IT & Enviornment
IT & Enviornment
References:
1. K.L. James, The Internet: A User's Guide 2nd Revised edition, PHI publication.
1
IT & ENVIORNMENT
Department of CS [Type text] Fifth Semester CS/BCA
Part B
11.Briefly explain the scope of NPTEL in education
12.What do you understand by the term non renewable resources?
13.Explain the features of NPTEL
14.Explain advantages of IT & Society
15.Give a small description about cyber addiction
16.State some of the events were recycled E -Waste was used
17.How E-Waste management awareness is enforced?
18.Explain 2nd and 3rd generation of HR
19.Explain HR of women,children
Part C
Module I
demand.
computer-based systems on the Internet can be designed to capture knowledge as it is
generated within a community of practice and to deliver relevant knowledge when it
is useful.
In this internet world, we can search any kind of information. Just type the keyword
in search engine and you can find a lot of information about it.
The internet is recognized as a rich source of information, which can be easily tapped
by any person who has the skills to use the internet.
online databases are easily accessible to all learners who have a computer and a
telephone line.
unlimited variety of databases and multimedia platforms that are able to supply
various needs, including knowledge, edutainment, entertainment, leisure activities,
consumer facilities, interpersonal interaction etc.
there are many knowledge centers in the net like which can be accessed and used by
all.
There are virtual library and also on-line discussion boards which are useful tools for
academic exchanges. Thus the use of internet by students and teachers is perceivedas
a vehicle to increase knowledge.
Knowledge repository means a place to store knowledge and retrieve knowledge.
Hence internet is truly a knowledge repository.
Academic Search Techniques
The Internet can provide a wealth of information, but the credibility and accuracy depend
entirely on the source, and finding credible information can be time-consuming, requiring
hours of sorting through largely irrelevant sites.
The computers are just a tool which helps you to get the information from the net. It cannot
think for you. It cannot impart knowledge to you. In this situation, Search Engines are like
the index in the back of a book. It helps you to search for specific words and topics.
Some of the examples of search engines are: Google, Alta Vista, Excite, Hotbot, Infoseek etc.
GOOGLE
Google is a full-text search engine, which uses computerized "spiders" to index millions,
It is case-insensitive. If you search for Three, tHRee, THREE, or even THREE, you get the
same results.
Singular is different from plural. Searches for apple and apples turn up different pages
The order of words matters. Google considers the first word most important, the second
word next, and so on.
It ignores most little words, including include "I," "where," "how," "the," "of," "an,""for,"
"from," "how," 'it," "in," and "is,”. Google ignores most punctuation, except
apostrophes, hyphens, and quote marks
It returns pages that match your search terms exactly
Google search word limit is 32
Some of the academic search techniques in the context of Google search engine are as
follows.
1. Phrase Searches
If you want Google to find you matches where the keywords appear together as a phrase,
surround them with quotes, like this “search techniques”.
2. Basic Boolean
3
IT & ENVIORNMENT
Department of CS [Type text] Fifth Semester CS/BCA
Google's Boolean default is AND, which means that if you enter query words without
modifiers, Google will search for all your query words
If you prefer to specify that any one word or phrase is acceptable, put an OR (in capital
letter), lower case or won’t work correctly. For example: enter Yahoo OR Google.
A computer programming character | can work like OR (e.g. Yahoo | Google)
3. Negation
If you want to specify that a query item must not appear in your results, prep end a (minus
sign or dash): “search techniques” –Google. This will search the pages that contain “search
techniques”, but not the word Google
4. Explicit Inclusion
Google will ignore because they are considered too common to be of any use in the search
(e.g. “a”, “the”, “of”, etc.)
You can force Google to take a stop word into account by prep ending a + (plus) character,
as in +the “search techniques”.
5. Synonyms
The Google synonym operator, the ~ (tilde) character, prep ended to any number of
keywords in your query, asks Google to include not only exact matches, but also what it
thinks are synonyms for each of the keywords. Searching for: ~ape turns up results for
monkey, gorilla, chimpanzee, and others (both singular and plural forms) of the ape or
related family
6.Number Range
The number range operator, .. (two periods), looks for results that fall inside your specified
numeric range (e.g. digital camera 3..5 megapixel $800..$1000)
You can also use the number range syntax with just one number, making it the minimum or
maximum of your query (e.g. digital camera ..5 megapixel $800..)
