Professional Documents
Culture Documents
Information Technology CPU
Information Technology CPU
Magnetic
Cache Main
tape
Magnetic
RAM ROM
disc
Optical
SRAM DRAM PROM EPROM EEPROM
disc
Flash
Important • Cache memory is much faster than main memory, are very costly.
points about • RAM is a volatile memory, which means it loses its content as soon as the machine is turned
memory off.
• SRAM stores in flip-flops, doesn’t need to be refreshed.
• DRAM has capacitor and transistors, and need to be refreshed.
• ROM is non-volatile memory that is primarily built into the computer at the time of
production.
• PROM – programmable read only memory
• EPROM – Erasable programmable read only memory
• EEPROM – electrically erasable programmable read only memory, these are used to store a
computer system BIOS and can be updated without returning the unit to the factory.
Types of printer • Impact printer
o Dot matrix printer
o Daisy wheel printer
• Non-impact printer
o Inkjet printer
o Laser printer
Blu-ray These disks can hold more information than other optical media because of the blue laser the
drive uses, which has a shorter wavelength than the red laser used for CDs and DVDs, which
allows it to focus on a smaller area to cram significantly more data on to the disk.
Software • System software: it is a collection of programs designed to operate, control and extend the
processing capabilities of the computer. They serve as the interface between the hardware and
the end users. These software products comprise of programs written in low-level languages,
which interact with the hardware at a very basic level.
o Operating system and all utility program like compiler, interpreter, loader and debugger
are some examples of system software.
• Application software
o These are often called productivity programs or end user programs because they enable
user to complete task.
Bubble memory Bubble memory is a type of non-volatile computer memory that uses a thin film of a magnetic
material to hold small magnetized areas, known as bubbles or domains, each storing one bit of
data
Multiple access • FDMA (frequency division multiple access): non-overlapping frequency band is used. It
technique provides multiple access in analog transmission, where the radio frequency spectrum is
divided into several frequency bands separated by a certain guard band. Each frequency band
can be used simultaneously. It permits only one user per channel, thus when the FDMA
technique is employed, as long as the user is engaged in conversation, no other user can
access the same spectrum space.
• TDMA (time division multiple access): signal is transmitted in non-overlapping time slot, it
provides multiple access in digital transmission, it can accommodate more users in the same
spectrum space than FDMA, which improves use of spectrum.
• CDMA (code division multiple access): it is based on a spread spectrum system. All users
share the same frequency and the same time, but each user has own spreading code to encode
data. CDMA uses spread spectrum techniques to increase efficiency over FDMA and TDMA
system. It allows transmission to occupy the entire bandwidth at the same time without
interference. It assigns a unique code sequence to each user that is used to code data before
transmission.
• SDMA (Space division multiple access): it increases the capacity of the system and
transmission quality by focusing the signal into narrow transmission beams. Through the use
of smart antennas with the beams pointed at the direction of the mobile station, SDMA serves
different users within same region.
Mobile • 1G: FDMA was used, analog transmission technique for voice only, example Nordic Mobile
generations telephone. Sensitive to interference, noise, international roaming not possible.
• 2G: D-AMPS and GSM used. Phone conversations digitally encrypted. TDMA and CDMA
used. Data service was introduced.
• 2.5G: this standard includes
o HSCSD – high speed circuit switched data
o GPRS – general packet radio services
o EDGE – enhanced data rates for global evolution
o CDMA – code division multiple access
• 3G: it fulfils international mobile telecommunication IMT-2000 specifications. Two standard
of 3G technology that are popular
o Wide band CDMA is used by UMTS of Europe and parts of Asian countries for 3G
network.
o CDMA 2000
o Aims to provide guaranteed quality of service and security, provides higher bit rate
services, high quality videos, images and fast web access.
• 4G: it is a collection of 4th generation cellular data technologies whose standards must
conform to a set of specifications created by international telecommunication union (ITU). A
number of 4G technologies are in fact actually evolution of 3G technologies example.
o LTE (long term evolution) from 3GPP
o UBM (ultra-mobile broadband) from 3GPP2
o It is designed with goal of evolving the radio access technology with all service being
packet-switched, rather than circuit switched. LTE can operate in FDD (frequency
division duplex) and TDD (time division duplex).
