Professional Documents
Culture Documents
Science and Technology
Science and Technology
BIOTECHNOLOGY
DNA
o Code of life, holds the complete instruction set for building life, are the building
blocks of genetic material
o Code is present in the nucleus of every cell of every living organism (with few
exceptions like RBC, neuron etc). It is read by a host of machineries in the cell to
build proteins which are the building blocks of life. Proteins constitutes 55% of
the dry mass of cell
o Each nucleotide has 3 parts-
A nitrogen base
A phosphate group
Sugar molecule
o Double helix
o Sugar-phosphate backbone.
o Nitrogen bases constitute the real code of life
o Human DNA is a double-stranded structure (there are single-stranded DNA also).
o Base pair: 4 types of bases namely adenosine, guanine, cytosine and thymine.
The bases join one another depending on their shapes. A - T and G - C.
o In nature only 4 lettered-DNA is found, scientists have recently created a
synthetic DNA with 8 letters.
o Mitochondrial DNA: DNA is also present in the mitochondria, other than the
nucleus. This we inherit only from our mothers
CHROMOSOMES
o DNA have arranged themselves as linear strands each of which is called a
chromosome.
o There are 2 sets 23 different chromosomes in human DNA (one set of 23
inherited from each parent). Total there are 46 chromosomes in the nucleus of
every cell of our body.
o Imprinting: Each chromosome holds the memory of which parent it is inherited
from through a process called imprinting.
GENOME
o The complete set of all DNA material or genetic material is called the genome of
that organism.
RNA
o It reads and act on the information.
o It copies the instruction and carry it to other parts of the cells to make proteins.
o Only difference in RNA (vs DNA) is an extra OH group which makes it unstable.
Thus, DNA is more permanent, RNA is not permanent.
2
CENTRAL DOGMA
o It explains how genetic information flows from DNA to proteins. DNA
transcription in nucleus mRNA goes outside nucleus to ribosome tRNA
translates i.e. translation in cytoplasm (3 base letters in mRNA = 1 codon = 1
amino acid) primary structure of protein 3D structure of protein
GENES
o Human Genome Project showed- only 1.5% of the total genome in humans was
coding for proteins which are called as genes.
o 98% of the genome is non-coding regions (‘dark area’ or ‘Junk DNA’). But, they
play a huge role in gene expression.
o Epigenetics deals with the processes that control how the genes are expressed.
Different genes are expressed in different cells that perform different function that
look differently. All this relates to gene regulation.
o 25% of all the non-coding part occur in between genes.
o The non-coding part between gene is called introns and the coding part that
mRNA is interested in are called exons.
o mRNA copies only exons and cut out all the introns called RNA splicing.
o The final mRNA after splicing of introns and joining of exons is called exome
(which represents only 1.5% of the genome).
MEIOSIS
o When germline cells are produced in the body of parents, the 2 sets of
chromosomes come together, cross-over and mix up randomly in process called
meiosis.
o This cross over and recombination happening across all chromosomes.
o This is what gives genetic variation to sex cells (gametes) and hence to offspring.
o This genetic variation is what gives diversity to a species which is very important
to adapt to the environment and evolution.
o When gametes come together to form a zygote during fertilization genetic
diversity of both gametes are carried.
3
MITOSIS
o Process of cell division, drives growth of organisms.
o The first step of cell division is DNA replication where a copy of DNA is made.
This happens through 2-step process of unwinding and rebuilding.
o Double stranded DNA first unzips like a zip into single strands done by enzyme
helicase.
o Another enzyme DNA Polymerase synthesize each of the single strand into 2
double stranded DNA.
o In the process mistakes are made and thus we also have an inbuilt proof-reading
mechanism.
DIFFERENTIATION
o One way of classifying cells is based on their ability to differentiate. Broadly cells
are of two types, differentiated and undifferentiated.
o Differentiated cells are the building blocks of tissues and organs. They are
specialized cells that can only divide. They cannot differentiate. They are also
called somatic cells or simply adult cells. Eg: Hair cell, nail cell etc.
o Undifferentiated cells are cells that have the ability differentiate into many
different types of cells. They are classified into two types, namely embryonic
stem cells and adult stem cells.
STEM CELLS
o Undifferentiated cells are also called stem cells.
o Stem cells are classified into various types based on their potency to
differentiate.
►PLURIPOTENT STEM CELLS OR EMBRYONIC STEM CELLS
o These are stem cells that are potent enough to differentiate into all types of cells.
o They can produce a clone of an entire organism.
o Such cells are found in the embryo stage of human development. (inner mass
cells)
o Thus, they are also called embryonic stem cells.
►MULTIPOTENT STEM CELLS OR ADULT STEM CELLS
o Such cells have the potential to all types of cells associated with a particular
organ or a tissue.
o They help in repair, renew and maintenance of tissues or organs in an adult
body. Thus, they are called adult stem cells.
o Eg: Intestinal stem cells (renew every 45 days), cells in bone marrow etc.
►INDUCED-PLURIPOTENT STEM CELLS: IPS CELLS
o Reprograming adult cells to become pluripotent was awarded Nobel prize in
2012.
o Take any differentiated cell/somatic cell/adult cell (not adult stem cell) and induce
the 4 transcription factors, it can reverse itself into an embryonic stem cell.
4
1. Autologous: Cells from one’s own body (including stem cell therapy, iPS cells etc)
2. Allogenic: Cells from another's body but of same species
3. Xenogenic: Cells from another species.
BIOTECHNOLOGY
Techniques of using living organisms or enzymes from organisms to produce products
and processes useful to humans
The two core techniques enabled birth of modern biotechnology are:
1. Genetic engineering: Techniques to alter the chemistry of genetic material to
introduce these into host organisms and thus change the phenotype of the host
organism.
2. Bio process engineering: Maintenance of sterile ambience in chemical engineering
processes to enable growth of only the desired microbe or eukaryotic cell in large
quantities for the manufacture of biotechnological products e.g. antibiotics, vaccines,
enzymes, etc.
Feature of a vector-
a) Origin of replication: This is a sequence from where application starts
b) Selectable marker: It helps in identifying and eliminating non transformants and
6
GENOME EDITING
It is also known as genome engineering or Gene editing
It involves inserting, deleting, modifying, or replacing DNA in a living organisms’
genome
Once the RNA-guided Cas9 enzyme cuts the DNA at a specific site, we could make the
following changes
o Inserting a new sequence
o Deleting the sequence
o Modifying the sequence
In order to do so the cell can use its natural DNA repair mechanisms (DNA polymerase)
to insert a nucleotide
or introduce a new
could be single base variation, large sequence variation, variations in the way
sequences are structured etc.
13
3-PARENT BABY
Offer mothers a way to have a child without passing on metabolic diseases caused by
faulty mitochondria.
Done by exchanging the diseased mitochondria of a prospective mother with those of a
healthy, unrelated donor: the third parent.
Apart from receiving the usual “nuclear” DNA from its mother and father, the embryo
would also include a small amount of healthy mitochondrial DNA from a woman donor.
In addition to DNA in the nucleus, some DNA is also present in the mitochondria.
The Mitochondrial DNA has only one chromosome and its codes for only specific
proteins responsible for metabolism.
14
Mitochondrial DNA is inherited only from the mother & thus it is more effective to trace
human ancestry
This is resorted to when the actual mother is suffering from an incurable mitochondrial
disease. This technique involves removing the faulty mitochondrial DNA from the actual
mother and nucleus form the mother’s egg and the resultant egg fertilizes with the
sperm cell of the father outside the body (in-vitro).
DMH-11: the commercial release of the GM mustard Dhara Mustard Hybrid 11 (DMH
11) created by Delhi University is pending since the GEAC has urged that thorough
safety assessment data on environmental biosafety, particularly effects on beneficial
insect species, be generated first. It is a genetically modified hybrid variety of the
mustard species Brassica juncea. The transgenic mustard DMH - 11 was developed in
2002 using genetic material isolated from non-pathogenic soil bacteria. Three genes,
Bar, Barnase and Barstar, were extracted from Bacillus amyloliquefaciens to produce
the hybrid seed. DMH 11’s Glufosinate resistance is due to an enzyme expressed by the
Bar (Bialaphos resistance) gene.
Bt Brinjal: is a transgenic brinjal developed by introducing the cry1Ac gene from the
Bacillus thuringiensis soil bacterium into Brinjal. This brinjal has been genetically
modified to withstand insects like the Brinjal Fruit and Shoot Borer (Leucinodes
orbonalis). Maharashtra Hybrid Seeds Company created Bt Brinjal (Mahyco).
Golden Rice: is a new form of rice that contains beta- carotene (provitamin A), which the
body converts to vitamin A as needed and
gives the grain its golden colour. It
produces two new enzymes that finish the
beta-carotene expression in rice grains.
