0% found this document useful (0 votes)
188 views

IT & Enviornment

IT and environment

Uploaded by

Jils Thomas
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
188 views

IT & Enviornment

IT and environment

Uploaded by

Jils Thomas
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 29

Department of CS [Type text] Fifth Semester CS/BCA

INDIRA GANDHI COLLEGE OF ARTS & SCIENCE


Common for Fifth Semester BCA & Computer Science
CS5CRT13 IT&Environment (Core)

Unit 1: Introduction to Internet and Environment (10 hrs)


Internet- Internet as a knowledge repository, academic search techniques, creating cyber presence.
Academic websites.
Multidisciplinary nature of environmental studies -Definition, scope and importance,
Need for public awareness.
Unit 2: Impact of IT in E-Learning (12 hrs.)
Introduction to use of IT in teaching and learning, Learning Management System-Moodle,
Edmodo, etc. Academic services– A note on INFLIBNET, NPTEL, NICNET.
Unit 3 : IT and Society (18 hrs.)
IT & Society- issues and concerns- digital divide, IT & development, the free software
movement.
IT industry: new opportunities and new threats, software piracy, cyber ethics, cybercrime,
cyber threats, cyber security, privacy issues, cyber laws, cyber addictions, information
overload, health issues- guidelines for proper usage of computers, internet and mobile
phones. Impact of IT on language & culture.
Unit 4 : E-waste and Green Computing (14 hrs.)
E-waste- Problems- Solutions-Impact of e-waste in living beings and environment- a study
on e- waste management in India.
Green computing, definition, meaning, scope. Green computing in India.
Unit 5: Human Rights (18 hrs.)
An Introduction to Human Rights, Meaning, concept and development –History of Human
Rights-Different Generations of Human Rights- Universality of Human Rights- Basic
International Human Rights Documents - UDHR ,ICCPR,ICESCR.-Value dimensions of
Human Rights
Human Rights and United Nations
Human Rights co-ordination within UN system- Role of UN secretariat- The Economic
and Social Council- The Commission Human Rights-The Security Council and Human
rights- The Committee on the Elimination of Racial Discrimination- The Committee on the
Elimination of Discrimination Against Women- the Committee on Economic, Social and
Cultural Rights- The Human Rights Committee- Critical Appraisal of UN Human Rights
Regime.
Human Rights National Perspective
Human Rights in Indian Constitution – Fundamental Rights- The Constitutional Context of
Human Rights-directive Principles of State Policy and Human Rights- Human Rights of
Women- children –minorities- Prisoners- Science Technology and Human Rights- National
Human Rights Commission- State Human Rights Commission- Human Rights Awareness
in Education.
Case Study:
The students need to view the film “Samaksham”, a film on environment produced by
Mahatma Gandhi University Creations and submit a compulsory assignment reviewing
film. The review is considered for internal mark assessment.

References:

1. K.L. James, The Internet: A User's Guide 2nd Revised edition, PHI publication.

1
IT & ENVIORNMENT
Department of CS [Type text] Fifth Semester CS/BCA

2. Bharucha Erach, Text Book of Environmental Studies for undergraduate Courses.


University Press, IInd Edition 2013 (TB)(
https://www.ugc.ac.in/oldpdf/modelcurriculum/env.pdf).
3. Barkha and U Rama Mohan, Cyber Law & Crimes, 3rd Edition, Asia Law House.
4. Rakesh Johri, E-waste: Implications, regulations, and management in India and current
global best practices, Teri publications.
5. Alan Evans, Kendall Martin, Mary Anne Poatsy, Technology in Action, Pearson.

Previous Question Paper


Part A
1. What do you understand by the term repository?
2. What is cyber threats?
3. Mention two advantages using using technology in education
4. Give health issues for the usage of computer in hand and arm.
5. What are the problems caused by E-Waste?
6. How air is polluted through E-Waste
7. What is Green manufacturing?
8. Define UDHR
9. Define UN system
10. What is the right against exploitation?

Part B
11.Briefly explain the scope of NPTEL in education
12.What do you understand by the term non renewable resources?
13.Explain the features of NPTEL
14.Explain advantages of IT & Society
15.Give a small description about cyber addiction
16.State some of the events were recycled E -Waste was used
17.How E-Waste management awareness is enforced?
18.Explain 2nd and 3rd generation of HR
19.Explain HR of women,children

Part C

20.Explain different LMS with features


21.Explain IT industry
23.Explain The disposal techniques on E- Waste
24.Explain about CERD

Module I

Internet as a Knowledge Repository


 Information technology is not only transforming our workplace but also our
educational system.
 The computer technology which drives the information explosion also has the
potential to help individuals and teams to learn much of what they need to know on
2
IT & ENVIORNMENT
Department of CS [Type text] Fifth Semester CS/BCA

demand.
 computer-based systems on the Internet can be designed to capture knowledge as it is
generated within a community of practice and to deliver relevant knowledge when it
is useful.
 In this internet world, we can search any kind of information. Just type the keyword
in search engine and you can find a lot of information about it.
 The internet is recognized as a rich source of information, which can be easily tapped
by any person who has the skills to use the internet.
 online databases are easily accessible to all learners who have a computer and a
telephone line.
 unlimited variety of databases and multimedia platforms that are able to supply
various needs, including knowledge, edutainment, entertainment, leisure activities,
consumer facilities, interpersonal interaction etc.
 there are many knowledge centers in the net like which can be accessed and used by
all.
 There are virtual library and also on-line discussion boards which are useful tools for
academic exchanges. Thus the use of internet by students and teachers is perceivedas
a vehicle to increase knowledge.
 Knowledge repository means a place to store knowledge and retrieve knowledge.
Hence internet is truly a knowledge repository.
Academic Search Techniques

 The Internet can provide a wealth of information, but the credibility and accuracy depend
entirely on the source, and finding credible information can be time-consuming, requiring
hours of sorting through largely irrelevant sites.
 The computers are just a tool which helps you to get the information from the net. It cannot
think for you. It cannot impart knowledge to you. In this situation, Search Engines are like
the index in the back of a book. It helps you to search for specific words and topics.
Some of the examples of search engines are: Google, Alta Vista, Excite, Hotbot, Infoseek etc.

