266d17e2-ce85-41e4-979e-3be972a27f75

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 16

Communication is the actionable transfer of information from one person, group, or place

to another by writing, speaking, or using a medium that provides a means of


understanding. Every communication consists of a minimum of one sender, a receiver,
and a message.

How to improve Your Communication Skills?

1. Listening:

To become a good communicator, it is important to be a good listener. It is important to

practice active listening – pay close attention to what others are saying and

clarify

ambiguities by rephrasing their questions for greater understanding.

2. Conciseness:

Convey your message in as few words as possible. Do not use filler words and get

straight

to the point. Rambling will cause the listener to tune out or be unsure of what you

are

talking about. Avoid speaking excessively and do not use words that may confuse

the

audience.

3. Body language:

It is important to practice good body language, use eye contact, utilize hand gestures, and

watch the tone of the voice when communicating with others. A relaxed body stance with
a friendly tone will aid in making you look approachable by others.

Eye contact is important in communication – look the person in the eye to indicate that

you

are focused on the conversation. But make sure to not stare at the person as it can make

him or her uncomfortable.

4. Confidence:

Be confident in what you say and in your communication interactions with others. Being

confident can be as easy as maintaining eye contact, maintaining a relaxed body stance,

and talking with concision. Try not to make statements sound like questions and

avoid

trying to sound aggressive or demeaning.

5. Open-mindedness:

In situations where you disagree with what someone else has to say, whether it be with an

employer, a co-worker, or a friend, it is important to sympathize with their point of view

rather than simply try to get your message across. Respect the opinion of others and

never

resort to demeaning those who do not agree with you

How to improve Your Communication Skills?


1. Listening:
To become a good communicator, it is important to be a good listener. It is important to
practice active listening – pay close attention to what others are saying and
clarify
ambiguities by rephrasing their questions for greater understanding.
2. Conciseness:
Convey your message in as few words as possible. Do not use filler words and get
straight
to the point. Rambling will cause the listener to tune out or be unsure of what you
are
talking about. Avoid speaking excessively and do not use words that may confuse
the
audience.
3. Body language:
It is important to practice good body language, use eye contact, utilize hand gestures, and
watch the tone of the voice when communicating with others. A relaxed body stance with
a friendly tone will aid in making you look approachable by others.
Eye contact is important in communication – look the person in the eye to indicate that
you
are focused on the conversation. But make sure to not stare at the person as it can make
him or her uncomfortable.
4. Confidence:
Be confident in what you say and in your communication interactions with others. Being
confident can be as easy as maintaining eye contact, maintaining a relaxed body stance,
and talking with concision. Try not to make statements sound like questions and
avoid
trying to sound aggressive or demeaning.
5. Open-mindedness:
In situations where you disagree with what someone else has to say, whether it be with an
employer, a co-worker, or a friend, it is important to sympathize with their point of view
rather than simply try to get your message across. Respect the opinion of others and
never
resort to demeaning those who do not agree with you

DIGITAL FLUENCY NOTES

38

NEP - 2020

6. Respect:
Respecting what others have to say and acknowledging them is an important

aspect of

communication. Being respectful can be as simple as paying attention to what they have

to

say, using the person’ s name, and not being distracted. By respecting others, the

other

person will feel appreciated, which will lead to a more honest and productive

conversation.

7. Using the correct medium:

There are several different forms of communication to use – it is important to choose

the

right one. For example, communicating in person about serious matters (layoffs,

salary

changes, etc.) is more appropriate than sending an email regarding the matter.

6. Respect:

Respecting what others have to say and acknowledging them is an important


aspect of

communication. Being respectful can be as simple as paying attention to what they have
to

say, using the person’ s name, and not being distracted. By respecting others, the
other
person will feel appreciated, which will lead to a more honest and productive
conversation.

7. Using the correct medium:

There are several different forms of communication to use – it is important to choose


the

right one. For example, communicating in person about serious matters (layoffs,
salary

changes, etc.) is more appropriate than sending an email regarding the matter

What is Big-Data Analytics?


