Posts

Showing posts from February, 2022

WHAT IS SOCIAL MEDIA ? CLASSIFICATION, ADVANTAGES AND LIMITATIONS OF SOCIAL MEDIA

Image
  SOCIAL MEDIA All of us are familiar with wikipedia, the free encyclopedia in Internet. We have also heard about people responding to social issues through facebook, twitter, etc. Also we know that people use youtube to share videos and for promotion of products or business. All of these are part of social media which is changing the way we communicate, entertain and live. Social media refers to the use of mobile and web based technologies through which individuals and communities can create, share, discuss and modify content. In social media, interactions among people happen in virtual communities and network over Internet. These digital technologies influence the formation and activities of civil communities to a great extent. CLASSIFICATION OF SOCIAL MEDIA INTERNET FORUMS An Internet forum is an online discussion web site where people can engage in conversations in the form of posted messages. Each Internet forum will have sub forums which may have several topics. Each discussion o

WHAT IS CAPTCHA?

Image
  A captcha is a test used in the process of using computer internet to ensure that the response is generated by a person.  It consists of letters and digits in a distorted manner. You have to type the same letters and digits in the box. It prevents the misuse of e-mail addresses by some other person. When your account has been created, you will see the first webpage appearing on your computer screen.

What is 'Man-in-the-middle attacks' ? | Cyber Security

Image
  A  man in middle attack refers to an attack in which an attacker secretly intercepts electronic messages between the sender and the receiver and then captures, inserts and modifies messages during message transmission. If sender transmits messages without appropriate security, the attacker may exploit the vulnerabilities in the network to capture and modify the messages and send the modified messages to the receiver. Since the network transmission still works properly, both the sender and receiver will find it difficult to notice that the messages have been trapped or modified by an intruder. If we use such a computer for online transactions, the man in the middle may capture our bank account number and password to steal money, leading to financial loss. Encrypted connections such as HTTPS (HTTP Secure), SFTP (Secure FTP) etc. should be used for secure transactions, so that intruders cannot modify the messages. 

GREEN COMPUTING OR GREEN IT

Image
  Green computing is the study and practice of environmentally sustainable computing or IT. Green computing is the designing, manufacturing, using and disposing of computers and associated components such as monitors, printers, storage devices, etc., efficiently and effectively with minimal or no impact on the environment. One of the earliest initiatives towards green computing was the voluntary labelling program known as 'Energy Star '. It was conceived by the Environmental Protection Agency (EPA) in 1992 to promote energy efficiency in hardware of all kinds. The Energy star label has become a common sight, especially in notebook computers and displays. Similar programmes have been adopted in Europe and Asia. Government regulations is only a part of an overall green computing idea. The work habits of computer users and business firms have to be modified to minimize adverse impact on the global environment. Here are some steps that can be taken:  Turn off computer when not in u

ADVANTAGES OF USING E-MAIL

Image
 The benefits of using e-mail facility are listed below. Speed : An e-mail is delivered instantly to any location across the globe. We can send the same e-mail to multiple users simultaneously.  Easy to use : We can send and receive e-mails, organise our daily conversations and save them easily on our computer. Provision of attachments : The attachment feature allows to send pictures, files, documents, etc. along with e-mail. Environment friendly : e-mails do not use paper and save a lot of trees from being cut down. Reply to an e-mail : When we need to replay to an e-mail, we can use the provision of attaching previous e-mails as reference. It helps to refresh the recipient about the subject. Cost effective: When compared to fax or conventional mail, e-mail is less expensive. Available anywhere anytime : Messages can be read at user's convenience. Access to mail box is available anytime.

WHAT IS PHISHING ?

Image
Phishing is a type of identity theft that occurs online. Phishing is an attempt to acquire information such as usernames, passwords and credit card details by posing as the original website, mostly that of banks and other financial institutions. Phishing websites have URLs and home pages similar to their original ones. The act of creating such a misleading website is called spoofing. People are persuaded to visit these spoofed websites through e-mails. Users are tempted to type their usernames, passwords, credit, card numbers, etc. in these web pages and lose them to these websites. These frauds use this information to steal money. Phishing is currently the most widespread financial threat on the Internet.

