Basic Concepts of ICT Tute
Basic Concepts of ICT Tute
Information
Characteristics………………….…………………………………..………………………………… 7
The golden rule of information………………….…………………………………..……… 7
Big Data 9
Applicability of ICT in day-to-day life 14
Drawbacks of manual methods in manipulating data and information 16
Infeasibility of applying manual methods 18
Emergence of ICT era 21
Automated vs. Manual data handling 22
Information retrieval and sharing 23
Computer networks 25
The Internet
Services of the internet……………………….…………….…………………………………… 26
Word Wide Web……………………….…………….……………………………………………... 28
Mobile communication……………………………………………….………………………… 30
Mobile computing……………………….…………….………………………………………….. 31
Cloud computing……………………….…………….……………………………………………. 31
ictfromabc.com
Stages of data processing
Data gathering……………………………………………….………………………………………. 52
Data validation……………………….…………….………………………………………………… 57
Data input……………………….…………….……………………………………………………….. 58
Data verification……………………….…………….……………………………………………… 60
Data processing……………………….…………….………………………………………….…… 61
Data output……………………….…………….………………………………………………….… 62
Data storage……………………….…………….………………………………………………….. 63
Applications in IT
Educational sector……………………………………………….………………………………… 65
Health sector……………………….…………….………………………………………………….. 68
Agriculture sector……………………….…………….…………………………………………… 75
Business and finance sector……………………….…………….…………………………… 81
Engineering sector……………………….…………….…………………………………………. 84
Tourism sector……………………….…………….………………………………………………. 85
Media and journalism……………………….…………….……………………………………. 86
Security and law……………………………………………….………………………………….. 88
Entertainment……………………….…………….……………………………………………….. 89
Travel and transport……………………….…………….……………………………………… 93
Production sector……………………….…………….…………………………………………. 96
E-government……………………….…………….………………………………………………. 98
Benefits of ICT
Social benefits……………………………………………….……………………………………… 100
Economic benefits……………………….…………….…………………………………………. 101
ictfromabc.com
Life cycle of data 2. Data management
o;a; Ôjk pl%h o;a; l<uKdlrKh
1
ictfromabc.com
Data NOTE
o;a; There is no inherent distinction between
data and information; rather, it depends on
Unprocessed raw material that cannot be one's perspective.
meaningful when taken separately is o;a; iy f;dr;=re w;r wdfõksl fjkila
known as data. fkdue;¦ tA fjkqjg" th flfkl=f.a oelau
fjka fjka jYfhka .;a úg w¾:hla §ug u; r|d mj;S'
fkdyels ksis f,i ilia lr fkdue;s wuq
lreKq o;a; f,i yÿkajhs' Although information is the output of one
process, that information may be data for
Information another process.
f;dr;=re f;dr;=rla hï l%shdj,shl m%;sodkh jqjo" tu
f;dr;=r fjk;a l%shdj,shla ioyd o;a;hla
Data that has been processed, organized, úh yelsh'
or structured to provide meaning or
context. Data and information can be identified by
w¾:hla fyda ikao¾Nhla iemhSu i|yd examining the inputs and outputs of a
ilik ,o" ixúOdkh lrk ,o fyda jHqy.; process.
lr we;s o;a; fõ' tneúka" hï l%shdj,shl wdodk yd m%;sodk
úuid ne,Sfuka o;a; iy f;dr;=re meyeÈ,sj
yÿkd .; yel'
2
ictfromabc.com
Nature of data Types of data
o;a; j, iajNdjh o;a; mj;sk wdldr
3
ictfromabc.com
Data Processing Mechanical Processing
o;a; ieliSu hdka;%sl ieliSu
Utilizes basic mechanical tools like
Creating information using data is known typewriters or calculators to assist in
as data processing. processing data.
o;a; Ndú;fhka f;dr;=re ks¾udKh lsÍu o;a; ieliSug iyh ùug h;=re ,shk fyda
o;a; ieliSu f,i ye¢kafõ' .Kl hka;% jeks uQ,sl hdka;%sl fuj,ï
Ndú; lrhs'
Manual Processing
yia;Sh ieliSu Electronic Processing
Performed entirely by humans using tools bf,lafg%dksl ieliSu
like paper, pens, or ledgers, without any Involves the use of computers and software
machinery. to process large amounts of data quickly
hka;% iQ;% fkdue;sj lvodis" mEka fyda jeks and accurately.
fuj,ï Ndú;fhka iïmQ¾Kfhkau ñksiqka úYd, o;a; m%udKhla blaukska yd ksjerÈj
úiska isÿ lrkq ,efí' ieliSug mß.Kl iy uDÿldx. Ndú;h
we;=<;a fõ'
Definition Raw, unprocessed values or facts. Processed, analyzed, and interpreted data.
w¾: oelaùu wuq" ilia fkdl< w.hka fyda o;a; ilik ,o" úYaf,aIKh lrk ,o
lreKq' iy w¾:l:kh lrk ,o o;a; fõ'
Form Numeric, alphanumeric, text, or Summarized, contextualized, and
wdldr multimedia. ixLHd;aul" structured.
wlaIrdxl" fm<" fyda nyqudOH' idrdxY.;" ikao¾N.; iy jHqy.;'
Structure Unstructured jHqy.; fkdl< Structured jHqy.; l<
jHqyh Lacks specific format or Organized in a predefined format. mQ¾j
organization. ksYaÑ; wdlD;shla ksYÑa ; wdlD;shlska ixúOdkh lr we;'
fyda ixúOdkh ù fkdue;'
Context Lack context or interpretation. Provides context and meaning to data.
ikao¾Nh ikao¾Nh fyda w¾: ksrEmKh o;a; i|yd ikao¾Nh iy w¾:h
fkdue;slu' imhhs'
Purpose Foundation for analysis and Supports decision-making, understanding,
wruqKq decision-making. or communication.
úYaf,aIKh iy ;SrK .ekSu ;SrK .ekSu" wjfndaOh fyda
i|yd moku imhhs ikakf
s õokh i|yd iydh fõ'
Usefulness Requires processing to be valuable. Valuable for decision-making, problem-
m%fhdackh jeo.;a f,i ieliSug wjYH fõ' solving, or insights.
;SrK .ekSu" .eg¿ úi£u fyda ;SlaIaK
nqoaêh i|yd jeo.;a h'
Accessibility May require organization or Often presented in accessible formats for
m%fõYH;dj transformation for usability. ease of understanding.
Wmfhda.;S djh i|yd ixúOdkhla fndfyda úg wjfndaO lr .ekSfï myiqj
fyda mßj¾;khla wjYH úh i|yd m%fõY úh yels wdlD;sj,ska
yelsh' bÈßm;a flfra'
Examples Sales figures, quantities, product Total sales for a period, sales trends, best-
WodyrK codes. selling products.
úl=Kqï ixLHd" m%udK" ksIamdok ld, iSudjla i|yd iïmQ¾K úl=Kqï"
fla;' úl=Kqï m%jK;d" jeäfhkau wf,ú jk
ksIamdok'
4
ictfromabc.com
Classification of Data and Information 3. Primary and Secondary
o;a; j¾.SlrKh iy f;dr;=re j¾.SlrKh m%d:ñl yd oaú;shsl
5
ictfromabc.com
5 .Spatial and Temporal 7. Personal and Public
wjldYSh o;a; iy ;djld,sl mqoa.,sl iy f;dr;=re
Spatial Personal
wjldYSh mqoa.,sl
Spatial data refers to data associated with Personal information and data pertain to
geographical locations or positions. individuals and may include demographic
wjldYSh o;a; hkq N+f.da,Sh ia:dk fyda data, contact details, preferences, and
wjia:d yd iïnkaO o;a; fõ' behavioral information.
Ex. GPS coordinates, maps mqoa.,sl f;dr;=re iy o;a; mqoa.,hkag wod<
GPS LKavdxl" is;shï jk w;r ckúldi o;a;" iïnkaO;d úia;r"
ukdm iy yeisÍï f;dr;=re we;=<;a úh yel'
Temporal
;djld,sl Ex. Privacy regulations and ethical
considerations.
Temporal data refers to data associated fm!oa.,sl;aj fr.=,dis iy iodpdrd;aul
with time. i,ld ne,Sï
;djld,sl o;a; hkq ld,h yd iïnkaO o;a;
j,g fhduq lrhs' Public
Ex. timestamps, dates fmdÿ
fõ,djka" Èk
Public information and data are freely
6. Static and Dynamic available and accessible to anyone.
iaÓ;sl o;a; iy .;sl fmdÿ f;dr;=re iy o;a; fkdñf,a ,nd .;
yels w;r ´kEu flfkl=g m%fõY úh yelsh'
Static
iaÓ;sl Ex. Government publications, academic
research papers
Static data does not change over time. rcfha m%ldYk" Ydia;%Sh m¾fhaIK m;%sld
iaÓ;sl o;a; ld,h;a iuÕ fjkia fkdjk
o;a;'
Ex. Demographic data
Dynamic
.;sl
6
ictfromabc.com
Characteristics of Useful Information The Golden rule of information
jákd f;dr;=rl ,laIK f;dr;=re ms,sn| iaj¾Kuh kHdh
Completeness
mQ¾K;ajh
Relevance
wod< nj
7
ictfromabc.com
How the Golden Rule affects various Legal Proceedings
cases kS;suh l%shdoduhka
iaj¾Kuh kS;sh úúO isoaëka ioyd n,mdk
whqre The timing of information disclosure in
legal proceedings significantly influences
Stock Market Trading the outcome of a case, with timely
fldgia fj<|fmd, fj<|du presentation of evidence and witness
testimonies strengthening a party's
In stock trading, information value can
position and court decision.
rapidly change, allowing traders to make
kS;Hdkql+, l%shdoduhkay§
s f;dr;=re fy<sorõ
quick decisions based on market trends, lrk ld,iSudj kvqjl m%;sM,hg ie,lsh
company performance, or economic hq;= f,i n,mdk w;r" kshñ; fõ,djg
indicators. idlaIs iy idlaIslrejkaf.a idlaIs bÈßm;a
fldgia fj<|dfï §" f;dr;=re jákdlu lsÍu md¾Yjhl ia:djrh iy wêlrK
fõ.fhka fjkia úh yels w;r" fj<|m, ;Skÿa j Yla;su;a lrhs'
m%jK;d" iud.ï l%shdldß;ajh fyda wd¾Ól
o¾Yl u; mokïj blauka ;SrK .ekSug
fj<÷kag bv i,ihs' Business Decision-Making
jHdmdr ;SrK .ekSu
However, late arrivals can reduce the value
of the information. Real-time data plays a critical role in
flfia fj;;a" marudo ù meñŒu f;dr;=re ensuring that decisions are based on the
j, jákdlu wvq l< yelsh' most accurate and current information.