7. Simple Searching and Feeling Lucky
The I'm Feeling Lucky™ button is a thing of beauty
Entering Washington Post and clicking the I'm Feeling Lucky button takes you directly to
http://www.washingtonpost.com.
Cyber Presence
A web presence is a location on the World Wide Web where a person, business, or some
other entity is represented (see also web property and point of presence).
Examples of a web presence for a person could be a personal website, a blog, a profile page,
a wiki page, or a social media point of presence (e.g. a LinkedIn profile, a Facebook account,
or a Twitter account)
Creating a website a powerful communication tool to begin you cyber presence.
Successful cyber presence involves
Website
Social media
SEO(search engine optimization)
SEM(search engine marketing)
For cyber presence one must have the ability to:
Communicate
Share data,information ,knowledge
Interact with other entities and capabilities
Website
It’s a unique way to communicate with the world.
4
IT & ENVIORNMENT
Department of CS [Type text] Fifth Semester CS/BCA
1. EdX: edx.org
This website can be most preferred by the students as it was founded by Harvard
University and MIT in 2012.
EdX is an online learning destination and MOOC provider, offering high-quality
courses from the world's best universities and institutions to learners everywhere.
Out of the 90 universities, it includes top global rankers.
2. Academic Earth: academicearth.org
. They provide online degree courses from accounting and economics to engineering and also
carries material on niche subjects like behavioural psychology.
It has have a collaboration with a bunch of reputed colleges such as University of
Oxford, Massachusetts Institute of Technology, Stanford University and many other.
3.Internet Archive: archive.org
From anything to everything, internet archive is an authentic website storing the
originals from various big websites.
American libraries include the collection of free book directly attached with the
college libraries' websites.
This is one of the best websites imparting free and accessible knowledge ,it does not
give admission or certificates for learning.
4. Big Think: bigthink.com
Big Think has over 2,000 fellows,these experts write articles and record tutorials for
the students, later the content is further refined by the editorial team of the website,
giving authentic material to the students.
Students can make great use of this website by creating their own distinct ideology, as
it provide various opinions on one subject. students can get views from experts as
well.
5. Coursera: courser.org
The moment a student opens this website, he is bound to get sucked into the
number of courses available in his topic of interest. It is a user-friendly website.
Students can find big universities and a sharable electronic Course Certificate.
"Courses include recorded video lectures, auto-graded and peer-reviewed
assignments, and community discussion forums.
When you complete a course, you'll receive a sharable electronic Course
Certificate," assures the website.
6. Brightstorm: brightstorm.com
High school scholars can use this site for reference, rather an interactive reference
website, which will mitigate their learning problems.
The website is making the textbooks easier for students. They provide help in all
subjects from mathematics to science, history and other subjects
Entrance exams are generally quite gruelling for students, and this website can
5
IT & ENVIORNMENT
Department of CS [Type text] Fifth Semester CS/BCA
solve the problem. They have arranged the topics symmetrically, clearing the air
and structure of the competitive exams.
7. CosmoLearning: cosmolearning.com
This portal provides academic as well as skill-based learning to the students.
Students an educational channel for the learners. Unlike other websites, it only
represent the significant data catering the problems faced by students. For example,
students generally face problem in algebra, so they have created special section for the
same.can either refer to the material being provided or enrol themselves in any of the
58 courses.
The website is synthesised with three main options, including educational material,
courses and documentaries
The subjects have been divided into two sections, namely extra-curricular and
academic subjects.
7. Futures Channel: thefutureschannel.com
An educational channel for the learners. Unlike other websites, it only represent the significant
data catering the problems faced by students.
For example, students generally face problem in algebra, so they have created special
section for the same.
9. Howcast: howcast.com
It's a one-stop website for all the subjects, none of the above portals have these many
arenas.
The portal functions on the common key words including the word 'how'.
6
IT & ENVIORNMENT
Department of CS [Type text] Fifth Semester CS/BCA
and economics
SCOPE OF ENVIRONMENTAL STUDIES
Natural resources- their conservation and management
Ecology and Biodiversity
Environmental pollution and control
Human population and environment
Social issues in relation to development and environment
Growing Population
These are the basic aspects of environmental studies which have a
direct relevance
NATURAL RESOURCES
Natural resources can be defined as ‘variety of goods and services provided by nature which
are necessary for our day-to-day lives’.Eg: Plants, animals and microbes (living or biotic part),
Air, water, soil, minerals, climate and solar energy (non- living or abiotic part).They are
essential for the fulfillment of physiological, social, economical and cultural needs at the
individual and community levels.