Terminator Seed Technology: the genetic
alteration of plants to make them produce
sterile seeds is known as Terminator seed
technology. Suicide seeds are another
name for them. Genetic Use Restriction
Technologies is Terminator’s official name,
as used by the UN and scientists
(GURTs).
provided later. “Rules for the manufacture, use, import, export & storage of hazardous
microorganisms, genetically engineered organisms or cells, 1989” under the
Environment (Protection) Act, 1986.
The Genetic Engineering Appraisal Committee (GEAC) functions in the Ministry of
Environment, Forest and Climate Change (MoEF&CC). As per Rules, 1989, it is
responsible for the appraisal of activities involving large- scale use of hazardous
microorganisms and recombinants in research and industrial production from the
environmental angle. The committee is also responsible for appraisal of proposals
relating to release of genetically engineered (GE) organisms and products into the
environment including experimental field trials. There are six authorities in total to deal
with various areas of the regulation:
1. Recombinant DNA Advisory Committee,
2. Institutional BioSafety Committee,
3. Review Committee on Genetic Manipulation,
4. Genetic Engineering Approval Committee (GEAC) under MoEF is the final approval
authority for allowing GM crops in fields including field trials. It also includes approval for
commercial cultivation of GM crops. GEAC is also responsible for certification of GM
organisms
5. State Biotechnology Coordination Committee
6. The District level Committee
Food Safety and Standards Authority of India regulates manufacture, storage,
distribution, sale and import GM food in India
BIOFORTIFICATION
Process of improving the nutritional value of food crops by increasing the density of
vitamins and minerals in the crop, which can be accomplished by traditional plant
breeding, agronomic methods, or biotechnology. These genetically changed and
nutrition-added crops, dubbed biologically fortified or biofortified, vary from commercially
available fortified foods in that additional nutrients are genetically entrenched rather
than chemically supplied. Example: Iron-biofortification of rice, beans, sweet potato,
cassava and legumes
APPLICATION IN BIOENERGY
Biofuels derived from biomass are renewable and sustainable energies with the
potential to replace fossil fuels.
Biotechnology can help to speed up the selection of varieties that are more suited to
biofuel production – with increased - o Biomass per hectare, o Increased content of oils
(biodiesel crops) or o Fermentable sugars (ethanol crops), or o Improved processing
characteristics that facilitate their conversion to biofuels.
Utilization of microbial fuel cells is found to be useful for sustainable bioenergy
synthesis via completing the wastewater treatment processes with electric energy
synthesis
18
ENVIRONMENTAL BIOTECHNOLOGY
Refers to the use of procedures to safeguard and restore the environment’s quality
GENE SILENCING
Gene silencing is the regulation of gene expression in a cell to prevent the expression of
a certain gene.
When genes are silenced, their expression is reduced.
When genes are knocked out, they are completely erased from the organism’s genome
and thus, have no expression.
Applications of Gene Silencing
• Specific gene silencing using RNAi in cell culture.
• Cancer treatments
• RNA interference has been used for applications in biotechnology.
• Useful in epigenomic analysis and clinical application of molecular diagnosis.
• Neuro-degenerative disorders treatment
19
BIRTH OF R-DNA
20
GENE THERAPY
Gene therapy is a method of treating a medical condition by altering the organism at
genetic level.
Gene therapy involves
Correcting a defective gene (permanent)
22
of bioinformatics which has opened the gate for producing novel products by mimicking
nature
Photosynthesis: As we understand the design of plants at the molecular level, we will be
able to design similar systems to do the same artificially. This is what we do in artificial
leaf.
1ST ARTIFICIAL CELL: SYNTHIA
In 2010, world’s first artificial with a synthetic chromosome (Synthia) was created
In 2016, an artificial cell with smallest known genome was ever created (473 genes)
called syn 3.0.(Synthia 3.0)
SYNTHETIC BASES: A 8-LETTER DNA: HACHIMOJO
Japanese scientists have produced an 8-letter DNA instead of 4-lettered one the nature
has produced. 4 out of 8 were natural (AGCT) and 4 artificial ones (SBPZ). This could
have potential benefits in DNA Data storage.
SYNTHETIC E.COLI
This is the latest synthetic genome we have created till date.
Potential applications-
Producing synthetic algae for high-efficiency photosynthesis that can be used in
CCUS technology.
Synthetic microbes as agents of bioremediation: Eg: There are plastic eating bacteria
we know of. However they are suitable only for certain kinds of plastics. If we can mimic
the process with synthetic genome, we can have novel organisms that can be used for
bioremediation.
Can replace Genetically Modified biologics like insulin.
Antibiotics are now being made by engineering a completely artificial gene sequence
to code for a protein (polypeptides). These are known to kill E.coli, Staphylococcus
aureus etc
Anti-malarial polypeptide is made using an artificial sequence.
T-RNAs made to express have found to kill Leishmania a protozoa that causes Kala
Azar a vector-borne disease caused by sandfly.
BIOPRINTING
It is the combination of additive manufacturing and tissue engineering to produce
artificial tissues and organs. Under this process we use biomaterials like cells and
biomolecules to fabricate tissue-like materials. 3-d printed biomaterials that either made
24
of cells or bio-compatible materials are increasingly used for regenerative medicine. Eg:
3-d printed cornea, heart, liver, kidney, skins
XENOBOTS
These are robots constructed out of living cells including stem cells to make robots to
perform specific actions.
Latest developments:
Xenobots made out of frog embryo cells are already being demonstrated.
Reproduceable Xenobots have already been created.
Potential applications include:
1. Environmental cleanup: Xenobots can be programmed to identify and remove toxic
pollutants from the environment, such as microplastics or oil spills particularly in
inaccessible areas.
2. Medical applications: Can act as drug delivery vehicles.
3. Agriculture: can be used to monitor soil health and crop growth
DISEASES IN NEWS
25
GM TECHNOLOGY
Haryana government issued NOC to conduct field trials on BG-2 RRF, herbicide-
tolerant and insect resistant variety of BT cotton. So far, India has allowed
commercial use of BG-1 and BG-2 GM cotton while BG-2 RRF approval is
pending at various stages. o BG-2 RRF can provide protection against pest
attack such as American Bollworm.
27
SDN-1 and SDN-2 do not produce new plant varieties that fall under the scope of the
GMO legislation. In SDN-3, the newly developed plant falls under GMO legislation only
if foreign DNA exceeding 20 base pairs is inserted.
CRISPR-CAS 9
CRISPR is a genetic code or sequence found in bacteria. Formed due to the activity of
the previous bacteriophages that had infected them. Bacteria uses CRISPR sequence
to remember each specific virus that attacks them by incorporating virus DNA into their
own bacterial genome. This gives the bacteria protection when a specific virus tries to
attack again.
CRISPR-associated protein 9 (Cas9): A bacterial RNA-guided endonuclease that once
activated will make special enzymes that seem to have co-evolved with CRISPR.
There are the 3 key elements of CRISPR-Cas9 work:
o Guide RNA: A piece of RNA that locates the targeted gene. This is engineered in a
lab.
o Cas9: The “scissors” that snip the undesired DNA out.
o DNA: The desired piece of DNA that is inserted after the break.
GENOME SEQUENCING
IndiGen programme- Aims to undertake whole genome sequencing of 1000 Indian
individuals representing diverse ethnic groups from India. Funded by Council of
Scientific and Industrial Research (CSIR).
Genome India Project - Aims to collect 10000 genetic samples from citizens across
India to build a reference genome. By Department of Biotechnology.
Human Genome Project - International research effort to determine the DNA sequence
of the entire human genome. It began in 1990 and completed in 2003. It was
coordinated by National Institutes of Health, USA and Department of Energy, USA
30
GENOMIC SURVEILLANCE
CLONING
Monozygotic twins are natural clones
Three different types of artificial cloning
• Gene/DNA cloning: Transfer of a DNA fragment from one organism to a self-replicating
genetic element, such as a bacterial plasmid.
• Reproductive cloning: Transferring nuclear material isolated from a somatic cell into an
enucleated oocyte (egg cell). o Then this oocyte is stimulated to divide, forming an
embryo with the same genome as the nuclear donor. This process is called Somatic
Cell Nuclear Transfer (SCNT). o This process was used to create Dolly sheep, the first
mammal cloned.
• Therapeutic cloning is like reproductive cloning till the production of the embryo. The
produced embryo is then grown in the laboratory.
About IBDC- First national repository for life science data in India
Established at: Regional Centre of Biotechnology, Faridabad in collaboration with
National Informatics Centre (NIC).
Storage: Digitised data will be stored on a four-petabyte supercomputer ‘Brahm’.
Supported by: Department of Biotechnology (DBT).
Data sharing: As per FAIR (Findable, Accessible, Interoperable and Reusable) principle.
FAIR Data Principles were proposed by a consortium of scientists and organizations to
support the reusability of digital assets.
Also contains genomes sequenced by the Indian Sars-CoV-2 Genomic Consortium
(INSACOG).
