0% found this document useful (0 votes)
57 views50 pages

Unit - 1 Notes

Uploaded by

firdaushjahan17
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
57 views50 pages

Unit - 1 Notes

Uploaded by

firdaushjahan17
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 50

Computer fundamental

UNIT: 1 INTRODUCTION TO COMPUTER

WHAT IS COMPUTER?
The word “computer” is comes from the word “TO COMPUTER” means to
calculate.
1. A computer is normally considered to be a calculation device which
canperform the arithmetic operations very speedily.
2. A computer may be defined as a device which operates upon the data.
3. Data can be in the form of numbers, letters, symbols, size etc.
And itcomes in various shapes & sizes depending upon the type of
computer application. A computer can store, process & retrieve data
as and when we desired.
4. The fact that computer process data is so fundamental that many
peoplehave started calling as “Data Processor”.
5.A computer first it gets the Data, does Process on it and then
produces Information.

WRITE DOWN THE CHARACTERISTICS OF COMPUTER

Some important characteristics of the computer are as follow:


Automatic:
o Computers are automatic machines because it works by itself
without human intervention.
o Once it started on a job they carry on until the job is finished.
o Computer cannot start themselves.
o They can works from the instructions which are stored inside the
system in the form of programs which specify how a particular job is
tobe done.

Accuracy:
o The accuracy of a computer is very high.
o The degree of accuracy of a particular computer depends upon its
design.
o Errors can occur by the computer. But these are due to human
weakness,due to incorrect data, but not due to the technological
weakness.
Speed:
o Computer is a very fact device. It can perform the amount of work in
few seconds for which a human can take an entire year.
o While talking about computer speed we do not talk in terms of
seconds and milliseconds but in microseconds.
o A powerful computer is capable of performing several billion (109)
simple arithmetic operations per second.

Diligence:
o Unlike human beings, a computer is free from monotony, tiredness &
lack of concentration.
o It can continuously work for hours without creating any error &
without grumbling.
o If you give ten million calculations to performed, it will perform
with exactly the same accuracy & speed as the first one.

Versatility:
o It is one of the most wonderful features about the computer.
o One moment it is preparing the results of a particular examination,
the next moment it is busy with preparing electricity bills and in
between it may be helping an office secretary to trace an important
letter in seconds.
No I.Q.
o A computer is not a magical device; it processes no intelligence of its
own.
o Its I.Q. is zero

DATA PROCESSING
o The term processing includes the activities like classifying,
storing,calculating, comparing or summarizing the data.
o The processing means to use techniques to convert the data
into meaningful information.
The Data Processing Cycle:

1. Data Processing cycle described all activities which are common


to alldata processing systems from manual to electronic systems.
2. These activities can be grouped in four functional categories, viz.,
data input, data processing, data output and storage, constituting what is
known as adata processing cycle.
3. The main aim of data processing cycle is to convert the data
intomeaningful information.
4. Data processing system are often referred to as Information System.
5. The Information System typically take raw Data as Input to
produceInformation as Output.

The data processing cycle contains main four functions:


o Data input
o Data process
o Data storage
o Data output

DATA INPUT
o The term input refers to the activities required to record data.
o It’s a process to entered data in to computer system.
o So before we input any data, it is necessary to check or
verify thedata context.

DATA OUTPUT
o It’s a communication function which transmits the
information tothe outside world.
o After completed the process the data are converted into the
meaningfulin
o Sometimes the output also includes the decoding
activity whichconverts the electronically generated
information into human readable form.
DATA STORAGE
o It involves the filling of data & information for future use.
EXPLAIN THE CLASSIFICATION OF THE COMPUTER
The computers are divided mainly three types on the based on data processed:
1. Analog computers
2. Digital computers
3. Hybrid computer

Analog computers:
1. In Analog Computers, data is represented as continuously
varyingvoltage and operate essentially by measuring rather
counting.
2. As the data is continuously variable, the results obtained are
estimatedand not exactly repeatable.
3. It can able to perform multiple tasks simultaneously and also
capable towork effectively.
4. Voltage, temperature and pressure are measured using
analogdevices like voltmeters, thermometers and
barometers.

Digital Computers
1. The digit computer is a machine based on digital technology
whichrepresents information by numerical digit.
2. In Digital Computers data is represented as discrete units of
electrical pulses. The data is measured in quantities represented as
either the ‘on’ or ‘off’state.Therefore, the results obtained from a
digital computer are accurate.
3. Virtually all of today’s computers are based on digital computers.

Hybrid Computers
1. It combines the good features of both analog & digital computers.
2. It has a speed of analog computer & accuracy of digital computer.
3. Hybrid Computers accept data in analog form and present
outputalso in digitally.
4. The data however is processed digitally.
5. Therefore, hybrid computers require analog-to-digital and
digital-to-analog converters for output.
EXPLAIN THE CLASSIFICATION OF THE COMPUTER BY
DATA PROCESSING:
The computers are classified in four types on the based on data processing.
1. Micro computer
2. Mini computer
3. Mainframe computer
4. Super computer

Micro Computer:
The cost of the super computer is depended on its processing capabilities &
configuration.
The speed of modern computer is measured in giga flops,
Tera flops and peta flops.
o giga flops= 109 arithmetic operation per second.
o Tera flops=1012 arithmetic operation per second.
o Peta flops=1015 arithmetic operation per second.
Ex: PARAM , EKA, BLUE GENE/P

Mini Computer:
1. Mini computers are originated in 1960s.
2. Small mainframes that perform limited tasks.
3. Less expensive than mainframe computer.
4. Mini computers are Lower mainframe in the terms of processing capabilities.
5. Capable of supporting 10 to 100 users simultaneously.
6. In 1970s it contains 8 bit or 12 bit processor.
7. Gradually the architecture requirement is grown and 16 and 32 bit.
8. Minicomputers are invented which are known as super mini
computers.Ex: IBM AS400
MainframeComputer:
1. A very powerful computer which capable of supporting thousands of
usersimultaneously.
2. It contains powerful data processing system.
3. It is capable to run multiple operating systems.
4. It is capable to process 100 million instructions per second.
5. Mainframes are very large & expensive computers with having larger
internal storage capacity & high processing speed.
6. Mainframes are used in the organization that need to process large
number oftransaction online & required a computer system having
massive storage & processing capabilities.
7. Mainly used to handle bulk of data & information for processing.
8. Mainframe system is housed in a central location with several user
terminalconnected to it.
9. Much bigger in size & needs a large rooms with closely
humidity &temperature.
10. IBM & DEC are major vendors of
mainframes.Ex : MEDHA, SPERRY, IBM,
DEC, HP.

Super Computer:
1. Most powerful & most expensive computer.
2. Used for complex scientific application that requires huge
processingpower. multiprocessor technology to perform the
calculation very speedy.
3. The cost of the super computer is depended on its
processingcapabilities &configuration.
4. The speed of modern computer is measured in gigaflops,
Tera flops and peta flops.
Giga flops= 109 arithmetic operation per
second. Tera flops=1012 arithmetic operation
per second. Peta flops=1015 arithmetic
operation per second.

Ex: PARAM , EKA, BLUE GENE/P


EXPLAIN THE GENERATION OF THE COMPUTERS.
In Computer language, “Generation” is a set of Technology. It provides a
frameworkfor the growth of the computer technology. There are totally Five
Computer Generations till today. Discussed as following.

First Generation:
 Duration: 1942-1955
 Technology: vacuum tube
o Used as a calculating device.
o Performed calculations in milliseconds.
o To bulky in size & complex design.
o Required large room to place it.
o Generates too much heat & burnt.
o Required continuously hardware maintenance.
o Generates much heat so must air-conditioner rooms are required.
o Commercial production is difficult & costly.
o Difficult to configure.
o Limited commercial use.
o ENIAC, EDVAC, EDSAC are example of 1st generation computer.

Second Generation:
 Duration: 1955-1964
 Technology: transistor
o 10 times Smaller in size than 1st generation system.
o Less heat than 1st generation computers.
o Consumed less power than 1st generation system.
o Computers were done calculations in microseconds.
o Air-conditioner is also required.
o Easy to configure than 1st generation computers.
o More reliable in information.
o Wider commercial use.
o Large & fast primary/secondary storage than 1st generation computers.
Third Generation:
 Duration: 1965-1975
 Technology: IC chip
o Smaller in size than 1st & 2nd generation computers.
o Perform more fast calculations than 2nd generation systems.
o Large & fast primary/secondary storage than 2nd generation computers.
o Air –conditioner is required.
o Widely used for commercial applications.
o General purpose computers.
o High level languages like COBOL & FORTAN are allowed to write
programs.
o Generate less heat & consumed less power than 2nd generation computer.