7
IT & ENVIORNMENT
Department of CS [Type text] Fifth Semester CS/BCA
MODULE II
Impact of IT in E-Learnining
Technology empowers students by giving them ownership of how they learn, making
education relevant to their digital lives and preparing them for their futures.
With technology and access to resources beyond classroom walls, students are inspired to
become problem-solvers, critical thinkers, collaborators, and creators.
Where technology has been successfully integrated into classrooms, students develop a
lifelong love of learning.
Online education is flexible and affordable,students can attend their free time, they have a
9
IT & ENVIORNMENT
Department of CS [Type text] Fifth Semester CS/BCA
10
IT & ENVIORNMENT
Department of CS [Type text] Fifth Semester CS/BCA
11
IT & ENVIORNMENT
Department of CS [Type text] Fifth Semester CS/BCA
12
IT & ENVIORNMENT
Department of CS [Type text] Fifth Semester CS/BCA
Supports X.25 switch with1200bps transmission speed and 19.2KBs receive speed
Handles 300packets per second
Host computers are connected with packet switch
Connected with INTELSAT-V satellite
Advantages and Features of NICNET
Internet Classroom Assistant ICA
Conferencing
Schedduling
Document Sharing
Personal Messaging
Link Sharing
MODULE III
IT & SOCIETY
Information Technology is the science and acivity of storing and sending out information by
using computers
It is the technology used to store , manipulate , distribute or create information
It is the application of computers and telecommunication equipment to store ,retrieve,
transmit and manipulate data such as networking , hardware ,software, the internet or the
people that work with these technologies
Society is a community ,nation, or broad grouping of people having common
traditions,institutions and collective activities and interests.
It is comprised of computers, networks ,mobile and wireless devices, satellite
communication, robotics,video text, cable television, electronic mail, electronic games and
automated offline equipment.
ADVANTAGES OF IT IN THE SOCIETY
Globalization
Cost effectiveness
Lost of time
The birth of new jobs
DISADVANTAGES OF IT IN THE SOCIETY
Unemployment
Privacy
Insufficient of job security
13
IT & ENVIORNMENT
Department of CS [Type text] Fifth Semester CS/BCA
Dominant culture
Digital Divide
Digital divide is a term that refers to the gap between demographics and regions that
have access to modern information and communications technology, and those that don't
or have restricted access.
This technology can include the telephone, television, personal computers and the
Internet.
Digital divide typically exists between those in cities and those in rural areas; between
the educated and the uneducated; between socioeconomic groups; and, globally, between
the more and less industrially developed nations.
IT & DEVELOPMENT
New developments in IT:-
Blockchain
o It is a growing list of records, called blocks which are linked using
cryptography.
o Its an open ,distributed ledger that can record transactions between two
parties efficiently and in a variable and permanent way
The Internet of Things(IoT)
o The Internet of Things, or IoT, refers to the billions of physical devices
around the world that are now connected to the internet, all collecting and
sharing data.
Healthcare
Generative Adversarial Networks
o It’s a way of pitting two neural networks against each other in order to
train one of them to produce new things
Human and Artificial Neural Networks
o An artificial neural network is an attempt to simulate the network of
neurons that make up a human brain so that the computer will be able to
learn things and make decisions in a humanlike manner
Incremental Improvements
Quatum Batteries
o A quantum battery is a theoretical construct that could charge faster than
14
IT & ENVIORNMENT
Department of CS [Type text] Fifth Semester CS/BCA
IT Service Manager
System Engineer
Cloud virtualization engineer
Linux Administrator
Cloud Architect
OPPERTUNITIES IN IT DEVELOPMENT
Data programmer
Automation developer
AI developer
Cloud developer
OPPERTUNITIES IN IT SECURITY
Security analyst
Vulnerability assessor
Business continuity or disaster recovery
OPPERTUNITIES IN THE SPHERE OF DATA
Jobs in the fields of Analytics, Big Data jobs and Small Data jobs
Project manager
IT INDUSTRY – THREATS
a threat is a potential negative action or event facilitated by a vulnerability that results in an
unwanted impact to a computer system or application
15
IT & ENVIORNMENT
Department of CS [Type text] Fifth Semester CS/BCA
16
IT & ENVIORNMENT
Department of CS [Type text] Fifth Semester CS/BCA
4.Online Piracy
Online piracy, also known as Internet piracy, is when illegal software is sold, shared or
acquired by means of the Internet. This is usually done through a peer-to-peer (P2P) file-
sharing system, which is usually found in the form of online auction sites and blogs.