Under IBDC, currently, two sections have been developed. These include: o Indian
Nucleotide Data Archive (INDA) shall archive data generated from publicly funded
research projects in India and provide internationally accepted data accession numbers
(digitised genetic makeup of humans, plants, animals, and microbes). o Indian
Nucleotide Data Archive – Controlled Access (INDA-CA).
Data access types of IBDC: Open access/time-release access and Restricted access.
Maharashtra Cabinet approved the Gene Bank Project - It is a type of biorepository to
preserve plants (by collecting seeds, plants, tissue cultures) and animals (by collecting
sperm and eggs). At National level, several such facilities are established such as:
o National Gene Bank at National Bureau of Plant Genetic Resources, Pusa (It is
world’s 2nd largest refurbished gene bank).
o National Animal Gene Bank at National Bureau of Animal Genetic Resources, Karnal.
o Indian Seed Vault at Chang La (Ladakh).
32
STEM CELLS
Third patient was reported being cured of HIV after a stem cell transplant (SCT).
A bone-marrow transplant (also called SCT) from people carrying a specific HIV-
resistant genetic mutation called CCR5-delta 32 genetic mutation was used.
HIV mainly attacks CD4 immune cells (type of white blood cell) in human body, thereby
reducing a person’s ability to fight off secondary infections.
CCR5 receptors on surface of CD4 immune cells act as a doorway for HIV virus.
A bone marrow transplant is a procedure that infuses healthy blood-forming stem cells
into body to replace bone marrow that's not producing enough healthy blood cells.
It can be autologous (use cells from your own body) or allogenic (use cells from a
donor).
About stem cells- Special human cells that can develop into many different cell types.
Provide new cells for the body as it grows and replaces specialized cells that are
damaged or lost. Two unique properties that enable them to do this: o They can divide
repeatedly to produce new cells. o As they divide, they can change into the other types
of cells that make up the body.
33
MITOCHONDRIAL DNA
Mitochondrial DNA (mtDNA) profiling is a method used by forensics scientists to
examine biological items of evidence from crime scenes to determine mtDNA sequence
from samples such as hair, bones, and teeth.
Typically, these items contain low concentrations of degraded DNA, making them
unsuitable for nuclear DNA examinations.
mtDNA is circular, double stranded, and inherited maternally.o It is found in
mitochondria - a subcellular organelle located within the cell and functions to produce
energy (powerhouse of cell) for various tissues of body.
Mitochondrial division is disassociated from cellular division and is stimulated by energy
demand, i.e. cells with greater energy requirement have greater number of these
organelle. Also, it has high copy number as most human cell contain hundreds of
mtDNA genomes copies against two copies of Nuclear DNA in nucleus. High copy
number increases the likelihood of recovering sufficient DNA from samples even if they
are highly degraded by environment or time.
34
Dark Net uses a specialized network of computers called relays through which the
information passes. Commonly, information on Dark Net passes through at least 3 relay
computers between the source and destination.
In addition, dark net uses network technology that hides the locations of these relay
computers (IP address) to ensure anonymity of the users.
Dark net can be accessed through TOR Browser (Anonymity Network).
FEATURES OF DARK NET
36
While webpages on Darknet are hidden from a search engine, they can be accessed
and downloaded by
anyone who has the exact IP address of the webpage.
Dark net does not provide any protection against malware, virus attack etc
Since data is routed through many relay computers between source and destination,
communication and
downloading of webpages on the dark net is slow.
Used for both legitimate and illegitimate activities.
BASICS OF COMPUTERS
Computer is a device that transforms data into meaningful information.
The term hardware refers to the physical components of your computer such as the
system unit, mouse etc.
The software is the instructions that make the computer work. Software is held either on
your computer’s hard disk or in DVD ROM.
Types of Memory: Computer memory is of two basic types – Primary memory (RAM and
ROM) and Secondary memory (hard drive, CD, etc). Random Access Memory (RAM) is
primary-volatile memory and Read-Only Memory (ROM) is primary non- volatile
memory.
How Computer Memory Is Measured?
Bit: All computers work on a binary numbering system, i.e. they process data in one’s or
zero’s. This 1 or 0 level of storage is called a bit.
Byte: A byte consists of eight bits.
Kilobyte: A kilobyte (KB) consists of 1024 bytes.
Megabyte: A megabyte (MB) consists of 1024 kilobytes.
Gigabyte: A gigabyte (GB) consists of 1024 megabytes.
SUPERCOMPUTERS
These are large systems that are specifically designed to solve complex scientific &
industrial challenges. The performance of a supercomputer is measured in Floating-
Point Operations per Second (FLOPS).
The top Five Supercomputers in the world:
India has 4 supercomputers in the list of world’s top 500 supercomputers with Pratyush
& Mihir being the fastest supercomputers in India.
The first indigenous supercomputer was developed indigenously in 1991 by Centre for
Development of Advanced Computing which was called as PARAM 8000.
National Supercomputing Mission (NSM):
It was Launched in 2015
NSM is jointly steered by the MeitY and Department of S&T (DST).
38
Implemented by the Centre for Development of Advanced Computing (C-DAC), Pune &
the IISc, Bengaluru.
Objective: to connect national academic and R&D institutions with a grid of over 70
high-performance computing facilities. These will be networked on the ‘National
Supercomputing Grid’ over the National Knowledge Network (NKN).
QUANTUM COMPUTING
Quantum computers are machines that use the properties of quantum physics to store
data and perform computations.
A classical computer performs operations using classical bits, which can be either 0 or
1. Quantum computer uses quantum bits or Qubits, which can be both 0 and 1 at the
same time. ‘Qubits’ are the units of computation in quantum computers (or quantum
bits).
They take advantage of quantum mechanics’ characteristics, which regulate how matter
behaves at the atomic level.
The laws of quantum physics are used to achieve functioning of quantum computing.
1. Superimposition: Each quantum bit (basic unit of information in a quantum computer)
can represent both 1 and 0 at the same time, which is known as superposition.
2. Quantum entanglement: Subatomic particles become “entangled” (connected) in
quantum entanglement, which means that any change in one upsets the other, even
though they are at opposite ends of the universe.
SYCAMORE: it is Google’s Quantum Computer, which recently claimed Quantum
Supremacy. Quantum Supremacy: refers to quantum computers being able to solve a
problem that a classical computer cannot.
CLOUD COMPUTING•
It is the supply of computer services over the Internet (“the cloud”), including servers,
storage, databases, networking, software, analytics, and intelligence, in order to provide
speedier innovation, more flexible resources, and economies of scale.
The Government of India has launched an ambitious programme called “GI Cloud,”
which has been dubbed “MeghRaj,” in order to utilize and harness the benefits of Cloud
Computing.
The goal of this programme is to implement a variety of components, including
governance structures, to enable Cloud adoption in government.
39
EDGE COMPUTING
Edge computing is a distributed information technology architecture in which client data
is processed at the periphery of the network. Data is analyzed locally.
COMPUTER VIRUSES
A computer virus is a type of malicious code or program written to alter the way a
computer operates and is designed to spread from one computer to another. In the
process, a virus has the potential to cause unexpected or damaging effects, such as
harming the system software by corrupting or destroying data.
What are the different types of computer viruses?
Boot sector virus: This type of virus can take control when you start — or boot — your
computer. One way it can spread is by plugging an infected USB drive into your
computer.
Web scripting virus: This type of virus exploits the code of web browsers and web
pages. If you access such a web page, the virus can infect your computer.
Browser hijacker: This type of virus “hijacks” certain web browser functions, and you
may be automatically directed to an unintended website.
40
Resident virus: This is a general term for any virus that inserts itself in a computer
system’s memory. A resident virus can execute anytime when an operating system
loads.
Direct action virus: This type of virus comes into action when you execute a file
containing a virus. Otherwise, it remains dormant.
Polymorphic virus: A polymorphic virus changes its code each time an infected file is
executed. It does this to evade antivirus programs.
File infector virus: This common virus inserts malicious code into executable files —
files used to perform certain functions or operations on a system.
Multipartite virus: This kind of virus infects and spreads in multiple ways. It can infect
both program files and system sectors.
Macro virus: Macro viruses are written in the same macro language used for software
applications.
Such viruses spread when you open an infected document, often through email
attachments. A computer worm is malware, just like a virus, but a worm takes a copy of
itself and propagates it to other users.
MOBILE TECHNOLOGY
Mobile communication involves transmitting voice or data using wireless radio
transmission.
Mobile generations refer to change like mobile wireless communication network speed,
technology, data capacity, frequency, latency etc.
Mobile phones communicate through ground-based cellular networks. Cellular networks
are divided into ‘communication cells’ with which our mobile phones and mobile devices
communicate.
Mobile communication involves transmitting voice or data using wireless radio
transmission.
The first mobile systems were based on analogue transmission called as 1G.
The second-generation mobile systems were based on digital transmission.
Initially only voice was carried over the network.
The commonly used standards for voice communication were GSM and CDMA.
