S&T-IT and Computers
S&T-IT and Computers
Technology
IT and Computer
Harikrishnan K
Computer
An electronic device that accepts data and processes it into useful
information is called a Computer. There are two main aspects of the
computer:
Input: The data we enter into the computer is called the input. Input, basically
are raw facts for which we want the system to process and give us an
outcome.
Output: The answer that the computer provides in return of the raw data
entered, is called output.
Mobile Phones
Evolution from First Generation to Fifth Generation
1G was launched in the 1980s and worked on analog radio signals and supported only
voice calls.
2G was launched in the 1990s which uses digital radio signals and supports both voice and
data transmission with a bandwidth of 64 Kbps.
3G was launched in the 2000s with a speed of 1 Mbps to 2 Mbps and it has the ability to
transmit telephone signals including digitised voice, video calls and conferencing.
4G was launched in 2009 with a peak speed of 100 Mbps to 1 Gbps and it also enables 3D
virtual reality.
Uses of 5G:
5G is used across three main types of connected services, including enhanced mobile
broadband, mission-critical communications, and the massive IoT.
Combined with IoT, cloud, big data, Artificial Intelligence, and edge computing, 5G
could be a critical enabler of the fourth industrial revolution.
Challenges in adopting 5G in India
Fiber Connectivity
This will also benefit emerging technologies like smart cities, driverless cars,
virtual reality, and augmented reality, in addition to smartphone and
mobile network users.
It will combine and correlate different technologies, like deep learning with
big data analytics.
Bharat 6G Project
● India’s 6G project will be implemented in two phases, the first one from 2023 to 2025 and the second one from 2025
to 2030.
● The government has also appointed an apex council to oversee the project and focus on issues such as
standardization, identification of the spectrum for 6G usage, create an ecosystem for devices and systems, and
figure out finances for research and development, among other things.
● A key focus of the council will be on new technologies such as Terahertz communication, radio interfaces, tactile
internet, artificial intelligence for connected intelligence, new encoding methods and waveforms chipsets for 6G
devices.
Phases:
1. In phase one, support will be provided to explorative ideas, risky pathways and proof-of-concept tests.
2. Ideas and concepts that show promise and potential for acceptance by the global peer community will be adequately
supported to develop them to completion, establish their use cases and benefits, and create implementational IPs
and testbeds leading to commercialisation as part of phase two.
Objective:
It aims to enable India to become a leading global supplier of intellectual property, products and solutions
of affordable 6G telecom solutions and identify priority areas for 6G research based on India’s competitive
advantages.
Significance:
The project will provide an R&D platform to start-ups, researchers, industry and other broadband wireless
applications in India like e-Governance, smart cities, rural Broadband or other Digital India initiatives under
Atma Nirbhar Bharat.
Trivia
Your mobile is more powerful than a spaceship
Nomofobia
Wi-Fi is defined by the Wi-Fi Alliance as "wireless local area network (WLAN) products based
on the Institute of Electrical and Electronics Engineers' (IEEE) 802.11 standards."
Wi-Fi is a wireless networking technology which is used to exchange data between two or
more devices.
The router is directly connected to your modem and acts as a hub, broadcasting the internet
signal to all of your Wi-Fi enabled devices.
What is Li-Fi Technology?
Li-Fi, which stands for "Light Fidelity," is a Visible Light Communications system that
transmits wireless internet communications at breakneck speeds.
The technology works by emitting light pulses that are invisible to the human
eye using LED light bulbs.
Data can travel to and from receivers within those pulses. The data is collected and
interpreted by the receivers once it is received.
This process is similar to Morse code decoding, but it is much faster - millions of
times per second.
Transmission speeds with Li-Fi can exceed 100 Gbps, making it more than 14 times
faster than WiGig, also known as the world's fastest Wi-Fi.
This breakthrough in wireless connectivity has the potential to transform how we
access and use the internet, allowing for faster and more efficient communication.