Fourth Generation:
 Duration: 1975-1989
 Technology: Microprocessor chip
o Based on LSI & VLSI microprocessor chip.
o Smaller in size.
o Much faster than previous generations.
o Minimum hardware maintenance is required.
o Very reliable as computer to previous generation computers.
o Totally general purpose computer.
o Easy to configure.
o Possible to use network concept to connect the computer together.
o NO requirement of air-conditioners.
o Cheapest in price.

Fifth Generation:
 Duration: 1989 to Present
 Technology: ULSI microprocessor chip
o Much smaller & handy.
o Based on the ULSI chip which contains 100 million electronic components.
o The speed of the operations is increased.
o Consumed less power.
o Air-conditioner is not required.
o More user friendly interface with multi-media features.
o High level languages are allowed to write programs.
o Larger & faster primary/secondary storage than previous generations.
EXPLAIN THE BLOCK DIAGRAM OF COMPUTER
OR EXPLAIN THE SIMPLE MODEL COMPUTER

A simple computer system comprises the basic components like Input Devices,
CPU
(Central Processing Unit) and Output Devices as under:

 Input Devices:
o The devices which are used to entered data in the computer
systems known as input devices.
o Keyboard, mouse, scanner, mike, light pen etc are example of input
devices.
The Input devices are the devices which are used to enter the data
in the computer system.
Keyboard, mouse, scanner, microphone are the example of input
devices.

FUNCTIONS OF INPUT DEVICES:


o Accept the data from the outside worlds.
o Convert that data into computer coded information.
o Supply this data to Central Processing Unit for further processing.

 Output Devices:
o The devices which display the result generated by the computer are
known as output devices.
o Monitor, printer, plotter, speaker etc are the example of output devices.

FUNCTIONS OF OUTPUT DEVICES

o Accept the result form the CPU.


o Convert that result into human readable form.
o Display the result on the output device.
 Memory Unit:
o The data & instruction have to store inside the computer before the
actual processing start.
o Same way the result of the computer must be stored before passed
to the output devices. This tasks performed by memory unit.

FUNCTIONS OF MEMORY UNIT


o Store data & instruction received from input devices.
o Store the intermediate results generated by CPU.
o Store the final result generated by CPU.

 Arithmetical & Logical Unit:


o The ALU is the place where actual data & instruction are processed.
o All the calculations are performed & all comparisons are made in ALU.
o Performs all arithmetical & logical operations.
o An arithmetic operation contains basic operations like addition,
subtraction,multiplication, division.
o Logical operations contains comparison such as less than, greater
than, less than equal to, greater than equal to, equal to, not equal to.

 Control Unit:
o It controls the movement of data and program instructions into and
out of the CPU, and to control the operations of the ALU.
o In sort, its main function is to manage all the activities within the
computer system.
o Controls the internal parts as well as the external parts related with
the computer.

 CPU:
o The Unit where all the processing is done is called as Central Processing
Unit.
o It contains many other units under it.
o Main of them are:- Control Unit And ALU (Arithmetic & Logic Unit)
What is Computer Memory?
Computer memory is just like the human brain. It is used to store data/information
and instructions. It is a data storage unit or a data storage device where data is to be
processed and instructions required for processing are stored. It can store both
the input and output can be stored here.

Characteristics of Computer Memory


 It is faster computer memory as compared to secondary memory.
 It is semiconductor memories.
 It is usually a volatile memory, and main memory of the computer.
 A computer system cannot run without primary memory.

Types of Computer Memory


In general, computer memory is of three types:
1. Primary memory
2. Secondary memory
3. Cache memory

1. Primary Memory

It is also known as the main memory of the computer system. It is used to store data
and programs or instructions during computer operations. It uses semiconductor
technology and hence is commonly called semiconductor memory. Primary memory
is of two types:
 RAM (Random Access Memory): It is a volatile memory. Volatile
memorystores information based on the power supply. If the power supply
fails/ interrupted/stopped, all the data and information on this memory will
be
lost. RAM is used for booting up or start the computer. It
temporarilystores programs/data which has to be executed by the
processor.
 It is also called read-write memory or the main memory or the primary memory.
 The programs and data that the CPU requires during the execution of a
program are stored in this memory.
 It is a volatile memory as the data is lost when the power is turned off.
 RAM is of two types:
o S RAM (Static RAM): S RAM uses transistors and the circuits of this
memory are capable of retaining their state as long as the power is applied.
This memory consists of the number of flip flops with each flip flop storing 1 bit.
It has less access time and hence, it is faster.
o D RAM (Dynamic RAM): D RAM uses capacitors and transistors and
stores the data as a charge on the capacitors. They contain thousands of
memory cells. It needs refreshing of charge on capacitor after a few
milliseconds. This memory is slower than S RAM.

2. ROM (Read Only Memory): It is a non-volatile memory. Non-volatile memory


stores information even when there is a power supply failed/
interrupted/stopped. ROM is used to store information that is used to operate
the system. As its name refers to read-only memory, we can only read the
programs and data that is stored on it. It contains some electronic fuses that
can be programmed for a piece of specific information. The information stored
in the ROM in binary format. It is also known as permanent memory.

 Stores crucial information essential to operate the system, like the program
essential to boot the computer.
 It is non-volatile.
 Always retains its data.
 Used in embedded systems or where the programming needs no change.
 Used in calculators and peripheral devices.
 ROM is of four types:

MROM(Masked ROM): Hard-wired devices with a pre-programmed collection


of data or instructions were the first ROMs. Masked ROMs are a typeof low-cost
ROM that works in this way.
o PROM (Programmable Read Only Memory): This read-only memory is
modifiable once by the user. The user purchases a blank PROM and uses
a PROM program to put the required contents into the PROM. Its content can’t
be erased once written.
o EPROM (Erasable Programmable Read Only Memory): EPROM is an
extension to PROM where you can erase the content of ROM by exposing it to
Ultraviolet rays for nearly 40 minutes.
o EEPROM (Electrically Erasable Programmable Read Only
Memory): Here the written contents can be erased electrically. You can delete
and reprogramme EEPROM up to 10,000 times. Erasing and programming take
very little time, i.e., nearly 4 -10 ms(milliseconds). Any area in an EEPROM
can be wiped and programmed selectively.

Difference between RAM and ROM


Both RAM and ROM are the primary memories of the computer, however they are
quite different from each other. The important differences between Random
Access Memory (RAM) and Read Only Memory (ROM) are highlighted in the
following table −

Parameter RAM ROM

RAM stands for


Full Form Random Access ROM stands for Read Only Memory.
Memory.
RAM is a primary
memory of the
ROM is a primary memory of the
computer that
computer that stores those computer
Definition stores those data
instructions and programs that do not
and instructions on
need to be altered in future like BIOS.
which the CPU is
currently working.
RAM is a volatile
memory. Which ROM is a non-volatile memory that
Nature means it stores means it stores data permanently
data as long as even when power is off.
power is on.
The CPU of the
Data computer can read, CPU can only read data from ROM,
Access write, or alter the but it can write or change.
data on RAM.
RAM is used to
store data that CPU
ROM is used to store data that in
Usage needs for current
needed to bootstrap the computer.
instruction
processing.
There are two major
types of RAM
available – SRAM Three types of ROM available –
(Static Random PROM (Programmable ROM),
Types
Access Memory) EPROM (Erasable PROM), and
and DRAM EEPROM (Electrically EPROM).
(Dynamic Random
Access Memory).
The speed of RAM The speed of ROM is slower than
Speed
is quite high. RAM.
CPU can access
CPU data stored on RAM Data to be copied from ROM to RAM
Access directly. so that CPU can access its data.
RAM memory is
ROM is generally small and of low
Capacity large and high
capacity.
capacity.
RAM is used as
ROM is used as firmware by
Used as CPU Cache,
microcontrollers.
Primary Memory.
Cost RAM is costly. ROM is not so expensive.

2. Secondary Memory

It is also known as auxiliary memory and backup memory. It is a non-volatile memory


and used to store a large amount of data or information. The data or information
stored in secondary memory is permanent, and it is slower than primary
memory. A CPU cannot access secondary memory directly. The data/information from
the auxiliary memory is first transferred to the main memory, and then the CPU can
access it.
Characteristics of Secondary Memory
 It is a slow memory but reusable.
 It is a reliable and non-volatile memory.
 It is cheaper than primary memory.
 The storage capacity of secondary memory is large.
 A computer system can run without secondary memory.
 In secondary memory, data is stored permanently even when the power is off.