CONNECTING THE COMPUTER TO THE INTERNET

Image
  As we know today, the internet has become very popular and almost all organisations and people around the world are joining it. Earlier, people used the internet to search for information and check e-mails only, but today it is used to book train tickets, recharge mobile phones, internet banking and a lot more. Therefore almost all of us require an internet connection in our computers and mobile devices. The following are the hardware and software requirements for connecting computer to the internet A computer with network interface card (wired/wireless) facility and an operating system that supports TCP/IP protocol Modem Telephone connection An internet account given by an internet service provider (ISP) Software like browser, client application for e-mail, chat, etc. Nowadays desktop computers or laptops are not the only devices that we use to connect to the internet. People have also started using tablets, smart phones, etc. to browse the internet. some of these devises come with

HISTORY OF THE INTERNET

Image
The Internet started as a small network through a project by the United States Department of defence by the name ARPANET (Advanced Research Projects Agency Network). During 1970s this military network was connected to the computers of universities and companies that worked for the department of defence. In 1984 the military network split from ARPANET which used TCP/IP protocol for communication was thereafter used for scientific research and information sharing. Later, several other network merged with ARPANET to form a large network.  ARPANET is considered as the first wide area network (WAN). Vinton Gray Cerf who was instrumental in the development of Internet and TCP/IP protocol, is considered as the father of Internet              In 1989, Tim Berners Lee , a researcher, proposed the idea of World Wide Web (WWW). Tim Berners Lee and his team are credited with inventing Hyper Text Transfer Protocol (HTTP), HTML and the technology for a web server and a web browser. Using hyperlink

ADVANTAGES OF COMPUTERS

Image
  Some of the advantages of computers that set it apart from jobs that humans perform are: 1.Speed A computers works at exceedingly high speeds. Millions of instruction (simple mathematical ones) per second was a normal speed of  computer about decade ago. These speeds are electronic in nature while humans can never reach such speeds of work execution. The speed of a computer is determined by its PROCESSOR. 2.Accuaracy A computer works accurately. The accuracy of computer output is limited only by the accuracy of the input provided to computer. This phenomenon is known as GIGO i.e. Garbage In Garbage out. So if the input is erroneous, the output will also be erroneous. 3.Diligence  A computer is very diligent in how it executes the instructions given to it. Unlike humans, who sometimes get bored by repetitive work or slack off for no reason, computers work endlessly unless met with system failure or power outage or human interventions. 4.Easy to learn Although the computer is intrinsic

IT IN MEDICAL SCIENCE AND HEALTH CARE

Image
  Advancement of IT was positively impacted the health care sector. Computer help in easing out inventory management, patient management and various kinds of tests that are carried out at hospitals to chech for health of various internal organs, computers have had a hand in easing all this out. Many of the tests which are carried out by help of computers are : 1.Computerized Axial Tomography Machine This is used to take 3D pictures of internal organs so that the doctor can view them and diagnose. In short, this is known as CAT. 2.Magnetic Resonance Imaging This is used to check the images of internal organs and parts to determine what has gone wrong. 3.ECG This is used to view the health of the heart. It stands for Electrocardiogram. It gives as output the beat frequency of the heart. On studying this output, doctors can diagnose the condition of the heart. 4.EEG The Electroencephalogram is used to take record of activities of the brain. Small receptors are attached to the brain. These

ROLE OF ICT IN EDUCATION

Image
The future of education within India look bright. The classroom has been made so that delivering a lecture is easier and learning of the students better. Internet itself has got a complete makeover in this decade with educational learning platforms like Byjus, Topper, simplilearn, etc. Even smart boards are used and vSat technology is used to teach students over the internet. Even if you have missed classes at the collage, you still can learn that particular course over the internet by YouTube or Khan Academy.  Education is still, even today, a teacher thing. However, going where it has not gone before, IT helps explain the concepts in science, maths and even engineering in a life like, real way. This way the student able to grasp the concept being taught better. But it is a continuous process. Each generation needs to grow the previous generation's achievements with there own ones. This is the blueprint that will lead to advancement of our nation in science and maths in schools an