C) (a) only
(D) (a), (b) and (c)

155. In a Computer a byte generally consists of :


(A) 4 bits (C) 16 bits
(B) 8 bits (D) 10 bits

156. Which of the following is not an input device ?


(A) Microphone (C) Joystick
(B) Keyboard (D) Monitor

157. Which of the following is an open source software ?


(A) MS Word (C) Mozilla Firefox
(B) Windows (D) Acrobat Reader

158. Which of the following enables us to send the same letter to different
persons in MS Word
(A) Mail join (C) Mail insert
(B) Mail copy (D) Mail merge

159. Encoding or scrambling data for transmission across a network is known


as :
(A) Protection (C) Encryption
(B) Detection (D) Decryption

160. Which of the following is not an output device ?


(A) Printer (C) Monitor
(B) Speaker (D) Keyboard

161. Which of the following represents one billion characters ?


(A) Kilobyte (C) Gigabyte
(B) Megabyte (D) Terabyte

162. Which of the following is not open source software ?

Page | 102
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)

(A) Internet explorer (C) Open office


(B) Fedora Linux (D) Apache HTTP server

163. Which one of the following represents the binary equivalent of the
decimal number 25 ?
(A) 10101 (C) 11001
(B) 01101 (D) 11011

164. Which is an instant messenger that is used for chatting ?


(A) Altavista (C) Microsoft Office
(B) MAC (D) Google Talk Answer

165. CSS stands for


(A) Cascading Style Sheets
(B) Collecting Style Sheets
(C) Comparative Style Sheets
(D) Comprehensive Style Sheets

166. MOOC stands for


(A) Media Online Open Course
(B) Massachusetts Open Online Course
(C) Massive Open Online Course
(D) Myrind Open Online Course

167. Binary equivalent of decimal number 35 is


(A) 100011 (C) 110101
(B) 110001 (D) 101011

168. gif. jpg, bmp, png are used as extensions for files which store
(A) audio data (C) video data
(B) image data (D) text data

169. Symbols A-F are used in which one of the following ?


(A) Binary number system
(B) Decimal number system
(C) Hexadecimal number system
(D) Octal number system

170. Which one of the following is not a search engine ?


(A) Google (B) Chrome

Page | 103
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)

(C) Yahoo (D) Bing

171. When a computer is booting, BIOS is loaded to the memory by


(A) RAM (C) CD-ROM
(B) ROM (D) TCP

172. Which one of the following is not. the same as the other three ?
(A) MAC address
(B) Hardware address
(C) Physical address
(D) IP address

173. Identify the IP address from the following:


(A) 300-215 -317-3
(B) 302-215@ 417 -5
(C) 202 . 50 . 20 . 148
(D) 202-50-20-148

174. The acronym FTP stands for


(A) File Transfer Protocol
(B) Fast Transfer Protocol
(C) File Tracking Protocol
(D) File Transfer Procedure

175. Which one of the following is not a/an image/graphic file format ?
(A) PNG
(B) GIF
(C) BMP
(D) GUI

176. The first web browser is


(A) Internet Explorer
(B) Netscape
(C) World Wide Web
(D) Firefox

177. Which of the following is a social network ?


(A) amazon.com
(B) eBay
(C) gmail.com

Page | 104
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)

(D) Twitter

178. Internal communication within institutions is done through


(A) LAN
(B) WAN
(C) EBB
(D) MMS

179. ‘www’ stands for


(A) work with web
(B) word wide web
(C) world wide web
(D) worth while web

180. A hard disk is divided into tracks which is further subdivided into
(A) Clusters
(B) Sectors
(C) Vectors
(D) Head

181. A computer program that translates a program statement by statement


into machine language is called a / an
(A) Compiler
(B) Simulator
(C) Translator
(D) Interpreter

182. A Gigabyte is equal to


(A) 1024 Megabytes
(B) 1024 Kilobytes
(C) 1024 Terabytes
(D) 1024 Bytes

183. Virtual memory


(A) an extremely large main memory.
(B) an extremely large secondary memory.
(C) an illusion of extremely large main memory
(D) a type of memory used in super computers.

Page | 105
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)

184. ALU stands for


(A) American Logic Unit
(B) Alternate Local Unit
(C) Alternating Logic Unit
(D) Arithmetic Logic Unit

185. A Personal Computer uses a number of chips mounted on a circuit board


called
(A) Microprocessor
(B) System Board
(C) Daughter Board
(D) Mother Board

186. Computer Virus is a


(A) Hardware (C) Software
(B) Bacteria (D) None of these

187. Which one of the following is correct ?


(A) (17)10 = (17)16
(B) (17)10 = (17)8
(C) (17)10 = (10111)2
(D) (17)10 = (10001)2

188. The file extension of MS-Word document in Office 2007 is_______.


(A) .pdf (C) .docx
(B) .doc (D) .txt

189. _______ is a protocol used by e-mail clients to download e-mails to your


computer.
(A) TCP (C) SMTP
(B) FTP (D) POP

190. TCP/IP is necessary if one is to connect to the


(A) Phone lines (C) Internet
(B) LAN (D) a Server

191. Each character on the keyboard of computer has an ASCII value which
stands for
(A) American Stock Code for Information Interchange
(B) American Standard Code for Information Interchange

Page | 106
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)

(C) African Standard Code for Information Interchange


(D) Adaptable Standard Code for Information Change

192. Which of the following is not a programming language ?


(A) Pascal
(B) Microsoft Office
(C) Java
(D) C++

193. Minimum number of bits required to store any 3 digit decimal number is
equal to
(A) 3 (C) 8
(B) 5 (D) 10

194. Internet explorer is a type of


(A) Operating System
(B) Compiler
(C) Browser
(D) IP address

195. POP3 and IMAP are e-mail accounts in which


(A) One automatically gets one’s mail everyday
(B) One has to be connected to the server to read or write one’s mail
(C) One only has to be connected to the server to send and receive email
(D) One does not need any telephone lines

196. Which of the following operating system is used on mobile phones ?


(A) Windows Vista
(B) Android
(C) Windows XP
(D) All of the above

197. If (y)x represents a number y in base x, then which of the following


numbers is smallest of all ?
(A) (1111)2 (C) (1111)10
(B) (1111)8 (D) (1111)16

198. High level programming language can be converted to machine language


using which of the following ?

Page | 107
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)

(A) Oracle (C) Mat lab


(B) Compiler (D) Assembler

199. HTML is used to create


(A) machine language program
(B) high level program
(C) web page
(D) web server

200. The term DNS stands for


(A) Domain Name System
(B) Defense Nuclear System
(C) Downloadable New Software
(D) Dependent Name Server

201. IPv4 and IPv6 are addresses used to identify computers on the internet.
Find the correct statement out of the following :
(A) Number of bits required for IPv4 address is more than number of bits required
for IPv6 address.
(B) Number of bits required for IPv4 address is same as number of bits required
for IPv6 address.
(C) Number of bits required for IPv4 address is less than number of bits required
for IPv6 address.
(D) Number of bits required for IPv4 address is 64.