Big data analytics is all about crunching massive amounts of information to uncover
hidden trends, patterns, and relationships. It’ s like sifting through a giant mountain of
data to find the gold nuggets of insight.

How does big data analytics work?

Data Collection: Data is the core of Big Data Analytics. It is the gathering of data from
different sources such as the customers’ comments, surveys, sensors, social media,
and so on.

Data Cleaning (Data Preprocessing): The next step is to process this information. It
often requires some cleaning. This entails the replacement of missing data, the
correction of inaccuracies, and the removal of duplicates.

Data Processing: After that we will be working on the data processing. This process
contains such important stages as writing, structuring, and formatting of data in a way it
will be usable for the analysis.

Data Analysis: Data analysis is being done by means of statistical, mathematical, and
machine learning methods to get out the most important findings from the processed
data.

Data Visualization: Data analysis usually is presented in visual form, for illustration –
charts, graphs and interactive dashboards.
Data Storage and Management: The stored and managed analyzed data is of utmost
importance. It is like digital scrapbooking. May be you would want to go back to those
lessons in the long run, therefore, how you store them has great importance.

Continuous Learning and Improvement: Big data analytics is a continuous process of


collecting, cleaning, and analyzing data to uncover hidden insights.

Big Data Tools and Technologies

1. Apache Storm

Apache Storm is a real-time distributed tool for processing data streams. It is written in

Java

and Clojure, and can be integrated with any programming language.

1. Apache Storm

Apache Storm is a real-time distributed tool for processing data streams. It is written in

Java

and Clojure, and can be integrated with any programming language.

Hadoop: Imagine Hadoop as an enormous digital warehouse. It’ s used by companies


like Amazon to store tons of data efficiently.

Spark: Think of Spark as the super-fast data chef. Netflix uses it to quickly analyze what
you watch and recommend your next binge-worthy show.

NoSQL Databases: NoSQL databases, like MongoDB, are like digital filing cabinets that
Airbnb uses to store your booking details and user data.

Tableau: Tableau is like an artist that turns data into beautiful pictures.

Python and R: Python and R are like magic tools for data scientists. They use these
languages to solve tricky problems.
Disadvantages or Challenges of Big data analytics

Data Overload: Consider Twitter, where approximately 6,000 tweets are posted
every second. The challenge is sifting through this avalanche of data to find valuable
insights.
Data Quality: If the input data is inaccurate or incomplete, the insights generated
by Big Data Analytics can be flawed. For example, incorrect sensor readings could
lead to wrong conclusions in weather forecasting.
Privacy Concerns: With the vast amount of personal data used, like in
Facebook’ s ad targeting, there’ s a fine line between providing personalized
experiences and infringing on privacy.
Security Risks: With cyber threats increasing, safeguarding sensitive data
becomes crucial. For instance, banks use Big Data Analytics to detect fraudulent
activities, but they must also protect this information from breaches.
Costs: Implementing and maintaining Big Data Analytics systems can be
expensive. Airlines like Delta use analytics to optimize flight schedules, but they
need to ensure that the benefits outweigh the costs.

Different Types of Big Data Analytics

1. Descriptive Analytics

This summarizes past data into a form that people can easily read. This helps in creating
reports, like a company’ s revenue, profit, sales, and so on. Also, it helps in the tabulation
of social media metrics.

2. Diagnostic Analytics

This is done to understand what caused a problem in the first place. Techniques like
drill-down, data mining, and data recovery are all examples. Organizations use diagnostic
analytics because they provide an in-depth insight into a particular problem.

3. Predictive Analytics

This type of analytics looks into the historical and present data to make predictions of the
future. Predictive analytics uses data mining, AI, and machine learning to analyze current
data and make predictions about the future. It works on predicting customer trends,
market trends, and so on.

4. Prescriptive Analytics

This type of analytics prescribes the solution to a particular problem. Perspective


analytics works with both descriptive and predictive analytics. Most of the time, it relies
on AI and machine learning.

