Information Technology Application (UG Program) PDF
Document Details
Uploaded by WorthyNewton
Tags
Related
- George Reynolds - Ethics in Information Technology-Course Technology (2014)-63-87.pdf
- Des Plaines Police Department Information Technology Use PDF
- E-Book : Information And Communication Technology (English).pdf
- Copy of Information Technology EOY_CSEC .pdf
- gate-computer-science-and-information-technology-2019-9789352868469-9789353061166-9352868463_compress-1-578.pdf
- Archer C7 Wireless Dual Band Gigabit Router PDF
Summary
The document is an overview of information technology. It discusses the key role of Information Technology in the 21st century and its importance for economic growth. The document also covers information technology applications. It explores various aspects of technology, its uses, and its future potential.
Full Transcript
Information Technology Application UG PROGRAM 21st century has come to be known as the era of Information Technology; it is the key driver of economic growth of not only a nation, but rather the whole world. The growth and progress of every sector of the country toda...
Information Technology Application UG PROGRAM 21st century has come to be known as the era of Information Technology; it is the key driver of economic growth of not only a nation, but rather the whole world. The growth and progress of every sector of the country today depends on the level of Information Technology. Furthermore, technology is not important only at the work place, but also in our everyday life; whether it is working with the microwave oven which is a cooking appliance or a super computer, an appliance is based on information technology, technology helps everywhere. From hi-tech industry to an education system, Information Technology footprints can be seen everywhere. Likewise, Information Technology is one of the essential features for the overall development of a country. Meaning of Information Technology The technology, which is exclusively designed to store, process, and transmit information, is known as Information Technology. The following diagram illustrates the basic features and applications of Information Technology − Though the diagram given above is not inclusive, as it does not include every aspect and application of information technology, but it comprehensively covers the major aspects. Important Features of Information Technology Following are the major features as well as advantages of Information Technology − The development of Information Technology has made education system simpler, easier, and widespread. Now, people of remote areas can also use technology for their children’s education and also avail the benefits of adult education. Diffusion of e-governance on a large scale. Participation of public in governance and policy making. Fast economic development. Development of remote areas. Technology helps the police in nabbing the criminals. The judiciary and other administrative services can also take the help of technology to make work easier and faster. Highly beneficial for the common people, as they can access their rights and can take legal action against the person who violates his/her rights. It increases the happiness and prosperity of not only an individual, but rather the society as a whole. Besides, there are many other advantages too that can be availed in our everyday life only with the further development of information technology. Demerits of Information Technology Information Technology is like a boon on the society. However, it comes with its own disadvantages − As discussed above, with the help of technology, police can arrest criminals and criminal activities; at the same time, technology has also opened the door for criminals as well to practice smart criminal activity. There are chances that children can misuse technology and take a wrong path. Some distorted and perverted minds use technology to demean or defame someone unethically and also illegally. These are basically not demerits but rather the misuse of technology. Information Technology Act, 2000 By understanding the growing demand and applications of Information Technology, the Government of India passed the bill of Information Technology in 2000, which came to be known as the Information Technology Act, 2000. The major features of the Act are − It facilitates e-governance and e-commerce by providing equal legal treatment to users. It made provision to accept electronic records and digital signature. It gave legal approval to electronic business transactions. The Act instructs banks to maintain electronic record and facilitate electronic fund transfer. It also sets up a Cyber Law Appellate Tribunal. In of our previous chapters, we discussed the meaning, benefits, and applications of Information Technology; in this chapter, we will discuss, the major elements, i.e., basically the core concept of Information Technology. There are different subject matters those are being studied in the topic of information technology such as computer technology, electronics, IT industries, etc. Areas Covered by Information Technology Following are the essential topics of Information technology − Electronics Electronic Technology Let us now discuss each area in brief. Electronics The purpose of using the term ‘electronics’ is to enumerate all those devices that we use in our everyday life, such as, watches, TVs, stereo systems, and many more (as shown in the image given below). Further, the electronic devices are used in the design, manufacture, sale, and repair of all faulty products. Because of the advancement in the field of technology, these days, it is possible to develop very small devices, such as small computer, small stereo system, etc. The branch of electronics that does research on the miniaturization of electronic devices is known as ‘microelectronics.’ Following are some of the significant electronic devices that play a major role in different electronic products − Semiconductor device Largely made up of silicon, semiconductor is used in almost every electronic device. Electron tube It is normally a gas-filled tube in which the current of electrons flows between electrodes. However, when the gases are removed from the tube, it acts as a vacuum tube. Analog device It is a device that can measure, record, reproduce, or broadcast continuous information. For, example, radio waves used in the AM radio. Digital device It is a device that works on the sequence of pulse-like signals. The signals are coded to characterize numbers; for example, digital watches, computers, etc. Electronic Technology Following are a few important electronic technologies − Golden-i The Golden-i device consists of various mobile wireless wearable headset computers; the device is operated by voice commands and head movements (as shown in the image given below). DNA Robot It is a device that possibly can treat deadly diseases including cancer. The technology is being researched and developed. e-Writer It is a technology that translates handwriting into plain text on the screen. There is a different handwriting recognition software that senses handwriting and transfers the written text on the screen in the same format. LCD LCD stands for ‘liquid crystal display.’ This technology has two layers of polarized glass through which the liquid crystals block as well pass light. It uses fluorescent light. E.g. LCD TVs and Monitor. LED LED stands for ‘light emitting diodes.’ The LED technology uses light emitting diodes. Encryption It is a technique that converts information or data into a code, in order to prevent unauthorized access. Other Important Areas Covered by Information Technology We will now discuss the other important areas covered by Information Technology − Telecommunication It is the technology or process of communication over a distance by means of cable, telegraph, telephone, or broadcasting. Fiber Optics It is a technology that transmits signals on the principle of Total Internal Reflection (TIR) of light. The technology employs transmission of data in pulses of light form. Integrated Service Digital Network (ISDN) ISDN is a set of communication standards that simultaneously transmits voice, video, data, and other network services in digital form over the traditional circuits of the public switched telephone network. Computer A computer is a programmable electronic device that manipulates and manages different sorts of data and information. A computer can store, process, and retrieve the save data. Blue-Gene Computer It is one of the fastest supercomputers developed by the IBM Crop. Cloud Computing Cloud computing is a technique of using a network of remote servers hosted on the Internet with the purpose to store, manage, and process data. The technique keeps data safe and makes your data available anytime and anywhere; in other words, you don’t need to carry your computer device to carry data you access your data on any computer with internet facility. The crime that involves and uses computer devices and Internet, is known as cybercrime. Cybercrime can be committed against an individual or a group; it can also be committed against government and private organizations. It may be intended to harm someone’s reputation, physical harm, or even mental harm. Cybercrime can cause direct harm or indirect harm to whoever the victim is. However, the largest threat of cybercrime is on the financial security of an individual as well as the government. Cybercrime causes loss of billions of USD every year. Types of Cybercrime Let us now discuss the major types of cybercrime − Hacking It is an illegal practice by which a hacker breaches the computer’s security system of someone for personal interest. Unwarranted mass-surveillance Mass surveillance means surveillance of a substantial fraction of a group of people by the authority especially for the security purpose, but if someone does it for personal interest, it is considered as cybercrime. Child pornography It is one of the most heinous crimes that is brazenly practiced across the world. Children are sexually abused and videos are being made and uploaded on the Internet. Child grooming It is the practice of establishing an emotional connection with a child especially for the purpose of child-trafficking and child prostitution. Copyright infringement If someone infringes someone’s protected copyright without permission and publishes that with his own name, is known as copyright infringement. Money laundering Illegal possession of money by an individual or an organization is known as money laundering. It typically involves transfers of money through foreign banks and/or legitimate business. In other words, it is the practice of transforming illegitimately earned money into the legitimate financial system. Cyber-extortion When a hacker hacks someone’s email server, or computer system and demands money to reinstate the system, it is known as cyber-extortion. Cyber-terrorism Normally, when someone hacks government’s security system or intimidates government or such a big organization to advance his political or social objectives by invading the security system through computer networks, it is known as cyber- terrorism. Cyber Security Cyber security is a potential activity by which information and other communication systems are protected from and/or defended against the unauthorized use or modification or exploitation or even theft. Likewise, cyber security is a well-designed technique to protect