202. The octal number system consists of the following symbols:


(A) 0 – 7
(B) 0 – 9
(C) 0 – 9, A – F
(D) None of the above

203. Which one of the following represent the binary equivalent of the
decimal number 23 ?
(A) 01011
(B) 10111
(C) 10011
(D) None of the above

204. Which one of the following is different from other members ?

Page | 108
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)

(A) Google (C) Linux


(B) Windows (D) Mac

205. Where does a computer add and compare its data ?


(A) CPU (C) Hard disk
(B) Memory (D) Floppy disk

206. Computers on an internet are identified by


(A) e-mail address
(B) street address
(C) IP address
(D) None of the above

207. Which is the largest unit of storage among the following ?


(A) Terabyte (C) Kilobyte
(B) Megabyte (D) Gigabyte

208. bit stands for


(A) binary information term
(B) binary digit
(C) binary tree
(D) Bivariate Theory

209. Which one of the following is not a linear data structure ?


(A) Array (C) Queue
(B) Binary Tree (D) Stack

210. Which one of the following is not a network device ?


(A) Router (C) Hub
(B) Switch (D) CPU

211. A compiler is used to convert the following to object code which can be
executed
(A) High-level language
(B) Low-level language
(C) Assembly language
(D) Natural language

212. What do you need to put your web pages on the www ?

Page | 109
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)

(A) a connection to internet


(B) a web browser
(C) a web server
(D) all of the above

213. DNS in internet technology stands for


(A) Dynamic Name System
(B) Domain Name System
(C) Distributed Name System
(D) None of these

214. HTML stands for


(A) Hyper Text Markup Language
(B) Hyper Text Manipulation Language
(C) Hyper Text Managing Links
(D) Hyper Text Manipulating Links

215. Which of the following is type of LAN ?


(A) Ethernet
(B) Token Ring
(C) FDDI
(D) All of the above

216. Which of the following statements is true ?


(A) Smart cards do not require an operating system.
(B) Smart cards and PCs use some operating system.
(C) COS is smart card operating system.
(D) The communication between reader and card is in full duplex mode.

217. Which one of the following is not an Internet Service Provider (ISP) ?
(A) MTNL
(B) BSNL
(C) ERNET India
(D) Infotech India Ltd.

218. 1 GB is equal to
(A) 2^30 bits (C) 2^20 bits
(B) 2^30 bytes (D) 2^20 bytes

Page | 110
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)

219. The set of computer programs that manage the hardware/software of a


computer is called
(A) Compiler system
(B) Operation system
(C) Operating system
(D) None of these

220. S/MIME in Internet technology stands for


(A) Secure Multipurpose Internet Mail Extension
(B) Secure Multimedia Internet Mail Extension
(C) Simple Multipurpose Internet Mail Extension
(D) Simple Multimedia Internet Mail Extension

221. Which number system is usually followed in a typical 32-bit computer ?


(A) 2 (C) 10
(B) 8 (D) 16

222. Which one of the following is an example of Operating System ?


(A) Microsoft Word
(B) Microsoft Excel
(C) Microsoft Access
(D) Microsoft Windows

223. A/An ________ is a computer program that spreads by inserting copies


of itself into other executable code or documents.
(A) Operating system
(B) Computer Virus
(C) Firewall
(D) Anti-virus

224. Which of the following is not a/an web browser?


(A) Internet Explorer
(B) Mozilla Firefox
(C) Google Chrome
(D) Yahoo

225. One Terabyte (TB) of memory is equal to:


(A) 1024 KB
(B) 1024 × 1024 KB
(C) 1024 × 1024 × 1024 KB

Page | 111
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)

(D) 1024 × 1024 × 1024 Bytes

226. Which one of the following processes is the main task for the computer
in mapping the geographical data?
(A) Data storage
(B) Data visualization
(C) Data retrieving and drawing
(D) Data Collection

227. In computer terminology which of following describe device drivers


(A) Hardware that allows interaction between peripheral device and the operating
system.
(B) Software that allow the user to control the operating system
(C) Software that allows interaction between peripheral device and the operating
system.
(D) Software that allow the user to control the operating system

228. Which of the following is not true about RAM?


(A) RAM is a temporary storage area
(B) RAM is the same as hard disk storage
(C) RAM is volatile
(D) Information stored in RAM is gone when you turn the computer off

229. Most World Wide Web pages contain commands in the language
_______________
(A) NIH (C) HTML
(B) URL (D) IRC

230. Which one of the following would not be considered as a form of


secondary storage?
(A) Floppy Disk (C) RAM
(B) Optical Disk (D) Flash Drive

231. What does the acronym WAN stand for?


(A) Widest Area Network
(B) Wild Area Network
(C) Wide Area Networking
(D) Wide Area Network

Page | 112
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)

232. FTP is an acronym for–


(A) File Transaction Protocol
(B) File Truncation Protocol
(C) File Translation Protocol
(D) File Transfer Protocol

233. Bluetooth is a type of radio wave information transmission system that


is good for about _
(A) 30 feet (C) 30 miles
(B) 30 yards (D) 300 miles

234. Which of the following statements, regarding the term ICT is/are TRUE ?
P : ICT is an acronym that stands for Indian Classical Technology.
Q : Converging technologies that exemplify ICT include the merging of audio-
visual, telephone and computer networks through a common cabling system.
(A) P only
(B) Q only
(C) P and Q
(D) Neither P nor Q Answer

235. A new Laptop has been produced that weighs less, is smaller and uses
less power than previous Laptop models. Which of the following technologies
has been used to accomplish this ?
(A) Universal Serial Bus Mouse
(B) Faster Random Access Memory
(C) Blu Ray Drive
(D) Solid State Hard Drive

236. Given the following email fields, which of the email addresses will
‘swami’ be able to see when he receives the message ?
To… [email protected]
Cc… [email protected]; [email protected]
Bcc… [email protected]; [email protected]
(A) [email protected]
(B) [email protected]; [email protected]; [email protected]
(C) [email protected]; [email protected]
(D) [email protected]; [email protected]; [email protected]; [email protected]

Page | 113
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)

237. Put the following units of storage into the correct order, starting with
the smallest unit first and going down to the largest unit :
(a) Kilobyte (b) Byte
(c) Megabyte (d) Terabyte
(e) Gigabyte (f) Bit
Give your answer from the following code :
(A) (f), (b), (a), (c), (d), (e)
(B) (f), (b), (a), (d), (e), (c)
(C) (f), (b), (a), (c), (e), (d)
(D) (f), (b), (a), (d), (c), (e)

238. With regard to computer memory, which of the following statement(s)


is/are TRUE ?
P : Read Only Memory (ROM) is ‘volatile’ memory.
Q : Random Access Memory (RAM) is ‘volatile’ memory.
R : Secondary Memory is ‘volatile’ memory.
(A) P only
(B) Q only
(C) P and Q only
(D) P and R only

239. Which of the following domains is used for – profit businesses?


(A) .net (C) .com
(B) .edu (D) .org

240. The data storage hierarchy consists of:


(A) Bits, bytes, fields, records, files and databases
(B) Bits, bytes, records, fields, files and databases
(C) Bits, bytes, fields, files, records and databases
(D) Bytes, bits, fields, records, files and databases

241. What is the full form of USB as used in computer-related activities?


(A) Universal Security Block
(B) Universal Serial Bus
(C) United Serial Bus
(D) Ultra Security Block

242. What is the name of a web page address?


(A) Directory
(B) Protocol

Page | 114
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)

(C) URL
(D) Domain

243. Select the true statement about an operating system (OS)?


(A) An OS controls peripheral, allocates memory and organises data into fields and
records.
(B) An OS provides protection against viruses and controls peripherals.
(C) An OS controls peripheral, and allocates memory and processor time.
(D) An OS controls the processor and peripherals and allows the user to connect to
the internet