GOOGLE
 Google is a full-text search engine, which uses computerized "spiders" to index millions,
 It is case-insensitive. If you search for Three, tHRee, THREE, or even THREE, you get the
same results.
 Singular is different from plural. Searches for apple and apples turn up different pages
 The order of words matters. Google considers the first word most important, the second
word next, and so on.
 It ignores most little words, including include "I," "where," "how," "the," "of," "an,""for,"
"from," "how," 'it," "in," and "is,”. Google ignores most punctuation, except
apostrophes, hyphens, and quote marks
 It returns pages that match your search terms exactly
 Google search word limit is 32
Some of the academic search techniques in the context of Google search engine are as
follows.

1. Phrase Searches
 If you want Google to find you matches where the keywords appear together as a phrase,
surround them with quotes, like this “search techniques”.
2. Basic Boolean

3
IT & ENVIORNMENT
Department of CS [Type text] Fifth Semester CS/BCA

 Google's Boolean default is AND, which means that if you enter query words without
modifiers, Google will search for all your query words
 If you prefer to specify that any one word or phrase is acceptable, put an OR (in capital
letter), lower case or won’t work correctly. For example: enter Yahoo OR Google.
 A computer programming character | can work like OR (e.g. Yahoo | Google)
3. Negation
 If you want to specify that a query item must not appear in your results, prep end a (minus
sign or dash): “search techniques” –Google. This will search the pages that contain “search
techniques”, but not the word Google
4. Explicit Inclusion
 Google will ignore because they are considered too common to be of any use in the search
(e.g. “a”, “the”, “of”, etc.)
 You can force Google to take a stop word into account by prep ending a + (plus) character,
as in +the “search techniques”.
5. Synonyms
 The Google synonym operator, the ~ (tilde) character, prep ended to any number of
keywords in your query, asks Google to include not only exact matches, but also what it
thinks are synonyms for each of the keywords. Searching for: ~ape turns up results for
monkey, gorilla, chimpanzee, and others (both singular and plural forms) of the ape or
related family
6.Number Range
 The number range operator, .. (two periods), looks for results that fall inside your specified
numeric range (e.g. digital camera 3..5 megapixel $800..$1000)
 You can also use the number range syntax with just one number, making it the minimum or
maximum of your query (e.g. digital camera ..5 megapixel $800..)
7. Simple Searching and Feeling Lucky
 The I'm Feeling Lucky™ button is a thing of beauty
Entering Washington Post and clicking the I'm Feeling Lucky button takes you directly to
http://www.washingtonpost.com.
Cyber Presence
A web presence is a location on the World Wide Web where a person, business, or some
other entity is represented (see also web property and point of presence).
Examples of a web presence for a person could be a personal website, a blog, a profile page,
a wiki page, or a social media point of presence (e.g. a LinkedIn profile, a Facebook account,
or a Twitter account)
Creating a website a powerful communication tool to begin you cyber presence.
Successful cyber presence involves

 Website
 Social media
 SEO(search engine optimization)
 SEM(search engine marketing)
For cyber presence one must have the ability to:
 Communicate
 Share data,information ,knowledge
 Interact with other entities and capabilities
Website
It’s a unique way to communicate with the world.

4
IT & ENVIORNMENT
Department of CS [Type text] Fifth Semester CS/BCA

A website will give you:


 Perfect business card for your enterprise
 A detailed and permanent ad
 A place that open 24/7 all year round
 Increased competitiveness
 Increased credibility
Academic websites

1. EdX: edx.org
 This website can be most preferred by the students as it was founded by Harvard
University and MIT in 2012.
 EdX is an online learning destination and MOOC provider, offering high-quality
courses from the world's best universities and institutions to learners everywhere.
 Out of the 90 universities, it includes top global rankers. 
2. Academic Earth: academicearth.org
 . They provide online degree courses from accounting and economics to engineering and also
carries material on niche subjects like behavioural psychology.
 It has have a collaboration with a bunch of reputed colleges such as University of
Oxford, Massachusetts Institute of Technology, Stanford University and many other.
3.Internet Archive: archive.org
 From anything to everything, internet archive is an authentic website storing the
originals from various big websites.
 American libraries include the collection of free book directly attached with the
college libraries' websites.
 This is one of the best websites imparting free and accessible knowledge ,it does not
give admission or certificates for learning.
4. Big Think: bigthink.com
 Big Think has over 2,000 fellows,these experts write articles and record tutorials for
the students, later the content is further refined by the editorial team of the website,
giving authentic material to the students.
 Students can make great use of this website by creating their own distinct ideology, as
it provide various opinions on one subject. students can get views from experts as
well.
5. Coursera: courser.org
 The moment a student opens this website, he is bound to get sucked into the
number of courses available in his topic of interest. It is a user-friendly website.
 Students can find big universities and a sharable electronic Course Certificate.
"Courses include recorded video lectures, auto-graded and peer-reviewed
assignments, and community discussion forums.
 When you complete a course, you'll receive a sharable electronic Course
Certificate," assures the website.
6. Brightstorm: brightstorm.com
 High school scholars can use this site for reference, rather an interactive reference
website, which will mitigate their learning problems.
 The website is making the textbooks easier for students. They provide help in all
subjects from mathematics to science, history and other subjects
 Entrance exams are generally quite gruelling for students, and this website can

5
IT & ENVIORNMENT
Department of CS [Type text] Fifth Semester CS/BCA

solve the problem. They have arranged the topics symmetrically, clearing the air
and structure of the competitive exams.
7. CosmoLearning: cosmolearning.com
 This portal provides academic as well as skill-based learning to the students.
 Students  an educational channel for the learners. Unlike other websites, it only
represent the significant data catering the problems faced by students. For example,
students generally face problem in algebra, so they have created special section for the
same.can either refer to the material being provided or enrol themselves in any of the
58 courses.
 The website is synthesised with three main options, including educational material,
courses and documentaries
 The subjects have been divided into two sections, namely extra-curricular and
academic subjects.
7. Futures Channel: thefutureschannel.com
 An educational channel for the learners. Unlike other websites, it only represent the significant
data catering the problems faced by students.
 For example, students generally face problem in algebra, so they have created special
section for the same.
9. Howcast: howcast.com
 It's a one-stop website for all the subjects, none of the above portals have these many
arenas.
 The portal functions on the common key words including the word 'how'.