Types of Secondary Memory


1. Magnetic Tapes: Magnetic tape is a long, narrow strip of plastic film with a thin,
magnetic coating on it that is used for magnetic recording. Bits are recorded on
tape as magnetic patches called RECORDS that run along many tracks.
Typically, 7 or 9 bits are recorded concurrently. Each track has one read/write
head, which allows data to be recorded and read as a sequence of characters. It
can be stopped, started moving forward or backward, or rewound.
2. Magnetic Disks: A magnetic disk is a circular metal or a plastic plate and these
plates are coated with magnetic material. The disc is used on both sides. Bits are
stored in magnetized surfaces in locations called tracks that run in concentric rings.
Sectors are typically used to break tracks into pieces.
3. Optical Disks: It’s a laser-based storage medium that can be written to and
read. It is reasonably priced and has a long lifespan.
3. Cache Memory

It is a type of high-speed semiconductor memory that can help the CPU run
faster. Between the CPU and the main memory, it serves as a buffer. It is used
to store thedata and programs that the CPU uses the most frequently.

Key Features of Cache Memory

1. Speed: Faster than the main memory (RAM), which helps the CPU
retrieve datamore quickly.
2. Proximity: Located very close to the CPU, often on the CPU chip itself,
reducing data access time.
3. Function: Temporarily holds data and instructions that the CPU is
likely to useagain soon, minimizing the need to access the slower main
memory.

Types of Cache Memory

1. L1 or Level 1 Cache: It is the first level of cache memory that is present inside
the processor. It is present in a small amount inside every core of the processor
separately. The size of this memory ranges from 2KB to 64 KB.
2. L2 or Level 2 Cache: It is the second level of cache memory that may present
inside or outside the CPU. If not present inside the core, It can be shared between
two cores depending upon the architecture and is connected to a processor with the
high-speed bus. The size of memory ranges from 256 KB to 512 KB.
3. L3 or Level 3 Cache: It is the third level of cache memory that is present outside
the CPU and is shared by all the cores of the CPU. Some high processors may
have this cache. This cache is used to increase the performance of the L2 and L1
cache. The size of this memory ranges from 1 MB to 8MB.

Advantages of Cache Memory


 It is faster than the main memory.
 When compared to the main memory, it takes less time to access it.
 It keeps the programs that can be run in a short amount of time.
 It stores data in temporary use.

Disadvantages of Cache Memory


1. Because of the semiconductors used, it is very expensive.
2. The size of the cache (amount of data it can store) is usually small.
LANGUAGES PROCESSOR/TRANSLATOR, SOFTWARE PACKAGES

 Computer Languages can be classified into three broad categories:

WHAT IS MACHINE LANGUAGE?

Computer programs are written using many different computer Languages


but the language which is understood by the computer without translating
program is called machine language.
Machine language is normally written as string of binary 1s and 0s.
A machine language instruction has two part format.

OPCODE OPERAN
(OPERATION D
CODE) (ADDRES
S)

The 1st part is the operation code which tells the computer what function
to be performed.

The 2nd part is the operand which tells the computer where to find & store
data to be manipulated.

So each instruction tells the computer what operation to perform & the
length &location of the data field which are involved in the operation

Advantages
1. Programs can be executed immediately upon completion because it
doesn’t require any translation.
2. Now extra storage space is needed.
3. Programmer has complete control over the performance of the
hardware.

Disadvantage
1. Tedious to program
2. Difficult to program
3. Difficult to modify
4. Time consuming to code
5. Error prone
EXPLAIN ASSEMBLY LANGUAGE

Assembly language is a language which allows instruction & storage


location to be represented by letters & symbols, instead of number.

A program written in an assembly language is called assembly language


program or symbolic program.

Assembly language was introduced in 1952.

Machine language was tedious to code and errors were expected to arise in
bulk.
To solve these problems mnemonic codes and symbolic addresses were
developed.
The storage locations are to be represented in the form of alphanumeric
addresses instead of numeric address.

Format of assembly language is similar to machine language:

MNEMONIC CODE SYMBOLIC ADDRESS

Example of Assembly language instruction:

This instruction adds value of NUM1 to the AX (Accumulator Register).


The symbolic language made program writing so much easier for the
Programmers but it must be translated into machine code before being used for
operation.
The translation is actually done by a special translating
program.
Assembler

Assembler is a special program (translator) which translates symbolic


operation codes into machine codes, and symbolic address is addressed into an
actual machine address.

Advantage
1. Easier to use, code and understand.
2. Easier to correct error.
3. Easier to modify.
4. No worry about addresses.
5. Easily relocatable.
6. Efficiency of machine language.
7. Can use Macros (Macro is a bunch of instruction referred as a single name)

Disadvantage
1. Machine depended.
2. Programs have to be translated before execution.
3. Translation of programs takes up time.
4. Knowledge of hardware is required.
5. Additional storage area needed for the source programs and object code.

Examples of Assembly Language


Microsoft Assembly Language (MASM), Turbo Assembler

WRITE A NOTE ON HIGH LEVEL LANGUAGE.

1. The machine language & assembly language requires a


goodknowledge of internal structure of computer.
2. The both languages are machine dependent & it is difficult to solve error.
3. To remove this limitation the high level language are introduce
4. The high level language programs do not require any knowledge of
internal structure of computer so the programmer concentrate on the logic
of problem rather than internal structure of computer.
5. It enables the programmer to write instructions using English words
& familiar mathematical symbols & expression so the program makes
easier tocode & understand.
6. It requires a translator program to convert high level
program intomachine language.
Compiler

Compiler is a special program (translator) which translates high level


programs into machine codes.

Advantages:
1. Machine independent.
2. Easier to learn, use and understand.
3. Easier to correct error.
4. Easier to maintain.
5. Less time & efforts.
6. Easily relocatable.
7. Program preparation cost is low.

SHORT NOTE: ASSEMBLER


 A computer can directly execute only machine language programs so
the assembly language program must be converted into its equivalent
machine language program before can be executed.
 This translation is done with the help of a translator program which is
known as assembler.
 Assembler is a special program (translator) which translates symbolic
operation codes into machine codes, and symbolic address is addressed into
anactual machine address.

(Source Program) ONE TO ONE CORRESPONDENCE (Object Program)

 As shown in figure that the input to assembler is the assembly language


program(source program) and the output is the machine language program
(object program).
 Assembler translates each assembly language instruction into
equivalent machine language instruction.
 There is one to one correspondence between the assembly language
instructions of source program & the machine language instruction of its
equivalent object program.
 In case of assembly language program the computer not only has to
run the program but also must first run assembler program to translate
the original assembly language program into machine language
program.
 So the computer has to spend more time in getting desired answer.

WRITE A NOTE ON COMPILER


 A computer can directly execute only machine language programs.
 So the high level language program must be converted into its
 Equivalent machine language program before can be executed.
 This translation is done with the help of a translator program which is
known as compiler.
 A compiler is a translator program which translates a high level
language program into equivalent machine language program.
 The process of translating is shown in below figure:

(Source Program) ONE TO MANY CORRESPONDENCE (Object Program)

 As shown in figure that the input to compiler is the high level language
program(source program) and the output is the machine language
program (object program).
 High level language instructions are macro instructions.
 The compiler translates each high level language instruction into set ofmachine
language instructions rather than a single machine language instruction.
 There is one to many correspondence between high level languageinstructions
of source program into equivalent object program.
 During the translation the source program is only translates not executed.
 A compiler can translates only those source programs which have written
in the language for which compiler is designed.
 A compiler can also detect & indicates the syntax errors during the compilation
process but cannot able to detect logical errors

WRITE A NOTE ON INTERPRETER.


 An interpreter is another type of translator which is used for translating
program written using high level languages.
 It takes one statement of high level language, translates into machine
language & immediately executes the resulting machine language
instructions.
 The main difference between compiler & interpreter is that compiler
can translates the entire code but not involve in execution.
 Interpreter translates & executes a high level language program
statement-by-statement.
 A program statement is reinterpreted every time it is encountered during
program execution.
 The main advantage of interpreter is that interpreter makes it easier &
faster to correct programs.
 The main disadvantage is that interpreter is slower than compilers when
running a finished program.
What is a Software?
In a computer system, the software is basically a set of instructions or
commands that tell a computer what to do. In other words, the software is a
computer program that provides a set of instructions to execute a user’s
commands and tell the computer what to do. For example like MS-Word, MS-
Excel, PowerPoint, etc.

System Software
 System software is a set of one or more programs designed to control the
operation and extend the processing capability of a computer system.
 System software makes the operation of a computer system more effective
and efficient.

Types of system software -

• Operating system – It takes care of effective and utilization


of all hardware and software components of a computer system.
Example - DOS, WINDOWS, UNIX.

• Programming language translators – It transform the instructions


prepared by programmers in a programming language into a form
that can be interpreted and executed by a computer system.
Example- Assembler, Compiler & Interpreter

• Communication Software – In a network environment


communications software enables transfer of data and programfrom
one computer system to another.

• Utility Programs- It is a set of programs that help user in system


maintenance tasks and in performing tasks of routine nature.
Example- Format, Backup, Restore, Zip, Unzip & Anti virus

What is an Application Software?