244. Which of the following is a type of malware intentionally inserted into a


software system that will set off a malicious function when specified conditions
are met?
(A) Worm
(B) Trojan
(C) Spyware
(D) Logic bomb

245. Which of the following statements(s) is/are true in respect of wireless


technology? P: Bluetooth is a wireless technology which can be used to
connect a headset to a mobile phone. Q: Bluetooth is a long-range wireless
technology and is a low cost means of data transfer.
(A) P only
(B) Q only
(C) Both P and Q
(D) Neither P nor Q

246. Which of the following file format is not a video file format?
(A) .AVI (C) .MP4
(B) .MOV (D) .JPEG

247. SMTP is an acronym for:


(A) Simple Mail Transport Protocol
(B) Simple Mail Terminal Protocol
(C) Simple Mail Transfer Protocol
(D) Simple Mail Transition Protocol

Page | 115
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)

248. A computer has a main memory of 960 Kbytes. What is the exact
number of bytes contained in this memory?
(A) 960 × 8
(B) 960 × 1000
(C) 960 × 1024
(D) 960 × 1024 × 1024

249. The convenient place to store contact information for quick retrieval in
email is:
(A) Address box (C) Address book
(B) Message box (D) Message book

250. Why would BCC: be used in an e-mail?


(A) BCC: allows the recipient to identify all the other recipients in the list when a
group email address is used.
(B) BCC: allows the sender to indicate who the email is for if there is more than
one recipient.
(C) BCC: allows the sender of a message to conceal the recipient entered in the
BCC: field from the other recipients.
(D) BCC: allows recipients to be visible to all other recipients of the message.

251. Jatin’s laptop has an LCD screen. The acronym LCD stands for:
(A) Light Crystal Display
(B) Liquid Compact Display
(C) Light Compact Display
(D) Liquid Crystal Display

252. A computer network which is used within a building is called a:


(A) WAN (C) LAN
(B) MAN (D) SAN

253. Which was the first company to launch mobile phone services in India ?
(A) Essar (C) Hutchison
(B) BPL (D) Airtel

254. Chandrayan I was launched on 22nd October, 2008 in India from :


(A) Bangalore
(B) Sri Harikota
(C) Chennai
(D) Ahmedabad

Page | 116
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)

255. What is blog?


(A) Online music
(B) Intranet
(C) A personal or corporate website in the form of an online journal
(D) A personal or corporate Google search

256. Which is not online Indian Matrimonial website ?


(A) www.jeevansathi.com
(B) www.bharatmatrimony.com
(C) www.shaadi.com
(D) www.u.k.singlemuslim.com

257. The accounting software ‘Tally’ was developed by :


(A) HCL
(B) TCS
(C) Infosys
(D) Wipro

258. Errors in computer programmes are called :


(A) Follies
(B) Mistakes
(C) Bugs
(D) Spam

259. HTML is basically used to design:


(A) Web-page
(B) Web-site
(C) Graphics
(D) Tables and Frames

260. Micro Processing’is made for:


(A) Computer
(B) Digital System
(C) Calculator
(D) Electronic Goods

261. Information, a combination of graphics, text, sound, video and


animation is called :
(A) Multiprogramme

Page | 117
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)

(B) Multifacet
(C) Multimedia
(D) Multiprocess

262. WYSIWYG – describes the display of a document on screen as it will


actually print:
(A) What you state is what you get
(B) What you see is what you get
(C) What you save is what you get
(D) What you suggest is what you get

263. Which of the following is not a Computer language ?


(A) PASCAL (C) FORTRAN
(B) UNIX (D) COBOL

264. A key-board has at least:


(A) 91 keys
(B) 101 keys
(C) 111 keys
(D) 121 keys

265. An E-mail address is composed of :


(A) two parts
(B) three parts
(C) four parts
(D) five parts

266. Corel Draw is a popular :


(A) Illustration programme
(B) Programming language
(C) Text programme
(D) None of the above

267. CD ROM stands for :


(A) Computer Disk Read Only Memory
(B) Compact Disk Read Over Memory
(C) Compact Disk Read Only Memory
(D) Computer Disk Read Over Memory

Page | 118
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)

268. The ‘brain’ of a computer which keeps peripherals under its control is
called :
(A) Common Power Unit
(B) Common Processing Unit
(C) Central Power Unit
(D) Central Processing Unit

269. Data can be saved on backing storage medium known as :


(A) Compact Disk Recordable
(B) Computer Disk Rewritable
(C) Compact Disk Rewritable
(D) Computer Data Rewritable

270. RAM means :


(A) Random Access Memory
(B) Rigid Access Memory
(C) Rapid Access Memory
(D) Revolving Access Memory

271. www represents :


(A) who what and where
(B) weird wide web
(C) word wide web
(D) world wide web

272. The process of laying out a document with text, graphics, headlines and
photographs is involved in
(A) Deck Top Publishing
(B) Desk Top Printing
(C) Desk Top Publishing
(D) Deck Top Printing

273. Consider the following statements regarding Open-RAN software:


1. O-RAN uses software to make hardware manufactured by different companies
work together.
2. This software would increase network agility and flexibility, but would increase
the cost.
Which of the given statements is/are correct?
(A) 1 only

Page | 119
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)

(B) 2 only
(C) Both 1 and 2
(D) Neither 1 nor 2

274. Consider the following statements regarding the Bengaluru Tech


Summit:
1. It is India's flagship event to help the new emerging start-ups gain
technological support.
2. The initiative’s theme for 2020 was “Next is Now”
Which of the given statements is/are correct?
(A) 1 only
(B) 2 only
(C) Both 1 and 2
(D) Neither 1 nor 2

275. Which of the following given statements is/are not true about India’s
supercomputer Param Siddhi?
1. It is ranked 3rd among top 500 most powerful non-distributed computer
systems in the world.
2. It has been developed under the National Supercomputing Mission.
Which of the given statements is/are correct?
(A) 1 only
(B) 2 only
(C) Both 1 and 2
(D) Neither 1 nor 2

276. “JATAN software” recently seen in news is related to:


(A) It helped the migrant workers to connect with authorities for relocation.
(B) It is a portal to help COVID-19 patients with ambulance services.
(C) It makes digital imprints of all the objects preserved in museums.
(D) It is a quick portal to book e-tickets for trains.

277. Consider the following statements regarding “Global Partnership on


Artificial Intelligence”:
1. India is one of the founding members of the GPAI initiative.
2. The GPAI initiative was conceived by Germany and France during their G7
presidencies.
Which of the given statements is/are not correct?
(A) 1 only
(B) 2 only
Page | 120
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)

(C) Both 1 and 2


(D) Neither 1 nor 2

278. The Centre for Development of Advanced Computing works under:


(A) NITI Aayog
(B) Department of Science and Technology
(C) Ministry of Earth Sciences
(D) Ministry of Electronics and Information Technology

279. Consider the following statements regarding “Electronic Vaccine


Intelligence Network”
1. It is a technology system that digitizes vaccine stocks.
2. It is aimed at strengthening immunization supply chain systems across the
country.
Which of the given statements is/are correct?
(A) 1 only
(B) 2 only
(C) Both 1 and 2
(D) Neither 1 nor 2

280. The famous “Justice K. S. Puttaswamy (Retd) Vs Union of India” case is


related to:
(A) Net Neutrality
(B) Data Protection
(C) Technology patents
(D) Intellectual Property Rights

Page | 121
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)