.kq ,nk ;SrK jvd;a ksjerÈ iy j¾;udk
f;dr;=re u; mokï jk nj iy;sl lsÍfïÈ
Emergency Response ;;H ld,Sk o;a; b;du;a ;SrKd;aul
yÈis m%;spdr ld¾hNdrhla bgq lrhs'
8
ictfromabc.com
Big data • Velocity
uyd o;a; m%fõ.h
Big data is a term used to describe data sets Big data is generated at high speeds
that are too large and complex to be and requires rapid processing and
processed using traditional methods and analysis.
tools within a reasonable time frame. uyd o;a; by< fõ.hlska ckkh jk
uyd o;a; hkafkka woyia lrkafka w;r fõ.j;a ieliqï iy úYaf,aIKh
idïm%odhsl o;a; ieliqï l%u iy idOdrK wjYH fõ'
ld, rduqjla ;=< .%yKh lr .ekSug" .nvd
lsÍug" l<ukdlrKh lsÍug iy • Variety
úYaf,aIKh lsÍug we;s fuj,ïj, úúO;ajh
yelshdjka blaujd hk úYd, iy ixlS¾K
o;a; lÜg, fõ' Big data comes in diverse formats and
types, including structured data (e.g.,
The term big data is characterized by four databases), semi-structured data (e.g.,
main features, known as the 4Vs, namely: XML, JSON), and unstructured data
volume, veracity, velocity, and variety. (e.g., text, images, videos).
uyd o;a; tys mßudj" m%fõ.h" úúO;ajh iy uyd o;a;" jHqy.; o;a; ^Wod'" o;a;
i;H;dj u.ska ksrEmKh l< yel' fïjd 4Vs iuqodhka&" w¾O jHqy.; o;a; ^Wod ^XML,
f,i ye¢kafõ'
JSON) iy jHqy.; fkdjk o;a; ^Wod'"
fm<" rEm" ùäfhda& we;=¿ úúO wdlD;s
• Volume iy j¾. j,ska meñfKa'
Mßudj
This variety poses challenges for
Big data involves vast amounts of data,
traditional data management and
often ranging from terabytes to
analysis methods.
petabytes or even exabytes in size. fuu m%fNaoh iïm%odhsl o;a;
uyd o;a; m%udKhla we;=<;a fõ" fndfyda l<ukdlrK iy úYaf,aIK l%u i|yd
úg fgrdnhsÜ isg fmgdnhsÜ olajd fyda wNsfhda. lrhs'
m%udKfhka tlaidnhsÜ olajd Èfjhs'
Tools used in big data processing
uyd o;a; ieliSug Ndú;d lrk úê
• Veracity
i;H;dj • Hadoop
• Apache Spark
Ensuring the accuracy, reliability, and • Apache Flink
quality of big data is crucial for • Apache Kafka
generating meaningful insights and • Apache Storm
making reliable decisions. • Apache NiFi
úYd, o;a;j, ksrjoH;djh" • Hive
úYajikSh;ajh iy .=Kd;aulNdjh
iy;sl lsÍu w¾:j;a ;SlaIaK nqoaêhla • Pig
ckkh lsÍug iy úYajdiodhl ;SrK • Databricks
.ekSug b;d jeo.;a fõ' • Amazon
9
ictfromabc.com
Application of Big data 2. Finance
uyd o;a;j, fhÿï
The finance sector deals with enormous
volumes of transactions every day.
uQ,H wxYh iEu Èklu w;súYd, .kqfokq
m%udKhla iu. lghq;= lrhs'
10
ictfromabc.com
• Apache Hive • GeoSpock
Used for processing large amounts of trip Processes real-time streams of social media
data to identify optimal routes. data to detect trending topics.
m%Yia; ud¾. y÷kd .ekSu i|yd úYd, m%jK;d ud;Dld y÷kd .ekSug iudc udOH
ixpdr o;a; ieliSu i|yd Ndú;d lrhs' o;a;j, ;;H ld,Sk m%jdyhka ilihs'
11
ictfromabc.com
Aspect Big Data Normal Data
Volume Extremely large data sets, often in Smaller, manageable data sets, typically
mßudj terabytes or petabytes. in megabytes or gigabytes.
fndfyda úg fgrdnhsÜ fyda fmgdnhsÜ idudkHfhka fu.dnhsÜ fyda .s.dnhsÜ
j,ska we;s b;d úYd, o;a; lÜg, fõ' j,ska we;s l=vd" l<ukdlrKh l< yels
o;a; lÜg, fõ'
Variety Includes structured, semi-structured, Primarily structured data, such as
úúO;ajh and unstructured data (e.g., text, spreadsheets or databases.
video, sensor data). uQ,sl jYfhka me;=reïm;a fyda o;a;
jHqy.;" w¾O jHqy.; iy jHqy.; iuqodhka jeks jHqy.; o;a; fj'
fkdjk o;a; ^Wod( fm<" ùäfhda"
ixfõol o;a;& o;a; we;=<;a fõ'
Velocity Data is generated and processed at Data is processed at a slower pace.
m%fõ.h high speed, often in real-time. o;a; ilikq ,nkafka ukao.dó
fndfyda úg ;;H ld,Skj" o;a; fõ.hlsks'
W;amdokh lr wêl fõ.fhka ilikq
,nhs'
Complexity Requires advanced tools and Can be analyzed using traditional tools
ixlS¾K;ajh technologies to analyze due to its like spreadsheets or databases.
diversity and volume. me;=reïm;a fyda o;a; iuqodhka jeks
tAjdfha úúO;ajh iy mßudj iïm%odhsl fuj,ï Ndú;fhka
fya;=fjka úYaf,aIKh lsÍug Wiia úYaf,aIKh l< yel'
fuj,ï iy ;dlaIKhka wjYH fõ'
Storage Stored using distributed systems like Stored on local servers, relational
.nvd lsÍu Hadoop, cloud storage, or NoSQL databases, or standalone systems.
databases. ia:dkSh fiajdodhlhka" iïnkaO;d o;a;
Hadoop" ^cloud t
s orage& fyda ^NoSQL& iuqodhka fyda iajdëk moaO;s u; .nvd
o;a; iuqodhka jeks fnod yßk ,o lr we;'
moaO;s Ndú;fhka .nvd lr we;'
Analysis Requires specialized tools (e.g., Can be analyzed using basic statistical
úYaf,aIKh Spark, Hadoop) and techniques like methods and simpler tools.
machine learning. uQ,sl ixLHdk l%u iy ir, fuj,ï
úfYaIs; fuj,ï ^Wod'" ^Spark"& Ndú;fhka úYaf,aIKh l< yel'
^Hadoop&& iy hka;% bf.kSu jeks
;dlaI‚l l%u wjYH fõ'
Scalability Designed to scale dynamically across Limited scalability due to hardware and
mßudKh multiple systems to handle growth. software constraints.
j¾Okh yeisrùu ioyd moaO;s oDVdx. iy uDÿldx. ixndOl fya;=fjka
.Kkdjla yryd .;slj mßudKh iSñ; mßudK yelshdjla we;'
lsÍug yels f,i ks¾udKh lr we;'
Cost Higher costs due to infrastructure, Lower costs as it relies on standard
msßjeh tools, and expertise requirements. software and hardware.
há;, myiqlï" fuj,ï iy úfYaI{ tAjd iïu; uDÿldx. iy oDVdx. u; r|d
wjYH;d fya;=fjka msßjeh by<h' mj;sk neúka úhou wvqh'
Examples Social media data, IoT sensor data, Employee records, financial statements,
WodyrK transaction logs, multimedia content. or customer databases.