A computer software which is developed to perform a specific function is known
as an application software. Application software are also called end-user software
because they are designed to use by users of the computer.
An application software may be a set of computer programs or a single computer
program. These software provide the required functionality for a specific purpose.
Thus, a computer user uses these software to accomplish a specific task.

Features of Application Software

 Application software is written in a high-level language.


 Application software requires more storage space than system software.
 Only a single task is performed by each application software.
 Application Software is easy to build in comparison to system software.

Types of Application Software


1. General Purpose Software: This Application Software is used to
perform tasksthat are used for a variety of tasks, just not limited to a specific
task only. For Example, MS Word, MS Excel, etc.
2. Customized Software: It is used to perform tasks that are designed for
specificorganizations. For Example, Railway Reservation System, Airline
Reservation System, etc.
3. Utility Software: It is used to support the architecture of the
Computer. It is designed for optimizing and maintaining the system and
also taking care of itsrequirements.

Difference between System Software and Application Software

Parameter System Software Application Software

Application Software is
System Software is the
the type of software
type of software which is
which runs as per user
Definition the interface between
request. It runs on the
application software and
platform which is provide
system. by system software.
In case of Application
In general, System
software, high level
software are developed
language is used for their
Development using low-level language
development as they are
Language which is more compatible
developed as some
with the system hardware
specific purpose
in order to interact with.
software.

System software are Application software are


essential for operating the not essential for the
computer hardware. operation of the
Necessity
Without these software, a computer. These are
computer even may not installed as per the user’s
start or function properly. requirements.

System software is used Application software is


Usage for operating computer used by user to perform
hardware. specific task.

System software are


Application software are
installed on the computer
Installation installed according to
when operating system is
user’s requirements.
installed.
System software are
specific to system Users can interact with
User hardware, so less or no an application software
interaction user interaction available with the help of a User
in case of system Interface (UI).
software.
An application software
System software can run
cannot run
independently. It provides
Dependency independently. It cannot
platform for running
run without the presence
application software.
of system software.
Examples of system Examples of application
software include software include word
Examples operating systems, processors, web
compilers, assemblers, browsers, media players,
debuggers, drivers, etc. etc.
CONCEPT OF IT
Information Technology is the use of computer systems, storage devices, and
any other type of physical device to manage exercise, store, and retrieve all
types of data transmitted over electronic lines or electronic data. We can clearly
see the growth of information technology in today’s world, and the main reason
for this growth is the increased use of technology.

Applications of Information Technology :


1. Healthcare

With a simple definition, health care is a massive and complex industry. Information
technology has already made significant contributions to the field of health care, and
advancements are still being made.
Doctors can now send patients’ live health conditions to different specialists via the
cloud and get suggestions
With the use of virtual charts, health professionals can now easily compare health
data (X-rays, test results)
Hospitals can keep a disease registry and publish reports to the government.
Doctors can send patients E-Prescriptions via email, Whats app, or text message.
Many medical facilities offer Tele health services, in which patients can
communicate with doctors via the internet.

2. Education

The education industry has undergone significant change as a result of advances in


information technology. More students are now eager to enroll in schools, owing to
the administration’s use of cutting-edge technology in the classrooms. Online e-
libraries where students can download e books and resources:
Online exams where students can write exams and submit documents to mentors.
Ready-to-use resources that enable students to learn any subject at any time and in
any location.
An online ranking system allows students to compete with students from all over the
world.

3. Communications

The advancement of information technology has made the world a smaller place,
and the entire world is now connected. Data can now be shared anywhere in the
world, regardless of geographical location. Many organizations have been able to
transfer terabytes of data in seconds, increasing not only productivity but also
saving a significant amount of time and manpower.
4. Employment

Every day, we could see hundreds of job openings from all over the world. Software
engineers, data scientists, cloud analysts, designers, and developers are all
involved in data management in some way. We would never see the above
positions if it weren’t for information technology.

5. Security

Because the entire data is stored on the cloud, and physical devices, and there is a
lot of data transferring involved, it is critical to safeguard all of the data.IT aids in the
secure reading and transfer of data via risk-free network channels. IT also aids in
data security through the use of passwords, facial recognition, and fingerprint
recognition.

6. Governance

The concept of E-Governance is currently transforming the lives of millions of


people all over the world. The digitization of government activities has made the
administration more accountable and responsive to societal issues. Even remote
areas with no internet access are being recognized by the government, and
authorities are providing the necessary resources to the people.

7. Entertainment

Information Technology has brought about significant changes in all of our lifestyles .
IT has introduced a plethora of new entertainment options into our lives. People can
now watch their favourite shows and movies and listen to music via cable or wireless.
People can now watch 3D and even 7D movies, special audio systems, and even
access global radio channels thanks to technological advancements.

8. Finance:

IT has transformed the way we manage our finances, making it easier to access
banking services and invest in the stock market. Online banking has made it
possible to check account balances, transfer funds, and pay bills from anywhere in
the world. Investment platforms like Robin hood, Acorns, and Betterment have
made it easier for people to invest their money and manage their portfolios.

What is ICT?
The combination of numerous technologies used to alter, store, transmit, and
disseminate information is referred to as information and communication technology
(ICT). It includes a broad range of tools, programs, and services that cooperate to
manage and transfer data, voice, and multimedia information. ICT is essentially the
framework that drives the digital era.

Key Components of ICT


1. Hardware: The actual components that make up ICT are its foundation.
These include devices like computers, servers, networking gear,
smartphones, and a myriad of other technology. The processing and
transmission of software and dataare supported by hardware.
2. Software: The intelligent agents that give hardware life are software programs.
Operating systems, programs, and algorithms let us carry out a variety of
operations,including as sending emails and executing sophisticated simulations.
Software is what makes information and communications technology work.
3. Data: The foundation of ICT is data. It consists of all the data that digital
systems process, store, and communicate. This information may be
presented in text, pictures, videos, and other formats. Data management,
security, and analysis areessential components of ICT.
4. Networking: To connect devices and enable communication, ICT heavily
relies on networks. The backbone of global connection is composed of Local
Area Networks (LANs), Wide Area Networks (WANs), and the internet itself.
The seamless global flow of data is made possible by networking technology.
5. Services: ICT services cover a wide range of products and services, including
cloudcomputing, online entertainment, and digital security. To benefit both
organizations and consumers, these services make use of the networks,
software, and hardware that are already in place.

The Impact of ICT on Society :


It is impossible to overestimate how much ICT has affected contemporary society.
Hereare a few significant ways that ICT has improved our lives:
1. Improved Communication: ICT has completely transformed how we
communicate.Real-time connections with people all over the world are now
available because to instant messaging, video conferencing, and social media.
2. Greater Productivity: Businesses have profited immensely from ICT
thanks to automated processes, improved work flows, and easy access to
important data. Efficiency and competitiveness have grown as a result of
this.
3. Information Access: The internet, an ICT creation, has democratized
information access. Access to a wealth of information and resources is available
to anybody witha connected device.
4. E-commerce: Online shopping and digital payment methods have changed the
retailscene, providing customers and companies with ease and a global market.
5. Education and health care: ICT has altered health care through tele medicine
and e-learning platforms, increasing knowledge and access to health care
services.
6. Entertainment and media: With the advent of on-demand streaming,
digital publishing, and immersive experiences, ICT has completely
transformed the entertainment sector

What Is Cloud Computing

Cloud Computing means storing and accessing the data and programs on remote
servers that are hosted on the internet instead of the computer’s hard drive or local
server. Cloud computing is also referred to as Internet-based computing, it is a
technology where the resource is provided as a service through the Internet to the user.
The data that is stored can be files, images, documents, or any other storable
document.
The following are some of the Operations that can be performed with Cloud Computing
 Storage, backup, and recovery of data
 Delivery of software on demand
 Development of new applications and services
 Streaming videos and audio

Architecture Of Cloud Computing

Cloud computing architecture refers to the components and sub-components required


for cloud computing. These components typically refer to:
1. Front end ( Fat client, Thin client)
2. Back-end platforms ( Servers, Storage )
3. Cloud-based delivery and a network ( Internet, Intranet, Inter cloud )

Types of Cloud Computing Services

The following are the types of Cloud Computing:


1. Infrastructure as a Service (IaaS)
2. Platform as a Service (PaaS)
3. Software as a Service (SaaS)
4. Function as as Service (FaaS)

Advantages of Cloud Computing:

The following are main advantages of Cloud Computing:


1. Cost Efficiency: Cloud Computing provides flexible pricing to the users with the
principal pay-as-you-go model. It helps in lessening capital expenditures of
Infrastructure, particularly for small and medium-sized businesses companies.
2. Flexibility and Scalability: Cloud services facilitate the scaling of resources
based on demand. It ensures the efficiency of businesses in handling various
workloads without the need for large amounts of investments in hardware during
the periods of low demand.
3. Collaboration and Accessibility: Cloud computing provides easy access to
data and applications from anywhere over the internet. This encourages
collaborative team participation from different locations through shared documents
and projects in real-time resulting in quality and productive outputs.
4. Automatic Maintenance and Updates: AWS Cloud takes care of the
infrastructure management and keeping with the latest software automatically
making updates they is new versions. Through this, AWS guarantee the companies
always having access to the newest technologies to focus completely on business
operations and innovations.