computers, networks, different programs, personal data, etc., from unauthorized access. All sorts of data whether it is government, corporate, or personal need high security; however, some of the data, which belongs to the government defense system, banks, defense research and development organization, etc. are highly confidential and even small amount of negligence to these data may cause great damage to the whole nation. Therefore, such data need security at a very high level. How to Secure Data? Let us now discuss how to secure data. In order to make your security system strong, you need to pay attention to the following − Security Architecture Network Diagram Security Assessment Procedure Security Policies Risk Management Policy Backup and Restore Procedures Disaster Recovery Plan Risk Assessment Procedures Once you have a complete blueprint of the points mentioned above, you can put better security system to your data and can also retrieve your data if something goes wrong. In today’s world, e-infrastructure is the key element for the development of a society. E-infrastructure facilitates competent equipment and favorable resources and opportunities that are essentially needed to for the safety, security, and development of a society. Further, e-infrastructure helps to integrate various technologies including different computer systems, internet broadband channels, computing power, data storage, data sharing, and many more. To meet the growing challenges of globalization and also cope-up with the sustainable growth of information and communication technology, it is essentially required to integrate these systems by developing better e-infrastructure. Initiatives By understanding the growing demand and challenges, the Department of Information Technology formulated a ‘National Policy on Universal Electronic Accessibility’. The policy was approved by the union cabinet in 2013. The major strategies adopted in the implementation of the policy have been taken from the Press Information Bureau Government of India Cabinet October 3, 2013 − Creating awareness on universal electronics accessibility and universal design. Capacity building and infrastructure development. Setting up of model electronics and ICTs centres for providing training and demonstration to special educators and physically as well as mentally challenged persons. Conducting research and development, use of innovation, ideas, technology etc. whether indigenous or outsourced from abroad. Developing programme and schemes with greater emphasis for differently abled women/children. Developing procurement guidelines for electronics and ICTs for accessibility and assistive needs. ITIR For the exclusive growth of E-infrastructure in India, the Government of India has formulated the policy on ‘Information Technology Investment Regions (ITIRs) in 2008. As per the policy, ITIRs will be self-contained integrated township with the purpose to accelerated growth of Information Technology, Information Technology Enabled Service, and Electronic Hardware Manufacturing units. Further, the policy has recommended to assign minimum area of 40 sq. km for ITIR. However, out of the total demarcated area, 40% should be reserved for the processing zone and the remaining area for the non-processing zone. The processing zone will include − Information Technology/Information Technology Enabled Services Electronic Hardware Manufacturing Units Logistics and other services and required infrastructure. On the other hand, the non-processing area will include − Residential area Commercial area Other social and institutional infrastructure National Knowledge Network In 2009, in order to create an infrastructure that can fulfil the future requirements, the concept of ‘National Knowledge Network’ (NKN) is conceptualized. The concept of NKN is designed to Encourage, Enable, Enrich, and Empower the user community to test and implement the innovative ideas without any restrictions. Further, the NKN will provide better − Network design Security requirements Service requirements Operational requirements Dot Bharat The concept of developing the domain and website in ‘Devnagri’ (native script) was launched in August 2014. This script will cover the following Indian languages − Hindi Marathi Boro Dogri Maithili Sindhi Gujarati Gradually, other languages will also be covered. SAMPLE QUESTION FOR IT APPLICATIONS ( UG) 1. The basic operations performed by a computer are A) Arithmetic operation B) Logical operation C) Storage and relative D) All the above 2. What is the main difference between a mainframe and a supercomputer? A) Super computer is much larger than mainframe computers B) Super computers are much smaller than mainframe computers C) Supercomputers are focused to execute few programs as fast as possible while mainframe uses its power to execute as many programs concurrently D) Supercomputers are focused to execute as many programs as possible while mainframe uses its power to execute few programs as fast as possible. 