Information and Communication Technology Full Material
Information and Communication Technology Full Material
applications, and services that are used to produce, store, process, distribute,
• ICT includes both old and new tools. Old ICT tools mainly include radio, TV,
and telephone
• New ICT tools mainly include computers, satellite, wireless technology, and
the Internet.
• ICTs not only refer to the latest computer and the Internet-based technologies
but also refer simple audio–visual aids such as transparencies, slides, cassette
who can use the basic knowledge and skills acquired to assist them in their daily
lives.
• To equip learners with the appropriate social skills required to cooperate with
universities
STRENGTHS OF ICT
• Individualization of learning: Individualization of learning means that people
learn as
• Interactivity: Through interactivity feature, the learner can relate to the content
more effectively, go forward and backward in the content, and start at any point,
• Uniform quality: If content is well produced and is of good quality, the same
quality can be delivered to the rich and the poor, the urban and the rural
equally, and at the same low cost. This way of using ICTs can be a great
equalizer.
• More economical, higher speed of delivery and wider reach: With increase in
number of learners.
computer and the Internet-based can be useful in drills and practices; to help
diagnose and solve problems, for accessing information and knowledge
• High infrastructure and start-up costs: It costs money to build ICT systems and
to maintain them. The cost of hardware and software can be very high.
of scale: The higher the quantity, the lower will be the cost. To keep the cost
• Accessibility issue: Not everyone has equal access; therefore, not everyone
• ICT is basically a delivery system: A medium is different from the content; ICTs
are essentially meant only to deliver contents; they are not expected to major
FUNDEMENTALS OF COMPUTER:
computer.
of numbers.
EVOLUTION OF COMPUTER
• A computer is an electronic device used for storing and processing data and
• Word computer 1st used in a book named as “The Yong Man’s Gleanings” By
Richard Braithwaite.
computing after his invention and concept of the Analytical Engine in 1837.
ABACUS
• Earliest calculating device, also called a counting frame.
• Name Abacus was obtained from Greek word Abax means slab.
PASCALINE
• Developed by Blaise Pascal
numbers
TRANSISTORS
• In 1947, Transistors were introduced into the computers. With the
• In 1960, Mainframe computer was designed which used IC for the first time.
• In 1970, Memory chip with 1KB storage capacity was developed by Intel.
father of microcomputer).
GENERATION OF COMPUTER
Since its invention the computer technology has gone through regressive
upgradation process. Sometimes it even seems like the that this technological
advancement in the field of has not got any limits. The history of computer
development is been divided into five generations. Each one of the five generations
• They used vacuum tubes for circuitry and magnetic drums for memory,
• These computers were very expensive to operate and use huge amount of
electricity,
• Input was based on punched cards and paper tape, and output was
displayed on printouts
• The UNIVAC (First commercial computer 1951) and ENIAC computers are
➢ Advantages
• Vacuum tubes were the only electronic component available during those
days.
• Use Integrated circuit was the hallmark of the third generation of computers.
computers.
punched cards
• More reliable.
Now, thousands of integrated circuits were built onto a single silicon chip.
What in the first generation filled an entire room could now fit in the palm of
the hand.
• In 1981 IBM introduced its first computer for the home user, and in 1984
Internet.
• Fourth generation computers also saw the development of GUIs, the mouse
• Small in size
• They will able to use more than one CPU for faster processing speed
logic reasoning
ARTIFICIAL INTELLIGENCE (AI)
According to the father of Artificial Intelligence, John McCarthy, it is “The science and
humans think.
AI is accomplished by studying how human brain thinks, and how humans learn,
decide, and work while trying to solve a problem, and then using the outcomes of
their output process, their size, their capabilities and their storage capacity. The
• Analog Computers
• Digital Computers
• Hybrid Computers
• Super Computers
Analog computers
• Analog computers always take input in form of signals. Uses continuously
• The input data is not a number infect a physical quantity like temp.,
• Numbers 0,1
o Accuracy unlimited.
• Examples: Computer used for the purpose of business and education is also
Hybrid computer.
• The main examples are central national defense and passenger flight radar
system.
• They are also used to control robots. Combine best features of both Analog
& Digita
hospitals ,defense.
Super Computer
• Most Expensive
college.
• Supercomputers are used for the heavy stuff like weather maps,
Supercomputer
• This is normally too expensive and out of reach from a salary-based person.
colleges etc.
• Small in size.
form will depend on the processing machine. For example, when electronic
computers are used, the input data could be recorded on any one of
several types of input medium, such as magnetic disks, tapes and so on.