5.End Uder Piracy
“End-user piracy occurs when an individual or organization reproduces and/or uses
unlicensed copies of software for its operations.”
CYBER ETHICS
Cyber ethics is the study of ethics pertaining to computers, covering user behavior and what
computers are programmed to do, and how this affects individuals and society.
Cyber ethics concerns to the code of responsible behavior on the Intern"cyber ethics" refers
to a set of moral rules or a code of behaviour applied to the online environment. As a
responsible netizen, you should observe these rules to help make cyberspace a safe place.
CYBER CRIME
Cybercrime, or computer-oriented crime, is a crime that involves a computer and a network.
The computer may have been used in the commission of a crime, or it may be the target.
Cybercrime may threaten a person, company or a nation's security and financial health.
Cyberwarfare refers to the use of digital attacks -- like computer viruses and hacking -- by
one country to disrupt the vital computer systems of another, with the aim of creating
damage, death and destruction
CYBER THREATS
A cyber or cyber security threat is a malicious act that seeks to damage data, steal data, or
disrupt digital life in general. Cyber attacks include threats like computer viruses, data
breaches, and Denial of Service (DoS) attacks
Different types of cyber threat :-
1.Malware
Malware is malicious software such as spyware, ransomware, viruses and worms. Malware is
activated when a user clicks on a malicious link or attachment, which leads to installing
dangerous software. Cisco reports that malware, once activated, can:
Block access to key network components (ransomware)
Install additional harmful software
Covertly obtain information by transmitting data from the hard drive (spyware)
Disrupt individual parts, making the system inoperable
2.Phishing
Phishing attacks use fake communication, such as an email, to trick the receiver into opening
it and carrying out the instructions inside, such as providing a credit card number. “The goal
is to steal sensitive data like credit card and login information or to install malware on the
victim’s machine,”
3. Man in the Middle
A man-in-the-middle (MITM) attack occurs when hackers insert themselves into a two-party
transaction. After interrupting the traffic, they can filter and steal data, according to Cisco.
MITM attacks often occur when a visitor uses an unsecured public Wi-Fi network. Attackers
insert themselves between the visitor and the network, and then use malware to install
software and use data maliciously
4. Denial of Service
A denial of service (DoS) is a type of cyber attack that floods a computer or network so it
can’t respond to requests. A distributed DoS (DDoS) does the same thing, but the attack
originates from a computer network. Cyber attackers often use a flood attack to disrupt the
17
IT & ENVIORNMENT
Department of CS [Type text] Fifth Semester CS/BCA
“handshake” process and carry out a DoS. Several other techniques may be used, and some
cyber attackers use the time that a network is disabled to launch other attacks.
5. RANSOMEWARE
Ransomware is malicious software that infects your computer and displays messages
demanding a fee to be paid in order for your system to work again. This class of malware is a
criminal moneymaking scheme that can be installed through deceptive links in an email
message, instant message or website.
6. TROJAN
A Trojan horse, or Trojan, is a type of malicious code or software that looks legitimate but
can take control of your computer. A Trojan is designed to damage, disrupt, steal, or in
general inflict some other harmful action on your data or network.
6.SPEAR PHISHING
Spear phishing is an email or electronic communications scam targeted towards a specific
individual, organization or business. Although often intended to steal data for malicious
purposes, cybercriminals may also intend to install malware on a targeted user’s computer.
7.ATTACK ON IoT DEVICES
These include hackers taking over the device to make it part of DDoS attack and unauthorized
access to data being collected by the device
8.DATA BREACHES
A data breach is a security incident in which information is accessed without authorization.
Data breaches can hurt businesses and consumers in a variety of ways. They are a costly
expense that can damage lives and reputations and take time to repair.