These days, most mobile communications use Long Term Evolution communication– or
LTE which allows us to communicate with voice and data simultaneously
over the same network.
The rules for carrying voice or data in a network are defined under the standards for
mobile network communications often seen as 2G, 3G, 4G and 5G
41
INDIGENOUS 5G
Currently, Indian contribution is design ownership of telecom products is very limited
and India has been significant importer of global products. TSDSI has been established
to enable India industry to take lead in International standardization activities.
1. LMLC TECHNOLOGY
1. LMLC technology
TSDSI in collaboration of IITs have been successful in getting the Low Mobility Large
Cell (LMLC) use case accepted by ITU as one of the 5G requirements for rural areas.
Benefits:
a. Increases the distance between two base stations to 6 km against 1.7 km by other
technology. This technology will be beneficial for rural India and other developing
countries.
b. The base stations can be placed at Gram Panchayats and connectivity can be
provided to neighboring villages and farms.
c. Reduction of Capex cost.
d. Increase in speed of internet access in rural areas.
e. These rural towers have to be located where BharatNet fiber ends in 2.5 lakh Gram
Panchayats. From these towers, neighboring villages numbering 3.5 lakhs have to be
provided wireless coverage.
f. This is for the first time a global standard is emerging from India at ITU.
2. TSDSI RIT
2. TSDSI RIT
IIT Madras along with other institutions has developed this standard as a variation to
3GPP standards for enhanced rural connectivity. This technology is also called 5Gi
technology.
Benefits:
a. Enhanced coverage in rural areas
b. Reduced capex costs.
c. This standard, however, has not been adopted by
ITU and thus not globally harmonised
NET NEUTRALITY
Net neutrality refers to the fact that governments and internet service providers treat all
data on the internet equally and do not charge users more for higher-quality delivery or
give some websites preferential treatment.
The Telecom Regulatory Authority of India (TRAI) recently proposed the formation of a
multi-stakeholder body (MSB) to guarantee that internet service providers in the nation
follow net neutrality principles.
44
All Internet service providers (ISPs) must provide the same amount of data access and
speed to all traffic under network neutrality, and traffic to one service or website cannot
be banned or downgraded.
BLOCKCHAIN TECHNOLOGY
Blockchain technology is a structure that stores transactional records (also known as
block), of the public in several databases, known as the chain, in a network connected
through Peer-to-peer (P2P) nodes.
This storage is referred to as a digital ledger.
Every transaction in this ledger (storage) is authorized by the digital signature of the
owner, which authenticates the transaction and saves it from any tampering.
Blockchain Key characteristic features include decentralization, persistence, and
anonymity.
Blockchain technology discards the need for any third- party or central authority for
peer-to-peer transactions. Managed by a cluster of computers not owned by a single
entity.
Cryptocurrency:
Cryptocurrency is a digital payment system that doesn’t rely on banks to verify
transactions.
It’s a peer to-peer system that can enable anyone anywhere to send and receive
payments.
In many countries, cryptocurrency is unregulated & they are not a legal tender payment
system. For example, Bitcoin.
WEARABLE TECHNOLOGY
These are smart electronic devices designed to be worn on the user’s body. Ex: Smart
jewellery, Wristbands, watches etc.
These devices detect, analyze, and transmit information.
Wearable technology is evolving into an important category of the Internet of things,
with life-changing applications in medicine and other fields.
45
FASTAG
The FASTag is a reloadable tag that allows tolls to be deducted automatically without
the need to stop for a cash transaction.
Once activated, the tag employs Radio Frequency Identification (RFID) technology and
is attached to the vehicle’s windscreen.
It was first used in April 2016, and on December 1, 2017, the government made it
mandatory for all new automobiles and trucks to be fitted with a FASTag before being
sold.
The National Highway Authority of India (NHAI) returns 5% of total monthly transactions
to encourage the usage of FASTags.
water quality, atmospheric or soil conditions. It can even include areas like monitoring
the movements of wildlife and their habitats.
Supply chain: By placing RFID tags on individual products, the exact location of single
items in a large warehouse can be shared, thus saving search time, streamlining
infrastructure, and lowering labour costs.
Elderly, sick and disabled population can be particularly assisted using IoT technology
with greater care.
Overall boosting of efficiency which will result in economic growth and employment
creation.
NFC TECHNOLOGY
NFC technology is a short-range wireless networking technology that enables NFC-
enabled devices to interact with one another and transmit information with a single
touch.
It makes it easy to pay bills, swap business cards, download coupons, and share a
document with other people.
WORKING OF NFC TECHNOLOGY
It uses electromagnetic radio waves to communication to allow communication between
two devices to take place. Because transactions take occur over such a small distance,
both devices must be equipped with NFC technology.
Devices must be physically contacting or within a few centimetres of one another for
data transmission to take place between them.
ARTIFICIAL INTELLIGENCE
Artificial intelligence (AI) is the ability of a computer or a robot controlled by a computer
to do tasks that are usually done by humans because they require human intelligence
and discernment.
AI refers to the simulation of human intelligence in machines that are programmed to
think like humans and mimic their actions.
AI is a self, adaptive learning system.
Applications: Industrial automation, Space science, self- driven cars, Healthcare sector,
weather forecasting, etc.
AI is a broad field of study that includes many theories, methods and technologies, as
well as the following major subfields:
o Machine learning automates analytical model building. It uses methods from neural
networks, statistics, operations research and physics to find hidden insights in data
without explicitly being programmed for where to look or what to conclude.
o A neural network is a type of machine learning that is made up of interconnected units
(like neurons) that processes information by responding to external inputs, relaying
information between each unit. The process requires multiple passes at the data to find
connections and derive meaning from undefined data.
o Deep learning uses huge neural networks with many layers of processing units, taking
advantage of advances in computing power and improved training techniques to learn
complex patterns in large amounts of data.
o Computer vision relies on pattern recognition and deep learning to recognize what’s in
a picture or video. When machines can process, analyze and understand images, they
can capture images or videos in real time and interpret their surroundings.
o Natural language processing (NLP) is the ability of computers to analyze, understand
and generate human language, including speech. The next stage of NLP is natural
language interaction, which allows humans to communicate with computers using
normal, everyday language to perform tasks.
Turing test is a test developed evaluating whether a system has attained properties of
Artificial General Intelligence. It was referred to Imitation Game
originally. It tests a machines ability to exhibit intelligent behaviour equivalent to or
indistinguishable from human being.
49
Explainable AI: (Also known as XAI). With increasing complexity and ubiquity of
systems using AI, there has been increasing attention to the black box problem in
AI. Black box AI is any artificial intelligence system whose inputs and operations aren't
visible to the use, or another interested party. Black box AI models arrive at conclusions
or decisions without providing any explanations as to how they were reached. To
address the problem, there has been increasing focus on the concept of Explainable AI
which is a set of processes and methods that allows human users to comprehend and
trust the results and output created by AI algorithms. This will increase fairness, trust
and address biases in AI systems.
APPLICATION OF
ARTIFICIAL
INTELLIGENCE
50
DEEPFAKES
Deepfakes use a form of artificial intelligence called deep learning to make images of
fake events, hence the name deepfake.
The origin of the word “deepfake” can be traced back to 2017 when a Reddit user, with
the username “deep fakes”, posted explicit videos of celebrities.
Deep Fakes are created by machine learning models, which use neural networks to
manipulate images and videos.
A model such as this “analyzes video footage until it is able algorithmically to transpose
the ‘skin’ of one human face onto the movements of another.
The usage of a technique called Generative Adversarial Networks (GAN), which
employs two AI algorithms — one that creates false material and the other that
assesses the system’s efforts, allowing it to improve — has resulted in more accurate
deep fakes.
LI-FI
It is a bidirectional, fully networked wireless communication technology that transmits
data using visible light rather than radio frequencies.
A router is made out of an adapted LED bulb. It can provide more resilient and reliable
wireless networks that complement and enhance existing cellular and Wi-Fi networks by
providing greater security, data rates, and density.
It delivers ultra-fast data connections, which are particularly beneficial in metropolitan
regions where radio spectrum is congested, as well as in rural locations where Fiber
Optic Cables or networks are unavailable.
A standard LED bulb is linked to a gadget, which is linked to the Internet.
The Internet data enters the bulb via the gadget and is transported by light waves.
Light waves delivering Internet data fall on a receiver or a dongle attached to the
computer on the other end.
51
BIOMETRICS
Biometrics are biological measurements — or physical characteristics — that can be
used to identify individuals.
For example, fingerprint mapping, facial recognition, and retina scans are all forms of
biometric technology, but these are just the most recognized options.
3D PRINTING
3D printing, also known as additive manufacturing, is a method of creating prototypes or
functional models of products by layering materials such as plastic, resin, thermoplastic,
metal, fiber, or ceramic.
With a market share of more than 35%, the United States is the global leader in 3D
printing.China controls almost half of the Asian market, followed by Japan (30%) and
South Korea (10%).