Applications of Big Data


1. Tracking Customer Spending Habit, Shopping Behavior: In big retails store (like
Amazon, Walmart, Big Bazar etc.) management team has to keep data of
customer’ s spending habit (in which product customer spent, in which brand
they wish to spent, how frequently they spent), shopping behavior, customer’ s
most liked product (so that they can keep those products in the store).

2. Recommendation: By tracking customer spending habit, shopping behavior, Big


retails store provide a recommendation to the customer. E-commerce site like
Amazon, Walmart, Flipkart does product recommendation. They track what product
a customer is searching, based on that data they recommend that type of product to
that customer.

3. Smart Traffic System: Data about the condition of the traffic of different road,
collected through camera kept beside the road, at entry and exit point of the city,
GPS device placed in the vehicle (Ola, Uber cab, etc.). All such data are analyzed and
jam-free or less jam way, less time taking ways are recommended.

4. Secure Air Traffic System: At various places of flight (like propeller etc) sensors
present. These sensors capture data like the speed of flight, moisture, temperature,
other environmental condition. Based on such data analysis, an environmental
parameter within flight are set up and varied.

5. Auto Driving Car: Big data analysis helps drive a car without human interpretation.
In the various spot of car camera, a sensor placed, that gather data like the size of
the surrounding car, obstacle, distance from those, etc. These data are being
analyzed, then various calculation like how many angles to rotate, what should be
speed, when to stop, etc carried out.
The Different Types of Cybersecurity

1. Network Security

Most attacks occur over the network, and network security solutions are designed to
identify and block these attacks. These solutions include data and access controls such
as Data Loss Prevention (DLP), IAM (Identity Access Management), NAC (Network
Access Control), and NGFW (Next-Generation Firewall) application controls to enforce
safe web use policies.

2. Cloud Security

As organizations increasingly adopt cloud computing, securing the cloud becomes a


major priority. A cloud security strategy includes cyber security solutions, controls,
policies, and services that help to protect an organization’ s entire cloud deployment
(applications, data, infrastructure, etc.) against attack.

3Endpoint Security

With endpoint security, companies can secure end-user devices such as desktops and
laptops with data and network security controls, advanced threat prevention such as
anti-phishing and anti-ransomware, and technologies that provide forensics such as
endpoint detection and response (EDR) solutions.

Mobile security

Mobile security prevents these attacks and secures the operating systems and devices
from rooting and jailbreaking. When included with an MDM (Mobile Device Management)
solution, this enables enterprises to ensure only compliant mobile devices have access to
corporate assets.

IoT security

IoT security protects these devices with discovery and classification of the connected
devices, auto-segmentation to control network activities, and using IPS as a virtual patch
to prevent exploits against vulnerable IoT devices. In some cases, the firmware of the
device can also be augmented with small agents to prevent exploits and runtime attacks.
Applications of Cybersecurity:

DDoS security: DDoS stands for Distributed Denial for Service attack. In this
digital attack, the attacker uses multiple numbers of devices to keep the web server
engaged in accepting the requests sent by him from the multiple devices. It creates
fake website traffic on the server.
Web Firewall: A web application server-based firewall gets applied on a large
area network and it checks all the incoming and outgoing traffic on the server and it
automatically tracks and removes fake and malicious website traffic.
Bots: Nowadays, many hackers and attackers use bots to cause multiple device
traffic on the server to make it crash. Cybersecurity helps to deal with identifying
fake users i.e. bots and make them log out of their sessions so they don’ t affect
the experience of the normal users.
Antivirus and Antimalware: Cybersecurity is used to develop Antivirus and
Antimalware software for preventing all the digital attacks on the computer and
protecting these devices from data breaches, digital attacks, and unauthorized
attacks from hackers. It also helps in maintaining network security and firewall
systems for all the connected devices on the network.
Threat management systems: Cybersecurity helps to deal with digital threats
and attacks on computer systems. It identifies different points of vulnerabilities and
bugs in the system that can be used by hackers and attackers to defy with it and it
automatically optimizes all the defects in it with the ability to improve in
performance issues.