• 5G: is next proposed generation with 1Gbps speed.
Satellite and • Low earth orbit (LEO) – Altitude (500-1500 km) Period (90min) Time in sight (15min) Ex
orbit (Iridium) Use (for surveying)
• Medium earth orbit (MEO) – Altitude (5000-10000 km) Period (5-12hr) Time in sight (2-4
hrs) Ex (GPS) Use (global communication)
• Geo-stationary earth orbit (GEO) – Altitude (36000 km) Period (24hr) Time in sight (always)
Ex (VSAT) Use (global communication, TV radio data transmission)
• Highly eccentric orbit (HEO) – Altitude (15000-30000 km) Period (<24hrs) Time in sight
(8hrs) Ex (Molnaya) Use (communication among polar countries)
Geosynchronous Geostationary satellite is a type of geosynchronous satellite.
satellite vs Geosynchronous satellite has time period of one sidereal day 23h 56min 4.09 sec. and radius
Geostationary 42,164 km, it is not properly aligned with the equator
GNSS Global navigation satellite system (it is a generic term for satellite navigation system that provides
3-dimensional positioning with global coverage). Mathematical process Trilateration is used to
calculate position. Examples
• USA – GPS: 24 satellites in 6 orbits
• Russian – GLONASS: 24 satellites in 3 orbits
• European – GALILEO: 24 satellites in 3 orbits (development stage)
• China – COMPASS: 35 satellites (5 geo stationary, 30 MEO, development stage)
Encryption Symmetric encryption uses a single key that needs to be shared among the people who need to
receive the message while asymmetrical encryption uses a pair of public key and a
private key to encrypt and decrypt messages when communicating.
E-Kranti Basing on the experience with NeGP and also on the forgoing analysis, it is proposed to suggest a
set of principles that can guide the design and implementation of the e-Kranti Program.
• Transformation and not translation
• Integrated service and not individual services
• Government process reengineering (GPR) to be mandatory in every MMP (mission mode
programme)
• Infrastructure on demand
• Cloud by default
• Mobile first
• Fast tracking approval
• Mandating standards and protocol
• Language localization
• National GIS
• Security and electronic data preservation.
Malicious In computing, a Trojan horse is a program downloaded and installed on a computer that appears
programme harmless, but is, in fact, malicious. Unexpected changes to computer settings and unusual activity,
even when the computer should be idle, are strong indications that a Trojan is residing on a
computer.
Worms: they can replicate themselves without user intervention
Virus: gets attached to any file and travel, but needs user to click on it.
Malwares • Saposhi, which is capable of taking over electronic devices and turning them into ‘bots’,
which can be then used for any purpose, including a Distributed Denial Of Service attack
• Mirai and Reaper are other examples.
Red Tapism- "Red tape is an idiom that refers to excessive regulation or rigid conformity to formal rules that
is considered redundant or bureaucratic and hinders or prevents action or decision-making. It is
usually applied to governments, corporations, and other large organizations.
One definition is the "collection or sequence of forms and procedures required to gain
bureaucratic approval for something, especially when oppressively complex and time-
consuming". Another definition is the "bureaucratic practice of hair splitting or foot dragging,
blamed by its practitioners on the system that forces them to follow prescribed procedures to the
letter".
Cloud Cloud Computing Services provide the new model of offering services (Platform as a Service
computing (PaaS), Infrastructure as a Service (IaaS), Software as a Services (SaaS) and Storage as a Service
(STaaS)) to the users at fast pace which is also cost effective. In order to utilise and harness the
benefits of Cloud Computing, Government of India has embarked upon an ambitious initiative -
"GI Cloud" which has been named as 'MeghRaj'. This initiative is to implement various
components including governance mechanism to ensure proliferation of Cloud in the government.
The focus of this initiative is to accelerate delivery of e-services in the country while optimizing
ICT spending of the Government.