Process of 3D Printing
The process of 3D printing begins with the creation of a virtual model of the thing to be
manufactured.
A 3D modelling application, such as CAD (Computer Aided Design), or 3D scanners
can be used to create virtual designs.
After that, the 3D digital copy is loaded into a 3D modelling application. In order to print
the model, it is next cut into hundreds or thousands of horizontal layers.
This prepared file is then sent to the 3D printer, which reads each slice in 2D format and
then builds the item layer by layer, with no apparent layering and a 3 dimensional
structure as a result
3D bioprinting:
The goal of 3D bioprinting was to provide 3D constructs with autonomous mechanical
characteristics so that they could resemble the body’s natural tissue.
This method enables for the customization of microstructures for disease models.
Scientists have created a 3D printing process that can replicate the complicated
geometry of blood vessels, which might be used to construct prosthetic arteries and
organ tissues in the future.
DRONES
A drone refers to an unpiloted aircraft or spacecraft. Another term for it is an “unmanned
aerial vehicle,” or UAV.
SEMICONDUCTORS
A semiconductor material has an electrical conductivity value falling between a
52
conductor (such as metallic copper) and an insulator (such as glass). Lattice structure
and atomic structure of constituent elements decide whether a particular material will be
insulator, metal or semiconductor.
There are two distinct band of energies (called valence band and conduction band) in
which electrons in a material lie. Valence band energies are low as compared to
conduction band energies. All energy levels in the valence band are filled while energy
levels in the conduction band may be fully empty or partially filled.
The electrons in the conduction band are free to move in a solid and are responsible for
the conductivity. The extent of conductivity depends upon the energy gap between the
top of valence band and bottom of conduction band.
The electrons from valence band can be excited by heat, light or electrical energy to the
conduction band and thus, produce a change in the current flowing in a semiconductor.
CLASSIFICATION OF SEMICONDUCTORS
I. Based on material.
(i) Elemental semiconductors: Silicon (Si) and (Ge)
(ii) Compound semiconductors: Inorganic, organic, organic polymers
a. Inorganic: CdS, GaAs, CdSe, InP etc.
b. Organic: Anthracene, Doped pthalocyanines etc.
c. Organic polymers: polypyrrole, polyaniline, polythiophene
II. Based on purity
(i) Intrinsic: pure, with no impurities, have no or zero conductivity at low
tempertures. However, as temperature rises, conductivity of these materials
increases
(ii) Extrinsic: when a small quantity of small impurity is added to pure
semiconductor, the conductivity of semiconductor is increased. Deliberate
addition of a desirable impurity is called doping and the impurity atoms are
called dopants
RISC-V MICROPROCESSORS
Ministry of Electronics and Information Technology (MeitY) has launched Digital India
RISC-V Microprocessor (DIR-V) Program. This Program aims to enable the creation of
the microprocessors for the future in India, for the world and achieve industry-grade
silicon and design wins by December 2023.
ABOUT RISC-V
RISC-V is an open standard Instruction Set Architecture (ISA) based on established
RISC principles. Each computer hardware will support a particular ISA.
Unlike most other ISA designs, RISC-V is provided under open-source licenses that do
not require fees to use. RISC-V can be extended or customised for a variety of
hardware or application requirements
ARM and x-86 are two such instruction set architectures- one of which is licensed and
the other is sold, where the industry consolidated in the earlier decades. However,
RISC-V has emerged as a strong alternative to them in the last decade, having no
licensing encumbrances, enabling its adoption by one and all in the semiconductor.
Industry, at different complexity levels for various design purposes. India has developed
two series of microprocessors:
o SHAKTI series of microprocessors by IIT Madras.
o VEGA microprocessors by C-DAC.
Validators are selected randomly. Blocks are validated by more than one validator, and
when a specific number of the validators verify that the block is accurate, it is
finalized and closed.
IMMERSIVE TECHNOLOGIES
Immersive technologies make it easy to build replicable and flexible experiences, such
as for flight or combat training.
Startups use virtual reality (VR) to construct synthetic training environments (STE).
These experiences augment conventional training and mission rehearsal, improving the
readiness of soldiers and units. Beyond training opportunities, augmented reality (AR)
makes on-field soldiers more effective in their missions. Wearable glasses or AR
headsets provide soldiers with mapping information, movement markers, and other
data. This enhances real-time situational decision making for ground forces.
US-based startup GOVRED builds VR-based training solutions for the military
EDGE COMPUTING
Edge computing enables data to be analyzed, processed, and transferred at the edge of
a network – where things and people produce or consume that information.
It brings computation and data storage closer to the devices where it’s being gathered,
rather than relying on a central location that can be thousands of miles away.
The basic difference between edge computing and cloud computing lies in where the
data processing takes place.
The existing Internet of Things (IoT) systems perform all their computations in the cloud
using data centres.
Edge computing, on the other hand, essentially manages the massive amounts of data
generated by IoT devices by storing and processing data locally.
WIFI 6.0
Next generation standard in WiFi technology. Also known as “AX WiFi"
It was built for in response to the growing number of devices in the world of IoT (Internet
of Things) due to faster data transmission rates.
Each connected device performs at an optimum level, in locations with hundreds or
thousands of connected devices.
Highest standards for security and interoperability.
Lower battery consumption.
Increased bandwidth to deliver greater performance with lower latency.
between transceivers that are line-of-sight (LOS) for successful transmission of optical
signals.
The channel can be atmosphere, space, or vacuum, whose characteristics determine
the transmission and reception of optical signals for designing reliable and efficient
communication systems.
Using FSO technology data is transmitted by propagation of light through atmospheric
or space communication channels, allowing optical connectivity.
FSO communication offers a high data rate to meet the tremendous increasing
demand of broadband traffic mostly driven by Internet access and HDTV broadcasting
services.
Compared to fiber optics technology, FSO offers much more flexibility in designing
optical network architectures at very high speeds, at tens and hundreds of Gbit/s rates.
However, FSO communication is affected by atmospheric effects, which limits
sensitivity and achievable data rates with acceptable BER.
Both point-to-point, point-to-multipoint, multipoint-topoint, and multipoint-to-multipoint
FSO communications are possible, depending on the different scenarios of establishing
optical links. FSO communication is the most practical alternative to solve the
bottleneck broadband connectivity problem.
GIGA MESH
It is a wireless technology product that could enable telecom operators deploy quality,
high speed rural telecom infrastructure at 5 times lower cost.
Giga Mesh is based on millimeter wave multi beam technology.
WI-FI CALLING
It makes use of high-speed Internet connection, available via broadband, to make and
receive high definition (HD) voice calls.
This is not much different from a voice call using WhatsApp or any other over-the-top
messaging platform, but here the call is from one number to another, and not using an
app.
Wi-Fi Calling can be configured on compatible smartphones by upgrading operating
systems to the version that supports Wi-Fi Calling and enabling this in Settings.
QR CODE
QR Code stands for Quick Response Code. Main purpose of development was to
create a code that could be read quickly.
Features EATURES OF QR CODES ARE
1. High capacity of encoding of data
2. Small printout size
3. Dirt and Damage Resistant
4. Readable from any direction in 360 degrees
5. Structured Appending feature
QR Code has error correction capability to restore data if the code is dirty or damaged.
Four error correction levels are available for users to choose according to the operating
environment. Raising this level improves error correction capability but also increases
the amount of data QR Code size.
RFID TECHNOLOGY
Radio Frequency Identification (RFID) refers to a wireless system comprised of two
components: tags and readers.
Reader is a device that has one or more antennas that emit radio waves and receive
signals back from the RFID tag.
Tags, which use radio waves to communicate their identity and other information to
nearby readers, can be passive or active. Passive RFID tags are powered by the reader
and do not have a battery. Active RFID tags are powered by batteries.
RFID tags can store a range of information from one serial number to several pages of
data. Readers can be mobile so that they can be carried by hand, or they can be
mounted on a post or overhead.
Reader systems can also be built into the architecture of a cabinet, room, or building.
Advantages-
Automates data collection, reduces human effort & error.
Tag reading with no line-of-sight or item-by-item scans required.
Multiple RFID tags can be read simultaneously.
All RFID tags within range can be detected instantly and matched with information in
your database.
Assets can be cross-referenced against assigned locations & recorded as present,
missing, or relocated.
RFID can be integrated with active scanning and fixed readers for a totally automated
tracking solution.
Assets and employees can be tracked and located automatically for everything from
supply chain & asset management, facility security & emergency planning.
Available scanners support both RFID and barcoding so you can upgrade at your own
pace.
59
BHAR OS SOFTWARE
IIT, Madras has recently developed ‘BharOS’ – an indigenous mobile operating
system.
It is a government funded AOSP (Android Open-Source Project) based operating
system with no Google Apps or services.
It comes with No Default Apps (NDA) which means that users are not forced to use
apps that they may not be familiar with giving more permission controls to user.