What Is Cloud Computing?


Cloud Computing means storing and accessing the data and programs on remote
servers that are hosted on the internet instead of the computer’ s hard drive or local
server.
The following are some of the Operations that can be performed with Cloud Computing
Storage, backup, and recovery of data
Delivery of software on demand
Development of new applications and services
Streaming videos and audio
The Types of Cloud Computing Services

Infrastructure as a service (IaaS)

Infrastructure as a service or IaaS is a type of cloud computing in which a service provider


is responsible for providing servers, storage, and networking over a virtual interface. In
this service, the user doesn’ t need to manage the cloud infrastructure but has control
over the storage, operating systems, and deployed applications.

Platform as a service (PaaS)

Platform as a service or PaaS is a type of cloud computing that provides a development


and deployment environment in cloud that allows users to develop and run applications
without the complexity of building or maintaining the infrastructure.

Software as a service (SaaS)

SaaS or software as a service allows users to access a vendor’ s software on cloud on a


subscription basis. In this type of cloud computing, users don’ t need to install or
download applications on their local devices. Instead, the applications are located on a
remote cloud network that can be directly accessed through the web or an API.

benefits of cloud

Reduced costs: Maintaining IT systems requires big outlays of capital, something that
cloud helps reduce. By using the resources provided by the cloud provider, businesses
avoid the need to purchase expensive infrastructure, substantially reducing their
expenditure.
Scalability: Cloud allows organizations to grow their users from merely a few to
thousands in a very short time. Depending on the need, a business can scale their storage
needs up or down, allowing organizations to be flexible.
Flexibility and collaboration: Since the data on cloud can be accessed directly via the
internet, it gives employees the ability to work from anywhere, anytime.
Business continuity: Cloud safely stores and protects your data in the event of an outage
or crisis. This makes it easier to resume work once the systems are up and running again.
Competitive edge: Cloud takes care of various business aspects, such as maintaining the
IT infrastructure, licensing software, or training personnel to manage your data.

Disadvantages

Downtime: Almost every cloud user will tell you that outages tops their list of cloud
computing challengesOpens a new window . At times, cloud service providers may get
overwhelmed due to the huge number of clients they provide services to each day.
Internet connection dependency: A user may not be able to access the data on cloud
without a good internet connection and a compatible device.

Financial commitment: Cloud providers use a pay-as-you-go pricing model. However,


businesses need to give a monthly or annual financial commitment for most subscription
plans.

Security risks: Even if your cloud service provider promises you that they have the most
reliable security certifications, there’ s always a chance of losing your data.

Limited access: A user may have minimal control since the cloud service provider owns
and manages the infrastructure.

Types of Cloud Computing

Private cloud

In a private cloud, the computing services are offered over a private IT network for the
dedicated use of a single organization. Also termed internal, enterprise, or corporate
cloud, a private cloud is usually managed via internal resources and is not accessible to
anyone outside the organization.

Public cloud

Public cloud refers to computing services offered by third-party providers over the internet.
Unlike private cloud, the services on public cloud are available to anyone who wants to
use or purchase them. These services could be free or sold on-demand, where users only
have to pay per usage for the CPU cycles, storage, or bandwidth they consume.

Hybrid cloud

Hybrid cloud uses a combination of public and private cloud features. The “ best of both
worlds” cloud model allows a shift of workloads between private and public clouds as
the computing and cost requirements change. When the demand for computing and
processing fluctuates, hybrid cloudOpens a new window allows businesses to scale their
on-premises infrastructure up to the public cloud to handle the overflow while ensuring
that no third-party data centers have access to their data.

What is the Internet of Things (IoT)?


Internet of Things, refers to the collective network of connected devices and the technology that
facilitates communication between devices and the cloud, as well as between the devices
themselves.

What is Industrial IoT?

Industrial IoT (IIoT) refers to smart devices used in manufacturing, retail, health, and other enterprises
to create business efficiencies. Industrial devices, from sensors to equipment, give business owners
detailed, real-time data that can be used to improve business processes. They provide insights on
supply chain management, logistics, human resource, and production – decreasing costs and
increasing revenue streams.