3. The brain of any computer system is A) ALU B) Memory C) CPU D) Control unit 4. Storage capacity of magnetic disk depends on A) tracks per inch of surface B) bits per inch of tracks C) disk pack in disk surface D) All of above 5. The two kinds of main memory are: A) Primary and secondary B) Random and sequential C) ROM and RAM D) All of above 6. Computer is free from tiresome and boardoom. We call it A) Accuracy B) Reliability C) Diligence D) Versatility 7. A hybrid computer A) Resembles digital computer B) Resembles analogue computer C) Resembles both a digital and analogue computer D) None of the above 8. The ALU of a computer responds to the commands coming from A) Primary memory B) Control section C) External memory D) Cache memory 9. The main electronic component used in first generation computers was A) Transistors B) Vacuum Tubes and Valves C) Integrated Circuits D) None of above 10. A dumb terminal has A) an embedded microprocessor B) extensive memory C) independent processing capability D) a keyboard and screen 11. Software in computer A) Enhances the capabilities of the hardware machine B) Increase the speed of central processing unit C) Both of above D) None of above 12. Today’s computer giant IBM was earlier known by different name which was changes in 1924. What was that name? A) Tabulator Machine Co. B) Computing Tabulating Recording Co. C) The Tabulator Ltd. D) International Computer Ltd. 13. Before a disk drive can access any sector record, a computer program has to provide the record’s disk address. What information does this address specify? A) Track number B) Sector number C) Surface number D) All of above 14. The arranging of data in a logical sequence is called A) Sorting B) Classifying C) Reproducing D) Summarizing 15. What is the responsibility of the logical unit in the CPU of a computer? A) To produce result B) To compare numbers C) To control flow of information D) To do math’s works 1. You can read newspaper online which is one of the applications of Information Technology. a. e-book b. online newspaper c. publishing d. online blog Answer: b 2. ___________is a place where processing takes place a) Box b) CPU c) Monitor d) System unit Answer: System unit 3. Physical part of a computer are known as___________ a) Software b) Hardware c) Operating System d) System unit Answer: Hardware 4. A Processor acts like a/an a) Heart b) Arm c) Brain d) Kidney Answer: Brain 5. A Processor is also known as a) CPU b) UPS c) UPC d) PUS Answer: CPU 6. RAM stands for a) Random Access Memory b) Random Analysis c) Read Able Memory d) Random Available Memory Answer: Random Access Memory 7. ROM stores data a) Permanently b) Temporarily c) Partially d) Fully Answer: Permanently 8. Which of the following is the highest speed slot? a) ISA b) AGP c) PCI d) AGC Answer: AGP 9. A video game is played by using card a) Sound b) Modem c) Graphics d) Network information Answer: Sound 10. Barcode Reader is a/an device a) Output b) Input c) Display d) Storage Answer: Input 11. Which is used in security system and criminal investigations a) Fingerprint Reader b) Robots c) Sound card d) Barcode Reader Answer: Fingerprint Reader 12. Which is also known as mechanical agent a) Computer b) Barcode Reader c) Processor d) Robots Answer: Robots 13. _____ is the set of instruction given to the computer to perform a specific task a) Monitor b) Hardware c) Software d) Printer Answer: Software 14. _____is the most famous type of Operating System for personal computer a) Linux b) Unix c) Microsoft Windows d) Mac OS Answer: Microsoft Windows 15. A system software that helps Operating System to communicate with a device is called a) Operating system b) Device Driver c) Utility d) Graphics Software Answer: Device Driver 16. ____ is a program that allows a user to analyze and maintain a computer a) Utility b) Device Driver c) Widows XP d) MS office Answer: Utility 17. _____ creates a link between a user and the computer a) Device Driver b) Utilities c) Operating System d) Image Viewer Answer: Operating System 18. A _________ keeps the mouse free from dust and dirt a) mouse pad b) rubber pad c) paper pad Answer: mouse pad 19. Keep the index finger on the ________ button a) left b) right c) middle Answer: left 20. Keep the middle finger on the ________ button a) Right b) Left c) Scroll wheel Answer: Right 21. Move the mouse over a ________ a) Mouse pad b) Rubber pad c) Rubber pad Answer: Mouse pad 22. Always keep the _________ on the mouse pad a) mouse b) mouse c) CPU Answer: mouse 23. _________ has a tail. a) Mouse b) CPU c) Monitor Answer: Mouse 24. A mouse is a part of a _________ a) washing machine b) computer c) fan Answer: Computer 25. A keyboard has _________ keys. a) Both b) Number c) Alphabet Answer: Both 26. Cursor is a _________ blinking line on the monitor a) small b) big c) slanting Answer: small 27. There are usually __________ keys on the keyboard a) 104 b) 106 c) 110 Answer: 104 28. __________ keys are found at the top of the keyboard a) Function b) Number c) Alphabet Answer: Function 29. __________ key is use to write in capital letters a) Caps Lock b) Enter c) Backspace Answer: Caps Lock 30. _________ erases letters to the left of the cursor a) Backspace b) Delete c) Both Answer: Backspace 31. Question: Arrow keys are used to move the cursor in __________ directions a) Both b) LEFT/RIGHT c) UP/DOWN Answer: Both 32. Mouse is connected to _________ a) CPU b) UPS c) Keyboard Answer: CPU 33. Which Key Combination Is Used To Deselect A Selection a) Ctrl + Enter b) Ctrl + D c) Ctrl + F Answer: Ctrl + D 34. Cable Television Is An Example Of…….. a) WAN b) MAN c) LAN Answer: MAN 35. This Refers To The Physical Layout Of The Network Computer And Links a) Networking b) Network Security c) Topology Answer: Topology 36. It Is Not Important To Secure Wi Fi Network a) True b) False c) None Of These Answer: False 37. Wireless Network Are. …….. To Install And Maintain. a) Infrared b) Wireless c) Cheaper Answer: Cheaper 38. There Are. …,… Different Ways To Crop An Image a) 3 b) 4 c) 5 Answer: 3 39. Magnetic And Polygon Are The Two Type Of. …….Tool. a) Lasso b) Switch c) Colors Answer: Lasso 40. Clone Tool. Is Similar To Paint Bucket Tool a) True b) False c) None Of These Answer: False 41. There Are Four Type Of Network. a) True b) False c) None Of These Answer: False 42. Networking Is Only Used For Sharing Resources a) True b) False c) None Of These Answer: False 43. WAN. Stands For Wide Area Network a) True b) False c) None Of These Answer: True