It offers ‘Native Over The Air’ (NOTA) updates which means that security updates and
bug fixes will be automatically installed on the device.
Private App Store Services (PASS). A PASS provides access to a curated list of apps
that have been thoroughly vetted and have met certain security and privacy standards
of organisations.
NEUROMORPHIC COMPUTING
Neuromorphic Computing is an approach to computing that is inspired by the structure
and function of the human brain.
The development of neuromorphic hardware aims at mimicking biological synapse
that monitors and remembers the signal generated by the stimuli.
A neuromorphic computer/chip consists of Artificial Neural Networks comprised of
millions of artificial neurons (made from silicon).
These neurons pass signals to each other in layers, converting input into output
through electric spikes or signals, based on the architecture of Spiking Neural
Networks.
This allows the machine to mimic the neuro-biological networks in the human brain
and perform tasks efficiently such as visual recognition and data interpretation.
INDIA STACK
India Stack is a name used to describe a collection of disparate technology products
and framework.
Components of this collection are owned & maintained by different agencies.
Open API team at iSPIRIT has been a pro-bono partner in the development, evolution
and evangelization of these APIs and systems.
None of the systems which are include in the India Stack require any proprietary
technology or intellectual property, hence, can be easily implemented in any country
across the world.
LAYERS OF INDIA STACK
API included-API INCLUDED IN INDIA STACK
Aadhaar: Bedrock of India Stack is a set of digital identity products centered around
Aadhaar. Aadhaar program is being implemented by Unique Identification Authority of
India, a statutory body constituted under Aadhaar Act, 2016. Currently, more than 95%
Indians possess an Aadhaar number allowing them to:
Remotely authenticate attributes such as name, age, address, mobile number, email
address, gender via a two-factor or biometric authentication.
Receiving digitally signed & universally accepted copies of lifetime records such as
driver’s license, educational diplomas, insurance policies etc.
Signing documents or messages using a government backed digital signature service.
eSign: It is a digital signature product built on top of Aadhaar. It allows any Aadhaar
holder to produce legally valid digital signatures on any document, at any time, using
any device. Consent for this signature is obtained through a one-time password sent to
the signer’s Aadhaar linked mobile number.
National Digital Health Mission (NDHM): Ayushman Bharat Digital Mission (ANDM)
aims to develop the necessary backbone to support integrated digital health
infrastructure in India. However, participation of citizens and healthcare facility is
voluntary in ABDM.
Components of ABDM are:
ABHA Number: An individual/citizen/patient will be provided with a randomly
generated 14-digit number known as ABHA for uniquely identifying a
62
person in the digital health ecosystem, authenticate himself and link his health records
with consent across multiple systems and stakeholders.
Healthcare Professionals Registry (HPR): Comprehensive registry of all healthcare
professionals involved in healthcare services across both modern and traditional
systems of medicine.
Health Facility Registry (HFR): Comprehensive registry of health facilities (Hospitals,
clinics, diagnostic labs, imaging centers, pharmacies etc.) across different systems of
medicines including both public and private health facilities.
Unified Health Interface (UHI): An open protocol for various digital health services
focusing on End User Applications and participating Health Service Provider
applications such as appointment booking, teleconsultation, service discovery etc.
E-Hospital: A one stop solution that connects patients, hospitals and doctors on a
single digital platform. Helps for efficient appointments in government hospitals.
with each other in a secure, reliable, and efficient manner. With OCEN,
borrowers can easily access credit from multiple lenders, while lenders can easily verify
the borrower’s identity, creditworthiness, and other relevant details before disbursing the
loan. The platform’s open architecture and standard APIs make integrating with OCEN
easy for other credit infrastructure providers, creating a robust credit ecosystem that
benefits all stakeholders. Moreover, OCEN’s platform ensures that all transactions are
secure, compliant with regulatory requirements, and protect user privacy. It has been
developed by iSpirit.
Providers and consumers would be able to use any compatible application of their
choice for exchange of information and carrying out transactions over ONDC.
ONDC goes beyond the current platform-centric digital commerce model where the
buyer and seller must use the same platform or application to be digitally visible
and do a business transaction.
Consumers can potentially discover any seller, product or service by using any
compatible application or platform, thus increasing freedom of choice for
consumers
GEOSPATIAL TECHNOLOGY
Institutional framework
Geospatial Data Promotion and Development Committee (GDPDC): At national level,
an apex body for formulating and implementing appropriate guidelines, strategies, and
programs. GDPDC would replace National Spatial Data Committee (NSDC) and
Geospatial Data Promotion and Development Committee.
Role of Department of Science & Technology (DST): Continue to be nodal Department
and GDPDC shall make suitable recommendations to DST.
65
2. Mapping infrastructure: Policy shall replace the National Map Policy, 2005.
3. Geospatial Knowledge Infrastructure (GKI): Will be enabled by the integration of
Geospatial data with Fourth Industrial Revolution technologies and the growing digital
infrastructure.
4. Geospatial Education and Skill Development: National Institute for Geo-informatics
Science and Technology (NIGST), Indian Institute of Remote Sensing (IIRS), and/or any
suitable institute(s), public or private, will be developed into Centre(s) of Excellence.
5. Geospatial Industrial Development Board (GIDB): Advisory body under GDPDC
NITI Aayog launched the National Data & Analytics Platform (NDAP) for open public
use
• About NDAP: A user friendly web platform accessible to all users.
• Function: Hosts foundational datasets from various government agencies, presents
them coherently, and provides tools for analytics and visualization
Bank for International Settlements (BIS) has endorsed India’s Data Empowerment
Protection Architecture (DEPA)
• About DEPA: A joint public-private effort for an improved data governance approach.
o DEPA forms the final layer of India Stack, a set of APIs that allows various
stakeholders to utilise a unique digital infrastructure aimed at presence-less, paperless,
and cashless service delivery.
• Function: Creates a digital framework that allows users to share their data on their own
terms through a third party entity, Consent Managers.
• Application: DEPA’s first application has been in the financial sector. It is being tested
in the health sector, as well
as others.
Yotta D1
• It is country’s biggest and North India’s first hyperscale data centre that was recently
inaugurated in Greater Noida Uttar Pradesh.
• About Data Centre: Dedicated secure space within a centralized location where
computing and networking equipment is concentrated for collecting, storing and
processing large amounts of data.
• Components: Network infrastructure (connects servers etc. to end-user locations);
Storage infrastructure; and Computing resources (provide processing, memory, etc. that
drive applications).
5G TECHNOLOGY
68
5G SPECTRUM AUCTION
A record over ₹1.5 lakh crore worth of 5G telecom spectrum was sold in recently held
auction.
About 5G spectrum
• Spectrum relates to the radio frequencies allocated to the mobile industry and other
sectors for communication over the airwaves.
• Spectrum is a sovereign asset.
• Operators are most likely going to use a mix of low-band, mid-band, and high-band
spectrum to deliver the type of 5G experience that their customers demand.
E-Band
• Broadband and WiFi players opposes giving E band exclusively to Telcos.
• E band is the range of radio frequencies from 60 GHz to 90 GHz in the
electromagnetic spectrum.
• E-band is a major solution of 5G's microwave transmission
About RAN
• RAN is part of network that connects the main network infrastructure to end-users.
o It connects individual devices to other parts of a network through radio connections.
• It provides the critical technology to connect users to the mobile network over radio
waves. It acts as a bridge to access all the key applications on the web.
o Current RAN technology is provided as an integrated platform of both hardware and
software.
70
o Therefore, it is difficult to mix vendors for its different units. Idea of Open RAN is to
enable operators to mix and match components from different vendors.
o Open RAN will create a multi-supplier RAN solution that allows for the separation
between hardware and software with open interfaces.
Standalone (SA) 5G:
A telecom network where both core network and radio access network (RAN) are
upgraded to 5G.
o It replaces the LTE network 4G wireless communications standard and allows
completely independent operation of a 5G service without any interaction with an
existing 4G core.
• Advantage of SA over NSA: superior voice quality, significantly more speed, lower
latency etc.
• Challenges of SA 5G: not all phones will have support for SA 5G, will cost more etc.
SATELLITE COMMUNICATION
OTHERS
DARKNET
Germany has shut down Russia-linked ‘Hydra Market’- considered as world's biggest
and oldest DarkNet marketplace of illegal items and services.
About DarkNet
• Also known as Dark Web, it is that part of the Internet which cannot be accessed
through traditional search engines like Google nor is it accessible by normal browsers
like Chrome
or Safari.
o It generally uses non-standard communication protocols which make it inaccessible to
internet service providers (ISPs) or government authorities.
o Content on Dark Net is encrypted and requires a specific browser such as TOR (The
Onion Ring) to access those pages.
• Dark Net itself is only a part of the
Deep Web, which includes sites that
are protected by passwords.
o Part of the internet that is readily
available and searchable on
standard search engines is called
as Surface Web.