What are the applications of the IoT?

People and homes. People make direct use of IoT devices through technology
that can be worn, such as smartwatches and fitness trackers, and devices that
help make receiving and collecting information possible in real time.

Automobiles. Sensors within a moving vehicle make it possible to collect


real-time data about the vehicle and its surroundings. Autonomous vehicles use
different sensors in combination with advanced control systems to assess their
environments and consequently drive themselves.

Factories. With the application of IoT in factories, manufacturers can automate


repetitive tasks as well as access information on any part of the entire
manufacturing process. Information provided by sensors on factory
machineries can help in devising ways to make the entire production line more
efficient and less accident-prone.

Businesses. On a larger scale, with the adoption of IoT technologies,


businesses can be more cost-effective, efficient, and productive. For example,
office buildings can be fitted with sensors that can monitor elevator traffic or
overall energy consumption.

Cities. The combined uses of different IoT devices can cover urban and public
areas. IoT devices can gather data from and affect its environment to help
manage the various aspects of city governance, such as traffic control,
resource management, and public safety.

Difference between IIOT and IOT :

Applications of Artificial Intelligence


1. Artificial Intelligence in E-Commerce

Artificial Intelligence is widely used in the field of E-commerce as it helps the


organization to establish a good engagement between the user and the company.
Personalization: Using this feature, customers would be able to see those
products based on their interest pattern and that eventually will drive more
conversions.
Enhanced Support: It’ s very important to attend to every customer’ s query to
reduce the churn ratio and to empower that AI-powered chatbots are well capable of
handling most of the queries that too 24× 7
Dynamic Pricing Structure: It’ s a smart way of fluctuating the price of any
given product by analyzing data from different sources and based on which price
prediction is being done.
2. AI in Education Purpose
Educational sectors are totally organized and managed by human involvement till some
years back.
Voice Assistant: With the help of AI algorithms, this feature can be used in
multiple and broad ways to save time. provide convenience, and can assist users as
and when required.
Gamification: This feature has enabled e-learning companies to design attractive
game modes into their system so that kids can learn in a super fun way.
3. Artificial Intelligence in Robotics
Artificial Intelligence is one of the major technologies that provide the robotics field
with a boost to increase their efficiency.
NLP: Natural Language Processing plays a vital role in robotics to interpret the
command as a human being instructs. This enables AI algorithms & techniques such
as sentimental analysis, syntactic parsing, etc.
Object Recognition & Manipulation: This functionality enables robots to detect
objects within the perimeter and this technique also helps robots to understand the
size & shape of that particular object.
4. GPS and Navigations
GPS technology uses Artificial Intelligence to make the best route and provide the best
available route to the users for traveling.
Voice Assistance: This feature allows users to interact with the AI using a
hands-free feature & which allows them to drive seamlessly while communicating
through the navigation system.
Personalization (Intelligent Routing): The personalized system gets active based
on the user’ s pattern & behavior of preferred routes. Irrespective of the time &
duration, the GPS will always provide suggestions based on multiple patterns &
analyses.
Traffic Prediction: AI uses a Linear Regression algorithm that helps in preparing
and analyzing the traffic data. This clearly helps an individual in saving time and
alternate routes are provided based on congestion ahead of the user.
5. Healthcare
Artificial Intelligence is widely used in the field of healthcare and medicine.
Insights & Analysis: With the help of AI, a collection of large datasets, that
includes clinical data, research studies, and public health data, to identify trends and
patterns. This inversely provides aid in surveillance and public health planning.
Telehealth: This feature enables doctors and healthcare experts to take close
monitoring while analyzing data to prevent any uncertain health issues. Patients who
are at high risk and require intensive care are likely to get benefitted from this
AI-powered feature.
Patient Monitoring: In case of any abnormal activity and alarming alerts during
the care of patients, an AI system is being used for early intervention.

You might also like