Device can send data to another device, but it cannot receive data from
useful form. For example, paychecks may be calculated from the time cards,
or a summary of sales for the month may be calculated from the sales
orders.
particular form of the output data depends on the use of the data. For
displays the results of that processing, can receive data from another
devices translate the information into the form understandable by the computer. Due
to ICT revolution, we are day by day encountering different variety of Input devices
around us. These new generation of input devices are being created with the sole
• Keyboard: The most common and very popular input device which helps
device having a small palm size box with a round ball at its base which
senses the movement of a mouse and sends corresponding signals to
detect the movement of a user's finger and use that information to direct
games.
mouse. This is a ball which is half inserted and by moving fingers on the
into a file format that may be used within the Personal Computer.
converts analog information into digital form. The user draws with a
paper. The drawing appears on the computer screen and can be saved,
edited, or printed.
into text.
• Digital Camera: Digital cameras are also an input device as they are
photographs and videos, they are more often used to live-stream videos
• Gamepad: The wired or wireless gaming remotes used for playing xbox,
and sliders, used for sending MIDI signals or commands over a USB or
• Pen Input: Pen input refers to the way Windows lets you interact directly
with a computer using a pen. A pen can be used for pointing and also for
ink.
They also allow live interaction with digital objects on the screen.
cards.
extracting intended data from marked fields, such as checkboxes and fill-
reads predefined positions and records where marks are made on the
form.
Output devices translate the computer's output into the form understandable by
users.
the main output device of a computer. It forms images from tiny dots,
the image depends upon the number of pixels. There are two kinds of
elements called pixels. The smaller the pixels, the better the image clarity,
or resolution
• Flat- Panel Display: The flat-panel display refers to a class of video
on paper.
using ribbon. These printers print a complete page at a time so they are
etc.
the same time. They are also used during meetings or classes for
presentations.
print-image output from the computer either online or via tape or disk
by us are also output device like a speaker, they difference is that they
• Video Card: These are hardware devices that work in conjunction with
the monitor to display visual output to the user. This hardware device
enhancing interaction.
• CD and DVD media: They standard output devices for a computer. The
time. CD and DVD are writable, users write information into a CD and
• Braille Reader: It helps blind people to read the text. The computer sent
the text to the device in the Braille format. That makes the text readable.
Both Input–Output Devices
• Touch Screen: A touch screen is a device which works as both an input
and an output device. You view the options available to you on the
screen (output) and you then use your finger to touch the option that
and dem for demodulation. And so, it does act like an input and output
computers. It takes the input from one and transmit it to the other as
output.
• Audio Cards / Sound Card: is an internal expansion card that provides
input and output of audio signals to and from a computer under control
of computer programs.
• Facsimile (FAX): It has scanner to scan the document and also have
INTERNET
protocol is TCP/IP.
USA. While first such inter-connected network was SPUTNIK by the Soviet
Union in the year 1957. ARPANET became the only official protocol after 1983.
• Any machine on the internet can communicate with other if it has following:
representation.
• Each host on the network has an IP consisting of a ‘Net id’ and a ‘Host-id’. T
o The ultimate authority of the internet rest with Internet Society (ISOC), a
The Internet Engineering Task Force (IETF) discuss the technical and operational
problem
crime
with each other through some medium, using hardware and software.
• Two computers are said to be connected, if they are able to exchange information
or able to communicate.
• Network is connected by the set of nodes via communication links where a node
can be any device capable of sending &/or receiving data to &/or from other
address.
ways
• Broadcast: One device sends message to all other devices on the network. The
network.
o LANs can be small, linking as few as three computers, but often link hundreds of
o A wide area network or WAN spans a large geographical area often a country.
o The Internet is a system of linked networks that are world wide in scope and
o Data transmission
o In Computer ,Telephone
Other Important Terms
1. MODEM
• Also called as a Modulator and Demodulator. It converts computer data into
computer.
2. HUB
• A hub is a place of convergence where data arrives from various directions
point for connecting the devices on a LAN. It can connect various cables like
than being a connection to help them pass information from one part to
o Transparent Bridges: these are the bridge in which the stations are
station and the frame specifies which route to follow. Route discovery
strength.
• A repeater mainly regenerates the signal over the same network before the
signal becomes too weak or corrupted so as to extend the length to which the
• Repeaters do not amplify the signal strength; it simply copies the signal bit by
bit.
5. SWITCHES
transmitting a received network packet only to the one or more devices for
• It operates at the Layer 2 i.e. Data Link layer of the TCP/IP model.
• Many ports are there in a switch that routes the traffic based on the various
routing protocols..
6. ROUTERS
• Routers are physical or virtual devices that determines the next network point
to which the data packet should be forwarded. They forward the data packets
as per their IP address. In OSI MODEL routers are found at the layer 3 i.e.
Network layer.
• A router forwards the packets seeing its destination IP address and matching
it with the IP address mentioned in the routing table with the router.
• It uses various protocols to forward the packets which gives the best possible
path also reduces the cost of the transmission. The various routing protocols
• We will understand the concept of memory first before going for further
Memory), ROM (Read-Only Memory), CD, DVD, HDD, and Flash Memory.