10. Khan Academy:


 khanacademy.org is an online coaching website. Students who cannot afford a
coaching can refer to this website.
 It gives a win-win situation to the students by giving them the liberty to learn on
their pace, as it has a personalised dashboard to gauge the progress report.
 It has all the traditional school subjects including math, science, computer
programming, history, art history, economics, and more.
 it has lessons from kindergarten to calculus, all at one stop. To enhance the content
for the students, it has partnered with NASA, the Museum of Modern Art, the
California Academy of Sciences, and MIT. Also, the content is available in 36
languages.
MULTIDISCIPLINARY NATURE OF ENVIRONMENTAL STUDIES
 The Environment studies is a multi-disciplinary science because it comprises
various branches of studies like chemistry, physics, medical science, life
science, agriculture, public health, sanitary engineering etc.
 It is the science of physical phenomena in the environment. It studies about the
sources, reactions, transport, effect and fate of physical and biological species
in the air, water, soil and the effect of from human activity upon these.
 environmental studies is inter disciplinary in nature including the study of
biology, geology, politics, policy studies, law, religion engineering, chemistry

6
IT & ENVIORNMENT
Department of CS [Type text] Fifth Semester CS/BCA

and economics
SCOPE OF ENVIRONMENTAL STUDIES
 Natural resources- their conservation and management
 Ecology and Biodiversity
 Environmental pollution and control
 Human population and environment
 Social issues in relation to development and environment
 Growing Population
These are the basic aspects of environmental studies which have a

direct relevance
NATURAL RESOURCES

Natural resources can be defined as ‘variety of goods and services provided by nature which
are necessary for our day-to-day lives’.Eg: Plants, animals and microbes (living or biotic part),
Air, water, soil, minerals, climate and solar energy (non- living or abiotic part).They are
essential for the fulfillment of physiological, social, economical and cultural needs at the
individual and community levels.

TYPES OF NATURAL RESOURCES


They are of two types of resources namely Renewable and Non-Renewable Resources.
Renewable resources: The resources that can be replenished through rapid natural cycles are
known as renewable resource. These resources are able to increase their abundance
throughreproduction and utilization of simple substances.
Ex: Plants, (crops and forests) and animals.
Some examples of renewable resources though they do not have life cycle but can be recycled.
Ex: Wood and wood-products, pulp products, natural rubber, fibers (e.g. Cotton, jute, animal
wool,silk and synthetic fibers) and leather.
water and soil are also classified as renewable resources.
Non renewable resources: The resources that cannot be replenished through natural processes
are known as non-renewable resources.
These are available in limited amounts, which cannot be increased
These resources include fossil fuels (petrol, coal etc.), metals (iron, copper, gold, silver, lead,
zinc etc.), minerals and salts (carbonates, phosphates, nitrates etc.).Once a non-renewable
resource is consumed, it is gone forever.
NEED for PUBLIC AWARENESS
 Mass media such as newspaper,radio,television,social media ,strongly influence public
opinion

7
IT & ENVIORNMENT
Department of CS [Type text] Fifth Semester CS/BCA

 Polititions in a democracy respond positively to a strong publicly supported movement


 Join an NGO that supports conservation
INSTITUTIONS IN ENVIRONMENT
 The Bombay Natural History Society (BNHS), Mumbai
 World Wide fund for nature- India (WWF-1), New Delhi
 Centre or science and environment (CSE), New Delhi
 C.P.R Environmental Education Centre, Madras
 Centre for Environment Education (CEE)
 Bharati Vidyapeeth University, Institute of Environment Education & Research, Pune
 The Salim Ali Center for Ornithology and Natural History (SACON)
 Wild life Institute of India (WII), Dehradhun
 Zoological survey of India (ZSI)
 Botanical Survey of India (BSI)
 National Mission for Clean Ganga(NMCG)
 Kalpavriksh,Pune
 Uttarakhand Sevs Nidhi,Almora
Peoples in Enviornment
 Charles Darvin
o Wrote the” Origin of Species”
 Ralph emerson
o Spoke of the dangers of commerce to our environment
 Henry Thoreau
o Wrote the wilderness should be preserved after he lived for a year
 John Muir
o Remembered as having saved the great sequoia trees in Calofornia sorests
 Aldo Leopald
o Designed the early policies on wilderness conservation
 Rachel Carson
o Published several articles that caused worldwide concern on the effects of pesticides on
nature and mankind
 EO Wilson
o Is an entomologist who envisioned that biological diversity was a key to human survival on
earth,wrote “Diversity of Life”
 Salim Ali
o Wrote “book of Indian Birds”, “Fall of a Sparrow”
o His name was synonymous wit ornithology in India
 Indira Gandhi
8
IT & ENVIORNMENT
Department of CS [Type text] Fifth Semester CS/BCA

o Wildlife Protection Act was formulated


 S P Godrej
o India’s greatest supporters of wildlife conservation and nature awareness programs
o Awarded the Padma Bhushan
 M s Swaminathan
o Founded MS Swaminathan Reaserch Foundation in Chennai,which work on the conservation
of biological diversity
 Madhav Gadgil
o Well known ecologist in India.
 MC Mehta
o Famous environmental lawyer.
o His famous battles supported by the Supreme Court include protecting Taj Mahal,cleaning up
Ganges River etc.
 Anil Agarwal
o Journalist who wrote the first report on the “State of India’s Enviornment”
o Founded Center for science and Enviornment
 Medha Patkar
o Supported the cause of downtrodden tribal people whose environment is being affected by
the dams on the Narmada river
 Sundarlal Bahuguna
o Chipko Movement
o Fight to prevent the construction of Tehri Dam

MODULE II

Impact of IT in E-Learnining

 Technology empowers students by giving them ownership of how they learn, making
education relevant to their digital lives and preparing them for their futures.
 With technology and access to resources beyond classroom walls, students are inspired to
become problem-solvers, critical thinkers, collaborators, and creators.
 Where technology has been successfully integrated into classrooms, students develop a
lifelong love of learning.
 Online education is flexible and affordable,students can attend their free time, they have a

9
IT & ENVIORNMENT
Department of CS [Type text] Fifth Semester CS/BCA

chance to interact with other students virtually


 Technology removed educational boundaries.
Advantages of Technology in education
 Technology unlocks educational boundaries
 Simplifies access to educational resources
 Motivates students
 Improves students writing and learning skills
 Makes subjects easy to learn
 Promotes individual learning
 Supports differentiated instructions
 Increases collaboration between teachers and students
 Prepare students for tomorrows technological jobs
 Increases students innovation and creativity
LEARNING MANAGEMENT SYSTEM

 Learning management system (LMS) is a software application or web-based technology used


to plan, implement and assess a specific learning process.
 It is used for eLearning practices and, in its most common form, consists of two elements: a
server that performs the base functionality and a user interface that is operated by instructors,
students and administrators.
 Typically, a learning management system provides an instructor with a way to create and
deliver content, monitor student participation and assess student performance.
 LMS may also provide students with the ability to use interactive features such as threaded
discussions, video conferencing and discussion forums.
Features of LMS
 Allows synchronous and asynchronous communication among students ,teachers and
guardians
 Automates teaching learning process
 Personalizes content and enables knowledge to reuse
 Offers the option of editing and saving materials
 Supports portability of content and ensures access from the furthest corner
MOODLE
General Features
 Modern, easy to use interface. ...
 Personalised Dashboard. ...