Artificial Intelligence refers to the simulation of human intelligence in machines that


are programmed to think, reason, and learn like humans. Rather than being
explicitly programmed for specific tasks, AI(Artificial Intelligence) systems use
algorithms andvast amounts of data to recognize patterns, make decisions, and
improve their performance over time.

Artificial intelligence (AI) enables machines to learn from data and recognize
patternsin it, to perform tasks more efficiently and effectively. AI works in five steps:
 Input: Data is collected from various sources. This data is then sorted into
categories.
 Processing: The AI sorts and deciphers the data using patterns it has been
programmed to learn until it recognizes similar patterns in the data.
 Outcomes: The AI can then use those patterns to predict outcomes.
 Adjustments: If the data sets are considered a “fail,” AI learns from that mistake,
and the process is repeated again under different conditions.
 Assessments: In this way, AI is constantly learning and improving.
TYPES OF ARTIFICIAL INTELLIGENCE:

1. Narrow AI (ANI) : Narrow AI, also known as Artificial Narrow Intelligence (ANI),
refers to AI systems designed to handle a specific task or a limited range of
tasks.These systems operate under constrained and predefined conditions,
excelling in their specific domains but lacking the ability to perform beyond their
programmed capabilities.
2. General AI (AGI) : General AI, or Artificial General Intelligence, refers to AI
systems that possess the ability to understand, learn, and apply intelligence across
a broad range of tasks, mirroring human cognitive abilities. AGI can theoretically
apply learned knowledge to solve novel problems and perform tasks involving
general reasoning without prior training specifically for those tasks.
3. Superintelligent AI (ASI) : Super intelligent AI, or Artificial Super intelligence,
represents an AI that not only mimics but significantly surpasses human
intelligence across all fields — science, general wisdom, social skills, and more.
ASI would be capable of extraordinary problem-solving and creative abilities, far
beyond what current human minds can achieve.

APPLICATION OF ARTIFICIAL INTELLIGENCE:

1. Transportation – AI is used for autonomous vehicles by developing self-driving


cars that can navigate roads without human input. Companies like Way-mo and
Tesla are developing self-driving car technology.
2. Customer service – AI-powered chat bots are used to answer customer
questions and provide support. For instance, many banks use chat bots to
answercustomer questions about their accounts and transactions.
3. Security – AI is used for facial recognition by identifying people from images or
videos. This technology is used for security purposes, such as identifying criminals
or unauthorized individuals.
4. Marketing – AI is used for targeted advertising by showing ads to people who
are most likely to be interested in the product or service being advertised. For
example, social media companies use AI to target ads to users based on their
interests and demographics.
5. Education – AI is used for personalized learning by tailoring educational content
to the individual needs of each student. For example, AI-powered tutoring systems
can provide students with personalized instruction and feedback
6. Health care – AI is used for medical diagnosis by analyzing medical images
likeX-rays and MRI to identify diseases. For instance, AI systems are being
developed to detect skin cancer from images with high accuracy.
7. Finance – AI helps in credit scoring by analyzing a borrower’s financial history
and other data to predict their creditworthiness. This helps banks decide whether to
approve a loan and at what interest rate.
What is Machine Learning?
Machine Learning, often abbreviated as ML, is a subset of artificial intelligence (AI)
that focuses on the development of computer algorithms that improve automatically
through experience and by the use of data. In simpler terms, machine learning enables
computers to learn from data and make decisions or predictions without being explicitly
programmed to do so.

How does Machine Learning work

A machine learning system builds prediction models, learns from previous data, and
predicts the output of new data whenever it receives it. The amount of data helps to
build a better model that accurately predicts the output, which in turn affects the
accuracy of the predicted output.

Let's say we have a complex problem in which we need to make predictions. Instead of
writing code, we just need to feed the data to generic algorithms, which build the logic
based on the data and predict the output. Our perspective on the issue has changed
as a result of machine learning. The Machine Learning algorithm's operation is
depicted in the following block diagram:

Classification of Machine Learning

At a broad level, machine learning can be classified into three types:

1. Supervised learning
2. Unsupervised learning
3. Reinforcement learning

Supervised Learning

In supervised learning, sample labeled data are provided to the machine learning
system for training, and the system then predicts the output based on the training data.
The system uses labeled data to build a model that understands the data sets and
learns about each one. After the training and processing are done, we test the model
with sample data to see if it can accurately predict the output.

Supervised learning can be grouped further in two categories of algorithms:


o Classification
o Regression

2) Unsupervised Learning

Unsupervised learning is a learning method in which a machine learns without any


supervision.

The training is provided to the machine with the set of data that has not been labeled,
classified, or categorized, and the algorithm needs to act on that data without any
supervision. The goal of unsupervised learning is to restructure the input data into new
features or a group of objects with similar patterns.

In unsupervised learning, we don't have a predetermined result. The machine tries to


find useful insights from the huge amount of data. It can be further classifieds into two
categories of algorithms:

o Clustering
o Association

3) Reinforcement Learning

Reinforcement learning is a feedback-based learning method, in which a learning


agent gets a reward for each right action and gets a penalty for each wrong action. The
agent learns automatically with these feedbacks and improves its performance. In
reinforcement learning, the agent interacts with the environment and explores it. The
goal of an agent is to get the most reward points, and hence, it improves its
performance.

Applications of Machine learning

1. Image Recognition:

Image recognition is one of the most common applications of machine learning. It is


used to identify objects, persons, places, digital images, etc. The popular use case of
image recognition and face detection is, Automatic friend tagging suggestion:

Facebook provides us a feature of auto friend tagging suggestion. Whenever we


upload a photo with our Facebook friends, then we automatically get a tagging
suggestion with name, and the technology behind this is machine
learning's face detection and recognition algorithm.

2. Speech Recognition
While using Google, we get an option of "Search by voice," it comes under speech
recognition, and it's a popular application of machine learning.

Speech recognition is a process of converting voice instructions into text, and it is also
known as "Speech to text", or "Computer speech recognition." At present, machine
learning algorithms are widely used by various applications of speech
recognition. Google assistant, Siri, Cortana, and Alexa are using speech recognition
technology to follow the voice instructions.

3. Traffic prediction:

If we want to visit a new place, we take help of Google Maps, which shows us the
correct path with the shortest route and predicts the traffic conditions.

It predicts the traffic conditions such as whether traffic is cleared, slow-moving, or


heavily congested with the help of two ways:

o Real Time location of the vehicle form Google Map app and sensors
o Average time has taken on past days at the same time.

5. Self-driving cars:

One of the most exciting applications of machine learning is self-driving cars. Machine
learning plays a significant role in self-driving cars. Tesla, the most popular car
manufacturing company is working on self-driving car. It is using unsupervised learning
method to train the car models to detect people and objects while driving.

Stock Market trading:

Machine learning is widely used in stock market trading. In the stock market, there is
always a risk of up and downs in shares, so for this machine learning's long short
term memory neural network is used for the prediction of stock market trends.

QUANTUM COMPUTER
A quantum computer is a device performing quantum computations. It manipulates
the quantum states of qubits in a controlled way to perform algorithms. A universal
quantumcomputer is defined as a machine that is able to adopt an arbitrary quantum
state from an arbitrary input quantum state.
Advantages:
Speed: Quantum computers can perform certain calculations much faster than
classical computers, making them well-suited for tasks that involve a large amount
ofdata or complex mathematical calculations.
Parallelism: Quantum computing allows for the parallel processing of information,
which means that multiple computations can be performed simultaneously. This can
significantly speed up certain tasks, such as searching large databases.
Cryptography: Quantum computing has the potential to break many of the
encryption methods currently used to secure data. However, it also has the potential
to develop new and more secure encryption methods, which could be more resistant
to attacks byhackers.
Chemistry: Quantum computing can simulate the behavior of molecules at a level
of detail that is not possible with classical computing. This could lead to new
discoveries in drug design, materials science, and other areas.