iudc udOH o;a;" ^IoT& ixfõol fiajl jd¾;d" uQ,H m%ldYk fyda
o;a;" .kqfokq f,d." nyqudOH mdßfNda.sl o;a; iuqodhka'
wka;¾.;'
12
ictfromabc.com
13
ictfromabc.com
Applicability of information in
day-to-day life
tÈfkod Ôú;fha§ f;dr;=rej, fhda.H;dj
1. Decision Making
;SrK .ekSug
14
ictfromabc.com
There are 5 main stages in policy making 4. Planning and supervision activities
process. ie,iqï lsÍu yd wëlaIKh lsÍu
m%;sm;a;s iïmdok l%shdj,sfha m%Odk wÈhr
5la we;' Plans are used to achieve targets and and
on the process supervision is really
1. Problem identification important.
.eg¿j y÷kd.ekSu ie,iqï u.ska b,lal ilia lrk w;r tu
2. Agenda Setting ie,iqï l%shd;aul ùu wëlaIKh lrkq ,nhs'
kHdh m;% ieliSu
Below are some steps of a process followed
3. Policy Formulation in planning.
m%;sm;a;s iïmdokh ie,iqï lsÍfï§ wkq.ukh lrk l%shdj,shl
4. Policy Adoption mshjr lsyms hla my; oelafõ'
m%;sm;a;s iïu; lsÍu
1. Setting Goals and Objectives
5. Policy Implementation b,lal iy wruqKq ieliSu
m%;sm;a;s l%shd;aul lsÍu
2. Identifying Tasks and Activities
6. Policy Evaluation ld¾hhka iy l%shdldrlï y÷kd .ekSu
m%;sm;a;s we.hSu
3. Resource Allocation
iïm;a fjka lsÍu
3. Predictions of the future 4. Scheduling and Timelines
wkd.;h mqfrdal:kh lsÍu ld,igyka mj;ajd.ekSu
15
ictfromabc.com
Drawbacks of manual methods in Inconsistency
manipulating data and information fkd.e<mSu
w;ayqre l%uj,sk"a o;a; iy f;dr;=re
yeisrùfï § we;s jk miqnEu Manual data handling can result in
inconsistencies due to varying individual
Drawbacks of manual methods in interpretations and entry errors. For
manipulating data and information is example, in financial reporting, different
known as time-consuming data entry, personnel may record data differently,
increased human error, difficulties in leading to discrepancies in figures.
sharing information, and data w;ayrq e o;a; yeisrùu úúO mqoa., w¾:l:k
inconsistency across files, complicating iy we;=,aùfï fodaI fya;=fjka fkd.e<mSï
updates. we;s úh yel' ksoiqkla jYfhka" uQ,H
o;a; iy f;dr;=re yeisrùfï§ w;ayr q e jd¾;dlrKfha§" úúO mqoa.,hska o;a; fjkia
l%ufõoj, wvqmdvq f,i y÷kajkq ,nkafka f,i igyka l< yels w;r" th ixLHdj,
ld,h .;jk o;a; we;=<;a lsÍï" jeäjk úIu;d we;s lrhs'
udkj fodaI" f;dr;=re yqjudre lr .ekSfï
ÿIalr;d iy f.dkq w;r o;a; fkd.e<mSï" Automated systems help maintain
hdj;ald,Sk lsÍï ixlS¾K lsÍu f,isk's uniformity and accuracy, reducing human
errors and ensuring consistent, reliable
Examples data for better reporting and analysis.
WodyrK iajhxl%Sh moaO;s tAldldß;ajh iy
ksrjoH;djh mj;ajd .ekSug;a" udkj fodaI
1. Inconsistency wju lsÍug;a" jvd fyd| jd¾;dlrKh iy
fkd.e<mSu úYaf,aIKh i|yd ia:djr" úYajdiodhl o;a;
iy;sl lsÍug;a WmldÍ fõ'
2. Duplication in data
o;a; wkqmsgm;a lsÍu Duplication in data
o;a; wkqmsgm;a ùu
3. Human errors and delay in processing
udkj fodaI iy ieliSfï m%udoh Manual data entry frequently results in
duplication, where the same information is
4. Not easily upgradable recorded multiple times, leading to
myiqfjka hdj;ald,Sk l< fkdyels nj confusion and inefficiency. For example,
customer databases may have multiple
entries for the same individual due to
different employees inputting data.
w;ayrq e o;a; we;=<;a lsÍu ks;r ks;r
wkqmsgm;a ùula we;s lrhs" tys§ tlu
f;dr;=re lsym
s j;djla jd¾;d ù"
jHdl+,;ajhg yd wld¾hlaIu;djhg uÕ
mdohs' WodyrKhla f,i" úúO fiajlhska
o;a; we;=<;a lsÍu fya;=fjka mdßfNda.sl
o;a; iuqodhka tlu mqoa.,hd i|yd nyq
m%fõYhka ;sìh yel'
16
ictfromabc.com
Human errors and delay in processing Reduced customer service
udkj fodaI iy ieliSfï m%udoh mdßfNda.sl fiajd wvq lsÍï
17
ictfromabc.com
Infeasibility of applying manual Harmful waste automation
methods where they can be harmful to ydkslr wmøjH iajhxl%ShlrKh
humans
ñksia ðú;j,g wk;=rla we;s úh yels Automated systems in hazardous waste
wjia:dj, § yia; uQ,sl l%u Ndú; l< management safely handle toxic materials,
fkdyels nj minimizing human exposure to risks.
ydkslr wmøjH l<ukdlrKfha iajhxl%Sh
This refers to the need for technical devices moaO;s wdrlaIs;j úI øjH yiqrejhs" ñksiqka
to gather data in environments that are wjodkïj,g ksrdjrKh ùu wju lrhs'
inaccessible or dangerous for human
workers. Robots can efficiently sort and dispose of
fuhska woyia lrkafka udkj fiajlhskg a hazardous substances, enhancing
m%fõY úh fkdyels fyda wk;=reodhl mßir operational safety and compliance with
;=< o;a; /ia lsÍug ;dlaI‚l Wmdx.j, environmental regulations.
wjYH;djhhs' frdfndajrekag wk;=reodhl øjH ld¾hlaIuj
j¾. lsÍu iy neyer lsÍu" fufyhqï
wdrlaIdj jeä ÈhqKq lsÍu iy mdßißl
Automation examples for harmful Jobs fr.=,dis j,g wkql+, ùu'
ydkslr /lshd i|yd iajhxl%ShlrKfha
WodyrK
Autonomous AUVs
1. Harmful Waste Automation
ydkslr wmøjH iajhxl%ShlrKh iajhxl%Sh AUVs
5. Self-Driving Trucks
iajhx-ßhÿre g%la r:
18
ictfromabc.com
Spraying drones Self-driving trucks
biSfï fv%dak iajhx-ßhÿre g%la r:
19
ictfromabc.com
Emergency Broadcast Signals Harmful Radiation
yÈis úldYk ix{d wys;lr úlsrK
Automated systems are used to quickly In environments with high radiation levels,
transmit emergency alerts, such as natural such as nuclear plants or contaminated
disaster warnings or security threats, across areas, automated systems are deployed to
various media platforms like TV, radio, and monitor radiation levels continuously.
mobile devices. kHIaál n,d.dr fyda ¥Is; m%foaY jeks by<
rEmjdyskh s " .=jkaúÿ,sh iy cx.u Wmdx. úlsrK uÜgï iys; mßirj, úlsrK uÜgï
jeks úúO udOH fõÈld yryd iajNdúl úm;a wLKavj ksÍlaIKh lsÍug iajhxl%Sh moaO;s
wk;=re weÕùï fyda wdrlaIl ;¾ck jeks fhdojkq ,efí'
yÈis wk;=re weÕùï blaukska iïfm%aIKh
lsÍug iajhxl%Sh moaO;s Ndú; flfra' These systems can trigger alarms or initiate
protective measures without human
This rapid response reduces the need for presence.
manual intervention and helps ensure fuu moaO;sj,g wk;=re weÕùï Èh;a lsÍug
public safety by alerting communities to fyda ñksiqka fkdue;sj wdrlaIs; mshjrhka
take immediate action. wdrïN lsÍug yelsh'
fuu fõ.j;a m%;spdrh yia; ueÈy;a ùfï
wjYH;djh wvq lrk w;r laI‚l l%shdud¾. To Save Human Lives
.ekSug m%cdjkag wk;=re weÕùfuka uyck ñksia Ôú; .,jd .ekSu ioyd
wdrlaIdj iy;sl lsÍug WmldÍ fõ'
Automation is employed in high-risk
Bad Weather Warnings situations such as bomb disposal, deep-sea
whym;a ld,.=K wk;=re we.ùï exploration, or firefighting to replace
human involvement in dangerous tasks.
Automated weather monitoring systems fndaïn ksIal%Sh lsÍu" .eUqre uqyf
q oa .fõIK
analyze atmospheric data to detect and lsÍu fyda .sks ksùu jeks wjodkï iys;
forecast severe weather, such as tornadoes, wjia:djkay§ s wk;=reodhl ld¾hhka i|yd
hurricanes, and flash floods. ñksiqkaf.a ueÈy;aùu m%;sia:dmkh lsÍug
iajhxl%Sh ld,.=K ksÍlaIK moaO;s iajhxl%ShlrKh fhdod .kS'
fgdfkafvda" iq<s l=Kdgq iy yÈis .xj;=r jeks
oreKq ld,.=K y÷kd .ekSug iy wkdjels
m< lsÍug jdhqf.da,Sh o;a; úYaf,aIKh For Scientific, Space Experiment
lrhs' úoHd;aul" wNHjdldY mÍlaYK ioyd
20
ictfromabc.com
Emergence of ICT era 2. Unlimited Connectivity
f;dr;=re ;dlaIK hq.fha Wodj ksula ke;s iïnkaO;djh
This began in the mid-20th century with the The ICT era has enabled seamless global
invention of the first electronic computers. communication through advancements
fuh 20 jeks ishjfia ueo Nd.fha§ m%:u
úoHq;a mß.Kl fidhd .ekSu;a iuÕ wdrïN like high-speed internet, mobile networks,
úh and satellite connections, allowing instant,
continuous connectivity across distances.