10
IT & ENVIORNMENT
Department of CS [Type text] Fifth Semester CS/BCA

 Collaborative tools and activities. ...


 All-in-one calendar. ...
 Convenient file management. ...
 Simple and intuitive text editor. ...
 Notifications. ...
 Track progress.
 Moodle is a free, online Learning Management system enabling educators to create their own
private website filled with dynamic courses that extend learning, any time, anywhere.
 Whether you're a teacher, student or administrator, Moodle can meet your needs. 

The Moodle based LMS is ideal for:


 Compliance training
 Online course development
 Competency-based training and management
 Onboarding training
 Workplace safety training
 Product and service launches
 Hiring, recruitment and interview process
EDMODO
 Edmodo is a cloud-based LMS that allows for collaborative learning through content sharing,
communication tools, and classroom management.
 It offers unlimited storage for content, which means administrators spend less time dealing
with paperwork. Edmodo gives instructors and training managers one place to store, assign,
schedule, and track, enabling them to efficiently run their digital classrooms
General features of Edmodo are:
 Facilitate learning goals.
 Create polls for students.
 Award badges to individual students.
 Assess student progress.
 Online classroom discussions.
 Personalization.
 Free admin account activation.
 Network that connects students, administrators, parents.
ACADEMIC SERVICES
Academic Services develops and provides technologies, learning spaces, classroom support
and services that enhance teaching, learning and research
INFLIBNET
 Information and Library Network (INFLIBNET) Centre, Gandhinagar is an Autonomous
Inter-University Centre (IUC) of University Grants Commission, New Delhi (Ministry of
Education, Govt. of India).
 It is a major National Programme initiated by the UGC in March 1991.
It provide following facilities
 Catalogue based service
 Database service

11
IT & ENVIORNMENT
Department of CS [Type text] Fifth Semester CS/BCA

 Document supply service


 Collection development
 Communication based service
 Referral services
 Email services
 Bulletin board services
 Audio and video services
 Conferencing services
NPTEL
 National Programme on Technology Enhanced Learning
 was initiated by seven Indian Institutes of Technology (Bombay, Delhi, Kanpur, Kharagpur,
Madras, Guwahati and Roorkee) along with the Indian Institute of Science, Bangalore in
2003.NPTEL is a good opportunity for who is willing to do course based on their
qualification.
 It is fully online course.
 Here Five core disciplines were identified, namely, civil engineering, computer science and
engineering, electrical engineering, electronics and communication engineering and
mechanical engineering and 235 courses in web/video format were developed in this phase.
 The main goal of NPTEL was to build on the engineering and core science courses launched
previously in NPTEL Phase I. An additional 600 web and video courses were created in all
major branches of engineering, physical sciences at the undergraduate and postgraduate
levels and management courses at the postgraduate level.
NICNET
 National Informatics Centre Network
 Satellite based network established in 1987 at Seshagiri
 Provide informatics services to state and Central Government departments
 Provide computing and two way data communication
Consists of 3 stations
 Master Earth Station
 Remote Micro Earth Station
 Geo Synchronous Satellite
Master Earth Station
 Located at CGO Complex,New Delhi
 It has 13 meter antenna, network control center, packet switch
Remote Micro Earth Station
 It has connectivity with remote to district computers with state computers and regional head
quarters

12
IT & ENVIORNMENT
Department of CS [Type text] Fifth Semester CS/BCA

 Supports X.25 switch with1200bps transmission speed and 19.2KBs receive speed
 Handles 300packets per second
 Host computers are connected with packet switch
 Connected with INTELSAT-V satellite
Advantages and Features of NICNET
 Internet Classroom Assistant ICA
 Conferencing
 Schedduling
 Document Sharing
 Personal Messaging
 Link Sharing
MODULE III
IT & SOCIETY
 Information Technology is the science and acivity of storing and sending out information by
using computers
 It is the technology used to store , manipulate , distribute or create information
 It is the application of computers and telecommunication equipment to store ,retrieve,
transmit and manipulate data such as networking , hardware ,software, the internet or the
people that work with these technologies
 Society is a community ,nation, or broad grouping of people having common
traditions,institutions and collective activities and interests.
 It is comprised of computers, networks ,mobile and wireless devices, satellite
communication, robotics,video text, cable television, electronic mail, electronic games and
automated offline equipment.
ADVANTAGES OF IT IN THE SOCIETY
 Globalization
 Cost effectiveness
 Lost of time
 The birth of new jobs
DISADVANTAGES OF IT IN THE SOCIETY
 Unemployment
 Privacy
 Insufficient of job security

13
IT & ENVIORNMENT
Department of CS [Type text] Fifth Semester CS/BCA

 Dominant culture

Digital Divide
 Digital divide is a term that refers to the gap between demographics and regions that
have access to modern information and communications technology, and those that don't
or have restricted access.
 This technology can include the telephone, television, personal computers and the
Internet.
 Digital divide typically exists between those in cities and those in rural areas; between
the educated and the uneducated; between socioeconomic groups; and, globally, between
the more and less industrially developed nations.
IT & DEVELOPMENT
New developments in IT:-
 Blockchain
o It is a growing list of records, called blocks which are linked using
cryptography.
o Its an open ,distributed ledger that can record transactions between two
parties efficiently and in a variable and permanent way
 The Internet of Things(IoT)
o The Internet of Things, or IoT, refers to the billions of physical devices
around the world that are now connected to the internet, all collecting and
sharing data.
 Healthcare
 Generative Adversarial Networks
o It’s a way of pitting two neural networks against each other in order to
train one of them to produce new things
 Human and Artificial Neural Networks
o An artificial neural network is an attempt to simulate the network of
neurons that make up a human brain so that the computer will be able to
learn things and make decisions in a humanlike manner
 Incremental Improvements
 Quatum Batteries
o A quantum battery is a theoretical construct that could charge faster than