Applications of Quantum Computing:

There are many possible applications of Quantum Computers across various fields.
Let’s see some of these now:
1. Health care: Want a medicine tailored to your unique DNA structure and
genomes?This could potentially be possible using Quantum Computing. Studying
the complete DNA of an organism requires a large amount of computational power
and storage space which is quite difficult to accomplish using Classical Computing.
However, Quantum Computing would make this process much easier allowing us to
understand individual DNA at a much deeper level and also cure many genetic
diseases.
2. Finance: Finance involves market prediction in order to make more money!
Now there are many algorithms that use multiple probabilities and assumptions to
calculatethe future market trends. Quantum Computers can be immensely helpful in
this scenario as they can eliminate the blind spots and errors in the data which leads
to wrong financial forecasts (And thus a loss of money!)
3. Cyber security: Do you know that the insane speed of Quantum Computers
could be used to crack the cryptography codes that keep our messages and
sensitive data asecret? But at the same time, Quantum Computers could also be
used to protect the data from hacking using Quantum Encryption. It involves sending
photons over long distances using the Entanglement Principle to secure the data.
4. Agriculture: Fertilizers are very important in Agriculture!!! And they are made
primarily of Ammonia. But did you know that we still use a technique from the 1900s
tocreate Ammonia which requires extreme pressure and heat? And no new process
for creating Ammonia has been discovered as there are millions of possible catalyst
combinations to try. Solving this problem on a Classical Computer may take ages
but this can easily and speedily be done on a Quantum Computer.
5. Artificial Intelligence: Artificial Intelligence is interesting on its own and Quantum
Computing could make it almost magically diverse. Complex algorithms could be
created on Quantum Computers that may be able to map out trillions of neurons in the
human brain and contribute hugely in the field of neural networks. Also, Quantum
Computing could be used in combination with ML to create IoT devices that are deeply
interconnected with insanely complicated cyber security protocols.

What Is G Suite?
G Suite (formerly Google Apps) for Work is a suite of web applications created by
Google for businesses. Your G Suite account will give you access to G mail on your
preferred domain and 30GB of Google Drive storage per user. Through G Suite, you
will also have access to a number of powerful Google applications: Calendar, Docs,
Sheets, Slides, Forms, Sites, Hangouts, and Plus.

G Suite for Work gives you professional email, online storage, shared calendars,
video meetings, and more. Google Apps makes collaboration simple and effective.
You will have the ability to share spreadsheets and documents, create video
conferences with Hangouts, and use instant messaging. You can also share
calendars with others, making meetings easy to plan.

Ideally suited for small businesses, G Suite will provide you with many tools to help
you succeed. One benefit is that G Suite includes some great mobile tools. All of the
apps are available on mobile phones and tablets (iOS or Android), as well as
Windows, Mac, or Linux computers.

G Suite is one part of Google Cloud along with the Google Cloud Platform, like,
compute, storage, networking, security, server less, and machine learning tools that
you can rent in the cloud. In addition to Cloud, Google has other apps for users, like
Search, Chrome, YouTube, and Android.
Google has made lots of techs available to us in the form of APIs. We can use them to
build our next web app, mobile app, or more likely both. The hub of Google API
activity is the Google Cloud Platform console that you access
at console.cloud.Google.com. It’s where you manage your apps, called “projects.”
Mostof its features are for Google Cloud Platform, like choosing which GCP tools to
use, managing GCP billing, managing other project developers, and selecting the
APIs you’ll use.

Office suite of collaborative apps

With G Suite Basic, you and the other users in your organization get:

 G mail: Send and receive mail using your professional address, as


inbob@yourcompany.com
 Drive: Store and back up files securely in the cloud
 Calendar: Share calendars to easily schedule meetings and events
 Docs: Collaborate in real-time on online documents, spreadsheetsMeet: Join video
meetings from their laptop or other device

Internet of Things (IoT)


IoT stands for Internet of Things. It refers to the interconnections of physical devices,
such as appliances and vehicles, that are embedded with software, sensors, and
connectivity which enables these objects to connect and exchange data. This
technology allows for the collection and sharing of data from a vast network of devices,
creating opportunities for more efficient and automated systems.

Main Components Used in IoT :

 Low-power embedded systems: Less battery consumption, high performance


are the inverse factors that play a significant role during the design of electronic
systems.
 Sensors: Sensors are the major part of any IoT application. It is a physical
device that measures and detects certain physical quantities and converts it into
signal which can be provided as an input to processing or control unit for analysis
purpose.

Modern Applications :

 Smart Grids and energy saving


 Smart cities
 Smart homes/Home automation
 H e a l t h c a r e
 Earthquake detection
 Radiation detection/hazardous gas detection
 S m a r t p h o n e detection
 Water flow monitoring
Advantages of IoT
 Improved efficiency and automation of tasks.
 Increased convenience and accessibility of information.
 Better monitoring and control of devices and systems.
 Greater ability to gather and analyze data.
 Improved decision-making.
 Cost savings.

What is a VLAN (virtual LAN)?


A logical overlay network known as a virtual LAN (VLAN) is used to isolate traffic for
individual groups of devices that share a physical LAN.

Virtual Local Area Networks or Virtual LANs (VLANs) are a logical group of computers
that appear to be on the same LAN irrespective of the configuration of the underlying
physical network. Network administrators partition the networks to match the functional
requirements of the VLANs so that each VLAN comprise of a subset of ports on a
singleor multiple switches or bridges.

Types of VLANs

Protocol VLAN − Here, the traffic is handled based on the protocol used. A
switch or bridge segregates, forwards or discards frames the come to it based
upon the traffics protocol.
 Port-based VLAN − This is also called static VLAN. Here, the network
administrator assigns the ports on the switch / bridge to form a virtual network.
 Dynamic VLAN − Here, the network administrator simply defines
network membership according to device characteristics.

VLANs offer several features and benefits, including:


 Improved network security: VLANs can be used to separate network traffic
and limit access to specific network resources. This improves security by
preventing unauthorized access to sensitive data and network resources.

 Better network performance: By segregating network traffic into smaller logical
networks, VLANs can reduce the amount of broadcast traffic and improve network
performance.
 Simplified network management: VLANs allow network administrators to
groupdevices together logically, rather than physically, which can simplify network
management tasks such as configuration, troubleshooting, and maintenance.
 Flexibility: VLANs can be configured dynamically, allowing network
administrators to quickly and easily adjust network configurations as
needed.

Applications of VLANs

Certain VLANs have straightforward objectives, such as separating access for


printers. Administrators have the ability to configure them such that computers
inside a VLAN may view printers on that VLAN but not those outside of it.

Other VLANs have more intricate uses. Computers in a retail banking


department, for instance, are unable to communicate directly with those in the
trading divisions. Network engineers may enforce this kind of segmentation by
having distinct VLANs set up for each department.

What is M-commerce?
M-commerce (mobile commerce) is the buying and selling of goods and services
through wireless hand held devices such as smart phones and tablets. M-commerce
is a form of e-commerce that enables users to access online shopping platforms
without theuse of a desktop computer.

 Mobile commerce refers to business or purchases that are conducted over


mobiledevices like cell phones or tablets.
 M-commerce lets users transact anywhere, provided that there's a
wireless Internet provider available in that area.
 Mobile commerce has increased rapidly as security issues have been resolved.
 Companies like Apple and Google have introduced their own mobile
commerceservices

Advantages of mobile commerce for online sellers:

M commerce provides another channel for online sellers to engage their


customers anddrive sales for their business. Mobile commerce is convenient,
adaptable, and accessible, providing opportunities to create an even better
customer experience.
Here are some additional advantages of m commerce:

 Rapid purchase process. Consumers don’t have to stand in line at a store to


payfor an item or wait until they can access a computer. They can browse for
items they are interested in and make purchases using their mobile device. A
strong mobile experience can help increase conversions on your site.
 Enhanced customer experience. As a business owner, you want
your customers to have the best shopping experience. If your mobile commerce
app or mobile-ready store is designed to attract your target customers and provide
them with a unique online shopping experience, they will return again and again.
 Direct communication. With m commerce, you can take advantage of
mobile features like targeted push notifications to reactivate your customers
and bring them back for re-engagement.
 Personalized shopping. If you have a mobile app or website, you
can obtain important customer data. You can see your customers’ buying
patterns, shopping history, behavior, and demographics. This information can help
you create a personal shopping experience for each customer, provide relevant
offers and recommendations that increase their customer lifetime value.

What is Virtual Reality?

Virtual Reality (VR) is a technology that creates a simulated environment,


making you feel like you are in a different place or world. An example of VR is
playing a video game with a VR headset, where you can look around and
interact with a 3D world as if you are actually inside the game.

VR is important because it offers new ways to learn, train, and experience


entertainment. It allows people to practice skills in a safe environment,
explore places they couldn’t otherwise visit, and enjoy highly immersive
entertainment. This technology has the potential to revolutionize many fields
by making learning and training more effective and experiences more
engaging.