9.MALWARE on MOBILE APPS
Mobile malware, as its name suggests is malicious software that specifically targets the
operating systems on mobile phones
Elements of cyber security
Network security
Application security
Endpoint security
Data security
Identity management
Database and infrastructure security
Cloud security
Mobile security
End user education
Cyber security is the practice of defending computers, servers, mobile devices, electronic
18
IT & ENVIORNMENT
Department of CS [Type text] Fifth Semester CS/BCA
19
IT & ENVIORNMENT
Department of CS [Type text] Fifth Semester CS/BCA
Focusing your eyes at the same distance point for long periods of time causes fatigue
Make sure your main source of light is not shining into your face
Tilt the screen slightly to avoid reflections or glare
Make sure the screen is not too close to your face
20
IT & ENVIORNMENT
Department of CS [Type text] Fifth Semester CS/BCA
IMPACT OF IT ON LANGUAGE
1. It adds a lot of “jargon” vocabulary - words like “byte” and “internet”.
2. It adds meaning to existing words that they didn’t have before - like “mouse” and
“keyboard” (think “piano”).
3. It tends to unify the speech of people around the world because we encounter far
more speech from people in remote places. For example, before we had all this
technology, in the UK a “billion” was “a million, million” - but now the US
meaning (“a thousand million”) has more or less taken over because it’s just too
confusing to continue to use the UK meaning.
4. It spreads linguistic “memes” far faster and much further than ever before. So
things like “the cloud” as a metaphor for a distant and nebulous group of computers
appeared from nowhere and was in universal use within maybe 6 months.
Positive and negative impacts of Technology
Using ICT gadget We can also integrate the domestic equipments to
Daily routine Management: We can store and manage our daily schedule i We can also
integrate the domestic equipments to use and control
together. We can also use net banking, online payments and online trading for
purchasing daily needed items
It will save our time to go market and purchase things.
Social Relationship: ICT provides the facility to make contacts and maintain
With the use of Internet and communication channel, we can connect the people
via e-mail, social networking websites and cell phones. It saves time and works
inexpensive way. There are bulletin boards, discussion groups services are available
21
IT & ENVIORNMENT
Department of CS [Type text] Fifth Semester CS/BCA
Students can be part of these various learning and teaching from all over the world.
For
the impossible experiments, we can use simulations and virtual reality. If students
and
teachers logged at same time at the same pace mad the virtual classroom for e-
learning.
This is a smart investment four our children’s future.
Self Employment: ICT gadgets are help out us to do our jobs easier. We can create our
own business shops without the heavy overheads of place, purchase items and sales
in
market and make the advertising campaigns use of multimedia application. This
increased sales and encourage small buisness
Positive and Negative Impacts of ICT in our Everyday Life 7
22
IT & ENVIORNMENT
Department of CS [Type text] Fifth Semester CS/BCA
Cost: Many ICT gadgets are expensive. So they are cost effective to purchase and to
Poor students cannot get the benefits of e-learning due to the educational
establishments.
Job loss: Job losses may occur because of manual operations being replaced by
Security/loss of privacy: Each ICT gadgets are integrated by specific technology and
Use of social networking web site risk of personal data loss. When we use Net banking,
online payment then there is a risk of losing our money by fraud people. They can transfer
our money to their account.
MODULE IV
E – WASTE AND GREEN COMPUTING
E-Waste
E-waste is any electrical or electronic equipment that's been discarded. This includes
working and broken items that are thrown in the garbage or donated to a charity reseller like
Goodwill. Often, if the item goes unsold in the store, it will be thrown away.
Electronic scrap components, such as CPUs, contain poten in a way that reduces their
environmental impacttially harmful materials such as lead, cadmium, beryllium,
or brominated flame retardants.
Problems caused by E-Waste
Disposal of these electronic wastes meet air, and water components of the environment.
Effects on air
One of the most common effect of E-waste on az through air pollution. For example, a British
documentary about Lagos and its inhabitants, called Welcome to Laos. shows a number of
landfil: scavengers who go through numerous landfills in Lagos looking for improperly
disposed electronics which includes wires, blenders, etc., to make some income from the
recycling of these wastes. These men were shown to burn wires to get the copper (a very
valuable commodity) in them by open air burning which can release hydrocarbons into the air
Effects on Water
When electronics containing heavy metals such as lead, barium, mercury, lithium (found in
mobile phone and computer batteries), etc., are improperly disposed, these heavy metals
leach through the soil to reach groundwater channels Which eventually run to the surface as
streams or small ponds of water. Local communities often depend on these bodies of water
and the groundwater. Apart from these chemicals resulting in the death of some of the plants
23
IT & ENVIORNMENT
Department of CS [Type text] Fifth Semester CS/BCA
and animals that exist in the water, intake of the contaminated water by humans and land
animals results in lead poisoning
Effects on soil
In this way, toxic heavy metals and chemicals from e-ast& enter the "soil-crop--food
pathway," one of the most significant routes for heavy metals exposure to human.These are
not biodegradable.They persist in the environment for long periods of time,increasing the risk
of exposure.
