Posts

Showing posts from August, 2024

COMPUTER VISION

 Computer Vision is the branch of Computer Science whose goal is to model the real world or to recognize objects from digital images. These images can be acquired using video or infrared cameras, radars or specialized sensors such as those used by doctors, scientist, geologist etc. Vision is a most powerful interfacing device for computers. They have the potential to sense body movements and their position, head orientation, direction of the body, and gestures. When the vision based interaction is established with the machine, they could make  the interaction between both of us enjoyable or safer. The algorithms for the computer vision should be reliable, work for different people, and work in odd conditions. The responding time of these algorithms should be very fast. The user should sense delay between when he moves or make gesture and when computer responds. The student will understand the basic techniques of the field of Computer Vision. We will also discuss what are the t...

ADVANCED METHODS OF COMMUNICATION WITH A COMPUTER

Human computer interaction is a discipline concerned with the design, evaluation and implementation of interactive computing systems for human use. If the interface is well designed, it will allow the systems functionality to support the user’s task. This unit tracks the development path of human computer interaction from the command line mode to hyperlinks, hypermedia, voice user interface etc. Here we have discussed about different perspectives of communication with computer. Humans communicate with computers in many ways, and the interface between humans and the computers they use is crucial to facilitating this interaction. Different perspectives of human computer interface are human perspective, computer’s persona, user interface and interactions etc. To communicate with computers, we require different kind of input and output devices are available. Controls are the software elements, usually shown on a display, which you use to set preferences and make choices. Some familiar cont...

FUNDAMENTALS OF EMBEDDED SYSTEMS

Embedded systems are basic electronic devices used to control, monitor or assist the operation of equipment, machinery or a plant. The choice of word “embedded” reflects the fact that these are integral part of the system. Uses of embedded system in our real life are increasing day by day. Children need such systems to play video games and to operate chocolate vending machine, Housewives need embedded systems for microwave, TV, music system, and other system appliances. Here we will discuss about basics of embedded system: its uses, its components, its basic requirements in terms of Hardware and Software and support of Programming Languages. We will also highlight some application of embedded system in our real life scenario at the end of this unit. Embedded system is a kind of computer system or computing device that performs a dedicated function and/or is intended for use with a specific embedded software application. It has been found that such systems are not usable as a commercial...

IT PROJECTS IN INDIA

Here we introduces some of the Information Technology (IT) projects as well as those projects which use IT in India. It describes some of the projects that are completed as well as under implementation by National Informatics Centre (NIC). Similar topics are dealt with in the case of ERNET also. The impact of Broadband is significant across the Country. The projects that are using Broadband are introduced in one of the sections. Finally, SWAN is introduced and the list of projects that are completed/under implementation across various states are listed. There are a large number of IT projects across India. Organizations like NIC, ERNET are playing major role in implementing IT projects. Broadband has created a major impact across the Country. Large number of people in the Country have access to Internet through different ways. SWAN is implemented aggressively across different states and it computerizes most of the activities of the State so that the citizens across the concerned state ...

MANAGEMENT INFORMATION SYSTEM

In today’s technical era, revolution in business takes place with the foreword of Internet technologies. These Internet technologies are necessary parts for the screen of today’s networked management. Therefore, there is a growing need for all those interested in doing business, management and computerized accountancy to understand the concept and scope of this technology and the way it is used to provide information for various functions in business. When computer technology turns out to be further extensively obtainable in the late 1950s and early 1960s, there was an increased eagerness for information systems to augment management decision processes. Which later converted into a nomenclature known as MIS (Management Information System). MIS is viewed and used at many levels by management and has turned out to be the favourite software engine for the development of IT in most recent years. This module throws some light on Management Information System, its application, and experience...

DEVELOPMENT OF INFORMATION SYSTEMS

 An integrated set of components for collecting, storing, processing, and communicating information is called information system. Business firms, other organizations, and individuals in contemporary society rely on information systems to manage their operations, compete in the marketplace, supply services, and augment personal lives. For instance, modern corporations rely on computerized information systems to process financial accounts and manage human resources; municipal governments rely on information systems to provide basic services to its citizens; and individuals use information systems to study, shop, bank, and invest. As major new technologies for recording and processing new capabilities have appeared, the invention of movable type in the mid15th century and the creation of the portable typewriter at the end of the 19th century are but two examples. Each of these inventions led to a profound revolution in the ability to record and disseminates information. The first larg...