14
IT & ENVIORNMENT
Department of CS [Type text] Fifth Semester CS/BCA

conventional chemistry. This future technology involves taking qubits to a


higher energy state, and lowering this state as a battery discharges
FREE SOFTWARE MOVEMENT
 The free software movement is a social movement with the goal of obtaining and
guaranteeing certain freedoms for software users, namely the freedom to run the
software, to study the software, to modify the software, to share possibly modified
copies of the software
 “Free software” means software that respects users' freedom and community. Roughly,
it means that the users have the freedom to run, copy, distribute, study, change and
improve the software. 
OPPERTUNITIES IN IT INFRASTRUCTURE

 IT Service Manager
 System Engineer
 Cloud virtualization engineer
 Linux Administrator
 Cloud Architect
OPPERTUNITIES IN IT DEVELOPMENT

 Data programmer
 Automation developer
 AI developer
 Cloud developer
OPPERTUNITIES IN IT SECURITY

 Security analyst
 Vulnerability assessor
 Business continuity or disaster recovery
OPPERTUNITIES IN THE SPHERE OF DATA

 Jobs in the fields of Analytics, Big Data jobs and Small Data jobs
 Project manager
IT INDUSTRY – THREATS
 a threat is a potential negative action or event facilitated by a vulnerability that results in an
unwanted impact to a computer system or application

15
IT & ENVIORNMENT
Department of CS [Type text] Fifth Semester CS/BCA

Following are some threats:-


 Technology with weak security
 Social media attacks
 Mobile malware
 Third party entry
 Neglecting proper configuration
 Outdated security software
 Social engineering
 Lack of encryption
 Corporate data on personal devices
 Inadequate security technology
Software Piracy
Software piracy is the illegal copying, distribution, or use of software. It is such a profitable
“business” that it has caught the attention of organized crime groups in a number of countries.
According to the Business Software Alliance (BSA), about 36% of all software in current
use is stolen.
Different types of software piracy :-
1.Couterfeiting
 Counterfeiting means producing fake copies of a software, making it look authentic.
 This involves providing the box, CDs, and manuals, all designed to look as much like the
original product as possible.
 Microsoft products are the ones most commonly counterfeited, because of their widespread
use.
 Most commonly, a copy of a CD is made with a CD-burner, and a photocopy of the manual is
made. Counterfeit software is sold on street corners, and sometimes unknowingly sold even
in retail stores.
 Counterfeit software is sold at prices far below the actual retail price
2.Client-server overuse
 Client-server overuse is when too many people on a network use one main copy of the
program at the same time. This often happens when businesses are on a local area network
and download the software for all employees to use.
3.Hard disk loading
 Hard disk loading is a type of commercial software piracy in which someone buys a legal
version of the software and then reproduces, copies or installs it onto computer hard disks.
The person then sells the product.
 This often happens at PC resale shops and buyers aren’t always aware that the additional
software they are buying is illegal.

16
IT & ENVIORNMENT
Department of CS [Type text] Fifth Semester CS/BCA

4.Online Piracy
 Online piracy, also known as Internet piracy, is when illegal software is sold, shared or
acquired by means of the Internet. This is usually done through a peer-to-peer (P2P) file-
sharing system, which is usually found in the form of online auction sites and blogs.
5.End Uder Piracy
 “End-user piracy occurs when an individual or organization reproduces and/or uses
unlicensed copies of software for its operations.” 
CYBER ETHICS
 Cyber ethics is the study of ethics pertaining to computers, covering user behavior and what
computers are programmed to do, and how this affects individuals and society. 
 Cyber ethics concerns to the code of responsible behavior on the Intern"cyber ethics" refers
to a set of moral rules or a code of behaviour applied to the online environment. As a
responsible netizen, you should observe these rules to help make cyberspace a safe place.
CYBER CRIME
 Cybercrime, or computer-oriented crime, is a crime that involves a computer and a network. 
 The computer may have been used in the commission of a crime, or it may be the target. 
 Cybercrime may threaten a person, company or a nation's security and financial health.
 Cyberwarfare refers to the use of digital attacks -- like computer viruses and hacking -- by
one country to disrupt the vital computer systems of another, with the aim of creating
damage, death and destruction
CYBER THREATS
A cyber or cyber security threat is a malicious act that seeks to damage data, steal data, or
disrupt digital life in general. Cyber attacks include threats like computer viruses, data
breaches, and Denial of Service (DoS) attacks
Different types of cyber threat :-
1.Malware
Malware is malicious software such as spyware, ransomware, viruses and worms. Malware is
activated when a user clicks on a malicious link or attachment, which leads to installing
dangerous software. Cisco reports that malware, once activated, can:
 Block access to key network components (ransomware)
 Install additional harmful software
 Covertly obtain information by transmitting data from the hard drive (spyware)
 Disrupt individual parts, making the system inoperable
2.Phishing

Phishing attacks use fake communication, such as an email, to trick the receiver into opening
it and carrying out the instructions inside, such as providing a credit card number. “The goal
is to steal sensitive data like credit card and login information or to install malware on the
victim’s machine,”
3. Man in the Middle
A man-in-the-middle (MITM) attack occurs when hackers insert themselves into a two-party
transaction. After interrupting the traffic, they can filter and steal data, according to Cisco.
MITM attacks often occur when a visitor uses an unsecured public Wi-Fi network. Attackers
insert themselves between the visitor and the network, and then use malware to install
software and use data maliciously
4. Denial of Service
A denial of service (DoS) is a type of cyber attack that floods a computer or network so it
can’t respond to requests. A distributed DoS (DDoS) does the same thing, but the attack
originates from a computer network. Cyber attackers often use a flood attack to disrupt the

17
IT & ENVIORNMENT
Department of CS [Type text] Fifth Semester CS/BCA

“handshake” process and carry out a DoS. Several other techniques may be used, and some
cyber attackers use the time that a network is disabled to launch other attacks.
5. RANSOMEWARE
Ransomware is malicious software that infects your computer and displays messages
demanding a fee to be paid in order for your system to work again. This class of malware is a
criminal moneymaking scheme that can be installed through deceptive links in an email
message, instant message or website.
6. TROJAN
A Trojan horse, or Trojan, is a type of malicious code or software that looks legitimate but
can take control of your computer. A Trojan is designed to damage, disrupt, steal, or in
general inflict some other harmful action on your data or network.
6.SPEAR PHISHING
Spear phishing is an email or electronic communications scam targeted towards a specific
individual, organization or business. Although often intended to steal data for malicious
purposes, cybercriminals may also intend to install malware on a targeted user’s computer.
7.ATTACK ON IoT DEVICES
These include hackers taking over the device to make it part of DDoS attack and unauthorized
access to data being collected by the device
8.DATA BREACHES
A data breach is a security incident in which information is accessed without authorization.
Data breaches can hurt businesses and consumers in a variety of ways. They are a costly
expense that can damage lives and reputations and take time to repair.
9.MALWARE on MOBILE APPS
Mobile malware, as its name suggests is malicious software that specifically targets the
operating systems on mobile phones
Elements of cyber security
 Network security
 Application security
 Endpoint security
 Data security
 Identity management
 Database and infrastructure security
 Cloud security
 Mobile security
 End user education
Cyber security is the practice of defending computers, servers, mobile devices, electronic