E Waste Management in India
About 95% of India’s e-waste is recycled in the informal sector
2020 Tokyo Olympics medals will be made of 50,000 tons of e-waste
Organizing committee will make all the medals from old smartphones, Laptops and
other gadgets
By November 2018,organizers collect 47,488 tons of devices
Green Computing
Green computing is the environmentally responsible and eco-friendly use of computers and
their resources. In broader terms, it is also defined as the study of designing,
manufacturing/engineering, using and disposing of computing devices.
Examples include: Purchasing from Environmentally Committed Companies. Participating in
Electronic Recycling Programs. ... Limiting Printing and Recycling Paper.
benefits of green computing for your business.
Lower Energy Bills. ...
Less Waste. ...
Reduce Office Expense. ...
Improve Workplace Productivity. ...
Trickle Down Effect of Green IT. ...
Save Money Across the Board. ...
Tax Benefits.
Approches employed for green computing
Green use: Minimizing the electricity consumption of computers and their peripheral
devices and using them in an eco-friendly manner.
Green disposal: Repurposing existing equipment or appropriately disposing of, or
recycling, unwanted electronic equipment.
Green Design: is known as designing energy-efficient computers, servers, printers,
projectors and other digital devices that are environmentally friendly. Green designed
products are able to be reclaimed, renewed, and reused. .
24
IT & ENVIORNMENT
Department of CS [Type text] Fifth Semester CS/BCA
Informal sector
The informal sector handles electronic waste by recycling or final disposal. There is a whole
economic market for electronic waste because the parts can be dismantled and the scrap
metals can be recycled. There are recycling techniques that are not following any type of
environmental or health standards. Some of the methods used are acid baths, burning cables,
and disposing in nature which can be detrimental to the health of those participating in these
disposal techniques.
MODULE V
HUMAN RIGHTS
Human Rights
Human rights are based on dignity, equality and mutual respect – regardless of your
nationality, your religion or your beliefs. Your rights are about being treated fairly and
treating others fairly, and having the ability to make choices about your own life.
Three Generations of Human righ
In the category of human rights, we can identify the rights from the first generation like:
the right to life, personal safety, the right to property and rights from the second
generation like: socio-economical rights or freedom rights (freedom of association) or from
the third generation (minorities' rights)
International Bill of Rights
The Universal Declaration of Human Rights, the international Covenant on Civil and
Political Rights,and the International Covenant on Economic, Social and Cultural Rights
25
IT & ENVIORNMENT
Department of CS [Type text] Fifth Semester CS/BCA
Role of UN Secretariat
Coordinate with the entire work of all the organs of the UN.
Functions under a chief 212 Administrative Officer (Secretary General)
Term of office of the Secretary General is 5 years
26
IT & ENVIORNMENT
Department of CS [Type text] Fifth Semester CS/BCA
The Committee on the Elimination of Racial Discrimination (CERD) is the body that
monitors the implementation of the provisions of the International Convention on the
Elimination of All Forms of Racial Discrimination (ICERD) by its State parties
National HR Commission
NHRC officials visit jails to inspect living conditions for inmates incarcerated for
treatment, reformation and protection
NHRC can review and make recommendations in constitutional and legal safeguards
NHRC serves as the basis of human rights literacy in India,initiating awareness of
rights through publications, media etc.
State HR Commission
Intervene in any proceeding involving any allegation of violation of human rights before a court
with the approval of such court.
Visit any jail or any other institution under the control of the State Government where persons
are detained to study the living conditions of the inmates and make recommendations thereon
Undertake and promote research in the field of human rights.
To inquire into any violation of human rights or negligence in the prevention of such violation
by a public servant, either suo moto or on a petition presented to it or on an order of a court.
Women’s Rights under Indian Constitution
Article 21-
No person except according to procedure established by law shall be deprived of his
life or personal liberty
Article 14-
Right to equality
Article 19-
27
IT & ENVIORNMENT
Department of CS [Type text] Fifth Semester CS/BCA
28
IT & ENVIORNMENT
Department of CS [Type text] Fifth Semester CS/BCA
Minority rights are the normal individual rights as applied to members of racial, ethnic, class,
religious, linguistic or gender and sexual minorities.
Rights of Prisoners
Prepared by
Aneesa A Rahman
29
IT & ENVIORNMENT