EDUCATIONAL SYSTEM

 Earlier we had discussed the concept of E-Governance which includes the computerization of records, right to information, availability of information on the web complaint handling etc.. Now we will define the online educational System and its features. Education is one of the main keys to economic development and improvements in human welfare. As global economic competition grows sharper, education becomes an important source of competitive advantage, closely linked to economic growth, and a way for countries to attract jobs and investment. In addition, education appears to be one of the key determinants of lifetime earnings. Countries therefore frequently see raising educational attainment as a way of tackling poverty and deprivation. In developing countries, education is also linked to a whole batch of indicators of human development. Education of women influences the health of children and family size. The experience of Asian economies in particular in the past two decades has ...

E-GOVERNANCE

In the previous unit, we have discussed the concept of E-Commerce, which includes the role of ICT in the area of commerce. Now let us see the role of ICT in the public administration area. Global shifts towards increased deployment of IT by governments emerged in the nineties, with the advent of the World Wide Web. What this powerful means to publish multimedia, support hyperlinked information and interactive information meant was a clearer avenue for G to C interactions and the promise of the attainment of the goals of good governance. Governments weighed down by the rising expectations and demands of a highly aware citizenry suddenly began to believe that there can be a new definition of public governance characterized by enhanced efficiency, transparency, accountability and a citizen-orientation in the adoption of IT enabled governance. Here we will discuss the concepts of E-Governance. Governance is a burning topic for many reasons, including the changing role of knowledge and info...

E-COMMERCE

 Commerce has a long tradition of profiting from innovative systems and tools. As technologies emerge, successful businesses are quick to identify developing opportunities and expand their commercial capabilities. Conducting commerce electronically is no different. For many businesses, new technologies that digitally exchange text and monetary information are effective tools to serve traditional business goals of streamlining services, developing new markets, and creating innovative business opportunities. In addition, they offer the potential to develop types of services that are so innovative and distinct from tradition that they define a new type of commerce. Appropriately named, electronic commerce (E-Commerce) is the synthesis of traditional business practices with computer, information and communication technologies. http://store.templatemonster.com/?aff=orlandoweb E-Commerce is not an entirely new type of commerce. It first emerged in the 1960's on private networks, as typic...

CYBERSPACE AND CYBER CRIMES

Cyberspace is such a term, which is not yet completely defined and also has no geographical limitation. It is a term associated with application of the Internet worldwide. It is also called as a virtual space as physical existence of cyberspace is not detectable at all. Cyberspace is “the total interconnectedness of human beings through computers and telecommunication without regard to physical geography.  Cyberspace is a term coined by science fiction author William Gibson to describe the whole range of information resources available through computer networks. For our purposes, cyberspace is a realm in which communication and interaction between two individuals or between an individual and a computer is facilitated by digital data exchanged over computer networks. This interaction or communication can be used for a host of different purposes. The Internet is currently the biggest network for linking computers, but cyberspace, as a concept, is independent of the Internet. Cyberspa...

ICT AND DIGITAL DIVIDE

 ICT deals with how digital information passes between the devices. The most prolific example is the Internet, a worldwide network of computers linked together by telephone lines. There are however, other examples, like mobile phones, interactive televisions and personal organizers. When ICT is applied to business, it can lower Costs, raise productivity and improve customer and supplier relationship. In learning, ICT widens participation and raises attainment. In public services, ICT engages people with services more effectively and in communities, ICT links people to economic opportunity and brings together those with common agendas. The opportunities for social and economic development which can not be availed by the people because of inaccessibility and lack of information will now be available to all. This information could be used for trade, online education, telemedicine, egovernment and many other applications that solve vital problems in the developing countries. It could o...

ATTRIBUTES OF INFORMATION TECHNOLOGY

 Information technology [IT] and computers have enormous influence on all segments of our life. All our workplaces and the living surroundings are being mechanized or rather automated. The benefit of information technology is that, it empowers people to do what they want to do, let’s people to be creative, make people to be productive and allow people to learn things which they didn't think they could learn before, and so in a sense it is all about potential. Technology, in all its forms, has had an impact on practically one and all. Information technology, with its complication and remarkable alteration, has debatably had the most philosophical force on community. Information is any type of pattern that influences the formation or transformation of other patterns. Information technology makes it practicable for all sorts of information to be stored, accessed and transmitted electronically, and with no orientation to customary print on paper media. Here we will explore IT and its a...

NETWORK SECURITY AND AUTHENTICATION

The previous two articles discussed about the fundamentals of information as well as network security issues which lead to different kinds of problem: attacks, theft of essential information and software vulnerabilities. Here we shall learn about how to build a secure network. We shall also learn about the various parameters which must be considered for network security. There can be various security issues involved in small and medium sized businesses which require utmost attention for creating the secure network. Then we shall be covering different kind of tools available for network security, critical elements of network security like Firewall, password mechanisms, encryption, authentication & integrity etc. Lastly, we shall study about some secure network devices like secure modems. Let’s first read the basics of network and network security. As we know the basics of network and its security. Computer network is defined as system of interconnected computers linked by communicat...

SOFTWARE VULNERABILITIES

Software vulnerability is defined as we have studied previously. Virus is a common term understood as software vulnerability by average people. It is a problem that is potentially so dangerous that it threatens the proper functioning of the computer system in today's information age. In this unit you will learn about the unwanted software that is deliberately bad in intent which is “wrote for fun” or “for curiosity” or simply to challenge to create the most destructive software ever built. This software is popularly known as “malware” which is an acronym for malicious software. Malware does nothing useful but rather more harmful. Here we will study several types of malware each of which has different goals and propagates differently. Here we discussed about the threat faced by computer virus. It explains the evolution characteristics of the virus and the damage they can do to a computer. We studied different types of viruses and their characteristics. It also discussed about differ...

INFORMATION SECURITY CONCERNS

In today’s, networked society where computer outsells radio and TV, Online shopping is becoming more popular daybyday. The need for providing secure network environments is on top priority for all organizations. Weakness in such a system may lead to all kind of attacks, threat and loss of essential information. Information security deals with how you can secure your personal and confidential information from the rest of the world. We will discuss the basic need of information security in an organization. Why do we need to secure our information from the rest of world. Because no one should access it, without your permission or without authentication. We will also discuss about the threats or attacks in breaching of the information security and how easily can a person or software penetrates into your system and accesses your information. After accessing your information, an intruder can manipulate, destroy or misuse your information or data. Here we will also focus on the different type...

COMPUTER NETWORKS

This article explains the basics of computer network. A computer network can be simply defined as the interconnection of two or more independent computers. Applications of computer networks are found everywhere. They are used in our homes, schools, colleges, railway stations, offices and business. They help us to send an email, to watch a live sports event at our computer to book rail/air tickets to do chatting with our friends. The unit explains uses of computer networks, a client/server network, peertopeer network architecture, network topology, OSI & TCP/IP models and some useful application of computer networks. Here we discuss the methods to create a network. A network may consists of multiple computers connected using some type of interface, each having one or more interface devices such as a Network Interface Card (NIC) and/or a serial device. Usually networks are categorized in two main categories which are: server based and peertopeer. Next important thing which we know is...

INTRODUCTION TO COMMUNICATION MEDIA AND COMMUNICATION DEVICES

A computer network is the infrastructure that allows two or more computers (called hosts) to communicate with each other. The network achieves this through two ways: (i) by providing a set of rules for communication, called protocols, which should be observed by all participating hosts  (ii) through communication devices which are the parts of a computer of network.  Here we will discuss about about various types of network devices like gateway, bridges routers, hubs, switches, gateway and routers. We will also describe about different types of communication channels (media) and their advantages, disadvantages and application. We know about various kinds of communication devices like network interface cards, hubs, bridges, repeaters switches and gateways etc. We also know about their application at different levels of networking. Each of these devices let us connect one or more computers to other computers, networked devices, or to other networks. Each has two or more connecto...

FUNDAMENTALS OF DATA COMMUNICATION

Here we shall learn the basics of Data Communication. Many services and products that we use everyday employ computer networks and data communications in one way or another. Telephone systems, banking systems, cable television, audio and video systems, traffic control systems and wireless telephones are just few examples. Here we shall briefly describe about the data and signal which are the basic units of data transmission. We shall briefly cover about the methods for sending the signal over the different networks i.e., synchronous and asynchronous communication. We shall also discuss about the modem, its functioning and different modes of transmission of data. We have learnt about the two building blocks of communication i.e., data and signal. All data transmitted over any communications medium is either digital or analog. Data is transmitted with a signal and it can take any from either digital or analog. Noise and attenuation are two most important factors which affects the transfe...

PROBLEMS SOLVING USING C PROGRAMMING LANGUAGE

Problem solving skill develops with time. Once you start solving smaller and simpler problem, you become more aware about the steps required for writing solutions of the problems. We know about algorithms and flowcharts. An algorithm can not run on a computer, you have to write the algorithm in a language that a computer can understand. The languages that a computer understands are known as computer programming language. The C is one of the very popular programming language. The C was written by Kerningham and Richie in the 1970s. C is used for developing computer applications in the area of system software, utility software such as device driver, network programming, databade systems, and many other areas of applications software. You may take this unit as beginning of learning a programming language. It is easy to learn other computer programming languages after learning C. Here we have learned basics of C programming. This unit explained about structure of C program, need of preproc...

ALGORITHM AND FLOW CHART

Intelligence is one of the key characteristics which differentiate a human being from other living creatures on the earth. Basic intelligence covers day to day problem solving and making strategies to handle different situations which keep arising in day to day life. One person goes Bank to withdraw money. After knowing the balance in his account, he/she decides to withdraw the entire amount from his account but he/she has to leave minimum balance in his account. Here deciding about how much amount he/she may withdraw from the account is one of the example of the basic intelligence. During the process of solving any problem, one tries to find the necessary steps to be taken in a sequence. Here we will develop understanding about problem solving and approaches. We have learned about an algorithm. How an algorithm to be written. This article explains the properties of an algorithm such as finiteness, definiteness, and effectiveness. Here we cover about the flowcharting. Flowcharting is a...

INTRODUCTION TO DATABASE MANAGEMENT SYSTEMS

We all live in an age where the world is full of data and information. You must have heard of internet, which has become a huge source of information and also growing everyday. The amount of data is actually very large to access and maintain. For example, if we go to the bank to deposit or withdraw funds, if we make booking in a hotel or railways reservation, even purchasing items from a supermarket or Mall all these activities involves an automatic update of the database which keeps the inventory of the store room or showroom items. In the traditional database applications, where most of the information was stored and accessed in either textual or numeric form. But nowadays, video clips, pictures files, weather data, satellite images and sound image files are stored in separate and specialized databases such as multimedia databases. If your school Principal just wants to know the marks of a student named Kalpana in your class. There could be more than one Kalpana in the class, but if ...

SOFTWARE

Computer system combines software and hardware to provide a mechanism to solve some specific tasks. We know some hardware devices i.e. input and output devices and their functions. Here we will discuss topics related to software and their types such as systems software, applications software, utility software etc. Without software, a computer will remain just like a metal box. With software, a computer can store, retrieve, solve different types of problems, create friendly environment for software development. Now, let us understand the term software. In Computer Science, the term software means a sets of instructions in the form of a program to control the processing of computer. These programs are used for various purposes in the computer system. A series of instructions that performs a particular task is called “program”. The process of software development is also called programming. Computer software can be broadly classified into two categories according to its purpose. Systems s...

INPUT OUTPUT DEVICES

Input output devices are very important component of computer systems. Earlier we have discussed various components of computer system. Here we will discuss about input/output devices, of computer system. First, we will discuss briefly about input/output devices and then move on to the function and structure of some input and output devices. Finally, we will discuss about the newer technologies in input output devices used in computer system. Input/output devices are the devices that connect you to your computer. Input devices let you input data and other information into your computer and they also let you give your computer special instructions so that it will know what to do. For example, you can type in data by using a keyboard, or you can input data in picture form by using a scanner or give some instruction by clicking of mouse. On the other hand, output devices display the results of your computer’s computations. Examples of these would be your computer’s monitor, which displays...

STORAGE ORGANISATION

We know about the basics of computers such as Central Processing Unit (CPU), Memory, Input/Output and peripheral devices. We will discuss one of the most important component of a computer system known as memory unit. Memory unit is an important component of a computer where all the data and information is stored in the form of binary digits (combination of 0’s and 1’s) and retrieved whenever it is necessary. Computer system uses a variety of devices for storing the instructions and data. These memory devices can be in different categories according to access time, storage capacity & cost per bit of storage. Detailed discussion  will be on storage devices and their organization. Here we will concentrate on storage organization of the different types of memory devices such as RAM, ROM, Hard disk, Floppy disk, Magnetic disk, Magnetic Tapes, CDROM, and DVD etc. RAM, ROM comes under semiconductor memory, Harddisk, Floppy disk, and Magnetic tapes come under magnetic memory and CDROM,...

INTRODUCTION TO PC

Image
Computer is the most powerful tool man has ever created. Computers are used in almost every working place in the modern times that is school, colleges, offices, railways, banks, industries, hospitals etc. The word “computer” comes from the word “compute” which means to calculate. So a computer can be considered as a calculating device that can perform arithmetic operations at a high speed but more accurately. Computer is a digital electronic storage device, which accepts data and set of instructions, manipulates it, and retrieves the information at very high speed. In other wards we can say that a computer is a data processing device which following specific instructions, perform a sequence of operations to achieve a desired result. In this unit we will discuss about personal computer (PC) and its components. From here onward, the words PC and computer are used interchangeably. The word “computer” comes from the word “compute” which means to calculate. So a computer can be considered a...