Download as pdf or txt
Download as pdf or txt
You are on page 1of 7

Information The study or use of systems (especially computers and telecommunications) for storing,

technology retrieving, and sending information.


CPU • Memory storage unit
• Control unit (CU): this part of CPU contains circuitry that uses electrical signals to direct the
entire computer system to carry out, or execute, stored program instructions. It does not
execute program instructions, rather, it directs other parts of the system to do so.
• Arthematic logic unit (ALU): it contains electronic circuit that performs two kind of
operations
o Arthematic operations: addition, subtraction, multiplication and division
o Logic operations: it compares equal, less or greater
Types of display • LCD (liquid crystal display), it consists of a thin layer of liquid crystal sand-witched between
two glass sheets with transparent electrodes deposited on their inside faces. With both glasses
transparent, the cell is known as transmitted type cell and when one glass is transparent and
other has a reflecting coating, the cell is called reflecting type.
o LCD does not have any illumination of its own. It depends entirely on illumination
falling on it from an external source for its visual effect.
o It has distinct advantage of having a low power consumption, low cost and good contrast.
o Drawback is additional requirement of light source, low reliability, poor visibility in low
ambient lighting, slow speed and need for an AC drive.
• Plasma TV: it consists of fluorescent light which cause the formation of image on screen,
each pixel has three composites fluorescent colour lights. These fluorescent lights are
illuminated and the different colours are formed by combining the composite colours. Plasma
display mostly make use of xenon and neon atoms.
o Plasma TV are very slim with high contrast ratios, less weight and better viewing angles.
However, energy consumption is more and the brightness is greatly diminished in poor
lighting conditions.
• Light Emitting Diode (LED): LEDs are types of LCD television that uses light emitting
diodes to back light thee display instead of traditional cold cathode fluorescent lights used in
standard LCD televisions.
o Edge-lit LED
o Dynamic RGB LED
o Full-array LED
o It has major advantage that it eliminated numerous black spots that were as a result of
using fluorescent lights. LEDs have best colour levels and contrast ratio with wider
viewable angles, low power consumptions, shock resistant and longer lasting, but more
expensive.
• OLED (organic light-emitting diode): it is based on organic compounds being used in the
electro-luminescent layer. These organic compounds have a special property of creating lights
when electricity is applied to it. The display is created by sandwiching organic thin films
between two conductors. Thus a bright light is created when electric current is passed to it.
o No backlight is produced by this device and the power consumption is also very less. The
contrast ratio is even higher with much faster refresh rate. They are expensive.
Computer
memory Secondary
Primary
memory