MeghRaj will ensure optimum utilization of the infrastructure and speed up the development and
deployment of eGov applications. The architectural vision of GI Cloud encompasses a set of
discrete cloud computing environments spread across multiple locations, built on existing or new
(augmented) infrastructure, following a set of common protocols, guidelines and standards issued
by the Government of India.
o Advantages of GI Cloud
• Optimum utilization of existing infrastructure
• Rapid deployment and reusability: Any software made available by any government
of department in India can be made available to other departments as well without
additional costs.
• Manageability and maintainability: It provides single point for maintaining
Information & Communication Technology (ICT) infrastructure in India.
• Scalability: According to the demands from the citizens of India, infrastructure of the
government can be increased accordingly.
• Efficient service delivery
• Security: A security framework for the entire GI Cloud will lead to less
environmental complexity and less potential vulnerability.
• Increased user mobility
• Reduced effort in managing technology
• Ease of first time IT solution deployment
• Cost reduction
• Standardization: GI Cloud shall prescribe the standards around interoperability,
integration, security, data security and portability etc.
Open OGD platform India- data.gov.in – is a platform for supporting Open data initiative of
Government government of India. The portal is intended to be used by GoI Ministries their organizations to
Data publish datasets, documents, services, tools and application collected by them for public use. It
intends to increase transparency in the functioning of government and also open avenues for many
more innovative uses of governmental data to give different perspective.
National Data Sharing & Accessibility Policy (NSDAP)
Justice
Srikrishna
Report
Internet Internet Intelligence Map, providing users with a simple, graphical way to track the health of the
Intelligence internet and gain insight into the impact of events such as natural disasters or state-imposed
Map interruptions. The map is part of Oracle’s Internet Intelligence initiative, which provides insight
and analysis on the state of global internet infrastructure.
E-office The e-office product aims to support governance by ushering in more effective and transparent
inter and intra-government processes. The vision of e-Office is to achieve a simplified,
responsive, effective and transparent working of all government offices. The Open Architecture
on which e-office has been built, makes it a reusable framework and a standard reusable product
amenable to replication across the governments, at the central, state and district levels.
GeM The Ministry of Commerce & Industry has launched third version of the Government e-
Marketplace (GeM 3.0) . The earlier version GeM 2.0 was launched as pilot project in August
2016.
GeM 3.0 will offer standardised and enriched catalogue management, powerful search engine,
real time price comparison, template-based Bid and RA creation, demand aggregation, e-EMD, e-
PBG, user rating, advanced MIS and analytics and more.
GeM is an Online Market platform to facilitate procurement of goods and services by various
Ministries and agencies of the Government. It aims to enhance transparency, efficiency and speed
in public procurement of goods and services and eliminate corruption.
Digital initiatives
SHAGUN Ministry of Human Resource Development launched one of world’s largest Integrated Online
Junction for School Education ‘Shagun’. It is an over-arching initiative to improve school
education system by creating a junction for all online portals and websites relating to various
activities of the Department of School Education and Literacy in the Government of India and all
States and Union Territories.
Parivesh app Pro active and responsive facilitation by interactive virtuous and environmental single window
hub. Launched on world biofuel day.
Digital Payment Nasscom’s Data Security Council of India (DSCI) has collaborated with Union Ministry of
Abhiyan Electronics and IT (MeitY) and Google India to launch nationwide awareness campaign ‘Digital
Payment Abhiyan’. It was launched by Union Communications and Electronics & IT Minister
Ravi Shankar Prasad at Google-organised event ‘Google for India’ in New Delhi.
About Digital Payment Abhiyan
It aims at increasing awareness about cashless payment, educate end-users on the benefits of
making digital payments, online financial security and urge them to adopt security and safety best
practices.
It is pan-India campaign crafted in seven languages — Hindi, English, Tamil, Telugu, Kannada,
Bengali and Marathi.
GUI The user interface that allows users to interact with electronic devices through graphical icons and
visual indicators such as secondary notation, instead of text-based user interfaces, typed command
labels or text navigation is called as GUI or Graphical User Interface. The actions in a GUI are
usually performed through direct manipulation of the graphical elements. Beyond computers,
GUIs are used in many handheld mobile devices such as MP3 players, portable media players,
gaming devices, smartphones and smaller household, office and industrial controls. The modern
computers use GUI instead of CLI to perceived steep learning curve of command-line interfaces
(CLIs)