• Application: Used by journalists
and citizens working in oppressive
regimes (to communicate without
any government censorship),
researchers and students to do
research on sensitive topics, law
enforcement agencies, etc.
• Concerns over its use: Anonymity,
Haven for illicit activity, Privacy and
ethical concerns, drug dealing,
communication by terrorists, etc
74
ARTIFICIAL INTELLIGENCE
4 D PRINTING
• A renovation of 3D printing wherein special materials is used to print objects that
change shape
post-production.
• Need Stimuli or triggers to start transformation: Such as moisture, temperature, light,
electrical current, stress, pH etc.
• Materials used: Hydrogels, Thermo-responsive, Photo and magneto responsive,
Piezoelectric materials, pH-responsive etc.
• Properties: Self-assembly, self-adaptability, self-healing, shape memory, self-capability
etc.
• Printing techniques: Similar to ones used in 3D such as fused deposition modelling
(FDM), jet 3D printing (3DP), selective laser melting (SLM), direct ink writing (DIW),
electron beam melting (EBM), etc.
• Applications: Medical, biotechnology, robotics, automobiles, aerospace, textiles,
flexible electronics, construction etc.
• It allows creation of lighter, more complex designs that are too difficult or too
expensive to build using traditional dies, milling and machining.
Quantum Internet
• Researchers have successfully teleported quantum information across a basic network.
• Quantum internet: Based on the theoretical use of quantum computers to construct a new
kind of network.
• In contrast to traditional internet which operates through the use of binary signals
(represented by 0’s or 1’s) in data packets, quantum internet would utilize quantum bits, or
qubits, to encode information as 0’s, 1’s, or both at same time.
77
PROOF-OF-STAKE TECHNOLOGY
Ethereum blockchain platform switched to Merge software mechanism that uses ‘proof-
of-stake’ (PoS) mechanism.
About Merge and Proof-of-Stake
• Ethereum is a decentralised blockchain platform used to build decentralised apps
(dApps) and smart contracts among others.
• Merge is a software, aimed at slashing energy consumption, to the way transactions
are validated on Ethereum blockchain.
o Blockchain is a distributed or decentralized ledger technology which was first
introduced in the design and development of cryptocurrency
Merge uses the process of shifting the consensus mechanism of the blockchain from
proof-of-work to proof-of-stake
• FRS is part of the Digi Yatra initiative (Ministry of Civil Aviation) to promote seamless
and hassle-free experience at airports and simultaneously improving the security.
o Government is looking to make ticket booking, airport entry and boarding pass
security check-in digital.
• Digi Yatra Foundation (DYF) has been set up as a joint venture company for creating
the Digi Yatra Central Ecosystem.
EXTENDED REALITY
80
INDIASTACK
IndiaStack Knowledge Exchange 2022 held recently.
• Earlier, India also launched Indiastack. global - a single repository of all major
projects on IndiaStack.
o Indiastack. global allows to contribute towards the Global Digital Public
Goods repository.
About IndiaStack
• A collection of open APIs and digital public goods.
o API stands for Application Programming Interface. It allows two applications to talk to
each other.
o IndiaStack includes APIs of Aadhaar, Unified Payment Interface (UPI), Co-Win,
DigiLocker, Aarogya Setu, eSanjeevani, UMANG, DIKSHA, etc.
• Aim: To unlock the economic opportunities of identity, data, and payments at
population scale
81
82
83
84
QUANTUM COHERENCE
It is the ability of a quantum state to maintain its entanglement and superposition in the
face of interactions.
o It deals with the idea that all objects have wave-like properties
Spin-photon interfaces are elementary building blocks for quantum networks.
o These allow converting stationary quantum information (such as the quantum state of
an ion or a solid-state spin qubit) into light (namely photons) that can be distributed over
large distances.
• A major challenge is to find an interface that is both good at storing quantum
information and efficient at converting it into light.
• Optically active semiconductor quantum dots are the most efficient spin-photon
interface known to date but extending their storage time beyond a few microseconds is
difficult.
o Recent research improves the storage of quantum information beyond hundred
microseconds.
• Quantum dots (QDs) are a unique type of nanocrystalline semiconductor whose
electronic and optical properties are dependent on the size and shape of the dots.
• Importance of DCI
o Increases productivity and provides amenities that enhance quality of life. It is used for
financial services, e-governance, tele-medicine etc.
o Helps in implementation of various government schemes under Digital India, Make in
India, Ayushman Bharat Digital Mission etc.
• Earlier, National Digital Communications Policy (NDCP-2018) emphasized on DCI
under ‘Propel India’ mission.
o NDCP-2018 envisages enabling unbundling of different layers (e.g., infrastructure,
network, services, and applications layer) through differential licensing.
• DCIP will work at infrastructure and network layer; creating neutral third-party entities
which can create passive and active DCI.
o Currently, Infrastructure Providers Category-I (IP-I) rolls out passive infrastructure
while active infrastructure creation is permitted to Telecom Service Providers only.
Passive Infrastructure refers to physical space, e.g., telecom towers, fiber distribution
hub etc. while Active infrastructure refers to active elements such as antennas, back-
haul connectivity etc.
• DCIPs can lease/rent/sell their infrastructure only to such entities which are licensed
under Indian Telegraph Act.
• Potential Benefits Of DCIP: Increased common sharable DCI and network resources,
cost reduction, attract investment, strengthen service delivery segment, etc.
86
GENERAL PHYSICS
GRAVITY
• Gravity is the force by which a planet or other body draws objects toward its center. The force of
gravity
keeps all of the planets in orbit around the sun.
• Universal Law Of Gravitation: Anything that has mass also has gravity. Objects with more mass
have more
gravity. Gravity also gets weaker with distance. So, the closer objects are to each other, the stronger
their
gravitational pull is.
• The universal law of gravitation successfully explained several phenomena which were believed
to be
unconnected:
o Force that binds us to the earth;
o Motion of the moon around the earth;
o Motion of planets around the sun; and
o Tides due to the moon and the Sun.
6.2. NEWTON’S LAWS OF MOTION
• Newton formulated the well-known laws of motion. He designed an astronomical telescope to
carry out
astronomical observations. He invented a new branch of mathematics, called calculus.
• First Law: An object remains in a state of rest or of uniform motion in a straight line unless
compelled to
change that state by an applied force.
o In other words, all objects resist a change in their state of motion.
o Means a body/object wants to remain in an undisturbed situation. If it is motion then want to
remain in
motion or if in rest then want to remain in rest. (Inertia)
• Second Law: states that the rate of change of momentum of an object is proportional to the
applied
unbalanced force in the direction of force.
• Third Law: For every action, there is an equal and opposite reaction.
o The statement means that in every interaction, there is a pair of forces acting on the two
interacting
objects.
o The size of the forces on the first object equals the size of the force on the second object
NANOTECHNOLOGY
• Nanotechnology is the understanding and control of matter at the nanoscale, at dimensions
between
approximately 1 and 100 nanometers, where unique phenomena enable novel applications.
• Types of Nanotechnology: The many types of nanotechnology are divided into two categories
based on how
they work (top-down or bottom- up) and the medium in which they work (dry or wet):
o Descending (top-down): At the nanometric scale, which ranges from one to 100 nanometres in
size,
mechanisms and structures are miniaturized. It is the most common to date, particularly in the
89
electronics industry.
o Ascending (bottom-up): You start with a nanometric structure — a molecule, for example — and
build
a larger mechanism by a mounting or self-assembly process.
o Dry nanotechnology entails the use of nanoparticles in a dry state. It’s used to make structures
that don’t
work with humidity out of coal, silicon, inorganic materials, metals, and semiconductors.
o Wet nanotechnology is based on biological systems found in water, such as genetic material,
membranes,
enzymes, and other cellular components.
NANOMATERIALS
• Particles with particle size less than 100 nm are called nanoparticles.
Types of Nanoparticles
1. Carbon Based: It includes Graphene and other carbon based products.
2. Metal based: The main component of these nanomaterials are metals. They include Nano silver
and metal
oxides.
GRAPHENE
• Carbon atoms are organized in a honeycomb-like arrangement on a one-atom-thick sheet of
graphene.
Graphene is thought to be the world’s thinnest, strongest, and most electrically and thermally
conductive
substance.
• Graphene is the world’s strongest substance, and it can be used to make other materials stronger.
• Graphene is the most heat conducting material ever discovered. Because graphene is both strong
and light,
it’s an excellent material for heat-spreading applications like heat sinks and heat dissipation films.
• Graphene is a promising material for use in batteries and supercapacitors because of its
extraordinarily high
surface- area-to-volume ratio.
6.6. CARBON NANOTUBES
• Carbon nanotubes (CNTs) are cylinder-shaped molecules made up of rolled-up single-layer
carbon atom
sheets (graphene).
• Single-walled nanotubes (SWCNT) have a diameter of less than 1 nanometer (nm), while multi-
walled
nanotubes (MWCNT) have diameters of more than 100 nm and are made up of multiple
concentrically
interconnected nanotubes. Their length might range from a few micrometers to millimeters.