With reference to ‘LiFi’, recently in the news, which of the following statement(s) is/are
correct?
1. It uses light as the medium for high speed data transmission.
2. It is a wireless technology and several times faster than ‘WiFi’.
Select the correct answer using the code given below.
(a) 1 only
(b) 2 only
(c) Both 1 and 2
(d) Neither 1 nor 2
With reference to Visible Light Communication (VLC) technology, which of the following
statements are correct?
1. VLC uses electromagnetic spectrum wavelengths 375 to 780 nm.
2. VLC is known as long-range optical wireless communication.
3. VLC can transmit large amounts of data faster than Bluetooth.
4. VLC has no electromagnetic interference.
Select the correct answer using the code given below:
(a) 1, 2 and 3 only
(b) 1, 2 and 4 only
(c) 1, 3 and 4 only
(d) 2, 3 and 4 only
BharatNet Project:
● National Optical Fibre Network (NoFN) which is now renamed as BharatNet project was launched in
2012.
● The project aims to provide affordable broadband services to citizens and institutions in rural and remote
areas, in partnership with States and the private sector.
● Phase-I was completed in December 2017 with implementation in over 1 lakh GPs. Subsequently, the scope
of Phase-I was expanded to 1.25 lakh GPs (Revised work front Phase-I) as per the Cabinet approval of
19.07.2017.
● The network is capable of providing scalable bandwidth of up to 1 GBPS.
● The entire project is being funded by Universal Service Obligation Fund (USOF), which was set up for
improving telecom services in rural and remote areas of the country.
● Bharat Broadband Nigam Ltd (BBNL) was created as the special purpose vehicle created to execute the
project.
● BharatNet will now extend up to all inhabited villages beyond the gram panchayats (GPs) in the said states.
● The revised strategy includes creation, upgradation, operation, maintenance and utilisation of
BharatNet by the concessionaire who will be selected by a competitive international bidding process.
State-Led Model: 8 states are being implemented under this model.
Chhattisgarh, Gujarat, Jharkhand, Andhra Pradesh, Maharashtra, Odisha and
Telangana are at various stages of implementation.
CPSU-Led Model: Under this model, BSNL is executing works in four states
and union territories. Madhya Pradesh, Uttar Pradesh and Sikkim are at
various stages of implementation.
Private Led Model: Punjab and Bihar have implemented the private sector
model directly by BBNL. Work has almost been completed in both states.
Satellite: The satellite component of Phase II is being implemented by BBNL
and BSNL. BSNL is implementing 1408 GPs and BBNL is implementing 3753
GPs.
USOF
● USOF was set up by an Act of Parliament in December 2003 by amending the Indian
Telegraph Act, 1885.
● The objective of the USOF is to provide access to telecom services in a
nondiscriminatory manner to people in rural and remote areas at affordable and
reasonable prices, thereby bridging the rural-urban digital divide.
● Funding Mechanism:
○ The USOF is funded through a levy on the revenue earned by telecom operators.
○ The government imposes a Universal Service Levy (USL) on the gross revenue of
the telecom companies, which is a percentage of their Adjusted Gross Revenue
(AGR).
○ This levy is collected and deposited into the USOF.
DARKNET
Germany has shut down Russia-linked ‘Hydra Market’- considered as world's biggest and
oldest DarkNet marketplace of illegal items and services.
DarkNet
Also known as Dark Web, it is that part of the Internet which cannot be accessed through
traditional search engines like Google nor is it accessible by normal browsers like Chrome
or Safari.
It generally uses non-standard communication protocols which make it inaccessible to
internet service providers (ISPs) or government authorities.
Content on Dark Net is encrypted and requires a specific browser such as TOR (The
Onion Ring) to access those pages.
Dark Net itself is only a part of the Deep Web, which includes sites that are protected by
passwords.
Part of the internet that is readily available and searchable on standard search engines is
called as Surface Web.