ICT has passed many eras and has become wêfõ.S wka;¾cd," cx.u cd, iy pkaøsld
a need of people in day today tasks. ICT iïnkaO;d jeks ;dlaIKhka yryd ndOdjlska
f;drj f,dalh mqrd laI‚l" wLKav
evolved from computers with large
iïnkaO;dj,g bv i,iñka ICT hq.h
mechanical structures to small handheld f.da,Sh ikakfs õokh il%Sh lr we;'
devices.
f;dr;=re ;dlaIKh úúO hq. miq lrñka
meñK wo jk úg ñksiqkaf.a tÈfkod lghq;=
3. Unlimited Data Access
lsÍu ioyd myiq jk fohla ;rug ÈhqKq ù
we;' b;d úYd, hdka;% j,ska werö myiqfjka wiSñ; o;a; m%fõYh
/f.k hd yels fuj,ï olajd f;dr;=re
;dlaIKh meñK we;' ICT advancements make vast data
accessible anytime, empowering on-
To overcome the drawbacks of manual demand storage, retrieval, and analysis.
methods of data processing IT was f;dr;=re yd ikakf s õok ;dlaIK ÈhqKqj
introduced. IT made the computers do the uÕska úYd, o;a; j,g ´kEu fõ,djl m%fõY
data processing and it led to lesser time úh yels w;r" b,a¨u u; .nvd lsÍu" ,nd
.ekSu iy úYaf,aIKh iún, .kajhs'
consumption, higher accuracy and it solved
the storage issues as well.
yia;uh l%uhkayS miqneiSï uev,Sug
f;dr;=re ;dlaIKh bÈßm;a flreKq w;r 4. Digital Transformation in All Fields
fuys§ o;a; ieliSu mß.Klhg ndrfok ish¨u jiï j, wxls; mßj¾;k
,§' fuu.ska ld,h b;sßùu" ksrjoH;djh
by, hdu fukau o;a; .nvd lsÍfï m%Yk a ho From healthcare and education to
úifok ,§'
manufacturing and finance, digital tools are
reshaping processes, enabling new
1. Global Connectivity (Global Village) business models, and driving innovation
f.da,Sh iïnkaO;djh ^f.da,Sh .u& across industries.
fi!LH fiajd iy wOHdmkfha isg ksIamdokh
iy uq,HlrKh olajd" äðg,a fuj,ï u.ska
• Facilitated by internet, email, social l%shdj,s m%;sk¾
s udKh lsÍu" kj jHdmdr
media, and digital platforms. wdlD;s il%Sh lsÍu iy l¾udka; yryd
wka;¾cd,h" úoHq;a ;emE," iudc udOH kjHlrKhka fufyhjhs'
iy äðg,a fõÈld u.ska myiqlï imhhs'
21
ictfromabc.com
Automated vs. Manual data handling
iajhxl%Sh vs. w;ayr
q e o;a; yeisrùu
Speed Processes large volumes of data Often slow and highly time-
fõ.h rapidly and with high efficiency. intensive to manage.
fõ.fhka iy by< fndfyda úg ukao.dó iy
ld¾hlaIu;djhlska úYd, o;a; l<ukdlrKh lsÍug wêl ld,hla
mßudjla ilihs' jeh fõ'
22
ictfromabc.com
Availability of technologies related to Cloud storage
information retrieval and sharing j,dl=¿ .nvdj
f;dr;=re iuqoaOrKh ^retrieval& yd fnod
.ekSu yd neÿKq ;dlaIKhka ,nd .; yels Cloud storage revolutionizes information
ùu sharing by enabling users to store and
access data remotely via the internet.
The purpose of information retrieval and wka;¾cd,h yryd ÿria:j o;a; .nvd lsÍug
sharing is to provide quick access to data iy m%fõY ùug mßYS,lhskg a yelshdj ,nd
for better decision making and §fuka j,dl=¿ .nvd f;dr;=re fnod.ekSfï
úma,jhla we;s lrhs'
collaboration.
f;dr;=re iuqoaOrKfha iy fnod.ekSfï
wruqK jkafka jvd fyd| ;SrK .ekSu iy This technology allows for easy uploading,
iyfhda.;S djh i|yd o;a; fj; blauka managing, and sharing of files without the
m%fõYh iemhSuhs' need for physical storage.
fN!;sl .nvd lsÍfï wjYH;djhlska f;drj
Examples of info. Retrieval and sharing f.dkq myiqfjka Wvq.; lsÍug"
f;dr;=re iuqoaOrKfha iy fnod.ekSï ioyd l<ukdlrKh lsÍug iy fnod .ekSug fuu
WodyrK ;dlaIKh bv fohs'
23
ictfromabc.com
Collaborative tools Database management systems
iyfhda.S;d fuj,ï o;a; iuqod l<ukdlrK moaO;s
Advantages Disadvantages
24
ictfromabc.com
Computer networks 2. Peer-to-Peer (P2P) Model
mß.Kl cd, iu-iu wdlD;sh
Computer networks are systems that In the peer-to-peer model, every device
connect multiple computers and hardware (called a peer) on the network can act as
components using communication media both a client and a server.
and devices. iu iu wdlD;sfha§" cd,fha we;s iEu
mß.Kl cd, hkq ikakf s õok udOH iy Wmdx.hlgu ^peer f,i ye¢kafjk&
Wmdx. Ndú;fhka nyq mß.Kl iy oDvdx. fiajd,dNsfhl= iy fiajdodhlfhl= hk
ixrpl iïnkaO lrk moaO;shla fõ' fowdldrfhkau l%shd l< yel'
The purpose of computer networks is to
Each peer can share its own resources
enable communication, data sharing, and
directly with other peers.
resource access among interconnected
iEu peer computer tllgu ;ukaf.au
devices.
mß.Kl cd, j, wruqK jkafka wka;¾ iïm;a fjk;a peer computers iu.ska
iïnkaê; Wmdx. w;r ikakf s õokh" o;a; iDcqju fnod .; yelsh'
yqjudre lsÍu iy iïm;a m%fõYh il%Sh
lsÍuhs' All peer computers are considered equal.
ish¨u peer computers iudk f,i i,lkq
,efí'
Classification of networks by structure
jHQyh wkqj cd, j¾. lsÍu
Classification of networks by distribution
1. Client-Server Model úisÍu wkqj cd, j¾. lsÍu
fiajd,dNS-fiajdodhl wdlD;sh
LAN (Local Area Network)
In the client-server model, communication A LAN is used to connect devices in a small
takes place between two types of devices: geographic area, like a home, office, or
clients and servers. building.
fiajd,dNS-fiajdodhl wdlD;sh ;=<" Wmdx. ksjila" ld¾hd,hla fyda f.dvke.s,a,la jeks
j¾. folla w;r ikakf s õokh isÿ fõ( l=vd N+f.da,Sh m%foaYhl Wmdx. iïnkaO
tAjdkï fiajd,dNshd iy fiajdodhlhd fõ' lsÍug LAN Ndú;d lrhs'
25
ictfromabc.com
The Internet The services provided by the Internet
wka;¾cd,h wka;¾cd,h u.ska imhk fiajd
26
ictfromabc.com
3. Video Conferencing 5. Telnet
ùäfhda iïuka;%K Telnet allows users to remotely access
another computer or server over the
Video conferencing supports live, internet as if they were directly connected.
interactive virtual meetings, allowing real- Telnet mßYS,lhskag Tjqka iDcqju
time collaboration and engagement iïnkaO ù we;s wdldrhg
among participants over the internet. wka;¾cd,h yryd fjk;a
iyNd.sjkakka w;r ;;H ld,Sk mß.Klhlg fyda fiajdodhlhlg
iyfhda.; S djhg iy ikakf
s õokhg ÿria:j m%fõY ùug bv i,ihs'
wka;¾cd,h yryd bv i,iñka úãfhda
iïuka;%K iÔù" wka;¾l%h s dldÍ w;:H
/iaùï i|yd iyh olajhs' 6. File Sharing
f.dkq yqjudrej
Requirements for a video conference File sharing enables users to share
ùäfhda iïuka;%Khla i|yd wjYH;d documents, media, and other data with
To conduct a video conference, each others online.
participant needs a camera and f.dkq yqjudrej uÕska mßYS,lhskag
microphone for audio and video input, a f,aLk" udOH iy fjk;a o;a;
screen and speaker for output, an internet wka;¾cd,h yryd wka wh iuÕ
connection, and video conferencing fnod .ekSug yelshdj ,efí'
software like Zoom or Google Meet. Ex. Google Drive, Dropbox, and peer-to-
ùäfhda iïuka;%Khla meje;aùu i|yd" iEu
iyNd.sjkafkl=gu Y%jH iy oDYH wdodkh peer networks
i|yd leurdjla iy uhsl%f*dakhla" m%;sodkh
i|yd ;srhla iy iamSlrhla" wka;¾cd, 7. Internet Relay Chat (IRC)
iïnkaO;djla iy Zoom fyda Google Meet IRC is a text-based chat service allowing
jeks ùäfhda iïuka;%K uDÿldx.hla wjYH users to participate in real-time group
fõ' discussions in chat rooms or private
conversations.