18
IT & ENVIORNMENT
Department of CS [Type text] Fifth Semester CS/BCA

systems, networks, and data from malicious attacks. It's also known as information


technology security or electronic information security.
Advantages of cyber laws
 From the perspective of e-commerce in India, the IT Act 2000 and its provisions contain
many positive aspects. Firstly, the implications of these provisions for the e-businesses would
be that email would now be a valid and legal form of communication in our country that can
be duly produced and approved in a court of law.
 Companies shall now be able to carry out electronic commerce using the legal infrastructure
provided by the Act.
 Digital signatures have been given legal validity and sanction in the Act.
 The Act throws open the doors for the entry of corporate companies in the business of being
Certifying Authorities for issuing Digital Signatures Certificates.
 The Act now allows Government to issue notification on the web thus heralding e-
governance.
 The Act enables the companies to file any form, application or any other document with any
office, authority, body or agency owned or controlled by the appropriate Government in
electronic form by means of such electronic form as may be prescribed by the appropriate
Government.
 The IT Act also addresses the important issues of security, which are so critical to the
success of electronic transactions. The Act has given a legal definition to the concept of
secure digital signatures that would be required to have been passed through a system of a
security procedure, as stipulated by the Government at a later date.
 Under the IT Act, 2000, it shall now be possible for corporates to have a statutory remedy in
case if anyone breaks into their computer systems or network and cause loss.
Cyber Addiction
Cyber addiction is the excessive, compulsive non-productive use of the Internet by an
individual desperately relying on it to occupy free time for recreation or social purposes. It is
often fueled by the overuse and lack of time regulation in online gaming and/or the use of
mobile apps and social media networks.
Information Overload
It is the difficulty in understanding an issue and effectively making decisions when one has
too much information about that issue, and is generally associated with the excessive quantity
of daily information.
 information overload is usually caused by the existence of multiple sources of information,
over-abundance of information, difficulty in managing information, irrelevance/unimportance
of the received information and scarcity of time on the part of information users to analyze
and understand
Causes of information overload:-
 Huge volume of new information being constantly created
 Pressure to create and compete in information provision

19
IT & ENVIORNMENT
Department of CS [Type text] Fifth Semester CS/BCA

 Simplicity of creating, duplicating, and sharing of information online


 Increase in channel to receive information by- radio,television,print media, website,
email, mobile telephony etc
Health Issues-Guidelines for proper usage of computers

1.Posture-related injuries from computer use

Back and neck pain, headaches, and shoulder and arm pain are common computer-related


injuries. Such muscle and joint problems can be caused or made worse by poor workstation
(desk) design, bad posture and sitting for long periods of time
Preventing computer-related muscle and joint injuries:-
 Sit at an adjustable desk specially designed for use with computers.
 Have the computer monitor (screen) either at eye level or slightly lower.
 Have your keyboard at a height that lets your elbows rest comfortably at your sides.
Your forearms should be roughly parallel with the floor and level with the keyboard.
 Adjust your chair so that your feet rest flat on the floor, or use a footstool.
 Use an ergonomic chair, specially designed to help your spine hold its natural curve
while sitting.
 Use an ergonomic keyboard so that your hands and wrists are in a more natural position.
 Take frequent short breaks and go for a walk, or do stretching exercises at your desk.
Stand often

2.Computer related overuse injuries of the hand or arm

Typically occurs in the elbow, wrist or hand of computer users. Symptoms of these overuse


injuries include pain, swelling, stiffness of the joints, weakness and numbness.
Preventing computer-related overuse injuries:-
Tips to avoid overuse injuries of the hand or arm include: Have your mouse at the same height
as your correctly positioned keyboard. Position the mouse as close as possible to the side of
the keyboard. Use your whole arm, not just your wrist, when using the mouse
3.Eyestrain from computer

Focusing your eyes at the same distance point for long periods of time causes fatigue

Preventing eyestrain from computer use:-

 Make sure your main source of light is not shining into your face
 Tilt the screen slightly to avoid reflections or glare
 Make sure the screen is not too close to your face

20
IT & ENVIORNMENT
Department of CS [Type text] Fifth Semester CS/BCA

 Reduce the brightness and contrast of your screen


 Put the screen either eyelevel or slightly lower
Guidelines for proper usage of mobile phones

Dos and Don’ts:-

 Do respect those who are with you


 Don’t yell
 Do be a good dining companion
 Don’t ignore universal quite zones such as theatre, church, library
 Do let voicemail do its job
 Don,t make wait staff wait
 Don,t text and drive
 Do keep arguments under wraps
 Don,t forget to filter your language
 Do respect the personal space of others
 Do exercise good international calling behaviour

IMPACT OF IT ON LANGUAGE
1. It adds a lot of “jargon” vocabulary - words like “byte” and “internet”.
2. It adds meaning to existing words that they didn’t have before - like “mouse” and
“keyboard” (think “piano”).
3. It tends to unify the speech of people around the world because we encounter far
more speech from people in remote places. For example, before we had all this
technology, in the UK a “billion” was “a million, million” - but now the US
meaning (“a thousand million”) has more or less taken over because it’s just too
confusing to continue to use the UK meaning.
4. It spreads linguistic “memes” far faster and much further than ever before. So
things like “the cloud” as a metaphor for a distant and nebulous group of computers
appeared from nowhere and was in universal use within maybe 6 months.
Positive and negative impacts of Technology
 Using ICT gadget We can also integrate the domestic equipments to
Daily routine Management: We can store and manage our daily schedule i We can also
integrate the domestic equipments to use and control
together. We can also use net banking, online payments and online trading for
purchasing daily needed items
It will save our time to go market and purchase things.
 Social Relationship: ICT provides the facility to make contacts and maintain
 With the use of Internet and communication channel, we can connect the people
via e-mail, social networking websites and cell phones. It saves time and works
inexpensive way. There are bulletin boards, discussion groups services are available

21
IT & ENVIORNMENT
Department of CS [Type text] Fifth Semester CS/BCA

to communicate with a large number of people at the same time.