Application: Used by journalists and citizens working in oppressive
regimes (to communicate without any government censorship), researchers
and students to do research on sensitive topics, law enforcement agencies,
etc.
Concerns over its use: Anonymity, Haven for illicit activity, Privacy and ethical
concerns, drug dealing, communication by terrorists, etc.
Splinternet
For Example: China’s ‘Great Firewall’ keeps American tech giants out while
pushing online services developed indigenously.
Russia, in 2019, passed the sovereign internet law — or the online Iron
Curtain — that enabled the country to disconnect its internet from the rest of
the world.
Digital Divide
Industry 4.0 brings these inventions beyond the previous realm of possibility with four
foundational types of disruptive technologies (examples below) that can be applied all along
the value chain:
● High Availability: Unlike centralized systems, Blockchain is a decentralized system of P2P network
which is highly available due to its decentralized nature. Since in the Blockchain network, everyone is
on a P2P network, and everyone has a computer running, therefore, even if one peer goes down, the
other peers still work.
● High Security: This is another major benefit that Blockchain offers. Technology is assumed to offer
high security as all the transactions of Blockchain are cryptographically secure and provide
integrity. Thus instead of relying on third-party, you need to put your trust in cryptographic
algorithms.
Applications
● Industry: Blockchain has made its way into many industries due to its host of benefits and ease of
use and accessibility.
● Healthcare: In healthcare, blockchain can be used to store the medical records of patients. The
data is immutable, so tampering with it is not even a possibility. Confidential data can be encoded and
stored in a private key to limit access by various individuals.
● Agriculture: Blockchain is making entry in the food industry as it makes it easy to track the path and
safety of food, right from its journey from the farm to the buyer/user.
● Banking: The banking industry has benefited the most by integrating blockchain into their business. It
has increased their efficiency, reduced transaction time and fees, helped them store customer data,
and much more.
● Governance: Blockchain technology can help in ensuring good governance. It ensures transparency of
the public records through the usage of a digital form platform and allows auditing of government
documents. Moreover it allows to maintain the authenticity of the document and clearly reduces the
processing time.
Potential Challenges to Blockchain technology:
● Infrastructure
● Scalability and Transaction Speed (achieving higher number of transactions per
second)
● Applying AI & Data Analytics
● Regulatory Aspects
● Ecosystem and supporting framework
● Decentralized Infrastructure
● Skilled Manpower (Talent)
Blockchain in India
National Strategy on Blockchain has been formulated by Ministry of
Electronics & Information Technology (MeitY), Government of India with the
vision to create trusted digital platforms through shared Blockchain
infrastructure; promoting research and development, innovation, technology
and application development; and facilitating state of the art, transparent,
secure and trusted digital service delivery to citizens and businesses.
Centre of Excellence (CoE) for Blockchain: The CoE will facilitate various
government departments in building proof of concepts for use of Blockchain
technology in different dimensions of governance, leading to large scale
deployment of some such applications.
WEB 3.0
Web 3.0 is a decentralized internet to be run on blockchain technology, which would be
different from the versions in use, Web 1.0 and Web 2.0.
● The internet in Web 1.0 was mostly static web pages where users would go to a
website and then read and interact with the static information.
● In Web 2.0 users can create content - primarily, a social media kind of interaction.
● In Web 3.0, users will have ownership stakes in platforms and applications unlike
now where tech giants control the platforms.
Significance:
● The Web 3.0 architecture establishes a new version of the Internet protocol
incorporating token-based economics, transparency, and decentralization.
● A user can access all ecosystem benefits using a distributed token where they can
show proof of ownership, tax history, and payment instruments.
● The blockchain records could be visible, compiled, and audited by the regulators in
real time.
With reference to Web 3.0, consider the following statements:
The owners offer their coins as collateral—staking—for the chance to validate blocks and
earn rewards.