Both participants need these components
IRC hkq mßYS,lhskg a chat rooms j, fyda
for effective communication. mqoa.,sl ixjdoj, ;;H ld,Sk lKavdhï
M,odhS ikakf s õokh i|yd iyNd.sjkakka idlÉPdj,g iyNd.S ùug bv i,ik fm<-
fofokdgu fuu ixrpl wjYH fõ' mdol l;dnia fiajdjls'
27
ictfromabc.com
World Wide Web (WWW) Hypertext Transfer Protocol (HTTP)
f,dal úisß úhuk
HTTP is a set of rules that governs the
The World Wide Web (WWW) is a system exchange of files like text, images, sound,
of interlinked web pages accessible over and video, ensuring that data transfers
the internet, allowing users to view and smoothly over the WWW.
interact with information through web HTTP hkq WWW yryd iqug f,i o;a;
browsers. yqjudre jk nj iy;sl lrk fm<" rEm" Y%jH
f,dal úisß úhuk (WWW) hkq mßYS,lhskg a iy ùäfhda jeks f.dkq yqjudrej md,kh
fjí w;ßlaiq yryd f;dr;=re ne,Sug bv lrk kS;s ud,djls'
i,ik wka;¾cd,h yryd m%fõY úh yels
wka;¾ iïnkaê; fjí msgq moaO;shls' Hyperlinks
wê ine¢
The WWW was invented by British scientist
Tim Berners-Lee in 1991. Hyperlinks are clickable elements in
f,dal úisß úhuk 1991 § ì%;dkH úoHd{ Tim documents that connect different web
Berners-Lee in 1991 úiska fidhd .kakd ,§' pages or resources, forming the structural
links between various pieces of content on
WWW.
wê ineÈ hkq WWW ys úúO wka;¾.;
fldgia w;r jHqyd;aul iïnkaO;d idoñka
úúO fjí msgq fyda iïm;a iïnkaO lrk
f,aLkj, we;s la,sla l< yels uQ,dx. fõ'
Web pages
fjí msgq
28
ictfromabc.com
Websites Web browsers
fjí wvú fjí w;ßlaiq
Parts of a URL
29
ictfromabc.com
Mobile communication 3. Full-Duplex transmission
cx.u ikaksfõokh mQ¾K oaùm: iïfm%aIKh
30
ictfromabc.com
Mobile computing Types of cloud computing services
cx.u mß.Kkh j,dl=¿ mß.Kk fiajd j¾.
Mobile computing is a technology that Cloud computing has three service models
allows data, voice, and video transmission based on control and management. One
via wireless devices without a fixed model provides essential computing
connection. resources, another offers a development
cx.u mß.Kkh hkq ia:djr platform, and the third delivers software
iïnkaO;djhlska f;drj /yeka rys; Wmdx. applications online.
yryd o;a;" y~ iy ùäfhda iïfm%aIKhg bv j<dl=¿ mß.Kkh iy l<ukdlrKh u;
i,ik ;dlaIKhls' mokï jQ fiajd wdlD;s ;=kla we;' tla
wdlD;shla w;HjYH mß.Kl iïm;a imhhs"
Ex : Mobile Banking, Social Media, GPS ;j;a tlla ixj¾Ok fõÈldjla ,nd fohs"
f;jkqj uDÿldx. fhÿï wka;¾cd,h yryd
Cloud computing ,nd fohs'
j,dl=¿ mß.Kkh
1. Infrastructure as a Service (IaaS)
Cloud computing is the delivery of fiajdjla f,i há;, myiqlï
computing services, such as applications,
2. Platform as a Service (PaaS)
data storage, and processing power, over fiajdjla f,i miq;,
the Internet from remote servers.
j,dl=¿ mß.Kkh hkq ÿria: fiajdodhl 3. Software as a Service (SaaS)
j,ska wka;¾cd,h yryd fhÿï" o;a; .nvd fiajdjla f,i uDÿldx.
lsÍï iy ieliqï n,h jeks mß.Kk fiajd
iemhSuhs'
Infrastructure as a Service (IaaS)
fiajdjla f,i há;, myiqlï
31
ictfromabc.com
Users can rent servers, storage, networking Data storage and backup
and processing power which eliminates the o;a; .nvd lsÍu iy Wmia: lsÍu
need for physical hardware and allows for
quick scaling based on demand. Allows organizations to securely store and
mßYS,lhskg a fiajdodhlhka" .nvd lsÍu back up their data in the cloud, minimizing
,cd,lrKh iy ieliqï n,h l=,shg .; the risks associated with local storage
yels w;r tuÕska fN!;sl oDvdx. failures.
wjYH;djh bj;a lrk w;r b,a¨u u; wdh;kj,g Tjqkf a .a o;a; j,dl=f<ys
mokïj blauka mßudKhg bv i,ihs' wdrlaIs;j .nvd lsÍug iy Wmia: lsÍug
bv i,ihs" foaYh S .nvd wid¾:lùï yd
Applications of IaaS iïnkaO wjodkï wju lrhs'
IaaS ys fhÿï
This solution provides scalability, ensuring
1. Web Hosting that data can be easily expanded as
fjí i;aldrl;ajh needed, while also offering redundancy to
protect against data loss.
2. Data Storage and Backup fuu úi÷u úYd,kh ,nd fohs" wjYH mßÈ
o;a; .nvd lsÍu iy Wmia: lsÍu o;a; myiqfjka mq¿,a l< yels nj iy;sl
lrk w;ru o;a; ke;sùfuka wdrlaId ùug
3. Big Data Analytics Wmia:hla o (Backup) ,nd fohs'
úYd, o;a; úYaf,aIKh
32
ictfromabc.com
Platform as a Service (PaaS) Application development
fiajdjla f,i miq;, fhÿï ixj¾Okh
Multi-platform development
nyq fõÈld ixj¾Okh
33
ictfromabc.com
Software as a Service (SaaS) CRM software
fiajdjla f,i uDÿldx. CRM uDÿldx.h
Email
úoHq;a ;eme,
34
ictfromabc.com
Accounting tools Office packages
.sKqïlrK fuj,ï ld¾hd, meflac
SaaS accounting tools facilitate real-time Office packages are offered as cloud-based
financial tracking, invoicing, and reporting, software suites that provide essential
enabling businesses to manage their productivity tools, such as word processing,
finances more effectively. spreadsheets, presentations, and email
SaaS .sKqïlrK fuj,ï ;:H ld,Sk uQ,H management.
¨yqne£u" invoice lsÍu iy jd¾;d lsÍu ld¾hd, meflac msßkukq ,nkafka joka
i|yd myiqlï imhk w;r" jHdmdrj,g ieliSu" me;=reïm;a" bÈßm;a lsÍï iy
Tjqkfa .a uQ,H l<ukdlrKh jvd;a M,odhS Bfï,a l<ukdlrKh jeks w;HjYH
f,i lsÍug yels fõ' M,odhs;d fuj,ï imhk j,dl=¿ u; mokï
jQ uDÿldx. lÜg, f,ih'
Automation of routine tasks reduces errors
and saves time. This allows companies to These packages, like Microsoft 365 or
gain better insights into their financial Google Workspace, are accessed via the
health, aiding in informed decision-making internet, eliminating the need for local
and long-term planning. installations or traditional licensing models.
idudkH ld¾hhka iajhxl%Sh lsÍu fodaI wvq Microsoft 365 fyda Google Workspace jeks
lrk w;r ld,h b;sß lrhs' fuh fuu meflac" foaYh S ia:dmkhka fyda
iud.ïj,g Tjqkf a .a uQ,H fi!LHh ms<sn| iïm%odhsl n,m;% wdlD;s i|yd wjYH;djh
jvd fyd| wjfndaOhla ,nd .ekSug bv bj;a lrñka wka;¾cd,h yryd m%fõY ùu
i,ihs" oekqj;a ;SrK .ekSug iy È.= ld,Sk ioyd bv i,ihs '
ie,iqï lsÍug WmldÍ fõ'
Web conferencing
fjí iïuka;%K
35
ictfromabc.com
Cloud Computing Advantages Cloud Computing Disadvantages
Aspect
j<l=¨ mß.Kkfha jdis j<l=¨ mß.Kkfha wjdis
36
ictfromabc.com
Building an abstract model of Examples:
information and evaluating its
compatibility with information and School system
communication technology
f;dr;=re ks¾udKh lsÍfï úhqla; wdlD;shl • Boundary: Physical or conceptual line
f.dvk.d f;dr;=re iy ikaksfõok that defines the entire scope of the
;dlaIKh iu. tys wkql+,;dj we.hSu
school.
mdif,a iuia; m:hu ks¾jpkh lrk
fN!;sl fyda ixl,amSh fraLdj'
Systems
moaO;s • Inputs: Students, teachers, textbooks,
digital resources, and funding.
A system is a set of interconnected isiqka" .=rejreka" fm<fmd;a" äðg,a
components that works together to iïm;a iy wruqo,a'
achieve a specific goal.
moaO;shla hkq ksYÑa ; b,lalhla imqrd .ekSu • Outputs: Graduates with knowledge,
i|yd tlg l%shd lrk wka;¾ iïnkaê; skills, and qualifications.
fldgia iuQyhls' oekqu" l=i,;d iy iqÿiqlï iys;
WmdêOdÍka$YsIHhka'
Boundaries
iSud udhsï • Feedback: Academic performance
A system has boundaries that define its data, teacher and parent evaluations,
limits and separate it from its environment. and student progress.
moaO;shlg tys iSudjka ks¾jpkh lrk iy wOHhk ld¾h idOk o;a;" .=rejrhd iy
tys mßirfhka th fjka lrk udhsï we;' udmsh we.hSï" iy YsIH m%.;sh'
Inputs
fhojqï Vehicles
A system receives inputs from its
environment, which are the resources or • Boundary: Includes the physical
information it needs to function. structure of the vehicle, including its
moaO;shla l%shd;aul ùug wjYH iïm;a fyda
f;dr;=re jk tys mßirfhka fhojqï ,nd engine, body, and onboard systems.