Operating systems, software use it, and hardware also utilizes to integrate the
circuits.
• There are two types of memory- Primary Memory and Secondary Memory. In
the following table, you can see the difference in both the memory devices:
Primary Memory
It is the memory that is accessed by the CPU (Central Processing Unit)
administrations that are incidentally put away in a particular memory area. Primary
memory is also known as primary storage or main memory. It is Volatile, and the
• ROM stands for Read Only Memory. The memory from which we can only
• A ROM stores such instructions that are required to start a computer. This
• ROM chips are not only used in the computer but also in other electronic
Let us now discuss the various types of ROMs and their characteristics.
There are mainly four types of ROM available:
• MROM (Masked ROM): The very first ROMs were hard-wired devices that
can be modified only once by a user. The user buys a blank PROM and enters
• EPROM (Erasable and Programmable Read Only Memory): The EPROM can be
data until the machine is working. As soon as the machine is switched off, data
is erased.
• Access time in RAM is independent of the address, that is, each storage
location inside the memory is as easy to reach as other locations and takes the
same amount of time. Data in the RAM can be accessed randomly but it is
very expensive.
• RAM is volatile, i.e. data stored in it is lost when we switch off the computer
• RAM is small, both in terms of its physical size and in the terms of storage
capacity.
Static Random Access Memory (SRAM)
• In the SRAM,data is stored in transistors and requires a constant power flow.
remember the data being stored. SRAM is called static as no change or action
fixed or removable. Hard Disk comes under the Fixed Storage Media, which is
an Internal Storage Medium and set inside the PC. It is versatile and can take
• Central Processing Unit (CPU) will not obtain the instant result to the
accessed data will be loaded first into the RAM (Random Access Memory).
Secondary Storage Media
Here, we are providing complete detail information, which comes under the
The devices that come under the magnetic storage media are- Hard Disks, Floppy
Disks, and Magnetic Tapes. There are the devices that are coated with the magnetic
layer, magnetized in anti-clockwise, and clockwise directions. The head reads the
move or rotate.
Floppy Disk- It is flexibly coated by the magnet, which is packaged inside the
protective plastic envelope. It is the oldest device with a memory of 1.44 MB now,
and there is no use of the Floppy Disk because of the less memory.
Hard Disk- It is consists of more than one circular device coated with magnetic
material, which is known as Platters. The inner surfaced of the Disk can store the data
except for the bottom and the top. The data will record by rotating magnetic reads/
placed around the spindle in a sealed chamber. The chamber has the motors
4. The internal hard drives are not very much portable comparatively from the
external one.
pattern of pits and ridges signifying binary 0 and 1. These are not magnet coated
devices like a floppy disk and hard disk. In these devices, the information is stored
and write data. It is a circular disk. It is a portable device as we can eject the drive and
remove it from the PC and carry it with us. The difference in the type of CDs
mentioned below-
CD-ROM
• In this Disk, once the data are written in the disk, it cannot be changed.
• These are usually used for text, audio, and video for games, encyclopedia, and
application software.
CD-R
CD-RW
• The formation of the DVD is circular like the Compact Device and has similar
• In DVD, we can hold 4.7 GB to 17 GB of data, which is 15 times more from the
storage of CD. Usually, it is used to store rich multimedia portfolios that need
• It is used to store the High Definition (HD) videos or other multimedia files.
• Blue Ray Disk can store up to 128 GB data max, 27 GB data on a single layer
a reel of tape, magnet coating, or spinning disks, etc. The Solid-State Storages
devices use a special kind of memory to store data called Flash Memory.
Examples of Flash Memory Devices are- Digital Cameras, Pen Drives, or USB
Flash Drives.
Pen Drives
• Pendrives are also known as Thumb Drives or Flash Drives, which are added as
• The memory in the Pen drive accompanied by the USB connector, which
enables it to connect with any device which has the USB portal.
• It has a capacity greater than the CD but smaller than the Hard Disk.