Magnetic
Cache Main
tape

Magnetic
RAM ROM
disc

Optical
SRAM DRAM PROM EPROM EEPROM
disc

Flash

Important • Cache memory is much faster than main memory, are very costly.
points about • RAM is a volatile memory, which means it loses its content as soon as the machine is turned
memory off.
• SRAM stores in flip-flops, doesn’t need to be refreshed.
• DRAM has capacitor and transistors, and need to be refreshed.
• ROM is non-volatile memory that is primarily built into the computer at the time of
production.
• PROM – programmable read only memory
• EPROM – Erasable programmable read only memory
• EEPROM – electrically erasable programmable read only memory, these are used to store a
computer system BIOS and can be updated without returning the unit to the factory.
Types of printer • Impact printer
o Dot matrix printer
o Daisy wheel printer
• Non-impact printer
o Inkjet printer
o Laser printer
Blu-ray These disks can hold more information than other optical media because of the blue laser the
drive uses, which has a shorter wavelength than the red laser used for CDs and DVDs, which
allows it to focus on a smaller area to cram significantly more data on to the disk.
Software • System software: it is a collection of programs designed to operate, control and extend the
processing capabilities of the computer. They serve as the interface between the hardware and
the end users. These software products comprise of programs written in low-level languages,
which interact with the hardware at a very basic level.
o Operating system and all utility program like compiler, interpreter, loader and debugger
are some examples of system software.
• Application software
o These are often called productivity programs or end user programs because they enable
user to complete task.
Bubble memory Bubble memory is a type of non-volatile computer memory that uses a thin film of a magnetic
material to hold small magnetized areas, known as bubbles or domains, each storing one bit of
data
Multiple access • FDMA (frequency division multiple access): non-overlapping frequency band is used. It
technique provides multiple access in analog transmission, where the radio frequency spectrum is
divided into several frequency bands separated by a certain guard band. Each frequency band
can be used simultaneously. It permits only one user per channel, thus when the FDMA
technique is employed, as long as the user is engaged in conversation, no other user can
access the same spectrum space.
• TDMA (time division multiple access): signal is transmitted in non-overlapping time slot, it
provides multiple access in digital transmission, it can accommodate more users in the same
spectrum space than FDMA, which improves use of spectrum.
• CDMA (code division multiple access): it is based on a spread spectrum system. All users
share the same frequency and the same time, but each user has own spreading code to encode
data. CDMA uses spread spectrum techniques to increase efficiency over FDMA and TDMA
system. It allows transmission to occupy the entire bandwidth at the same time without
interference. It assigns a unique code sequence to each user that is used to code data before
transmission.
• SDMA (Space division multiple access): it increases the capacity of the system and
transmission quality by focusing the signal into narrow transmission beams. Through the use
of smart antennas with the beams pointed at the direction of the mobile station, SDMA serves
different users within same region.
Mobile • 1G: FDMA was used, analog transmission technique for voice only, example Nordic Mobile
generations telephone. Sensitive to interference, noise, international roaming not possible.
• 2G: D-AMPS and GSM used. Phone conversations digitally encrypted. TDMA and CDMA
used. Data service was introduced.
• 2.5G: this standard includes
o HSCSD – high speed circuit switched data
o GPRS – general packet radio services
o EDGE – enhanced data rates for global evolution
o CDMA – code division multiple access
• 3G: it fulfils international mobile telecommunication IMT-2000 specifications. Two standard
of 3G technology that are popular
o Wide band CDMA is used by UMTS of Europe and parts of Asian countries for 3G
network.
o CDMA 2000
o Aims to provide guaranteed quality of service and security, provides higher bit rate
services, high quality videos, images and fast web access.
• 4G: it is a collection of 4th generation cellular data technologies whose standards must
conform to a set of specifications created by international telecommunication union (ITU). A
number of 4G technologies are in fact actually evolution of 3G technologies example.
o LTE (long term evolution) from 3GPP
o UBM (ultra-mobile broadband) from 3GPP2
o It is designed with goal of evolving the radio access technology with all service being
packet-switched, rather than circuit switched. LTE can operate in FDD (frequency
division duplex) and TDD (time division duplex).
• 5G: is next proposed generation with 1Gbps speed.
Satellite and • Low earth orbit (LEO) – Altitude (500-1500 km) Period (90min) Time in sight (15min) Ex
orbit (Iridium) Use (for surveying)
• Medium earth orbit (MEO) – Altitude (5000-10000 km) Period (5-12hr) Time in sight (2-4
hrs) Ex (GPS) Use (global communication)
• Geo-stationary earth orbit (GEO) – Altitude (36000 km) Period (24hr) Time in sight (always)
Ex (VSAT) Use (global communication, TV radio data transmission)
• Highly eccentric orbit (HEO) – Altitude (15000-30000 km) Period (<24hrs) Time in sight
(8hrs) Ex (Molnaya) Use (communication among polar countries)
Geosynchronous Geostationary satellite is a type of geosynchronous satellite.
satellite vs Geosynchronous satellite has time period of one sidereal day 23h 56min 4.09 sec. and radius
Geostationary 42,164 km, it is not properly aligned with the equator
GNSS Global navigation satellite system (it is a generic term for satellite navigation system that provides
3-dimensional positioning with global coverage). Mathematical process Trilateration is used to
calculate position. Examples
• USA – GPS: 24 satellites in 6 orbits
• Russian – GLONASS: 24 satellites in 3 orbits
• European – GALILEO: 24 satellites in 3 orbits (development stage)
• China – COMPASS: 35 satellites (5 geo stationary, 30 MEO, development stage)
Encryption Symmetric encryption uses a single key that needs to be shared among the people who need to
receive the message while asymmetrical encryption uses a pair of public key and a
private key to encrypt and decrypt messages when communicating.
E-Kranti Basing on the experience with NeGP and also on the forgoing analysis, it is proposed to suggest a
set of principles that can guide the design and implementation of the e-Kranti Program.
• Transformation and not translation
• Integrated service and not individual services
• Government process reengineering (GPR) to be mandatory in every MMP (mission mode
programme)
• Infrastructure on demand
• Cloud by default
• Mobile first
• Fast tracking approval
• Mandating standards and protocol
• Language localization
• National GIS
• Security and electronic data preservation.
Malicious In computing, a Trojan horse is a program downloaded and installed on a computer that appears
programme harmless, but is, in fact, malicious. Unexpected changes to computer settings and unusual activity,
even when the computer should be idle, are strong indications that a Trojan is residing on a
computer.
Worms: they can replicate themselves without user intervention
Virus: gets attached to any file and travel, but needs user to click on it.
Malwares • Saposhi, which is capable of taking over electronic devices and turning them into ‘bots’,
which can be then used for any purpose, including a Distributed Denial Of Service attack
• Mirai and Reaper are other examples.