.kS' jdykfha tkaðu" peish iy wNHka;r
moaO;s we;=¿j tys fN!;sl jHqyh
we;=<;a fõ'
Outputs
m%;sodk
• Inputs: Fuel or electricity, the driver,
A system produces outputs, which are the
navigation commands, and road
results or products of its activities.
moaO;shla tys l%shdldrlïj, m%;sM, fyda signals.
ksIamdok jk m%;sodkhka ksIamdokh lrhs' bkaOk fyda úÿ,sh" ßhÿre" Odjk úOdk
iy ud¾. ix{d'
Feedback
m%;sfmdaIK • Outputs: Movement of the vehicle,
A system uses feedback to monitor its reaching destinations.
jdykfha p,kh" .ukdka; fj; <Õd ùu'
performance and make adjustments as
needed.
moaO;shla tys l%shdldß;ajh ksÍlaIKh • Feedback: Speedometer readings, fuel
lsÍug iy wjYH mßÈ .e,mSï lsÍug levels, GPS updates, and sensor data for
m%;sfmdaIK Ndú;d lrhs' performance adjustments.
iamSfvdaógr lshùï" bkaOk uÜgï" ^GPS&
hdj;ald,Sk" iy ld¾h idOk .e,mqï
i|yd ixfõol o;a;'
37
ictfromabc.com
Abstract model of information. Relating the abstract model into an
f;dr;=re j, jHqla; wdlD;sh information system
úhqla; wdlD;sh f;dr;=re moaO;shlg wod<
Abstract model is an easy way to describe lsÍu
the general process of how information
comes as the output. What is an Information System?
jHqla; wdlD;sh hkq m%;sodkh f,i ,efnk f;dr;=re moaO;shla hkq l=ulao@
wdldrh ms<sn| idudkH l%shdj,sh úia;r
lsÍug myiq l%uhls' An information system (IS) is a system that
takes data as inputs, processes them, and
Input, Process, Output are the main parts of outputs as information.
abstract model. f;dr;=re moaO;shla (IS) hkq o;a; wdodk
wdodkh" l%shdj,sh" m%;sodkh úhqla; f,i f.k" tAjd ilid f;dr;=re f,i
wdlD;sfha m%Odk fldgia fõ' m%;sodkh lrk moaO;shls'
Input Output
wdodkh
The system delivers the final product as a
Input can contain raw materials that we report, presentation or as an document.
used to create the information. moaO;sh wjika ksIamdokh jd¾;djla" bÈßm;a
f;dr;=re ks¾udKh lsÍug wm Ndú;d l< foa lsÍula fyda f,aLkhla f,i ,nd fohs'
wdodkfha wvx.= úh yel'
Processing
ieliqï l%shdj,sh
Output
m%;sodkh
38
ictfromabc.com
Relating the abstract model into a The functions of a digital computer align
computer system closely with the Abstract Model of
úhqla; wdlD;sh mß.Kl moaO;shlg wod< Information.
lsÍu wxls; mß.Klhl ld¾hhka f;dr;=re j,
úhqla; wdlD;sh iuÕ iómj iumd; fõ'
Input
Computers gets data through various input There are five steps.
devices like keyboards, scanners, cameras, mshjr myla we;'
and sensors.
h;=remqjre" ialEk¾" leurd iy ixfõol 1. Takes data as input
jeks úúO wdodk Wmdx. yryd mß.Kl o;a; o;a; wdodkh f,i .kS
,nd .kS'
2. Stores the data/instructions in its
Processing memory and uses them as required
o;a;$Wmfoia tys u;lfha .nvd lr
The Central Processing Unit (CPU) of a wjYH mßÈ Ndú;d lrhs
computer acts as the brain of the computer,
performing calculations, manipulating data 3. Processes the data and converts it into
based on instructions. useful information
mß.Klfha uOHu ieliqï tAllh .Kkh o;a; ilia lr th m%fhdackj;a f;dr;=re
lsÍï isÿ lsÍu" Wmfoia u; mokïj o;a; njg mßj¾;kh lrhs
yeisrùu isÿ lrhs'
4. Generates the output
m%;sodkh W;amdokh lrhs
Output
Computers outputs data through monitors, 5. Controls all the above four steps
by; mshjr y;ru md,kh lrhs
printed with printers, or stored on storage
devices for future usage.
o;a; m%;sodkh lsÍu mß.Kl ;srh yryd " In summary, a digital computer's functions
uqøK hka;% iuÕ uqøKh" fyda wkd.; of data input, storage, processing, and
Ndú;h i|yd .nvd Wmdx.j, .nvd lsÍu output are intricately intertwined with the
u.ska isÿ lrhs' Abstract Model of Information.
idrdxYhla f,i" o;a; wdodkh" .nvd lsÍu"
Here are some uses of Abstraction model. ieliSu iy m%;sodkh hk ixLHdxl
jHqla; wdlD;sh Ndú;hka lsyms hla my; mßÈ mß>klfha l%shdldÍ;ajh f;dr;=re j,
fõ' úhqla; wdlD;sh iuÕ ixlS¾K f,i ne£
we;'
• Analyzing the flow of information.
f;dr;=re .,dhdu úYaf,aIKh lsÍu' This model emphasizes the flow and
transformation of data through different
• Simplify complex systems by breaking
stages to produce useful information and
them down into smaller, more
outputs.
manageable parts. fuu wdlD;sh m%fhdackj;a f;dr;=re iy
ixlS¾K moaO;s l=vd" jvd;a m%;sodkhka ksIamdokh lsÍu i|yd úúO
l<ukdlrKh l< yels fldgia j,g wjëka yryd o;a; .,dhdu iy mßj¾;kh
leãu u.ska ir, lsÍu' lsÍu wjOdrKh lrhs'
39
ictfromabc.com
Basic Components of a Computer NOTE:
System In addition to those types of hardware, a
mß.Kl moaO;shl uQ,sl ixrpl computer system contains a circuit board
known as the motherboard, which connects
Computer systems consist of several core all hardware components to each other.
components that work together to process, tu j¾.fha oDVdx. j,g wu;rj" mß.Kl
store, and manage information. moaO;shl ujq mqjrej f,i ye¢kafjk mßm:
mß.Kl moaO;s f;dr;=re ieliSug" .nvd mqjrejla wvx.= jk w;r th ish¨u oDvdx.
lsÍug iy l<ukdlrKh lsÍug tlaj l%shd ixrpl tlsfkl iïnkaO lrhs'
lrk uQ,sl fldgia lsyms hlska iukaú; fõ'
Input Devices
These components can be grouped into wdodk Wmdx.
four main categories:
fuu ixrpl m%Odk ldKav y;rlg Input devices are essential components of
ldKav.; l< yelsh( computer systems that allow users to
interact with and provide data to
• Hardware computers.
oDVdx. wdodk Wmdx. hkq mß.Kl moaO;sj,
w;HjYH ixrpl jk w;r tuÕska
• Software mßYS,lhskg a mß.Kl iuÕ wka;¾ l%shd
uDÿldx. lsÍug iy o;a; iemhSug bv i,ihs'
• Firmware
iaÓrdx.
• Liveware
ðjdx.
Hardware
oDVdx.
40
ictfromabc.com
• Pointing Devices • Microphone
fhduq lsÍfï Wmdx. uhsl%f*dakh
Pointing devices are used to control the A microphone captures sound waves
cursor on the screen, providing an and converts them into digital audio,
intuitive way to interact with the allowing users to record voice or
graphical user interface (GUI). interact with voice-enabled
Ñ;%l mßYS,l w;=reuqyK q ; (GUI) iuÕ applications.
wka;¾ l%shd lsÍug nqoaêuh l%uhla uhsl%f*dakhla Yío ;rx. .%yKh lr
imhk ;srh u; l¾irh md,kh lsÍug tAjd äðg,a Y%jH njg mßj¾;kh lrhs"
fhduq lsÍfï Wmdx. Ndú;d lrhs' mßYS,lhskg a y~ má.; lsÍug fyda y~
Examples: Mouse, Trackball, Lightpen, il%Sh fhÿï iuÕ wka;¾ l%shd lsÍug bv
joystick, touchscreen, trackpad. i,ihs'
• Scanners
ialEk¾ • Biometric Devices
ffcjñ;sl Wmdx.
Scanners convert physical documents
and images into digital formats for Capture unique biological data for
editing, storage, and sharing. identification or authentication.
ialEk¾ uÕska fN!;sl f,aLk iy rEm y÷kd .ekSu fyda i;Hdmkh i|yd wkkH
ixialrKh" .nvd lsÍu iy fnod.ekSu Ôj úoHd;aul o;a; .%yKh lr .kS'
i|yd äðg,a wdlD;s njg mßj¾;kh
lrhs' Examples
Examples: Flatbed Scanner, OCR, OMR, Fingerprint scanner, iris scanner, facial
MICR, 3D scanner, QR code scanner, recognition
barcode scanner,
• Cameras
leurd
• Sensors
ixfõol
41
ictfromabc.com
Output Devices Visual outputs can be divided into two
m%;sodk Wmdx. types
oDYH m%;sodkh j¾. follg fnÈh yelsh
Output devices enable the computer to
present processed data to the user in visual Hard copy Soft copy
oDv msgm;a uDÿ msgm;a
and audio formats.
m%;sodk Wmdx. uÕska mß.Klhg ieliQ
o;a; oDYH iy Y%jH wdlD;sj,ska mßYS,lhdg
bÈßm;a lsÍug yelshdj ,efí' Hard Copy Devices
oDV msgm;a Wmdx.