Advantages of Pen drive
1. Transfer File- When the Pen drive will connect to any of the USB port either in
the computer or any other device, we can use it to transfer the files, pictures,
documents, videos. Also, the selected data can be transferred between any
2. Portability- Pen drive is lightweight and portable to carry, which makes data
4. Data Transportation- The advantage of transferring the data is more useful for
video/audio lectures, etc. on a Pen drive and gain access to them from
anywhere. The technicians who have the independent PC’s can store their
pen drive. The data can quickly move from one site to another with all their
and synchronizing with high-speed CPU. Cache memory is costlier than main
memory or disk memory but economical than CPU registers. Cache memory is
an extremely fast memory type that acts as a buffer between RAM and the
CPU. It holds frequently requested data and instructions so that they are
• Cache memory is used to reduce the average time to access data from the
Main memory. The cache is a smaller and faster memory which stores copies
of the data from frequently used main memory locations. There are various
It is a type of memory in which data is stored and accepted that are immediately
It is the fastest memory which has faster access time where data is temporarily stored
It is memory on which computer works currently. It is small in size and once power is
It is external memory which is not as fast as main memory but data stays
or more parts, separated by dots. The part on the left is the most specific, the part on
.org- Organisation
.net -Network
.com- Commercial
.edu- Education
.gov -Government
.mil- Military
2. Computer Memory:
Blue ray disk : Blu-ray (not Blue-ray) also known as Blu-ray Disc (BD), is the name of a
new optical disc format which is jointly developed by the Blu-ray Disc Association
(BDA), The format offers more than 5 times the storage capacity of older DVDs and
can hold up to 25GB on a single-layer disc & 50GB on a dual layer disc.
3. Software terms:
research centre)
• VR - Virtual reality
4. COMPUTER SOFTWARE
is also called as buffer. With respect to streaming audio or video from the
operations.
5. NETWORK TERMINOLOGIES
• TCP: TCP (Transmission Control Protocol) is a standard that defines how to
can exchange data. TCP works with the Internet Protocol (IP), which defines
four parts separated by the dots, e.g. 202.54.1.1 is an IP number of one of the
• MAC Address: This is the address of the device on physical layer, called as
media access control. It is usually stored on the network adapter card and is
unique.
• VoIP: A Voice over IP call, or VoIP call, utilizes packet-switched Voice over
collection of servers. These computers enable the visiting users to have access
• NIC: Network Interface card, also known as an Ethernet card and network
network such as a home network or the Internet using an Ethernet cable with
a RJ-45 connector.
the gateway server which separates a local network from outside networks.
ports. Firewalls are a great step for helping prevent un-authorized access to a
• Network Switch: Network Switch is a small hardware device that joins multiple
or optical signals. With physical media like Ethernet, data transmissions can
only span a limited distance before the quality of the signal degrades.
Repeaters attempt to preserve signal integrity and extend the distance over
• Meta Search Engines: They automatically enters search queries into a number
execute a fund transfer, swindling Union Bank of India of $171 million, Prompt action
The global ransomware attack took its toll in India with several thousand computers
getting locked down by ransom-seeking hackers. The attack also impacted systems
belonging to the Andhra Pradesh police and state utilities of West Bengal
The food tech company discovered that data, including names, email IDs and hashed
company must acknowledge its security vulnerabilities-and put up for sale on the
Dark Web
PETYA RANSOMWARE(June 2017)
The ransomware attack made its impact felt across the world, including India, where
theft.
vulnerability, typically when a user clicks a dangerous link or email attachment that
then installs risky software. Once inside the system, malware can do the following:
(spyware)
from a reputable source, usually through email. The goal is to steal sensitive data like
credit card and login information or to install malware on the victim’s machine.
attackers insert themselves into a two-party transaction. Once the attackers interrupt
the traffic, they can filter and steal data. Two common points of entry for MitM
attacks:
device and the network. Without knowing, the visitor passes all information
requests. Attackers can also use multiple compromised devices to launch this attack.
malicious code into a server that uses SQL and forces the server to reveal information
An attacker could carry out a SQL injection simply by submitting malicious code into
A zero-day exploit hits after a network vulnerability is announced but before a patch
window of time. Zero- day vulnerability threat detection requires constant awareness.
7. DNS Tunneling
DNS tunneling utilizes the DNS protocol to communicate non-DNS traffic over port
53. It sends HTTP and other protocol traffic over DNS. There are various, legitimate
reasons to utilize DNS tunneling. However, there are also malicious reasons to use
DNS Tunneling VPN services. They can be used to disguise outbound traffic as DNS,
concealing data that is typically shared through an internet connection. For malicious
use, DNS requests are manipulated to exfiltrate data from a compromised system to
the attacker’s infrastructure. It can also be used for command and control callbacks
unauthorised usage of removable USB storage media devices like pen drives,
preapproved set of executable files for execution and protects desktops from
• M-Kavach, a device for security of Android mobile devices has also been
personal data & credentials, misuse Wi-Fi and Bluetooth resources, lost or
and defends malicious HTML & JavaScript attacks made through the web
browser based on Heuristics. It alerts the user when he visits malicious web
pages and provides a detailed analysis threat report of the web page.
DIGITAL INITIATIVES IN HIGHER EDUCATION
ICT AND GOVERNANCE
Important Abbreviations in ICT
1. Al – Artificial intelligence
44. Gb – Gigabit
45. GB – Gigabyte
57. Kb – Kilobit
58. KB – Kilobyte
66. Mb – Megabit
67. MB – Megabyte