 Information Sharing: Now information just right on our fingertips. We can access any
 Information, news, views, etc. can be shared by people all around the globe with
the use of e-mail, discussion groups on the Internet such as Google Groups, Yahoo!
Groups etc. By the sharing of information, it develops global awareness such as
cultures, religions, ideologies and lifestyles. These create an environment of
openness and increases mutual respect.
 Communication: We can communicate each other without boundaries. It becomes
 By the use of video conferencing technique, we can get feel to communicate with
someone face to face which is benefit for meeting or communicate together.
 Usage of Free time: ICT can be used to access as an entertainment. We can play games,

 Students can be part of these various learning and teaching from all over the world.
For
the impossible experiments, we can use simulations and virtual reality. If students
and
teachers logged at same time at the same pace mad the virtual classroom for e-
learning.
This is a smart investment four our children’s future.
 Self Employment: ICT gadgets are help out us to do our jobs easier. We can create our
 own business shops without the heavy overheads of place, purchase items and sales
in
market and make the advertising campaigns use of multimedia application. This
increased sales and encourage small buisness
Positive and Negative Impacts of ICT in our Everyday Life 7

 We can use net banking, online payments as the payment option.


 Paperless Environment: ICT mostly uses its gadgets to store and retrieve information
.
Negative Impacts of ICT
 Reduced face-to-face interaction: Now days, people mostly likes online communication
 Rather than real conversations so people tend to become more individualistic
and
introvert.
 Social Disconnect: Although the internet has reduced physical distances between people,
but that doesn’t means they brought all closer together and emotional distance is
 People always busy with their own virtual world and passing a day.
 They forget the real world with family and friends and they becoming a formality.
 Children too are spending more time in virtual world and they adopt wrong thoughts
thus
rising cyber crimes and extra marital affairs with the use of ICT gadgets.
 Reduced physical activity/Health Problems: Users may accept a more sitting lifestyle
 This can lead to health problems such as headache, fatness,
heart disease, diabetes, repetitive strain injury or eyestrain, wrong posture/position,
neck
pain, physical and mental stress, etc because of continuous use.
 Children gets stretch by the playing internet games, watching cartoon which may stop
them to go outside and they feel afraid to talk with other children. In this kind of
lifestyle there is lack of physical exercise, increases our health risk.

22
IT & ENVIORNMENT
Department of CS [Type text] Fifth Semester CS/BCA

 Cost: Many ICT gadgets are expensive. So they are cost effective to purchase and to
 Poor students cannot get the benefits of e-learning due to the educational
establishments.
 Job loss: Job losses may occur because of manual operations being replaced by

Positive and Negative Impacts of ICT in our Everyday Life 8

 Security/loss of privacy: Each ICT gadgets are integrated by specific technology and
 Use of social networking web site risk of personal data loss. When we use Net banking,
online payment then there is a risk of losing our money by fraud people. They can transfer
our money to their account.

MODULE IV
E – WASTE AND GREEN COMPUTING

E-Waste
E-waste is any electrical or electronic equipment that's been discarded. This includes
working and broken items that are thrown in the garbage or donated to a charity reseller like
Goodwill. Often, if the item goes unsold in the store, it will be thrown away.
Electronic scrap components, such as CPUs, contain poten in a way that reduces their
environmental impacttially harmful materials such as lead, cadmium, beryllium,
or brominated flame retardants.
Problems caused by E-Waste
Disposal of these electronic wastes meet air, and water components of the environment.
Effects on air
One of the most common effect of E-waste on az through air pollution. For example, a British
documentary about Lagos and its inhabitants, called Welcome to Laos. shows a number of
landfil: scavengers who go through numerous landfills in Lagos looking for improperly
disposed electronics which includes wires, blenders, etc., to make some income from the
recycling of these wastes. These men were shown to burn wires to get the copper (a very
valuable commodity) in them by open air burning which can release hydrocarbons into the air
Effects on Water
When electronics containing heavy metals such as lead, barium, mercury, lithium (found in
mobile phone and computer batteries), etc., are improperly disposed, these heavy metals
leach through the soil to reach groundwater channels Which eventually run to the surface as
streams or small ponds of water. Local communities often depend on these bodies of water
and the groundwater. Apart from these chemicals resulting in the death of some of the plants

23
IT & ENVIORNMENT
Department of CS [Type text] Fifth Semester CS/BCA

and animals that exist in the water, intake of the contaminated water by humans and land
animals results in lead poisoning
Effects on soil
In this way, toxic heavy metals and chemicals from e-ast& enter the "soil-crop--food
pathway," one of the most significant routes for heavy metals exposure to human.These are
not biodegradable.They persist in the environment for long periods of time,increasing the risk
of exposure.
E Waste Management in India
 About 95% of India’s e-waste is recycled in the informal sector
 2020 Tokyo Olympics medals will be made of 50,000 tons of e-waste
 Organizing committee will make all the medals from old smartphones, Laptops and
other gadgets
 By November 2018,organizers collect 47,488 tons of devices

Green Computing
Green computing is the environmentally responsible and eco-friendly use of computers and
their resources. In broader terms, it is also defined as the study of designing,
manufacturing/engineering, using and disposing of computing devices.
Examples include: Purchasing from Environmentally Committed Companies. Participating in
Electronic Recycling Programs. ... Limiting Printing and Recycling Paper.
 benefits of green computing for your business.
 Lower Energy Bills. ...
 Less Waste. ...
 Reduce Office Expense. ...
 Improve Workplace Productivity. ...
 Trickle Down Effect of Green IT. ...
 Save Money Across the Board. ...
 Tax Benefits.
Approches employed for green computing
 Green use: Minimizing the electricity consumption of computers and their peripheral
devices and using them in an eco-friendly manner.
 Green disposal: Repurposing existing equipment or appropriately disposing of, or
recycling, unwanted electronic equipment.
 Green Design: is known as designing energy-efficient computers, servers, printers,
projectors and other digital devices that are environmentally friendly. Green designed
products are able to be reclaimed, renewed, and reused. .
24
IT & ENVIORNMENT
Department of CS [Type text] Fifth Semester CS/BCA

 Green manufacturing :is the minimizing of waste during


the manufacturing of computers and other subsystems to reduce the environmental
impact of these activities.
Disposal techniques
. There are two sectors that handle e-waste disposal and they can be divided into Informal .
 Formal sector
The formal sector includes two facilities authorized to deconstruct electronics for the entire
country of India and are at capacity with five tons being disposed each day. These facilities
primarily receive electronic waste from the producers of "service centers or take-back
schemes" or companies that follow the environmental policies on disposing electronic
waste. The formal sector only follows procedure of dismantling and segregating parts. They
do not physically dispose of the electronic waste.