Previous Years Questions


UGC-NET 2021
1. The basic free version of 200M web meeting platform allows an online class
to be conducted for how many minutes?
A. 30 minutes
B. 40 minutes
C. 50 minutes
D. 60 minutes
2. With respect to a music teacher who wishes to use a computer to help him
to create training material, match List I with List II
List I List II
A. Printed copies of instructions on how to play his music I. MP3
B. Sound files of him playing his music II. DOC
C. Video files of him playing his music III. JPEG
D. Images of the instruments he teaches IV. AVI
Choose the correct answer from the options given below:
A. A - I, B - II, C - III, D - IV
B. A - II, B - I, C - III, D - IV
C. A - II, B - I, C - IV, D - III
D. A - III, B - I, C - IV, D – II
3. Which one of the following is a disadvantage of using proprietary software
rather than open source software?
A. Proprietary software can only be accessed with a password
B. Proprietary software can only be used on proprietary systems
C. Proprietary software can only be used with an Internet connection
D. Proprietary software is usually more expensive

Page | 122
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)

4. Match List I with List II


List I List II
Description Appropriate Technical Term
A. Numerical ID for each device on the Internet I. VOIP
B. Unique ID for a Network Interface Card (NIC) II. URL
C. Use of the Internet to make phone calls III. MAC
Address
D. Text used by web browsers to locate a web address on the Internet
IV. IP Address
Choose the correct answer from the options given below:
A. A - I, B - III, C - IV, D - II
B. A - II, B - III, C - I, D - IV
C. A - IV, B - III, C - I, D - II
D. A - IV, B - III, C - II, D - I

5. Which of the following statements about internal and external computer


memory are true?
A. A portable hard drive is an example of internal memory
B. Magnetic tape is used to store backups of data
C. RAM is an internal memory D. ROM loses its data when the power is turned
off
Choose the correct answer from the options given below
A. A and C only
B. A and B only
C. B and C only
D. C and D only

6. Match List I with List II


Content Area Integrating Technology Application
A. Reading /Language Arts I. Software programs to develop basic
reading skills
B. Mathematics II. Simulations to explore distant places
and times
C. Science III. Graphing calculations to illustrate
abstract or hard – to – visualize
relationships

Page | 123
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)

D. Social Studies IV. Simulations to illustrate complex


relationships
Choose the correct answer from the
options given below
A. A - I, B - III, C - IV, D - II
B. A - II, B - I, C - III, D - IV
C. A - III, B - IV, C - II, D - I
D. A - IV, B - II, C - I, D – III

7. Given below are two statements, one is labeled as Assertion A and the
other is labeled as Reason R
Assertion A:- VisiCalc, the first spreadsheet software application, is a
commonly cited example of one of the first killer applications.
Reason R:- VisiCalc helped in bringing PCs into the business realm.
choose the correct answer from the options given below
A. A is false but R is true
B. A is true but R is false
C. Both A and R are true and R is the correct explanation of A
D. Both A and R are true but R is NOT the correct explanation of A

8. Media kits are used in


A. Classroom communication
B. Confidential communication
C. External communication
D. Internal communication

9. Which of the following statements about desktop and laptop computers are
TRUE?
A. Most modern laptop computers have built-in webcams
B. Desktop computers are not very portable
C. All desktop computers have built-in touchpad
D. Laptop computers are rarely supplied with a mouse
Choose the correct answer from the options given below:
A. A, B and D only
B. A, B and C only
C. A, B, C and D
D. B, C and D only

Page | 124
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)

10.Given below are two statements, one is labelled as Assertion A and the
other is labelled as Reason R
Assertion A: - A good computer networking solution can be very much
beneficial for your business.
Reason R: - With computer networking, you can cut back on costs and allow
for efficient use of resources.
In light of the above statements, choose the correct answer from the options
given below:
A. A is false but R is true
B. A is true but R is false
C. Both A and R are true and R is the correct explanation of A
D. Both A and R are true but R is NOT the correct explanation of A

11.Arrange the following optical storage devices in increasing order of their


storage capacity.
A. DVD
B. CD-ROM
C. Blu-Ray
Choose the correct answer from the options given below:
A. A, B, C
B. A, C, B
C. B, A, C
D. B, C, A

12.Match List I with List II


List I List II
(Computer Terms) (Examples)
A. Operating system I. Pentium
B. Application software II. Linux
C. Processor III. Router
D. Network Device IV. Anti-virus
Choose the correct answer from the options given below:
A. A - I, B - IV, C - II, D - III
B. A - II, B - IV, C - I, D - III
C. A - II, B - IV, C - III, D - I

Page | 125
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)

D. A - III, B - II, C - I, D – IV

13.In a classroom, transforming verbal and non-verbal signs back into


messages is known as
A. Feedback
B. Encoding
C. Decoding
D. Reverse communication

14.Given below are two statements:


Statement I: - USB drives are also known as flash drives.
Statement II:- Device used by banks to automatically read those unusual
numbers on the bottom of cheques and deposit slips is known as MICR.
In the light of the above statements, choose the correct answer from the
options given below: A. Both Statement I and Statement II are true
B. Both Statement I and Statement II are false
C. Statement I is true but Statement II is false
D. Statement I is false but Statement II is true

15.Match List I with List II


List I List II
(Name of Company) (Founder)
(A) Apple Inc. (I) N.R. Narayana Murthy
(B) Microsoft Inc. (II) Steve Jobs
(C) Infosys Ltd. (III) Bill Gates
(D) Airtel (IV) Sunil Bharti Mittal
Choose the correct answer from the opt-ions given below :
A. (A)-(III), (B)-(IV). (C) -(II), (D) –(I)
B. (A)-(IV), (B)-(III), (C)-(II), (D)-(I)
C. (A)-(II), (B)-(IV), (C)-(I), (D)-(III)
D. (A)-(II), (B) -(III), (C)-(I), (D)-(IV)

16.Identify the correct order of the following INTEL processors in the


decreasing order of speed.
(A) 80486
(B) 8085
(C) Dual Core

Page | 126
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)

(D) Pentium-III
Choose the correct answer from the options given below :
A. (D), (C), (B), (A)
B. (C), (D), (A), (B)
C. (C), (D), (B), (A)
D. (B), (D), (C), (A)

17.With respect to Computers, which of the following groups consists of


volatile memory only?
A. RAM and Pen Drive
B. Hard Disk and ROM
C. RAM and Cache
D. Cache and ROM

18.Given below are two statements :


Statement I:- In free version of google meet (through your personal Gmail /
Google account you can record your session / class.
Statement II :- To join an online class / session conducted via Google Meet you
need to login to your Google account.
In the light of the above statements, choose the correct answer from the
options given below: A. Both Statement I and Statement II are correct
B. Both Statement I and Statement II are incorrect
C. Statement I is correct but Statement II is incorrect
D. Statement I is incorrect but Statement II is correct

19.The interactive content in modern books may contain a two-dimensional


code (2D pattern of dark rectangles) called QR codes. What is the full form
of QR?
A. Quality Reader
B. Quality Record
C. Quick Response
D. Quick Router

20.Identify the correct sequence of the following storage devices in the


descending order of their emergence.
A. DVD
B. CD-ROM

Page | 127
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)

C. Magnetic Tape
D. Floppy Disk
Choose the correct answer from the options given below
A. A, B, C, D
B. A, B, D, C
C. A, C, D, B
D. B, A, D, C
21.With respect to computer storage devices, which of the following is/are
magnetic storage device(s)?
A. CD-R
B. DVD-RW
C. Flash memory stick
D. External Hard Drive
Choose the correct answer from the options given below:
A. A and B only
B. C and D only
C. C only
D. D only

22.What type of non-volatile memory would most likely store firmware, like a
computer's BIOS?
A. EEPROM
B. Hard Disk
C. RAM
D. Tape Drive

23.Match List I with List II


List I List II
Memory Devices Memory Types
A. Pen Drive I. Optical memory
B. Hard Disk II. Flash Memory
C. CD ROM III. Magnetic Memory
D. RAM IV. Volatile Memory
Choose the correct answer from the options given below:
A. A -II , B -III , C -I , D -IV
B. A -II , B -III , C -IV , D -I
C. A -III , B -II , C -I , D -IV

Page | 128
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)

D. A -IV , B -III , C -II , D -I

24.What is a blog?
A. Internet
B. Online journal
C. Personal website in the form of a journal
D. Search engine

25.Match List I with List II


List I List II
Type of Memory Fabrication method
A. Dynamic Random Access Memory (DRAM) I. Filp – Flops
B. Static Random Access Memory (SRAM) II. Floating gate transistors
and capacitors
C. Programmable Read Only Memory (PROM) III. Transistors and capacitors
D. Erasable Programmable Read Only Memory (EPROM) IV. Matrix of fuses
Choose the correct answer from the options given below:
A. A - II, B - I, C - III, D - IV
B. A - III, B - I, C - IV, D - II
C. A - III, B - IV, C - I, D - II
D. A - IV, B - II, C - I, D – III

26.Which memory is used as part of the processor?


A. Hard disk
B. RAM
C. Registers
D. ROM

27.Which one of the following is a type of malware embedded in a program on


a computer that will set off a malicious function when certain conditions
are met?
A. Logic bomb
B. Spyware
C. Trojan
D. Worm

Page | 129
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)

28.Match List I with List II


List I List II
(Computer Terms) (Description)
(A) Processor (I) Part that runs executable
programs
(B) RAM (II) Part that stores files permanently
(III) Part that stores instructions and data temporarily for use
(IV) Part that translates source program to executable program
Choose the correct answer from the options given below :
A. (A)-(I), (B)-(III), (C)-(II), (D)-(IV)
B. (A)-(IV), (B)-(III), (C)- (II), (D)-(I)
C. (A)-(II), (B)-(I), (C)-(III), (D)-(IV)
D. (A)-(I), (B)-(II), (C)- (IV), (D)-(III)

29.Data of research take the forms of words or pictures with the researcher as
the key instrument in which of the following studies?
A. Participant observation based Studies
B. Ex Post Facto Studies
C. Experimental Studies
D. Descriptive survey Studies

30.Which of the following group of statements in the context of Information


Technology (IT) is correct?
(A) Mouse, Keyboard, and Plotter are all input devices.
(B) Unix, Windows, and Linux are all operating systems.
(C) Register, Cache Memory, and Hard Disk are all memory modules.
(D) Monitor, Printer, and Scanner are all output devices.
Choose the correct answer from the options given below:
A. (A) and (B) only
B. (A) and (D) only
C. (C) and (D) only
D. (B) and (C) only

UGC- NET 2020


1. The benefits of e-procurement are
(i) Cost reduction

Page | 130
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)

(ii) Quick delivery


(iii) Longer time for strategic procurement
(iv) Empathetic purchase
Choose the correct answer from the options given below.
(A) (i) and (ii) only
(B) (ii) and (iii) only
(C) (iii) and (iv) only
(D) (i) and (iv) only

2. Python is a/an
(i) Programming language
(ii) Operating system
(iii) Search engine
(iv) Snake
Choose the correct answer from the options given below:
(A) (ii) only
(B) (i) only
(C) (ii) and (iii) only
(D) (iii) and (iv) only

3. What is the full form of the abbreviation CD.ROM?


(A) Count Disk Random Only Memory
(B) Compact Disk Run Only Memory
(C) Compact Disk Read Only Memory
(D) Count Disk Raw Only Memory

4. Given below are two statements, one is labelled as Assertion A and the
other is labelled as Reason R
Assertion A : E-commerce companies require personal data to serve the
stakeholders better. Reason R : It In this process, privacy may get
compromised.
In light of the above statements, choose the most appropriate answer from the
options given below
(A) Both A and R are correct and R is the correct explanation of A
(B) Both A and R are Correct but R is NOT the correct explanation of A
(C) A is correct but R is not correct
(D) A is not correct but R is correct

Page | 131
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)

5. Multimedia comprises of
(A) Text and Audio
(B) Video and Audio
(C) Video only
(D) Text, Audio and Video

6. Asynchronous communication takes place through which of the following


technologies?
(i) Teleconferencing
(ii)Virtual classroom
(iii) Video chat
(iv) Blogs
(v)Discussion boards
(vi) Vlog
Choose the correct answer from the options given below:
(A) (i), (ii) and (iii) only
(B) (ii), (iii) and (iv) only
(C) (iv), (v) and (vi) only
(D) (iii), (iv) and (v) only

7. Information and Communication Technology (ICT) comprises of


(i) Online learning
(ii) Learning through Mobile Application
(iii) Web based learning
(iv) All the above
Choose the correct answer from the options given below:
(A) (i) and (ii) only
(B) (i) and (iii) only
(C) (iv) only
(D) (i) only

8. Given below are two statements, one is labelled as Assertion A and the
other is labelled as Reason R
Assertion A: Use of ICT is justified during teaching with a view to optimize
learning outcomes Reason R: Learning outcomes are contingent on use of ICT
during teaching In light of the above statements,

Page | 132
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)

choose the most appropriate answer from the options given below
(A) Both A and R are correct and R is the correct explanation of A
(B) Both A and R are correct but R is NOT the correct explanation of A
(C) A is correct but R is not correct
(D) A is not correct but R is correct

9. What is the full form of the abbreviation BIOS?


(A) Big Information Online System
(B) Binary Input Output Software
(C) Basic Input Output System
(D) Binary Inner Open Software

10.A-F system is used in which of the following number systems?


(A) Binary
(B) Octal
(C) Hexa - Decimal
(D) Decimal

11.Computer hardware consists of


(A) Computer table
(B) Monitor and CPU
(C)Software
(D) Google

12.National Program for Technology Enhanced l earning (NPTEL) was initiated


by the MHRD in 2003 to enhance the quality in
(A) Medical education
(B) Agriculture education
(C)Engineering education
(D) legal education

13.The file extension of Microsoft (MS) Word document in office 2007 is


(A).docx
(B).png
(C).doc
(D).jpg

Page | 133
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)

14.What is the full form of the abbreviation lot?


(A) International Office of Tourism
(B) Internet of Things
(C) Internet of Think
(D) Instrument of Telecommunication

15.What is the binary number for decimal number 9?


(A) 1100
(B) 1001
(C) 0111
(D) 1011

16.Which type of memory holds the computer startup routine?


(A) RAM
(B) WAN
(C) ROM
(D) Cache

17.The scope for employing ICT support is relatively more in which of the
following stages of research?
a. Problem formulation
b. Hypo thesis making
c. Data collection
d. Data analysis
e. Data interpretation
Choose the correct answer from the options given be low:
(A) a and b only
(B) b and d only
(C) c and d only
(D) d and e only

18.What is the full form of the abbreviation ISP?


(A) International Service Provider
(B) Internet Service Provider
(C) Internet Software Provider
(D) Internet Service Product

Page | 134
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)

19.What is the name for a web page address?


(A) Directory
(B) Folder
(C) Domain
(D) URL

20.Which of the following is NOT a system software?


(A) Compiler
(B) Operating System
(C) Application Software
(D) Editor

21.Which of the following is excluded from the domain of Artificial


Intelligence?
(A) Computer Vision
(B) Machine Learning
(C) Deep Learning
(D) Text

22.Synchronous communication takes place through which of the following


technologies?
a. Video chat
b. Virtual classrooms
c. Audio conferencing
d. Wikis
e. Electronic mail
Choose the correct answer from the options given below:
(A) a, b and c only
(B) b, c and d only
(C) c, d and e only
(D) a, d and e only

23.Speed of Internet is measured in


(A) GHz
(B) Gbps
(C) GB

Page | 135
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)

(D) dpi

24.Given below are two statements, one is labelled as Assertion A and the other is
labelled as Reason R
Assertion A: Machine Learning requires good quality and sufficient data to t
rain and test the algorithm
Reason R: For correct classification, good quality data which is free from noise,
and sufficient data is required for training and testing of the algorithm
In light of the above statements, choose the most appropriate answer from the
options given below
(A) Both A and R are correct and R is the correct explanation of A
(B) Both A and R are correct but R is NOT the correct explanation of A
(C) A is correct but R is not correct
(D) A is not correct but R is correct

25.What is the full form of the abbreviation GIF?


(A) Graphics Interchange Format
(B) Graphics Interchange File
(C) Global Interchange Format
(D) Graphics Input Format

26.Using a web sites to pour out one's grievances is called


(A) Cyber venting
(B) Web hate
(C) Web anger
(D) Cyber abuse

27.Which of the following correctly lists computer memory types from lowest
to highest speed?
(A) Main Memory, Cache Memory, Secondary Storage
(B) Cache Memory, Secondary Storage, Main Memory
(C) Secondary Storage, Main Memory, Cache Memory
(D) Secondary Stage, Cache Memory, Main Memory

28.Match List I with List II


List I List II
(a).Image (i). doc

Page | 136
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)

(b).Video (ii).mp3
(c).Audio (iii).jpeg
(d).Word processing (iv). mpeg
Choose the correct answer from the options given below:
(A) a - i, b - ii, c - iii, d - iii
(B) a - iii, b - iv, c - ii, d - i
(C) a - ii, b - iii, c - iv, d - i
(D) a - i, b - iv, c - iii, d – ii

29.GUI stands for


(A) Graphical Usage Interaction
(B) Gaming User Interface
(C) Graphical user Interface
(D) Graphical User Interaction

30.Given below are two statements


Statement I: Compilers are software
Statement II: Touch screen monitors are input/output devices In light of the
above statements, choose the most appropriate answer from the options given
below
(A) Both Statement I and Statement II are true
(B) Both Statement I and Statement II are false
(C) Statement I is true but Statement II is false
(D) Statement I is false but Statement II is true

31.Given below are two statements


Statement I: Operating systems are hardware
Statement II: Algorithm is a step by step procedure to solve a problem In light
of the above statements,
choose the correct answer from the options given below
(A) Both Statement I and Statement II are true
(B) Both Statement I and Statement II are false
(C) Statement I is correct but Statement II is false
(D) Statement I is incorrect but Statement II is true

UGC NET Dec 2019


1 Which of the following communication technologies employ only
asynchronous communication
Page | 137
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)

1. Video conferencing
2. Email
3. Forums
4. Instant messaging
Choose the correct optione
(A) (1) and (3) (B) (2) and (4)
(C) (2) and (3) (D) (1) and (4)

2 Select the option that includes file formats suitable for distributing sound
files across the Internet
(A) www, mp4, wma, mp3 ales
(B) avi, midi, wav, mp3 a
(C) avi, mov, wmv, mp3 boriti
(D) inidi, wav, wma, mp3

3 Which of the following statement(s) is/are correct


1. For the sequence of integers represented in
binary as 00111, 010011, P ...... The next
integer P would be represented as 01101
2. A byte is a binary number consisting of cactly 8 bits
Choose the correct option s
(A) Only (1) (B) Only (2)
(C) Both (1) and (2) (D) Neither (1) nor (2)

4 Match List-I with List-II in the context of computer networking


List 1 List il
A. VOIP I. Mekes use of light pulses to transmit catate
B. Fibre-optic i II. use of internet to make phone calls ten
cable
C. URL III. Most appropriate to connect
computers in a small building
D. UTP cable . iv. Text used by web browsers to
locate a web address on the Internet
codes
A B C D
(A) IV I II III
(B) II I IV III
(C) II III IV I
(D) IV III II I

Page | 138
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)

5 Match List I with List II


List I-(Digital Initative) List 11 (Purpose)
A. UMANG (I) G2B services
B. BHIM (11) Learning Platforma
C. eBiz (iii) Unified Payment Interface..
D. SWAYAM (iv) Single point of access to
all government services
Choose the correct options
A B C D: A B C D
(A) (ii) (i) (ii) (iv) (B) (iii) (ii) (iv) (i)
(C) (iv) (iii) (1) (i) (D) (i) (iv) (ii) (iii)

6. Regarding E-governance, which of the following statements is/are correct


1. Decreasing transparency is an ICT enabled advantage of E - Governance
2. E-Governance is related to the implementation of ICT in the government for
process and function
3. Common service Centrs (CSCs) helop in providing and Using E . Governance
related services
Choose the correct options
(A) (1), (2) and (3) (B) (1) and (3)
(C) (1) and (3) EU (D) (1) and (2)

7 Which of the following statements ilare correct?


1. Software is loaded into secondary from RAM and is then execute by the CPU
2. A search engine is a software system that is designed to search for information
on
the www.
Choose the correct option:
(A) Only (1) (B) Only (2) &
(C) Both (1) and (2) (D) Neither (1) nor (2)

8 Select the option that lists components for cyberspace address (URL) in
the correct order from beginning to end?
(A) Protocol, domain name of the host, path/file
(B) Path/file, protocol, domain name of th-host
(C) Protocol, path/file, domain name of th: host
(D) Domain name of the host, protocol, path/file

UGC NET June 2019.

Page | 139
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)

9 Identify the encompassing term that involves the use of electronic


platform to conduct a company's business
1. E - Business 2. E-Commerce
3. E - Marketing: 4. É- Governance
Codes
(A) 1 (B) 2 (C) 3 (D) 4

10 Which of the following is generally associated with the domain name of


an educational institution?
1. .org 2. .edu
3. .com 4. inst
Codes
(A) 1 (B) 2 (C) 3 (D) 4

11 Which of the following devices enables a computer to transmit data over


telephon lines?
1. CPU 2. HUB
3. Switches 4. Modem
Options
(A) 1 (B) 2 (C)3 (D) 4

12 What is SWAYAM?
(A) Non-Governmental organisation
(B) Digital programme to achieve the principles of education
(C) on line platform
(D) Name of a web site

13 Which of the following is not considered as a form of se ondary storage?


1. RAM 2. Floppy Disk
3. Optical Disk 4. Flash Drive
Option
(A) 1 (B) (C) 3 (D) 4

UGC NET 2019 June


14 Wile sending an e-mail, to differentiate among To: CC; and BCC; field,
which one of the following statements is True?
1. Recipients in the To: field cna see the email addresses that are in the BCC;
and
Cc: field

Page | 140
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)

2. Recipients in the Cc: field can see the email addresses that are in the To: and
BCC : fields
3. Recipients in the Bec: field can see the email addresses that are in the To: and
CCc: fields
4. Only the recipients in the Cc: field can see
the other email addresses in the Bcc : field
(A) 1 (B) 2 (C) 3 (D) 4

15 A group's access to digital technology and another group's lack of access


to it, will cause a disparity known as to ss
1. Internet inequality
2. Web inequality
3. Technological imbalance
4. Digital divide Options
(A) 1 . (B) 2 (C) 3 (D) 4

16 Which one of the following is an educational FM radio network


1. Gyan Darshan 2. Gyan Vani)
3. Gyan Dhara 4. GIAN
Options
(A) 1 (B) 2 (C) 3 (D) 4 )

17 Software that you can download for free, but have to pay to continue its
use after a trial period is called
1. Public domain software
2. Freeware
3. open source software
4. shareware Options
(A) 1 (B) 2 (C) 3 (D) 4

18 Which one of the following computer components is fastest in terms of


speed of access?
1. USB Drive 2. Solid State Drive
3. Ram 4. Hard Disk Drive
Options
(A) 1 (B) 2 (C) 3 (D) 4

19 A terabyte is equal to
(A) 1024 megabytes (B) 1024 kilobytes

Page | 141
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)

(C) 1024 Gigabytes (D) 1024x1024 kilobytes

20 The binary equivalent of (-23)10 is (2's complement system for negative


numbers 15 used)
(A) 01001 (B) 10111
(C) 01010 (D) 01000

21 The full form of PDF is


(A) Portable Data format
(B) Portable Document Form
(C) Portable Document Format
(D) Portable Data form

22 Which of the given statements are true?


(i) Modem is a networking device
(ii) Modem is a voltage stabilizer
(iii) Modem converts analogue signal to digital signal and vice versa.
Options
(A) (ii) and (iii) (B) (i) and (iii)
(C) (i) and (ii) (D) (i), (ii) and (iii)

UGC Net December 2018


23 If the binary equivalent of the decimal number 53 is 110101, then the
binary equivalent of the decimal number 50 is given by
(A) 110011 (B) 110010
(C) 110001 (D) 110100

24. Which one of the following is not part of suite of products of Microsoft
Office?
(A) Microsoft Excel (B) Microsoft PowerPoint
(C) Microsoft Publisher (D) Microsoft Window

25 The internet began with the development of


(A) USENET (B) Internet TA.
(C) ARPANET (D) Intranet

26 RFID is an acronym for


(A) Roaming Frequency Identification
(B) Radio Frequency Identification

Page | 142
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)

(C) Runtime Frequency Identification


(D) Remote Frequency Identification

27 Bluetooth is an example of
(A) PAN (B) LAN
(C) MAN (D) WAN

UGC NET July 2018


28 Which of the following statements, regarding the term ICT is/are True
P: ICT is an acronym that stands for Indian Classical Technology,
Q: Converging technologies that exemplify ICT include the merging of
audiovisual, telephone and computer networks through a common cabling
system.
(A) P Only (B) Q Only
(C) P and Q (D) Neither P nor Q

29 A new laptop has been produced that weigh less, is smaller and uses less
power than previous laptop models,
Which of the following technologies has been used to accomplish this too
(A) Universal Serial Bus Mouse
(B) Faster Random Access Memory
(C) Blue Ray Drive Motor
(D) Solid State Hard drive mere

30 Given the following email fields, which of the email addresses will swami
be able to see when he receives the massage
To.... ram@test. com
Cc... a raj@test. com; ravi@test. com
Bcc... [email protected];[email protected]
(A) [email protected]
(B) [email protected]; [email protected];
[email protected] tono v
(C) [email protected]; [email protected]
(D) [email protected]; [email protected];
[email protected]; [email protected]

31 Put the following units of storage into the correct order, starting with the
smallest unit first and going down to the largest unit.
(a) Kilobyte (b) byte

Page | 143
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)

(c) megabyte . (d) Terabyte


(e) Gigabyte (f) Bit
Codes
(A) (f), (b), (a), (c), (d), (e)
(B) (f), (b), (a), (d), (e), (C)
(C) (f), (b), (a), (c), (e), (d)
(D) (f), (b), (a), (d), (c), (e)

32 With regard to computer memory, which of the following statement (s)


/is/are TRUE?
P: Read only memory (ROM) is volatile memory
Q : Random Access Memory (RAM) is volatile memory
R: Secondary memory is volatile memory
(A) P only (B) Q only
(C) P and Q only (D) P and R only

33 What is the name for a webpage address?


(A) Domain (B) Directory
(C) Protocol (D) URL

34 The data storage hierarchy consists of


(A) Bytes, bits, fields, records, files and be databases
(B) Bits, bytes, fields, records, files and databases
(C) Bits, bytes, records, fields, files and databases
(D) Bits, bytes, fields, files, records and databases

35 Which of the following domains is used for profit businesses?


(A) .org (B) .net
(C).edu (D) .com

36 What is the full form of USB as used in computer related activities


(A) Ultra security Block
(B) Universal Security Block
(C) Universal Serial Bus
(D) United Serial Busi

37 Which of the following represents billion characters?


(A) Terabytes (B) Megabytes
(C) Kilobytes (D) Gigabytes

Page | 144
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)

38 Which of the following statement(s) is/are TRUe


Si: the decimal number 11 is larger than the hexadecimal number
S2: In the binary number 110.101, the que
fractional part has the decimal value as 0.625
(A) S1 only (B) S2 only
(C) Both Si and S2 (D) Neither S1 nor S2

39 Read the following two statements.


I. Information and communication Technology (ICT) is considered as a subset
of Information Technology (IT).
II. The right to use a piece of software is termed as copyright.
Which of the above mentioned statement(s) to is/are CORRECT?
(A) Both I and II (B) Neither I nor II
(C) II only (D) I only

40 Which of the following correctly lists the types of the computer memory
from highest to lowest speed?
(1) Secondary storage
(ii) Main memory (RAM)
(iii) Cache memory
(iv) CPU registers anos 2001
Codes
(A) (i), (ii), (iii), (iv) (B) (iv), (iii), (i), (ii)
(C) (iv), (iii), (ii), (i) (D) (iii), (iv), (ii), (i)

41 Which of the following is a characteristic of Web 2.0 applications?


(A) Multiple users schedule their time to use Web 2.0 applications one by one
BEAN
(B) Web 2.0 applications are focused on the ability for people to collaborate and
share information online Pealdia
(C) Web 2.0 applications provide users with content rather than facilitating users
to
create it fie
(D) Web 2.0 applications use only static pages

42 With regard to a word processing software the process of combining static


information in a data source to create one merged publication is called
(A) Electronic mail (B) Data sourcing
(C) Mail merger (D) Spám mail
Page | 145
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)

43 DVD technology uses an optical media to store the digital data. DVD is an
acronym for
(A) Digital Vectors Disco
(B) Digital Volume Disc
(C) Digital Versatile Disc
(D) Digital Visualization Disc

44 .......... is a type of memory circuitry that: holds the computer's startup


routine :
(A) RIM (Read Initial Memory)
(B) RAM (Random Access Memory)
(C) ROM (Read only memory)
(D) Cache Memory

45 An ASCII is a character encoding scheme that is employed by personal


computers in order to represent various characrters, numbers and control
keys that the computer user selects on the keyboard. ASCII is an acronym
for
(A) American standard Code for information Interchange.
(B) American Standard Code for Intelligent Information
(C) American Standard Code for Information Integrity
(D) American Standard Code for Isolated nationwide

46 The process of copying files to a CD-ROM known as


(A) Burning (B) Zipping
(C) Digitising (D) Ripping

47. An unsolicited e-mail message sent to many recipients at once is a


(A) Worm (B) Virus
(C) Threat (D) Spam

48 The statement the study, design, development, implementation support


or management of computer based information stems, particularly
software applications and computer Hardware refers to
(A) Information Technology (IT)
(B) Information and collaborative Technology (ICT)
(C) Information and Data Technology (IDT)
(D) Artificial Intelligence (A!)

Page | 146
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)

49 Which of the following is an instant messaging application


(i) Whats App
(ii) Google Talk
(iii) Viber
Select the correct answer from the codes given below
(A) (i) and (ii) only (B) (ii) and (iii) only:
(C) (i) only (D) (i), (ii) and (iii)

50 In a computer, a byte generally consists of


(A) 4 bits (B) 8 bits
(C) 16 bits (D) 10 bits

51 Which of the following is not an input device


(A) Microphone (B) Keyboard
(C) Joystick (D) Monitor

52 Which of the following is an open source : software


(A) MS word (B) Windows
(C) Mozilla Firefox (D) Acrobat Reader :

53 Which of the following enables us to send the same letter to different


people in MS Word?
(A) Mail Join (B) Mail copy
(C) Mail insert (D) Mail merge

54 NMEICT stands for


(A) National Mission on Education through ICT
(B) National Mission on e-governance through ІСТ
(C) National Mission on E-commerce through ІСТО,
(D) National Mission on E-learning through ICT

55 Which of the following represents one billion characters?


(A) Kilobyte s (B) Megabyte
(C) Gigabyte (D) Terabyte,

56 Which of the following is not open sourco software?


(A) Internet explorer (B) Tedora Linux
(C) Open office (D) Apache HTTP server

Page | 147
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)

57 Which one of the following represents the binary equivalent of the


decimal number 25
(A) 10101 (B) 01101
(C) 11001 (D) 11011

58 Encoding or scrambling data for at transmission across a network is


known as
(A) Protection (B) Detection
(C) Encryption (D) Decryption

59 Which of the following is not an output device?


(A) Printer (B) Speaker Tiger
(C) Monitor (D) Keyboard

60 Symbols A - F are used in which one of the following .


(A) Binary number system
(B) Decimal number system
(C) Hexadecimal number system
(D) Octal number systems

61. Which one of the following is not a search Engine?


(A) Google (B) Chrome
(C) Yahoo (D) Bingo

62 CSS stands for


(A) Cascading Style sheets
(B) Collecting Style Sheets
(C) Comparative Style Sheets
(D) Comprehensive Style Sheets.

63 MOOC stands for


(A) Media Online Open Course
(B) Massachusetts Open Online Course
(C) Massive open online Course
(D) Myrind open online course

64 Binary equivalent of decimal number 35 is


(A) 100011 (B) 110001
(C) 110101 (D) 101011

Page | 148
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)

65 The terms gif, jpmg, bmp, png are used as extensions for files which store
(A) audio data (B) image data
(C) video data (D) text data

66 The acronuym FTP stands for


(A) File Transfer Protocol
(B) Fast Transfer Protocol,
(C) File Tracking Protocol
(D) File transfer Procedure

67 Which one of the following is not alan image/graphic file format


(A) PNG (B) GIF
(C) BMP (D) GUI

68 The first web browser is


(A) Internet Explorer (B) Netscape s
(C) World Wide Web (D) Firefox

69 When a computer is booting, BIOS is loaded to the memory by


(A) RAM (B) ROM
(C) CD - ROM (D) TCP

70 Which one of the following is not the same as the other three
(A) MAC address (B) Hardware address
(C) Physical address (D) IP address

71 Identify the IP address from the following


(A) 300.215.317.3 (B) 302 , [email protected]
(C) 202, 50.20 , 148 (D) 202 - 50 - 20 – 148

Page | 149
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)

Answer UGC-NET 2021


1 2 3 4 5 6 7 8 9 10
B C D C C A C C A C
11 12 13 14 15 16 17 18 19 20
C B C A D B C D C B
21 22 23 24 25 26 27 28 29 30
D A A C B C A A A D

ANSWERS UGC- NET 2020


1 2 3 4 5 6 7 8 9 10
A B C A D C C C C C
11 12 13 14 15 16 17 18 19 20
B C A B B C C B D C
21 22 23 24 25 26 27 28 29 30
D A B A A A C B C A
31
A

Answers previous year


1 2 3 4 5 6 7 8 9 10
C D C B C B B A B B
11 12 13 14 15 16 17 18 19 20
D B A C D B D C C A
21 22 23 24 25 26 27 28 29 30
C B B D C D A B D B
31 32 33 34 35 36 37 38 39 40
C B D B D C D B B C
41 42 43 44 45 46 47 48 49 50
B C C C A A D A D B
51 52 53 54 55 56 57 58 59 60
D C D A C A C D C D
61 62 63 64 65 66 67 68 69 70
C B A C A B A D C D
71
C

Page | 150
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)

Answers Practice Questions


1 2 3 4 5 6 7 8 9 10
A D D B B A C C C D
11 12 13 14 15 16 17 18 19 20
D C A C B D C B D A
21 22 23 24 25 26 27 28 29 30
A B B B C B A C A D
31 32 33 34 35 36 37 38 39 40
C A A A C A B C D C
41 42 43 44 45 46 47 48 49 50
D D D C C B D B B C
51 52 53 54 55 56 57 58 59 60
C B B C D D A D D D
61 62 63 64 65 66 67 68 69 70
C B D A B B B B A A
71 72 73 74 75 76 77 78 79 80
D B A D C A A A A B
81 82 83 84 85 86 87 88 89 90
D B D A B A D D D B
91 92 93 94 95 96 97 98 99 100
A A B C C B A C C B
101 102 103 104 105 106 107 108 109 110
B B C C C B C D D D
111 112 113 114 115 116 117 118 119 120
A C A A D B A B D A
121 122 123 124 125 126 127 128 129 130
A B A D D C A B C B
131 132 133 134 135 136 137 138 139 140
A C D A B B A C B C
141 142 143 144 145 146 147 148 149 150
D D C B B C C A A A
151 152 153 154 155 156 157 158 159 160
D C A D B D C A C D
161 162 163 164 165 166 167 168 169 170
C C C D A C A B C B
171 172 173 174 175 176 177 178 179 180
B D C A D C D A C B
181 182 183 184 185 186 187 188 189 190
D A C D D C D C D C
191 192 193 194 195 196 197 198 199 200
B B D C C B A B C A
201 202 203 204 205 206 207 208 209 210
C A B A A C A B B D
211 212 213 214 215 216 217 218 219 220

Page | 151
UNIT- VIII INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)

A D B A D C D B C A
221 222 223 224 225 226 227 228 229 230
A D B D A C C B C C
231 232 233 234 235 236 237 238 239 240
B D A B D B C B C A
241 242 243 244 245 246 247 248 249 250
B C C D A D C B C A
251 252 253 254 255 256 257 258 259 260
D C D B C D B C A B
261 262 263 264 265 266 267 268 269 270
C B B B A A C D C A
271 272 273 274 275 276 277 278 279 280
D C A B B C B D C B

Page | 152

You might also like