Types of Virtual Reality (VR)


On the basis of the most important feature of VR i.e. immersion and the
types of systems and interfaces used, The VR systems can be classified into 3
types :
1. Immersive
2. Semi-immersive
3. Non–immersive
Immersive VR system

Immersive VR system is closest to the virtual environment. It makes us experience the


highest level of immersion. This VR system is expensive than others. It provides the
closest feeling of being in virtual world. Tools and gadgets used in this system are
advanced and not so common to use.

Semi – immersive VR system

Semi – immersive VR systems also make us to experience a high level of immersion


but the tools and gadgets used are not so advanced and costly. Tools and gadgets
used in this system are common to us and utilize physical models.

Non-immersive VR system

Non-immersive VR system is the least immersive and least immersive VR system. It is


not expensive to use this system. It is also known as desktop VR system because the
gadgets used are limited to glasses and display monitors and it uses the least
expensive components.

The basic components for VR systems?

1. Input devices
2. Output devices
3. Software

1. Input Devices

Input devices in VR are the tools for the users to interact with virtual world. Using Input
devices , the users communicates with the computer.
Example – 3D mouse.

2. Output devices

Output devices is used to represent the virtual world and it’s effect to the users. It
generates the feeling of immersion to the users.
Example : LCD shutter glasses.

3. Software

Software has a key role in VR . It is used for the handling Input and output devices,
data analysis and generate feedback.
NANOTECHNOLOGY

Nano computers or nanoscale computers are types of computers built using either
nanometers (10^-9 meters) or even smaller dimensions as their scale bars. These
systems exploit knowledge from various scientific disciplines like physics, chemistry,
computer science, etc., that deal with manipulating matter at atomic level/molecular
levels so that they can make circuits or components whose accuracy cannot be
matched by any other method known to man today.

. Nanotechnology continues making strides towards this direction together with


quantum computing and artificial intelligence which will make them universal in our
dayto day life activities hence resulting into innovations like personalizing medicine,
autonomous systems among others which were enabled by internet connectivity
through things as researchers uncover new capabilities thus setting new records
beyond human imagination in terms of what can be done technologically with
computers of such sizes.

Uses of nano computers now a days

Current applications of nano computers stretch across various industries such


as health care – for example implantable medical devices and drug delivery
systems, environmental monitoring – for instance sensors that detect pollution,
and consumer electronics – for example ultra-small wearable devices and smart
fabrics.

What Is 3D Printing?

Three-dimensional (3D) printing is an additive manufacturing process that creates a


physical object from a digital design. The process works by laying down thin layers of
material in the form of liquid or powdered plastic, metal or cement, and then fusing the
layers together.

 Three-dimensional (3D) printing is an additive manufacturing process in which a


physical object is created from a digital design by printing thin layers of material
and then fusing them together.
 Some industries, such as hearing aids manufacturers, airline manufacturers, and
car manufacturers, use 3D printing to create prototypes and mass produce their
products using custom scans.
 While it is currently too slow to be used in mass production, 3D printing
technology is still evolving and has the potential to massively disrupt both the
manufacturing logistics and inventory management industries.
The Advantages of 3D Printing :
 Create complex designs
2.Customize each and every item
 No need of tools and mould
 Speed and ease of prototyping
 Less waste

The Limitations of 3D Printing :


1. Higher cost of large production runs
2. Less material choices, colors and finishes
3. Limited strength and endurance
4. Lower precision

What is SWAYAM?
SWAYAM stands for Study Webs of Active Learning for Young Aspiring Minds. It is a
government initiative. It is aimed at offering free and high-quality e-learning education
tostudents ranging from Class 9th to post-graduation. The platform employs cutting-
edge pedagogy and upgraded audio-visual and multimedia tools to deliver courses. It
covers a wide range of subjects in higher education and provides skill development
courses for the skill sector. As of December 2022, there are over 2000 courses
available on the platform, all taught by experienced instructors. These courses are
carefully curated,
produced, and delivered by nine National Coordinators. It includes NPTEL, AICTE,
UGC,NCERT, NIOS, IGNOU, IIM-B, CEC, and NITTTR. Accessing SWAYAM MOOC
courses for learning is completely free of charge, without any fees. Moreover, upon
completing the course and passing the exam at designated centers, participants can
obtain a SWAYAM certificate. A nominal exam fee is required to enroll in the exam.

Objectives of SWAYAM

The objective of the SWAYAM initiative is to make top-quality educational resources


accessible to everyone, especially those who have been undeserved. This includes:

1. Closing the digital gap for students who have not yet benefited from the digital
revolution and couldn't participate in the knowledge economy.
2. Offering a comprehensive web and mobile platform with interactive e-content for
all educational levels, from High School to University.
3. Delivering a high-quality learning experience through multimedia, available at any
time and from anywhere.
4. Establishing an advanced system for easy access, monitoring, and certification.
5. Creating opportunities for peer interaction and discussion forums to address
questions and concerns.
Features of SWAYAM
Some of the important features of the SWAYAM platform are given below –
o Accessible Mobile learning – Mobile learning means learning which can be easily
accessible from anywhere through any device connected to the internet.
SWAYAM is a hub for interactive e-content.
o Audio-Visual Content – The courses on the platform are available in the audio-
visual multimedia format. It would be easily accessible to learners and would
enhance their learning.
o Certificate Courses – It will keep track of the progress and issue a certificate for
the students after an online exam.
o Doubt Solving – It also has the feature of an Interaction forum where learners can
clear up any doubts.
o Quality Assurance – Renowned and expert professors and faculties of Universities
design the SWAYAM courses. Hence, the quality of classroom teaching has not
been affected.
o Proctored Platform – The SWAYAM platform provides the certificate after
completing the course. The exam for the certificate is conducted in a proctoring
manner to stop any malpractice and to maintain the integrity of the exam.
o Free of Cost – All the courses on the SWAYAM platform are available free of cost
with no hidden charges.
o Transfer of Credit – The UGC has notified the UGC (credit framework for online
learning courses through SWAYAM) Regulation 2016 to allow the transfer of
credits earned from SWAYAM courses into the student's academic record in their
parent institutions or universities.

SWAYAM Prabha:

SWAYAM Prabha is an initiative by the Ministry of Human Resource Development


(MHRD), Government of India. It is a free-to-air Direct-to-Home (DTH) satellite
educational channel. SWAYAM Prabha offers high-quality educational content to
students across India. It aims to increase access and equity in education, especially in
remote and undeserved areas. SWAYAM Prabha is an initiative of the Ministry of
Human Resources Development to provide students with high-quality educational
channels through DTH (Direct-to-Home) on a 24*7 basis to make educational
resourcesavailable even at remote locations where the internet is not available.

SWAYAM Prabha was launched by Mr. Pranab Mukherjee on 9th July 2017 on the
occasion of Guru Purnima. SWAYAM Prabha is a group of 32 DTH channels that is
exclusively devoted to the telecast of high-quality educational programs which is on a
24*7 basis.
o The satellite used for telecasting SWAYAM Prabha channels is the GSAT-15
satellite.
o Each day there is new content delivery for at least 4 hours which is repeated five
more times during the day so that the students can choose their time of
convenience to study accordingly.
o The web portal of SWAYAM Prabha is maintained by INFLIBNET (Information and
Library Network Centre), Gujarat.
o The contents of SWAYAM Prabha are provided by NPTEL, IITs, UGC, IGNOU,
CEC, NIOS, and NCERT.
o The content delivered is curriculum based.

Features of SWAYAM Prabha

There are several features of SWAYAM Prabha to be kept in mind. Some of the
features are given below:

o There is a properly defined schedule for the program.


o There is a designated space for a search and browse interface.
o One can also archive videos in SWAYAM Prabha.
o There is also a mobile app version of SWAYAM Prabha.
o There is also a provision of a feedback mechanism in SWAYAM Prabha.
o There is a system of login-based access for the stakeholder in SWAYAM Prabha.
o There is a provision of SMS alerts and the My Library feature in SWAYAM
Prabha.
o SWAYAM Prabha has curriculum-based courses which can meet the needs of
lifelong learners of Indian citizens in India and abroad.

Difference between SWAYAM and SWAYAM Prabha

Feature SWAYAM SWAYAM Prabha


Type Online platform DTH satellite educational
channel
Content Courses, lectures, videos, e-books, High-quality educational videos,
assignments, quizzes, and documentaries, and animations
discussion forums

Accessibility Requires internet connectivity Requires a Free Dish DTH set-


top box
Subjects Wide range of subjects, including Focus on school education
covered Science, Mathematics, Social (Classes 1-12) and higher
Science, Languages, Business education
Studies, and more

Interactivity Allows for interaction and One-way communication; no


collaboration through discussion interactive features
forums and assignments

NPTEL (Swayam)

NPTEL stands for “National Program on Technology Enhanced Learning.” It is a


Government of India online education program administered by the Indian Institutes of
Technology (IITs) and the Indian Institute of Science (IISc). The program intends to
improve the quality of engineering education in the country by giving students access
to high-quality course materials and video lectures from some of the country’s best
professors.