Red Tapism- "Red tape is an idiom that refers to excessive regulation or rigid conformity to formal rules that
is considered redundant or bureaucratic and hinders or prevents action or decision-making. It is
usually applied to governments, corporations, and other large organizations.
One definition is the "collection or sequence of forms and procedures required to gain
bureaucratic approval for something, especially when oppressively complex and time-
consuming". Another definition is the "bureaucratic practice of hair splitting or foot dragging,
blamed by its practitioners on the system that forces them to follow prescribed procedures to the
letter".
Cloud Cloud Computing Services provide the new model of offering services (Platform as a Service
computing (PaaS), Infrastructure as a Service (IaaS), Software as a Services (SaaS) and Storage as a Service
(STaaS)) to the users at fast pace which is also cost effective. In order to utilise and harness the
benefits of Cloud Computing, Government of India has embarked upon an ambitious initiative -
"GI Cloud" which has been named as 'MeghRaj'. This initiative is to implement various
components including governance mechanism to ensure proliferation of Cloud in the government.
The focus of this initiative is to accelerate delivery of e-services in the country while optimizing
ICT spending of the Government.
MeghRaj will ensure optimum utilization of the infrastructure and speed up the development and
deployment of eGov applications. The architectural vision of GI Cloud encompasses a set of
discrete cloud computing environments spread across multiple locations, built on existing or new
(augmented) infrastructure, following a set of common protocols, guidelines and standards issued
by the Government of India.
o Advantages of GI Cloud
• Optimum utilization of existing infrastructure
• Rapid deployment and reusability: Any software made available by any government
of department in India can be made available to other departments as well without
additional costs.
• Manageability and maintainability: It provides single point for maintaining
Information & Communication Technology (ICT) infrastructure in India.
• Scalability: According to the demands from the citizens of India, infrastructure of the
government can be increased accordingly.
• Efficient service delivery
• Security: A security framework for the entire GI Cloud will lead to less
environmental complexity and less potential vulnerability.
• Increased user mobility
• Reduced effort in managing technology
• Ease of first time IT solution deployment
• Cost reduction
• Standardization: GI Cloud shall prescribe the standards around interoperability,
integration, security, data security and portability etc.