 Informal sector
The informal sector handles electronic waste by recycling or final disposal. There is a whole
economic market for electronic waste because the parts can be dismantled and the scrap
metals can be recycled. There are recycling techniques that are not following any type of
environmental or health standards. Some of the methods used are acid baths, burning cables,
and disposing in nature which can be detrimental to the health of those participating in these
disposal techniques.

MODULE V
HUMAN RIGHTS
Human Rights
Human rights are based on dignity, equality and mutual respect – regardless of your
nationality, your religion or your beliefs. Your rights are about being treated fairly and
treating others fairly, and having the ability to make choices about your own life.
Three Generations of Human righ
In the category of human rights, we can identify the rights from the first generation like:
the right to life, personal safety, the right to property and rights from the second
generation like: socio-economical rights or freedom rights (freedom of association) or from
the third generation (minorities' rights)
International Bill of Rights
The Universal Declaration of Human Rights, the international Covenant on Civil and
Political Rights,and the International Covenant on Economic, Social and Cultural Rights

25
IT & ENVIORNMENT
Department of CS [Type text] Fifth Semester CS/BCA

together with other international human rights instruments.


UDHR
Universal Declaration of Human Rights

The Universal Declaration of Human Rights (UDHR) is an international document adopted


by the United Nations General Assembly that enshrines the rights and freedoms of all human
beings. It was accepted by the General Assembly as Resolution 217 at its third session on 10
December 1948 at the Palais de Chaillot in Paris, France. Of the 58 members of the United
Nations at the time, 48 voted in favour, none against, eight abstained, and two did not vote.
Declaration consists of 30 articles detailing an individual's "basic rights and fundamental
freedoms
"UDHR commits nations to recognize all humans as being "born free and equal in dignity
and rights" regardless of "nationality, place of residence, gender, national or ethnic origin,
colour, religion, language, or any other status.
ICCPR
International Covenant on Civil and Political Rights
It is a multilateral treaty adopted by United Nations General Assembly Resolution 2200A
(XXI) on 16 December 1966, and in force from 23 March 1976 in accordance with Article 49
of the covenant. Article 49 allowed that the covenant would enter into force three months
after the date of the deposit of the thirty-fifth instrument of ratification or accession. The
covenant commits its parties to respect the civil and political rights of individuals, including
the right to life, freedom of religion, freedom of speech, freedom of assembly, electoral rights
and rights to due process and a fair trial
ICESCR
 It is a multilateral treaty adopted by the United Nations General Assembly on 16 December
1966 through GA. Resolution 2200A (XXI), and came in force from 3 January 1976. It
commits its parties to work toward the granting of economic, social, and cultural
rights (ESCR) to the Non-Self-Governing and Trust Territories and individuals,
including labour rights and the right to health, the right to education, and the right to an
adequate standard of living. As of July 2020, the Covenant has 171 parties.

Role of UN Secretariat

 Coordinate with the entire work of all the organs of the UN.
 Functions under a chief 212 Administrative Officer (Secretary General)
 Term of office of the Secretary General is 5 years

26
IT & ENVIORNMENT
Department of CS [Type text] Fifth Semester CS/BCA

 Secretary General is appointed by the General Assembly


 Secretariate provides for studies, information, and fascilities needed by United
Nations bodies for their meeting.
 Secretariate is the depository of all the legal instruments entered by the states
CERD

The Committee on the Elimination of Racial Discrimination (CERD) is the body that
monitors the implementation of the provisions of the International Convention on the
Elimination of All Forms of Racial Discrimination (ICERD) by its State parties

Fundamental Rights in Indian Constitution

(i)right to equality, (ii) right to freedom, (iii) right against exploitation, (iv) right to freedom


of religion, (v) cultural and educational rights, and (vi) right to constitutional remedies.

National HR Commission
 NHRC officials visit jails to inspect living conditions for inmates incarcerated for
treatment, reformation and protection
 NHRC can review and make recommendations in constitutional and legal safeguards
 NHRC serves as the basis of human rights literacy in India,initiating awareness of
rights through publications, media etc.
State HR Commission
 Intervene in any proceeding involving any allegation of violation of human rights before a court
with the approval of such court.
 Visit any jail or any other institution under the control of the State Government where persons
are detained to study the living conditions of the inmates and make recommendations thereon
 Undertake and promote research in the field of human rights.
 To inquire into any violation of human rights or negligence in the prevention of such violation
by a public servant, either suo moto or on a petition presented to it or on an order of a court.
Women’s Rights under Indian Constitution

 Article 21-
No person except according to procedure established by law shall be deprived of his
life or personal liberty
 Article 14-
Right to equality
 Article 19-

27
IT & ENVIORNMENT
Department of CS [Type text] Fifth Semester CS/BCA

Freedom of speech and expression, freedom of movement, freedom of practising trade


and profession
 Article 32-
Right to seek constitutional remedies through the Supreme Court for violation of
Fundamental Rights
 Right to equal pay-
Working women have the right to drawn an equal salary
 Right to dignity and decency-
Any medical examination procedure on her must be performed by or in the presence
of another woman if the accused is a woman
 Right against harassment-
Right to complaint against sexual hsrassment
 Right against domestic violence
This act is to protect a wife,a female live-in partner or a mother or a sister from
domestic violence
 Right to anonymity for sexual assault victims
 Right to free legal aid
 Right not to be arrested at night
 Right to register their complaint virtually
 Right against indecent representation
 Right against being stalked
 Provision of zero FIR
Human rights of children
Define child
The man whose age is 21 years and the woman whose age is below 18 is kept in the category
of child
 Child Labour Act ,1986
 Right to education
 Child Trafficking
 Protection of Children from Sexual Offences Act(POSCO) 2012
 Juvenile Justice Act 2015
 Right to life, non discrimination principle, right to dignity through the protection of
physical and mental integrity

28
IT & ENVIORNMENT
Department of CS [Type text] Fifth Semester CS/BCA

 Civil and Political rights such as right to identity, right to nationality


 Right to education, rights of refugee and disabled children
Minority Rights

Minority rights are the normal individual rights as applied to members of racial, ethnic, class,
religious, linguistic or gender and sexual minorities.

Rights of Prisoners

 Rights to food and water


 Right to have an attorney to defend himself
 Protection from torture, violence and racial harassment

Prepared by
Aneesa A Rahman

29
IT & ENVIORNMENT

You might also like