NPTEL provides a diverse choice of courses in fields such as engineering, science,


humanities, and management. The courses are tailored to the needs of students,
working professionals, and professors. These courses are delivered via video lectures,
quizzes, and self-assessment examinations. The courses are offered in both English
and Hindi.

The courses were created by the IITs and IISc and are accessible to anyone with an
internet connection. Students who successfully finish the course and pass the
assessment tests will also receive certification from the program.

NPTEL is an excellent resource for students and professionals seeking to expand their
knowledge and abilities in a given subject. The program gives students who might
not be able to attend traditional classroom-based courses access to high-quality
education. It also enables professionals to keep their knowledge and abilities up to
date in their sector of work.

NPTEL is an acronym for National Programme on Technology Enhanced Learning


which is an initiative by seven Indian Institutes of Technology (IIT Bombay, Delhi,
Guwahati, Kanpur, Kharagpur, Madras, and Roorkee) and the Indian Institute of
Science (IISc) for creating course contents in engineering and science.
NPTEL Overview

 NPTEL has provided online course certification since March 2014. The highlight is
the certification test, which allows students to earn certification from IISc and IITs.
 Learning and enrollment in the course are both free.
 It assists students in comparing themselves to other students across the country.
 A variety of programs and courses of study are available, including Engineering,
Science, Humanities, and Management, allowing students to further their studies
outside their area of expertise and enthusiasm.
 Participating in NPTEL’s online certification courses will boost their understanding
and keep them updated on technical improvements.
 Students can communicate with the instructor via email, discussion forums, and
other online platforms if they have any questions.
 The fundamental advantage of enrolling in an NPTEL online course is that
students may analyze and examine their progress each week, as well as have
questions answered quickly by the faculty in charge or by their mentors to help
them understand the material more thoroughly.

National Academic Depository


The vision of National Academic Depository (NAD) is born out of an initiative to provide
an online store house of all academic awards. National Academic Depository (NAD) is
a 24X7 online store house of all academic awards viz.certificates, diplomas, degrees,
mark-sheets etc. duly digitized and lodged by academic institutions / boards / eligibility
assessment bodies. NAD not only ensures easy access to and retrieval of an
academic award but also validates and guarantees its authenticity and safe storage.
The vision of National Academic Depository (NAD) is born out of an initiative to provide
an online store house of all academic awards. National Academic Depository (NAD) is
a 24X7 online store house of all academic awards viz.certificates, diplomas, degrees,
mark-sheets etc. duly digitized and lodged by academic institutions / boards / eligibility
assessment bodies. NAD not only ensures easy access to and retrieval of an
academic award but also validates and guarantees its authenticity and safe storage.

Digi Locker is a flagship initiative of Ministry of Electronics & IT (MeitY) under Digital
India programme. Digi Locker aims at ‘Digital Empowerment’ of citizen by providing
access to authentic digital documents to citizen’s digital document wallet. The issued
documents in Digi Locker system are deemed to be at par with original physical
documents as per Rule 9A of the Information Technology (Preservation and
Retention of Information by Intermediaries providing Digital Locker facilities) Rules,
2016 notified on February 8, 2017 vide G.S.R. 711(E).
National Digital Library of India
The Ministry of Education has initiated the National Digital Library of India (NDLI)
underits National Mission of Education through Information and Communication
Technology. The NDLI project is a virtual repository of learning resources with a
single-window search facility. The same is being developed and maintained by IIT,
Kharagpur.

The NDLI project was initiated in 2015 and was launched to the country on June 19,
2018. It is a repository of resources from national and international digital libraries that
isaccessible in English and Indian languages as well. Multiple filter options offer the
ease of filtering the database.

The books are available in Indian languages. As the books are being scanned, it has
provided an opportunity for developing the Optical Character Recognition (OCR)
software of Indian languages.

Objective of National Digital Library of India

The objective is to collect and collate the metadata and provide a full-text index from
various digital libraries, both domestic and international, as well as from other relevant
sources. It is a digital repository containing articles, textbooks, audio books, videos,
lectures, fiction, simulations and all other kinds of learning media.

Features of National Digital Library of India :

 Educational materials are available for all levels of learning from primary to post
graduation.
 The usability of the NDLI is for all learners – students, teachers, researchers,
librarians, professionals, differently-able users and all life long learners.
 The information needed can be filtered based on the different criteria like
education level, language, level of difficulty, media of content, and other factors.
 It is a customized service that is available round the clock (24*7) where learners
can find the right resources without too much effort and time.
 The repository has content from multiple domains like Technology, Humanities etc.
 The content available is in more than 60 formats – books, manuscripts, articles,
thesis, video lectures, etc.
 The content is available in more than 70 languages.
 The repository integrates content from different Indian Institutional Repositories.

e-ShodhSindhu
Aims and Objectives

The main objective of the e-Shodh Sindhu: Consortia for Higher Education E-
Resourcesis to provide access to qualitative electronic resources including full-text,
bibliographic and factual databases to academic institutions at a lower rates of
subscription. The major aims and objectives of the e-Shodh Sindhu are as follows:

 Setting-up e-Shodh Sindhu: Consortia for Higher Education E-Resources by


augmenting and strengthening activities and services offered by three MHRD-funded
Consortia;
 Develop a formidable collection of e-journals, e-journal archives and e-books on
perpetual access basis;
 Monitor and promote usage of e-resources in member universities, colleges and
technical institutions in India through awareness and training programme
 Provide access to subscription-based scholarly information (e-books and e-
journals) to all educational institutions;
 Provide access to scholarly content available in open access through subject
portals and subject gateways;
 Bridge digital divide and move towards an information-rich society;
 Provide access to selected e-resources to additional institutions including open
universities and MHRD-funded institutions that are not covered under existing
consortia;
 Take-up additional activities and services that require collaborative platform and
are not being performed by existing Consortia; and
 Moving towards developing a National Electronic Library with electronic journals
and electronic books as its major building blocks.

E-YANTRA
e- Yantra Project is an initiative by IIT Bombay that aims to create the next generation of
embedded systems engineers with a practical outlook to help provide practical
solutions to some of the real world problems. The Ministry of Human Resource
Development (MHRD) sponsors E-Yantra under the National Mission for ICT in
Education (NMEICT)program.

IIT Bombay envisages the ‘e-Yantra’ platform to harness the intellectual talent of
youngIndia to create utility based robotic applications for usage across variety of
applications such as: agriculture, manufacturing, defense, home, city maintenance
and services industries. The overall mission is to grow a rich Eco-system of ideas
and applications that can propel India’s growth curve and productivity through
intelligent funneling of robotics in daily living built upon an existing pool of knowledge
developed by students working on such projects at engineering colleges in the area
of embedded systems.

We have taken an initiative to setup e-Yantra Robotics Lab under e-Yantra Lab Set-up
Initiative by IIT Bombay. SBPCOE e-Yantra Robotics Lab trains the students in
embedded systems and micro-controller programming by engaging them through the
Project Based Learning (PBL) mode.

Benefits of e-Yantra Robotics lab to students :

 Awareness of embedded systems, robotics technology and mechatronics.


 It provides platform to design, develop, program and test of robots to various
applications.
 Students can participate in national and international robotics competitions.
 Improve BE projects with help of e-Yantra open source community.
 Exposure to job opportunities in robotics.
 Encourage to use robots to solve real life problems.

What is Virtual Lab


A web site or software for interactive learning based on simulation of real phenomena.
Itallows students to explore a topic by comparing and contrasting different scenarios,
to pause and restart application for reflection and note taking, to get practical
experimentation experience over the Internet.

Advantages of virtual laboratory in education :


1- Virtual labs enable students to perform many experiments that are difficult to
performin real laboratories because of the risks.
2- Virtual labs help teachers and students save time and effort because they don’t
needto adhere to certain times to enter the lab, or to move from one place to
another.
3- Virtual Labs help users keep up with the technological development of the digital age.

4- Virtual labs allow students to perform the practical experiments related


to thetheoretical courses, which helps them absorb the courses.

5- The virtual lab provides enjoyment during experiments.

6- Virtual labs help students perform the experiment more than once.

7- Online Virtual labs protect students and teachers from hazards, given there is
no direct contact with toxic or radioactive chemicals and there is no handling of
explosivedevices or electricity.
8- Virtual labs provide the convenience of changing the inputs and transactions
used inthe experiment without worrying about any dangerous effects of these
changes.
9- Virtual labs allow students to stay in touch with the Internet, which helps
themsearch and gather information during the experiment.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy