Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
10 views120 pages

Basic Concepts of ICT Tute

The document provides a comprehensive overview of data and information, covering topics such as the data life cycle, types of data, data processing stages, and the impact of ICT on various sectors. It also discusses the benefits and issues associated with ICT, including social, economic, and ethical concerns. Additionally, it includes sections on software licensing and data protection strategies.

Uploaded by

isaraumayantha2
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
10 views120 pages

Basic Concepts of ICT Tute

The document provides a comprehensive overview of data and information, covering topics such as the data life cycle, types of data, data processing stages, and the impact of ICT on various sectors. It also discusses the benefits and issues associated with ICT, including social, economic, and ethical concerns. Additionally, it includes sections on software licensing and data protection strategies.

Uploaded by

isaraumayantha2
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 120

Table

Introduction to data and information


The life cycle of data……………………………………………………………………………… 1
Data…………………………………..…………………………………………………………………… 2
Nature of data…………………………………..…………………………………………………… 3
Types of data…………………………………..…………………………………………………….. 3
Data processing…………………………………..………………………………………………… 4
Classification of data and information…………………………………..……………… 5

Information
Characteristics………………….…………………………………..………………………………… 7
The golden rule of information………………….…………………………………..……… 7

Big Data 9
Applicability of ICT in day-to-day life 14
Drawbacks of manual methods in manipulating data and information 16
Infeasibility of applying manual methods 18
Emergence of ICT era 21
Automated vs. Manual data handling 22
Information retrieval and sharing 23
Computer networks 25
The Internet
Services of the internet……………………….…………….…………………………………… 26
Word Wide Web……………………….…………….……………………………………………... 28
Mobile communication……………………………………………….………………………… 30
Mobile computing……………………….…………….………………………………………….. 31
Cloud computing……………………….…………….……………………………………………. 31

Abstract model of information 37


Basic components of a computer
Hardware……………………………………………….……………………………………………….. 40
Software……………………….…………….…………………………………………………………... 46
Firmware……………………….…………….………………………………………………………….. 48
Liveware……………………….…………….…………………………………………………………... 49

ictfromabc.com
Stages of data processing
Data gathering……………………………………………….………………………………………. 52
Data validation……………………….…………….………………………………………………… 57
Data input……………………….…………….……………………………………………………….. 58
Data verification……………………….…………….……………………………………………… 60
Data processing……………………….…………….………………………………………….…… 61
Data output……………………….…………….………………………………………………….… 62
Data storage……………………….…………….………………………………………………….. 63

Applications in IT
Educational sector……………………………………………….………………………………… 65
Health sector……………………….…………….………………………………………………….. 68
Agriculture sector……………………….…………….…………………………………………… 75
Business and finance sector……………………….…………….…………………………… 81
Engineering sector……………………….…………….…………………………………………. 84
Tourism sector……………………….…………….………………………………………………. 85
Media and journalism……………………….…………….……………………………………. 86
Security and law……………………………………………….………………………………….. 88
Entertainment……………………….…………….……………………………………………….. 89
Travel and transport……………………….…………….……………………………………… 93
Production sector……………………….…………….…………………………………………. 96
E-government……………………….…………….………………………………………………. 98

Benefits of ICT
Social benefits……………………………………………….……………………………………… 100
Economic benefits……………………….…………….…………………………………………. 101

Issues caused by ICT


Social issues……………………………………………….………………………………………… 102
Health issues……………………….…………….…………………………………………………. 106
Economical issues……………………………………………….……………………………….. 108
Environmental issues……………………………………………….…………………………… 110
Ethical issues……………………………………………….……………………………………….. 111
Privacy issues……………………………………………….………………………………………. 113
Legal issues……………………………………………….…………………………………………. 114

Licensed and unlicensed software 116


How to protect data 118

ictfromabc.com
Life cycle of data 2. Data management
o;a; Ôjk pl%h o;a; l<uKdlrKh

Data management involves organizing,


storing, analyzing, and protecting data
throughout its lifecycle, ensuring accuracy,
availability, security, and compliance, using
strategies and technologies at each stage.
o;a; l<ukdlrKhg tla tla wÈhfra§ Wmdh
ud¾. iy ;dlaIKhka Ndú;d lrñka tys
Ôjk pl%h mqrd o;a; ixúOdkh lsÍu" .nvd
lsÍu" úYaf,aIKh lsÍu iy wdrlaId lsÍu"
ksrjoH;djh" we;s nj" wdrlaIdj iy
The data life cycle refers to the data that wkql+,;dj iy;sl lsÍu we;=<;a fõ'
moves from its creation to its eventual
deletion or preservation. The process involves data collection,
o;a; Ôjk pl%h hkafkka woyia lrkafka
o;a; ks¾udKh lsÍfï isg wjidkfha ingestion, storage, processing, analysis,
uldoeóu fyda ixrlaIKh lsÍu olajd .uka visualization, and archiving or disposal
lrk o;a;hs' according to retention policies. fuu
l%shdj,shg o;a; /ia lsÍu" wjfYdaIKh
It is a continuous process consisting of lsÍu" .nvd lsÍu" ieliSu" úYaf,aIKh"
oDYHlrKh iy r|jd ;nd .ekSfï m%;sm;a;s
several stages. th wÈhr lsym
s hlska iukaú; wkqj ixrlaIKh lsÍu fyda neyer lsÍu
wLKav l%shdj,shla fõ we;=<;a fõ'

But under the Aadvanced Level Syllabus, it


is divided into three stages only. 3. Removal of obsolete data
kuq;a Wiia fm< úIh ks¾foaYh hgf;a fnod h,amek .sh o;a; bj;a lsÍu
olajkafka wÈhr ;=klg mu‚'
The removal of obsolete data involves
1. Data creation identifying and deleting data that is no
o;a; ks¾udKh longer relevant, necessary, or compliant
with retention policies.
Data creation is the process of capturing h,a mek .sh o;a; bj;a lsÍug ;jÿrg;a
raw information from various sources, wod< fkdjk" wjYH fkdjk fyda r|jd
including transactions, sensors, social .ekSfï m%;sm;a;sj,g wkql+, fkdjk o;a;
media interactions, web activities, manual y÷kd .ekSu iy uld oeóu we;=<;a fõ'
inputs, machine logs, and surveys. .o;a;
ks¾udKh hkq .KqfoKq" ixfõol" iudc This process ensures that organizations
udOH wka;¾l%h s d" fjí l%shdldrlï" hka;% maintain a lean and efficient data
f,d.a igyka iy iólaIK we;=¿ úúO environment while reducing storage costs
uQ,dY%j,ska wuq f;dr;=re .%yKh lr .ekSfï
l%shdj,shhs' and mitigating security risks associated
with outdated or redundant data.
.nvd msßjeh wvq lrk w;ru h,a mek .sh
fyda w;sßla; o;a; iuÕ iïnkaO wdrlaIl
wjodkï wju lrk w;ru ixúOdk ÿ¾j, yd
ld¾hlaIu o;a; mßirhla mj;ajdf.k hdu
fuu l%shdj,sh iy;sl lrhs'

1
ictfromabc.com
Data NOTE
o;a; There is no inherent distinction between
data and information; rather, it depends on
Unprocessed raw material that cannot be one's perspective.
meaningful when taken separately is o;a; iy f;dr;=re w;r wdfõksl fjkila
known as data. fkdue;¦ tA fjkqjg" th flfkl=f.a oelau
fjka fjka jYfhka .;a úg w¾:hla §ug u; r|d mj;S'
fkdyels ksis f,i ilia lr fkdue;s wuq
lreKq o;a; f,i yÿkajhs' Although information is the output of one
process, that information may be data for
Information another process.
f;dr;=re f;dr;=rla hï l%shdj,shl m%;sodkh jqjo" tu
f;dr;=r fjk;a l%shdj,shla ioyd o;a;hla
Data that has been processed, organized, úh yelsh'
or structured to provide meaning or
context. Data and information can be identified by
w¾:hla fyda ikao¾Nhla iemhSu i|yd examining the inputs and outputs of a
ilik ,o" ixúOdkh lrk ,o fyda jHqy.; process.
lr we;s o;a; fõ' tneúka" hï l%shdj,shl wdodk yd m%;sodk
úuid ne,Sfuka o;a; iy f;dr;=re meyeÈ,sj
yÿkd .; yel'

2
ictfromabc.com
Nature of data Types of data
o;a; j, iajNdjh o;a; mj;sk wdldr

Data can be collected from various sources Text Visual Audio


like surveys, sensors, social media, etc. fm< oDIH Y%jH
iólaIK" ixfõol" iudc udOH jeks úúO Numerals Shapes Voice
uQ,dY% j,ska o;a; tla /ia l< yel' ixlHdxl yev;, lgyv
(0-9)
Data can be stored safely and securely in
databases, cloud storage, etc. Letters Color Notes
o;a; iuqod" j<l=¿ wdpk jeks oE ;=< o;a; wl=re j¾K iajr
iqrlaI;
s j yd ixúÈ;j .nvd l< yel' (a – z, A -Z)
Symbols Pictures Noise
Data processing can be performed through ixfla; rEm f>daIdj
operations like sorting, filtering, (!, @, #, $, %,)
aggregation, etc.
j¾. lsÍu" fmÍu" tl;= lsÍu jeks fufyhqï Considering the inputs from the five senses,
yryd o;a; ieliSu isÿlr yelsh'
we can also categorize the data as follows.
mxp bkaøshkaf.ka ,efnk wdodk ie,ls,a,g
Data analysis can be carried out by f.k wmg o;a; my; mßÈ o j¾. l<
identifying patterns, trends, correlations. yelsh'
rgd" m%jK;d" iy iïNkaO;d yÿkd.ksñka
o;a; úYaf,aIKh l< yelsh' Sense Types of Examples
data
Data can be shared with others through
reports, presentations. Visual Image Photographs,
jd¾;d" bÈßm;a lsÍu yryd o;a; wka wh rEm PdhdrEm charts, Diagrams,
iu. yqjudre lr.; yelsh' Maps PdhdrEm"
m%ia:dr" rEm
igyka" is;shï
Furthermore, data interpretation and
protection can be performed. Auditory Sounds Music Files, Voice
óg wu;rj o;a; w¾:l;kh yd wdrlaId Yío Yío recordings, Sound
lsÍu isÿl< yelsh' effect ix.S; f.dkq"
y~ má.; lsÍï"
Yío n,mEu
Olfactory Smell Aroma
>kaO iqjo descriptions,
chemical
compounds iqj|
úia;r" ridhksl
ixfhda.
Gustatory Taste Flavor profiles,
ri rih ingredient
compositions ri
me;slv" wuqøjH
ixhq;sh
Tactile Touch Texture
iam¾Y iam¾Yh measurements,
pressure data,
haptic feedback
exture ñkqï" mSvk
o;a;" haptic
m%;sfmdaIK

3
ictfromabc.com
Data Processing Mechanical Processing
o;a; ieliSu hdka;%sl ieliSu
Utilizes basic mechanical tools like
Creating information using data is known typewriters or calculators to assist in
as data processing. processing data.
o;a; Ndú;fhka f;dr;=re ks¾udKh lsÍu o;a; ieliSug iyh ùug h;=re ,shk fyda
o;a; ieliSu f,i ye¢kafõ' .Kl hka;% jeks uQ,sl hdka;%sl fuj,ï
Ndú; lrhs'
Manual Processing
yia;Sh ieliSu Electronic Processing
Performed entirely by humans using tools bf,lafg%dksl ieliSu
like paper, pens, or ledgers, without any Involves the use of computers and software
machinery. to process large amounts of data quickly
hka;% iQ;% fkdue;sj lvodis" mEka fyda jeks and accurately.
fuj,ï Ndú;fhka iïmQ¾Kfhkau ñksiqka úYd, o;a; m%udKhla blaukska yd ksjerÈj
úiska isÿ lrkq ,efí' ieliSug mß.Kl iy uDÿldx. Ndú;h
we;=<;a fõ'

Aspect Data Information


me;slv o;a; f;dr;=re

Definition Raw, unprocessed values or facts. Processed, analyzed, and interpreted data.
w¾: oelaùu wuq" ilia fkdl< w.hka fyda o;a; ilik ,o" úYaf,aIKh lrk ,o
lreKq' iy w¾:l:kh lrk ,o o;a; fõ'
Form Numeric, alphanumeric, text, or Summarized, contextualized, and
wdldr multimedia. ixLHd;aul" structured.
wlaIrdxl" fm<" fyda nyqudOH' idrdxY.;" ikao¾N.; iy jHqy.;'
Structure Unstructured jHqy.; fkdl< Structured jHqy.; l<
jHqyh Lacks specific format or Organized in a predefined format. mQ¾j
organization. ksYaÑ; wdlD;shla ksYÑa ; wdlD;shlska ixúOdkh lr we;'
fyda ixúOdkh ù fkdue;'
Context Lack context or interpretation. Provides context and meaning to data.
ikao¾Nh ikao¾Nh fyda w¾: ksrEmKh o;a; i|yd ikao¾Nh iy w¾:h
fkdue;slu' imhhs'
Purpose Foundation for analysis and Supports decision-making, understanding,
wruqKq decision-making. or communication.
úYaf,aIKh iy ;SrK .ekSu ;SrK .ekSu" wjfndaOh fyda
i|yd moku imhhs ikakf
s õokh i|yd iydh fõ'
Usefulness Requires processing to be valuable. Valuable for decision-making, problem-
m%fhdackh jeo.;a f,i ieliSug wjYH fõ' solving, or insights.
;SrK .ekSu" .eg¿ úi£u fyda ;SlaIaK
nqoaêh i|yd jeo.;a h'
Accessibility May require organization or Often presented in accessible formats for
m%fõYH;dj transformation for usability. ease of understanding.
Wmfhda.;S djh i|yd ixúOdkhla fndfyda úg wjfndaO lr .ekSfï myiqj
fyda mßj¾;khla wjYH úh i|yd m%fõY úh yels wdlD;sj,ska
yelsh' bÈßm;a flfra'
Examples Sales figures, quantities, product Total sales for a period, sales trends, best-
WodyrK codes. selling products.
úl=Kqï ixLHd" m%udK" ksIamdok ld, iSudjla i|yd iïmQ¾K úl=Kqï"
fla;' úl=Kqï m%jK;d" jeäfhkau wf,ú jk
ksIamdok'

4
ictfromabc.com
Classification of Data and Information 3. Primary and Secondary
o;a; j¾.SlrKh iy f;dr;=re j¾.SlrKh m%d:ñl yd oaú;shsl

1. Qualitative and Quantitative Primary


.=Kd;aul iy m%udKd;aul m%d:ñl
Primary data is collected firsthand for a
Qualitative specific research purpose.
.=Kd;aul m%d:ñl o;a; m¾fhaIK wruqKla i|yd
Qualitative data consists of descriptive m%:ufhka /ia lrkq ,efí'
characteristics that cannot be measured
objectively. Ex. Surveys, experiments
iólaIK" w;ayod ne,Sï
.=Kd;aul fjka fjka j ueksh fkdyels
úia;rd;aul ,laIK j,ska iukaú; fõ'
Secondary
Ex. colors, opinions j¾K" woyia oaú;shsl
Secondary data is collected by someone
Quantitative else for a different purpose but can be
m%udKd;aul repurposed for analysis.
Quantitative data consists of numerical oaú;shsl o;a; fjk;a wruqKla i|yd fjk;a
wfhl= úiska tl;= lrkq ,nk kuq;a
measurements or counts. úYaf,aIKh i|yd kej; ilia l< yel'
m%udKd;aul o;a; ixLHd;aul ñkqï fyda
.Kka j,ska iukaú; fõ' Ex. Census data, research articles ix.Kk
o;a;" m¾fhaIK ,sms
Ex. height, weight Wi" nr

4. Discrete and continuous


The following classifications are not in úúla; o;a; iy wLKav
the Syllabus
my; j¾.SlrKhka úIh ks¾foaYfha fkdue; Discrete
úúla;
2. Structured and Unstructured
Discrete data can only take specific values.
jHqy.; yd jHqy.; fkdl<
úúla; o;a; j,g .; yelafla ksYÑ a ;
w.hka mu‚'
Structured
jHqy.; Ex. Integers
Structured data is organized and follows a mQ¾K ixLHd
specific format.
jHqy.; o;a; ixúOdkh lr we;s w;r Continuous
ksYÑ
a ; wdlD;shla wkq.ukh lrhs' wLKav

Ex. Databases, spreadsheets Any value within a range.


mrdihla ;=< we;s ´kEu w.hla'
Unstructured Ex. Real numbers
;djld,sl ;d;aúl ixLHd
Unstructured data lacks a specific format
or
jHqy.; fkdl< o;a;j, ksYÑ a ; wdlD;shla
fyda ixúOdkhla fkdue;'
Ex. Text documents,images, videos

5
ictfromabc.com
5 .Spatial and Temporal 7. Personal and Public
wjldYSh o;a; iy ;djld,sl mqoa.,sl iy f;dr;=re

Spatial Personal
wjldYSh mqoa.,sl

Spatial data refers to data associated with Personal information and data pertain to
geographical locations or positions. individuals and may include demographic
wjldYSh o;a; hkq N+f.da,Sh ia:dk fyda data, contact details, preferences, and
wjia:d yd iïnkaO o;a; fõ' behavioral information.
Ex. GPS coordinates, maps mqoa.,sl f;dr;=re iy o;a; mqoa.,hkag wod<
GPS LKavdxl" is;shï jk w;r ckúldi o;a;" iïnkaO;d úia;r"
ukdm iy yeisÍï f;dr;=re we;=<;a úh yel'
Temporal
;djld,sl Ex. Privacy regulations and ethical
considerations.
Temporal data refers to data associated fm!oa.,sl;aj fr.=,dis iy iodpdrd;aul
with time. i,ld ne,Sï
;djld,sl o;a; hkq ld,h yd iïnkaO o;a;
j,g fhduq lrhs' Public
Ex. timestamps, dates fmdÿ
fõ,djka" Èk
Public information and data are freely
6. Static and Dynamic available and accessible to anyone.
iaÓ;sl o;a; iy .;sl fmdÿ f;dr;=re iy o;a; fkdñf,a ,nd .;
yels w;r ´kEu flfkl=g m%fõY úh yelsh'
Static
iaÓ;sl Ex. Government publications, academic
research papers
Static data does not change over time. rcfha m%ldYk" Ydia;%Sh m¾fhaIK m;%sld
iaÓ;sl o;a; ld,h;a iuÕ fjkia fkdjk
o;a;'
Ex. Demographic data

Dynamic
.;sl

Dynamic data changes over time.


ld,h;a iuÕ fjkia jk o;a;'

Ex. Stock prices, weather data


fldgia ñ," ld,.=K o;a;

6
ictfromabc.com
Characteristics of Useful Information The Golden rule of information
jákd f;dr;=rl ,laIK f;dr;=re ms,sn| iaj¾Kuh kHdh

Timeliness The value of information depends on the


ldf,daÑ;Ndjh time it takes.
f;dr;=rl jákdlu rodmj;skf a ka .;jk
All information must be current. Timely ld,h u;hs'
information is critical to making effective
decisions. The value of information is greatest when it
ish¨ f;dr;=re ld,Sk úh hq;=h' M,odhS ;SrK is created.
.ekSug ld,Sk f;dr;=re b;d jeo.;a fõ' f;dr;=r ks¾udKh jQ wjia:dfõ§ tys
jákdlu Wmßu fõ'
Accuracy
ksrjoH;djh

Accurate information is critical to making


informed decisions.
ksis ;SrK .ekSug ksjerÈ f;dr;=re b;d
jeo.;a fõ'

Completeness
mQ¾K;ajh

Incomplete information is not enough to


make decisions.
wiïmQ¾K f;dr;=re ;SrK .ekSug m%udKj;a
fkdfõ' Its value decreases over time.
ld,h .;j;au tys jákdlu wvq ù hhs
ld,h
Understandability
f;areï .ekSfï yelshdj It regains some value when processing
again. th kej; ieliSfï§ hï w.hla kej;
Information should be clear and concise ,nd .kS'
f;dr;=re ksrjq,a iy meyeÈ,s úh hq;=h

Relevance
wod< nj

Useful information must be relevant to the


task, person, or decision being made.
m%fhdackj;a f;dr;=re wod< ld¾hhg"
mqoa.,hdg fyda .kq ,nk ;SrKhg wod< úh
hq;=h'

7
ictfromabc.com
How the Golden Rule affects various Legal Proceedings
cases kS;suh l%shdoduhka
iaj¾Kuh kS;sh úúO isoaëka ioyd n,mdk
whqre The timing of information disclosure in
legal proceedings significantly influences
Stock Market Trading the outcome of a case, with timely
fldgia fj<|fmd, fj<|du presentation of evidence and witness
testimonies strengthening a party's
In stock trading, information value can
position and court decision.
rapidly change, allowing traders to make
kS;Hdkql+, l%shdoduhkay§
s f;dr;=re fy<sorõ
quick decisions based on market trends, lrk ld,iSudj kvqjl m%;sM,hg ie,lsh
company performance, or economic hq;= f,i n,mdk w;r" kshñ; fõ,djg
indicators. idlaIs iy idlaIslrejkaf.a idlaIs bÈßm;a
fldgia fj<|dfï §" f;dr;=re jákdlu lsÍu md¾Yjhl ia:djrh iy wêlrK
fõ.fhka fjkia úh yels w;r" fj<|m, ;Skÿa j Yla;su;a lrhs'
m%jK;d" iud.ï l%shdldß;ajh fyda wd¾Ól
o¾Yl u; mokïj blauka ;SrK .ekSug
fj<÷kag bv i,ihs' Business Decision-Making
jHdmdr ;SrK .ekSu
However, late arrivals can reduce the value
of the information. Real-time data plays a critical role in
flfia fj;;a" marudo ù meñŒu f;dr;=re ensuring that decisions are based on the
j, jákdlu wvq l< yelsh' most accurate and current information.
.kq ,nk ;SrK jvd;a ksjerÈ iy j¾;udk
f;dr;=re u; mokï jk nj iy;sl lsÍfïÈ
Emergency Response ;;H ld,Sk o;a; b;du;a ;SrKd;aul
yÈis m%;spdr ld¾hNdrhla bgq lrhs'

In emergencies like natural disasters or If market trends shift, such as a sudden


accidents, timely information is crucial for demand for a product or changes in
responders to assess the situation and customer preferences, real-time data
coordinate rescue efforts, while delayed or allows businesses to adjust their strategies
inaccurate information can hinder response promptly to capitalize on opportunities or
efforts and worsen outcomes. mitigate risks.
iajdNdúl úm;a fyda yÈis wk;=re jeks yÈis ksIamdokhla i|yd yÈis b,a¨ula fyda
wjia:djkays§" m%;spdr olajkakkag ;;a;ajh mdßfNda.ls wNsreÑj, fjkiaùï jeks
;lafiare lsÍug iy .,jd .ekSfï fj<|m, m%jK;d fjkia jkafka kï" ;;H
W;aidyhka iïnkaëlrKh lsÍug ldf,daÑ; ld,Sk o;a; jHdmdrj,g wjia:d m%fhdackhg
f;dr;=re b;d jeo.;a jk w;r m%udo jQ fyda .ekSug fyda wjodkï wju lsÍu ioyd
idjoH f;dr;=re m%;spdr m%h;akhkag ndOdjla läkñka ;u Wmdh ud¾. kej; ilia lsÍug
úh yels w;r m%;sM, krl w;g yeßh yel' bv i,ihs'

Decisions based on outdated information


can lead to errors, such as investing in
declining markets or targeting the wrong
audience. Up-to-date data ensures choices
are aligned with current realities.
h,a mek .sh f;dr;=re u; mokï jQ ;SrK
my; jefgk fj<|m,j, wdfhdackh lsÍu
fyda jerÈ fm%alaIlhska b,lal lsÍu jeks fodaI
j,g ;=vq Èh yelsh' hdj;ald,Sk o;a; j;auka
h:d¾:hka iuÕ ;SrKj, fm<.eiaùu
iy;sl lrhs'

8
ictfromabc.com
Big data • Velocity
uyd o;a; m%fõ.h

Big data is a term used to describe data sets Big data is generated at high speeds
that are too large and complex to be and requires rapid processing and
processed using traditional methods and analysis.
tools within a reasonable time frame. uyd o;a; by< fõ.hlska ckkh jk
uyd o;a; hkafkka woyia lrkafka w;r fõ.j;a ieliqï iy úYaf,aIKh
idïm%odhsl o;a; ieliqï l%u iy idOdrK wjYH fõ'
ld, rduqjla ;=< .%yKh lr .ekSug" .nvd
lsÍug" l<ukdlrKh lsÍug iy • Variety
úYaf,aIKh lsÍug we;s fuj,ïj, úúO;ajh
yelshdjka blaujd hk úYd, iy ixlS¾K
o;a; lÜg, fõ' Big data comes in diverse formats and
types, including structured data (e.g.,
The term big data is characterized by four databases), semi-structured data (e.g.,
main features, known as the 4Vs, namely: XML, JSON), and unstructured data
volume, veracity, velocity, and variety. (e.g., text, images, videos).
uyd o;a; tys mßudj" m%fõ.h" úúO;ajh iy uyd o;a;" jHqy.; o;a; ^Wod'" o;a;
i;H;dj u.ska ksrEmKh l< yel' fïjd 4Vs iuqodhka&" w¾O jHqy.; o;a; ^Wod ^XML,
f,i ye¢kafõ'
JSON) iy jHqy.; fkdjk o;a; ^Wod'"
fm<" rEm" ùäfhda& we;=¿ úúO wdlD;s
• Volume iy j¾. j,ska meñfKa'
Mßudj
This variety poses challenges for
Big data involves vast amounts of data,
traditional data management and
often ranging from terabytes to
analysis methods.
petabytes or even exabytes in size. fuu m%fNaoh iïm%odhsl o;a;
uyd o;a; m%udKhla we;=<;a fõ" fndfyda l<ukdlrK iy úYaf,aIK l%u i|yd
úg fgrdnhsÜ isg fmgdnhsÜ olajd fyda wNsfhda. lrhs'
m%udKfhka tlaidnhsÜ olajd Èfjhs'
Tools used in big data processing
uyd o;a; ieliSug Ndú;d lrk úê
• Veracity
i;H;dj • Hadoop
• Apache Spark
Ensuring the accuracy, reliability, and • Apache Flink
quality of big data is crucial for • Apache Kafka
generating meaningful insights and • Apache Storm
making reliable decisions. • Apache NiFi
úYd, o;a;j, ksrjoH;djh" • Hive
úYajikSh;ajh iy .=Kd;aulNdjh
iy;sl lsÍu w¾:j;a ;SlaIaK nqoaêhla • Pig
ckkh lsÍug iy úYajdiodhl ;SrK • Databricks
.ekSug b;d jeo.;a fõ' • Amazon

9
ictfromabc.com
Application of Big data 2. Finance
uyd o;a;j, fhÿï
The finance sector deals with enormous
volumes of transactions every day.
uQ,H wxYh iEu Èklu w;súYd, .kqfokq
m%udKhla iu. lghq;= lrhs'

Big data is crucial for monitoring these


transactions, detecting fraudulent
activities, managing risks, and making
investment decisions.
fuu .kqfokq wëlaIKh" jxpksl
l%shdldrlï y÷kd .ekSu" wjodkï
l<ukdlrKh iy wdfhdack ;SrK .ekSu
i|yd úYd, o;a; b;d jeo.;a fõ'
Fields that use big data typically require
advanced technologies and methods to • SAS
store, process, and analyze this data to
extract meaningful insights. A powerful analytics tool used for fraud
uyd o;a; Ndú; lrk lafIa;%j,g
detection, risk management, and
idudkHfhka fuu o;a; .nvd lsÍug"
ieliSug iy w¾:j;a f;areula ,nd .ekSug compliance in finance.
tajd úYaf,aIK lsÍug Wiia ;dlaIKhka iy jxpd y÷kd.ekSu" wjodkï l<ukdlrKh
l%u wjYH fõ' iy uQ,H lghq;=j,g wkql+, ùu i|yd Ndú;d
lrk m%n, úYaf,aIK fuj,uls'
1. Healthcare
• Apache Spark
Healthcare generates vast amounts of data,
including patient records, medical images,
genomic information, and treatment Used for processing large-scale transaction
histories. Big data analysis helps to improve data in real-time.
;;H ld,Skj uyd mßudK .kqfokq o;a;
patient outcomes and healthcare services.
ieliSu i|yd Ndú; flf¾'
fi!LH i;aldrhkayo s s frda.kS f
a .a jd¾;d"
ffjoH rEm" cdkuh f;dr;=re iy m%;sldr
b;sydih we;=¿j úYd, o;a; m%udKhla
ckkh lrhs' úYd, o;a; úYaf,aIKh 3. Retail
frda.k
S f
a .a m%;sM, iy fi!LH fiajd jeäÈhqKq
lsÍug WmldÍ fõ' Retailers collect data from various sources
like sales transactions, customer feedback,
• Apache Hadoop and social media interactions.
Used to store and process massive volumes is,a,r fjf<kaoka úl=Kqï .kqfokq"
mdßfNda.l s m%;sfmdaIK iy iudc udOH
of patient data across a distributed system. wka;¾l%h s d jeks úúO uQ,dY%j,ska o;a; /ia
fnod yßk ,o moaO;shla yryd frda.k S f
a .a lr;s'
o;a; úYd, m%udKhla .nvd lsÍug iy
ieliSug Ndú;d lrhs'
Big data helps in understanding customer
• IBM Watson Health preferences, optimizing inventory, and
A platform that uses AI and big data to enhancing the shopping experience.
analyze medical records and provide uyd o;a;, mdßfNda.ls ukdmh wjfndaO lr
.ekSug" bkafjkagß m%Yia; lsÍug iy idmamq
insights on patient care. ijdß w;aoelSu jeä ÈhqKq lsÍug WmldÍ fõ'
ffjoH jd¾;d úYaf,aIKh lsÍug iy frda.S
i;aldr ms<sn| wjfndaOh ,nd §ug AI iy
úYd, o;a; Ndú; lrk fõÈldjls'

10
ictfromabc.com
• Apache Hive • GeoSpock

Provides a platform for analyzing


Used to analyze large sets of customer data
geospatial data, enabling better route
stored in distributed storage.
fnod yßk ,o .nvdfõ .nvd lr we;s optimization.
mdßfNda.ls o;a; úYd, lÜg, úYaf,aIKh N+f.da,Sh o;a; úYaf,aIKh lsÍu i|yd
lsÍug Ndú;d lrhs' fõÈldjla imhhs" jvd fyd| ud¾.
m%Yia;lrKh il%Sh lrhs'
• Amazon Redshift
5. Social Media

Used to run complex queries on massive iudc udOH


datasets, enabling the retailer to tailor
recommendations. Social media platforms generate massive
is,a,r fjf<kaodg ks¾foaY ilia lsÍug yels amounts of data from user interactions,
jk mßÈ oejeka; o;a; lÜg, u; ixlS¾K posts, likes, and shares.
úuiqï Odjkh lsÍug Ndú;d lrhs' iudc udOH fõÈld mßYS,l wka;¾l%h s d" m<
lsÍï" likes iy shares j,ska úYd, o;a;
4. Transportation m%udKhla ckkh lrhs'
m%jykh
Big data is used to analyze this information
The transportation industry generates data to understand trends, user behavior, and
from GPS systems, traffic sensors, and target advertisements.
vehicle telemetry. m%jK;d" mßYS,l yeisÍï iy b,lal fj<|
m%jdyk l¾udka;h GPS moaO;s" r:jdyk oekaùï f;areï .ekSug fuu f;dr;=re
ixfõol iy jdyk ÿrñ;sh u.ska o;a; úYaf,aIKh lsÍug úYd, o;a; Ndú;d lrhs'
ckkh lrhs'
• Hadoop Distributed File System
Big data is used to optimize routes, reduce (HDFS)
fuel consumption, and predict when
maintenance is needed. Stores vast amounts of unstructured data
úYd, o;a; ud¾. m%Yia; lsÍug" bkaOk from social media interactions.
mßfNdackh wvq lsÍug iy kv;a;=j wjYH iudc udOH wka;¾l%h s d j,ska jHqy.; fkdjQ
úg mqfrdal:kh lsÍug Ndú;d lrhs' o;a; úYd, m%udKhla .nvd lrhs'

• MapReduce • Apache Storm

Used for processing large amounts of trip Processes real-time streams of social media
data to identify optimal routes. data to detect trending topics.
m%Yia; ud¾. y÷kd .ekSu i|yd úYd, m%jK;d ud;Dld y÷kd .ekSug iudc udOH
ixpdr o;a; ieliSu i|yd Ndú;d lrhs' o;a;j, ;;H ld,Sk m%jdyhka ilihs'

11
ictfromabc.com
Aspect Big Data Normal Data

Volume Extremely large data sets, often in Smaller, manageable data sets, typically
mßudj terabytes or petabytes. in megabytes or gigabytes.
fndfyda úg fgrdnhsÜ fyda fmgdnhsÜ idudkHfhka fu.dnhsÜ fyda .s.dnhsÜ
j,ska we;s b;d úYd, o;a; lÜg, fõ' j,ska we;s l=vd" l<ukdlrKh l< yels
o;a; lÜg, fõ'
Variety Includes structured, semi-structured, Primarily structured data, such as
úúO;ajh and unstructured data (e.g., text, spreadsheets or databases.
video, sensor data). uQ,sl jYfhka me;=reïm;a fyda o;a;
jHqy.;" w¾O jHqy.; iy jHqy.; iuqodhka jeks jHqy.; o;a; fj'
fkdjk o;a; ^Wod( fm<" ùäfhda"
ixfõol o;a;& o;a; we;=<;a fõ'
Velocity Data is generated and processed at Data is processed at a slower pace.
m%fõ.h high speed, often in real-time. o;a; ilikq ,nkafka ukao.dó
fndfyda úg ;;H ld,Skj" o;a; fõ.hlsks'
W;amdokh lr wêl fõ.fhka ilikq
,nhs'
Complexity Requires advanced tools and Can be analyzed using traditional tools
ixlS¾K;ajh technologies to analyze due to its like spreadsheets or databases.
diversity and volume. me;=reïm;a fyda o;a; iuqodhka jeks
tAjdfha úúO;ajh iy mßudj iïm%odhsl fuj,ï Ndú;fhka
fya;=fjka úYaf,aIKh lsÍug Wiia úYaf,aIKh l< yel'
fuj,ï iy ;dlaIKhka wjYH fõ'
Storage Stored using distributed systems like Stored on local servers, relational
.nvd lsÍu Hadoop, cloud storage, or NoSQL databases, or standalone systems.
databases. ia:dkSh fiajdodhlhka" iïnkaO;d o;a;
Hadoop" ^cloud t
s orage& fyda ^NoSQL& iuqodhka fyda iajdëk moaO;s u; .nvd
o;a; iuqodhka jeks fnod yßk ,o lr we;'
moaO;s Ndú;fhka .nvd lr we;'

Analysis Requires specialized tools (e.g., Can be analyzed using basic statistical
úYaf,aIKh Spark, Hadoop) and techniques like methods and simpler tools.
machine learning. uQ,sl ixLHdk l%u iy ir, fuj,ï
úfYaIs; fuj,ï ^Wod'" ^Spark"& Ndú;fhka úYaf,aIKh l< yel'
^Hadoop&& iy hka;% bf.kSu jeks
;dlaI‚l l%u wjYH fõ'
Scalability Designed to scale dynamically across Limited scalability due to hardware and
mßudKh multiple systems to handle growth. software constraints.
j¾Okh yeisrùu ioyd moaO;s oDVdx. iy uDÿldx. ixndOl fya;=fjka
.Kkdjla yryd .;slj mßudKh iSñ; mßudK yelshdjla we;'
lsÍug yels f,i ks¾udKh lr we;'
Cost Higher costs due to infrastructure, Lower costs as it relies on standard
msßjeh tools, and expertise requirements. software and hardware.
há;, myiqlï" fuj,ï iy úfYaI{ tAjd iïu; uDÿldx. iy oDVdx. u; r|d
wjYH;d fya;=fjka msßjeh by<h' mj;sk neúka úhou wvqh'
Examples Social media data, IoT sensor data, Employee records, financial statements,
WodyrK transaction logs, multimedia content. or customer databases.
iudc udOH o;a;" ^IoT& ixfõol fiajl jd¾;d" uQ,H m%ldYk fyda
o;a;" .kqfokq f,d." nyqudOH mdßfNda.sl o;a; iuqodhka'
wka;¾.;'

12
ictfromabc.com
13
ictfromabc.com
Applicability of information in
day-to-day life
tÈfkod Ôú;fha§ f;dr;=rej, fhda.H;dj

1. Decision Making
;SrK .ekSug

Information helps explore alternative


solutions and choose the most favorable
course of action for a problem.
úl,am úi÷ï .fõYKh lsÍug iy .eg¨jla
i|yd jvd;a iqÿiq l%shdud¾.hla f;dard
.ekSug f;dr;=re WmldÍ fõ'

Decision-making based on accurate


information reduces uncertainty and
minimizes risks. Most of the decisions taken
without considering the information are
unsuccessful.
ksjerÈ f;dr;=re u; mokïj ;SrK .ekSu
wúksYÑa ;;djh wvq lrk w;r wjodkï wju
lrhs' tfukau f;dr;=re fkdi,ld yßñka
.kq ,nk fndfyda ;SrK wid¾:l fõ' 2. Planning and Policy making
ie,iqï lsÍu iy m%;sm;a;s iïmdokh
There are 7 main steps in the decision-
making process.
;SrK .ekSfï l%shdj,sfha m%Odk mshjr 7la
we;'

1. Identify the problem.


.eg¨j y÷kd .ekSu
2. Gather relevant info.
wod< f;dr;=re /ia lsÍu
3. Identify the alternatives.
úl,am y÷kd .ekSu
4. Weigh the evidence.
idlaIs ms,snoj fidhd ne,Su
5. Choose among the alternatives.
úl,am w;ßka tlla f;dard .ekSu
Information helps to give an insight on the
6. Take action. former policies and how they have affected
mshjr wdrïN lsÍu people so information is used to compile
7. Review your decision. policies.
Tfí ;SrKh iudf,dapkh lsÍu mer‚ m%;sm;a;s yd tAjdfha n,mEu ms<snoj
ukd oekqula ,nd.ekSug f;dr;=re Wojq fõ'
tksid m%;sm;a;s iïmdokfha§ wod, f;dr;=re
i,ld ne,Su isÿfõ'

14
ictfromabc.com
There are 5 main stages in policy making 4. Planning and supervision activities
process. ie,iqï lsÍu yd wëlaIKh lsÍu
m%;sm;a;s iïmdok l%shdj,sfha m%Odk wÈhr
5la we;' Plans are used to achieve targets and and
on the process supervision is really
1. Problem identification important.
.eg¿j y÷kd.ekSu ie,iqï u.ska b,lal ilia lrk w;r tu
2. Agenda Setting ie,iqï l%shd;aul ùu wëlaIKh lrkq ,nhs'
kHdh m;% ieliSu
Below are some steps of a process followed
3. Policy Formulation in planning.
m%;sm;a;s iïmdokh ie,iqï lsÍfï§ wkq.ukh lrk l%shdj,shl
4. Policy Adoption mshjr lsyms hla my; oelafõ'
m%;sm;a;s iïu; lsÍu
1. Setting Goals and Objectives
5. Policy Implementation b,lal iy wruqKq ieliSu
m%;sm;a;s l%shd;aul lsÍu
2. Identifying Tasks and Activities
6. Policy Evaluation ld¾hhka iy l%shdldrlï y÷kd .ekSu
m%;sm;a;s we.hSu
3. Resource Allocation
iïm;a fjka lsÍu
3. Predictions of the future 4. Scheduling and Timelines
wkd.;h mqfrdal:kh lsÍu ld,igyka mj;ajd.ekSu

Information available in the present is used 5. Risk Management


wjodkï l<ukdlrKh
to predict how future could be. This is only
an idea but not 100% true. 6. Communication Plan
j¾;udkfha mj;sk o;a; Ndú;d lrñka ikakf
s õok ie,eiau
wkd.;h mqfrdal:kh lsÍug yelshdj we;' 7. Quality Assurance
fuu mqfrdal:khka woyila muKla jk w;r .=K;aj iy;slh
100] ksjerÈ fkdfõ'
Also, some steps to be supervising the
We can make predictions in various fields
related plans are shown below.
such as technology, climate change, global
tfukau wod, ie,iqï wëlaIKh lsÍfï§o
economy, demographics, health care, wkq.ukh lrk mshjr lSmhla my;ska
education, politics and governance and the oelafõ'
environment.
;dlaIKh" foaY.=‚l úm¾hdi" f.da,Sh 1. Team Leadership
wd¾Ólh" ckúldYkh" fi!LH i;aldr" lKavdhï kdhl;ajh
wOHdmkh" foaYmd,kh iy md,kh iy
mßirh jeks úúO lafIa;% Tiafia wmg 2. Monitoring Progress
mqfrdal:khka isÿ l, yelsh' m%.;sh ksÍlaIKh lsÍu
3. Performance Management
But we should not always make decisions ld¾h idOk l<ukdlrKh
based on predictions. Then we can have an
4. Problem Solving
advantage as well as a disadvantage. .eg¿ úi£u
kuq;a wms iEuúgu mqfrdal:khka u;u /§
;SrK fkd.; hq;=h' túg wmg jdishla fukau 5. Decision Making
wjdishlao isÿ úh yel' ;SrK .ekSu
6. Stakeholder Engagement
md¾Yjlrejkaf.a iyNd.S;ajh
7. Continuous Improvement
wLKav jeäÈhqKq lsÍu

15
ictfromabc.com
Drawbacks of manual methods in Inconsistency
manipulating data and information fkd.e<mSu
w;ayqre l%uj,sk"a o;a; iy f;dr;=re
yeisrùfï § we;s jk miqnEu Manual data handling can result in
inconsistencies due to varying individual
Drawbacks of manual methods in interpretations and entry errors. For
manipulating data and information is example, in financial reporting, different
known as time-consuming data entry, personnel may record data differently,
increased human error, difficulties in leading to discrepancies in figures.
sharing information, and data w;ayrq e o;a; yeisrùu úúO mqoa., w¾:l:k
inconsistency across files, complicating iy we;=,aùfï fodaI fya;=fjka fkd.e<mSï
updates. we;s úh yel' ksoiqkla jYfhka" uQ,H
o;a; iy f;dr;=re yeisrùfï§ w;ayr q e jd¾;dlrKfha§" úúO mqoa.,hska o;a; fjkia
l%ufõoj, wvqmdvq f,i y÷kajkq ,nkafka f,i igyka l< yels w;r" th ixLHdj,
ld,h .;jk o;a; we;=<;a lsÍï" jeäjk úIu;d we;s lrhs'
udkj fodaI" f;dr;=re yqjudre lr .ekSfï
ÿIalr;d iy f.dkq w;r o;a; fkd.e<mSï" Automated systems help maintain
hdj;ald,Sk lsÍï ixlS¾K lsÍu f,isk's uniformity and accuracy, reducing human
errors and ensuring consistent, reliable
Examples data for better reporting and analysis.
WodyrK iajhxl%Sh moaO;s tAldldß;ajh iy
ksrjoH;djh mj;ajd .ekSug;a" udkj fodaI
1. Inconsistency wju lsÍug;a" jvd fyd| jd¾;dlrKh iy
fkd.e<mSu úYaf,aIKh i|yd ia:djr" úYajdiodhl o;a;
iy;sl lsÍug;a WmldÍ fõ'
2. Duplication in data
o;a; wkqmsgm;a lsÍu Duplication in data
o;a; wkqmsgm;a ùu
3. Human errors and delay in processing
udkj fodaI iy ieliSfï m%udoh Manual data entry frequently results in
duplication, where the same information is
4. Not easily upgradable recorded multiple times, leading to
myiqfjka hdj;ald,Sk l< fkdyels nj confusion and inefficiency. For example,
customer databases may have multiple
entries for the same individual due to
different employees inputting data.
w;ayrq e o;a; we;=<;a lsÍu ks;r ks;r
wkqmsgm;a ùula we;s lrhs" tys§ tlu
f;dr;=re lsym
s j;djla jd¾;d ù"
jHdl+,;ajhg yd wld¾hlaIu;djhg uÕ
mdohs' WodyrKhla f,i" úúO fiajlhska
o;a; we;=<;a lsÍu fya;=fjka mdßfNda.sl
o;a; iuqodhka tlu mqoa.,hd i|yd nyq
m%fõYhka ;sìh yel'

Automated systems prevent duplication by


using validation checks and maintaining a
single source of truth, ensuring unique and
accurate data entries.
iajhxl%Sh moaO;s j,x.= lsÍfï fplam;a
Ndú;d lsÍfuka iy i;Hfha ;ks uQ,dY%hla
mj;ajd f.k hdfuka" woaú;Sh iy ksjerÈ
o;a; we;=<;a lsÍï iy;sl lsÍfuka wkqmsgm;a
ùu j<lajhs'

16
ictfromabc.com
Human errors and delay in processing Reduced customer service
udkj fodaI iy ieliSfï m%udoh mdßfNda.sl fiajd wvq lsÍï

Manual data processing is susceptible to Manual data management slows response


human errors, such as miscalculations and times and increases errors, negatively
incorrect entries, leading to inaccuracies. affecting customer service.
Furthermore, the reliance on human labor w;ayrq e o;a; l<ukdlrKh m%;spdr oelaùfï
can cause delays in data entry and analysis. fõ,djka ukao.dó jk w;r fodaI jeä lrhs"
w;ayrq e o;a; ieliSu jerÈ .Kkh lsÍï iy mdßfNda.l s fiajhg wys;lr f,i n,mdhs'
jerÈ we;=<;a lsÍï jeks udkj fodaI j,g
f.dÿre úh yels w;r th idjoHNdjhg fya;= For instance, scattered customer
fõ' ;jo" udkj Y%uh u; r|d mej;Su o;a; information can delay retrieval, frustrating
we;=<;a lsÍfï iy úYaf,aIKfha m%udohka clients.
we;s l< yelsh' ksoiqkla jYfhka" úisÍ we;s mdßfNda.l s
f;dr;=re kej; ,nd .ekSu m%udo l< yels
Automated systems reduce human errors w;r" .kqfokqlrejka l,lsÍug m;a lrhs'
and speed up processing times, improving
efficiency and enabling timely decision- Automated systems improve service by
making based on reliable data. ensuring quick access to accurate data,
iajhxl%Sh moaO;s udkj fodaI wju lr enabling prompt responses to inquiries
ieliSfï ld,h fõ.j;a lrhs" and enhancing customer satisfaction.
ld¾hlaIu;dj jeä ÈhqKq lrhs iy iajhxl%Sh moaO;s u.ska ksjerÈ o;a; fj;
úYajdiodhl o;a; u; mokïj ld,dkqrEmS blauka m%fõYh iy;sl lsÍu" úuiSï j,g
;SrK .ekSu il%Sh lrhs' blauka m%;spdr oelaùu iy mdßfNda.l s
;Dma;sh jeä lsÍu u.ska fiajdj jeäÈhqKq
Limited information sharing lrhs'
iSñ; f;dr;=re yqjudre lsÍï

Manual data handling restricts information


sharing due to reliance on physical
documents or isolated systems, making
access to up-to-date data difficult.
w;ayrq e o;a; yeisrùu fN!;sl f,aLk fyda
yqol,d moaO;s u; hemSu fya;=fjka f;dr;=re
fnod.ekSu iSud lrhs" hdj;ald,Sk o;a; fj;
m%fõYh ÿIalr lrhs'

For example, if reports are stored


separately, consolidating information
becomes cumbersome.
WodyrKhla f,i" jd¾;d fjk fjku .nvd
lr we;akï" f;dr;=re tAldnoaO lsÍu wmyiq
fõ'
Automated systems improve information
sharing by centralizing data and providing
real-time access, fostering collaboration
and ensuring that all team members use
the most current information.
iajhxl%Sh moaO;s o;a; uOH.; lsÍfuka iy
;;H ld,Sk m%fõYh ,nd §fuka"
iyfhda.; S djh fmdaIKh lsÍfuka iy ish¨u
lKavdhï idudðlhska jvd;a j¾;udk
f;dr;=re Ndú;d lrk nj iy;sl lsÍfuka
f;dr;=re fnod.ekSu jeä ÈhqKq lrhs'

17
ictfromabc.com
Infeasibility of applying manual Harmful waste automation
methods where they can be harmful to ydkslr wmøjH iajhxl%ShlrKh
humans
ñksia ðú;j,g wk;=rla we;s úh yels Automated systems in hazardous waste
wjia:dj, § yia; uQ,sl l%u Ndú; l< management safely handle toxic materials,
fkdyels nj minimizing human exposure to risks.
ydkslr wmøjH l<ukdlrKfha iajhxl%Sh
This refers to the need for technical devices moaO;s wdrlaIs;j úI øjH yiqrejhs" ñksiqka
to gather data in environments that are wjodkïj,g ksrdjrKh ùu wju lrhs'
inaccessible or dangerous for human
workers. Robots can efficiently sort and dispose of
fuhska woyia lrkafka udkj fiajlhskg a hazardous substances, enhancing
m%fõY úh fkdyels fyda wk;=reodhl mßir operational safety and compliance with
;=< o;a; /ia lsÍug ;dlaI‚l Wmdx.j, environmental regulations.
wjYH;djhhs' frdfndajrekag wk;=reodhl øjH ld¾hlaIuj
j¾. lsÍu iy neyer lsÍu" fufyhqï
wdrlaIdj jeä ÈhqKq lsÍu iy mdßißl
Automation examples for harmful Jobs fr.=,dis j,g wkql+, ùu'
ydkslr /lshd i|yd iajhxl%ShlrKfha
WodyrK
Autonomous AUVs
1. Harmful Waste Automation
ydkslr wmøjH iajhxl%ShlrKh iajhxl%Sh AUVs

Autonomous Underwater Vehicles (AUVs)


2. Autonomous AUVs
enable safe deep-sea exploration by
iajhxl%Sh AUVs
collecting data in environments too
dangerous for divers.
3. Spraying Drones
biSfï fv%dak iajhxl%Sh Èh hg jdyk AUVs
lsñÿïlrejkag b;d Nhdkl mßirj, o;a;
/ia lsÍfuka wdrlaIs; .eUqre uqyf q oa
4. Recycling Sorting Robots .fõIKh il%Sh lrhs'
frdfndajre m%;spl%SlrKh j¾. lsÍu

5. Self-Driving Trucks
iajhx-ßhÿre g%la r:

6. Sewage Inspection Robots


wmøjH mÍlaId lsÍfï frdfndajre

7. Emergency broadcast signals


yÈis úldYk ix{d

8. Bad weather warnings


whym;a ld,.=K wk;=re we.ùï Equipped with sensors and cameras, AUVs
gather information about marine life and
9. Harmful radiation underwater geology.
wys;lr úlsrK
ixfõol iy leurd j,ska iukaú; AUVs
iuqø Ôùka iy Èh hg N+ úoHdj ms<sn|
10. To save human lives f;dr;=re /ia lrhs'
ñksia Ôú; .,jd .ekSu ioyd

11. For scientific, space experiments


úoHd;aul" wNHjdldY mÍlaYK ioyd

18
ictfromabc.com
Spraying drones Self-driving trucks
biSfï fv%dak iajhx-ßhÿre g%la r:

Automated crop spraying drones are Self-driving trucks are revolutionizing


transforming agriculture by efficiently logistics by automating long-distance
applying pesticides and fertilizers while transport, reducing risks associated with
reducing worker exposure to harmful manual driving, such as fatigue and
chemicals. accidents. These autonomous vehicles
iajhxl%Sh fnda. bisk fv%dak hdkd u.ska enhance efficiency in supply chains.
lDIsl¾udka;h mßj¾;kh lrñka iajhx-ßh mojk g%la r: È.= ÿr m%jdykh
m<sfndaOkdYl iy fmdfydr ld¾hlaIuj iajhxl%Sh lsÍu" f;fyÜgqj iy wk;=re jeks
fh§fuka ydkslr ridhksl øjHj,g fiajl w;ska ßh meoùu yd iïnkaO wjodkï wju
ksrdjrKh wvq lrhs' lsÍu u.ska iemhqïj, úma,ùh fjkila isÿ
lrhs' fuu iajhxl%Sh jdyk iemhqï oduj,
ld¾hlaIu;dj jeä lrhs'

These drones ensure precise application,


promoting safer farming practices.
fuu fv%dak hdkd wdrlaIs; f.dú;eka ms<sfj;a
m%j¾Okh lrñka ksrjoH fh§ï iy;sl lrhs' Their potential for 24/7 operation will lower
transportation costs and improve road
Recycling/sorting robots safety.
m%;spl%SlrKh$ j¾. lsÍfï frdfndajre 24/7 fufyhqï i|yd Tjqkf a .a úNjh m%jdyk
úhoï wvq lrk w;r ud¾. wdrlaIdj jeä
Recycling sorting robots enhance efficiency ÈhqKq lrhs'
in separating materials like glass and metal,
minimizing human contact with hazardous Sewage inspection robots
waste. Equipped with sensors and AI, they wmøjH mÍlaId lsÍfï frdfndajre
streamline the recycling process and
reduce contamination rates. Automated sewage inspection robots
m%;spl%SlrK j¾. lsÍfï frdfndajre navigate hazardous sewer systems,
wk;=reodhl wmøjH iuÕ ñksia iïnkaO;d conducting inspections without human
wju lrñka ùÿre iy f,day jeks øjH fjka
lsÍfï ld¾hlaIu;dj jeä lrhs' ixfõol workers entering toxic environments.
iajhxl%Sh wmøjH mÍlaIK frdfndajre
iy AI j,ska iukaú; tAjd m%;spl%SlrK
wk;=reodhl u,dmjyk moaO;sj, ießieÍu"
l%shdj,sh úêu;a lrk w;r ¥IKh ùfï ñksia fiajlhka úI iys; mßirhlg we;=¿
m%;sY;h wvq lrhs' fkdù mÍlaIK mj;ajhs'

19
ictfromabc.com
Emergency Broadcast Signals Harmful Radiation
yÈis úldYk ix{d wys;lr úlsrK

Automated systems are used to quickly In environments with high radiation levels,
transmit emergency alerts, such as natural such as nuclear plants or contaminated
disaster warnings or security threats, across areas, automated systems are deployed to
various media platforms like TV, radio, and monitor radiation levels continuously.
mobile devices. kHIaál n,d.dr fyda ¥Is; m%foaY jeks by<
rEmjdyskh s " .=jkaúÿ,sh iy cx.u Wmdx. úlsrK uÜgï iys; mßirj, úlsrK uÜgï
jeks úúO udOH fõÈld yryd iajNdúl úm;a wLKavj ksÍlaIKh lsÍug iajhxl%Sh moaO;s
wk;=re weÕùï fyda wdrlaIl ;¾ck jeks fhdojkq ,efí'
yÈis wk;=re weÕùï blaukska iïfm%aIKh
lsÍug iajhxl%Sh moaO;s Ndú; flfra' These systems can trigger alarms or initiate
protective measures without human
This rapid response reduces the need for presence.
manual intervention and helps ensure fuu moaO;sj,g wk;=re weÕùï Èh;a lsÍug
public safety by alerting communities to fyda ñksiqka fkdue;sj wdrlaIs; mshjrhka
take immediate action. wdrïN lsÍug yelsh'
fuu fõ.j;a m%;spdrh yia; ueÈy;a ùfï
wjYH;djh wvq lrk w;r laI‚l l%shdud¾. To Save Human Lives
.ekSug m%cdjkag wk;=re weÕùfuka uyck ñksia Ôú; .,jd .ekSu ioyd
wdrlaIdj iy;sl lsÍug WmldÍ fõ'
Automation is employed in high-risk
Bad Weather Warnings situations such as bomb disposal, deep-sea
whym;a ld,.=K wk;=re we.ùï exploration, or firefighting to replace
human involvement in dangerous tasks.
Automated weather monitoring systems fndaïn ksIal%Sh lsÍu" .eUqre uqyf
q oa .fõIK
analyze atmospheric data to detect and lsÍu fyda .sks ksùu jeks wjodkï iys;
forecast severe weather, such as tornadoes, wjia:djkay§ s wk;=reodhl ld¾hhka i|yd
hurricanes, and flash floods. ñksiqkaf.a ueÈy;aùu m%;sia:dmkh lsÍug
iajhxl%Sh ld,.=K ksÍlaIK moaO;s iajhxl%ShlrKh fhdod .kS'
fgdfkafvda" iq<s l=Kdgq iy yÈis .xj;=r jeks
oreKq ld,.=K y÷kd .ekSug iy wkdjels
m< lsÍug jdhqf.da,Sh o;a; úYaf,aIKh For Scientific, Space Experiment
lrhs' úoHd;aul" wNHjdldY mÍlaYK ioyd

When dangerous conditions are detected, Automated systems perform complex


automated alerts are sent to notify the scientific and space-related experiments,
public and emergency services, allowing for especially in extreme or unreachable
faster response and evacuation measures, environments like space, deep ocean, or
which helps minimize risk to human life. toxic sites.
wk;=reodhl ;;a;ajhka wkdjrKh jQ úg" iajhxl%Sh moaO;s u.ska úfYaIfhka
fõ.j;a m%;spdr oelaùug iy bj;a lsÍfï wNHjldYh" .eUqre id.r fyda úI iys;
mshjrhkag bv i,iñka uyck;djg iy ia:dk jeks wdka;sl fyda <Õd úh fkdyels
yÈis fiajdj,g oekqï §u i|yd iajhxl%Sh mßirj, ixlS¾K úoHd;aul iy wNHjldY
weÕùï hjkq ,efí' tuÕska ñksia Ôú;hg wdY%s; w;ayod ne,Sï isÿ lrhs'
we;s wjodku wju fõ'

20
ictfromabc.com
Emergence of ICT era 2. Unlimited Connectivity
f;dr;=re ;dlaIK hq.fha Wodj ksula ke;s iïnkaO;djh

This began in the mid-20th century with the The ICT era has enabled seamless global
invention of the first electronic computers. communication through advancements
fuh 20 jeks ishjfia ueo Nd.fha§ m%:u
úoHq;a mß.Kl fidhd .ekSu;a iuÕ wdrïN like high-speed internet, mobile networks,
úh and satellite connections, allowing instant,
continuous connectivity across distances.
ICT has passed many eras and has become wêfõ.S wka;¾cd," cx.u cd, iy pkaøsld
a need of people in day today tasks. ICT iïnkaO;d jeks ;dlaIKhka yryd ndOdjlska
f;drj f,dalh mqrd laI‚l" wLKav
evolved from computers with large
iïnkaO;dj,g bv i,iñka ICT hq.h
mechanical structures to small handheld f.da,Sh ikakfs õokh il%Sh lr we;'
devices.
f;dr;=re ;dlaIKh úúO hq. miq lrñka
meñK wo jk úg ñksiqkaf.a tÈfkod lghq;=
3. Unlimited Data Access
lsÍu ioyd myiq jk fohla ;rug ÈhqKq ù
we;' b;d úYd, hdka;% j,ska werö myiqfjka wiSñ; o;a; m%fõYh
/f.k hd yels fuj,ï olajd f;dr;=re
;dlaIKh meñK we;' ICT advancements make vast data
accessible anytime, empowering on-
To overcome the drawbacks of manual demand storage, retrieval, and analysis.
methods of data processing IT was f;dr;=re yd ikakf s õok ;dlaIK ÈhqKqj
introduced. IT made the computers do the uÕska úYd, o;a; j,g ´kEu fõ,djl m%fõY
data processing and it led to lesser time úh yels w;r" b,a¨u u; .nvd lsÍu" ,nd
.ekSu iy úYaf,aIKh iún, .kajhs'
consumption, higher accuracy and it solved
the storage issues as well.
yia;uh l%uhkayS miqneiSï uev,Sug
f;dr;=re ;dlaIKh bÈßm;a flreKq w;r 4. Digital Transformation in All Fields
fuys§ o;a; ieliSu mß.Klhg ndrfok ish¨u jiï j, wxls; mßj¾;k
,§' fuu.ska ld,h b;sßùu" ksrjoH;djh
by, hdu fukau o;a; .nvd lsÍfï m%Yk a ho From healthcare and education to
úifok ,§'
manufacturing and finance, digital tools are
reshaping processes, enabling new
1. Global Connectivity (Global Village) business models, and driving innovation
f.da,Sh iïnkaO;djh ^f.da,Sh .u& across industries.
fi!LH fiajd iy wOHdmkfha isg ksIamdokh
iy uq,HlrKh olajd" äðg,a fuj,ï u.ska
• Facilitated by internet, email, social l%shdj,s m%;sk¾
s udKh lsÍu" kj jHdmdr
media, and digital platforms. wdlD;s il%Sh lsÍu iy l¾udka; yryd
wka;¾cd,h" úoHq;a ;emE," iudc udOH kjHlrKhka fufyhjhs'
iy äðg,a fõÈld u.ska myiqlï imhhs'

• Breaks down geographical barriers.


N+f.da,Sh ndOl ì| ouhs'

• Enables instant information exchange


and collaboration worldwide.
f,dj mqrd laI‚l f;dr;=re yqjudrej
iy iyfhda.; S djh il%Sh lrhs'

21
ictfromabc.com
Automated vs. Manual data handling
iajhxl%Sh vs. w;ayr
q e o;a; yeisrùu

Aspect Automated Manual

Speed Processes large volumes of data Often slow and highly time-
fõ.h rapidly and with high efficiency. intensive to manage.
fõ.fhka iy by< fndfyda úg ukao.dó iy
ld¾hlaIu;djhlska úYd, o;a; l<ukdlrKh lsÍug wêl ld,hla
mßudjla ilihs' jeh fõ'

Accuracy Greatly reduces errors, ensuring Prone to frequent mistakes and


ksrjoH;djh consistently high data accuracy. inaccuracies in records.
ksrka;rfhka by< o;a; jd¾;d ks;r fodaI iy idjoH Ndjhg
ksrjoH;djhla iy;sl lrñka fodaI f.dÿre fõ'
úYd, f,i wvq lrhs'
Reliability Provides consistent and highly Results can be inconsistent and
úYajikSh;ajh reliable data outputs every time. frequently error-prone.
iEu wjia:djl§u ia:djr iy by< m%;sM, wkql+, fkdfõ iy tAjdfha
úYajikSh o;a; m%;sodkhka imhhs' ks;r fodaI we;s úh yel'

Growth Easily scalable to accommodate Limited capacity and challenging to


j¾Okh growing data volumes seamlessly. scale up effectively.
j¾Okh jk o;a; mßudjkag iSñ; Odß;djla we; iy M,odhS f,i
ndOdjlska f;drj myiqfjka mßudKh mßudKh lsÍug wmyiq fõ'
ùug bv ie,ihs'
Sharing Enables broad, fast, and seamless Restricted, slower, and less
fnod.ekSu sharing of data across systems. accessible for sharing needs.
moaO;s yryd mq¿,a" fõ.j;a iy iSud iys;h" ukao.dó fõ" iy
ndOdjlska f;drj o;a; fnod.ekSu fnod.ekSfï wjYH;d i|yd wvq
il%Sh lrhs' m%fõYhla we;'
Cost More cost-effective for ongoing, Generally incurs higher and
msßjeh long-term data management. ongoing operational costs.
oekg mj;sk" È.= ld,Sk o;a; idudkHfhka by< iy wLKav
l<ukdlrKh i|yd jvd;a ,dNodhS fufyhqï úhoï oeÍug isÿfõ'
fõ'
Security Delivers strong, dependable More vulnerable to risks and
wdrlaIdj safeguards. potential security breaches.
Yla;su;a" úYajdiodhl wdrlaIK ,nd wjodkï iy wdrlaIl lvlsÍï j,
fohs' jeä wjodkug ,la fõ'

22
ictfromabc.com
Availability of technologies related to Cloud storage
information retrieval and sharing j,dl=¿ .nvdj
f;dr;=re iuqoaOrKh ^retrieval& yd fnod
.ekSu yd neÿKq ;dlaIKhka ,nd .; yels Cloud storage revolutionizes information
ùu sharing by enabling users to store and
access data remotely via the internet.
The purpose of information retrieval and wka;¾cd,h yryd ÿria:j o;a; .nvd lsÍug
sharing is to provide quick access to data iy m%fõY ùug mßYS,lhskg a yelshdj ,nd
for better decision making and §fuka j,dl=¿ .nvd f;dr;=re fnod.ekSfï
úma,jhla we;s lrhs'
collaboration.
f;dr;=re iuqoaOrKfha iy fnod.ekSfï
wruqK jkafka jvd fyd| ;SrK .ekSu iy This technology allows for easy uploading,
iyfhda.;S djh i|yd o;a; fj; blauka managing, and sharing of files without the
m%fõYh iemhSuhs' need for physical storage.
fN!;sl .nvd lsÍfï wjYH;djhlska f;drj
Examples of info. Retrieval and sharing f.dkq myiqfjka Wvq.; lsÍug"
f;dr;=re iuqoaOrKfha iy fnod.ekSï ioyd l<ukdlrKh lsÍug iy fnod .ekSug fuu
WodyrK ;dlaIKh bv fohs'

1. Search Engines Ex : Google Drive, Dropbox, pCloud


fijqï hka;%
2. Cloud Storage
j,dl=¿ .nvdj
3. Content Management Systems (CMS)
wka;¾.; l<ukdlrK moaO;s (CMS)
4. Collaborative Tools
iyfhda.;S d fuj,ï
5. Database Management Systems
o;a; iuqod l<ukdlrK moaO;s Content management systems (CMS)
wka;¾.; l<ukdlrK moaO;s (CMS)
Search engines
fijqï hka;%
Content management systems (CMS)
Search engines have revolutionized simplify digital content management by
information retrieval by indexing vast allowing users to easily upload, edit, and
amounts of online data, enabling users to organize content without technical skills.
quickly find relevant content through wka;¾.; l<ukdlrK moaO;s (CMS)
keyword searches. ;dlaI‚l l=i,;d fkdue;sj wka;¾.;h
myiqfjka Wvq.; lsÍug" ixialrKh lsÍug
iy ixúOdkh lsÍug mßYS,lhskg a bv §fuka
Their advanced algorithms rank results for äðg,a wka;¾.; l<ukdlrKh ir, lrhs'
efficient access to needed information.
fijqï hka;% úYd, wka;¾cd, o;a; m%udKhla This enhances collaboration and boosts
iqÑ.; lsÍfuka f;dr;=re ,nd.ekSfï
efficiency in content delivery.
úma,ùh fjkila isÿ lr we;" mßYS,lhskg a
uQ, mo fiùï yryd wod< wka;¾.;hka fuh iyfhda.; S dj jeä ÈhqKq lrk w;r
blaukska fidhd .ekSug yels fõ' wjYH wka;¾.; fnod yeÍfï ld¾hlaIu;dj by<
f;dr;=re i|yd ld¾hlaIu m%fõYh i|yd kxjhs'
Tjqkf a .a Wiia we,af.dß;u m%;sM, fY%a‚.;
lrhs' Ex : WordPress , Joomla, Ghost, Craft CMS

Ex : Google, Bing, DuckDuckGo, Ecosia

23
ictfromabc.com
Collaborative tools Database management systems
iyfhda.S;d fuj,ï o;a; iuqod l<ukdlrK moaO;s

Collaborative tools enhance teamwork by Database management systems offer a


allowing users to work together in real structured approach to efficiently store,
time, regardless of location. They facilitate retrieve, and manage data.
communication, file sharing, and project o;a; iuqod l<ukdlrK moaO;s ld¾hlaIuj
management, improving coordination and o;a; .nvd lsÍu" ,nd .ekSu iy
l<ukdlrKh lsÍu i|yd jHqy.; m%fõYhla
productivity. bÈßm;a lrhs'
iyfhda.;s d fuj,ï mßYS,lhskg a ia:dkh
l=ula jqj;a" ;:H ld,Skj tlg jev lsÍug
They enable users to query, update, and
bv §fuka lKavdhï jev jeä ÈhqKq lrhs'
Tjqka ikakfs õokh" f.dkq yqjudre lsÍu iy administer databases without needing in-
jHdmD;s l<ukdlrKh" iïnkaëlrKh iy depth technical knowledge.
M,odhs;dj jeäÈhqKq lsÍu i|yd myiqlï .eUqre ;dlaI‚l oekqula wjYH fkdù o;a;
imhhs' iuqodhka úuiSug" hdj;ald,Sk lsÍug iy
mßmd,kh lsÍug tAjd mßYS,lhskg a yelshdj
Ex : Slack , Microsoft Teams, Flock, Twist ,nd fohs'

By ensuring data integrity and security,


DBMS enhance data accessibility and
support informed decision-making.
o;a; wLKav;dj iy wdrlaIdj iy;sl lsÍu
u.sk"a (DBMS) o;a; m%fõYH;dj jeä ÈhqKq
lrk w;r oekqj;a ;SrK .ekSug iydh fõ'

Ex : MySQL, MongoDB, Couchbase

Advantages and Disadvantages of information retrieval and sharing


f;dr;=re iuqoaOrKfha iy fnod.ekSfï jdis iy wjdis

Advantages Disadvantages

• Information overload possible.


• Quick access f;dr;=re overload l< yelsh'
blauka m%fõYh
• Privacy and security risks.
• Improved collaboration mqoa.,sl;ajh iy wdrlaIl wjodkï'
jeäÈhqKq l< iyfhda.; S dj
• Technology dependence issues.
• Data-driven decisions ;dlaI‚l hemSï .eg¿'
o;a; u; mokï jQ ;SrK
• Increased efficiency • Miscommunication risks.
ld¾hlaIu;dj jeä lsÍu jerÈ ikakf
s õokfha wjodkï'

• Resource management • Variable data accuracy.


iïm;a l<ukdlrKh úp,H o;a; ksrjoH;dj'

24
ictfromabc.com
Computer networks 2. Peer-to-Peer (P2P) Model
mß.Kl cd, iu-iu wdlD;sh

Computer networks are systems that In the peer-to-peer model, every device
connect multiple computers and hardware (called a peer) on the network can act as
components using communication media both a client and a server.
and devices. iu iu wdlD;sfha§" cd,fha we;s iEu
mß.Kl cd, hkq ikakf s õok udOH iy Wmdx.hlgu ^peer f,i ye¢kafjk&
Wmdx. Ndú;fhka nyq mß.Kl iy oDvdx. fiajd,dNsfhl= iy fiajdodhlfhl= hk
ixrpl iïnkaO lrk moaO;shla fõ' fowdldrfhkau l%shd l< yel'
The purpose of computer networks is to
Each peer can share its own resources
enable communication, data sharing, and
directly with other peers.
resource access among interconnected
iEu peer computer tllgu ;ukaf.au
devices.
mß.Kl cd, j, wruqK jkafka wka;¾ iïm;a fjk;a peer computers iu.ska
iïnkaê; Wmdx. w;r ikakf s õokh" o;a; iDcqju fnod .; yelsh'
yqjudre lsÍu iy iïm;a m%fõYh il%Sh
lsÍuhs' All peer computers are considered equal.
ish¨u peer computers iudk f,i i,lkq
,efí'
Classification of networks by structure
jHQyh wkqj cd, j¾. lsÍu
Classification of networks by distribution
1. Client-Server Model úisÍu wkqj cd, j¾. lsÍu
fiajd,dNS-fiajdodhl wdlD;sh
LAN (Local Area Network)
In the client-server model, communication A LAN is used to connect devices in a small
takes place between two types of devices: geographic area, like a home, office, or
clients and servers. building.
fiajd,dNS-fiajdodhl wdlD;sh ;=<" Wmdx. ksjila" ld¾hd,hla fyda f.dvke.s,a,la jeks
j¾. folla w;r ikakf s õokh isÿ fõ( l=vd N+f.da,Sh m%foaYhl Wmdx. iïnkaO
tAjdkï fiajd,dNshd iy fiajdodhlhd fõ' lsÍug LAN Ndú;d lrhs'

Server fiajdodhlhd MAN (Metropolitan Area Network)


The server is a powerful centralized A MAN covers a larger geographic area
computer that provides services, resources, than a LAN but is smaller than WAN.
or data to the clients. MAN tlla LAN tllg jvd úYd, N+f.da,Sh
fiajdodhlh hkq fiajd,dNSkga fiajd" iïm;a
m%foaYhla wdjrKh lrk kuq;a WAN tllg
fyda o;a; imhk n,j;a uOH.;
mß.Klhls' jvd l=vd fõ'

WAN (Wide Area Network)


Client fiajd,dNshd
A WAN covers a broad geographic area,
The clients are usually individual computers
such as an entire country or even globally.
or devices that request these resources.
fiajd,dNSka hkq idudkHfhka fuu iïm;a WAN u.ska uq¿ rgla fyda f.da,Sh jYfhka
b,a,d isák ;ks mß.Kl fyda Wmdx. fõ' mjd mq¿,a N+f.da,Sh m%foaYhla wdjrKh lrhs'

25
ictfromabc.com
The Internet The services provided by the Internet
wka;¾cd,h wka;¾cd,h u.ska imhk fiajd

A collection of many networks distributed


around the world is known as the Internet. 1. File Transfer Protocol (FTP)
f,dj mqrd úisreKq cd, rdYshl tl;=jla
wka;¾cd,h f,i yeÈkafõ' FTP is used to transfer files between
computers over the internet. Users can
The foundation for the internet began in upload and download files by connecting
the 1960s with ARPANET, created by the to an FTP server.
U.S. Department of Defense for secure, wka;¾cd,h yryd mß.Kl w;r
decentralized communication. f.dkq udre lsÍug FTP Ndú;d lrhs'
wdrlaIs;" úuOH.; ikakf s õokh i|yd FTP fiajdodhlhlg iïnkaO ùfuka
tlai;a ckmo wdrlaIl fomd¾;fïka;=j mßYS,lhskag f.dkq Wvq.; lsÍug
úiska ks¾udKh lrk ,o ARPANET iuÕ iy nd.; lsÍug yelsh'
1960 ld,jljdkqfõ§ wka;¾cd,h ioyd jQ
moku wdrïN úh'
2. Email
By the 1990s, it was publicly released, Email is an electronic messaging service
marking the internet’s official birth. that allows users to send and receive
1990 oYlh jk úg wka;¾cd,fha ks, Wm; messages and attachments instantly across
iksgqyka lrñka th uy ckhd fj; m%isoaêfha the globe.
ksl=;a úh' úoHq;a ;emE, hkq f,dj mqrd
laI‚lj m‚úv iy attachments
Since no one owned the internet, The
heùug iy ,nd .ekSug
Internet Society was established to create
mßYS,lhskag bv i,ik úoHq;a
policies and manage its use globally.
wka;¾cd,h lsisjl=g ysñ fkdjQ neúka"
m‚úvlrK fiajdjls'
m%;sm;a;s ks¾udKh lsÍu iy f.da,Sh jYfhka
tys Ndú;h l<ukdlrKh lsÍu i|yd the Accessible through webmail or email
Internet Society kï wdh;kh msyg s qjk ,§' clients like Gmail or Outlook.
Gmail fyda Outlook jeks fjífï,a fyda
The internet quickly became a common Bfï,a fiajd,dNSka yryd m%fõY úh
utility, transforming daily life by providing yel'
instant access to information and
communication.
wka;¾cd,h blaukska fmdÿ Wmfhda.; S djhla
njg m;a jQ w;r" f;dr;=re iy ikakf s õokh
i|yd laI‚l m%fõYhla ,nd §fuka ffoksl
Ôú;h mßj¾;kh lf<ah'

Its foundation relies on TCP/IP protocol,


which allows data to move reliably between
computer.
fuys moku TCP/IP kshudj,sh u; r|d
mj;sk w;r tuÕska mß.Kl w;r
úYajikShj o;a; yqjudre lr .ekSug bv
i,his (will be further discussed in
networking)

26
ictfromabc.com
3. Video Conferencing 5. Telnet
ùäfhda iïuka;%K Telnet allows users to remotely access
another computer or server over the
Video conferencing supports live, internet as if they were directly connected.
interactive virtual meetings, allowing real- Telnet mßYS,lhskag Tjqka iDcqju
time collaboration and engagement iïnkaO ù we;s wdldrhg
among participants over the internet. wka;¾cd,h yryd fjk;a
iyNd.sjkakka w;r ;;H ld,Sk mß.Klhlg fyda fiajdodhlhlg
iyfhda.; S djhg iy ikakf
s õokhg ÿria:j m%fõY ùug bv i,ihs'
wka;¾cd,h yryd bv i,iñka úãfhda
iïuka;%K iÔù" wka;¾l%h s dldÍ w;:H
/iaùï i|yd iyh olajhs' 6. File Sharing
f.dkq yqjudrej
Requirements for a video conference File sharing enables users to share
ùäfhda iïuka;%Khla i|yd wjYH;d documents, media, and other data with
To conduct a video conference, each others online.
participant needs a camera and f.dkq yqjudrej uÕska mßYS,lhskag
microphone for audio and video input, a f,aLk" udOH iy fjk;a o;a;
screen and speaker for output, an internet wka;¾cd,h yryd wka wh iuÕ
connection, and video conferencing fnod .ekSug yelshdj ,efí'
software like Zoom or Google Meet. Ex. Google Drive, Dropbox, and peer-to-
ùäfhda iïuka;%Khla meje;aùu i|yd" iEu
iyNd.sjkafkl=gu Y%jH iy oDYH wdodkh peer networks
i|yd leurdjla iy uhsl%f*dakhla" m%;sodkh
i|yd ;srhla iy iamSlrhla" wka;¾cd, 7. Internet Relay Chat (IRC)
iïnkaO;djla iy Zoom fyda Google Meet IRC is a text-based chat service allowing
jeks ùäfhda iïuka;%K uDÿldx.hla wjYH users to participate in real-time group
fõ' discussions in chat rooms or private
conversations.
Both participants need these components
IRC hkq mßYS,lhskg a chat rooms j, fyda
for effective communication. mqoa.,sl ixjdoj, ;;H ld,Sk lKavdhï
M,odhS ikakf s õokh i|yd iyNd.sjkakka idlÉPdj,g iyNd.S ùug bv i,ik fm<-
fofokdgu fuu ixrpl wjYH fõ' mdol l;dnia fiajdjls'

4. IPTV (Internet Protocol Television) 8. IP Telephone (VoIP)


Streams media content (Ex. Netflix) on IP Telephone, or Voice over Internet
demand without downloading. Protocol (VoIP), provides phone calls over
nd.; lsÍulska f;drj b,a¨u u; udOH the internet instead of traditional phone
wka;¾.;h ^Wod' Netflix& m%jdy lrhs' networks.
IP ÿrl:k" fyda Voice over Internet Protocol
Content is delivered in real time, allowing (VoIP)" iïm%odhsl ÿrl:k cd, fjkqjg
users to watch instantly without local wka;¾cd,h yryd ÿrl:k weu;=ï ,nd foa'
storage.
mßYS,lhskg a ia:dkSh .nvdjlska f;drj Services like Skype and WhatsApp allow
laI‚lj keröug bv i,iñka wka;¾.;h
;;H ld,Skj fnod yßkq ,efí' users to make voice calls with minimal cost.
Skype iy WhatsApp jeks fiajdjka
mßYS,lhskag wju msßjehlska y~
weu;=ï ,nd .ekSug bv i,ihs

27
ictfromabc.com
World Wide Web (WWW) Hypertext Transfer Protocol (HTTP)
f,dal úisß úhuk
HTTP is a set of rules that governs the
The World Wide Web (WWW) is a system exchange of files like text, images, sound,
of interlinked web pages accessible over and video, ensuring that data transfers
the internet, allowing users to view and smoothly over the WWW.
interact with information through web HTTP hkq WWW yryd iqug f,i o;a;
browsers. yqjudre jk nj iy;sl lrk fm<" rEm" Y%jH
f,dal úisß úhuk (WWW) hkq mßYS,lhskg a iy ùäfhda jeks f.dkq yqjudrej md,kh
fjí w;ßlaiq yryd f;dr;=re ne,Sug bv lrk kS;s ud,djls'
i,ik wka;¾cd,h yryd m%fõY úh yels
wka;¾ iïnkaê; fjí msgq moaO;shls' Hyperlinks
wê ine¢
The WWW was invented by British scientist
Tim Berners-Lee in 1991. Hyperlinks are clickable elements in
f,dal úisß úhuk 1991 § ì%;dkH úoHd{ Tim documents that connect different web
Berners-Lee in 1991 úiska fidhd .kakd ,§' pages or resources, forming the structural
links between various pieces of content on
WWW.
wê ineÈ hkq WWW ys úúO wka;¾.;
fldgia w;r jHqyd;aul iïnkaO;d idoñka
úúO fjí msgq fyda iïm;a iïnkaO lrk
f,aLkj, we;s la,sla l< yels uQ,dx. fõ'

Through hyperlinks, websites are linked


together, allowing users to navigate
between pages and across different sites,
creating an interconnected web.
wê ine¢ yryd" fjí wvú tlg iïnkaO lr
we;s w;r" mßYS,lhskg a fjí msgq w;r iy
World Wide Web Consortium (W3C) úúO fjí wvú yryd ießieÍug bv
i,iñka wka;¾ iïnkaê; fjnhla
ks¾udKh lrhs'

Web pages
fjí msgq

The W3C, led by Berners-Lee, was later


A web page is a document available on the
established as an organization that
web, consisting of various types of content
develops and maintains standards to
(text, images, etc.), which can be viewed
ensure the long-term growth and
using a web browser.
compatibility of web technologies. fjí msgqjla hkq fjí n%jqirhla Ndú;fhka
n¾k¾ia ,S úiska fufyhjk ,o W3C miqj kerôh yels úúO j¾.fha wka;¾.;hkaf.ka
fjí ;dlaIKhkays È.=ld,Sk j¾Okh iy ^fm<" msk;a +r" wdÈh& iukaú; fjnfha we;s
.e<mqu iy;sl lsÍu i|yd m%ñ;Ska f,aLkhls'
ixj¾Okh lrk iy tAjd mj;ajdf.k hk
ixúOdkhla f,i ia:dms; lrk ,§'

28
ictfromabc.com
Websites Web browsers
fjí wvú fjí w;ßlaiq

A website is a collection of related web Web browsers are software applications


pages, often organized under a single that display web pages by retrieving and
domain to provide set of information or rendering their content.
services. fjí w;ßlaiq hkq fjí msgqj, wka;¾.;h
fjí wvúhla hkq f;dr;=re fyda fiajd ,nd f.k iy tAjd úoeyqï lr mßYS,lhdg
lÜg,hla iemhSu i|yd fndfyda úg ;ks fmkajk uDÿldx. fhÿï fõ'
jiula hgf;a ixúOdkh lrk ,o iïnkaê; (Ex. Chrome, Firefox, Safari, ms edge)
fjí msgq tl;=jls'

Websites include one or more web pages


fjí wvú j,g fjí msgq tlla fyda lsyms hla
we;=<;a fõ

The first page of the website is usually


Uniform Resource Locator (URL)
called the home page.
tAldldÍ iïm;a ksYp
a dhl
fjí wvúfha m<uq msgqj idudkHfhka uq,a
msgqj f,i ye¢kafõ(
Every website has a URL, a unique web
A website’s home page is its main entry address that allows users and browsers to
point, often providing a summary of locate and access the webiste online.
content and links to other sections within iEu fjí wvúhlgu URL tlla we;' th
mßYS,lhskg a iy fjí w;ßlaiq j,g
the site.
wka;¾cd,h yryd fjí wvúh fidhd .ekSug
fjí wvúhl uq,a msgqj tys m%Odk msúiqï iy m%fõY ùug bv i,ik wkkH fjí
,laIHh jk w;r" fndfyda úg fjí wvúfha ,smskhls'
wka;¾.;fha idrdxYhla iy fjí wvúh ;=<
we;s wfkl=;a fldgia fj; ine¢ imhhs'
A URL typically includes the protocol (Ex.
Besides the home page, websites often http or https), domain name (Ex.
contain other pages like about, contact, example.com), and, occasionally, a specific
services, and blog pages, each designed to path to a resource or file on the website.
URL tllg idudkHfhka fm%dfgdaflda,h
serve different informational purposes.
uq,a msgqjg wu;rj" fjí wvúj, fndfyda úg ^Wod' http fyda https&" jiï kduh
úúO f;dr;=re wruqKq bgq lsÍug ks¾udKh ^example'com& iy" hï wjia:dj," fjí
lr we;s about, contact, services iy blog wvúfha we;s iïm;la fyda f.dkqjla fj;
we;s ksYÑ
a ; ud¾.hla we;=<;a fõ'
pages jeks fjk;a msgqo wvx.= fõ'

Parts of a URL

29
ictfromabc.com
Mobile communication 3. Full-Duplex transmission
cx.u ikaksfõokh mQ¾K oaùm: iïfm%aIKh

Mobile communication is the wireless Full-duplex mode allows data to be


transmission of information over distances transmitted in both directions
without the use of wires or cables. simultaneously.
cx.u ikakf s õokh hkq /yeka fyda flan,a mQ¾K oaùm: iïfm%aIKh uÕska o;a;
Ndú;fhka f;drj ÿria:j f;dr;=re /yeka fome;a;gu tljr iïfm%aIKh lsÍug bv
rys;j iïmafraIKh lsÍuhs' i,ihs'

Ex: Wi-Fi, Bluetooth, Cellular Networks


Transmitting multiple signals over a
There are three primary data single communication channel at once
communication modes (multiplexing)
uQ,sl o;a; ikakfs õok l%u ;=kla we; tla ikaksfõok kd,sldjla yryd tljr
ix{d lsysmhla iïfm%aIKh lsÍu
1. Simplex transmission ^nyqm:lrKh&
tAl m: iïfm%IKh
TDM (Time Division Multiplexing)
In simplex mode, data transmission occurs ld,h fn§fï nyqm:lrKh
in only one direction. One device sends the
transmits multiple signals over a single
data, and the other receives it, but the
communication channel by dividing the
receiver cannot send data back to the
transmission time into slots.
sender.
tAl m: iïfm%aIKfha§" o;a; iïfm%aIKh isÿ iïfm%aIK ld,h slot j,g fnod ;ks
jkafka tla ÈYdjlg mu‚' tla Wmdx.hla ikakfs õok kd,sldjla yryd nyq ix{d
o;a; hjk w;r wfkl th ,nd .kS" kuq;a iïfm%aIKh lrhs'
,nkakdg hjkakd fj; o;a; wdmiq heúh
fkdyel' FDM (Frequency Division Multiplexing)
ixLHd;h fn§fï nyqm:lrKh
2. Half-duplex transmission
w¾O oaù m: iïfm%IKh transmits multiple signals over a single
communication channel by assigning each
In half-duplex mode, data transmission can signal a different frequency band.
happen in both directions, but not at the tla tla ix{djg fjkia ixLHd; l,dmhla
,nd §fuka tla ikakf s õok kd,sldjla yryd
same time. One device sends data while the nyq ix{d iïfm%aIKh lrhs'
other waits to receive it, and vice versa.
w¾O oaù m: iïfm%aIKfha§" o;a; iïfm%aIKh CDM (Code Division Multiplexin)
fomigu isÿ úh yelsh' kuq;a tlu fla;h fnod .ekSfï nyqm:lrKh
wjia:dfõ§ fkdfõ' tla Wmdx.hla o;a;
heùfõ§ wfkla Wmdx.hg th ,efnk f;la
n,d isàug isÿfjk w;r bkamiq thg o;a; In CDM, multiple data signals are
heùu isÿ l< yelsh' transmitted over the same frequency band
at the same time, but each signal is
encoded with a unique code.
CDM ys" nyq o;a; ix{d tlu ixLHd;
l,dmhla yryd tljr iïfm%aIKh fõ" kuq;a
iEu ix{djlau wkkH fla;hlska fla;kh
lr we;

30
ictfromabc.com
Mobile computing Types of cloud computing services
cx.u mß.Kkh j,dl=¿ mß.Kk fiajd j¾.

Mobile computing is a technology that Cloud computing has three service models
allows data, voice, and video transmission based on control and management. One
via wireless devices without a fixed model provides essential computing
connection. resources, another offers a development
cx.u mß.Kkh hkq ia:djr platform, and the third delivers software
iïnkaO;djhlska f;drj /yeka rys; Wmdx. applications online.
yryd o;a;" y~ iy ùäfhda iïfm%aIKhg bv j<dl=¿ mß.Kkh iy l<ukdlrKh u;
i,ik ;dlaIKhls' mokï jQ fiajd wdlD;s ;=kla we;' tla
wdlD;shla w;HjYH mß.Kl iïm;a imhhs"
Ex : Mobile Banking, Social Media, GPS ;j;a tlla ixj¾Ok fõÈldjla ,nd fohs"
f;jkqj uDÿldx. fhÿï wka;¾cd,h yryd
Cloud computing ,nd fohs'
j,dl=¿ mß.Kkh
1. Infrastructure as a Service (IaaS)
Cloud computing is the delivery of fiajdjla f,i há;, myiqlï
computing services, such as applications,
2. Platform as a Service (PaaS)
data storage, and processing power, over fiajdjla f,i miq;,
the Internet from remote servers.
j,dl=¿ mß.Kkh hkq ÿria: fiajdodhl 3. Software as a Service (SaaS)
j,ska wka;¾cd,h yryd fhÿï" o;a; .nvd fiajdjla f,i uDÿldx.
lsÍï iy ieliqï n,h jeks mß.Kk fiajd
iemhSuhs'
Infrastructure as a Service (IaaS)
fiajdjla f,i há;, myiqlï

Infrastructure as a Service (IaaS) is a cloud


computing model that provides virtualized
computing resources over the internet.
fiajdjla f,i há;, myiqlï (IaaS) hkq
wka;¾cd,h yryd w:;H l< mß.Kl
iïm;a imhk j,dl=¿ mß.Kl wdlD;shls'

31
ictfromabc.com
Users can rent servers, storage, networking Data storage and backup
and processing power which eliminates the o;a; .nvd lsÍu iy Wmia: lsÍu
need for physical hardware and allows for
quick scaling based on demand. Allows organizations to securely store and
mßYS,lhskg a fiajdodhlhka" .nvd lsÍu back up their data in the cloud, minimizing
,cd,lrKh iy ieliqï n,h l=,shg .; the risks associated with local storage
yels w;r tuÕska fN!;sl oDvdx. failures.
wjYH;djh bj;a lrk w;r b,a¨u u; wdh;kj,g Tjqkf a .a o;a; j,dl=f<ys
mokïj blauka mßudKhg bv i,ihs' wdrlaIs;j .nvd lsÍug iy Wmia: lsÍug
bv i,ihs" foaYh S .nvd wid¾:lùï yd
Applications of IaaS iïnkaO wjodkï wju lrhs'
IaaS ys fhÿï
This solution provides scalability, ensuring
1. Web Hosting that data can be easily expanded as
fjí i;aldrl;ajh needed, while also offering redundancy to
protect against data loss.
2. Data Storage and Backup fuu úi÷u úYd,kh ,nd fohs" wjYH mßÈ
o;a; .nvd lsÍu iy Wmia: lsÍu o;a; myiqfjka mq¿,a l< yels nj iy;sl
lrk w;ru o;a; ke;sùfuka wdrlaId ùug
3. Big Data Analytics Wmia:hla o (Backup) ,nd fohs'
úYd, o;a; úYaf,aIKh

Big data analytics


úYd, o;a; úYaf,aIKh

Offers scalable computing power and


storage solutions, enabling organizations
Web hosting
to process and analyze vast amounts of
fjí i;aldrl;ajh
data efficiently.
mßudKh l< yels mß.Kl n,h iy .nvd
Web hosting makes websites accessible úi÷ï ,nd fohs" úYd, o;a; m%udKhla
online. ld¾hlaIuj ieliSug iy úYaf,aIKh lsÍug
fjí i;aldrl;ajh fjí wvú wka;¾cd,h wdh;kj,g yels fõ'
yryd m%fõY úh yel'

This model provides flexibility for


technologies like content management
systems, enhancing user experiences and
supporting online presence while reducing
costs.
mßYS,l w;aoelSï jeäÈhqKq lsÍu iy msßjeh
wvq lrk w;ru ine¢ meje;aug iydh ùu
jeks ;dlaIKhka i|yd kuHYS,S njla ,nd
fohs'

32
ictfromabc.com
Platform as a Service (PaaS) Application development
fiajdjla f,i miq;, fhÿï ixj¾Okh

Platform as a Service (PaaS) is a cloud Application development becomes more


computing model that provides a platform efficient with PaaS, providing pre-built
allowing developers to build, deploy, and frameworks and development tools.
manage applications over the internet. fmr-idok ,o rduq iy ixj¾Ok fuj,ï
fiajdjla f,i fõÈldj (PaaS) hkq imhk PaaS iuÕ fhÿï ixj¾Okh jvd;a
ixj¾Olhskg a wka;¾cd,h yryd fhÿï ld¾hlaIu fõ'
;ekSug" fhoùug iy l<ukdlrKh lsÍug
fõÈldjla imhk j,dl=¿ mß.Kl This cloud environment streamlines coding,
wdlD;shls'
testing, and deploying applications,
allowing developers to focus on innovation
rather than infrastructure.
fuu j,dl=¿ mßirh fhÿï fla;SlrKh"
mÍlaId lsÍu iy fhoùu úêu;a lrhs" há;,
myiqlï j,g jvd kfjda;amdokhka flfrys
wjOdkh fhduq lsÍug ixj¾Olhskg a bv
i,ihs'

Multi-platform development
nyq fõÈld ixj¾Okh

Users can access a range of tools and PaaS supports multi-platform


services, including application hosting, development, enabling applications to be
databases, and development frameworks, designed for web, mobile and desktop
without the need for underlying environments.
infrastructure management. PaaS nyq-fõÈld ixj¾Okh i|yd iyh
há;, myiqlï l<ukdlrKfha olajhs" fjí" cx.u iy fvialafgdma
wjYH;djhlska f;drj fhÿï i;aldrl;ajh" mßirhka i|yd fhÿï ks¾udKh lsÍug yels
o;a; iuqodhka iy ixj¾Ok rduq we;=¿ fõ'
fuj,ï iy fiajd mrdihlg mßYS,lhskg a
m%fõY úh yel'
Collaboration tools
Applications of PaaS iyfhda.S;d fuj,ï
PaaS ys fhÿï
Collaboration in software projects is
1. Application Development improved with PaaS, which offers
fhÿï ixj¾Okh integrated tools for team communication,
code sharing, and project tracking.
2. Multi-Platform Development lKavdhï ikakf s õokh" fla; fnod.ekSu iy
nyq fõÈld ixj¾Okh jHdmD;s ¨yqne£u i|yd tAldnoaO fuj,ï
imhk PaaS iuÕ uDÿldx. jHdmD;sj,
iyfhda.;s dj jeä ÈhqKq lr we;'
3. Collaboration Tools
iyfhda.;S d fuj,ï
This setup promotes real-time
collaboration among dispersed teams,
enhancing productivity and efficiency.
fuu ieliqu úiqrejd yßk ,o lKavdhï
w;r ;:H ld,Sk iyfhda.; S dj m%j¾Okh
lrhs" M,odhs;dj iy ld¾hlaIu;dj jeä
lrhs'

33
ictfromabc.com
Software as a Service (SaaS) CRM software
fiajdjla f,i uDÿldx. CRM uDÿldx.h

Software as a Service (SaaS) is a cloud SaaS CRM platforms enhance customer


computing model where software interaction tracking and sales
applications are delivered over the internet management, significantly boosting
as a service. customer satisfaction and loyalty. By
fiajdj,a f,i uDÿldx. (SaaS) hkq fiajdjla centralizing client relationship
f,i wka;¾cd,h yryd uDÿldx. fhÿï ,nd management, teams can collaborate more
fok j,dl=¿ mß.Kl wdlD;shls'
effectively.
SaaS CRM fõÈld mdßfNda.l s wka;¾l%shd
¨yqne£u iy úl=Kqï l<ukdlrKh jeä
ÈhqKq lrhs" mdßfNda.sl ;Dma;sh iy
mlaImd;s;ajh ie,lsh hq;= f,i by< kxjhs'
fiajdodhl iïnkaO;d l<ukdlrKh
uOH.; lsÍfuka lKavdhïj,g jvd;a M,odhS
f,i iyfhda.fhka lghq;= l< yel'

Email
úoHq;a ;eme,

Email is considered an essential tool for


communication and user engagement.
Users can access software like email, CRM úoHq;a ;emE, ikakf s õokh iy mßYS,l
kshe,Su i|yd w;HjYH fuj,ula f,i
or office suites via a web browser, without
ie,fla'
needing to install or maintain the software
locally. Key updates, such as account
uDÿldx.h ia:dkShj ia:dmkh fyda kv;a;=
lsÍulska f;drj" mßYS,lhskga fjí confirmations, password resets, and billing
n%jqirhla yryd úoHq;a ;emE," CRM fyda information, are delivered through
office suites jeks uDÿldx. fj; m%fõY úh transactional emails, ensuring that users
yel' are kept informed and interactions are
made secure and reliable.
Applications of SaaS .sKqï ;yjqre lsÍï" uqrmo h<s msyg s qùï iy
ì,am;a f;dr;=re jeks m%Odk hdj;ald,Sk
SaaS ys fhÿï
lsÍï .kqfokq Bfï,a yryd fnod yßkq ,efí"
mßYS,lhska oekqj;a lr we;s nj iy
1. CRM Software wka;¾l%shd wdrlaIs; iy úYajdiodhl njg
CRM uDÿldx.h iy;sl lrhs'

2. Email Engagement and retention are driven


úoHq;a ;eme, through personalized messaging.
Behavioral emails are triggered based on
3. Accounting Tools user activity or inactivity, and newsletters or
.sKqïlrK fuj,ï promotions are sent to keep users
informed about new features and offers.
4. E-commerce Solutions kshe,Su iy r|jd .ekSu mqoa.,dfrdams;
B-jd‚cHh úi÷ï m‚úv u.ska fufyhjkq ,efí' mßYS,l
l%shdldrlï fyda wl%sh;dj u; mokïj
p¾hd;aul Bfï,a l%shdrïN lrkq ,nk w;r"
kj úfYaIdx. iy §ukd ms<sn|j mßYS,lhka
oekqj;a lsÍug mqj;a m;%sld fyda m%j¾Ok hjkq
,efí'

34
ictfromabc.com
Accounting tools Office packages
.sKqïlrK fuj,ï ld¾hd, meflac

SaaS accounting tools facilitate real-time Office packages are offered as cloud-based
financial tracking, invoicing, and reporting, software suites that provide essential
enabling businesses to manage their productivity tools, such as word processing,
finances more effectively. spreadsheets, presentations, and email
SaaS .sKqïlrK fuj,ï ;:H ld,Sk uQ,H management.
¨yqne£u" invoice lsÍu iy jd¾;d lsÍu ld¾hd, meflac msßkukq ,nkafka joka
i|yd myiqlï imhk w;r" jHdmdrj,g ieliSu" me;=reïm;a" bÈßm;a lsÍï iy
Tjqkfa .a uQ,H l<ukdlrKh jvd;a M,odhS Bfï,a l<ukdlrKh jeks w;HjYH
f,i lsÍug yels fõ' M,odhs;d fuj,ï imhk j,dl=¿ u; mokï
jQ uDÿldx. lÜg, f,ih'
Automation of routine tasks reduces errors
and saves time. This allows companies to These packages, like Microsoft 365 or
gain better insights into their financial Google Workspace, are accessed via the
health, aiding in informed decision-making internet, eliminating the need for local
and long-term planning. installations or traditional licensing models.
idudkH ld¾hhka iajhxl%Sh lsÍu fodaI wvq Microsoft 365 fyda Google Workspace jeks
lrk w;r ld,h b;sß lrhs' fuh fuu meflac" foaYh S ia:dmkhka fyda
iud.ïj,g Tjqkf a .a uQ,H fi!LHh ms<sn| iïm%odhsl n,m;% wdlD;s i|yd wjYH;djh
jvd fyd| wjfndaOhla ,nd .ekSug bv bj;a lrñka wka;¾cd,h yryd m%fõY ùu
i,ihs" oekqj;a ;SrK .ekSug iy È.= ld,Sk ioyd bv i,ihs '
ie,iqï lsÍug WmldÍ fõ'

Web conferencing
fjí iïuka;%K

Web conferencing is recognized as an


essential tool for real-time communication
and collaboration.
fjí iïuka;%K ;;H ld,Sk ikakf s õokh iy
iyfhda.;S djh i|yd w;HjYH fuj,ula
f,i ms<s.efka'

Meetings, webinars, and training sessions


are conducted virtually, ensuring that
interaction is facilitated regardless of
location.
/iaùï" fjíkd¾ iy mqyK q q ieis mdfya
mj;ajkq ,nk w;r" ia:dkh l=ula jqj;a
wka;¾l%shd i|yd myiqlï ie,fik nj
iy;sl lrhs'

Features such as screen sharing, chat, and


recording are provided, allowing
presentations and discussions to be carried
out effectively.
;sr fnod.ekSu" l;dnia lsÍu iy má.;
lsÍu jeks úfYaIdx. imhd we;s w;r" bÈßm;a
lsÍï iy idlÉPd M,odhS f,i isÿ lsÍug bv
i,ihs'

35
ictfromabc.com
Cloud Computing Advantages Cloud Computing Disadvantages
Aspect
j<l=¨ mß.Kkfha jdis j<l=¨ mß.Kkfha wjdis

Long-term costs may increase for


Pay-as-you-go pricing reduces
Cost frequent or large-scale use.
upfront costs.
msßjeh ksrka;r fyda uyd mßudK Ndú;h
Tn Ndú; lrk úg f.jk ñ,
i|yd È.= ld,Sk msßjeh jeä úh
.Kka l%uh fmr úhoï wvq lrhs'
yel'
Resources can be scaled up or Dependency on cloud provider for
Scalability down instantly. scalability features.
mßudK iïm;a laI‚lj by<g fyda mßudKh lsÍfï úfYaIdx. i|yd
my<g mßudKh l< yel' j,dl=¿ imhkakd u; hemSu'

Accessible from anywhere with Requires reliable internet; limited


Accessibility an internet connection. without it.
m%fõYH;djh wka;¾cd, iïnkaO;djhla we;s wka;¾cd,h wjYahhs¦ th fkdue;sj
´kEu ;ekl isg m%fõY úh yel' iSud fõ'

Provider handles updates, Loss of control over maintenance


Maintenance security, and maintenance. schedules.
kv;a;= iemhqïlre hdj;ald,Sk" wdrlaIdj kv;a;= ld,igykaj, md,khla
iy kv;a;= lghq;= lrhs' ke;sùu'

Minimal local hardware needed; Performance depends on the


Hardware
reduces capital expenditure. provider's hardware configuration.
Requirements
wju foaYh S oDvdx. wjYH fõ¦ ld¾h idOkh imhkakdf.a oDVdx.
oDVdx. wjYH;d
mard.aOk úhoï wvq lrhs' úkahdih u; r|d mj;S'

Professional-grade security from Risk of data breaches or


Data Security providers. unauthorized access.
o;a; wdrlaIK imhkakkaf.ka jD;a;Sh-fY%a‚fha o;a; lvlsÍï fyda wkjir msúiSfï
wdrlaIdj wjodku'

High uptime and redundancy Service interruptions if the provider


Reliability offered by providers. experiences downtime.
úYajikSh;ajh imhkakka úiska msßkukq ,nk iemhqïlre wl%sh ld,hla w;aú¢kafka
by< ld,h iy w;sßla;h kï fiajd ndOd lsÍï'

Prebuilt infrastructure reduces Limited flexibility to customize


Customization setup time. infrastructure.
wNsreÑlrKh fmrksñ há;, myiqlï ieliSfï há;, myiqlï wNsreÑlrKh
ld,h wvq lrhs' lsÍug iSñ; kuHYS,S njla'

Unlimited storage capacity May incur additional costs for large


Data Storage offered by providers. data volumes.
o;a; .nvd lsÍu imhkakka úiska msßkukq ,nk úYd, o;a; mßudjka i|yd wu;r
wiSñ; .nvd Odß;dj' úhoï oeÍug isÿ úh yel'

Scales to handle heavy


Latency issues due to network
Performance workloads.
ld¾h idOkh dependency.
wêl jev nr yeisrùug
cd, hemSu fya;=fjka m%udo .eg¿'
mßudKhka'

36
ictfromabc.com
Building an abstract model of Examples:
information and evaluating its
compatibility with information and School system
communication technology
f;dr;=re ks¾udKh lsÍfï úhqla; wdlD;shl • Boundary: Physical or conceptual line
f.dvk.d f;dr;=re iy ikaksfõok that defines the entire scope of the
;dlaIKh iu. tys wkql+,;dj we.hSu
school.
mdif,a iuia; m:hu ks¾jpkh lrk
fN!;sl fyda ixl,amSh fraLdj'
Systems
moaO;s • Inputs: Students, teachers, textbooks,
digital resources, and funding.
A system is a set of interconnected isiqka" .=rejreka" fm<fmd;a" äðg,a
components that works together to iïm;a iy wruqo,a'
achieve a specific goal.
moaO;shla hkq ksYÑa ; b,lalhla imqrd .ekSu • Outputs: Graduates with knowledge,
i|yd tlg l%shd lrk wka;¾ iïnkaê; skills, and qualifications.
fldgia iuQyhls' oekqu" l=i,;d iy iqÿiqlï iys;
WmdêOdÍka$YsIHhka'
Boundaries
iSud udhsï • Feedback: Academic performance
A system has boundaries that define its data, teacher and parent evaluations,
limits and separate it from its environment. and student progress.
moaO;shlg tys iSudjka ks¾jpkh lrk iy wOHhk ld¾h idOk o;a;" .=rejrhd iy
tys mßirfhka th fjka lrk udhsï we;' udmsh we.hSï" iy YsIH m%.;sh'

Inputs
fhojqï Vehicles
A system receives inputs from its
environment, which are the resources or • Boundary: Includes the physical
information it needs to function. structure of the vehicle, including its
moaO;shla l%shd;aul ùug wjYH iïm;a fyda
f;dr;=re jk tys mßirfhka fhojqï ,nd engine, body, and onboard systems.
.kS' jdykfha tkaðu" peish iy wNHka;r
moaO;s we;=¿j tys fN!;sl jHqyh
we;=<;a fõ'
Outputs
m%;sodk
• Inputs: Fuel or electricity, the driver,
A system produces outputs, which are the
navigation commands, and road
results or products of its activities.
moaO;shla tys l%shdldrlïj, m%;sM, fyda signals.
ksIamdok jk m%;sodkhka ksIamdokh lrhs' bkaOk fyda úÿ,sh" ßhÿre" Odjk úOdk
iy ud¾. ix{d'
Feedback
m%;sfmdaIK • Outputs: Movement of the vehicle,
A system uses feedback to monitor its reaching destinations.
jdykfha p,kh" .ukdka; fj; <Õd ùu'
performance and make adjustments as
needed.
moaO;shla tys l%shdldß;ajh ksÍlaIKh • Feedback: Speedometer readings, fuel
lsÍug iy wjYH mßÈ .e,mSï lsÍug levels, GPS updates, and sensor data for
m%;sfmdaIK Ndú;d lrhs' performance adjustments.
iamSfvdaógr lshùï" bkaOk uÜgï" ^GPS&
hdj;ald,Sk" iy ld¾h idOk .e,mqï
i|yd ixfõol o;a;'

37
ictfromabc.com
Abstract model of information. Relating the abstract model into an
f;dr;=re j, jHqla; wdlD;sh information system
úhqla; wdlD;sh f;dr;=re moaO;shlg wod<
Abstract model is an easy way to describe lsÍu
the general process of how information
comes as the output. What is an Information System?
jHqla; wdlD;sh hkq m%;sodkh f,i ,efnk f;dr;=re moaO;shla hkq l=ulao@
wdldrh ms<sn| idudkH l%shdj,sh úia;r
lsÍug myiq l%uhls' An information system (IS) is a system that
takes data as inputs, processes them, and
Input, Process, Output are the main parts of outputs as information.
abstract model. f;dr;=re moaO;shla (IS) hkq o;a; wdodk
wdodkh" l%shdj,sh" m%;sodkh úhqla; f,i f.k" tAjd ilid f;dr;=re f,i
wdlD;sfha m%Odk fldgia fõ' m%;sodkh lrk moaO;shls'

INPUT (Raw data) Input


wdodkh ^wuq o;a;&
Data, ideas, and observations are the inputs
fed into the system.
o;a;" woyia" iy ksÍlaIK moaO;shg ,nd
fok wdodk fõ'
PROCESS (Analysis)
ieliSu ^úYaf,aIKh&
Processing

Data we entered transforms into


information through an analyze.
OUTPUT (New information) fuu.ska úYaf,aIKh yryd wuq o;a;
m%;sodkh ^kj f;dr;=r& f;dr;=re njg mßj¾;kh lrhs'

Input Output
wdodkh
The system delivers the final product as a
Input can contain raw materials that we report, presentation or as an document.
used to create the information. moaO;sh wjika ksIamdokh jd¾;djla" bÈßm;a
f;dr;=re ks¾udKh lsÍug wm Ndú;d l< foa lsÍula fyda f,aLkhla f,i ,nd fohs'
wdodkfha wvx.= úh yel'

Processing
ieliqï l%shdj,sh

This process is the level that manipulate the


data we entered.
fuu l%shdj,sh wm we;=<;a l< o;a; yiqrejk
uÜguhs'

Output
m%;sodkh

This is the end product of a system.


fuh moaO;shl wjidk ksIamdokhhs'

38
ictfromabc.com
Relating the abstract model into a The functions of a digital computer align
computer system closely with the Abstract Model of
úhqla; wdlD;sh mß.Kl moaO;shlg wod< Information.
lsÍu wxls; mß.Klhl ld¾hhka f;dr;=re j,
úhqla; wdlD;sh iuÕ iómj iumd; fõ'
Input
Computers gets data through various input There are five steps.
devices like keyboards, scanners, cameras, mshjr myla we;'
and sensors.
h;=remqjre" ialEk¾" leurd iy ixfõol 1. Takes data as input
jeks úúO wdodk Wmdx. yryd mß.Kl o;a; o;a; wdodkh f,i .kS
,nd .kS'
2. Stores the data/instructions in its
Processing memory and uses them as required
o;a;$Wmfoia tys u;lfha .nvd lr
The Central Processing Unit (CPU) of a wjYH mßÈ Ndú;d lrhs
computer acts as the brain of the computer,
performing calculations, manipulating data 3. Processes the data and converts it into
based on instructions. useful information
mß.Klfha uOHu ieliqï tAllh .Kkh o;a; ilia lr th m%fhdackj;a f;dr;=re
lsÍï isÿ lsÍu" Wmfoia u; mokïj o;a; njg mßj¾;kh lrhs
yeisrùu isÿ lrhs'
4. Generates the output
m%;sodkh W;amdokh lrhs
Output
Computers outputs data through monitors, 5. Controls all the above four steps
by; mshjr y;ru md,kh lrhs
printed with printers, or stored on storage
devices for future usage.
o;a; m%;sodkh lsÍu mß.Kl ;srh yryd " In summary, a digital computer's functions
uqøK hka;% iuÕ uqøKh" fyda wkd.; of data input, storage, processing, and
Ndú;h i|yd .nvd Wmdx.j, .nvd lsÍu output are intricately intertwined with the
u.ska isÿ lrhs' Abstract Model of Information.
idrdxYhla f,i" o;a; wdodkh" .nvd lsÍu"
Here are some uses of Abstraction model. ieliSu iy m%;sodkh hk ixLHdxl
jHqla; wdlD;sh Ndú;hka lsyms hla my; mßÈ mß>klfha l%shdldÍ;ajh f;dr;=re j,
fõ' úhqla; wdlD;sh iuÕ ixlS¾K f,i ne£
we;'
• Analyzing the flow of information.
f;dr;=re .,dhdu úYaf,aIKh lsÍu' This model emphasizes the flow and
transformation of data through different
• Simplify complex systems by breaking
stages to produce useful information and
them down into smaller, more
outputs.
manageable parts. fuu wdlD;sh m%fhdackj;a f;dr;=re iy
ixlS¾K moaO;s l=vd" jvd;a m%;sodkhka ksIamdokh lsÍu i|yd úúO
l<ukdlrKh l< yels fldgia j,g wjëka yryd o;a; .,dhdu iy mßj¾;kh
leãu u.ska ir, lsÍu' lsÍu wjOdrKh lrhs'

39
ictfromabc.com
Basic Components of a Computer NOTE:
System In addition to those types of hardware, a
mß.Kl moaO;shl uQ,sl ixrpl computer system contains a circuit board
known as the motherboard, which connects
Computer systems consist of several core all hardware components to each other.
components that work together to process, tu j¾.fha oDVdx. j,g wu;rj" mß.Kl
store, and manage information. moaO;shl ujq mqjrej f,i ye¢kafjk mßm:
mß.Kl moaO;s f;dr;=re ieliSug" .nvd mqjrejla wvx.= jk w;r th ish¨u oDvdx.
lsÍug iy l<ukdlrKh lsÍug tlaj l%shd ixrpl tlsfkl iïnkaO lrhs'
lrk uQ,sl fldgia lsyms hlska iukaú; fõ'
Input Devices
These components can be grouped into wdodk Wmdx.
four main categories:
fuu ixrpl m%Odk ldKav y;rlg Input devices are essential components of
ldKav.; l< yelsh( computer systems that allow users to
interact with and provide data to
• Hardware computers.
oDVdx. wdodk Wmdx. hkq mß.Kl moaO;sj,
w;HjYH ixrpl jk w;r tuÕska
• Software mßYS,lhskg a mß.Kl iuÕ wka;¾ l%shd
uDÿldx. lsÍug iy o;a; iemhSug bv i,ihs'
• Firmware
iaÓrdx.
• Liveware
ðjdx.

Hardware
oDVdx.

Hardware refers to the physical parts of a


computer that can be touched and seen.
oDVdx. hkq mß.Klhl iam¾Y l< yels iy
oelsh yels fN!;sl fldgia h'

It includes input, output, and storage


devices, as well as the internal components • Keyboard
necessary for processing information. h;=re mqjrej
thg wdodk" m%;sodk iy .nvd Wmdx. fukau
f;dr;=re ieliSug wjYH wNHka;r ixrpl The keyboard is the primary input
we;=<;a fõ'
device for entering textual data. It
allows users to type characters,
numbers, and symbols.
h;=remqjrej hkq mdGuh o;a; we;=<;a
lsÍu i|yd jk uQ,sl wdodk Wmdx.h fõ'
wlaIr" wxl iy ixfla; ghsma lsÍug
mßYS,lhskga bv i,ihs'

40
ictfromabc.com
• Pointing Devices • Microphone
fhduq lsÍfï Wmdx. uhsl%f*dakh

Pointing devices are used to control the A microphone captures sound waves
cursor on the screen, providing an and converts them into digital audio,
intuitive way to interact with the allowing users to record voice or
graphical user interface (GUI). interact with voice-enabled
Ñ;%l mßYS,l w;=reuqyK q ; (GUI) iuÕ applications.
wka;¾ l%shd lsÍug nqoaêuh l%uhla uhsl%f*dakhla Yío ;rx. .%yKh lr
imhk ;srh u; l¾irh md,kh lsÍug tAjd äðg,a Y%jH njg mßj¾;kh lrhs"
fhduq lsÍfï Wmdx. Ndú;d lrhs' mßYS,lhskg a y~ má.; lsÍug fyda y~
Examples: Mouse, Trackball, Lightpen, il%Sh fhÿï iuÕ wka;¾ l%shd lsÍug bv
joystick, touchscreen, trackpad. i,ihs'

• Scanners
ialEk¾ • Biometric Devices
ffcjñ;sl Wmdx.
Scanners convert physical documents
and images into digital formats for Capture unique biological data for
editing, storage, and sharing. identification or authentication.
ialEk¾ uÕska fN!;sl f,aLk iy rEm y÷kd .ekSu fyda i;Hdmkh i|yd wkkH
ixialrKh" .nvd lsÍu iy fnod.ekSu Ôj úoHd;aul o;a; .%yKh lr .kS'
i|yd äðg,a wdlD;s njg mßj¾;kh
lrhs' Examples
Examples: Flatbed Scanner, OCR, OMR, Fingerprint scanner, iris scanner, facial
MICR, 3D scanner, QR code scanner, recognition
barcode scanner,

• Cameras
leurd

Cameras capture still images or video


that can be used in various applications.
There are 3 types of cameras: Digital
camera, Web camera, CCTV camera.
úúO fhÿïj, Ndú; l< yels ksYp a ,
rEm fyda ùäfhda leurd .%yKh lrhs'
leurd j¾. 3la we;( äðg,a leurdj"
fjí leurdj" CCTV leurdj'

• Sensors
ixfõol

Sensors capture data from the


environment, converting physical
properties like temperature, motion, or
light into digital data for processing.
ixfõol mßirfhka o;a; .%yKh lrhs"
WIaK;ajh" p,s;h fyda wdf,dalh jeks
fN!;sl .=Kdx. ieliSu i|yd äðg,a
o;a; njg mßj¾;kh lrhs'

41
ictfromabc.com
Output Devices Visual outputs can be divided into two
m%;sodk Wmdx. types
oDYH m%;sodkh j¾. follg fnÈh yelsh
Output devices enable the computer to
present processed data to the user in visual Hard copy Soft copy
oDv msgm;a uDÿ msgm;a
and audio formats.
m%;sodk Wmdx. uÕska mß.Klhg ieliQ
o;a; oDYH iy Y%jH wdlD;sj,ska mßYS,lhdg
bÈßm;a lsÍug yelshdj ,efí' Hard Copy Devices
oDV msgm;a Wmdx.

Hard copy devices produce tangible


outputs, typically on paper or other
materials. These devices are essential for
creating physical records of data, which can
be stored, shared, or displayed.
oDv msgm;a Wmdx. idudkHfhka lvodis fyda
fjk;a øjH u; iam¾Y l< yels m%;sodkhka
ksmojhs' .nvd lsÍug" fnod .ekSug fyda
m%o¾Ykh lsÍug yels o;a;j, fN!;sl
jd¾;d ks¾udKh lsÍu i|yd fuu Wmdx.
w;HjYH fõ'

Examples
Printers
Impact printers (dot matrix, line printer)
Non-impact printers (laser, inkjet printer)
Plotters

Soft Copy Devices


uDÿ msgm;a Wmdx.

Soft copy devices display digital


Visual Output information temporarily, allowing users to
oDYH m%;sodk view or project content without producing
Visual output devices are hardware a physical output.
components that display data processed by uDÿ msgm;a Wmdx. äðg,a f;dr;=re
;djld,slj m%o¾Ykh lrhs" fN!;sl
a computer in a visual format, enabling
m%;sodkhla ksIamdokh fkdlr wka;¾.;h
users to see information, graphics, and ne,Sug fyda m%lafIamKh lsÍug mßYS,lhskg a
multimedia. bv i,ihs'
oDYH m%;sodk Wmdx. hkq mß.Klhla uÕska
ieliQ o;a; oDYH wdlD;shlska m%o¾Ykh Examples
lrk oDVdx. ixrpl jk w;r tuÕska
mßYS,lhskg a f;dr;=re" Ñ;%l iy nyqudOH Screens ;sr'
oelSug yels fõ' CRT – cathode ray tube
LCD – liquid crystal display
Visual output devices are also known as LED – light emitting diode
Visual Display Units (VDU). Projectors
oDYH m%;sodk Wmdx. Visual Display Units m%lafIamk hka;%
(VDU) f,io ye¢kafõ'

42
ictfromabc.com
Audio Output 1. Primary Storage
Y%jH m%;sodk m%d:ñl wdphkh

Audio output devices are hardware Primary storage, also known as main
components that convert digital audio memory, is directly accessible by the CPU
signals from a computer into sound, and plays a vital role in the system’s speed
allowing users to hear music, sounds, or and performance.
speech. m%Odk u;lh f,io ye¢kafjk m%d:ñl
Y%jH m%;sodk Wmdx. hkq mß.Klhlska wdphkh CPU uÕska iDcqju m%fõY úh yels
äðg,a Y%jH ix{d Yíoh njg mßj¾;kh w;r moaO;sfha fõ.h iy l%shdldÍ;ajh
lrk oDVdx. ixrpl jk w;r mßYS,lhskg a i|yd jeo.;a ld¾hNdrhla bgq lrhs'
ix.S;h" Yío fyda l:kh weiSug bv i,ihs'
It stores data and instructions that the CPU
Examples: Speaker, Headphone. needs allowing quick access.
th CPU wjYH jk o;a; iy Wmfoia .nvd
lr blauka m%fõYhg bv i,ihs'

Storage Devices
.nvd Wmdx. • Volatile Memory
kYH u;lh
Storage devices provide a way to save data,
both temporarily and permanently. Volatile memory requires continuous
.nvd Wmdx. ;djld,slj iy iaÓrj o;a; power to retain data, making it
iq/lSug ud¾.hla imhhs' essential for temporary storage tasks.
kYH u;lhg o;a; r|jd .ekSug wLKav
Storage can be categorized into Primary n,hla wjYH jk w;r th ;djld,sl
Storage and Secondary Storage, each .nvd lsÍfï ld¾hhka i|yd w;HjYH
fõ'
serving a distinct purpose in data
Examples: RAM, Cache, Registers.
processing and retrieval.
.nvdj m%d:ñl wdphkh iy oaú;Shsl
wdphkh f,i j¾. l< yels w;r" tA iEu
tllau o;a; ieliSfï§ iy ,nd .ekSfï§ • Non-volatile Memory
fjku wruqKla bgq lrhs' kYH fkdjk u;lh

Non-volatile memory retains data even


when the computer is turned off,
ensuring that essential information is
not lost.
kYH fkdjk u;lh mß.Klh l%shd
úrys; l< úg mjd o;a; r|jd ;nd .kS"
w;HjYH f;dr;=re ke;s fkdjk nj
iy;sl lrhs'
Examples: ROM, Flash memory.

43
ictfromabc.com
2. Secondary Storage Secondary Storage is categorized into
oaú;shsl wdphkh three main types
oaú;shsl wdpdhkh m%Odk j¾. ;=klg j¾.
Secondary storage provides long-term flfra
data storage, retaining files and programs
even when the computer is powered off. • Optical Storage
oaú;Shsl wdphkh È.=ld,Sk o;a; .nvd m%ldY wdphkh
lsÍu" mß.Klh l%shd úrys; jQ úg mjd f.dkq
iy jevigyka r|jd ;nd .ekSu imhhs' Optical storage uses lasers to read and
write data, making it ideal for media
It is generally slower than primary storage files and software distribution.
but offers significantly larger capacity. m%ldY wdphkh o;a; lshùug iy ,sùug
th idudkHfhka m%d:ñl .nvdjg jvd f,ai¾ Ndú;d lrhs" th udOH f.dkq iy
ukao.dó kuq;a ie,lsh hq;= ;rï úYd, uDÿldx. fnod yeÍu i|yd jvd;a iqÿiq
Odß;djla ,nd fohs' fõ'

Secondary storage is essential for storing Examples


the operating system, applications, and CD, DVD, Blu-ray.
personal files.
fufyhqï moaO;sh" fhÿï iy mqoa.,sl f.dkq • Magnetic Storage
.nvd lsÍu i|yd oaú;shsl wdphkh pqïnl wdphkh
w;HjYHh fõ'
Magnetic storage relies on magnetic
patterns to store data, offering a cost-
effective way to store large volumes of
information.
pqïnl wdphkh o;a; .nvd lsÍu i|yd
pqïnl rgd u; r|d mj;S" úYd,
f;dr;=re mßudjla .nvd lsÍu i|yd
msßjeh-M,odhS l%uhla bÈßm;a lrhs'

Examples
HDD, Magnetic Disk, Floppy Disk.

• Flash Storage
iefK,s wdphkh

Flash storage uses electronic memory


for data retention, offering fast
read/write speeds and portability.
iefK,s wdphkh o;a; r|jd ;nd .ekSu
i|yd bf,lafg%dksl u;lh Ndú;d lrhs"
fõ.j;a lshùfï$,sùfï fõ.h iy wf;a
f.k hd yelsh'

Examples
USB, SSD, SD Card, etc.

44
ictfromabc.com
Processing devices Networking devices
ieliqï Wmdx. cd,lrKh Wmdx.

1. Central Processing Unit (CPU) Facilitate communication and data


uOH ieliqï tAllh exchange between computers and other
The CPU is the primary component of a devices within a network.
computer. cd,hla ;=< we;s mß.Kl iy wfkl=;a
CPU hkq mß.Klhl uQ,sl ixrplhhs' Wmdx. w;r ikakf s õokh iy o;a; yqjudrej
myiq lrhs'

It has three main components Router: Directs data between networks,


tys m%Odk fldgia ;=kls
connecting local devices to the internet.
ia:dkSh Wmdx. wka;¾cd,hg iïnkaO lrñka
ALU (Arithmetic & Logic Unit) cd, w;r o;a; yqjudre lrhs
wxl .‚;uh yd ;d¾lsl tAllh
Handles all arithmetic operations and Switch: Directs data within a local network
logical operations essential for processing using MAC addresses.
tasks. MAC ,smsk Ndú;fhka ia:dkSh cd,hla ;=<
ld¾hhka ieliSu i|yd w;HjYH ish¨u wxl o;a; yqjudre lrhs'
.‚;uh fufyhqï iy ;d¾lsl fufyhqï
yiqrejhs' Hub: Connects multiple devices and
broadcasts data to all.
CU (Control Unit) nyq Wmdx. tlsfkl iïnkaO lr ish,a,g
md,k tAllh o;a; úldYkh lrhs'
Controls all input, storage, output, memory
devices, as well as data, instructions, and Modem: Converts digital data to analog
information flow within the computer for internet access over phone or cable
mß.Klh ;=< we;s ish¨u wdodk" .nvd" lines.
m%;sodkh" u;l Wmdx. fukau o;a;" Wmfoia ÿrl:k fyda flan,a ud¾. yryd wka;¾cd,
iy f;dr;=re m%jdyh md,kh lrhs' m%fõYh ,nd .ekSug äðg,a o;a; wekf,d.a
njg mßj¾;kh lrhs'
Registers
Access Point: Provides Wi-Fi access to a
Small, fast and temporary storage locations
wired network.
within the CPU that hold data, instructions,
/yeka.; cd,hlg Wi-Fi m%fõYh imhhs'
or addresses needed for calculations.
.Kkh lsÍï i|yd wjYH o;a;" Wmfoia fyda
Firewall: Secures the network by
,smsk r|jd ;nd .kakd CPU ;=< we;s l=vd"
controlling and blocking unauthorized
fõ.j;a ;djld,sl .nvd ia:dk
traffic.
wkjir .ukd.uk md,kh lsÍu iy wjysr
2. Graphics Processing Unit lsÍu u.ska cd,h iqrlaI;
s lrhs'
A GPU is a special type of CPU designed for Repeater: Extends network signal range
tasks requiring massive computational over long distances.
power, especially in graphics, gaming, and cd, ix{d mrdih È.= ÿrla mqrd úysÿjhs'
data-intensive applications like AI.
GPU hkq Ñ;%l" mß.Kl l%Svd iy AI jeks Gateway: Bridges different networks,
úYd, mß.Kl n,hla wjYH jk o;a;-wêl allowing communication across protocols.
fhÿï j, ld¾hhka i|yd ks¾udKh lr we;s kshudj,s yryd ikakfs õokhg bv i,iñka
úfYaI CPU j¾.hls' úúO cd, tlsfkl iïnkao lrhs

45
ictfromabc.com
Software Operating Systems
uDÿldx. fufyhqï moaO;s

Software refers to a collection of data, An operating system (OS) is system


programs, and instructions that tell a software that manages computer hardware
computer or electronic device how to and software resources and provides a user
perform specific tasks. interface.
uDÿldx. hkq mß.Klhlg fyda fufyhqï moaO;shla (OS) hkq mß.Kl
bf,lafg%dksl Wmdx.hlg ksYÑ a ; ld¾hhka oDvdx. iy uDÿldx. iïm;a l<ukdlrKh
bgq lrk wdldrh mjik o;a;" jevigyka lrk iy mßYS,l w;=re uqyK q ;la imhk
iy Wmfoia tl;=jls' moaO;s uDÿldx.hls'

It can be categorized into two main types: It serves as an intermediary between users
system software and application software. and the computer hardware, enabling the
th m%Odk j¾. follg j¾. l< yel( execution of application software.
moaO;s uDÿldx. iy fhÿï uDÿldx. th fhÿï uDÿldx. l%shd;aul lsÍu il%Sh
lrñka mßYS,lhka iy mß.Kl oDvdx.
w;r w;rueÈfhl= f,i l%shd lrhs'
Examples: Windows, Linux, macOS, etc.

Utility Software
Wmfhda.s;d uDÿldx.

Utility software is system software


designed to help manage, maintain, and
optimize computer resources and
performance.
Wmfhda.; s d uDÿldx. hkq mß.Kl iïm;a
iy l%shdldÍ;ajh l<ukdlrKh lsÍug"
System Software kv;a;= lsÍug iy m%Yia; lsÍug Wojq lsÍug
moaO;s uDÿldx. ks¾udKh lr we;s moaO;s uDÿldx.hls'
Examples: Antivirus Software, Disk
System software is designed to manage Management Tools, Backup Software, etc.
and control computer hardware and m%;s-jhsri uDÿldx." ;eá l<ukdlrK
provide a platform for running application fuj,ï" Wmia: uDÿldx." wdÈh'
software.
moaO;s uDÿldx. ks¾udKh lr we;af;a
mß.Kl oDvdx. l<ukdlrKh lsÍug iy Language Translators
md,kh lsÍug iy fhÿï uDÿldx. Odjkh NdId mßj¾;lhka
i|yd fõÈldjla iemhSugh'

Language translators are programs that


There are 3 main types of system software.
moaO;s uDÿldx. m%Odk j¾. 3ls' convert code written in one programming
language into another language.
NdId mßj¾;lhka hkq tla l%uf,aLk
• Operating Systems
NdIdjlska ,shd we;s fla;h fjk;a NdIdjlg
fufyhqï moaO;s mßj¾;kh lrk jevigyka fõ'
• Utility Software
Wmfhda.; s d uDÿldx. There are two types of Language
• Language Translators translators: compilers and interpreters.
NdId mßj¾;lhka NdId mßj¾;l j¾. folla ;sfí(
iïmdolhka iy w¾:úkHdil fõ'

46
ictfromabc.com
Application Software • Free and Open-Source Software
fhÿï uDÿldx. ksoyia iy újD; uQ,dY% uDÿldx. (FOSS)

Application software is designed to Open-source software is software


perform specific tasks for users, such as whose source code is freely available to
productivity, entertainment, or the public for use, modification, and
communication. distribution. It encourages
fhÿï uDÿldx.h ks¾udKh lr we;af;a collaboration and community-driven
M,odhs;dj" úfkdaodiajdoh fyda ikakfs õokh
jeks mßYS,lhka i|yd ksYÑ a ; ld¾hhka bgq development.
lsÍugh' újD;-uQ,dY% uDÿldx. hkq Ndú; lsÍu"
fjkia lsÍu iy fnod yeÍu i|yd
Examples: Microsoft Word, Chrome, etc.
uyck;djg uQ,dY% fla;h fkdñf,a ,nd
.; yels uDÿldx.hls' th iyfhda.; S djh
iy m%cdj mokï lr.;a ixj¾Okh
Types of Software Èßu;a lrhs'
uDÿldx. j¾. Examples: Linux, Mozilla Firefox, etc.

• Commercial Off-the-Shelf (COTS) • Proprietary Software


ysñldr uDÿldx.
COTS software is pre-packaged
software that is commercially available Proprietary software is software that is
and can be used out-of-the-box. owned by an individual or a company
COTS uDÿldx.h hkq jd‚cuh jYfhka and is not made available for public
,nd .; yels iy fmÜáfhka msg; Ndú;d use. Users must purchase a license to
l< yels mQ¾j weiqreï l< uDÿldx.hls' use the software, and its source code is
kept secret.
These solutions are developed to meet ysñldr uDÿldx. hkq mqoa.,fhl=g fyda
the needs of a wide range of users iud.ulg wh;a jk w;r fmdÿ Ndú;h
without requiring customization. i|yd ,nd fkdfok uDÿldx.hls'
wNsreÑlrKh wjYH fkdù mq¿,a mßYS,lhka uDÿldx.h Ndú;d lsÍug
mrdihl mßYS,lhskfa .a wjYH;d n,m;%hla ñ,§ .; hq;= w;r" tys uQ,dY%
imqrd,Su i|yd fuu úi÷ï ixj¾Okh fla;h ryis.;j ;nd we;'
lr we;' Examples: Windows, Adobe Photoshop
etc
Examples: Microsoft Office, Adobe
Creative Cloud, etc. • Freeware
Freeware is software that is available for
• Tailor-made Software use at no cost. While users can
ilia l< uDÿldx.
download and use the software for free,
the source code is typically not
Tailor-made software, also known as
available, and there may be limitations
custom software, is specifically
on features or usage.
developed for a particular organization
Freeware hkq lsisÿ úhoulska f;drj
or user, designed to meet their unique Ndú;hg .; yels uDÿldx.hls'
requirements and workflows. mßYS,lhskg a uDÿldx.h fkdñf,a nd.;
wNsreÑ uDÿldx. f,io ye¢kafjk ilia lr Ndú;d l< yels w;r" uQ,dY% fla;h
l< uDÿldx." úfYaIs; ixúOdkhla fyda idudkHfhka ,nd .; fkdyels w;r"
mßYS,lfhl= i|yd úfYaIfhka ks¾udKh úfYaIdx. fyda Ndú;h ms<sn| iSudjka
lr we;s w;r" Tjqkf a .a woaú;Sh wjYH;d ;sìh yel'
iy ld¾h m%jdyhka imqrd,Su i|yd Examples: Skype, AVG Antivirus Free
ks¾udKh lr we;'

47
ictfromabc.com
• Shareware Firmware
iaÓrdx.
Shareware is a type of proprietary
software that is distributed for free on a Firmware is specialized software installed
trial basis, often with limited directly on hardware components. It
functionality or a time limit. enables the hardware to communicate
Shareware hkq fndfyda úg iSñ; effectively with other system components.
l%shdldÍ;ajhla fyda ld, iSudjla iys;j iaÓrdx. hkq oDVdx. ixrpl u; iDcqju
w;ayod ne,Sfï mokula u; fkdñf,a ia:dmkh lr we;s úfYaIs; uDÿldx.hls' th
fnod yßk ysñldr uDÿldx.hls' wfkl=;a moaO;s ixrpl iuÕ M,odhS f,i
ikakfs õokh lsÍug oDVdx. il%Sh lrhs'
Users are encouraged to purchase the
full version after the trial period. Firmware is typically stored in non-volatile
w;ayod ne,Sfï ld, iSudfjka miq memory, which retains data even when the
iïmQ¾K wkqjdoh ñ,§ .ekSug power is turned off. Some of the common
mßYS,lhska Wkkaÿ lrkq ,efí' storage locations for firmware are ROM,
EEPROM, Flash memory, BIOS/UEFI Chips
Examples: WinRAR, Norton Antivirus, 7- etc.
Zip, etc. iaÓrdx. idudkHfhka .nvd lr we;af;a kYH
fkdjk u;lfha jk w;r th n,h wl%sh jQ
• Cloud-Based Software (SaaS) úg mjd o;a; r|jd .kS' iaÓrdx. i|yd fmdÿ
j,dl=¿ u; mokï jQ uDÿldx. .nvd ia:dk lsym s hla jkafka ROM"
EEPROM" iefK,s u;lh" BIOS/UEFI Ñm
Software as a Service (SaaS) is a cloud- hkdÈhhs'
based software delivery model where
applications are hosted on remote In a computer system, there are several
servers and accessed via the internet. main types of firmware:
fiajdjla f,i uDÿldx. (SaaS) hkq mß.Kl moaO;shl" iaÓrdx. m%Odk j¾.
j,dl=¿ u; mokï jQ uDÿldx. fnod lsysmhla ;sfí(
yeÍfï wdlD;shls" tys§ fhÿï ÿria:
fiajdodhlhka u; i;aldrl;ajh imhk • BIOS
w;r wka;¾cd,h yryd m%fõY fõ' • UEFI
• Embedded Firmware
Users typically pay a subscription fee ldjeoa¥ iaÓrdx.
for access.
mßYS,lhka idudkHfhka m%fõYh i|yd
odhl .dia;=jla f.jhs' BIOS (Basic Input/Output System)
BIOS ^uQ,sl wdodk$m%;sodk moaO;sh&
Examples: Google Workspace,
Dropbox, etc. The first software that runs when a
computer is powered on. It initializes and
tests the hardware components and loads
the operating system from the storage
device.
mß.Klhla l%shd;aul jQ úg l%shd;aul jk
m<uq uDÿldx.h' th oDvdx. ixrpl wdrïN
lr mÍlaId lr .nvd Wmdx.fhka fufyhqï
moaO;sh mQrKh lrhs'

48
ictfromabc.com
UEFI (Unified Extensible Firmware Liveware
Interface) Ôjdx.

A modern replacement for BIOS, UEFI offers Liveware refers to the human component in
more features, such as faster boot times, computing, emphasizing the role of users
support for larger hard drives, and a and IT personnel.
graphical user interface. Ôjdx. hkafkka woyia lrkafka mß>klfha
udkj ixrplh" mßYS,lhskf
a .a iy
BIOS i|yd kùk wdfoaYlhla jk UEFI f;dr;=re ;dlaIK ld¾h uKav,fha
fõ.j;a werUqï fõ,djka" úYd, oDV ;eá ld¾hNdrh wjOdrKh lrhs'
i|yd iyh iy Ñ;%l mßYS,l w;=reuqyK q ;
jeks ;j;a úfYaIdx. ,nd fohs'
Examples of liveware
ðjdx. WodyrK
It also supports secure boot to prevent
unauthorized software from running • End Users
during startup. wjika mßYS,lhka
th wdrïNfha§ wkjir uDÿldx. l%shd;aul
ùu je,elaùu i|yd wdrlaIs; werUqï i|yd • System Administrators
iyh olajhs' moaO;s mßmd,lhska

Embedded Firmware • Developers/Programmers


ldjeoa¥ iaÓrdx. ixj¾Olhsk$a l%uf,aLlhska

Found in various hardware components • Network Engineers


like keyboards, mice, printers, and other cd, bxðfkarejka
peripherals.
h;=remqjre" uQisl" uqøK hka;%" iy wfkl=;a • Cybersecurity Professionals
m¾hka; jeks úúO oDvdx. ixrpl j, ihsn¾ wdrlaIK jD;a;slhka
olakg ,efí'
• Database Administrators etc.
o;a; iuqod mßmd,lhska wdÈh'
This firmware controls the specific
functions of these devices.
fuu iaÓrdx. fuu Wmdx.j, ksYÑ a ;
ld¾hhka md,kh lrhs'

49
ictfromabc.com
Role of Human Operators in ICT-Enabled • Decision-Making
Information Systems ;SrK .ekSu
ICT-il%Sh f;dr;=re moaO;sj, udkj
l%shdlrejkaf.a N+ñldj Operators interpret data and analyze
trends, playing a crucial role in
In the context of ICT-enabled information informed decision-making processes.
systems, liveware plays a crucial role in l%shdlrejka o;a; w¾: ksrEmKh lsÍu
ensuring the effectiveness, efficiency, and iy m%jK;d úYaf,aIKh lsÍu" oekqj;a
;SrK .ekSfï l%shdj,Skays ;SrKd;aul
overall success of these systems. ld¾hNdrhla bgq lrhs'
ICT-il%Sh f;dr;=re moaO;sj, ikao¾Nh ;=<"
iÔù uDÿldx. fuu moaO;sj, iM,;djh"
• Adaptation and Change
ld¾hlaIu;dj iy iuia; id¾:l;ajh
iy;sl lsÍfï§ ;SrKd;aul ld¾hNdrhla bgq Management
lrhs' wkqj¾;kh iy fjkia l<uKdlrKh

• System Design and Development As technology evolves, they help


moaO;s ks¾udKh iy ixj¾Okh organizations transition to new systems
and assist users in adapting to changes.
Operators analyze user needs, gather ;dlaIKh mßKduh jk úg" tAjd
requirements, and contribute to wdh;kj,g kj moaO;s fj; ixl%uKh
ùug iy fjkialï j,g wkqj¾;kh
specifications to ensure the system ùug mßYS,lhskg a Wmldr lrhs'
meets its intended purpose.
l%shdlrejka mßYS,l wjYH;d
• Ethical Considerations and Oversight
úYaf,aIKh lrhs" wjYH;d /ia lrhs"
iy moaO;sh tys wfmalaIs; wruqK iodpdrd;aul i,ld ne,Sï iy wëlaIKh
imqrd,Su iy;sl lsÍu i|yd msßú;rhkag
odhl fõ' Operators ensure compliance with
regulations and ethical practices,
• Operation and Management maintaining trust and integrity within
fufyhqu iy l<ukdlrKh the system.
l%shdlrejka úiska fr.=,dis iy
They manage ICT systems by iodpdrd;aul Ndú;hkag wkql+, ùu"
monitoring performance, moaO;sh ;=< úYajdih iy wLKav;dj
mj;ajd .ekSu iy;sl lrhs'
troubleshooting issues, and
maintaining system integrity for
• Feedback and Continuous
smooth operations.
Improvement:
ld¾h idOkh ksÍlaIKh lsÍu" .eg¿
ksrdlrKh lsÍu iy iqug fufyhqï m%;sfmdaIK iy wLKav jeäÈhqKq lsÍï(
i|yd moaO;s wLKav;dj mj;ajd .ekSu
u.ska Tjqka ICT moaO;s l<ukdlrKh They provide valuable feedback that
lrhs' informs system refinement and
enhances overall performance.
Tjqka moaO;s fYdaOkh oekqï fok iy
iuia; ld¾h idOkh jeä ÈhqKq lrk
jákd m%;sfmdaIK imhhs'

50
ictfromabc.com
Analyzes the stages of data processing Data verification
o;a; ieliSfï mshjr úYaf,aYKh lrhs o;a; i;Hdmkh

1. Data gathering Checking the accuracy of the data after


o;a; /ia lsÍu inputting the data.
2. Data validation mß.Klhlg wdodkh l< miq o;a;j,
ksrjoH;djh mÍlaId lsÍu'
o;a; j,x.=lrKh

3. Data input This is needed to confirm data reliability.


o;a; wdodkh o;a;j, úYajikSh;ajh ;yjqre lsÍu i|yd
fuh wjYH fõ'
4. Data verification
o;a; i;Hdmkh Data processing
o;a; ieliSu
5. Data processing
o;a; ieliSu Transforming raw data into information
6. Data output based on user requirements.
o;a; m%;sodkh mßYS,l wjYH;d u; mokïj wuq o;a;
f;dr;=re njg mßj¾;kh lsÍu'
7. Data storage
o;a; .nvd lsÍu Data output
o;a; m%;sodkh

Data gathering
Presenting processed data in usable or
o;a; /ia lsÍu
interpretable formats.
Collecting raw data from various sources. ieliQ o;a; Ndú; l< yels wdlD;sj,ska
úúO uQ,dY%j,ska wuq o;a; /ia lsÍuhs' bÈßm;a lsÍuhs'

If there is not gathered data, this step is Output of processed data is carried out
required. when communication is needed.
/ia lr .kakd ,o o;a; fkdmj;Skï fuu ikakf s õokh wjYH jQ úg ieliQ o;a;
wÈhr wksjdrfhkau isÿ l, hq;= fõ' m%;sodkh flfra'

Devices:
Data validation
o;a; j,x.=lrKh Monitor, Printer, Touch Screen, Speaker

Techniques used to validate the accuracy of


Data storage
the gathered data when entering into a o;a; .nvd lsÍu
computer.
mß.Klhlg wdodkh lrk úg /ia lrk ,o
Saving data securely for future access.
o;a;j, ksrjoH;djh ;yjqre lsÍug Ndú;d
lrk ;dlaI‚l l%u' wkd.; m%fõYh i|yd wdrlaIs;j o;a;
iq/lSuhs'

Data input This step is done only if the processed data


o;a; wdodkh
needs future reuse.
fuu mshjr isÿ lrkq ,nkafka ieliQ o;a;
Entering collected data into a computer. wkd.; kej; Ndú;hg wjYH kï mu‚'
/ia lr.;a o;a; mß.Khlhg wdodkh
lsÍuhs'
Devices:
HDD, Flash Drive, DVD, Cloud computing

51
ictfromabc.com
Data gathering methods
o;a; tla /ia lr.ekSfï úê

Classification by level of automation


iajhxl%ShlrKfha uÜgu wkqj j¾. lsÍu

Method Advantages Disadvantages

Manual High flexibility and detail. Time-consuming and labor-


ldhsl by< kuHaY, S SNjh iy intensive.
Collected by people directly. úia;r' ld,h .;ùu iy jeä Y%uh'
ñksiqka úiska iDcqju tla
/ia lrhs' Can capture complex Prone to human errors.
Interviews responses. udkj fodaI j,g keUqre fõ'
Observations ixlS¾K m%;spdr .%yKh
Sample document lr .; yel'
collection Easy to implement with Difficult to scale for large
Questionaries minimal tools. datasets.
wju fuj,ï iu. úYd, o;a; lÜg, i|yd
l%shd;aul lsÍug myiqh' mßudKh lsÍug wmyiqh'
Semi-Automated Balances speed and Requires human intervention.
w¾O iajhxlD; accuracy. udkj ueÈy;aùu wjYH fõ'
Collected by both fõ.h iy ksrjoH;djh
automated devices and iu;=,s; lrhs'
humans.
ñksiqka iy iajHxl%Sh Reduces repetitive tasks Can be less flexible than manual
WmlrK hk fodwldrfhkau for users. methods.
tla /ia lrhs' mßYS,lhska i|yd jk yia;Sh l%uj,g jvd wvq kuHYS,S
mqkrdj¾;k ld¾hhka wvq úh yel'
OCR lrhs'
OMR
MICR Often cost-effective for May require training to use tools
Magnetic Strip reader mid-scale tasks. effectively.
Smart Card Reader fndfyda úg uOH mßudK fuj,ï M,odhS f,i Ndú;d
Barcode Reader ld¾hhka i|yd ,dNodhS lsÍug mqyK q qjla wjYH úh yel'
fõ'
Fully Automated Fast and efficient data Initial setup can be complex and
mQ¾K iajhxlD; collection. costly.
Collected entirely by fõ.j;a yd ld¾hlaIu uQ,sl ieliqu ixlS¾K iy ñ,
automated devices. o;a; /ia lsÍu' wêl úh yel'
iïmQ¾Kfhkau iajHxl%Shj
tla /ia lrhs' Eliminates human error. Limited to predefined processes.
udkj fodaI bj;a lrhs' mQ¾j ksYÑa ; l%shdj,s j,g iSud
Sensors fõ'
Loggers
Web scraping
Enables real-time data Dependence on technology and
Mobile apps
monitoring. maintenance.
;;H ld,Sk o;a; ;dlaIKh iy kv;a;=j u; hefma'
ksÍlaIK il%Sh lrhs'

52
ictfromabc.com
Manual methods Types of interviews
ldhsl úê
• One to one interview
1.Interviews tlsfkld w;r iïuqL mÍlaIKh
iïuqL idlÉPd
• Group interview
lKavdhï iïuqL mÍlaIKh
A conversation between two parties where
one asks questions, and the other answers o One interviewer, group of
them is known as an interview. respondents
tla wfhl= m%Yk
a wik" wfkld tAjdg ms<s;=re m%;spdr olajkakka lsym
s fofkla iy
imhk" md¾Yaj folla w;r isÿjk ixjdohla m%Yk
a wikakka tla wfhla
iïuqL idlÉPdjla f,i ye¢kafõ'
• Panel interview
Advantages uKav, iïuqL mÍlaIKh
o Group of interviewers, one
• Allows for gathering of detailed info.
iúia;rd;aul f;dr;=re /ia lsÍug bv respondent
i,ihs' m%;spdr olajkakka tla wfhla iy
m%YK
a wikakka lsym s fofkla
• Can adapt questions based on
• Face-to-face interview
respondents’ answers. uqyK
q g uqyK
q iïuqL mÍlaIKh
m%;spdr olajkakkaf.a ms<s;=re u;
mokïj m%Yk a wkqj¾;kh l< yelsh'
• Telephone interview
ÿrl:k iïuqL mÍlaIKh
• Interviewers can clarify questions or
responses. • Online interview
iïuqL mÍlaIlhskg a m%Yk a fyda m%;spdr ud¾..; iïuqL mÍlaIKh
meyeÈ,s lr .; yel'
• Structured interview
Disadvantages jHqy.; iïuqL mÍlaIKh

• Requires more time, effort, and people. • Unstructured interview


jeä ld,hla" jEhula iy msßia wjYH fõ' jHqy.; fkdjk iïuqL mÍlaIKh

• Interviewer’s presence may influence • Informal conversational interview


responses. wúêu;a ixjdo iïuqL mÍlaIKh
iïuqL mÍlaIlf.a fmkSisàu m%;spdrj,g
n,mEï l< yelsh'

• Difficult to conduct with many


participants.
iyNd.sjkakka /ila iuÕ isÿlsÍu
wmyiqh'

53
ictfromabc.com
2. Observations 3. Questionnaires
ksÍlaIK m%IaKdj,Ska

Observations involve watching and Questionnaires are forms with questions


recording behaviors to collect data. used to collect data from people.
o;a; /ia lsÍu i|yd yeisÍï keröu iy m%Yk
a dj,Ska hkq ñksiqkaf.ka o;a; /ia lsÍug
jd¾;d lsÍu ksÍlaIK j,g we;=<;a fõ' Ndú;d lrk m%Yk a iys; fmdaru fõ'

Advantages Advantages
• Provides detailed data based on real- • Can be distributed to many
world settings. participants.
i;H ieliqï u; mokïj iúia;rd;aul iyNd.sjkakka /ila fj; tljr fnod
o;a; imhhs' yeßh yel
• Allows for the study of actual behavior
rather than reported behavior. • Less resource and time consuming.
jd¾;d lrk ,o yeisÍï j,g jvd ienE iïm;a yd ld,h kdia;s ùu wvqh'
yeisÍï wOHkh lsÍug bv i,ihs'
• May yield more honest responses.
Disadvantages jvd;a wjxl m%;spdr ,eìh yelsh'

• Can be labor-intensive and lengthy. Disadvantages


wêl Y%uhla iy ld,hla jehúh yelsh'
• Having limited options for answers may
• Observer's viewpoint affects the data. not capture the full range of
ksÍlaIlhdf.a oDIaáfldaKh o;a; flfrys
participants’ thoughts and feelings.
n,mdhs'
ms<s;=re i|yd iSñ; úl,am mj;sk neúka
• Participants’ behavior might change iyNd.sjkakkaf.a is;=ú,s iy yeÕSïj,
due to the presence of an observer. iïmQ¾K mrdih .%yKh lr .; fkdyel
ksÍlaIlfhl= isàu fya;=fjka
iyNd.sjkakkaf.a yeisÍu fjkia úh • Participants may ignore or not
yelsh' complete the questionnaire.
iyNd.sjkakkag m%Yk a dj,sh fkdi,ld
Types of observations yeÍug fyda iïmQ¾K fkdlsÍug yelsh'

• In Participant Observation the observer


Types of Questionnaires
becomes a part of the observed group
iyNd.S jk ksÍlaIKfha § ksÍlaIlhd
ksÍlaI;s lKavdhfï fldgila njg Open-Ended
m;afõ Respondents answer in their own words.
• In Non-Participant Observation m%;spdr olajkakk Tjqkf a .au jpk j,ska
observer remains separate from them. ms<s;=re fohs'
iyNd.S fkdjk ksÍlaIK j,§
ksÍlaIlhd Tjqkf a .ka fjkaj mj;S' Closed-Ended
• In Naturalistic Observation, behavior is Respondents choose from specific options.
observed in a natural environment. m%;spdr olajkakka ksYÑ
a ; úl,am j,ska f;dard
iajNdúl ksÍlaIK ;=< iajNdúl .kS'
mßirhl yeisÍu ksÍlaIKh lrkq ,efí'
• In Controlled Observation the Multiple Choice
observation is conducted in a Respondents select from several answer
choices.
controlled setting.
m%;spdr olajkakka ms<s;=re f;aÍï lsym
s hlska
md,s; ksÍËKfha§ ksÍËKh md,s;
miqìul isÿ flf¾' f;dard .kS'

54
ictfromabc.com
For further reference Semi-automated methods
w¾O iajhxlD; úê
Sample document collection
,shú,s /ialsÍu • Magnetic ink character recognition
pqïNl ;Sk;a wkq,laIK lshjkh
Referring and analyzing the documents • Optical mark reader
and books related to the data gathering m%ldY i,l=Kq lshjkh
field.
o;a; /ia lrkd lafIa;%hg wod, ,shú,s iy • Optical character reader
fmd;a mßYS,kh lsÍu iy úYaf,aIKh m%ldY wkq,laIK lshjkh
lsÍuhs' • Barcode card reader
Barcode ldâm;a lshjkh
Advantages
• RFID
• Less expensive as resources already
exist. • NFC
iïm;a oekgu;a mj;sk neúka úhou • Smart card reader
wvqh'
• Provides access to historical data and These devices will be discussed under 2.2
long-term trends. category in Lesson 2.
ft;sydisl o;a; iy È.=ld,Sk m%jk;d fuu Wmdx. 2 jk mdvfï 2'2 ldKavh hgf;a
i|yd m%fõYh imhhs' idlÉPd flfra'

Disadvantages
Fully automated methods
• Some documents may be inaccessible, mQ¾K iajhxlD; úê
confidential, or non-existent.
we;eï f,aLkj,g m%fõY úh fkdyels
úh yels w;r" ryis.; fyda fkdmj;sk • Web Scraping
tAjd úh yelsh'
Automatically extracts data from
• Documents may contain biases, websites using bots or scripts.
inaccuracies, or may be outdated. bots fyda scripts Ndú;fhka fjí wvú
f,aLkj, mlaI.%dyS" idjoH fyda h,a mek j,ska o;a; iajhxl%Shj Wmqgd .kS'
.sh tAjd wvx.= úh yel'
• Mobile Apps
Types of collected documents Applications that gather user data, like
location or usage patterns,
Written Documents automatically in the background.
,sÅ; f,aLk miqìu yryd ia:dkh fyda Ndú; rgd
Books, articles, newspapers, magazines. jeks mßYS,l o;a; iajhxl%Shj /ia
lrk fhÿï'
Electronic Documents
bf,lafg%dKsl f,aLk • Sensors
Emails, websites, online articles, and social ixfõol
media posts. Temperature, Pressure, Motion, and
Light sensors
Visual Documents WIaK;aj" mSvk" p,k iy wdf,dal
oDYH f,aLk ixfõol
Photographs, videos, and other visual
media. • Loggers
,>qr

55
ictfromabc.com
Loggers For further reference
,>qr
Classification by data collection method
o;a; tl;= lsÍfï l%uh wkqj j¾.SlrKh

Primary data collection


m%d:ñl o;a; tl;=j

• Surveys
iólaIK
• Interviews
iïuqL idlÉPd
A logger is a device or software that
• Observations
automatically records data over time, often
ksÍlaIK
used to monitor environmental conditions
or system performance.
,>qrla hkq ld,h;a iuÕ o;a; iajhxl%Shj Secondary data collection
jd¾;d lrkq ,nk Wmdx.hls" th fndfyda úg oaú;shsl o;a; tl;=j
mdßißl ;;a;ajhka fyda moaO;s l%shdldß;ajh
ksÍlaIKh lsÍug Ndú;d lrhs' • Literature review
idys;H újrK
It helps collect and store data without • Existing dataset
manual intervention. mj;sk o;a; lÜg,
th yia;Sh ueÈy;a ùulska f;drj o;a; /ia • Document analysis
lsÍug iy .nvd lsÍug WmldÍ fõ' f,aLk úYaf,aIKh

Sensors
ixfõol Classification by electronic vs. Non-
electronic methods
úoHq;a yd úoHq;a fkdjk wdldr wkqj
j¾.SlrKh

Electronic methods
úoHq;a wdldr

• Digital devices and sensors


äðg,a Wmdx. iy ixfõol
• Online surveys
ud¾..; iólaIK

Non-electronic methods
úoHq;a fkdjk wdldr

• Interviews
iïuqL idlÉPd
• Questionnaires
m%IaKdj,Ska

56
ictfromabc.com
Data validation methods For further reference
o;a; j,x.=lrK l%u
Length check
È. mÍËdj
1. Type check
j¾.h mÍlaId lsÍu Checks if the data entered has an acceptable
length, typically a minimum or maximum
Validates that the data entered is of the number of characters.
expected data type (Ex. text, integer). we;=<;a l< o;a;j,g ms<s.; yels È.la ;sfío"
idudkHfhka wju fyda Wmßu wlaIr ixLHdjla
we;=<;a l< o;a; wfmalaIs; o;a; j¾.hg
;sfíoehs mÍlaId lrhs'
wh;a nj ;yjqre lrhs ^Wod' fm<" mQ¾K
ixLHd&'
Example: Requiring a password to be at least
8 characters long.
Example uqrmohla wju jYfhka wlaIr 8laj;a ;sìh
Ensuring a user inputs a number for age hq;=h'
instead of text.
mßYS,lfhl= jhi i|yd fm< fjkqjg Uniqueness check
ixLHdjla we;=<;a lsÍu iy;sl lsÍu' wkkH mÍlaIdj

2. Presence check Ensures that the data entered is unique and


;;H;d mÍlaIdj not already in use within the database.
we;=<;a l< o;a; wkkH nj iy o;a; iuqodh
Ensures that a field is not left empty and ;=< oekgu;a Ndú;fha fkdue;s nj iy;sl
lrhs'
contains data.
lafIa;%hla ysiaj fkd;nk nj iy tys o;a; Example: Verifying that a username or email
wvx.= nj iy;sl lrhs'
address isn’t already registered.
mßYS,l kduhla fyda Bfï,a ,smk s hla oekgu;a
Example ,shdmÈxÑ ù fkdue;s nj ;yjqre lsÍu'
Checking that a username field is filled
before submission. Spell check
Submit lsÍug fmr mßYS,l kdu lafIa;%hla wlaIr úkHdi mÍlaIdj
mqrjd we;aoehs mÍlaId lsÍu'
Identifies and corrects spelling errors in text
3. Range check input.
mrdi mÍlaIdj fm< wdodkfha wlaIr úkHdi fodaI y÷kdf.k
ksjerÈ lrhs'
Verifies that data falls within a specific Example: Highlighting misspelled words in a
range or limit. text document.
o;a; ksYÑ a ; mrdihla fyda iSudjla ;=<g fm< f,aLkhl jerÈ wlaIr úkHdi iys; jpk
jefgk nj ;yjqre lrhs' Woa§mkh lsÍu'

Example Format check


Ensuring a user’s age is between 18 and 99 wdlD;s mÍlaIdj
for an age-restricted site. Ensures that data follows a specified format
jhia iSud l< wvúhla i|yd mßYS,lfhl=f.a or structure.
jhi wjqreÿ 18 iy 99 w;r we;s nj iy;sl o;a; ksYaÑ; wdlD;shla fyda jHqyhla wkq.ukh
lsÍu' lrk nj iy;sl lrhs'

Example: Requiring a date to be in the format


"MM/DD/YYYY."
"MM/DD/YYYY." wdlD;sfhka Èkhla wjYH fõ'

57
ictfromabc.com
Data input methods Indirect method
o;a; wdodk úê jl% l%uh

Direct and Indirect methods Indirect data input is a method of entering


data or commands into a system through a
Direct method device that converts human actions into
Rcq l%uh data.
iDcq fkdjk o;a; wdodkh hkq ñksia l%shdjka
These methods capture and input data into o;a; njg mßj¾;kh lrk WmlrKhla
a system with litte or no human interaction. yryd moaO;shlg o;a; fyda úOdk we;=<;a
lsÍfï l%uhls'
fuu l%u u.ska ñksia wka;¾l%h s d j,ska f;dr
fyda b;d iq¿ wka;¾l%shd iys;j moaO;shlg
o;a; .%yKh lr wdodkh lrhs' Examples include devices like a computer
mouse, Keyboard, or joystick.
This method is fast and highly accurate. WodyrK f,i mß.Kl uQislhla"
fuu l%uh fõ.j;a iy jvd;a ksrjoHh' h;=remqjrejla fyda fcdhsiaála jeks Wmdx.
we;=<;a fõ'
The installation cost is high.
ia:dmk msßjeh by<h This is method is slower than the direct
method.
Examples: fuh iDcq l%uhg jvd ukao.dó fõ'
RFID, Sensors, Barcode scanners, Magnetic
strip readers, OMR, OCR Prone to human errors.
udkj fodaY j,g keUqre fõ'

Direct entry input


iDcq wdodkh

Data Input device Computer


o;a; wdodk Wmdx. mß.Klh

Indirect entry input


jl% l%uh

Data User Input device Computer


o;a; mßYS,lhd wdodk Wmdx. mß.Klh

58
ictfromabc.com
Remote and Local methods Online and Offline methods

Remote method Online data entry


ÿria: l%uh ud¾..; o;a; wdodkh

Data is entered from a location away from Data is entered and processed
the main system or server. immediately, requiring instant feedback.
m%Odk moaO;sfhka fyda fiajdodhlfhka ÿria: laI‚l m%;spdr wjYH jk o;a; laI‚lj
ia:dkhl isg o;a; we;=<;a lrkq ,efí' wdodkh lr ilikq ,efí'

Examples For example, in an online game, when you


Logging into a website and submitting data shoot, the action is processed right away to
from a device. determine if you hit the target.
fjí wvúhlg mQrKh ù Wmdx.hlska o;a; WodyrKhla f,i" ud¾..; l%Svdjl§" Tn
lsÍu' úiska fjä ;nk úg" b,lalhg myr ÿkafkao
hkak ;SrKh lsÍug tu l%shdj jydu ilikq
,efí'
Local method
ia:dkSh l%uh This is known as real-time data input.
fuh ;;H ld,Sk o;a; wdodkh f,i
ye¢kafõ'
Data is entered directly on the system
where it will be used or processed.
o;a; iDcqju th Ndú;d lrk fyda ielfik
moaO;shg we;=,a lrkq ,efí' Offline data input method
ud¾. wm.; o;a; wdodkh
Examples This method does not require immediate
ATM machines, Spreadsheet information, processing.
computer codes fuu l%uhg laI‚l ieliqï wjYH fkdfõ'

Data is collected first and used later for


specific tasks, often after a certain period.
o;a; m<uqj /ia lr miqj ksYÑ a ; ld¾hhka
i|yd Ndú;d lrkq ,efí" th fndfyda úg
ksYÑ
a ; ld, iSudjlg miqj isÿfõ'

59
ictfromabc.com
Data verification methods 3. Printing and checking physically
o;a; i;Hdmk l%u entered data
we;=<;a l< o;a;j, oDv msgm;la f.k
The main difference between validation mÍlaId lsÍu
and verification is that verification is done
after inputting the data while validation is A hard copy or a printout is taken of the
done when the data is entered. entered data and it is checked for errors
j,x.=lrKh iy i;Hdmkh w;r we;s m%Odk with the original.
fjki jkafka o;a; we;=<;a lsÍfuka miqj we;=,;a l, o;a; j, msgm;la f.k uq,a
i;Hdmkh isÿ lrk w;r o;a; we;=<;a lrk msgm; yd ixikaOkh lrñka mßlaId lsÍu'
úg j,x.=lrKh isÿ lsÍuhs'

4. Two-Factor Verification
1. Double entry verification
oaú;aj we;=<;a lsÍï i;Hdmkh A security process that requires two forms
of identification, something you know (like
In this process, after data is entered once, it a password) and something you have (like
is required to be entered again. a smartphone), to access an account.
fuu l%shdj,sfha§" o;a; tla jrla we;=<;a l< .sKqulg m%fõY ùu i|yd y÷kd.ekSfï
miq" th kej; we;=,a lsÍug wjYH fõ' wdldr folla" Tn okakd fohla ^uqrmohla
jeks& iy Tn i;= fohla ^iaud¾Ü cx.u
This is done to check whether the same ÿrl;khla jeks& wjYH jk wdrlaIl
data entered first is re-entered. l%shdj,shls
fuh isÿ lrkqfha m<uqj we;=<;a l< o;a;u
kej; we;=<;a lr we;ao hkak mÍlaId lsÍug
h'

5. One-Time Password (OTP)

A temporary code sent to a user that is


2. Checking the soft copy of the data used for a single login session or
o;a;j, uDÿ msgm; mÍlaId lsÍu transaction.
tla msúiqï ieishla fyda .kqfokqjla i|yd
Checking the soft copy of the data means Ndú;d lrk mßYS,lfhl= fj; hjk ,o
reviewing digital files to make sure the ;djld,sl fla;hls'
information is accurate and free of errors.
o;a;j, uDÿ msgm; mÍlaId lsÍu hkq
f;dr;=re ksrjoH iy fodaI rys; nj ;yjqre
lr .ekSu i|yd äðg,a f.dkq iudf,dapkh
lsÍuhs'

60
ictfromabc.com
Data processing methods Parallel and Serial processing
o;a; ilik úê iudka;r ieliqu iy wkql%ñl ieliqu

Parallel processing
Batch processing and Real-time iudka;r ieliqu
processing
ldKav ieliqu iy ;;ald,Sk o;a; ieliqu A technique where multiple processors or
computers work on different parts of the
data simultaneously to speed up
Batch processing
ldKav ieliqu processing.
ieliSu fõ.j;a lsÍu i|yd nyq ilik fyda
mß.Kl u.ska o;a;j, úúO fldgia u;
Data is collected and processed in groups tljr l%shd lrk ;dËKhls'
at scheduled times.
kshñ; l< ld,hl§ ldKav jYfhka o;a; Ex.
/ia lr ilikq ,efí'
Analyzing large datasets in scientific
research or rendering graphics in video
Ex.
editing.
Payroll systems processing employee
úoHd;aul m¾fhaIKj, úYd, o;a; lÜg,
payments once a month. úYaf,aIKh lsÍu fyda ùäfhda ixialrKfha§
jegqma moaO;s uilg jrla fiajl f.ùï Ñ;%l úoeyqïlrKh'
ieliSu'

Real time data processing Serial processing


;;ald,Sk o;a; ieliqu wkql%ñl ieliqu
Data is processed immediately as it is input,
A method where data is processed
allowing for instant feedback.
laI‚l m%;spdr i|yd bv i,iñka o;a; sequentially, one piece at a time, in the
wdodkh l< úg laI‚lj ilikq ,efí' order it is received.
o;a; ,efnk wkqms<sfj, wkqj" jrlg tl
Input, processing, output and data storage fldgi ne.ska fY%a‚.;j ilik l%uhls'
are done in parallel.
wdodkh" ieliSu" m%;sodkh fukau o;a; Ex.
.nvd lsÍu iudka;rj isÿ lrkq ,nhs' A printer processing one document after
another or a program executing commands
Ex. in a linear sequence
Aircraft autopilot tla f,aLkhlska miqj ;j;a f,aLkhla ilik
.=jka hdkd iajhxl%Sh kshuq uqøK hka;%hla fyda fraÇh wkqms<sfj,lska
Nuclear Power Plant Control Systems úOdk l%shd;aul lrk jevigykla
kHIaÀl n,d.dr md,k moaO;s
Automated production control systems
iajhxl%Sh ksYm
a dok md,k moaO;s

61
ictfromabc.com
Data output methods Soft Copy vs. Hard Copy
o;a; m%;sodk úê
Soft Copy
uDÿ msgm;
Direct Output vs. Storage
A digital version of data that can be viewed
Direct Output on electronic devices, such as computer
iDcq m%;sodkh
screens, tablets, or smartphones.
mß.Kl ;sr" geí,Ü" fyda iaud¾Ü f*daka jeks
This method involves sending data directly bf,lafg%dksl Wmdx. u; ne,sh yels f,i
to the user or an output device for mj;sk o;a;j, ixLHdxl wkqjdohls'
immediate use.
fuu l%uh uÕska laI‚l Ndú;h i|yd Examples include documents,
mßYS,lhd fyda m%;sodk Wmdx.hla fj; spreadsheets, and presentations stored in
iDcqju o;a; heùu we;=<;a fõ'
digital format.
WodyrK f,i äðg,a wdlD;sfhka .nvd lr
Examples include displaying results on a we;s f,aLk" me;=reïm;a iy we;=<;a fõ'
screen or printing a report right away.
WodyrK f,i ;srhla u; m%;sM, fmkaùu Hard Copy
fyda jd¾;djla jydu uqøKh lsÍu we;=<;a oDv msgm;
fõ'

A physical, printed version of data that can


Storage
.nvd lsÍu be held and viewed on paper.
lvodis u; r|jd ;nd .; yels iy kerôh
yels o;a;j, fN!;sl" uqøs; wkqjdohls'
In this method, data is saved for later use
rather than being immediately displayed. Examples include printed documents,
fuu l%ufha§" o;a; laI‚lj m%o¾Ykh lsÍu
fjkqjg miqld,Sk Ndú;h i|yd iq/fla' reports, or photographs.
WodyrK f,i uqøs; f,aLk" jd¾;d fyda
PdhdrEm we;=<;a fõ'
Examples include saving files on a hard
drive or a cloud storage service for future
access.
WodyrK f,i oDV ;eáhl fyda j,dl=¿
.nvd fiajdjla ;=< wkd.; m%fõYh i|yd
f.dkq iq/lSu we;=<;a fõ'

62
ictfromabc.com
Data storage methods Online and Offline storage methods
o;a; .nvd úê ud¾..; iy ud¾..; fkdjk .nvd l%u

Local and Remote storage methods 1. Online storage


foaYSh iy ÿria: .nvd l%u
Online storage is a directly integrated,
1. Local storage always-available form of data storage.
ud¾..; .nvd lsÍï hkq iDcqju tAldnoaO jQ"
Data is stored on-premises within physical iEu úgu ,nd .; yels o;a; .nvd lsÍfï
storage devices that are directly connected wdldrhls'
to the computing system.
mß.Kl moaO;shg iDcqj iïnkaO ù we;s It is typically part of the system’s internal
fN!;sl .nvd Wmdx. ;=< o;a; .nvd lrkq structure, like a computer’s hard drive or
,efí' cloud storage mounted over a network.
th idudkHfhka mß.Klfha oDV ;eáhla
If the computer is damaged, there is a fyda cd,hla yryd iïnkaO ù we;s j,dl=¿
high chance of data loss. .nvdjla jeks moaO;sfha wNHka;r jHqyfha
mß.Klhg ydks isÿjqjfyd;a" o;a; wysñ fldgils'
ùfï jeä iïNdú;djla we;'
Because it is seamlessly accessible, users
Ex. Hard disk, Compact disk, SSD
can retrieve and interact with data as soon
as they power on their device or connect to
2. Remote storage
the network, without needing any
Storing data in a remote place on the additional physical setup.
concept of cloud storage using the ndOdjlska f;drj m%fõY úh yels neúka"
mßYS,lhskg a wu;r fN!;sl ieliqulska
internet. f;drj" Tjqkf a .a Wmdx.h n, .ekajQ jydu
wka;¾cd,h Ndú;fhka j,dl=¿ wdphk fyda cd,hg iïnkaO jQ jydu o;a; ,nd
ixl,amh u; ÿria: ia:dkhl o;a; .nvd .ekSug iy wka;¾l%h s d lsÍug yelsh'
lrhs'
Ex. Internal HDDs or SSDs, Cloud storage
Ex.
AmazonS3, Google drive, Microsoft 2. Offline storage
Onedrive
Offline storage is data stored on physical,
external devices that are not part of the
main system or network.
ud¾..; .nvdj hkq m%Odk moaO;sfha fyda
cd,fha fldgila fkdjk fN!;sl" ndysr
Wmdx.j, .nvd lr we;s o;a; fõ'

They must be manually connected each


time they’re needed and is not readily
accessible at all times.
tAjd wjYH iEu wjia:djlu ldhslj iïnkaO
l< hq;= w;r iEu úgu myiqfjka m%fõY úh
fkdyel'

you need to physically attach the storage


device to access the data.
o;a; fj; m%fõY ùug .nvd Wmdx.h
fN!;slj iïnkaO l< hq;=h'
Ex. External HDDs or SSDs, USB flash drives

63
ictfromabc.com
Primary and Secondary storage Short term and Long term storage
methods methods
uQ,sl iy oaú;sl .nvd l%u flá ld,Sk iy È.= ld,Sk .nvd lsÍfï l%u

1. Primary storage. 1. Short term storage

It refers to temporary storage that is Short-term data storage is designed to


directly accessible by the CPU for executing hold data for a limited time period or for
programs and processing data. frequent, immediate use.
th jevigyka l%shd;aul lsÍu iy o;a; flá ld,Sk o;a; .nvd ie,iqï lr we;af;a
ieliSu i|yd CPU uÕska iDcqju m%fõY úh iSñ; ld, iSudjla i|yd fyda ks;r ks;r"
yels ;djld,sl .nvdjls' laI‚l Ndú;h i|yd jk o;a; r|jd ;nd
Ex. DROM, Cache memory, Registers .ekSugh'

This storage is often faster


2. Secondary storage fuu .nvd fndfyda úg fõ.j;a fõ

The phrase "persistent storage used for Examples


long-term data retention and larger RAM (Random Access Memory)
storage capacity" refers to secondary Cache Storage
storage. Working Directories or Temp Files
—È.= ld,Sk o;a; r|jd ;nd .ekSu iy úYd,
.nvd Odß;dj i|yd Ndú;d lrk iaÒr Running Applications and Data Processing
.nvdj— hk jdlH LKavh oaú;Shsl .nvdjg
fhduq lrhs' rely on short-term storage for quick access
to data and faster processing.
Odjkh jk fhÿï fukau o;a; ieliSu o;a;
This type of storage is designed for
fj; blauka m%fõYh iy fõ.j;a ieliqï
storing data persistently over extended i|yd flá ld,Sk .nvdj u; r|d mj;S'
periods and accommodating larger
storage capacities.
fuu wdphkh ks¾udKh lr we;af;a È.= 2. Long term storage
ld,hla mqrd wLKavj o;a; .nvd lsÍu
iy úYd, .nvd Odß;djka i|yd h'
Long-term data storage is intended for
Ex. Hard disk, DVD, FlashDrive
data that needs to be preserved indefinitely
or over extended periods, often with less
frequent access.
È.= ld,Sk o;a; .nvd fndfyda úg wvq
m%fõYhla iys;" Èk kshuhla fkdue;sj fyda
§¾> ld,hla mqrd ixrlaIKh l< hq;= o;a;
i|yd Ndú;d flfra'

Examples
Hard Drives (HDDs) and Solid State Drives
(SSDs)
Cloud Backup Services
Physical Media (USBs, CD, DVD)

64
ictfromabc.com
Application of IT in Various Domains • Safe Practice for High-Risk Skills
úúO lafIa;%j, f;dr;=re ;dlaIKfha Ndú; wê wjodkï l=i,;d i|yd wdrlaIs;
mqyqKqj
Educational Sector Medical students practice surgeries and
wOHdmk lafIa;%h other critical procedures without risking
patient safety.
An educational approach where computers ffjoH isiqka Y,Hl¾u iy wfkl=;a
and digital technologies are utilized to ;SrKd;aul l%shd mámdá frda.k S f
a .a
wdrlaIdj wjodkulska f;drj isÿ lsÍu'
facilitate teaching and learning processes,
is defined as computer-based education
• Realistic Environmental Conditions
(CBE). h:d¾:jd§ mdßißl ;;a;ajhka
b.ekaùï iy bf.kqï l%shdj,Ska i|yd
For testing and training in fields like
myiqlï ie,iSu i|yd mß.Kl iy äðg,a
;dlaIKhka Ndú;d lrk wOHdmksl m%fõYh, aerospace and physics use simulations
mß.Kl mdol bf.kqu (CBE) f,i w¾: that mimic gravity, atmospheric
oelafõ' pressure, wind speed, and more.
wNHjldYh iy fN!;sl úoHdj jeks
lafIa;% ;=<" mÍlaIK iy mqyK q qj i|yd
CBE makes education more accessible, .=re;ajdl¾IKh" jdhqf.da,Sh mSvkh" iq<x
personalized and adaptable. fõ.h iy ;j;a fndfyda foa wkqlrKh
CBE wOHdmkh jvd;a m%fõY úh yels" lrk wkqyr q elrK Ndú;d lrhs.
mqoa.,dfrdams; iy wkqj¾;kh l< yels lrhs'
• Facilitates experiments with rare or
This involves in control, delivery, and hazardous materials
evaluation of learning as follows. ÿ¾,N fyda wka;rdhlr øjH iuÕ
fuh my; oelafjk mßÈ bf.kqï l%shdj,sh mÍlaIK i|yd myiqlï imhhs
md,kh" fnodyeÍu iy we.hSu yd iïnkaO VR-based labs allow students to
fõ' conduct experiments using substances
that may be costly, difficult to obtain, or
1. Simulations potentially dangerous
wkqyqrelrKh
VR u; mokï jQ úoHd.dr isiqkag ñ,
wêl" ,nd.ekSug wmyiq" fyda
The virtual, interactive environments where wk;=reodhl úh yels øjH Ndú;fhka
students can safely practice skills, conduct mÍlaIK lsÍug bv i,ihs'
experiments, and tackle complex problems
without real-world risks are simulations. • Real time feedback
ienE f,dalfha§ we;s wjodkï fkdue;s" j ;;H ld,Sk m%;sfmdaIK
isiqkag wdrlaIs;j l=i,;d mqyK q q lsÍug" provide immediate responses to student
w;ayod ne,Sï lsÍug iy ixlS¾K .eg¨j,g actions, especially useful in fields like
uqyKq §ug yels w;:H" wka;¾l%h s dldÍ robotics and mechanical engineering.
mßirhka wkqyr q elrK fõ' frdfnda ;dlaIKh iy hdka;%sl bxðfkare
úoHdj jeks lafIa;%j, úfYaIfhka
With the advancements in Virtual Reality m%fhdackj;a jk YsIH l%shd i|yd laI‚l
(VR) and Augmented Reality (AR) making m%;spdr ,nd foa'
simulations even more immersive and
• Cost Effective
effective. msßjeh M,odhS ùu
Virtual Reality (VR) iy Augmented Reality Consumable materials (chemicals, building
(AR) ys ÈhqKqj iuÕska wkqyr q elrK jvd;a supplies) are replaced with virtual
M,odhS njg m;a lrhs' alternatives.
mßfNdack øjH ^ridhksl øjH" f.dvke.s,s
iemhqï& w:;H úl,amhka iuÕ m%;sia:dmkh
fõ.

65
ictfromabc.com
2. Distance Learning and E- Learning Examples for open education resource
ÿria: bf.kSu iy bf,lafg%dksl bf.kSu platforms:
újD; wOHdmk iïm;a fõÈld i|yd
Distance learning and e-learning refer to WodyrK(
modern educational methods that enable
students to attend classes and access o www.schoolnet.lk
learning materials remotely, without the o nenasala.lk
need to travel to a physical learning center. o e-thaksalawa
ÿria: bf.kSu iy úoHq;a bf.kSu hkq o edulanka.lk
fN!;sl bf.kqï uOHia:dkhlg hdfï o vidumanpetha.com
wjYH;djhlska f;drj isiqkag mka;sj,g o www.dpeducation.lk
iyNd.S ùug iy ÿria:j bf.kqï øjH fj;
m%fõY ùug yels kùk wOHdmk l%u fõ' o W3schools
o Khan Academy
• Online classrooms
ud¾..; mka;s ldur

A virtual learning space where students


and teachers connect via the internet
involving live lectures, discussions, and
course materials hosted on a digital
platform is an online classroom. 3. Better Content Delivery
äðg,a fõÈldjla u; i;aldrl;ajh jvd fyd| wka;¾.;h ,nd §u
imhk iÔù foaYk" idlÉPd iy mdGud,d
øjH we;=<;a wka;¾cd,h yryd isiqka iy ICT enhances content delivery in education
.=rejreka iïnkaO jk w;:H bf.kqï by incorporating elements such as
wjldYh ud¾..; mka;s ldurhls'
multimedia, Smart boards, AR, VR to create
immersive and interactive learning
Examples for online classroom
experiences.
platforms: f;dr;=re yd ikakfs õok ;dlaIKh nyqudOH"
ud¾..; mka;s ldur i|yd WodyrK(
iaud¾Ü mqjre" AR" VR jeks wx. we;=<;a
o Google classroom lsÍfuka wOHdmkh ;=< wka;¾.; fnodyeÍu
o Moodle jeä ÈhqKq lrhs
o Microsoft Teams
o Edmodo o Explaining lessons using animations,
o Skillshare video clips, charts, slides and so on.
úäfhda mg" p,k rEm" m%ia;dr jeks l%u
u.ska mdvï ukd f,i meyeÈ,s lsÍu
• Open Education Resources o Interactive Lesson Planning using
újD; wOHdmk iïm;a computers
mß.Kl Ndú;fhka wka;¾l%h s dldÍ mdvï
Freely accessible, openly licensed ie,iqï lsÍu
educational materials that can be used o Collecting educational information
for teaching, learning, and research are using the internet and AI tools
open education resources. wka;¾cd,h iy lD;su nqoaê fuj,ï
b.ekaùu" bf.kSu iy m¾fhaIK i|yd Ndú;fhka wOHdmkh ioyd f;dr;=re
Ndú;d l< yels ksoyfia m%fõY úh yels" ,nd .ekSu
újD;j n,m;%,dNS wOHdmk øjH újD;
wOHdmk iïm;a fõ' o Visual Learning
oDYH bf.kSu
o Smart Classrooms
iqyqre mka;s ldur

66
ictfromabc.com
4. Individualized Learning 5. Learning Management Systems (LMS)
bf.kqï l,uKdlrK moaO;s
Students with individual needs can be
assisted using personalized learning that Learning Management Systems (LMS)
aligns their unique learning styles. provide a central hub for online learning,
;ks mqoa., wjYH;d we;s isiqkag Tjqkf a .a accessible 24/7.
wkkH bf.kqï ú,dihka fm<.iajk bf.kqï l<ukdlrK moaO;s (LMS) ud¾..;
mqoa.,dfrdams; b.ekaùï Ndú;fhka iydh úh bf.kSu i|yd m%fõY úh yels flakø a Sh
yel' a ia:dkhla 24$7 mqrd imhhs.
flakø

Examples for individualized learning These systems offer a variety of features:


resources: fuu moaO;s úúO úfYaIdx. bÈßm;a lrhs":
mqoa.,dfrdams; bf.kqï iïm;a i|yd
WodyrK( o Student/Teacher Information
Management
o Adaptive learning software YsIH$.=re f;dr;=re l<ukdlrKh
wkqj¾;kSh bf.kqï uDÿldx.
(DreamBox, IXL, Smart Sparrow)
o Electronic Libraries
úoHq;a mqia;ld,
o Gamified Learning Platforms
(Quizlet, Classcraft, Duolingo)
o Submission and Grading of
o Progress trackers Assignments
m%.;s ksÍlaIlhska mejreï bÈßm;a lsÍu iy fY%a‚.;
lsÍu
(BrightBytes, EdSight)

o AI tools o Discussion Forums


lD;su nqoaê fuj,ï idlÉPd ixio
(Brainly, Perplexity)
o Online Exams and Assessments
ud¾..; úNd. iy we.hSï

For students in the differently abled


community, specialized resources such as
speech-to-text software, visual aids, and
customized curriculum modifications can
enhances their learning experience.
wdndO iys; isiqka i|yd" speech-to-text
uDÿldx." oDYH wdOdrl iy wNsreÑlrKh
l< úIhud,d fjkia lsÍï jeks úfYaIs;
iïm;a Tjqkfa .a bf.kSfï w;aoelSï jeä ÈhqKq
lrhs'

67
ictfromabc.com
Advantages of ICT in the Education Health sector
Sector fi!LH lafIa;%h
wOHdmk fËa;%fha f;dr;=re yd ikaksfõok
;dlaIKh we;s jdis Diagnostic systems
frda. úksYp
a h moaO;sh
o Access Anytime, Anywhere
´kEu ;ekl isg ´kEu fõ,djl m%fõY
ùfï yelshdj Computerized Axial Tomography (CAT)

o Higher Engagement and Interactivity


by< kshe,Su iy wka;¾ l%shdldÍ;ajh

o Enhanced Collaboration Opportunities


iyfhda.;
S d wjia:d jeäÈhqKq ùu

o Variety of Resources
iïm;a j, úúO;ajh

o Digital Skill Development


äðg,a l=i,;d ixj¾Okh

o Cost-Effective and Environmentally


Friendly
msßjeh-M,odhS;djh iy mßir ys;ldó The machine consists of a rotating X-ray
nj tube and detectors that capture multiple
images as the patient lies on a moving
o Streamlined Administration table.
úêu;a mßmd,kh
fuu hka;%h N%uKh jk X-ray k,hlska iy
frda.h
s d p,kh jk fïihla u; je;sr isák
úg nyqúO PdhdrEm .%yKh lrk wkdjrl
Disadvantages of ICT in the Education j,ska iukaú; fõ'
Sector
wOHdmk fËa;%fha f;dr;=re yd ikaksfõok The collected data is processed by a
;dlaIKh we;s wjdis computer to produce 2D and 3D images of
the scanned area, allowing for precise
o Addiction to technology visualization of internal structures.
;dlaIKhg weíneys ùu
2D iy 3D rEm ksmoùu i|yd tl;= lrk ,o
o;a; mß.Klhla uÕska ielfik w;r
o Expensive setup and maintenance. tuÕska wNHka;r jHqyhka ksjerÈj
ñ, wêl ieliqu iy kv;a;= lsÍu' oDYHlrKhg bv i,ihs'

o Teachers often lack ICT skills.


.=rejrekag fndfyda úg f;dr;=re yd
ikakfs õok ;dlaIK l=i,;d fkdue;s ùu'

68
ictfromabc.com
Positron Emission Tomography (PET) Magnetic Resonance Imaging (MRI)

Positron Emission Tomography (PET) Magnetic Resonance Imaging (MRI)


creates images of the body that help provides detailed images of inside of the
doctors diagnose diseases like cancer, body using powerful magnets and radio
heart conditions, and brain disorders. waves.
Positron Emission Tomography (PET) pqïNl wkqkdo rEm (MRI) n,.;= pqïnl iy
Positron Emission Tomography (PET) u.ska .=jkaúÿ,s ;rx. Ndú;fhka isrefra
ms<sld" yDo frda. iy fud<fha wdndO jeks wNHka;rfha iúia;rd;aul rEm imhhs'
frda. y÷kd .ekSug ffjoHjrekag Wmldr
jk YÍrfha rEm ks¾udKh lrhs' MRI uses a powerful magnetic field to align
hydrogen protons in the body's water
A small amount of radioactive substance, molecules. Radio waves then disrupt this
called a radiotracer, is injected into the alignment, and when turned off, the
patient. As it travels through the body, the protons emit signals as they return to their
radiotracer gathers in areas with high original state.
metabolic activity, like tumors. MRI YÍrfha c, wKqj, yhsv%cka fm%dafgdak
fraäfhda fÜ%i¾ f,i y÷kajk úlsrKYS,S øjH fm<.eiaùu i|yd m%n, pqïNl lafIa;%hla
l=vd m%udKhla frda.h s dg tkak;a lrkq ,efí' Ndú;d lrhs' túg fraäfhda ;rx. fuu
th YÍrh yryd .uka lrk úg" úlsrKYS,Sh fm<.eiaug ndOd lrk w;r" l%shd úrys; l<
ms<sld jeks by< mßjD;a;Sh l%shdldrlï we;s úg" fm%dafgdak tAjdfha uq,a ;;ajhg meñfKk
m%foaYj, /ia fõ' úg ix{d ksl=;a lrhs'

Then the PET scanner detects gamma rays These signals are processed to create
emitted when the radiotracer interacts with detailed cross-sectional images,
body electrons, using this data to create a highlighting different soft tissues with high
3D image of internal functions. contrast.
miqj PET ialEkrh fraäfhda fÜ%i¾ YÍrfha fuu by< m%;súfrdaO;d iys; úúO uDÿ mgl
bf,lafg%dk
a iuÕ wka;¾l%shd lrk úg ksl=;a biau;= lrñka fuu ix{d ilia lr
jk .eud lsrK y÷kdf.k" wNHka;r iúia;rd;aul yrialv rEm ks¾udKh lrhs'
l%shdldrlïj, ;%sudK rEmhla ks¾udKh
lsÍug fuu o;a; Ndú;d lrhs' MRI is useful for diagnosing various
conditions, such as neurological disorders,
joint injuries, and cancers, without using
harmful radiation.
MRI hkq ydkslr úlsrK Ndú;d fkdlr
iakdhq wdndO" ikaê ;=jd, iy ms<sld jeks
úúO ;;ajhka y÷kd .ekSu i|yd
m%fhdackj;a ;dËKhls'

69
ictfromabc.com
Feature PET Scanner CT Scanner MRI Machine
Imaging Principle Detects gamma rays Uses X-rays Uses magnetic fields
rEm uQ,O¾uh from an injected X-lsrK Ndú;d lrhs' and radio waves.
tracer. pqïnl lafI;% iy
tkak;a lrk ,o fraäfhda ;rx. Ndú;d
Üfrai¾ tllska .eud lrhs'
lsrK y÷kd .kS'

Image Quality Good for detecting Excellent for High-resolution images


rEmfha metabolic activity. visualizing bones, soft of soft tissues, organs.
.=Kd;aulNdjh mßjD;a;Sh l%shdldrlï tissues. uDÿ mgl" wjhjj, wê-
y÷kd .ekSug iqÿiqh' wiaÓ" uDÿ mgl úfNaok rEm'
oDYHudk lsÍu i|yd
úYsIaghs'
Functional Functional info on Primarily structural Primarily structural
Imaging tissue metabolism. imaging. imaging.
l%shdldÍ mgl mßjD;a;sh ms<sn| uQ,sl jYfhka uQ,sl jYfhka jHqyd;aul
rEmlrKh l%shdldÍ f;dr;=re' jHqyd;aul rEmlrKh' rEmlrKh'
Scan Time Takes 15-30 minutes Quick scans lasting Longer scans from 15
mßf,dalkh ld,h per scan. seconds to minutes. minutes to over an
tla mßf,dalkhla ;;amr isg ñks;a;= hour.
ioyd úkdä 15-30la olajd mj;sk blauka ñks;a;= 15 isg mehlg
.;fõ' mßf,dalk ,ndfoa' jvd È.= mßf,dalk
,ndfoa'
Cost Generally more Varies, typically less Varies; often more
msßjeh expensive than CT or expensive than PET expensive than CT,
MRI scans. scans. similar to PET.
idudkHfhka CT fyda fjkia fõ" idudkHfhka fjkia fõ¦ fndfyda úg
MRI ialEka j,g jvd PET ialEka j,g jvd CT j,g jvd ñ, wêlhs"
ñ, wêlhs' ñf,ka wvqh' PET yd iudkhs'

Availability In specialized centers. Widely available in Widely available in


úfYaIs; uOHia:dk j, hospitals and imaging hospitals and imaging
olakg ,efí' centers. centers.
frday,aj, iy frday,aj, iy rEmlrK
rEmlrK uOHia:dkj, uOHia:dkj, mq¿,aj
mq¿,aj mj;S' mj;S'

Ultra sound scans

Used to visualize internal body structures,


including organs, tissues, and blood flow,
and are commonly used for monitoring
pregnancies and diagnosing medical
conditions.
wjhj" mgl iy reêr m%jdyh we;=¿
wNHka;r YÍr jHqyhka ksÍlaIKh lsÍug
Ndú;d lrk w;r .eí.ekSï ksÍlaIKh lsÍu
iy ffjoH ;;ajhka y÷kd .ekSu i|yd
nyq,j Ndú;d fõ'

70
ictfromabc.com
Electroencephalography (EEG) Cardiac screening machine

Electroencephalography (EEG) uses sensors


in a cap to capture brain signals, helping
scientists study brain activity and
understand functions like sleep, memory, Used to examine the heart health.
and certain disorders. yDoh fi!LHh mÍlaId lsÍug Ndú;d lrhs'
úoHq;a tkafi*f,da.e% *s (EEG) fud<fhka úoHq;a
ix{d .%yKh lr .ekSug ixfõol iys;
f;dmamshla Ndú;d lr" fud<fha l%shdldß;ajh Patient Monitoring System
ksÍlaIKh lsÍug" ksko a " u;lh jeks frda.S ksÍlaIK moaO;s
l%shdldrlï iy we;eï wdndO f;areï
.ekSug úoHd{hskg a bv i,ihs'
A patient monitoring system includes
devices with real-time monitoring, ensures
The Electrocardiogram (ECG) machine continuous observation and immediate
alerts if conditions change.
frda.S ksÍlaIK moaO;shlg ;;H ld,Sk
wëËKh iys; Wmdx. we;=<;a fõ" wLKav
ksÍËKh iy;sl lsÍu iy fldkafoais fjkia
jqjfyd;a laI‚l weÕùï isÿlrhs'

Blood Glucose Monitors


reêr .aÆfldaia ksÍlaIl

The ECG machine records the heart's


electrical activity, turning it into visual
graphs that accurately interprets heart
rhythms.
ECG hka;%h yDofha úoHq;a l%shdldrlï jd¾;d
lr" yDo ßoau ksjerÈj w¾:l:kh lrk
oDYH m%ia:dr njg m;a lrhs'

Measures glucose levels in the blood to


help monitor and manage diabetes.
Èhjeähdj ksÍlaIKh lsÍu iy
l<ukdlrKh lsÍu i|yd reêrfha .aÆfldaia
uÜgu uekSu'

71
ictfromabc.com
Wearable Health Trackers Home Health Supervision
me<¢h yels fi!LH ksÍlaIK Wmdx. ksjfia isg fi!LH wëlaIKh

A wearable health tracker is a device, like a Devices are used to monitor patients'
smartwatch or fitness band, that monitors health remotely.
health metrics such as heart rate and sleep frda.k
S f
a .a fi!LHh ÿria:j ksÍlaIKh lsÍug
Wmdx. Ndú; flfra'
patterns, syncing with smartphones to
provide real-time insights for better health Improves patient comfort and proactive
management. management of chronic illnesses, enabling
me<¢h yels fi!LH ksÍlaIK Wmdx.hla hkq
easy access to hospital care if needed.
iaud¾Ü Trf,daiqjla fyda fhda.H;d máhla
jeks Wmdx.hla jk w;r th yDo iamkaok frda.h
s df.a iqjmyiqj jeä ÈhqKq lsÍu iy
fõ.h iy ksko a rgd jeks fi!LH m%ñ;sl ksoka.; frda. l%shdYS,Sj l<ukdlrKh
ksÍlaIKh lrhs" jvd fyd| fi!LH lsÍug" wjYH kï frday,a m%;sldr i|yd
l<ukdlrKhla i|yd ;;H ld,Sk myiqfjka m%fõY ùug yelshdj ,nd fohs'
wjfndaOhla ,nd §ug iaud¾Üf*daka iuÕ
iuuqy¾q ; lrhs'
Lab-diagnostic System
Examples for wearable health trackers: ridhkd.dr-frda. úksYp
a h moaO;sh
me<¢h yels fi!LH ksÍlaIK Wmdx.i|yd
WodyrK( A lab-diagnostic system is a computer-
based setup that conducts and analyzes
o Apple Watch medical tests, producing accurate reports
o Fitbit Charge Series quickly.
o Smart rings (Oura ring) ridhkd.dr-frda. úksYp a h moaO;shla hkq
ffjoH mÍlaIK meje;aùu iy úYaf,aIKh
lsÍu" ksjerÈ jd¾;d blaukska ksIamdokh
lsÍu i|yd mß.Kl mokï lr.;a
ieliquls'

This technology improves the speed and


reliability of test results, helping healthcare
providers make better decisions for patient
care.
fuu ;dËKh mÍËK m%;sM,j, fõ.h iy
úYajikSh;ajh jeä ÈhqKq lrhs" fi!LH fiajd
imhkakkag frda.S i;aldr i|yd jvd fyd|
;SrK .ekSug WmldÍ fõ'

Examples of lab-diagnostic systems:


ICU Monitors ridhkd.dr-frda. úksYaph moaO;s i|yd
oeä i;aldr tAllfha ksÍlaIl WodyrK:

Continuous monitors in intensive care units o Sysmex XN-Series


for tracking multiple vital signs like heart o Abbott Alinity
rate, respiratory rate, and blood oxygen o Roche Cobas 8000
levels.
yDo iamkaok fõ.h" Yajik fõ.h iy reêr
Tlaiscka uÜgï jeks nyqúO jeo.;a ix{d
ksÍlaIKh lsÍu i|yd oeä i;aldr tAllj,
wLKav ksÍlaIK WmlrK Ndú;d fõ'

72
ictfromabc.com
Pharmacy Information System Remote surgery
T!Iëh f;dr;=re moaO;sh ÿria: Y,Hl¾u

A Pharmacy Information System (PIS) is a Remote surgery, also known as


computer-based tool used in pharmacies telesurgery, allows a surgeon to perform
to manage medication-related tasks, Such an operation on a patient who is in a
as, different location.
T!Iëh f;dr;=re moaO;s (PIS) hkq T!IO ÿria: Y,Hl¾u" Y,H ffjoHjrfhl=g
wdY%s; ld¾hhka l<ukdlrKh lsÍu i|yd fjk;a ia:dkhl isák frda.f
s hl=g
T!IOy,a ;=< Ndú;d lrk mß.Kl mdol Y,Hl¾uhla lsÍug bv i,ihs'
fuj,uls'

• Verifying drug labels and dosages. Robotic surgeries


T!IO f,an, iy ud;%dj ;yjqre lsÍu' frdfnda ie;alï
• Expiry Date Tracking
l,a bl=;ajk Èk ¨yqne£u With robotic assistance, surgeons can
• Provides information on potential perform complex procedures with smaller
harmful side effects. incisions, leading to faster recovery times
úh yels ydkslr w;=re wdndO ms<sn| and improved outcomes for patients.
f;dr;=re iemhSu' frdfnda wdOdrfhka" Y,H ffjoHjrekag l=vd
lemqï iys; ixlS¾K l%shd mámdá isÿ l<
• Manages inventory of medications. yels w;r" fõ.j;a iqjh ,eîfï ld,hka iy
T!IO f;d. l<ukdlrKh' frda.kS f
a .a m%;sM, jeäÈhqKq fõ'
• Prescription Processing
fnfy;a jÜfgdare ieliSu'
• Maintaining patient profiles
frda.S me;slv mj;ajdf.k hdus
• Provides alerts and recommendations
based on patient-specific data.
frda.h
s df.a ksYÑ
a ; o;a; u; mokïj
weÕùï iy ks¾foaY imhhs'

Surgery
Y,H lafIa;%h

ICT enhances precision, safety, and


efficiency in the modern surgical field.
f;dr;=re yd ikakf s õok ;dlaIKh kùk Swarm Surgery
Y,H lafIa;%fha ksrjoH;djh" wdrlaIdj iy iuQy ie;alï
ld¾hlaIu;dj jeä ÈhqKq lrhs'
Swarm surgery inspired by swarm
Telemedicine intelligence involves tiny robots working
together inside the body to perform
Providing remote medical consultations, precise, complex procedures, controlled by
diagnosis, and treatment through video a surgeon.
calls, apps, or other digital communication iuQy nqoaêfhka wdNdih ,;a iuQy ie;alï
tools is known as telemedicine. hkq Y,H ffjoHjrhl= úiska md,kh lrkq
ùäfhda weu;=ï" fhÿï fyda fjk;a äðg,a ,nk ksrjoH" ixlS¾K l%shd mámdá isÿ lsÍu
ikakf s õok fuj,ï yryd ÿria: ffjoH i|yd l=vd frdfndajre YÍrh ;=< tAldnoaOj
WmfoaYk" frda. úksYp a h iy m%;sldr iemhSu l%shd lsÍuhs'
telemedicine f,iska ye¢kafõ'

73
ictfromabc.com
Surgical Imaging Tools It enables researchers to access vast
ie;alï i|yd Ndú;d lrk leurd WmlrK medical databases, utilize advanced
statistical tools, and communicate findings
Surgeons can get real-time, detailed views quickly.
of a patient's internal structures during tu.ska m¾fhaIlhkag úYd, ffjoH o;a;
operations. iuqodhka fj; m%fõY ùug" Wiia ixLHdk
Y,H ffjoHjrekag Y,Hl¾ufha§ frda.h s df.a fuj,ï Ndú;d lsÍug iy fidhd.ekSï
wNHka;r jHqyhka ms<sn| ;;H ld,Sk blaukska ikakf s õokh lsÍug yelshdj ,efí'
iúia;rd;aul oiqka ,nd .; yel'
Bioinformatics
Virtual Reality (VR) and Augmented ffcj f;dr;=re úoHdj
Reality (AR) in Surgery
Y,Hl¾ufha§ w;:H h:d¾:h (VR) iy jeä
ÈhqKq l< h:d¾:h (AR) Ndú;h

Virtual Reality (VR) is used for surgical


training simulations.
w;:H h:d¾:h (VR) Y,H mqyK q q iudlrK
i|yd Ndú;d fõ'

AR overlays digital images onto the real


world for better visualization during
operations.
fufyhqï w;r;=r jvd fyd| oDYHlrKh
i|yd AR äðg,a rEm ienE f,dalhg by<ska
È.yÍ'
Bioinformatics combines computer science
and biology to analyze biological data,
supporting research in areas like genomics
and molecular biology.
ffcj f;dr;=re úoHdj mß.Kl úoHdj iy
Ôj úoHdj tAldnoaO lr Ôj úoHd;aul o;a;
úYaf,aIKh lrhs" cdk úoHdj iy wKql Ôj
úoHdj jeks lafIa;%j, m¾fhaIK i|yd iydh
fõ'

E-channeling

Medical Research
ffjoH m¾fhaIK

ICT is used in medical research to enhance


data collection, analysis, and collaboration.
o;a; /ia lsÍu" úYaf,aIKh iy iyfhda.; S dj
jeäÈhqKq lsÍu i|yd ffjoH m¾fhaIKj,§
f;dr;=re yd ikakf s õok ;dlaIKh Ndú;d E-channeling is an online system that
fõ' simplifies appointment scheduling with
healthcare providers.
E-channeling hkq fi!LH fiajd imhkakka
iuÕ yuqùï ld,igyklg wkqj isÿ lrk
ir, ud¾..; moaO;shls'

74
ictfromabc.com
Agricultural Sector Precision Farming
lDIsld¾ñl lafIa;%h ksrjoH f.dú;ek

ICT enhances the Plantation industry, • Weather Forecasting


livestock farming and fishing industry. ld,.=K rgd mqfrdal:kh
f;dr;=re yd ikakf s õok ;dlaIK jeú,s
l¾udka;h" mY= iïm;a f.dú;ek iy ëjr Advanced forecasting models use
l¾udka;h jeä ÈhqKq lrhs' satellite imagery, radar data, and
meteorological analysis to predict
1. Plantation Industry weather patterns.
jeú,s l¾udka;h' ld,.=K rgd mqfrdal:kh lsÍu i|yd
Wiia mqfrdal:k wdlD;s pkaøsld PdhdrEm"
Green House Control Systems fravd¾ o;a; iy ld,.=K úoHd
yß;d.dr md,k moaO;s úYaf,aIKh Ndú;d lrhs'

A greenhouse is a structure that allows Farmers can access real-time weather


plants to grow in a controlled environment. data through mobile apps, websites,
yß;d.drhla hkq md,s; mßirhl Ydl and SMS alerts to make informed
j¾Okh ùug bv i,ik jHqyhls'
decisions about planting, irrigation, and
pest control.
Sensors monitor the environmental factors
îc me, isgqùu" jdßud¾. iy m<sfndaO
inside the greenhouse real time and md,kh ms<sn|j oekqj;a ;SrK .ekSug
automated climate control systems adjust f.dùkag cx.u fhÿï" fjí wvú iy
heating, cooling, ventilation, and shading SMS weÕùï yryd ;;H ld,Sk ld,.=K
based on this data. o;a; fj; m%fõY úh yel'
ixfõol u.ska yß;d.dr ;=< we;s mdßißl
idOl ;;H ld,Skj ksÍlaIKh lrk w;r Precipitation: Helps predict rainfall,
iajhxl%Sh foaY.=K md,k moaO;s fuu o;a; snow, or other forms of moisture,
u; mokïj WKqiqu" isis,kh" jd;dY%h iy crucial for understanding upcoming
fijk ilia lrhs'
weather conditions.
j¾Idm;kh( bÈß ld,.=‚l ;;a;ajhka
Moisture sensors are used to automate and
wjfndaO lr .ekSu i|yd ;Srkd;aul
optimize watering schedules using smart idOlhla jk j¾Idm;kh" ysu" fyda
irrigation systems. fjk;a wdldrfha f;;ukhla mqfrdal:kh
iqyqre c, iïmdok moaO;s Ndú;fhka c,h lsÍug WmldÍ fõ'
oeófï ld,igyka iajhxl%Sh lsÍug iy
m%Yia; lsÍug f;;ukh ixfõol Ndú;d Wind Direction: Indicates the
lrhs'
movement of weather systems and
Systems regulate lighting and heating to helps forecast changes in temperature,
promote energy savings and sustainable storms, or precipitation.
iq<x ÈYdj( ld,.=K moaO;sj, p,kh
practices.
fmkakïq lrk w;r WIaK;ajh" l=Kdgq
n,Yla;s b;sßlsÍï iy ;sridr Ndú;hka fyda j¾Idm;kfha fjkialï mqfrdal:kh
m%j¾Okh lsÍu i|yd moaO;s wdf,dallrK lsÍug WmldÍ fõ'
iy WKqiqu kshduk moaO;s Ndú;d lrhs'

Farmers can manage greenhouse • Augmented Reality (AR)


conditions remotely via mobile apps or
web interfaces.
f.dùkag cx.u fhÿï fyda fjí w;=re
uqyK
q ;a yryd ÿria:j yß;d.dr ;;ajhka
l<ukdlrKh l< yelsh'

75
ictfromabc.com
Use of Machinery and Equipment. • Automated weed removers
hka;% iy WmlrK Ndú;h iajhxl%Sh j,a me,Eá bj;a lrkak hka;%

• Telematics

Telematics uses tools like GPS and


sensors to collect real-time data on
field conditions and equipment.
Telematics, lafIa;% ;;a;aj iy WmlrK
ms<sn| ;;H ld,Sk o;a; /ia lsÍug GPS
iy ixfõol jeks fuj,ï Ndú; lrhs'

• Automated Insect Control


iajhxl%Sh lDñ md,kh

Uses Insect monitoring, drones for pest


detection, smart traps and automated
pesticide sprayers.
• Automated Crop Harvesters lDñ ksÍlaIK" m<sfndaO y÷kd.ekSu
iajhxl%Sh fnda. wiajkq fk<k hka;% i|yd fv%dak hdkd" iqyqre W.=,a iy
iajhxl%Sh m<sfndaOkdYl bisk hka;%
Ndú;d lrhs'

• Automated seedling planters


iajhxl%Sh îc me, isgqjkakka

• Sensors for measuring soil


status/moisture
mdxY= ;;a;ajh$f;;ukh uekSu i|yd
ixfõol
• Autonomous Tractors
iajhxl%Sh g%elag¾

76
ictfromabc.com
Crop Monitoring and Management • Crop Management Software
fnda. wëlaIKh iy l<ukdlrKh fnda. l<ukdlrK uDÿldx.

• Remote Sensing and UAVs (drones) ICT platforms provide tools for
ÿria: ixfõo iy UAV ^fv%dak& recording and analyzing data on crop
performance, pest outbreaks, and yield
UAV stands for unmanned aerial forecasts, facilitating informed
vehicle. They can be fully or partially decision-making.
autonomous. f;dr;=re yd ikakfs õok ;dlaIK fõÈld
UAV hkq unmanned aerial vehicle fõ' fnda. ld¾h idOkh" m<sfndaO me;sÍu iy
tAjd iïmQ¾Kfhkau fyda w¾O jYfhka wiajekak wkdjels ms<sn| o;a; má.;
iajhxmd,l úh yelsh' lsÍu iy úYaf,aIKh lsÍu" oekqj;a
;SrK .ekSu i|yd myiqlï imhhs'

• Crop Health Apps


fnda. fi!LH fhÿï

High-resolution imagery from satellites


and drones allows farmers to monitor
crop growth, detect diseases, and
assess nutrient deficiencies.
pkaøsld iy fv%dak hdkd j,ska ,efnk wê-
úfNaok PdhdrEm f.dùkag fnda. j¾Okh
ksÍlaIKh lsÍug" frda. y÷kd .ekSug Mobile applications analyze images of
iy fmdaIl W!k;d ;lafiare lsÍug bv crops to identify diseases, pests, and
i,ihs' nutrient deficiencies, helping farmers
take timely action.
cx.u fhÿï u.ska frda." m<sfndaO iy
• Automated Irrigation Systems fmdaIl W!k;d y÷kd .ekSug fnda.j,
iajhxl%Sh jdß moaO;s rEm úYaf,aIKh lr" f.dùkag ldf,daÑ;
mshjr .ekSug Wmldr lrhs'
Ex: Plantix, Agrio

Smart irrigation systems can be


programmed to water crops at optimal
times and in precise amounts, reducing
water waste and energy consumption.
iqyqre c, iïmdok moaO;s m%Yia;
ld,j,§ iy ksYÑ
a ; m%udKj,ska
fnda.j,g c,h iemhSu i|yd
l%uf,aLk.; l< yels w;r" c, kdia;sh
iy n,Yla;s mßfNdackh wvq lrhs'

77
ictfromabc.com
2. Livestock Farming • Automated Milking
mY= iïm;a f.dú;ek iajhxl%Sh lsß foùu

• Animal Health Monitoring Ex: Lely Astronaut


i;aj fi!LH ksÍlaIl

Smart sensors track animal health,


behavior, and productivity.
iqyqre ixfõol i;aj fi!LHh" yeisÍu
iy M,odhs;dj ksÍlaIKh lrhs'

They help farmers to detect diseases


early, optimize feeding regimes and
improve the quality of products.
fïjd f.dùkag frda. l,a;shd y÷kd
.ekSug" fmdaIK md,k ;ka;%hka m%Yia; • Automated Feeding
lsÍug iy ksIamdokj, .=Kd;aulNdjh iajhxl%Sh wdydr iemhSu
jeä ÈhqKq lsÍug WmldÍ fõ'
Provides accurate portions of feed to
livestock, enhancing nutrition
• RFID (Radio Frequency management, minimizing waste, and
Identification Devices) ensuring timely meals.
.=jkaúÿ,s ixLHd; y÷kd.ekSfï i;=ka i|yd ksjerÈ wdydr m%udK ,nd §u"
WmlrK fmdaIK l<ukdlrKh jeä ÈhqKq lsÍu"
kdia;sh wju lsÍu iy kshñ; fõ,djg
wdydr iemhSu iy;sl lrhs'

RFID tags are attached to animals,


which can be scanned to track the
movements, health, and breeding
information.
• Database for farm management
ge.a i;=ka fj; wuqKd we;s w;r"
p,khka" fi!LHh iy wNsckk f;dr;=re f.dúfmd, md,kh ioyd o;a; iuqod
Ndú;h
ksÍlaIKh lsÍug tAjd scan l< yel'

Also used for identifying and taking the


count of animals.
i;=ka y÷kd .ekSu iy .Kkh lsÍu
i|yd o Ndú;d fõ'

78
ictfromabc.com
3. Fishing Industry Aquaculture Management
ëjr l¾udka;h c,Ôj j.d l<ukdlrKh

ICT systems are used to monitor water


• GPS and navigation quality, feed levels, and fish health in
GPS iy ixp,kh aquaculture farms, optimizing production
and reducing losses.
c,Ôù j.d f.dúm,j, c,fha
.=Kd;aulNdjh" wdydr uÜgï iy u;aiH
fi!LHh ksÍlaIKh lsÍu" ksIamdokh m%Yia;
lsÍu iy mdvq wju lsÍu i|yd f;dr;=re yd
ikakfs õok ;dlaIK moaO;s Ndú;d fõ'

Advantages of usage of ICT in


Global Positioning Systems (GPS) and agriculture
advanced navigation tools help lDIsl¾udka;fha § f;dr;=re yd ikaksfõok
;dlaIKh Ndú;fha jdis
fishermen pinpoint locations, track
weather patterns, and safely return to • Enhanced Productivity
M,odhs;dj jeäÈhqKq ùu
harbor.
f.da,Sh ia:dk.; lsÍfï moaO;s (GPS) iy • Reduced manual labor requirements
Wiia kdúl fuj,ï ëjrhskg a ia:dk w;ahqre Y%u wjYH;d wvq ùu
y÷kd .ekSug" ld,.=K rgd ksÍlaIKh • Enhanced forecasting and risk
lsÍug iy wdrlaIs;j jrdh fj; wdmiq management
hdug WmldÍ fõ' jeäÈhqKq l< mqfrdal:kh iy wjodkï
l<ukdlrKh
• Sonar fish detection
• Increased crop yields
fidakd¾ ud¿ y÷kd.ekSu
fnda. wiajekak jeä ùu
• Remote Monitoring
ÿria: ksÍlaIK
• Access to online marketplaces
ud¾..; fj<|m, fj; m%fõYh
• Timely pest and disease detection
ldf,daÑ; m<sfndaO iy frda. y÷kd.ekSu
Sonar technology helps locate fish • Better supply chain management
schools by bouncing sound waves and jvd fyd| iemhqï odu l<ukdlrKh
interpreting the echoes.
fidakd¾ ;dËKh Yío ;rx. mekSfuka Disadvantages of usage of ICT in
iy fodaxldr w¾:l:kh lsÍfuka u;aiH
agriculture
lKavdhï fidhd .ekSug WmldÍ fõ'
lDIsl¾udka;fha § ICT Ndú;fha wjdis

• Initial Cost and Infrastructure


uQ,sl msßjeh iy há;, myiqlï
• Technical Skill Requirement
;dlaI‚l l=i,;d wjYH;djh
• Dependency on Technology
;dlaIKh u; hemSu
• Environmental Impact
mdßißl n,mEu

79
ictfromabc.com
Changes in agriculture before and after the involvement of ICT
f;dr;=re yd ikaksfõok ;dlaIK Ndú;hg fmr iy miq lDIsl¾ufha fjkialï
Aspect Before (fmr) After (miq)
Information Traditional knowledge Real-time weather forecasts, market prices,
Access and local expertise. and crop management techniques through
f;dr;=re m%fõYh mdrïmßl oekqu iy foaYSh apps and online platforms.
úfYaI{ oekqu fhÿï iy ud¾..; fõÈld yryd ;;H ld,Sk
ld,.=K wkdjels" fj<|m, ñ, iy fnda.
l<ukdlrK Ys,amh S l%u

Data Management Manual record-keeping Farm management software for efficient data
o;a; and paper-based collection, analysis, and storage.
l<ukdlrKh documentation. w;ahqre ld¾hlaIu o;a; tl;= lsÍu" úYaf,aIKh iy
f,i jd¾;d ;nd .ekSu iy .nvd lsÍu i|yd f.dúm, l<ukdlrK
lvodis u; mokï jQ uDÿldx.
,shlshú,s'
Market Access Dependent on local Online trading platforms provide direct
fj<|m, m%fõYh markets and middlemen. access to markets globally.
foaYSh fj,|fmd,j,a iy ud¾..; fj<| fõÈld f.da,Sh jYfhka
w;rueÈhka u; r|d mj;S' fj<|m, fj; iDcq m%fõYh imhhs'

Decision Making Based on intuition and Informed decisions using data analytics,
;SrK .ekSu experience. predictive modeling, and expert systems.
nqoaêh iy w;aoelSï u; o;a; úYaf,aIK" mqfrdal:k wdlD;slrKh iy
mokïj' úfYaI{ moaO;s Ndú;d lrñka oekqj;a ;SrK'

Resource Inefficient use of water, Optimal resource allocation using IoT


Management fertilizers, and pesticides. sensors, reducing waste and environmental
iïm;a c,h" fmdfydr iy impact.
l<ukdlrKh m<sfndaOkdYl wld¾hlaIu IoT ixfõol Ndú;fhka m%Yia; iïm;a fjka
f,i Ndú;d lsÍu' lsÍu" wmøjH iy mdßißl n,mEu wju lsÍu'
Labor Intensity Labor-intensive processes Automation and robotics reducing the need
Y%u ;Sj;
% dj with manual tasks. for manual labor, increasing efficiency.
w;ahqre ld¾hhka iuÕ iajhxl%ShlrKh iy frdfnda ;dlaIKh u.ska
jeä Y%uhla wjYH jk Y%ufha wjYH;djh wvq lsÍu" ld¾hlaIu;dj
l%shdj,Ska' jeä lsÍu'
Crop Monitoring Limited monitoring Remote monitoring using drones, satellites,
fnda. wëlaIKh capabilities, relying on and sensors for early pest detection and crop
visual inspection. health assessment.
iSñ; ksÍlaIK yelshdjka" l,ska m<sfndaO y÷kd .ekSu iy fnda. fi!LH
oDYH mÍlaIdj u; r|d ;lafiarej i|yd fv%dak" pkaøsld iy ixfõol
mj;S' Ndú;fhka ÿria: wëlaIKh'
Training and Limited access to training Online training modules, virtual workshops,
Education mqyqKqj and education resources. and webinars accessible to farmers
iy wOHdmkh mqyqKq iy wOHdmk iïm;a worldwide.
i|yd iSñ; m%fõYh' f,dj mqrd f.dùkag m%fõY úh yels ud¾..;
mqyqKq fudähq," w;:H jevuq¿ iy fjíkd¾'
Scalability Limited scalability due to ICT makes scaling easier with better tools and
mßudKh l< yels manual methods and market access.
ùu ICT u.ska jvd fyd| fuj,ï iy fj<|m,
local knowledge
yia;Sh l%u iy foaYSh m%fõYh ,nd §fuka mßudK yelshdj myiq lrhs'
oekqu fya;=fjka mßudKh
iSñ;h

80
ictfromabc.com
Business and Finance Sector • Inventory Management
jHdmdr iy uq,H lafIa;%h f;d. l<ukdlrKh

Application of ICT in business Assists in maintaining stock levels,


organizations. tracking inventory movement, and
jHdmdr wdh;kj, f;dr;=re yd ikaksfõok ordering supplies automatically.
;dlaIK Ndú;h' jHdmdr fldgia uÜgï mj;ajd .ekSug"
f;d. úp,kh' ksÍlaIKh lsÍug iy
iajhxl%Shj iemhqï weKjqï lsÍug iydh
• Payroll Management fõ'
Computer applications are used to
calculate employee salaries,
deductions, and taxes. Banking and Financial Services
fiajl jegqma" wvq lsÍï iy nÿ .Kkh nexl= iy uq,H fiajd
lsÍu i|yd mß.Kl fhÿï Ndú;d fõ'
• Online Banking
• Budgeting and Financial Forecasting ud¾..; nexl=lrKh
whjeh iy uQ,H mqfrdal:kh
Provides online services such as
Computer software are used for checking account balances, making
budgeting, tracking expenses, and deposits, and managing transactions.
predicting future financial .sKqï fYaIh mÍlaId lsÍu" ;ekam;= lsÍu
iy .kqfokq l<ukdlrKh jeks
performance. ud¾..; fiajd imhhs'
mß.Kl uDÿldx. whjehlrKh" úhoï
¨yqne£u iy wkd.; uQ,H ld¾h idOkh
EFT (Electronic Funds Transfer) allows
mqfrdal:kh lsÍu i|yd Ndú;d lrhs'
customers to make various types of
• Sales analysis electronic payments and transfers
úl=Kqï úYaf,aIKh directly through their online banking
platform.
Computer applications analyzes sales EFT (bf,lafg%dksla wruqo,a udre lsÍu&
data to identify trends, forecast .kqfokqlrejkag Tjqkfa .a ud¾..; nexl=
demand, and enhance decision- fõÈldj yryd úúO wdldrfha
making. bf,lafg%dksl f.ùï iy yqjudre lsÍï
mß.Kl fhÿï m%jK;d y÷kd .ekSug" isÿ lsÍug bv i,ihs'
b,a¨u mqfrdal:kh lsÍug iy ;SrK
.ekSu jeä ÈhqKq lsÍug úl=Kqï o;a;
úYaf,aIKh lrhs'

• Employee Databases
fiajl o;a; iuqodhka

Employee records are managed by


computer applications. • Automated Teller Machines (ATMs)
fiajl jd¾;d mß.Kl fhÿï u.ska iajhxl%Sh fg,¾ hka;
l<ukdlrKh flfra'
Allows customers to perform banking
transactions without human assistance
udkj iydh fkdue;sj nexl= .kqfokq isÿ
lsÍug .kqfokqlrejkag bv i,his

81
ictfromabc.com
• CDM (Cash Deposit Machine) • Cryptocurrencies: Cryptocurrency is a
uqo,a ;ekam;= hka;%h digital form of currency using
blockchain technology. Cryptocurrency
Allows customers to deposit cash payments are processed via digital
directly into their bank accounts wallets, providing alternatives to
without visiting a bank. traditional banking.
.kqfokqlrejkag nexl=jlg fkdmeñK
Tjqkfa .a nexl= .sKqï fj; iDcqju uqo,a Cryptocurrency: Blockchain ;dlaIKh
;ekam;a lsÍug bv i,ihs' Ndú;d lrk äðg,a wdldrfha uqo,a
j¾.hls' Cryptocurrency f.ùï äðg,a
• Kiosk uqo,a miqïì yryd ilikq ,nk w;r"
iïm%odhsl nexl=lrKhg úl,am imhhs'
Provides self-service for a range of
banking functions like passbook
• Financial Management Systems
printing, loan inquiries, account
uq,H l<ukdlrK moaO;s
updates, and bill payments.
mdiafmd;a uqøKh" Kh úuiSï" .sKqï Banks utilize computer systems for
hdj;ald,Sk lsÍï iy ì,am;a f.ùï jeks
nexl= ld¾hhka rdYshla i|yd iajhx managing financial records, interest
fiajd imhhs' charges, and investment portfolios.
nexl= uQ,H jd¾;d" fmd,S .dia;= iy
• Digital payment systems. wdfhdack l<ukdlrKh i|yd mß.Kl
äðg,a f.ùï moaO; moaO;s Ndú; lrhs'

Card Payments: Computers facilitate Marketing and Advertising


wf,úlrKh iy m%pdrKh
credit and debit card transactions,
allowing secure and fast payments. Digital advertising and marketing enhance
ldâm;a f.ùï( mß.Kl fl%äÜ iy
fvìÜ ldâ .kqfokq i|yd myiqlï brand visibility and customer engagement
imhk w;r" wdrlaIs; iy fõ.j;a through digital channels like social media,
f.ùï lsÍug bv i,ihs' websites, and mobile apps using graphics
and animations.
Payment gateways: Acts as an äðg,a m%pdrKh iy wf,úlrKh .%e*slaia
intermediary, enabling secure online iy iÔúlrK Ndú;fhka iudc udOH" fjí
wvú iy cx.u fhÿï jeks äðg,a kd,sld
transactions by verifying and
yryd ikakdu oDYH;dj iy mdßfNda.l s
authorizing payments. kshe,Su jeä ÈhqKq lrhs'

f.ùï fodrgq( w;rueÈfhl= f,i l%shd Personalizing ads, tracking customer


lr" f.ùï i;Hdmkh lsÍfuka iy wjir
§fuka wdrlaIs; ine¢ .kqfokq il%Sh behavior, and measures campaign success
lrhs' in real-time, making it more efficient and
impactful than traditional advertising
Ex: PayPal, Stripe, Square methods.
fj<| oekaùï fm!oa.,SlrKh lsÍu"
mdßfNda.l s yeisÍu ksÍlaIKh lsÍu iy ;;H
ld,Skj jHdmdrfha id¾:l;ajh uksk w;r"
th idïm%odhsl fj<| m%pdrK l%uj,g jvd
ld¾hËuj n,mEï we;s lrhs
Mobile Payments: Mobile devices
connected to banking networks AI bots analyze customer preferences and
support payments through apps with purchasing history to provide tailored
convenience. product recommendations.lD;%su nqoaê bots
cx.u f.ùï( nexl= cd,j,g iïnkaO úiska .e<fmk ksIamdok ks¾foaY iemhSu
cx.u Wmdx. fhÿï yryd myiq f.ùï i|yd mdßfNda.ls ukdmhka iy ñ,§ .ekSfï
i|yd iydh fõ' b;sydih úYaf,aIKh lrhs'

82
ictfromabc.com
E- Commerce and Online Shopping • Personalized Recommendations
bf,lafg%dksl-jd‚cHh iy ud¾..; idmamq
ijdß E-commerce platforms use data
analytics to offer personalized product
• Product Information Access
ksIamdok f;dr;=re m%fõYh suggestions based on past purchases,
browsing history, and preferences,
Customers can access comprehensive enhancing customer satisfaction.
product details, helping customers to B-jd‚cHh fõÈld w;S; ñ,§ .ekSï"
.fõIK b;sydih iy ukdmhka u;
make informed decisions.
mokïj mqoa.,SlrKh l< ksIamdok
mdßfNda.ls hskg
a iúia;rd;aul ksIamdok fhdackd bÈßm;a lsÍug o;a; úYaf,aIK
úia;r fj; m%fõY úh yels w;r" Ndú;d lrhs" mdßfNda.l s ;Dma;sh jeä
oekqj;a ;SrK .ekSug Wmldr lrhs' lrhs'
• Online Shopping • Customer Support and Chatbots
ud¾..; idmamq ijdß

Purchasing goods or services over the AI-powered chatbots on e-commerce


internet is online shopping. sites assist with inquiries, guide
wka;¾cd, idmamq ijdß hkq wka;¾cd,h customers through the purchase
yryd NdKav fyda fiajd ñ,§ .ekSu fõ' process.
B-jd‚cHh fjí wvúj, AI-n,.kajk
Customers can browse products, read peÜfndaÜ mdßfNda.ls úuiSu iy" ñ,§
descriptions, compare prices, and place .ekSfï l%shdj,sh i|yd iydh fõ
orders for home delivery.
mdßfNda.ls hskg
a ksIamdok msßlaiSug" Advantages of Using ICT in the Business
úia;r lshùug" ñ, .Kka ixikaokh and Finance Sector
lsÍug iy ksjigu f.kajd .ekSu i|yd jHdmdr iy uQ,H wxYh ;=< f;dr;=re yd
weKjqï lsÍug yelsh' ikaksfõok ;dlaIK Ndú;fha we;s jdis

It allows for convenient, 24/7 access to • Faster, secure transactions


a wide range of items without the need fõ.j;a" wdrlaIs; .kqfokq
to visit a physical store. • 24/7 online banking access
fN!;sl .nvdjlg hdfï wjYH;djhlska
f;drj mq¿,a mrdihl whs;u i|yd 24/7 ud¾..; nexl= m%fõYh
myiq" m%fõYh i|yd 24 meh mqrdu th • Data analytics for better decisions
bv i,ihs' jvd fyd| ;SrK i|yd o;a; úYaf,aIK

Types of e-Business Transactions • Automated services for efficiency


b-jHdmdr .kqfokq j¾. ld¾hlaIu;dj i|yd iajhxl%Sh fiajd
• Digital tools for customer service
o Business to Business (B2B) mdßfNda.l s fiajd i|yd wxls; fuj,ï
jHdmdrfhka jHdmdrhg
o Business to Consumer (B2C) • Fraud detection and prevention
jHdmdrfhka mdßfNda.l s hdg jxpd y÷kd .ekSu iy je<elaùu
o Business to Employee (B2E) • Cost savings from reduced paperwork
jHdmdrfhka fiajdodhlhdg wvq l< ,shlshú,s j,ska msßjeh b;sß
o Consumer to Business (C2B) lsÍu
mdßfNda.l
s hdf.ka jHdmdrhg
• Mobile banking for convenience
o Consumer to Consumer (C2C)
myiqj i|yd cx.u nexl=lrKh
mdßfNda.l
s hdf.ka mdßfNda.l s hdg
o Government to Customer (G2C) • Streamlined compliance and reporting
rcfhka mdßfNda.l s hdg úêu;a wkql+,;djh iy jd¾;d lsÍu

83
ictfromabc.com
Engineering Sector • 3D Printing
Bxðfkare lafIa;%h 3D uqøKh

• Computer-Aided Design (CAD)


mß.Kl wdOdrl ks¾udKlrKh

CAD is a software tool that allows users


to create and modify 2D and 3D
drawings and models.
CAD hkq mßYS,lhskg a oaùudk iy ;%sudk
we£ï iy wdlD;s ks¾udKh lsÍug iy 3D printing allows for the creation of
fjkia lsÍug bv i,ik uDÿldx. complex parts and prototypes.
fuj,uls'
3D uqøKh uÕska ixlS¾K fldgia iy
uQ,dlD;s ks¾udKh lsÍug bv i,ihs'

• Use of VR and AR
VR iy AR Ndú;h

Used to interact with 3D models in a


simulated environment.
wkqyr
q elrK mßirhla ;=< ;%sudK udÈ,s
iuÕ wka;¾ l%shd lsÍug Ndú;d lrhs'
• Computer Aided Engineering (CAE)
mß.Kl wdOdrl bxðfkarelrKh • Computer-Aided Software
Engineering (CASE) Tools
mß.Kl wdOdrl uDÿldx. bxðfkare
fuj,ï

CAE uses software to help engineers


analyze, simulate, and optimize
CASE tools assist the software
products and manufacturing processes.
engineers throughout the software
CAE, ksIamdok iy ksIamdok l%shdj,Ska
development lifecycle, facilitating
úYaf,aIKh lsÍug" wkqlrKh lsÍug
iy m%Yia; lsÍug bxðfkarejkag iydh designing, coding, testing, and
ùug uDÿldx. Ndú;d lrhs' debugging software applications.
CASE fuj,ï uDÿldx. ixj¾Ok Ôjk
pl%h mqrdu uDÿldx. bxðfkarejkag
iydh jk w;r" uDÿldx. fhÿï ie,iqï
lsÍu" fla;kh lsÍu" mÍlaId lsÍu iy
fodaIyrKh lsÍu i|yd myiqlï imhhs'

84
ictfromabc.com
• Virtual Tours
Tourism w;:H pdßld
ixpdrl lafIa;%h
Allow travelers to explore attractions,
• Information Access hotels, and landscapes from the
f;dr;=re i|yd m%fõYh comfort of their homes.
ixpdrlhskg a Tjqkf
a .a ksfjiaj,
Tourists can access information about iqjmyiqj isg wdl¾IŒh ia:dk" fydag,a
destinations, attractions, and local iy N+ o¾Yk .fõIKh lsÍug bv
i,ihs'
customs through online resources,
travel blogs, and review sites, enabling
• Online Visa applications
better trip planning and decision- ud¾..; ùid whÿï lsÍu
making.
ixpdrlhskg a .ukdka;" wdl¾IK ia:dk Streamlines the visa process, allowing
iy foaYh S isß;a úß;a ms<sn| f;dr;=re
travelers to apply, upload documents,
ud¾..; iïm;a" ixpdrl íf,d.a iy
iudf,dapk wvú yryd m%fõY úh yels and track their application status
w;r" jvd fyd| ixpdr ie,iqï lsÍu iy digitally.
;SrK .ekSfï yelshdj ,nd foa' ixpdrlhskg a ùid whÿï lsÍug" f,aLk
Wvq.; lsÍug iy Tjqkf a .a whÿïm;a
• Online Booking ;;a;ajh äðg,a f,i ksÍlaIKh lsÍug
ud¾..; fjkalrjd .ekSï wjir foñka ùid l%shdj,sh úêu;a lrhs'

Online booking platforms allow Advantages of Application of ICT in


travelers to book flights, hotels, trains Tourism.
and activities anytime, anywhere. ixpdrl jHdmdrfha f;dr;=re yd ikaksfõok
ud¾..; fjkalrjd .ekSfï fõÈld ;dlaIKh Ndú;fha we;s jdis'
ixpdrlhskg a ´kEu fõ,djl" ´kEu
;ekl .=jka .uka" fydag,a" ÿïßh iy • Easy access for information
l%shdldrlï fjkalrjd .ekSug bv f;dr;=re i|yd myiq m%fõYh
i,ihs'
• Direct communication between tourists
• Mobile Apps and service providers
cx.u fhÿï ixpdrlhska iy fiajd imhkakka w;r
iDcq ikakfs õokh
Mobile apps provide useful features
like itinerary management and • Improved Quality of Service
fiajdfõ .=Kd;aulNdjh jeä ùu'
navigation. They also offer real-time
information about local events and • Cost Reduction
services msßjeh wvq ùu'
cx.u fhÿï .uka ud¾. l<ukdlrKh
iy ixpd,kh jeks m%fhdackj;a • Real-Time Updates
úfYaIdx. imhhs' Tjqka foaYh
S isÿùï iy ;;H ld,Sk hdj;ald,Sk lsÍï
fiajd ms<sn| ;;H ld,Sk f;dr;=re o ,nd
fohs

Ex: TripAdvisor, Google Maps, Yelp,


Alipay

85
ictfromabc.com
Media and Journalism Holographic Technology presents
udOH iy ckudOHlrKh lifelike visuals, especially for events,
press releases, creating attractive
• Content Creation and Design reporting experiences.
wka;¾.; ks¾udKh iy ie,iqïlrKh'
Holographic ;dlaIKh u.ska Ôjudk
o¾Yk bÈßm;a lrñka" úfYaIfhka
ICT tools help journalists create visually
isÿùï" udOH ksfõok" wdl¾YkSh
engaging and well-designed articles, jd¾;dlrK w;aoelSï ks¾udKh lrhs'
enhancing content quality.
f;dr;=re yd ikakf s õok ;dlaIK fuj,ï • Real Time News
udOHfõ§kag oDYHuh jYfhka is;a ;:H ld,Sk mqj;a
weo.kakdiq¿ iy fyd¢ka ie,iqï l< ,sms
ks¾udKh lsÍug Wmldr lrhs"
wka;¾.;fha .=Kd;aul Ndjho by< Journalists can report and share news
kxjhs' instantly through live broadcasting,
websites, social media platforms and
o Graphic Design Software messages.
.%e*sla ks¾udK uDÿldx. iÔù úldYkh" fjí wvú" iudc udOH
Ex: Adobe Illustrator, Canva fõÈld iy m‚úv yryd laI‚lj
m%jD;a;s jd¾;d lsÍug iy fnod .ekSug
udOHfõ§kag yelshdj ,efí'
o Video Editing Software
ùäfhda ixialrK uDÿldx. • Social Media
Ex: Adobe Premiere Pro iudc udOH

o Audio Editing Software Social media platforms are crucial for


Y%jH ixialrK uDÿldx. engaging audiences, gathering
Ex: Audacity, GarageBand feedback, and distributing news.
fm%alaIlhska wdl¾IKh lr .ekSu"
o Animation Software m%;sfmdaIK /ia lsÍu iy m%jD;a;s fnod
iÔúlrK uDÿldx. yeÍu i|yd iudc udOH fõÈld b;d
Ex: Adobe Animate, Blender jeo.;a fõ'

o Web Design Tools Ex: Twitter, Facebook, Instagram


fjí ks¾udK fuj,ï
Ex: Adobe XD, Figma • Citizen Journalism
mqrjeis ckudOHlrKh
• SEO Tools
Citizen journalism is the practice where
SEO fuj,ï
ordinary people, rather than
professional journalists, report and
Augmented Reality (AR) and Virtual
share news and events, through social
Reality (VR) allows bringing news
media platforms or personal blogs in
stories with 3D visuals and simulations.
their perspectives.
jeä ÈhqKq l< h:d¾:h iy w;:H
mqrjeis ckudOHlrKh hkq jD;a;Sh
h:d¾:h (VR) uÕska ;%sudK oDYH iy udOHfõ§kag jvd idudkH ñksiqka" iudc
wkqyrq elrK iuÕ m%jD;a;s f.k tAug bv udOH fõÈld fyda mqoa.,sl íf,d.a yryd
i,ihs' m%jD;a;s iy isoaëka Tjqkfa .a
oDIaáfldaKhkag wkqj jd¾;d lsÍu iy
fnod.ekSuhs'

86
ictfromabc.com
Mobile Journalism (MoJo) Advantages of usage of ICT in media and
cx.u mqj;am;a l,dj (MoJo) journalism
udOH iy mqj;am;a l,dfõ f;dr;=re yd
ikaksfõok ;dlaIK Ndú;fha jdis

• Efficiency
ld¾hlaIu;dj
• Global Reach
f.da,Sh m%fõYh
• Increased audience engagement
fm%alaIl iyNd.S;ajh jeä ùu
• Improved collaboration among
journalists
udOHfõ§ka w;r iyfhda.; S dj jeä ÈhqKq
lsÍu
• Data-driven Journalism
Using mobile devices like smartphones and o;a; u; mokï jQ mqj;am;a l,dj
tablets, journalists can quickly capture
multimedia content, conduct interviews, • Real-time Reporting
;;H ld,Sk jd¾;dlrKh
and publish stories in real-time.
iaud¾Ü f*daka iy geí,Ü jeks cx.u Wmdx. • Greater accessibility to information
Ndú;fhka udOHfõ§kag nyqudOH f;dr;=re i|yd jeä m%fõYhla
wka;¾.;hka blaukska .%yKh lr .ekSug"
iïuqL idlÉPd meje;aùug iy ;;H ld,Skj
mqj;a m%ldYkhg m;a lsÍug yelsh' Disadvantages of usage of ICT in media
and journalism
udOH iy mqj;am;a l,dfõ f;dr;=re yd
ikaksfõok ;dlaIK Ndú;fha wjdis
Fact Checking and Verifying
lreKq mÍlaId lsÍu iy i;Hdmkh o Misinformation, Fake News and
clickbait
Fact checking software (Google Fact Check,
jerÈ f;dr;=re" jHdc mqj;a iy clickbait
Snopes) and AI based tools are used for
verifying sources, checking facts, and o Digital Divide
wxls; fnÈu
reducing the spread of misinformation.
uQ,dY% i;Hdmkh lsÍu" lreKq mÍËd lsÍu o Potential for censorship by
iy jerÈ f;dr;=re me;sÍu wju lsÍu i|yd governments or platforms
lreKq mÍËK uDÿldx. (Google Fact rchka fyda fõÈld u.ska jdrKh lsÍfï
Check, Snopes) iy AI mokï jQ fuj,ï yelshdj
Ndú; flfra' o Information Overload
f;dr;=re jeäùu
o Digital content piracy
äðg,a wka;¾.; uxfld,a,lEu
o Loss of Traditional Skills
mdrïmßl l=i,;d ke;sùu
o Ethical Challenges
iodpdrd;aul wNsfhda.
o Job loss
/lshd wysñ ùu

87
ictfromabc.com
Security and Law Enforcement • Home security systems
wdrlaIdj iy kS;sh n,d;aul lsÍu ksjdi wdrlaIK moaO;s

Data Management and Evidence Home security systems offer robust


Collection protection through wireless
o;a; l<ukdlrKh iy idlaIs tl;= lsÍu connections, smart sensors, and video
surveillance, detecting unauthorized
Police departments maintain databases entry and environmental threats.
that include crime reports, evidence ksjdi wdrlaIK moaO;s /yeka rys;
records, and suspect profiles. iïnkaO;d" iaud¾Ü ixfõol iy ùäfhda
fmd,sia fomd¾;fïka;= wmrdO jd¾;d" idlaIs ksÍlaIK yryd Yla;su;a wdrlaIdjla ,nd
jd¾;d iy iellrejkaf.a me;slv we;=<;a fohs" wkjir we;=¿ùï iy mdßißl
o;a; iuqodhka mj;ajdf.k hhs' ;¾ck y÷kd .kS'

With cloud storage and remote access,


Surveillance and Monitoring Tools
homeowners can monitor and manage
ksÍlaIK iy wëlaIK fuj,ï
their security from anywhere.
j,dl=¿ wdphkh iy ÿria: m%fõYh
• Closed-circuit television (CCTV) iuÕsk"a ksjdi ysñhkag ´kEu ;ekl isg
ixjD; mßm: (CCTV) leurd Tjqkfa .a wdrlaIdj ksÍlaIKh lsÍug iy
l<ukdlrKh lsÍug yelsh'

• Military Surveillance Command


Centers
yuqod ksÍlaIK wKfok uOHia:dk

Command centers where computers


monitor military equipment, including
Crucial for monitoring public spaces drones and tanks, uses advanced
and gathering real-time evidence. sensors and surveillance tech to spot
ixjD; mßm: (CCTV) leurd fmdÿ potential threats like terrorist activity or
wjldYhka ksÍlaIKh lsÍu iy ;;H enemy movements.
ld,Sk idlaIs /ia lsÍu i|yd b;d jeo.;a ;%ia;jd§ l%shdldrlï fyda i;=re p,khka
fõ' jeks ;¾ck y÷kd .ekSu i|yd Wiia
ixfõol iy T;a;= ne,Sfï ;dËK
• Body Cameras Ndú;fhka fv%dak hdkd iy hqO gexls
YÍr leurd we;=¿j yuqod WmlrK ms<sn|j mß.Kl
wëlaIKh lrk w;s kùk úOdk
uOHia:dk Ndú;d fõ'

• Tracking and Communication


Technologies
¨yqne£u iy ikaksfõok ;dlaIKh

GPS tracking systems enable law


enforcement to monitor the location of
vehicles and individuals.
¨yqne£fï moaO;s jdyk iy mqoa.,hka
Worn by police officers to record isák ia:dkh ksÍlaIKh lsÍug kS;sh
interactions with the public. n,d;aul lsÍug yelshdj ,nd fohs'
uyckhd iuÕ wka;¾l%h s d jd¾;d lsÍu
i|yd fmd,sia ks,OdÍka úiska me<| isá'

88
ictfromabc.com
• Digital Forensics Entertainment
äðg,a wêlrK ffjoH úoHdj úfkdaodiajdoh

Digital forensics is the process of • Social Media


recovering and investigating data from iudc udOH
digital devices, which helps law
enforcement uncover evidence for Social media platforms play a
cybercrimes and other illegal activities. significant role in shaping
äðg,a wêlrK ffjoH úoHdj hkq äðg,a entertainment trends, connecting fans
Wmdx.j,ska o;a; m%;sidOkh lr with their favorite content creators, and
úu¾Ykh lsÍfï l%shdj,sh jk w;r" facilitating the distribution of
ihsn¾ wmrdO iy fjk;a kS;s úfrdaë
l%shdldrlï i|yd idlaIs wkdjrKh lr entertainment content.
.ekSug kS;sh n,d;aul lsÍug WmldÍ iudc udOH fõÈld úfkdaodiajdo m%jK;d
fõ' yev.eiaùfï§" rislhska Tjqkf a .a m%sh;u
wka;¾.; ks¾udmlhska iuÕ iïnkaO
lsÍug iy úfkdaodiajdo wka;¾.;h
• Biometric Security fnod yeÍug myiqlï ie,iSug ie,lsh
ffcjñ;sl wdrlaIdj hq;= ld¾hNdrhla bgq lrhs'
Ex: Instagram, YouTube, TikTok, Twitter

Biometrics uses unique physical or


behavioral traits, such as fingerprints
and facial recognition, to authenticate
identities, providing enhanced security
• Video playback and Streaming
and convenience.
Platforms
ffcjñ;sl wkkH;d i;Hdmkh lsÍug"
ùäfhda kej; Odjkh iy m%jdy fõÈld
jeäÈhqKq l< wdrËdj iy myiqj
iemhSu i|yd weÕs,s i,l=Kq iy uqyK q
y÷kd.ekSu jeks wkkH fN!;sl fyda Ex: Netflix, Hulu, Amazon Prime Video,
p¾hd;aul ,laIK Ndú;d lrhs' Disney+

• Crime Analysis Software


wmrdO úYaf,aIK uDÿldx.

Crime analysis software assists law


enforcement by analyzing crime data to
identify patterns and trends, helping
agencies develop effective strategies
for community safety.
wmrdO úYaf,aIK uDÿldx. rgd iy
m%jK;d y÷kd .ksñka wmrdO o;a;
úYaf,aIKh lsÍfuka kS;sh n,d;aul
lsÍug iyh jk w;r m%cd wdrlaIdj
i|yd M,odhS Wmdh ud¾. ixj¾Okh
lsÍug ksfhdað; wdh;kj,g Wmldr
lrhs'

89
ictfromabc.com
• Live Performances and Events Immersive Technologies
iÔù ixo¾Yk iy isÿùï Immersive ;dlaIKhka

Facilitates live streaming of events


allowing audiences worldwide to
participate.
f,dj mqrd isák fm%alaIlhskga iyNd.S
ùug bv i,ik isÿùï iÔùj úldYkh
lsÍug myiqlï imhhs'

Virtual ticketing platforms and


interactive features enhance the
remote viewing experience.
w;:H m%fõYm;% fõÈld iy
wka;¾l%shdldÍ úfYaIdx. ÿria: ne,Sfï
w;aoelSu jeä ÈhqKq lrhs'
Extended Reality (ER) includes Virtual
Reality (VR), Augmented Reality (AR), and
• Gaming Industry
l%Svd l¾udka;h Mixed Reality (MR) technologies, offering
immersive, interactive, and augmented
Gaming is evolved from simple arcade experiences by blending digital and real-
graphics to immersive virtual worlds world elements through various devices.
using advanced graphics and AI on úia;SrK h:d¾;h (ER) g ^ w;:H h:d¾:h
consoles, PCs, and mobile devices. (VR), jeä ÈhqKq l< h:d¾:h (AR) iy ñY%
l%Svdj ir, wdflaâ .%e*slaia isg .s,ajk h:d¾: (MR) ;dlaIKhka we;=<;a jk w;r"
w;:H f,dal olajd Wiia .%e*slaia iy úúO Wmdx. yryd äðg,a iy ienE f,dalfha
fldkafida," mß.Kl iy cx.u uQ,øjH uqiq lsÍfuka .s,ajk" wka;¾l%h
s dldÍ
Wmdx.j, AI Ndú;d lrñka mßKduh ù iy jeä ÈhqKq l< w;aoelSï ,nd fohs'
we;'

Cloud gaming services let users play


games via streaming, eliminating the
need for high-end hardware.
Cloud l%Svd fiajd mßYS,lhskga m%jdyh Spatial and object-based audio, enhance
yryd by< uÜgfï oDvdx. i|yd entertainment by creating 3D soundscapes
wjYH;djhlska f;drj l%Svd lsÍug bv
that adapt dynamically to the listener's
i,ihs'
environment.
Ex: Google Stadia, Xbox Cloud Gaming wjldYSh iy jia;= u; mokï jQ Y%jkh"
ijkafokakkaf.a mßirhg .;slj
wkqj¾;kh jk ;%sudK Yío o¾Yk ks¾udKh
lsÍfuka úfkdaodiajdoh jeä ÈhqKq lrhs'

Ex: Dolby Atoms

90
ictfromabc.com
• Simulation Holographic projections and
wkqyqrelrKh volumetric displays, can bring
performers and characters to life in
Ex: Flight simulators, Driving simulators, three-dimensional form.
Theme Park simulators. fydf,da.e% *sla m%lafIamk iy mßudñ;sl
ixo¾Yl" ;%sudK wdldrfhka rx.k
Ys,amSka iy pß; Ôjudk l< yelsh'

Ex: ABBA Voyage, Michael Jackson


hologram performance at Billboard
Music Awards

Advantages of usage of ICT in


entertainment
úfkdaodiajdoh i|yd ICT Ndú;fha jdis

o Accessibility
m%fõY
• AI-Generated Content
AI-W;amdÈ; wka;¾.;h o Interactivity
wka;¾ l%shdldß;ajh
Music compositions, books, films o Personalization
mqoa.,SlrKh
scripts, and virtual worlds can be
generated by AI. o Distribution
ix.S; ixhq;s" fmd;a" Ñ;%mg msgm;a" iy fnod yeÍu
w;:H f,dal AI u.ska ckkh l< yel' o Participation
iyNd.S;ajh
Ex: DALL-E, Amper Music, Lumen5, o Immersion
Midjourney AI, Stability AI .s,aùu
o Globalization
f.da,ShlrKh

Disadvantages of usage of ICT in


entertainment
úfkdaodiajdoh i|yd ICT Ndú;fha wjdis

o Addiction
• Holographic Performances weíneys ùu
fydf,da.%e*sla m%ix. o Privacy
fm!oa.,sl;ajh
Holographic performances, also known o Traditional Decline
as hologram concerts, are shows that iïm%odhsl mßydksh
use holographic technology and o Dependency
artificial intelligence to recreate hemSu
deceased artists. o Quality Control
fydf,da.e% *sla m%ix." fydf,da.E% ï m%ix. ;;a;aj md,kh
f,io ye¢kafõ" ñh .sh l,dlrejka
m%;sk¾s udKh lsÍu i|yd fydf,da.e% *sla o Cyberbullying
;dËKh iy lD;su nqoaêh Ndú;d lrk ihsn¾ ysßyer lsÍu
ixo¾Yk fõ'

91
ictfromabc.com
Aspect Before (fmr) After (miq)
Access m%fõY Limited access to Wide range of entertainment options
entertainment options. available globally.
úfkdaodiajdo úl,am i|yd f.da,Sh jYfhka ,nd .; yels mq¿,a
iSñ; m%fõYh' mrdihl úfkdaodiajdo úl,am'
Distribution Limited distribution channels Digital distribution platforms (e.g.,
fnod yeÍu (e.g., TV, radio, theaters). streaming services, online stores).
iSñ; fnodyeÍfï kd,sld ^Wod( äðg,a fnodyeÍfï fõÈld ^Wod( m%jdy
rEmjdyskh s " .=jkaúÿ,sh" fiajd" ud¾..; fj<|ie,a&'
iskudy,a&'
Interactivity Passive consumption (e.g., Interactive experiences (e.g., gaming,
wka;¾l%shdldÍ;ajh watching TV, listening to social media interaction).
radio). wka;¾l%shdldÍ w;aoelSï ^Wod'" l%Svd"
ksIal%Sh mßfNdackh ^Wod( iudc udOH wka;¾l%h s d&'
rEmjdyskh s keröu" .=jka
úÿ,shg ijka §u&'

Personalization Limited personalization (e.g., Highly personalized


mqoa.,SlrKh scheduled TV programs). recommendations and content
iSñ; mqoa.,SlrKh ^Wod( customization.
ld,igyka.; rEmjdyskS by< fm!oa.,SlrKh l< ks¾foaY iy
jevigyka&' wka;¾.; wNsreÑlrKh'
Content Creation Professional production User-generated content (e.g., vlogs,
wka;¾.; ks¾udKh dominated (e.g., movies, podcasts, social media posts).
music albums). mßYS,l-W;amdÈ; wka;¾.;h ^Wod'"
jD;a;Sh ksIamdokh m%uqL úh ^vlogs" podcast"s & iudc udOH m<
^Wod( Ñ;%mg" ix.S; we,anu&' lsÍï&'

Mobility Stationary entertainment On-the-go entertainment (e.g.,


ixp,kh (e.g., home theaters, smartphones, tablets, portable
cinemas). gaming devices).
ia:djr úfkdaodiajdoh ^Wod( .ufka§ úfkdaodiajdoh ^Wod( iaud¾Ü
fydaï ;shg¾" iskud Yd,d&' f*dak"a geí,Ü" wf;a f.k hd yels l%Svd
Wmdx.&'

Cost Costly entertainment options Wide range of free and paid options,
msßjeh (e.g., movie tickets, physical including subscription services and
media). ad-supported platforms.
ñ, wêl úfkdaodiajdo úl,am odhl;aj fiajd iy oekaùï-iydh
^Wod( Ñ;%mg álÜm;a" fN!;sl olajk fõÈld we;=¿j" fkdñf,a iy
udOH&' f.jk úl,amj, mq¿,a mrdihla'

Global Reach Localized entertainment Globalized entertainment industry


f.da,Sh m%fõY industries with limited global with content accessible worldwide.
exposure. f,dj mqrd m%fõY úh yels
iSñ; f.da,Sh ksrdjrKhla wka;¾.;hka iys; f.da,ShlrKh jQ
iys; foaYhS lrKh jQ úfkdaodiajdo l¾udka;h'
úfkdaodiajdo l¾udka;'

92
ictfromabc.com
Travel and transport • Digital Video Recorder (DVR)
.ukd.ukh iy m%jdykh (Dash cams)

A Digital Video Recorder (DVR) is a


• Using traffic light control systems device that records video in digital
r:jdyk md,kh i|yd úÿ,s i{d ,dïmq
Ndú;h format onto a hard drive, allowing
playback, pausing, and scheduled
recordings.
Digital Video Recorder (DVR) hkq oDV
;eáhla u; äðg,a wdlD;sfhka ùäfhda
má.; lrk Wmdx.hla jk w;r th
kej; Odjkh" úrdu lsÍu iy
ld,igyka.; má.; lsÍï j,g bv
i,ihs'

• CCTV systems to monitor traffic


violations and traffic control;onoh
wju lsÍu iy kS;s úfrdaë l%shdksÍlaYKh
i|yd CCTV moaO;s

• Driver Assist Systems


ßhÿre iydhl moaO;s

Driver assist systems are advanced


technologies in vehicles that help
drivers by using sensors and computers
to enhance safety and performance.
ßhÿre iydhl moaO;s hkq wdrlaIdj iy
ld¾h idOkh jeä ÈhqKq lsÍu i|yd
ixfõol iy mß.Kl Ndú;d lrñka
• Computers for cargo operations ßhÿrkag Wmldr lrk jdykj, Wiia
jrdh j, Ndkav yqjudrejg mß.Kl ;dlaIKhka fõ'

Computers streamline cargo


operations by managing logistics,
tracking shipments, and optimizing
warehouse storage and distribution.
NdKav m%jdyk l<ukdlrKh lsÍu"
keõ.; lsÍï ksÍlaIKh lsÍu iy .nvd
lsÍu iy fnod yeÍu m%Yia; lsÍu u.ska
mß.Kl NdKav fufyhqï úêu;a lrhs'

• Using GPS
GPS Ndú;h

93
ictfromabc.com
Features of Driver Assist Systems • Air Traffic Monitoring System
ßhÿre iydhl moaO;sj, úfYaIdx. .=jka .uka ksÍlaIK moaO;sh

• Collision Avoidance
.eàfuka je<lSu

• Warns of vehicles in the driver’s blind


spots.
ßhÿref.a wkaO ia:dkj, jdyk .ek
wk;=re wÕjhs'

• Assists to stay centered in the lane


ux;Srefõ flakø a .;j isàug iydh fõ

• Parking Assistance
Air Traffic Monitoring System is a
jdyk keje;aùfï iydh
technology used to track and manage
• Traffic Sign Recognition the movement of aircraft in the sky and
r:jdyk ix{d y÷kd.ekSu on the ground.
.=jka .uka ksÍlaIK moaO;s hkq wyfia
• Cross Traffic Alert iy fmd<fjys .=jka hdkd j, p,kh
ud¾. ;onoh ms<sn| wk;=re weÕùu ksÍlaIKh lsÍug iy l<ukdlrKh
lsÍug Ndú;d lrk ;dlaIKhls'
• Autonomous driving
iajhxl%Sh ßh Odjkh ICT tools like radar, satellite navigation,
and communication networks help
controllers track aircraft, coordinate
The ability of a vehicle to navigate and flights, and guide pilots.
operate without human intervention is fravd¾" pkaøsld ixpd,kh" iy
autonomous driving. ikakf s õok cd, jeks f;dr;=re yd
jdykhlg ñksia ueÈy;aùulska f;drj ikakf s õok ;dlaIK fuj,ï md,lhkag
ießieÍug iy l%shd lsÍug we;s yelshdj .=jka hdkd ksÍlaIKh lsÍug" .=jka .uka
iajhxl%Sh ßh meoùuls' iïnkaëlrKh lsÍug iy kshuqjkag uÕ
fmkaùug Wojq lrhs'

These systems analyze large amounts


of real-time data, including flight plans
and weather, to ensure safe distances
between planes.
fuu moaO;s .=jka hdkd w;r wdrlaIs; ÿr
iy;sl lsÍu i|yd mshdieß ie,iqï iy
ld,.=Kh we;=¿ ;;H ld,Sk o;a; úYd,
m%udKhla úYaf,aIKh lrhs'

It uses a combination of sensors,


cameras, radar, and artificial
intelligence to perceive the
environment, make decisions, and
control the vehicle's movement.
th mßirh jgyd .ekSug" ;SrK .ekSug
iy jdykfha p,kh md,kh lsÍug
ixfõol" leurd" fravd¾ iy lD;su
nqoaêfha tl;=jla Ndú;d lrhs'

94
ictfromabc.com
GPS 4. Triangulation/Trilateration
The Global Positioning System (GPS) is a
satellite-based navigation system that
provides location, time, and velocity
information globally.
The Global Positioning System (GPS) hkq
f.da,Sh jYfhka msyà s u" fõ,dj iy m%fõ.
f;dr;=re imhk pkaøsld u; mokï jQ
ixpd,k moaO;shls'

How GPS Works


GPS l%shd lrk wdldrh

1. Satellite Constellation

GPS consists of a constellation of at least 24 The receiver calculates the time delay of
satellites in medium Earth orbit, arranged signals to determine its distance from each
to ensure that a GPS receiver on Earth can satellite.
access signals from at least 4 satellites at .%dylhd ix{d .uka ld,h u; mokïj
any time. pkaøsld j,g tys isg we;s ÿr .Kkh lrhs'
GPS moaO;sh uOHu mDÓú llaIfha wju
jYfhka pkaøsld 24 lska iukaú; jk w;r" 1 Satellite: The receiver can only determine
mDÓúfha we;s GPS .%dylfhl=g ´kEu it is somewhere on a sphere centered on
fõ,djl wju jYfhka pkaøsld 4 lska ix{d that satellite.
fj; m%fõY úh yels nj iy;sl lsÍug .%dylhd we;af;a tu pkaøsldj flakø a lr.;a
ilid we;' f.da,hla u; nj muKla thg ;SrKh l<
yel'
2. Signal Transmission
ix{d iïmafraIKh 2 Satellites: The two spheres from the
satellites intersect in a circle. The receiver
Satellites continuously broadcast signals, lies somewhere on this circle.
including: pkaøsld foflka iEfok f.da, fol rjqulska
my; oE we;=<;aj pkaøsld wLKavj ix{d fþokh fõ' .%dylh fuu rjqfï fld;ekl
úldYkh lrhs fyda msygs d we;'

Precise Time ksYaÑ; fõ,djla 3 Satellites: A third sphere narrows the


Orbital Position wkkH yÿkajkhla location to two possible points. Usually,
Unique ID llaISh msysàu one is unrealistic (Ex. in space), so the
correct position is identified.
;=kja k f.da,hla u.ska .%dylh msyg s d we;s
3. Receiving the Signal is:dkh mej;sh yels ia:dk follg mgq lrhs'
ix{dj ,eîu idudkHfhka" thska tlla m%dfhda.sl fkdfõ
^Wod( wNHjldYfha ia:dkhla&" tneúka
.%dylfha ksjerÈ ia:dkh y÷kd .ekSug yels
A GPS receiver (e.g., in a smartphone or car) fõ'
picks up these signals. To calculate its
position, the receiver must detect signals 4 Satellites: Adds altitude, providing a
from at least 4 satellites. precise 3D location (latitude, longitude,
GPS .%dylhla ^Wod( iaud¾Ü cx.u and altitude).
ÿrl;khl fyda fudag¾ r:hla& fuu ix{d y;rjk pkaøsldjla u.ska ksjerÈ ;%sudK
,nd .kS' .%dylhdg tys msyà s u .Kkh lsÍu ia:dkhla ,nd §u i|yd WÉp;ajh tl;=
i|yd" wju jYfhka pkaøsld 4 lskj a ;a ix{d lrñka msyà s u ;jÿrg;a ksrjoH lrhs'
y÷kd.; hq;=h'

95
ictfromabc.com
Production Sector Smart Manufacturing
ksIamdok lafIa;%h
• Manufacturing Execution Systems
Automation and Robotics (MES)
iajhxl%ShlrKh iy frdfnda ;dlaIKh ksIamdok l%shd;aul lsÍfï moaO;s (MES)
• Computer-Aided Manufacturing
(CAM)
mß.Kl wdOdrl ksIamdokh

CAM software translates computer-


aided design (CAD) models into
instructions that machines can execute
to create parts or products.
CAM uDÿldx.h mß.Kl wdY%s; ks¾udK
(CAD) wdlD;s" fldgia fyda ksIamdok
ks¾udKh lsÍug hka;%j,g l%shd;aul l<
yels Wmfoia njg mßj¾;kh lrhs' Manages and monitors production
activities on the factory floor in real-
• Industrial Robots time.
ld¾ñl frdfndajre ;;H ld,Skj l¾udka;Yd,d ksIamdok
lghq;= l<ukdlrKh iy wëlaIKh
lrhs'

• Industrial Internet of Things (IIoT)


l¾udka; id¾j øjH wka;¾cd,h (IIoT)

Robots improve efficiency, reduces


human error, and allows human
workers to focus on more complex
tasks.
frdfndajre ld¾hlaIu;dj jeä ÈhqKq lr"
udkj fodaI wvq lr" ñksia fiajlhkag
jvd;a ixlS¾K ld¾hhka flfrys
wjOdkh fhduq lsÍug bv i,ihs'

The network of interconnected


machines and devices within
production facilities collect and share
data to further optimize processes.
ksIamdok myiqlï ;=< wka;¾ iïnkaê;
hka;% iy Wmdx. cd,h" o;a; /ia lsÍu
iy fnod.ekSu u.ska l%shdj,Ska ;jÿrg;a
m%Yia; lrhs'

96
ictfromabc.com
Production Planning and Scheduling Quality Control and Assurance
ksIamdok ie,iqï lsÍu iy Wmf,aLk.; ;;a;aj md,kh iy iy;sllrKh
lsÍu
• Machine Vision Systems
hka;% oDIaÀ moaO;
• Enterprise Resource Planning (ERP)
Systems
jHjidh iïm;a ie,iqï (ERP) moaO;s

ERP software provides a real-time view


of the entire production process,
allowing for better planning, resource
allocation, and risk mitigation.
ERP uDÿldx.h uÕska iuia; ksIamdok
l%shdj,sh ms<sn| ;;H ld,Sk o¾Ykhla
imhk w;r" jvd;a fydÈka ie,iqï lsÍu"
iïm;a fjka lsÍu iy wjodkï wju lsÍu Cameras equipped with image
i|yd bv ,nd foa' processing software can be used to
detect defects of products on the
Supply Chain Management assembly.
iemhqï odu l<ukdlrKh tl,ia lsÍfï§ ksIamdokj, fodaI y÷kd
.ekSug rEm ieliqï uDÿldx.j,ska
iukaú; leurd Ndú; l< yel'
• Inventory Management Systems
f;d. l<ukdlrK moaO;s
• Process Control Systems
Real-time tracking of stock levels and l%shdj,s md,k moaO;s
movements.
fldgia uÜgï iy p,khka ;;H ld,Skj Sensors and control systems monitor
ksÍlaIKh lrhs' various parameters during production,
Automated reordering processes to such as temperature, pressure, and flow
avoid shortages. rates.
ysÕ;d uÕyrjd .ekSu i|yd iajhxl%Sh ixfõol iy md,k moaO;s ksIamdokfha§
kej; weKjqï lsÍfï l%shdj,s mj;S' WIaK;ajh" mSvkh iy m%jdy wkqmd;
jeks úúO mrdñ;Ska ksÍlaIKh lrhs'
• Logistics and Transportation
Management Safety
iemhqï iy m%jdyk l<ukdlrKh wdrlaIdj

Route optimization for cost-effective o IoT Sensors for Hazard Detection


shipping Wmøj y÷kd.ekSu i|yd IoT ixfõol
msßjeh-M,odhS keõ.; lsÍu i|yd ud¾. o Wearable Technology for Worker Safety
m%Yia;lrKh isÿlsÍu'
lïlre wdrlaIdj i|yd me<¢h yels
Integration of GPS and RFID for Wmdx. ;dlaIKh
tracking shipments
o Use of robots to perform repetitive or
keõ.; lsÍï ksÍlaIKh lsÍu i|yd GPS
iy RFID tAldnoaO lsÍu dangerous tasks
mqkrdj¾;k fyda wk;=reodhl ld¾hhka
bgq lsÍu i|yd frdfndajreka Ndú;d lsÍu
o Emergency machine shutoff systems
yÈis hka;% jid oeófï moaO;s
o Digital Safety Logs
äðg,a wdrlaIK ,>q-igyka

97
ictfromabc.com
Advantages of usage of ICT in E-government
Production b-rdcH md,kh
ksIamdokfha§ ICT Ndú;fha jdis
ICT plays a pivotal role in the development
o Enhanced Efficiency and Accuracy and implementation of e-government,
ld¾hlaIu;dj iy ksrjoH;djh jeä which aims to improve the efficiency,
ÈhqKq ùu accessibility, transparency, and quality of
o Optimized Resource Management government services.
m%Yia; iïm;a l<ukdlrKh ICT u.ska úoHq;a rdcH ixj¾Okh iy
l%shd;aul lr rdcH fiajdjkays
o Flexibility and Customization ld¾hlaIu;dj" m%fõYH;dj" úksúoNdjh iy
kuHYS,S nj iy wNsreÑlrKh .=Kd;aul nj jeä ÈhqKq lrhs'
o Remote Access and Control https://www.gov.lk/
ÿria: m%fõYh iy md,kh
o Improved Quality Assurance There are essentially four types of
;;a;aj iy;slh jeä ÈhqKq ùu e-governance.
o Scalability uQ,slj b-rdcH md,k j¾. y;rla we;'
mßudKh fjkialsÍfï yelshdj
• Government to Citizens (G2C)
o Rapid Prototyping and Product rchlska mqrjeishkag
Development
fõ.j;a uQ,dlD;slrKh iy ksIamdok This ensures that citizens can access a wide
ixj¾Okh
range of public services efficiently.
fuu.ska mqrjeishkag mq¿,a mrdihl uyck
Disadvantages of usage of ICT in fiajdjka ld¾hlaIuj ,nd .; yels nj
Production iy;sl lrhs'
ksIamdokfha§ ICT Ndú;fha wjdis
List of Sri Lanka government departments
o Complexity and agencies
ixlS¾K;ajh › ,xld rcfha fomd¾;fïka;= iy wdh;k
,ehsia;=j
o Environmental Impact
https://www.gov.lk/government/web-sites
mdßißl n,mEu
o Data Loss and Failures Educational Resources
o;a; ke;sùu iy ÿ¾j,;d wOHdmksl iïm;a
https://www.e-thaksalawa.moe.gov.lk/
o Initial and Ongoing Maintenance
costs Payment of utility bills
uQ,sl iy wLKav kv;a;= úhoï Wmfhda.; s d ì,am;a f.ùu
https://payment.ceb.lk/instantpay
Renewal of Vehicle Licenses
jdyk n,m;% w¨;a lsÍu

Public Health Services


uyck fi!LH fiajd
Government Information Services
rcfha f;dr;=re fiajd
Constitution
wdKavql%u jHjia:dj
Social Welfare Programs
iudc iqnidOk jevigyka

98
ictfromabc.com
• Government to Business (G2C) • Government to Government (G2C)
rchlska jHdmdrj,g rchlska rchlg

It allows businesses to engage with the Facilitates smooth interaction among


government through e-governance different government entities.
tools. úúO rdcH wdh;k w;r iqug wka;¾l%h s d
th jHdmdrj,g b-md,k fuj,ï yryd i|yd myiqlï imhhs'
rch iuÕ iïnkaO ùug bv i,ihs'
Visa Information
Licensing ùid f;dr;=re
n,m;% ,nd §u https://www.immigration.gov.lk/
Procurement Aid for Tourists
m%iïmdokh ixpdrlhska i|yd Wmldr
https://www.promise.lk https://www.srilanka.travel/
Revenue collection
wdodhï tl;= lsÍu Advantages of usage of ICT in
Payment Services governance
f.ùï fiajd rdcH md,kfha§ ICT Ndú;fha we;s jdis
Banking Information
nexl= f;dr;=re • Increased Accessibility
https://www.cbsl.gov.lk/ m%fõYH;dj jeä lsÍu

Business Registration • Improved Service Delivery


jHdmdr ,shdmÈxÑh jeäÈhqKq l< fiajd iemhSu
https://www.drc.gov.lk • Enhanced Citizen Engagement
jeäÈhqKq l< mqrjeis iyNd.S;ajh
Information on Business Organization
jHdmdr ixúOdkh ms<sn| f;dr;=re • Increased Transparency
úksúoNdjh jeä lsÍu
• Government to Employees (G2C) • Cost Savings
rchlska fiajlhkag msßjeh b;sßlsÍï

Here ICT tools aid in making interaction Disadvantages of usage of ICT in


between the government and its governance
employees quick and efficient, thereby rdcH md,kfha§ ICT Ndú;fha wjdis
boosting employee satisfaction levels.
fuys ICT fuj,ï rch iy tys fiajlhska • Digital Divide
w;r wka;¾l%h s d blauka yd ld¾hlaIu wxls; fnÈu
lsÍug WmldÍ jk w;r, tuÕska fiajl
;Dma;su;a uÜgu by< kxjhs' • Security Risks
wdrlaIl wjodkï
Forms • Technological Obsolescence
wdlD;s m;% ;dlaI‚l h,amek hdu
Gazettes • Resistance to Change
.eiÜ fjkia lsÍug m%;sfrdaOh
https://documents.gov.lk/en/gazette.p
• Reliability Issues
hp úYajikSh;ajh ms<sn| .eg¿\
Circulars
pl%f,aL
Information on loan facilities
Kh myiqlï ms<sn| f;dr;=re

99
ictfromabc.com
Benefits of ICT • Increased civic engagement and
f;dr;=re ;dlaIKfhys ys m%;s,dN social good
jeä isú,a kshe,Su iy iudc hym;
Social Benefits
iudc m%;s,dN Social media platforms have become
powerful tools for activism and raising
• Enhanced communication and awareness for social causes.
connection iudc udOH fõÈld l%shdldÍ;ajh iy iudc
jeäÈhqKq l< ikakf
s õokh iy fya;= i|yd oekqj;a lsÍu i|yd m%n, fuj,ï
iïnkaO;djh njg m;aj we;'

Gone are the days of waiting for letters.


,sms Ndú;fhka ikakfs õokh isÿ l, ld,h
fï jk úg wjika ù we;'

ICT has shrunk the world, enabling instant


messaging, seamless video calls, and real-
time communication across vast distances.
laI‚l m‚úv heùu" ndOdjlska f;drj
ùäfhda weu;=ï iy úYd, ÿrla yryd ;;H
ld,Sk ikakf s õokh il%Sh lrñka f;dr;=re
;dlaIKh ;=, me;sÍ we;' Individuals can now organize petitions,
share stories of injustice, and mobilize
• Improved access to information communities to effect positive change.
f;dr;=re i|yd jeä ÈhqKq l< m%fõYh mqoa.,hkag oeka fm;aiï ixúOdkh lsÍug"
whqla;sh ms<sn| l:d fnod .ekSug iy
The internet has become a boundless Okd;aul fjkila we;s lsÍu i|yd m%cdjka
n,uq¨ .ekaùug yelsh'
library, offering a wealth of educational
resources, news updates, and
entertainment content at our fingertips.
wka;¾cd,h wmf.a weÕs,s ;=fvka wOHdmksl Entertainment
iïm;a" m%jD;a;s hdj;ald,Sk iy úfkdaodiajdo úfkdaodiajdoh
wka;¾.;hka rdYshla msßkuk wiSñ;
mqia;ld,hla njg m;aj we;' ICT enhances entertainment by enabling
instant access to diverse media, including
Search engines act as powerful research movies, music, and games, through
tools, empowering individuals to delve streaming and digital platforms.
deeper into any topic imaginable. m%jdy iy wxls; fõÈld yryd Ñ;%mg"
fijqï hka;% m%n, m¾fhaIK fuj,ï f,i ix.S;h iy mß.Kla l%Svd we;=¿ úúO udOH
l%shd lrhs" is;d.; yels ´kEu ud;Dldjla fj; laI‚l m%fõYh il%Sh lsÍu u.ska ICT
.eUqßka fidhd ne,Sug mqoa.,hkag n,h ,nd úfkdaodiajdoh jeä ÈhqKq lrhs'
fohs'
It supports interactive and immersive
experiences, such as virtual reality and
online gaming.
th virtual reality iy jeks online gaming
wka;¾l%shdldÍ iy immersive experiences
i|yd iyh olajhs'

100
ictfromabc.com
Economic Benefits This creates new job opportunities in areas
wd¾Ól jdis like digital marketing, web development,
and logistics, driving economic growth in
• Increased productivity and efficiency the digital sector.
M,odhs;dj iy ld¾hlaIu;dj jeä lsÍu fuh äðg,a wf,úlrKh" fjí ixj¾Okh
iy iemhqï jeks lafIa;%j, kj /lshd wjia:d
ICT empower businesses to automate tasks, ks¾udKh lrhs" äðg,a wxYfha wd¾Ól
improve communication within teams, and j¾Okhg fya;= fõ'
streamline workflows.
ld¾hhka iajhxl%Sh lsÍug" lKavdhï ;=< • Improved global collaboration
ikakfs õokh jeä ÈhqKq lsÍug iy ld¾h jeäÈhqKq l< f.da,Sh iyfhda.S;dj
m%jdyhka úêu;a lsÍug f;dr;=re ;dlaIKh
jHdmdr iún, .kajhs' Video conferencing, instant messaging,
and cloud-based collaboration tools
Project management tools, cloud storage facilitate seamless collaboration between
solutions, and data analytics software all businesses and individuals across borders.
contribute to increased productivity, faster ùäfhda iïuka;%K" laI‚l m‚úv heùu iy
turnaround times, and cost reduction. j,dl=¿ u; mokï jQ iyfhda.; S d fuj,ï
jHdmD;s l<ukdlrK fuj,ï" j,dl=¿ foaYiSud yryd jHdmdr iy mqoa.,hka w;r
wdphk úi÷ï iy o;a; úYaf,aIK uDÿldx. ndOdjlska f;drj iyfhda.; S djhg myiqlï
ish,a, M,odhs;dj jeä lsÍug" fõ.j;a imhhs'
yerjqï ld,hlg iy msßjeh wvq lsÍug
odhl fõ' This opens new markets for international
trade, fosters innovation through
knowledge sharing, and strengthens global
supply chains.
fuh cd;Hka;r fj<|du i|yd kj
fj,|fmd,j,a újD; lrhs" oekqu fnod.ekSu
yryd kfjda;amdokhka fmdaIKh lrhs" iy
f.da,Sh iemhqï odu Yla;su;a lrhs'

• Innovation and entrepreneurial


opportunities
kfjda;amdok iy jHjidhl;aj wjia:d
• Growth of e-commerce and the
digital economy Online marketplaces and crowdfunding
B-jd‚cHh iy äðg,a wd¾Ólfha j¾Okh platforms empower entrepreneurs to
launch innovative ventures, secure funding,
The internet has fostered the explosion of and scale their businesses rapidly.
e-commerce, allowing businesses of all ud¾..; fj,|fmd,j,a iy iuQy wruqo,a
fõÈld kjH jHdmdr Èh;a lsÍug" wruqo,a
sizes to reach a global audience and sell
iqrlaI;
s lsÍug iy Tjqkf a .a jHdmdr
their products online. fõ.fhka mßudKh lsÍug jHjidhlhskg a
wka;¾cd,h B-jd‚cHfha msmsreu fmdaIKh n, .kajhs'
lr we;s w;r" ish¨ m%udKfha jHdmdrj,g
f.da,Sh fm%alaIlhska fj; <Õd ùug iy
Tjqkfa .a ksIamdok wka;¾cd,h yryd
úlsŒug bv i,ihs'

101
ictfromabc.com
• Enhancements of Gross Domestic Issues caused by ICT
Product (GDP) f;dr;=re ;dlaIKh ksid we;s jk .eg¿
o< foaYh
S ksIamdÈ;fha ^^GDP&& jeäÈhqKq
ùu 1.Social issues
iudc .eg¿
ICT tools streamline processes, reduce
manual labor, and enhance efficiency, A) Digital divide
wxls; fnÿu
directly increasing output and contributing
to GDP growth.
The digital divide is the gap between
ICT fuj,ï u.ska iDcqju ksuejqï jeä
lrñka iy o< foaYh S ksIamdÈ;fha j¾Okhg people who have access to technology and
odhl fjñka l%shdj,s úêu;a lrhs" ñksia Y%uh the internet and those who do not.
wvq lrhs" iy ld¾hlaIu;dj by< kxjkq wxls; fn§u hkq f;dr;=re ;dlaIKhg iy
,nhs' wka;¾cd,hg m%fõYh we;s mqoa.,hska iy
tfia fkdue;s wh w;r we;s mr;rh fõ'
ICT supports the rise of digital platforms, e-
Causes of digital divide
commerce, and data-driven industries, wxls; fn§u we;sùug n,mdk fya;=
significantly boosting GDP.
o< foaYh S ksIamdÈ;h ie,lsh hq;= f,i by, Lower income levels limit access to
kxjñka wxls; fõÈld" B-jd‚cHh iy o;a;
technology and internet services.
u; mokï jQ l¾udka;j, ÈhqKqj i|yd ICT wvq wdodhï uÜgï ;dËKh iy wka;¾cd,
iydh olajhs' fiajd fj; m%fõYh iSud lsÍu'

• Expansion of the Economy Rural areas often lack the infrastructure for
wd¾Ólh mq¿,a lsÍu
high-speed internet.
.%dóh m%foaYj, fndfyda úg wêfõ.S
ICT facilitates international trade by wka;¾cd,h i|yd há;, myiqlï fkdue;s
improving communication, logistics, and ùu'
digital transactions, expanding market
reach. Differences in ICT education lead to varying
ikakfs õokh" iemhqï iy wxls; .kqfokq levels of digital literacy.
jeäÈhqKq lsÍu" fj<|m, m%fõYh mq¿,a lsÍu ICT wOHdmkfha fjkialï úúO uÜgï äðg,a
u.ska ICT cd;Hka;r fj<|dug myiqlï idlaIr;djhg fya;= ùu'
imhhs'
Older individuals may have less experience
Countries with advanced ICT infrastructure and skills with technology.
attract foreign direct investment (FDI), jeäysá mqoa.,hskg a ;dlaIKh ms<sn| wvq
fueling further economic expansion w;aoelSï iy l=i,;d ;sìu'
ÈhqKq f;dr;=re yd ikakf s õok ;dlaIK
há;, myiqlï iys; rgj,a ;jÿrg;a Attitudes toward technology can influence
wêfõ.S wd¾Ól m%idrKh i|y úfoaY iDcq
usage and acceptance in certain
wdfhdack ^FDI& wdl¾IKh lr .kS'
communities.
ixialD;sl iïu;hka( ;dËKh flfrys
olajk wdl,am we;eï m%cdjkays Ndú;hg iy
ms<s.ekSug n,mEï l< yels ùu'

'

102
ictfromabc.com
Digital Bridge • Equal opportunities for all
wxls; fia;=j ieug iudk wjia:d ,nd§u

The process of bridging the digital divide is Making internet services available for
simply known as digital bridge. all by programs such as free public wifi
wxls; fnÿu ke;s lsÍfï l%shdj,sh wxls; and so on.
fia;=j f,i ir,j yÿkajkq ,efí' fmdÿ jhs*hs l,dm jeks jHdmaD;s u.ska
wka;¾cd, myiqlu ieug ,nd§u'

Actions that can be taken for digital Developing necessary infrastructure in


bridge rural areas creating opportunities for
wxls; fia;=j ioyd .; yels l%shd ud¾.
them to access the internet.
.ïno m%foaYj, wjYH há;, myiqlï
• Through digital literacy ÈhqKq lsÍu'
äðg,a idlaIr;dj u.ska

Forming organizations and institutions


• Expanding Educational Resources in
to spread ICT knowledge among the
Schools
illiterate. mdi,aj, wOHdmksl iïm;a mq¿,a lsÍu
W.;a nj wvq msßi w;r oekqu fnod §fï
wruqfKka wdh;k msygs qùu'
Provide access to free online libraries or
Ex. Vidatha centre, Nenasala,
educational portals that students can
DP education IT campus
access from home or school.
isiqkag ksjfia isg fyda mdif,a isg m%fõY
úh yels fkdñf,a ud¾..; mqia;ld, fyda
wOHdmksl oajdr fj; m%fõYh ,nd §u'

Develop a standardized digital literacy


curriculum in schools, covering basics
such as internet safety, productivity
software, and communication tools.
wka;¾cd, wdrlaIdj" M,odhs;d uDÿldx.
iy ikakf s õok fuj,ï jeks uQ,sl lreKq
wdjrKh jk mßÈ mdi,aj, m%ñ;s.;
• Implementing device loan programs äðg,a idlaIr;d úIh ud,djla
and reducing the cost of digital ixj¾Okh lsÍu'
devices
Wmdx. Kh jevigyka l%shd;aul lsÍu
iy äðg,a Wmdx.j, msßjeh wvq lsÍu

Implement government-supported
subsidies to make tablets, computers,
and smartphones more affordable for
underserved populations.
wvq myiqlï iys; ck.ykh i|yd
geí,Ü" mß.Kl iy iaud¾Üf*daka jvd;a
oeßh yels ñ,lg ,nd §u i|yd rcfha
wkq.y
% h ,nk iykdOdr l%shd;aul lsÍu'

103
ictfromabc.com
B) Cyberbullying Effects of addiction
ihsn¾ ysßyer lsÍu weíneysùu ksid isÿ jk n,mEï

Increased feelings of anxiety, depression


and loneliness.
ldxidj" udkisl wjmSvkh iy ;kslu jeks
yeÕSï jeä ùu'

Exposure to screens can cause digital eye


strain, vision loss and headaches.
Cyberbullying refers to the use of digital ;sr j,g ksrdjrKh ùu äðg,a wlaIs wd;;sh"
platforms and devices to harass, intimidate, fmkSu wvqùu iy ysirohg n,mEu'
or humiliate someone.
ihsn¾ ysßyer lsÍu hkq flfkl=g ysßyer Increasing time online leads to fewer face-
lsÍug" ìh .ekaùug fyda wjuka lsÍug to-face interactions, weakening real-world
äðg,a fõÈld iy Wmdx. Ndú;hhs' relationships and increasing loneliness.
ine¢ ld,h jeä ùu uqyK q g uqyK q
Cyberbullying can occur on social media wka;¾l%shd wvq lsÍug" ienE f,dalfha in|;d
(Ex. Facebook, Instagram), messaging apps, ÿ¾j, lsÍug iy ;kslu we;s lsÍug fya;=
ùu'
online forums, emails, and even online
gaming platforms.
ihsn¾ ysßyer lsÍu iudc udOHj, ^Wod( Excessive use of technology in children and
Facebook, Instagram& m‚úv heùfï fhÿï" youth can hinder the development of
ine¢ ixio" Bfï,a iy ine¢ l%Svd fõÈldj, essential social skills.
mjd isÿúh yel' <uqka iy fh!jkhka ;=< ;dËKh wêl f,i
Ndú;d lsÍu w;HjYH iudc l=i,;d
j¾Okhg ndOdjla úh yels ùu'
C) Addiction to technology
;dlaIKhg weíneys ùu Addiction prevention and management
weíneysùu je<elaùu iy l<ukdlrK
Addiction to Technology refers to an
excessive, compulsive use of digital Using app timers and device settings to
devices, such as smartphones, computers, limit usage.
gaming consoles, and the internet, often to Ndú;h iSud lsÍug fhÿï ghsu¾ iy Wmdx.
the detriment of one's physical, mental, and ieliSï Ndú;d lsÍu'
social well-being.
;dËKhg weíneys ùu hkq fndfyda úg Taking well-deserved breaks from
flfkl=f.a ldhsl" udkisl iy iudÔh technology to reconnect with the real
hymeje;aug ydkshla jk mßÈ iaud¾Ü f*dak"a world.
mß.Kl" l%Svd fldkafida, iy wka;¾cd,h ienE f,dalh iuÕ kej; iïnkaO ùug
jeks äðg,a Wmdx. wêl f,i" ;dlaIKfhka kshñ; úfõl ,nd .ekSu'
n,y;aldrfhka Ndú;d lsÍuhs'
Pursue hobbies, exercise, or face-to-face
interactions to reduce reliance on
technology.
;dlaIKh u; hemSu wvq lsÍu i|yd
úfkdaodxY" jHdhdu fyda uqyK q g uqyK q
wka;¾l%shd isÿ lsÍu'

104
ictfromabc.com
D) Spread of misinformation and fake News Websites and Blogs: Some websites
news mimic sources, sharing misleading articles
jerÈ f;dr;=re iy wi;H mqj;a me;srùu or headlines to draw attention.
mqj;a fjí wvú iy íf,d.a( iuyr fjí wvú
Misinformation: Incorrect or misleading uQ,dY% wkqlrKh lrhs" wjOdkh fhduq lsÍu
information shared without harmful intent, i|yd fkduÕ hjk iq¿ ,sms fyda isria;,
such as unverified health advice or fnod .kS'
outdated news.
jerÈ f;dr;=re( i;Hdmkh fkdl< fi!LH Prevention and Management
Wmfoia fyda h,a mek .sh mqj;a jeks ydkslr je<elaùu iy l<ukdlrKh
fÉ;kdjlska f;drj fnod .kakd ,o jerÈ
fyda fkduÕ hjk f;dr;=re fõ' Websites like Snopes, FactCheck.org, and
PolitiFact verify and debunk popular myths
Fake News: Deliberately falsified
or false claims.
information crafted to deceive, often to
Snopes, FactCheck.org iy PolitiFact jeks
promote an agenda, generate outrage, or fjí wvú ckm%sh ñ:Hdjka fyda jHdc ysñlï
gain financial or political benefit. i;Hdmkh lr bj;a lrkq ,nhs'
jHdc mqj;a( fndfyda úg kHdh m;%hla
m%j¾Okh lsÍu" fldamh ckkh lsÍu fyda
uQ,H fyda foaYmd,k m%;s,dN ,nd .ekSu i|yd Teaching users to critically assess online
/jàug ie,iqï lrk ,o f;dr;=re jHdc information and identify credible sources
f;dr;=re fõ' helps reduce susceptibility.
ine¢ f;dr;=re úfõpkd;aulj ;lafiare
Common Platforms for Spread lsÍug iy úYajikSh uQ,dY% y÷kd .ekSug
me;sÍu i|yd fmdÿ fõÈld mßYS,lhskga b.ekaùu' th ixfõ§;dj wvq
lsÍug WmldÍ fõ'
Social Media: Platforms like Facebook,
Twitter, and Instagram allow rapid
dissemination due to easy sharing, which
enables misinformation to go viral.
iudc udOH( f*aianqla" Üúg¾ iy bkaiag.%Eï
jeks fõÈld myiqfjka fnod.ekSu fya;=fjka
fõ.fhka fnod yeÍug bv i,ihs" tuÕska
jerÈ f;dr;=re ffjria ùug yels fõ'

Messaging Apps: Private messaging


platforms (WhatsApp, Telegram) allow
closed groups to share unverified claims
without external scrutiny.
m‚úv heùfï fhÿï( mqoa.,sl m‚úvlrK
fõÈld ^WhatsApp, Telegram& ndysr
mÍlaIdjlska f;drj i;Hdmkh fkdl<
ysñlï fnod .ekSug ixjD; lKavdhïj,g
bv §u'

105
ictfromabc.com
2. Health Issues Taking frequent breaks, using ergonomic
fi!LH .eg¨ equipment, and practicing hand stretches
can help reduce RSI risk.
The use of Information and ks;r úfõl .ekSu" ergonomic WmlrK
Communication Technology (ICT) can lead q q lsÍu RSI
Ndú;d lsÍu iy w;a È.= lsÍu mqyK
to a range of health issues due to wjodku wvq lsÍug WmldÍ fõ'
prolonged screen time, repetitive
movements, and other physical and mental
C) CTS – Carpel Tunnel Syndrome
demands.
ldmd, fodakd iy,laIKh
f;dr;=re yd ikakf s õok ;dlaIKh (ICT)
Ndú;h È.= ;sr ld,h" mqkrdj¾;k p,khka
Carpel tunnel syndrome is the feeling of a
iy fjk;a YdÍßl yd udkisl b,a,Sï
fya;=fjka fi!LH .eg¨ rdYshlg fya;= úh numbness and pain in the fingers.
yel' ldmd, fodakd iy,laIKh hkq weÕs,sj,
ysßjeàula iy fõokdjla oekSuhs'
A) Musculoskeletal Problems
udxYfmaYs iy wiaÓ wdY%s; .eg¿ The pain arises due to the pressure exerted
on the wrist. Incorrect use of the key board
Non-stop use of a computer can bring and the mouse or placing them in the
about pain in different muscles and bones incorrect positions are reasons for the
of the human system. The main reason for syndrome.
this is the wrong posture taken with the use ue‚la lgqj u; we;s jk f;rmSu fya;=fjka
fõokdj mek k.S' h;=re mqjrej iy uQislh
of the computer jerÈ f,i Ndú;d lsÍu fyda tAjd jerÈ
mß.Klhla fkdkj;ajd Ndú;d lsÍu ñksia ia:dkj, ;eîu fï i|yd fya;= fõ'
moaO;sfha úúO udxY fmaYj s , iy wiaÓj,
fõokdj we;s l< yelsh' fuhg m%Odk fya;=j
Ergonomic wrist supports, minimizing wrist
mß.Klh Ndú;fha§ jerÈ bßhõ j,ska
isàuhs' strain, taking breaks, and in severe cases,
medical treatments like wrist splints or
surgery can help reduce CTS risk.
B) RSI – Repetitive Stress Injury Ergonomic ue‚la lgqj wdOdrl" ue‚la
mqkrdj¾;S wd;;s mSvdj lgqfjys wd;;sh wju lsÍu" úfõl .ekSu"
iy oreKq wjia:dj, § ue‚la lgqj iama,skÜ a
Repetitive stress injury is the pain lsÍu fyda Y,Hl¾u jeks ffjoH m%;sldr CTS
extending from the shoulder to the fingers wjodku wvq lsÍug WmldÍ fõ'
of the body.
mqkrdj¾;S wd;;s mSvdj hkq Wrysfia isg
YÍrfha weÕs,s olajd úysfok fõokdjhs'

The affected areas can show swelling and


hardness that brings out the pain. The
difficulty to move the mouse is a result of
this pain. The cause of the pain is incorrect
posture
tu ia:dkdj, bÈuqu";o .;sh" fõokdj we;s
fõ' uQislh p,kh lsÍug wmyiq ùu fuu
fõokdfõ m%;sM,hls' ksjerÈ bßhõ
wkq.ukh fkdlsÍu fuhg fya;=jhs'

106
ictfromabc.com
D) CVS - Computer Vision Syndrome Reducing screen time, adjusting lighting,
mß.Kl oDIaÀ iy,laIKh hydrating, and practicing relaxation
techniques can alleviate headaches related
Staying glued to the computer for 6 to 7 to ICT use.
hours continuously can cause eye irritation, ;srfha ld,h wvq lsÍu" wdf,dalh ilia lsÍu"
which is known as computer vision ic,kh lsÍu iy ,sy, s a lsÍfï l%u mqyK
q q
syndrome. lsÍu f;dr;=re yd ikakf s õok ;dlaIK
meh 6 la 7 la muK wLKavj mß.Klfha we,S Ndú;hg wod< ysiroh iukh l< yelsh'
isàfuka weiaj, wdid;añl;d we;s úh yels
w;r th mß.Kl oDIaÀ iy,laIKh f,i
y÷kd .efka' Correct posture while using computer
mß.Kl Ndú;fha ksjerÈ bßhõj
Signs of discomfort include dry eyes, eye
redness, tearing, blurred vision, or head,
neck, or back pain.
weia úh<su" weiaj, r;= meyeh" lÿ¿ .e,Su"
fkdmeyeÈ,s fmkSu" fyda ysi" fn,a, fyda
msgqmi fõokdj wmyiq;djfha ,laIK fõ'

The 20-20-20 rule (look 20 feet away every


20 minutes for 20 seconds), proper screen
brightness, and regular eye check-ups can
help reduce CVS risk.
20-20-20 Í;sh ^;;amr 20la iEu úkdä
20lg jrla wä 20la ÿr ne,Su&" ;srfha ksis
§ma;sh iy ks;sm;d wlaIs mÍlaId lsÍï CVS Keeping the computer on a suitable table
wjodku wvq lsÍug WmldÍ fõ' at eye level or a little lower.
weia uÜgfï fyda u|la my<ska iqÿiq fïihla
u; mß.Klh ;nd .ekSu'
E) Headache
ysiroh Keeping the distance between the
computer screen and the eye.
Headaches are common among ICT users mß.Kl ;srh iy wei w;r ÿr mj;ajd
.ekSu'
due to screen glare, eye strain, and poor
posture. Keeping the user’s back straight against the
;srfha §ma;sh" weiaj, fjfyi iy ÿ¾j,
back of the chair and keeping shoulders
bßhõ fya;=fjka ICT Ndú;d lrkakka w;r
relaxed.
ysiroh nyq,j olakg ,efí'
mqgq wekaog fya;a;= jk fia msg fldkao fl<ska
;nd Wrysi ieye,a¨fjka ;nd .ekSu'
Staring at screens for long periods, poor
lighting, dehydration, stress, and bad
Keeping legs vertical to the ground with the
posture can all trigger headaches.
È.= fõ,djla ;srh foi n,d isàu" ÿ¾j, soles flat on the surface.
wdf,dalh" úc,kh" wd;;sh iy krl bßhõ ll=,a fmd<jg ,ïnlj o m;=,a fmd<j u;o
ish,a, ysiroh wjq¨jd, yelsh' ieye,a¨fjka ;nd .ekSu'

107
ictfromabc.com
3. Economical issues Some of the lost jobs are as follows.
wd¾Òl .eg¿ tA wdldrhg wysó jQ /lshd lsym s hla my;
mßÈ fõ'
A) De-Skilling
yiqre l=i,;d wfydais ùu • Driver - The popularity of autonomous
vehicles like Tesla, Zeekr.
ßhÿre - Tesla, Zeekr jeks iajhxl%Shj
Odjkh l< yels jdyk j¾. ckm%sh ùu'

• Bank Teller - Introduction of ATMs and


online banking.
nexl= fg,¾ - iajhxl%Sh fg,¾ hka;% iy
wka;¾cd, nexl=lrKh y÷kajd§u'

• Travel Agent - Rise of online travel


booking platforms.
ixpdrl ksfhdað; - ud¾..; ixpdrl
fjkalrjd .ekSfï fõÈld ckm%sh ùu'

• Data Entry Clerk - Implementation of


De-skilling is when a job can no longer be automated data capture and
performed by humans due to replacement processing software.
by technology. o;a; we;=<;a lsÍfï ,smslre - iajhxl%Shj
yiqre l=i,;d wfydais ùu hkq ñksfila úiska o;a; .%yKh lr ieliSfï uDÿldx.
isÿlrñka mej;s /lshdjla ;dlaIKh u.ska l%shd;aul lsÍu'
m%;sia:dmkh ùu fya;=fjka ;jÿrg;a lrf.k
hdug fkdyels ùuhs'
Re-skilling
The only alternative to problems caused by
the de-skilling is to develop a new skill.
fuu yiqre l=i,;d wfydais ùu ksid we;sjk Re-skilling is the only solution to de-
.eg¨j,g .; yels tlu úl,amh jkafka kj skilling, which is building new skills to
l=i,;djhla j¾Okh lr.ekSu mu‚' replace outdated ones caused by
technological changes or automation.
;dË‚l fjkialï fyda iajhxl%ShlrKh
ksid we;s jk h,amek .sh l=i,;d fjkqjg
kj l=i,;d f.dvkÕd .ekSu yiqre l=i,;d
wfydais ùug we;s tlu úi÷u fõ'

108
ictfromabc.com
But with information and communication B) Increased income inequality
technology there are many new job wdodhï wiudk;djh jeä ùu
opportunities. Some of them are as follows.
kuq;a f;dr;=re yd ikakf s õok ;dlaIKh;a Wealth concentration among tech
iuÕ ìysjQ kj /lshd wjia:d úYd, companies and the outsourcing of jobs to
m%udKhla mj;S' bka lsyms hla my; mßÈ fõ' lower-wage regions further exacerbate
• Data Analys economic disparities.
o;a; úYaf,aIl ;dlaI‚l iud.ï w;r Okh ixflakø a Kh
ùu iy wvq jegqma iys; l,dmj,g /lshd
• Cybersecurity Specialist ndysßka ,nd §u wd¾Ól úIu;d ;j ÿrg;a
ihsn¾ wdrlaIK úfYaI{ W.% lrhs'

• Software Developer
uDÿldx. ixj¾Ol

• Web Developer
fjí ixj¾Ol

• Cloud Engineer
j,dl=¿ bxðfkare

• AI/Machine Learning Engineer


lD;su nqoaê$hdka;% bf.kqï bxðfkare

• UX/UI Designer
UX$UI ks¾udKlre
This can widen the gap between the rich
• Network Administrator and the poor.
cd, mßmd,l fuu.ska Okj;=ka iy ÿmam;=ka w;r mr;rh
\ jeä úh yelsh'
• Virtual Reality Developer
w;:H ;;H:d ixj¾Ol

• IoT Specialist
IoT úfYaI{

• Robotics Engineer
frdfnda bxðfkare

109
ictfromabc.com
4. Environmental issues How to properly dispose of e-waste?
mdßißl .eg¿ bf,lafg%dksl wmøjH ksismßÈ neyer
lrkafka flfiao@
A) E-waste generation
bf,lafg%dksl wmøjH ckkh Here the concept of 3R can be used.
fuys§ 3R ixl,amh Ndú;d l< yelsh'
When an electronic device reaches the end
of its useful life, it becomes electronic Reduce
waste. Ndú;h wju lsÍu'
bf,lafg%dksl Wmdx.hl l%shdldÍ ld,h
wjika jQ úg th bf,lafg%dksl wmøjHhla One should buy electronic devices only if
njg m;afõ' they are essential.
;ukag w;HjYH kï muKla bf,lafg%dksl
Wmdx. ñ,§ .ekSuhs'

Reuse
kej; m%fhdackhg .ekSu'

Devices that are difficult to use compared


to themselves can be sold or donated to
someone else who will find them useful.
;ukag idfmalaIj Ndú;d lsÍug wmyiq
E-waste adds harmful elements like lead, Wmdx. th m%fhdackj;a jk fjk;a wfhl=g
mercury, cadmium, arsenic, heavy metals úlsŒu fyda mß;Hd. lsÍu isÿ lsÍuhs'
etc. to the environment.
bf,lafg%dksl wmøjH u.ska mßirhg Recycle
wys;lr Bhï" riÈh" leâñhï" wdiksla" m%;spl%SlrKh
nerf,day jeks ydkslr uQ,øjH tl;= fõ'
If it is not possible to reduce or reuse in any
When these elements aggregate with soil way, hand over the electronic waste to a
and drinking water, they contaminate qualified organization and dispose of it.
natural resources, posing severe health lsisu wdldrhlska Reduce fyda Reuse lsÍug
risks to humans and ecosystems. fkdyels kï iqÿiqlï iys; wdh;khlg
fuu uQ,øjH mi iy mdkSh c,h iuÕ tl;= bf,lafg%dksl wmøjH Ndr § tAjd neyer
jQ úg" tAjd iajNdúl iïm;a ¥IKh lrñka" lsÍuhs'
ñksiqkag iy mßir moaO;sj,g oeä fi!LH
wjodkula we;s lrhs'
Green computing
yß; mß.Kkh
The following types of diseases are caused
due to improper disposal of e-waste.
bf,lafg%dksl wmøjH ksis mßÈ neyer Green computing is the practice of using
fkdlsÍu fya;=fjka my; wdldrfha úúO computers by applying the 3R concepts to
frda. we;sfõ' minimize energy usage and extend the life
of devices to protect the environment.
Respiratory Issues, Allergies on the skin, yß; mß.Kkh hkq n,Yla;s Ndú;h wju
Neurological Damage, Kidney Damage, lsÍu iy mßirh wdrlaId lsÍug Wmdx.j,
Reproductive Health Problems, Cancer wdhq ld,h §¾> lsÍu i|yd 3R ixl,am
Ndú;d lrñka mß.Kl Ndú;d lsÍuhs'
Risk, Damage to DNA
Yajik wdndO" iu u; wid;añl;d" iakdhq
wdndO" jl=.vq ydks" m%ckl fi!LH .eg¨"
ms<sld wjodk" DNA j,g ydks ùu

110
ictfromabc.com
Increased energy consumption and 5. Ethical issues
global warming iodpdrd;aul .eg¿
n,Yla;s mßfNdackh iy f.da,Sh WIaK;ajh
jeä ùu A) Plagiarism
rpkd fp!r;ajh
The growth of ICT has led to increased
energy consumption, contributing to Plagiarism is the act of using someone
global warming due to higher greenhouse else's ideas without proper permission and
gas emissions. presenting it as your own.
f;dr;=re yd ikakf s õok ;dlaIK j¾Okh rpkd fp!r;ajh hkq fjk;a flfkl=f.a
ksid n,Yla;s mßfNdackh by< f.dia we;s woyia ksis wjirhlska f;drj Ndú;d lr th
w;r" by< yß;d.dr jdhq úfudapkh Tfíu f,i bÈßm;a lsÍuhs'
fya;=fjka f.da,Sh WIaK;ajh by< hdug
odhl fõ' There are three main ways to remove
plagiarism from a content.
Electronic devices consume significant hï wka;¾.;hl rpkd fp!r;ajh bj;a
electricity, often from non-renewable lrk m%Odk l%u ;=kla mj;S'
sources, raising carbon emissions.
bf,lafg%dksl Wmdx. fndfyda úg mqk¾ckkSh Citing
fkdjk m%Njhkaf.ka ie,lsh hq;= úÿ,shla Wmqgd oelaùu
mßfNdackh lrhs" tu.ska ldnka úfudapkh Mentioning the rightful owner and his/her
by< kxjhs' information.
i;H rplhd iy Tyqf.a$wehf.a f;dr;=re
Sustainable practices, like using renewable i|yka lsÍuhs'
energy and improving energy efficiency,
are needed to reduce ICT's environmental Quoting
impact. f.kyer oelaùu
ICT ys mdßißl n,mEu wju lsÍu i|yd The use of inverted commas (“…..”) to
mqk¾ckkSh n,Yla;sh Ndú;d lsÍu iy identify a selected or borrowed section.
n,Yla;s ld¾hlaIu;dj jeä ÈhqKq lsÍu jeks msgm;a lr.;a fldgi y÷kd .ekSug Wvq
;sridr Ndú;hka wjYH fõ' fldud ^^—'''''˜&& Ndú;d lsÍuhs'

Referencing
fhduqj oelaùu
Specifying the address of the web page
from which the information is collected.
This is usually done at the end of an essay
or article.
f;dr;=re /ia lrk ,o fjí msgqfõ ,smskh
i|yka lsÍuhs' fuh idudkHfhka wka;¾.;h
wjidkfha isÿ flf¾'

111
ictfromabc.com
The belongs and not belongs for plagiarism are as follows.
rpkd fp!r;ajh i|yd wh;a jk foa iy wh;a fkdjk foa my; mßÈ fõ'

Belongs to Plagiarism Does Not Belong to Plagiarism


rpkd fp!r;ajhg wh;a jk foa rpkd fp!r;ajhg wh;a fkdjk foa

Using someone else's ideas without proper Facts widely known and undisputed (e.g.,
credit. “The Earth orbits the Sun”).
ksis i|yka lsÍula fkdue;sj fjk;a mq¿,a f,i okakd iy wújdÈ; lreKq ^Wod( —
flfkl=f.a woyia Ndú;d lsÍu' mDÓúh iQ¾hhd jgd mßN%uKh fõ—&'

Rewording someone else’s content Your own unique thoughts, interpretations,


without citing the source. or analysis.
uQ,dY%h Wmqgd oelaùulska f;drj fjk;a Tfíu wkkH is;=ú,s" w¾:l:k fyda
flfkl=f.a wka;¾.;h kej; lshùu' úYaf,aIKh'

Presenting another person’s work as your Content that is accurately referenced with
own. proper citations.
fjk;a mqoa.,fhl=f.a jev Tfíu f,i ksis Wmqgd oelaùï iuÕ ksjerÈj i|yka lr
bÈßm;a lsÍu' we;s wka;¾.;h'

Reusing your own previously published Direct quotes enclosed in quotation marks
work without disclosure. and sourced correctly.
fy<sorõ lsÍulska f;drj Tfíu l,ska iDcq Wmqgd oelaùï WoaOD; ,l=Kqj, we;=<;a
m%ldYs; foa kej; Ndú;d lsÍu' lr ksjerÈj uQ,dY% lr we;'

Using parts of content verbatim without Materials that are free from copyright and
quotation marks or citation. available for unrestricted use.
WoaOD; ,l=Kq fyda Wmqgd oelaùulska f;drj m%ldYk ysñlfuka ksoyia iy iSud rys;
wka;¾.;fha fldgia jdÑlj Ndú;d lsÍu' Ndú;h i|yd ,nd .; yels wka;¾.;hka'

B) Artificial intelligence (AI) ethics C) Surveillance and censorship


lD;su nqoaê (AI) wdpdr O¾u T;a;= ne,Su iy jdrKh

Surveillance refers to the monitoring of


individuals’ activities, behaviors, and
communications, often conducted by
governments or corporations.
T;a;= ne,Su hkq mqoa.,hkaf.a l%shdldrlï"
yeisÍï iy ikakf s õokhka" fndfyda úg
rchka fyda ixia:d úiska isÿ lrkq ,nk
wëlaIKhhs'

Censorship involves the suppression or


The development and use of AI raise ethical restriction of information, communication,
concerns about bias, job displacement, and or ideas deemed objectionable or harmful
the potential for autonomous weapons. by authorities.
AI ixj¾Okh iy Ndú;h mlaI.%dyS;ajh" jdrKh hkq n,OdÍka úiska úreoaO fyda
/lshd úia:dmkh iy iajhxl%Sh wdhqO i|yd ydkslr f,i i,lk f;dr;=re" ikakf s õokh
we;s yelshdj ms<sn| iodpdrd;aul .eg¨ u;= fyda woyia hgm;a lsÍu fyda iSud lsÍuhs'
lrhs'

112
ictfromabc.com
6. Privacy issues B) Data Breaches
fm!oa.,sl;aj .eg¿ o;a; lvlsÍï

The vast amount of data collected by ICT Unauthorized access to databases or


platforms raises privacy concerns about systems can lead to sensitive information
data security. being exposed, resulting in financial loss,
f;dr;=re ;dlaIKh úúO udOH u.ska /ia reputational damage, and legal
lrk ,o w;súYd, o;a; m%udKhla o;a;
consequences.
wdrlaIdj ms<sn| fm!oa.,sl;aj .eg¿ u;=
lrhs' o;a; iuqodhka fyda moaO;s fj; wkjirfhka
m%fõY ùu ixfõ§ f;dr;=re fy<sorõ ùug
fya;= úh yel" tys m%;sM,hla f,i uQ,H
Individuals may be unaware of how their w,dN" lS¾;skdu ydks iy kS;suh m%;súmdl
data is being used, leading to potential we;s úh yel'
misuse.
mqoa.,hka ;u o;a; Ndú;d lrk wdldrh C) Insider Threats
.ek fkdoek isàu" wksis Ndú;hg ;=vq fohs' wNHka;r ;¾ck

Stronger data protection regulations and


Employees or contractors with access to
user awareness campaigns are essential to
confidential information may intentionally
safeguard privacy in the digital age.
äðg,a hq.fha fm!oa.,sl;ajh wdrlaId lsÍu or unintentionally disclose sensitive data,
i|yd Yla;su;a o;a; wdrlaIK fr.=,dis iy posing risks to an organization’s security.
mßYS,l oekqj;a lsÍfï jHdmdr w;HjYH fõ' ryiH f;dr;=re i|yd m%fõYh we;s
fiajlhska fyda fldka;%d;alrejka ys;du;d
fyda fkdoekqj;aj ixfõ§ o;a; fy<sorõ l<
A) Confidentiality yels w;r" th ixúOdkhl wdrlaIdjg
ryiHNdjh wjodkula we;'

Confidentiality issues in information and D) Weak Passwords and Authentication


ÿ¾j, uqrmo iy i;Hdmk
communication technology refer to the
challenges associated with ensuring that
Poor password practices and inadequate
sensitive and private information is
authentication measures can allow
protected from unauthorized access,
unauthorized individuals to access
disclosure or misuse.
f;dr;=re iy ikakf
s õok ;dËKfha confidential information.
ryiH;d .eg¨ hkq ixfõ§ iy mqoa.,sl ÿ¾j, uqrmo Ndú;hka iy m%udKj;a fkdjk
f;dr;=rej,g wkjirfhka m%fõY ùu" i;Hdmk mshjrhka wkjir mqoa.,hskg a
fy<sorõ lsÍu fyda wksis f,i Ndú; lsÍu ryis.; f;dr;=re fj; m%fõY ùug bv
jeks foaj,ska wdrËd lr we;s nj iy;sl i,ihs'
lsÍu yd iïnkaO wNsfhda.hs'
E) Insecure Communication Channels
These issues arise from various factors. wkdrlaIs; ikaksfõok kd,sld
fuu .eg¿ úúO idOl u; mek k.S'
Using unencrypted or insecure channels for
communication (like email or public Wi-Fi)
can expose sensitive data to interception
by malicious actors.
ikakfs õokh i|yd ixfla;kh fkdl< fyda
wkdrlaIs; kd,sld Ndú;d lsÍu ^Bfï,a fyda
fmdÿ Wi-Fi jeks& oafõIiy.; l%shdldÍkaf.a
ndOd lsÍïj,g ixfõ§ o;a; ksrdjrKh l<
yel'

113
ictfromabc.com
7. Legal Issues C) Data thefts
ffk;sl .eg¨ o;a; fidrlu

A) Phishing The theft of personally identifiable


;;=nEï information (PII) from a computer or other
device.
Phishing is a cyber scam where attackers mqoa.,fhl=f.a wkkH;djh oelafjk
use fake messages or websites to deceive f;dr;=re mß.Klhlska fyda fjk;a
people into sharing sensitive information, Wmdx.hlska fidrd .ekSuhs'
like passwords or financial details.
;;=nEu hkq uqrmo fyda uQ,H f;dr;=re jeks This information includes personal
ixfõ§ f;dr;=re fnod .ekSug ñksiqka rjgd information such as names, phone
.ekSug m%ydrlhka jHdc m‚úv fyda fjí numbers, photos, etc.
wvú Ndú; lrk ihsn¾ jxpdjls' fuu f;dr;=rej,g mqoa., kdu" ÿrl:k
wxl" PdhdrEm wd§ fm!oa.,sl f;dr;=re
These scams often mimic trusted we;=<;a fõ'
organizations to appear legitimate.
fuu jxpdjka fndfyda úg kS;Hdkql+, f,i D) Fraud
fmkS isàug úYajdiodhl ixúOdk wkqlrKh jxpd
lrhs'
Fraud is the act of intentionally deceiving
someone to gain an unfair or unlawful
B) Piracy
fp!r;ajh advantage, often involving financial or
personal gain.
Piracy is the unauthorized copying, jxpdj hkq widOdrK fyda kS;s úfrdaë jdishla
,nd .ekSu i|yd hful= ys;du;du /jàfï
distribution, or use of copyrighted material, l%shdjls" fndfyda úg uQ,H fyda mqoa.,sl jdis
such as software, movies, music, or books. we;=<;a fõ'
fp!r;ajh hkq uDÿldx." Ñ;%mg" ix.S;h fyda
fmd;a jeks m%ldYk ysñlï we;s øjH It can take various forms, such as identity
wkjirfhka msgm;a lsÍu" fnod yeÍu fyda
Ndú;hhs' theft, scams, or false representation, and
leads to significant economic and personal
This practice violates intellectual property harm for victims.
rights and can result in legal consequences, th wkkH;d fidrlï" jxpd fyda jHdc
ksfhdackh jeks úúO iajrEm .; yels w;r
lost revenue for creators, and compromised úkaÈ;hskg a ie,lsh hq;= wd¾Ól yd mqoa.,sl
security for users accessing pirated ydkshla isÿ lrhs'
content.
fuh nqoaêuh foam< ysñlï W,a,x>kh lrk There are several types of this.
w;r kS;suh m%;súmdl" ks¾udmlhska i|yd fuys wdldr lsyms hla mj;S'
wdodhu wysñ ùu iy fidrlï l<
wka;¾.;hg m%fõY jk mßYS,lhska i|yd
wdrlaIdjla fkdue;s ùu jeks ydks isÿ úh • Financial Fraud
yel' uQ,H jxpd
• Identity Theft
wkkH;d fidrlu
• Insurance Fraud
rlaIK jxpdj
• Cyber Fraud
ihsn¾ jxpdj
• Consumer Fraud
mdßfNda.ls jxpdj

114
ictfromabc.com
E) Unauthorized access into computer • Patent
systems fmagkaÜ n,m;%
mß.Kl moaO;s j,g wkjirfhka we;=,a ùu
A license is given to the owner of an
Accessing a personal computer or a invention conferring a right or title for a set
network of computers without the consent period, especially the sole right to exclude
of the owner. others from making, using, or selling the
whs;slref.a wjirhlska f;drj mqoa.,sl invention.
mß.Klhlg fyda mß.Kl cd,hlg m%fõY kj ks¾udKlrefjlag hï ld,hla hk;=re
ùuhs' ksuejqul ysñlu ,ndfok n,m;%hls' fuu
ld,h f.fjk;=re fjk;a wfhlag fuu
In most cases, the information of the user ks¾udKh Ndú;hg fyda úlsŒug whs;shla
fkdue;'
is disclosed or stolen.
fndfyda wjia:dj,§" mßYS,lhdf.a f;dr;=re
wkdjrKh lsÍu fyda fidrlï lsÍu isÿ lrkq • Trademarks
,efí' fj<| ,l=K

Stealing Trademark typically protects brand names


fidrlï lsÍu and logos used on goods and services. This
means that another party cannot use the
Stealing often refers to the unauthorized same brand name logo, etc.
access or acquisition of digital assets, such NdKav yd fiajdjkays Ndú;d lrkq ,nk
as data, intellectual property, or financial fj<| kduhla fyda fj<| ,dxckhla fjk;a
information. wdh;khlg fyda mqoa.,fhlag Ndú;d lsÍug
fidrlï lsÍu hkq o;a;" nqoaêuh foam, fyda bv fkdfok kS;suh rduqj fj<| ,l=K fõ'
uQ,H f;dr;=re jeks äðg,a j;alïj,g
wkjirfhka m%fõY ùu fyda w;am;a lr • Copyrights
.ekSuhs' m%ldYk ysñlu

Copyright in ICT refers to the legal


F) Intellectual property rights protection given to creators for their
nqoaêuh foam, iïnkaO whs;Ska original digital content, such as software,
documents, images, and media.
Intellectual property is the intangible things ICT ys m%ldYk ysñlu hkq uDÿldx." f,aLk"
created in an individual's mind. rEm iy udOH jeks Tjqkf a .a uq,a äðg,a
nqoaêuh foam, hkq hfulaf.a uki ;=< wka;¾.;h i|yd ks¾udKlrejkag ,nd §
ks¾udKh jk iam¾Y lsÍug fkdyels foaj,a we;s kS;suh wdrlaIdjhs'
fõ'
It grants exclusive rights to use, distribute,
They can be inventions, artistic work such and modify the work, preventing
as melodies poetry, designs, logos, etc. unauthorized copying or reproduction.
fuhg kj ks¾udK" l,d;aul ks¾udK" ;kq" th wkjir msgm;a lsÍu fyda m%;skI s amdokh
mo rpkd" ,dxck jeksoE wh;a fõ' je<elaùu" Ndú;d lsÍug" fnod yeÍug iy
fjkia lsÍug ;ks whs;sh ,nd fohs'
Using the intellectual property of someone
else without the consent of the owner is NCS which stands for No copyright sounds
illegal and it comes under stolen such as melodies and tracks that are free to
intellectual property. use.
;j;a flfklaf.a nqoaêuh foam,la NCS tkï m%ldYk ysñlï ke;s ix.S;h hkq
wkjirfhka Ndú;d lsÍu kS;s úfrdaë jk Ndú;d lsÍug ksoyi we;s ;kq iy .S; jeks
w;r tAjd fidrlï lrk ,o nqoaêuh foam, oE fõ'
.khg jefÜ'

115
ictfromabc.com
Licensed software and Unlicensed Free and open source software (FOSS)
software ksoyia iy újD; uq,dY% uDÿldx. (FOSS)
n,m;%,dNS uDÿldx. iy n,m;% rys;
uDÿldx. Open Source Software
újD; uQ,dY% uDÿldx.
Licensed Software
n,m;%,dNS uDÿldx. Software with publicly accessible source
code, allowing users to use, modify, and
Software that requires users to purchase or distribute it freely under specific open-
obtain permission to use, often under source licenses.
specific terms set by the owner. m%isoaêfha m%fõY úh yels uQ,dY% fla;h iys;
fndfyda úg ysñlre úiska ilik ,o ksYÑ a ; uDÿldx." mßYS,lhskg a úfYaIs; újD; uQ,dY%
kshuhka hgf;a mßYS,lhskg a ñ,§ .ekSug n,m;% hgf;a th Ndú;d lsÍug" fjkia
fyda Ndú;hg wjir ,nd .ekSug wjYH lsÍug iy fnod yeÍug bv i,ihs'
uDÿldx. fõ'
Ex. Microsoft Office, Adobe Photoshop Ex. Linux operating system, Apache web
server, GIMP

Proprietary Software
ysñlï iys; uDÿldx.

Unlicensed Software Software owned by a company or


n,m;% rys; uDÿldx. individual with restricted rights, where the
source code is not shared, and usage is
Software that is used without legal controlled by the software license.
authorization or without purchasing the iSud lrk ,o whs;Ska iys; iud.ulg fyda
required license, leading to potential legal mqoa.,fhl=g ysñ uDÿldx. fõ" fïjdfha
and security risks. uQ,dY% fla;h fnod fkd.kakd w;r" uDÿldx.
kS;suh wjirhlska f;drj fyda wjYH n,m;%h u.ska Ndú;h md,kh fõ'
n,m;%h ñ,§ fkdf.k Ndú;d lrk uDÿldx.
fõ" fïjd kS;suh iy wdrlaIl wjodkï j,g Ex. Windows operating system, macOS,
;=vq fohs' Adobe Creative Suite
Ex. Pirated versions of paid software like
unauthorized Microsoft Office or
Photoshop copies.
wkjir Microsoft Office fyda Photoshop
msgm;a jeks f.ùug we;s uDÿldx.j,
kS;súfrdaë wkqjdo'

116
ictfromabc.com
Aspect Licensed Software Free and Open-Source Software
(FOSS)
Cost Usually requires payment (one- Free to use, modify, and distribute.
msßjeh time, subscription, or per-user Ndú;d lsÍu" fjkia lsÍu iy fnod
fees). yeÍu fkdñf,a isÿ l< yel'
idudkHfhka f.ùula wjYH fõ
^tla-jrla" .%dyl f.ùula fyda
tAl-mßYS,l .dia;=&'
Source Code Source code is proprietary and Source code is openly available for
Access not available to users. anyone to view, modify, or share.
uQ,dY% fla; uQ,dY% fla;h ysñldÍ jk w;r ´kEu flfkl=g ne,Sug" fjkia
m%fõYh mßYS,lhskg a ,nd .; fkdyel' lsÍug fyda fnod .ekSug uQ,dY% fla;h
újD;j mj;S'
Customization Limited or not allowed due to Fully customizable by modifying the
wNsreÑlrKh restricted access to source code. source code.
m%Nj fla;hg m%fõYh iSud lsÍu uQ, fla;h fjkia lsÍfuka
fya;=fjka iSñ; fyda wjir ke;' iïmQ¾Kfhkau wNsreÑlrKh l<
yelsh'
Support and Provided by the software Often community-driven; some
Updates vendor, often as part of the projects offer paid support.
iydh iy license fee. fndfyda úg m%cdj úiska fufyhjkq
hdj;ald,Sk fndfyda úg n,m;% .dia;=fõ ,efí¦ iuyr jHdmD;s uqo,a f.jd
fldgila f,i uDÿldx. wdOdr lrhs'
wf,úlre úiska imhkq ,efí'
Ownership and Owned by the vendor or Users have full ownership of the
Rights company, and users get limited code they modify and adhere to
ysñldß;ajh iy rights to use it. open-source licenses.
whs;sjdislï wf,úlreg fyda iud.ug ysñ jk mßYS,lhskg a Tjqka fjkia lrk iy
w;r" mßYS,lhskg a th Ndú;d újD; uQ,dY% n,m;%j,g wkql+, jk
lsÍug iSñ; ysñlï ,efí' fla;fha mQ¾K ysñldß;ajh we;'
Security Security patches are managed Code is publicly reviewed, which can
wdrlaIdj by the vendor, but code lead to faster identification and
transparency is limited. fixing of vulnerabilities.
wdrlaIl wx. wf,úlre úiska fla;h m%isoaêfha iudf,dapkh lrkq
l<ukdlrKh lrkq ,efí" kuq;a ,efí" th blaukska y÷kd .ekSug iy
fla; úksúoNdjh iSñ;h' wjodkï ksjerÈ lsÍug fya;= úh yel'

Reliability Generally reliable with vendor Reliability depends on community


úYajikSh;ajh guarantees and formal support. activity and project maintenance.
wf,úlrejkaf.a j.lSï iy úYajikSh;ajh m%cd l%shdldrlï iy
úêu;a iydh iuÕ idudkHfhka jHdmD;s kv;a;=j u; r|d mj;S'
úYajdiodhlh'
Examples Microsoft Office, Adobe Linux, LibreOffice, GIMP, Mozilla
WodyrK Photoshop, Windows OS Firefox

117
ictfromabc.com
How to protect data Avoiding Suspicious Emails and Links:
o;a; wdrlaId lr.kakd wdldrh iel iys; Bfï,a iy ine¢ j<lajd .ekSu(

Firewalls: Refraining from opening suspicious emails


.sks mjqr or clicking on unknown links protects
against phishing and malware attacks.
Firewalls block unauthorized access to your iel iys; Bfï,a újD; lsÍfuka je<lSu fyda
system by monitoring and controlling fkdokakd ine¢ la,sla lsÍfuka je,lSfuka
incoming and outgoing network traffic. ;;=nEï iy wksIag uDÿldx. m%ydrj,ska
cd,h ;=<g meñfKk iy thska msg;g hk wdrlaId fõ'
cd, ;onoh ksÍlaIKh lsÍu iy md,kh
lsÍfuka .sks mjqre uÕska Tfí moaO;shg Digital Signature
wkjir m%fõYh wjysr lrhs' wxls; w;aik

Passwords: Digital signatures verify the authenticity


uqrmo( and integrity of documents, ensuring they
haven’t been tampered with.
Strong, unique passwords help secure wxls; w;aika u.ska f,aLk fjkia ù fkdue;s
accounts and devices, preventing nj iy;sl lrhs tAjdfha i;H;dj iy
wLKav;dj ;yjqre lrhs'
unauthorized access to sensitive data.
Yla;su;a" wkkH uqrmo" ixfõ§ o;a;j,g
wkjirfhka m%fõY ùu j<lajñka" .sKqï iy Encryption
Wmdx. iqrlaI;
s lsÍug Wmldr lrhs' fla;kh

Biometrics: Encryption converts data into a coded


ffcjñ;sl( format, making it unreadable to
unauthorized users without the decryption
Biometrics (like fingerprint or facial key.
recognition) ensure that only authorized fla;kh uÕska o;a; fla;s; wdlD;shla njg
individuals can access devices or systems. mßj¾;kh lrk w;r" úfla;k h;=r
ffcjñ;sl ^weÕs,s i,l=Kq fyda uqyK q fkdue;sj wkjir mßYS,lhskg a th lshúh
y÷kd.ekSu jeks& u.ska n,h,;a mqoa.,hkag fkdyel'
muKla Wmdx. fyda moaO;s fj; m%fõY úh
yels nj iy;sl lrhs'

118
ictfromabc.com

You might also like