Under PoS, block creators are called validators. A validator checks transactions, verifies
activity, votes on outcomes, and maintains records.
Under PoW, block creators are called miners. Miners work to solve for the hash, a
cryptographic number, to verify transactions. In return for solving the hash, they are rewarded
with a coin.
Cryptocurrency:
A cryptocurrency is a digital or virtual currency that is meant to be a medium of exchange. It is quite
similar to real-world currency, except it does not have any physical embodiment, and it uses
cryptography to work.
To use cryptocurrency, individuals or businesses must first acquire a digital
wallet, which is a software program that stores the user's public and private
keys.
These keys are used to send and receive cryptocurrency, and they are also
used to verify transactions on the blockchain.
It allows two parties to generate a shared secret key that can be used to encrypt and decrypt
messages.
● Conventional computers process information in ‘bits’ or 1s and 0s, following classical physics under
which our computers can process a ‘1’ or a ‘0’ at a time.
● Quantum computers compute in ‘qubits’ (or quantum bits). They exploit the properties of
quantum mechanics, the science that governs how matter behaves on the atomic scale.
In this scheme of things, processors can be a 1 and a 0 simultaneously, a state called quantum
superposition.
Because of quantum superposition, a quantum computer — if it works to plan — can mimic several
classical computers working in parallel.
NATIONAL QUANTUM MISSION (NQM)
It’ll be implemented by the Department of Science & Technology (DST) under
the Ministry of Science & Technology.
The mission planned for 2023-2031 aims to seed, nurture, and scale up
scientific and industrial R&D and create a vibrant & innovative ecosystem in
Quantum Technology (QT).
With the launch of this mission, India will be the seventh country to have a
dedicated quantum mission after the US, Austria, Finland, France, Canada
and China.
It will target developing intermediate scale quantum computers with
50-100 physical qubits in 5 years and 50-1000 physical qubits in 8 years.
The mission will help develop magnetometers with high sensitivity for
precision timing (atomic clocks), communications, and navigation.
Four Thematic Hubs (T-Hubs) would be set up in top academic and National
R&D institutes on the domains of Quantum Technology:
● Quantum computation
● Quantum communication
● Quantum Sensing & Metrology
● Quantum Materials & Devices
Advantages of Quantum Technology:
Increased Computing Power: Quantum computers are very much faster than the computers we
today have. They also have the capability to solve complex problems that are currently beyond our
reach.
Improved Security: Because they rely on principles of quantum mechanics, quantum encryption
techniques are much more secure than traditional encryption methods.
Faster Communication: Quantum communication networks can transmit information faster and
more securely than traditional networks, with the potential for completely unhackable
communication.
Enhanced AI: Quantum machine learning algorithms can potentially enable more efficient and
accurate training of Artificial Intelligence models.
Better Sensing and Measurement: Quantum sensors can detect extremely small changes in the
environment, making them useful in areas such as medical diagnostics, environmental monitoring,
and geological exploration.
Disadvantages of Quantum Technology:
Expensive: The technology requires specialized equipment and materials which make it
more expensive than the traditional technologies.
Limited Applications: Currently, quantum technology is only useful for specific applications
such as cryptography, quantum computing, and quantum communication.
Qubits are easily disrupted by their surroundings which can cause them to lose their
quantum properties and make mistakes in calculations.
Recently, Australia had to stave off its biggest cyber threat with the attack
targeting everything from public utilities to education and health
infrastructure.
India has also been a victim to many such cyber-attacks in the past like
WannaCry, Petya ransomware, Mirai botnet etc.
Cyber warfare is computer- or network-based conflict involving politically
motivated attacks by a nation-state on another nation-state. In these types of
attacks, nation-state actors attempt to disrupt the activities of
organizations or nation-states, especially for strategic or military purposes
and cyber espionage.
Ransomware attacks are becoming more frequent and costly, with over 75%
of Indian organizations having faced such attacks and each breach costing an
average of ₹35 crore of damage.