Examples
Printers
Impact printers (dot matrix, line printer)
Non-impact printers (laser, inkjet printer)
Plotters
42
ictfromabc.com
Audio Output 1. Primary Storage
Y%jH m%;sodk m%d:ñl wdphkh
Audio output devices are hardware Primary storage, also known as main
components that convert digital audio memory, is directly accessible by the CPU
signals from a computer into sound, and plays a vital role in the system’s speed
allowing users to hear music, sounds, or and performance.
speech. m%Odk u;lh f,io ye¢kafjk m%d:ñl
Y%jH m%;sodk Wmdx. hkq mß.Klhlska wdphkh CPU uÕska iDcqju m%fõY úh yels
äðg,a Y%jH ix{d Yíoh njg mßj¾;kh w;r moaO;sfha fõ.h iy l%shdldÍ;ajh
lrk oDVdx. ixrpl jk w;r mßYS,lhskg a i|yd jeo.;a ld¾hNdrhla bgq lrhs'
ix.S;h" Yío fyda l:kh weiSug bv i,ihs'
It stores data and instructions that the CPU
Examples: Speaker, Headphone. needs allowing quick access.
th CPU wjYH jk o;a; iy Wmfoia .nvd
lr blauka m%fõYhg bv i,ihs'
Storage Devices
.nvd Wmdx. • Volatile Memory
kYH u;lh
Storage devices provide a way to save data,
both temporarily and permanently. Volatile memory requires continuous
.nvd Wmdx. ;djld,slj iy iaÓrj o;a; power to retain data, making it
iq/lSug ud¾.hla imhhs' essential for temporary storage tasks.
kYH u;lhg o;a; r|jd .ekSug wLKav
Storage can be categorized into Primary n,hla wjYH jk w;r th ;djld,sl
Storage and Secondary Storage, each .nvd lsÍfï ld¾hhka i|yd w;HjYH
fõ'
serving a distinct purpose in data
Examples: RAM, Cache, Registers.
processing and retrieval.
.nvdj m%d:ñl wdphkh iy oaú;Shsl
wdphkh f,i j¾. l< yels w;r" tA iEu
tllau o;a; ieliSfï§ iy ,nd .ekSfï§ • Non-volatile Memory
fjku wruqKla bgq lrhs' kYH fkdjk u;lh
43
ictfromabc.com
2. Secondary Storage Secondary Storage is categorized into
oaú;shsl wdphkh three main types
oaú;shsl wdpdhkh m%Odk j¾. ;=klg j¾.
Secondary storage provides long-term flfra
data storage, retaining files and programs
even when the computer is powered off. • Optical Storage
oaú;Shsl wdphkh È.=ld,Sk o;a; .nvd m%ldY wdphkh
lsÍu" mß.Klh l%shd úrys; jQ úg mjd f.dkq
iy jevigyka r|jd ;nd .ekSu imhhs' Optical storage uses lasers to read and
write data, making it ideal for media
It is generally slower than primary storage files and software distribution.
but offers significantly larger capacity. m%ldY wdphkh o;a; lshùug iy ,sùug
th idudkHfhka m%d:ñl .nvdjg jvd f,ai¾ Ndú;d lrhs" th udOH f.dkq iy
ukao.dó kuq;a ie,lsh hq;= ;rï úYd, uDÿldx. fnod yeÍu i|yd jvd;a iqÿiq
Odß;djla ,nd fohs' fõ'
Examples
HDD, Magnetic Disk, Floppy Disk.
• Flash Storage
iefK,s wdphkh
Examples
USB, SSD, SD Card, etc.
44
ictfromabc.com
Processing devices Networking devices
ieliqï Wmdx. cd,lrKh Wmdx.
45
ictfromabc.com
Software Operating Systems
uDÿldx. fufyhqï moaO;s
It can be categorized into two main types: It serves as an intermediary between users
system software and application software. and the computer hardware, enabling the
th m%Odk j¾. follg j¾. l< yel( execution of application software.
moaO;s uDÿldx. iy fhÿï uDÿldx. th fhÿï uDÿldx. l%shd;aul lsÍu il%Sh
lrñka mßYS,lhka iy mß.Kl oDvdx.
w;r w;rueÈfhl= f,i l%shd lrhs'
Examples: Windows, Linux, macOS, etc.
Utility Software
Wmfhda.s;d uDÿldx.
46
ictfromabc.com
Application Software • Free and Open-Source Software
fhÿï uDÿldx. ksoyia iy újD; uQ,dY% uDÿldx. (FOSS)
47
ictfromabc.com
• Shareware Firmware
iaÓrdx.
Shareware is a type of proprietary
software that is distributed for free on a Firmware is specialized software installed
trial basis, often with limited directly on hardware components. It
functionality or a time limit. enables the hardware to communicate
Shareware hkq fndfyda úg iSñ; effectively with other system components.
l%shdldÍ;ajhla fyda ld, iSudjla iys;j iaÓrdx. hkq oDVdx. ixrpl u; iDcqju
w;ayod ne,Sfï mokula u; fkdñf,a ia:dmkh lr we;s úfYaIs; uDÿldx.hls' th
fnod yßk ysñldr uDÿldx.hls' wfkl=;a moaO;s ixrpl iuÕ M,odhS f,i
ikakfs õokh lsÍug oDVdx. il%Sh lrhs'
Users are encouraged to purchase the
full version after the trial period. Firmware is typically stored in non-volatile
w;ayod ne,Sfï ld, iSudfjka miq memory, which retains data even when the
iïmQ¾K wkqjdoh ñ,§ .ekSug power is turned off. Some of the common
mßYS,lhska Wkkaÿ lrkq ,efí' storage locations for firmware are ROM,
EEPROM, Flash memory, BIOS/UEFI Chips
Examples: WinRAR, Norton Antivirus, 7- etc.
Zip, etc. iaÓrdx. idudkHfhka .nvd lr we;af;a kYH
fkdjk u;lfha jk w;r th n,h wl%sh jQ
• Cloud-Based Software (SaaS) úg mjd o;a; r|jd .kS' iaÓrdx. i|yd fmdÿ
j,dl=¿ u; mokï jQ uDÿldx. .nvd ia:dk lsym s hla jkafka ROM"
EEPROM" iefK,s u;lh" BIOS/UEFI Ñm
Software as a Service (SaaS) is a cloud- hkdÈhhs'
based software delivery model where
applications are hosted on remote In a computer system, there are several
servers and accessed via the internet. main types of firmware:
fiajdjla f,i uDÿldx. (SaaS) hkq mß.Kl moaO;shl" iaÓrdx. m%Odk j¾.
j,dl=¿ u; mokï jQ uDÿldx. fnod lsysmhla ;sfí(
yeÍfï wdlD;shls" tys§ fhÿï ÿria:
fiajdodhlhka u; i;aldrl;ajh imhk • BIOS
w;r wka;¾cd,h yryd m%fõY fõ' • UEFI
• Embedded Firmware
Users typically pay a subscription fee ldjeoa¥ iaÓrdx.
for access.
mßYS,lhka idudkHfhka m%fõYh i|yd
odhl .dia;=jla f.jhs' BIOS (Basic Input/Output System)
BIOS ^uQ,sl wdodk$m%;sodk moaO;sh&
Examples: Google Workspace,
Dropbox, etc. The first software that runs when a
computer is powered on. It initializes and
tests the hardware components and loads
the operating system from the storage
device.
mß.Klhla l%shd;aul jQ úg l%shd;aul jk
m<uq uDÿldx.h' th oDvdx. ixrpl wdrïN
lr mÍlaId lr .nvd Wmdx.fhka fufyhqï
moaO;sh mQrKh lrhs'
48
ictfromabc.com
UEFI (Unified Extensible Firmware Liveware
Interface) Ôjdx.
A modern replacement for BIOS, UEFI offers Liveware refers to the human component in
more features, such as faster boot times, computing, emphasizing the role of users
support for larger hard drives, and a and IT personnel.
graphical user interface. Ôjdx. hkafkka woyia lrkafka mß>klfha
udkj ixrplh" mßYS,lhskf
a .a iy
BIOS i|yd kùk wdfoaYlhla jk UEFI f;dr;=re ;dlaIK ld¾h uKav,fha
fõ.j;a werUqï fõ,djka" úYd, oDV ;eá ld¾hNdrh wjOdrKh lrhs'
i|yd iyh iy Ñ;%l mßYS,l w;=reuqyK q ;
jeks ;j;a úfYaIdx. ,nd fohs'
Examples of liveware
ðjdx. WodyrK
It also supports secure boot to prevent
unauthorized software from running • End Users
during startup. wjika mßYS,lhka
th wdrïNfha§ wkjir uDÿldx. l%shd;aul
ùu je,elaùu i|yd wdrlaIs; werUqï i|yd • System Administrators
iyh olajhs' moaO;s mßmd,lhska
49
ictfromabc.com
Role of Human Operators in ICT-Enabled • Decision-Making
Information Systems ;SrK .ekSu
ICT-il%Sh f;dr;=re moaO;sj, udkj
l%shdlrejkaf.a N+ñldj Operators interpret data and analyze
trends, playing a crucial role in
In the context of ICT-enabled information informed decision-making processes.
systems, liveware plays a crucial role in l%shdlrejka o;a; w¾: ksrEmKh lsÍu
ensuring the effectiveness, efficiency, and iy m%jK;d úYaf,aIKh lsÍu" oekqj;a
;SrK .ekSfï l%shdj,Skays ;SrKd;aul
overall success of these systems. ld¾hNdrhla bgq lrhs'
ICT-il%Sh f;dr;=re moaO;sj, ikao¾Nh ;=<"
iÔù uDÿldx. fuu moaO;sj, iM,;djh"
• Adaptation and Change
ld¾hlaIu;dj iy iuia; id¾:l;ajh
iy;sl lsÍfï§ ;SrKd;aul ld¾hNdrhla bgq Management
lrhs' wkqj¾;kh iy fjkia l<uKdlrKh
50
ictfromabc.com
Analyzes the stages of data processing Data verification
o;a; ieliSfï mshjr úYaf,aYKh lrhs o;a; i;Hdmkh
Data gathering
Presenting processed data in usable or
o;a; /ia lsÍu
interpretable formats.