• Applications of Nanotechnology: It can be used in diverse fields like Health sector, Space
technology,
Agriculture field, Environment and economy.
90
. LASER TECHNOLOGY
• In 1960, Theodore H. Maiman of Hughes Research Laboratories created the first practical laser.
• LASER (Light Amplification by Stimulated Emission of Radiation) is a device that stimulates
electronic
or molecular transitions to lower energy levels to produce an intense, coherent, directional beam of
light.
• A laser, unlike a regular light source, creates a narrow beam of extremely brilliant light.
GENERAL CHEMISTRY
BASICS OF THE CHEMISTRY
3.2.1 State of Matters:
• Anything which has mass and occupies space is called matter.
• Conventionally matter can exist in three physical states viz. solid, liquid and gas.
91
3.2.2 Solid:
• Particles are held very close to each other in solids in an orderly fashion and there is not much
freedom
of movement.
• Solids have definite volume and definite shape.
3.2.3 Liquids:
• In liquids, the particles are close to each other but they can move around.
• Liquids have definite volume but do not have definite shape.
3.2.4 Gasses:
• In gasses, the particles are far apart as compared to those present in solid or liquid states and their
movement is easy and fast.
• Gasses have neither definite volume nor definite shape.
• On heating, a solid usually changes to a liquid, and the liquid on further heating changes to gas (or
vapour). In the reverse process, a gas on cooling liquifies to the liquid and the liquid on further
cooling
freezes to the solid.
METALS
• More than 75% of the known elements have the characteristic properties of metals.
• The ability of metals to be drawn into thin wires is called ductility. Gold is the most ductile metal.
Thus, metals
can be given different shapes according to our needs.
• The metals that produce a sound on striking a hard surface are said to be sonorous.
• They are Good conductors of Electricity.
• Almost all metals combine with oxygen to form metal oxides. Different metals show different
reactivities
towards oxygen.
o Ex: Potassium and sodium react so vigorously that they catch fire if kept in the open. Hence, to
92
protect
them and to prevent accidental fires, they are kept immersed in kerosene oil.
• At ordinary temperature, the surfaces of metals such as magnesium, aluminum, zinc, lead, etc., are
covered
with a thin layer of oxide. The protective oxide layer prevents the metal from further oxidation.
• All metals do not react with water. Metals like potassium and sodium react violently with cold
water.
• Magnesium does not react with cold water. It reacts with hot water to form magnesium hydroxide
and
hydrogen.
• Mercury is the only metal which is found in liquid state at room temperature.
BASICS OF METALLURGY
• Metallurgy is a domain of materials science and engineering that studies the physical and chemical
Metallurgy is a term that refers to the process of extracting metals in their purest form.
• Minerals are metal compounds that are mixed with soil, limestone, sand and rocks.
• Metals are mined commercially from minerals at a low cost and with little effort.
• Ores mined from the earth are usually contaminated with large amounts of impurities such as soil,
sand, etc.,
called gangue.
• The impurities must be removed from the ore prior to the extraction of the metal.
• The metals produced by metallurgy are not very pure. They contain impurities, which must be
removed to
obtain pure metals.
• The most widely used method for refining impure metals is electrolytic refining
Electrolytic Refining
• Many metals, such as copper, zinc, tin, nickel, silver, gold, etc., are refined electrolytically.
In this process, the impure metal is made the anode and a thin strip of pure metal is made the
cathode. A
solution of the metal salt is used as an electrolyte.
• The soluble impurities go into the solution, whereas, the insoluble impurities settle down at the
bottom of
the anode and are known as anode mud.
3.5.NON METALS
• Materials like coal and sulphur are soft and dull in appearance. They break down into a powdery
93
mass on
tapping with a hammer.
• They are not sonorous and are poor conductors of heat
• and electricity. These materials are called non-metals.
• Non-metals generally do not react with acids.
• Non Metals generally do not conduct electricity. But in exceptional cases it can conduct electricity.
3.5.1 Corrosion and Rusting:
• Corrosion is the process by which certain materials, metals and non-metals, deteriorate as a result
of
oxidation.
• The most important form of corrosion is the rusting of
• iron and steel.
• Rusting is a process of oxidation in which iron combines with water and oxygen to form rust, the
reddish-brown crust that forms on the surface of the iron.
• The rusting of iron can be prevented by painting, oiling, greasing, galvanising, chrome plating,
anodising or making alloys.
• Galvanisation is a method of protecting steel and iron from rusting by coating them with a thin
layer
of zinc.
• The galvanized article is protected against rusting even if the zinc coating is broken.
• Although metals like aluminum, chromium and zinc corrode more readily than iron, their oxides
form
a coating that protects the metal from further attack.
3.5.2 Anodising:
• Anodising is a process of forming a thick oxide layer of aluminum. Aluminum develops a thin oxide
layer
when exposed to air. This aluminum oxide coat makes it resistant to further corrosion.
3.5.3 Aqua regia:
• Aqua regia is a freshly prepared mixture of concentrated hydrochloric acid and concentrated
nitric acid
in the ratio of 3:1.
• It can dissolve gold, even though neither of these acids can do so alone.
• Aqua regia is a highly corrosive, fuming liquid. It is one of the few reagents that is able to dissolve
gold
and platinum.
Pure gold, known as 24 carat gold, is very soft. It is, therefore, not suitable for making jewellery. It is
alloyed
with either silver or copper to make it hard. Generally, in India, 22 carat gold is used for making
ornaments.
It means that 22 parts of pure gold are alloyed with 2 parts of either copper or silver.
.DIFFERENT KINDS OF COMPOUND
• Compounds are defined as substances containing two or more different chemical elements. They
have
distinct chemical structures characterized by a fixed ratio of atoms held together by chemical
bonds.
• Covalent Compounds: Covalent or molecular compounds form when elements share electrons in
a covalent
bond to form molecules. Molecular compounds are electrically neutral.
• Ionic compounds: Ionic compounds are compounds composed of ions, charged particles that form
94
when an
atom (or group of atoms, in the case of polyatomic ions) gains or loses electrons.
CHEMICAL REACTIONS
• Chemical reactions involve the breaking and making of bonds between atoms to produce new
substances.
Figure 3.7: Chemical Reactions
• A combination reaction is a reaction in which two reactants combine to form one product.
• Decomposition Reactions: Decomposition reactions are those in which one compound breaks
down (or
decomposes) to form two or more products.
• Displacement Reactions: Displacement reactions are those in which an element reacts with a
compound to
form a new compound.
• Double Displacement Reaction: reactions in which there is an exchange of ions between the
reactants are
called double displacement reactions.
• Oxidation and Reduction: one reactant gets oxidised while the other gets reduced during a
reaction. Such
reactions are called oxidation-reduction reactions or redox reactions.
• Exchange Reactions: Exchange reactions are those in which cations and anions that were partners
in the
reactants are interchanged in the products.In exchange reactions, the products must remain
electrically
neutral.
clothes washed by a washer man appear so white. Chemically, washing soda is sodium carbonate
decahydrate.
• Bleaching Powder: Bleaching is a process of removing colour from a cloth to make it whiter.
Bleaching
powder has been used for this purpose for a long time. Chemically, it is calcium oxychloride.
• Plaster of Paris: These are made of plaster of paris, also called POP. The only difference between
gypsum
and plaster of paris is in the less amount of water of crystallization.
Rubber is a natural polymer and possesses elastic properties. It is also termed as elastomeric
polymer.
o In elastomeric polymers, the polymer chains are held together by the weak intermolecular forces.
o These weak binding forces permit the polymer to be stretched.
97
• Semi-synthetic polymers: Cellulose derivatives as cellulose acetate (rayon) and cellulose nitrate,
etc.
are the usual examples of this sub category.
• Synthetic polymers: A variety of synthetic polymers such as plastic (polythene), synthetic fibers
(nylon
6,6) and synthetic rubbers (Buna -S) are examples of man-made polymers extensively used in daily
life
as well as in industry.
• Polythene: Polythenes are linear or slightly branched long chain molecules.
Low density polythene: It is obtained by the polymerisation of ethene under high pressure of 1000
to 2000 atmospheres at a temperature of 350 K to 570 K in the presence of traces of dioxygen or
a peroxide. Low density polythene is chemically inert and tough but flexible and a poor conductor
of
electricity.
o High density polythene: It is formed when addition polymerisation of ethene takes place in a
hydrocarbon solvent in the presence of a catalyst such as triethyl aluminum and titanium
tetrachloride at a temperature of 333 K to 343 K and under a pressure of 6-7 atmospheres. High
density polymers are also chemically inert and more tough and hard. It is used for manufacturing
buckets, dustbins, bottles, pipes, etc.
Biodegradable Polymers
• These polymers contain functional groups similar to the functional groups present in biopolymers.
• Aliphatic polyesters are one of the important classes of biodegradable polymers.