Open OGD platform India- data.gov.in – is a platform for supporting Open data initiative of
Government government of India. The portal is intended to be used by GoI Ministries their organizations to
Data publish datasets, documents, services, tools and application collected by them for public use. It
intends to increase transparency in the functioning of government and also open avenues for many
more innovative uses of governmental data to give different perspective.
National Data Sharing & Accessibility Policy (NSDAP)
Justice
Srikrishna
Report
Internet Internet Intelligence Map, providing users with a simple, graphical way to track the health of the
Intelligence internet and gain insight into the impact of events such as natural disasters or state-imposed
Map interruptions. The map is part of Oracle’s Internet Intelligence initiative, which provides insight
and analysis on the state of global internet infrastructure.
E-office The e-office product aims to support governance by ushering in more effective and transparent
inter and intra-government processes. The vision of e-Office is to achieve a simplified,
responsive, effective and transparent working of all government offices. The Open Architecture
on which e-office has been built, makes it a reusable framework and a standard reusable product
amenable to replication across the governments, at the central, state and district levels.
GeM The Ministry of Commerce & Industry has launched third version of the Government e-
Marketplace (GeM 3.0) . The earlier version GeM 2.0 was launched as pilot project in August
2016.
GeM 3.0 will offer standardised and enriched catalogue management, powerful search engine,
real time price comparison, template-based Bid and RA creation, demand aggregation, e-EMD, e-
PBG, user rating, advanced MIS and analytics and more.
GeM is an Online Market platform to facilitate procurement of goods and services by various
Ministries and agencies of the Government. It aims to enhance transparency, efficiency and speed
in public procurement of goods and services and eliminate corruption.

Digital initiatives
SHAGUN Ministry of Human Resource Development launched one of world’s largest Integrated Online
Junction for School Education ‘Shagun’. It is an over-arching initiative to improve school
education system by creating a junction for all online portals and websites relating to various
activities of the Department of School Education and Literacy in the Government of India and all
States and Union Territories.
Parivesh app Pro active and responsive facilitation by interactive virtuous and environmental single window
hub. Launched on world biofuel day.
Digital Payment Nasscom’s Data Security Council of India (DSCI) has collaborated with Union Ministry of
Abhiyan Electronics and IT (MeitY) and Google India to launch nationwide awareness campaign ‘Digital
Payment Abhiyan’. It was launched by Union Communications and Electronics & IT Minister
Ravi Shankar Prasad at Google-organised event ‘Google for India’ in New Delhi.
About Digital Payment Abhiyan
It aims at increasing awareness about cashless payment, educate end-users on the benefits of
making digital payments, online financial security and urge them to adopt security and safety best
practices.
It is pan-India campaign crafted in seven languages — Hindi, English, Tamil, Telugu, Kannada,
Bengali and Marathi.
GUI The user interface that allows users to interact with electronic devices through graphical icons and
visual indicators such as secondary notation, instead of text-based user interfaces, typed command
labels or text navigation is called as GUI or Graphical User Interface. The actions in a GUI are
usually performed through direct manipulation of the graphical elements. Beyond computers,
GUIs are used in many handheld mobile devices such as MP3 players, portable media players,
gaming devices, smartphones and smaller household, office and industrial controls. The modern
computers use GUI instead of CLI to perceived steep learning curve of command-line interfaces
(CLIs)

Test series Ø 5G will use highly directional beams


Ø Web 4.0 is also known as Symbiotic web.
Ø QR code consists pf black squares arranged in a square grid on a white background, which
can be read by an imaging device such as camera. BharatQR is person to merchant (P2M)
mobile payment solution.
Ø DNA digital data storage is to store it the process of encoding and decoding binary data to
and from synthesized strands of DNA. While DNA as a storage medium has enormous
potential because of its high storage density, its practical use is currently severely limited
because of its high cost and very slow read and write times.
Ø The "Cyber Swachhta Kendra" (Botnet Cleaning and Malware Analysis Centre) is a part of
the Government of India's Digital India initiative under the Ministry of Electronics and
Information Technology (MeitY) to create a secure cyber space by detecting botnet infections
in India and to notify, enable cleaning and securing systems of end users so as to prevent
further infections. This centre is being operated by the Indian Computer Emergency Response
Team (CERT-In).
Ø

You might also like