The lines between the physical and digital realms are blurring rapidly,
making Critical infrastructure extremely vulnerable to attacks from hostile
state and non-state actors.
Under-Preparedness:
CERT-In has introduced guidelines for organizations to comply with when connected to the
digital realm, but most organizations lack the tools to identify and prevent cyber attacks.
Also, there is an acute scarcity of cybersecurity professionals in India.
Limited Private Sector Participation:
Private sector participation remains limited in India's cyber security structures, and
collaboration with like-minded intergovernmental and state frameworks is necessary to
protect users and customers from cyber breaches.
Added Complexity:
With more inclusion of artificial intelligence (AI), machine learning (ML), data analytics,
cloud computing and Internet of Things (IoT), cyberspace will become a complex
domain, giving rise to issues of a techno-legal nature.
The introduction of 5G and the arrival of quantum computing will increase the potency of
malicious software.
Global Initiatives:
Budapest Convention on Cybercrime: It is an international treaty that seeks to
address Internet and computer crime by harmonizing national laws, improving
investigative techniques, and increasing cooperation among nations. It came into
force on 1st July 2004. India is not a signatory to this convention.
Internet Governance Forum (IGF): It brings together all stakeholders i.e.,
government, private sector and civil society on the Internet governance debate.
UNGA Resolutions: The United Nations General Assembly established two
processes on the issues of security in the information and communication
technologies (ICT) environment.
The Open-ended Working Group (OEWG) through resolution by Russia.
The Group of Governmental Experts (GGE) through resolution by USA.
National Cyber Security Strategy 2020: It seeks to improve cyber awareness and
cybersecurity through more stringent audits. Empanelled cyber auditors will look more
carefully at the security features of organisations than are legally necessary now.
National Critical Information Infrastructure Protection Centre (NCIIPC): The NCIIPC,
created under Information Technology Act, 2000, operates as the nodal agency for
protection and resilience of critical information infrastructure
Indian Cyber Crime Coordination Centre (I4C): It was setup in 2020 to deal with all types
of cybercrimes in a comprehensive and coordinated manner.
Cyber Surakshit Bharat Initiative: It was launched in 2018 with an aim to spread
awareness about cybercrime and building capacity for safety measures for Chief
Information Security Officers (CISOs) and frontline IT staff across all government
departments.
Cyber Swachhta Kendra: In 2017, this platform was introduced for internet users to clean
their computers and devices by wiping out viruses and malware.
Information Technology Act, 2000: The Act regulates use of computers, computer
systems, computer networks and also data and information in electronic format.
National Cyber Crime Reporting Portal: It is a citizen-centric initiative which will enable citizens to report
cybercrimes online and all the complaints will be accessed by the concerned law enforcement agencies for
taking action as per law.
Computer Emergency Response Team - India (CERT-In): It is an organization of the Ministry of Electronics and
Information Technology which collects, analyses and disseminates information on cyber incidents, and also
issues alert on cybersecurity incidents.
Cybersecurity Treaties: India has already signed cybersecurity treaties with countries such as the US, Russia,
the UK, South Korea, and the European Union.
Multilateral Frameworks: Efforts are being made in multinational frameworks such as the Quad and the I2U2
to enhance cooperation in cyber incident responses, technology collaboration, capacity building, and in the
improvement of cyber resilience.
India’s draft Digital Personal Data Protection Act, 2023: It seeks to ensure usage of personal data for lawful
purposes only and proposes a penalty of up to ₹500 crore for data breaches.
Defence Cyber Agency (DCyA): It is created by Indian armed forces and is capable of offensive and defensive
manoeuvres.
AI
Artificial intelligence, commonly referred to as AI, is the field of computer science that focuses on the development of
intelligent machines that can perform tasks that would typically require human intervention.
AI systems are designed to mimic human intelligence and learning, enabling them to adapt and improve their performance
over time.
The development and implementation of AI has become increasingly important in various fields, including:
■ Healthcare: AI is used to assist doctors and healthcare professionals in diagnosing diseases, predicting patient
outcomes, and developing treatment plans.
■ Finance: AI is used in the finance industry to detect fraudulent activities, automate investment management, and
improve customer service.
■ Transportation: AI is used to improve transportation systems, including self-driving cars and predictive
maintenance for trains and airplanes.
■ Education: AI is used in education to personalize learning experiences for students, identify areas for improvement, and
provide feedback to teachers.
■ Manufacturing: AI is used in manufacturing to optimize production processes, reduce waste, and improve product
quality.
■ Marketing: AI is used in marketing to analyze customer data, personalize advertising, and improve customer
engagement.
Machine learning (ML)
Machine learning is a subset of artificial intelligence that focuses on building algorithms and statistical models that enable
computers to improve their performance on a specific task without being explicitly programmed. ML models are
designed to learn from data and make predictions or decisions based on that data.
■ Image and speech recognition: ML algorithms are used to recognize images and speech, which has led to the
development of technologies such as facial recognition and speech-to-text.
■ Recommendation systems: ML algorithms are used to recommend products, services, and content to users based on
their preferences and past behaviors.
■ Fraud detection: ML algorithms are used to detect fraudulent activities in financial transactions, such as credit card
fraud and money laundering.
■ Natural language processing: ML algorithms are used to analyze and understand human language, which has led to
the development of technologies such as chatbots and virtual assistants.
■ Predictive maintenance: ML algorithms are used to predict when machines and equipment will fail, allowing for
proactive maintenance and reducing downtime.
Natural language processing (NLP)
Natural Language Processing (NLP) is a subfield of artificial intelligence that focuses on the interaction between
humans and computers using natural language. It is the process of analyzing, understanding, and generating human
language data in a way that is meaningful to computers.
Importance of NLP in AI
The importance of NLP in AI lies in its ability to enable machines to understand and process human language, which
is essential in various applications, such as:
■ Chatbots and virtual assistants: NLP is used to create chatbots and virtual assistants that can understand
and respond to human language, providing a more natural and intuitive user experience.
■ Sentiment analysis: NLP is used to analyze the sentiment of text data, enabling businesses to monitor
customer feedback and improve their products and services.
■ Language translation: NLP is used to translate text from one language to another, enabling communication
between people who speak different languages.
■ Information retrieval: NLP is used to retrieve information from text data, such as search engine results and
question-answering systems.
Examples of NLP in action
■ Siri and Alexa: These virtual assistants use NLP to understand and respond to user queries.
■ Google Translate: This application uses NLP to translate text from one language to another.
■ Spam filters: These filters use NLP to detect and filter out spam emails and messages.
Computer vision (CV)
Computer Vision (CV) is a field of artificial intelligence that focuses on enabling machines to interpret and
understand visual information from the world around them. CV algorithms are designed to analyze and make
sense of digital images and video data, enabling machines to recognize patterns, objects, and even emotions.
Robotics
Robotics is a field of artificial intelligence that focuses on the design, development, and implementation of robots,
which are machines capable of performing tasks autonomously or semi-autonomously. Robotics involves the
integration of various AI technologies, such as computer vision and natural language processing, to enable robots to
interact with the world around them.
Expert systems
Expert systems is a field of artificial intelligence that focuses on developing computer programs that can mimic the
decision-making abilities of a human expert in a specific domain. Expert systems are designed to use knowledge
and reasoning techniques to solve complex problems and provide recommendations to users.
Generative AI
Recently, Tech companies around the world are harnessing Generative AI for
various use cases.
It uses a deep neural network and is trained on corpus of text data from
the internet, allowing it to generate human-like text and to perform
various tasks like question answering, and conversation.
Generative artificial intelligence (AI)
Describes algorithms that can be used to create new content like audio,
code, images, text, simulations, and videos.
Precision Agriculture: Precision agriculture uses AI technology to aid in detecting diseases in plants,
pests, and poor plant nutrition on farms.
Tackling the Labour Challenge: With fewer people entering the farming profession, most farms are
facing the challenge of a workforce shortage. AI agriculture bots.
AI In India
Bhashini, the National Language Technology Mission (NLTM), was launched by
the Hon’ble Prime Minister in July 2022 to provide Artificial Intelligence (AI) and
Natural Language Processing (NLP) based open-source language technology
solutions for speech and text translation through the Bhashini platform to bridge the
language barriers leveraging startup-academia ecosystem.
These technologies would enable organizations to create innovative and artificial
intelligence-based multilingual interfaces including voice-based interfaces in their
websites and apps to provide better citizen services and digital resources.
As on date, 289 pre-trained AI models for language translation in 10 Indian
languages have been made available on the Bhashini platform.
Virtual Reality
Virtual Reality (VR) is a computer-generated environment with scenes and
objects that appear to be real, making the user feel they are immersed in their
surroundings.
https://www.youtube.com/watch?v=xdgmSSptkds
EXTENDED REALITY, OR XR
All these various technologies combined are referred to as XR. This is a broad term
for all immersive technologies covering Mixed Reality (MR), Augmented Reality
(AR) and Virtual Reality (VR).
A technology that combines the physical and virtual worlds to create a new
environment in which physical and virtual objects can coexist and interact in real
time.
While both mixed reality, and augmented reality, bring digital objects within the
real-world, crucial differences exist between the two.
While augmented reality provides an overlay of digitally created elements to the real
world, mixed reality adds an interactivity layer on top of the AR experience.
Therefore, users can interact with the digital objects with their hands in a
natural way. MR provides for a more immersive experience compared to AR, and
therefore adopts specific elements of the VR experience.
Metaverse
Metaverse can be understood as a combination of multiple elements of technology, including
virtual reality, augmented reality and video where users "live" within a digitally enhanced
surrounding.
These technologies are currently being developed by Apple, Google, Amazon, and Microsoft in
addition to Facebook.
To understand how it works and the impact that it may create, it is important to have clarity on
following ideas and technologies:
● Virtual Reality (VR): VR can be understood as the use of computer modelling and simulation
that enables a person to interact with an artificial three-dimensional (3-D) visual or other
sensory environment. E.g., games like World of Warcraft. VR closes the world, and transposes
an individual, providing complete immersion experience.
● Augmented Reality (AR): It is an enhanced version of the real physical world that is achieved
through the use of digital visual elements, sound, or other sensory stimuli delivered via
technology. E.g., games like Pokémon Go.
● Hologram: Holograms are virtual three-dimensional images created by the
interference of light beams that reflect real physical objects.
● Avatar: An avatar in the metaverse is a representation of an individual in the virtual
world, this digital avatar enables the person to function like an actual human being in a
digitally created world.
● Platform/Developer/User distinction: In metaverse, digital engagement will get very
personal and tailor made for the user. In this context, it is important that role played by
the platform, the developers and the users is clearly understood.
SUPERCOMPUTERS
A supercomputer is a computer that performs at or near the currently highest operational rate for computers.
Generally, PETAFLOP is a measure of a Supercomputer’s processing speed and can be expressed as a thousand
trillion floating point operations per second.
FLOPS (floating point operations per second) are typically used to measure the performance of a computer’s
processor.
Using floating-point encoding, extremely long numbers can be handled relatively easily.
Supercomputers are primarily designed to be used in enterprises and organizations that require massive
computing power.
For example: weather forecasting, scientific research, intelligence gathering and analysis, data mining etc.
Globally, China has the maximum number of supercomputers and maintains the top position in the world, followed
by the US, Japan, France, Germany, Netherlands, Ireland and the United Kingdom.