Collecting raw data from various sources. ieliQ o;a; Ndú; l< yels wdlD;sj,ska
úúO uQ,dY%j,ska wuq o;a; /ia lsÍuhs' bÈßm;a lsÍuhs'
If there is not gathered data, this step is Output of processed data is carried out
required. when communication is needed.
/ia lr .kakd ,o o;a; fkdmj;Skï fuu ikakf s õokh wjYH jQ úg ieliQ o;a;
wÈhr wksjdrfhkau isÿ l, hq;= fõ' m%;sodkh flfra'
Devices:
Data validation
o;a; j,x.=lrKh Monitor, Printer, Touch Screen, Speaker
51
ictfromabc.com
Data gathering methods
o;a; tla /ia lr.ekSfï úê
52
ictfromabc.com
Manual methods Types of interviews
ldhsl úê
• One to one interview
1.Interviews tlsfkld w;r iïuqL mÍlaIKh
iïuqL idlÉPd
• Group interview
lKavdhï iïuqL mÍlaIKh
A conversation between two parties where
one asks questions, and the other answers o One interviewer, group of
them is known as an interview. respondents
tla wfhl= m%Yk
a wik" wfkld tAjdg ms<s;=re m%;spdr olajkakka lsym
s fofkla iy
imhk" md¾Yaj folla w;r isÿjk ixjdohla m%Yk
a wikakka tla wfhla
iïuqL idlÉPdjla f,i ye¢kafõ'
• Panel interview
Advantages uKav, iïuqL mÍlaIKh
o Group of interviewers, one
• Allows for gathering of detailed info.
iúia;rd;aul f;dr;=re /ia lsÍug bv respondent
i,ihs' m%;spdr olajkakka tla wfhla iy
m%YK
a wikakka lsym s fofkla
• Can adapt questions based on
• Face-to-face interview
respondents’ answers. uqyK
q g uqyK
q iïuqL mÍlaIKh
m%;spdr olajkakkaf.a ms<s;=re u;
mokïj m%Yk a wkqj¾;kh l< yelsh'
• Telephone interview
ÿrl:k iïuqL mÍlaIKh
• Interviewers can clarify questions or
responses. • Online interview
iïuqL mÍlaIlhskg a m%Yk a fyda m%;spdr ud¾..; iïuqL mÍlaIKh
meyeÈ,s lr .; yel'
• Structured interview
Disadvantages jHqy.; iïuqL mÍlaIKh
53
ictfromabc.com
2. Observations 3. Questionnaires
ksÍlaIK m%IaKdj,Ska
Advantages Advantages
• Provides detailed data based on real- • Can be distributed to many
world settings. participants.
i;H ieliqï u; mokïj iúia;rd;aul iyNd.sjkakka /ila fj; tljr fnod
o;a; imhhs' yeßh yel
• Allows for the study of actual behavior
rather than reported behavior. • Less resource and time consuming.
jd¾;d lrk ,o yeisÍï j,g jvd ienE iïm;a yd ld,h kdia;s ùu wvqh'
yeisÍï wOHkh lsÍug bv i,ihs'
• May yield more honest responses.
Disadvantages jvd;a wjxl m%;spdr ,eìh yelsh'
54
ictfromabc.com
For further reference Semi-automated methods
w¾O iajhxlD; úê
Sample document collection
,shú,s /ialsÍu • Magnetic ink character recognition
pqïNl ;Sk;a wkq,laIK lshjkh
Referring and analyzing the documents • Optical mark reader
and books related to the data gathering m%ldY i,l=Kq lshjkh
field.
o;a; /ia lrkd lafIa;%hg wod, ,shú,s iy • Optical character reader
fmd;a mßYS,kh lsÍu iy úYaf,aIKh m%ldY wkq,laIK lshjkh
lsÍuhs' • Barcode card reader
Barcode ldâm;a lshjkh
Advantages
• RFID
• Less expensive as resources already
exist. • NFC
iïm;a oekgu;a mj;sk neúka úhou • Smart card reader
wvqh'
• Provides access to historical data and These devices will be discussed under 2.2
long-term trends. category in Lesson 2.
ft;sydisl o;a; iy È.=ld,Sk m%jk;d fuu Wmdx. 2 jk mdvfï 2'2 ldKavh hgf;a
i|yd m%fõYh imhhs' idlÉPd flfra'
Disadvantages
Fully automated methods
• Some documents may be inaccessible, mQ¾K iajhxlD; úê
confidential, or non-existent.
we;eï f,aLkj,g m%fõY úh fkdyels
úh yels w;r" ryis.; fyda fkdmj;sk • Web Scraping
tAjd úh yelsh'
Automatically extracts data from
• Documents may contain biases, websites using bots or scripts.
inaccuracies, or may be outdated. bots fyda scripts Ndú;fhka fjí wvú
f,aLkj, mlaI.%dyS" idjoH fyda h,a mek j,ska o;a; iajhxl%Shj Wmqgd .kS'
.sh tAjd wvx.= úh yel'
• Mobile Apps
Types of collected documents Applications that gather user data, like
location or usage patterns,
Written Documents automatically in the background.
,sÅ; f,aLk miqìu yryd ia:dkh fyda Ndú; rgd
Books, articles, newspapers, magazines. jeks mßYS,l o;a; iajhxl%Shj /ia
lrk fhÿï'
Electronic Documents
bf,lafg%dKsl f,aLk • Sensors
Emails, websites, online articles, and social ixfõol
media posts. Temperature, Pressure, Motion, and
Light sensors
Visual Documents WIaK;aj" mSvk" p,k iy wdf,dal
oDYH f,aLk ixfõol
Photographs, videos, and other visual
media. • Loggers
,>qr
55
ictfromabc.com
Loggers For further reference
,>qr
Classification by data collection method
o;a; tl;= lsÍfï l%uh wkqj j¾.SlrKh
• Surveys
iólaIK
• Interviews
iïuqL idlÉPd
A logger is a device or software that
• Observations
automatically records data over time, often
ksÍlaIK
used to monitor environmental conditions
or system performance.
,>qrla hkq ld,h;a iuÕ o;a; iajhxl%Shj Secondary data collection
jd¾;d lrkq ,nk Wmdx.hls" th fndfyda úg oaú;shsl o;a; tl;=j
mdßißl ;;a;ajhka fyda moaO;s l%shdldß;ajh
ksÍlaIKh lsÍug Ndú;d lrhs' • Literature review
idys;H újrK
It helps collect and store data without • Existing dataset
manual intervention. mj;sk o;a; lÜg,
th yia;Sh ueÈy;a ùulska f;drj o;a; /ia • Document analysis
lsÍug iy .nvd lsÍug WmldÍ fõ' f,aLk úYaf,aIKh
Sensors
ixfõol Classification by electronic vs. Non-
electronic methods
úoHq;a yd úoHq;a fkdjk wdldr wkqj
j¾.SlrKh
Electronic methods
úoHq;a wdldr
Non-electronic methods
úoHq;a fkdjk wdldr
• Interviews
iïuqL idlÉPd
• Questionnaires
m%IaKdj,Ska
56
ictfromabc.com
Data validation methods For further reference
o;a; j,x.=lrK l%u
Length check
È. mÍËdj
1. Type check
j¾.h mÍlaId lsÍu Checks if the data entered has an acceptable
length, typically a minimum or maximum
Validates that the data entered is of the number of characters.
expected data type (Ex. text, integer). we;=<;a l< o;a;j,g ms<s.; yels È.la ;sfío"
idudkHfhka wju fyda Wmßu wlaIr ixLHdjla
we;=<;a l< o;a; wfmalaIs; o;a; j¾.hg
;sfíoehs mÍlaId lrhs'
wh;a nj ;yjqre lrhs ^Wod' fm<" mQ¾K
ixLHd&'
Example: Requiring a password to be at least
8 characters long.
Example uqrmohla wju jYfhka wlaIr 8laj;a ;sìh
Ensuring a user inputs a number for age hq;=h'
instead of text.
mßYS,lfhl= jhi i|yd fm< fjkqjg Uniqueness check
ixLHdjla we;=<;a lsÍu iy;sl lsÍu' wkkH mÍlaIdj
57
ictfromabc.com
Data input methods Indirect method
o;a; wdodk úê jl% l%uh
58
ictfromabc.com
Remote and Local methods Online and Offline methods
Data is entered from a location away from Data is entered and processed
the main system or server. immediately, requiring instant feedback.
m%Odk moaO;sfhka fyda fiajdodhlfhka ÿria: laI‚l m%;spdr wjYH jk o;a; laI‚lj
ia:dkhl isg o;a; we;=<;a lrkq ,efí' wdodkh lr ilikq ,efí'
59
ictfromabc.com
Data verification methods 3. Printing and checking physically
o;a; i;Hdmk l%u entered data
we;=<;a l< o;a;j, oDv msgm;la f.k
The main difference between validation mÍlaId lsÍu
and verification is that verification is done
after inputting the data while validation is A hard copy or a printout is taken of the
done when the data is entered. entered data and it is checked for errors
j,x.=lrKh iy i;Hdmkh w;r we;s m%Odk with the original.
fjki jkafka o;a; we;=<;a lsÍfuka miqj we;=,;a l, o;a; j, msgm;la f.k uq,a
i;Hdmkh isÿ lrk w;r o;a; we;=<;a lrk msgm; yd ixikaOkh lrñka mßlaId lsÍu'
úg j,x.=lrKh isÿ lsÍuhs'
4. Two-Factor Verification
1. Double entry verification
oaú;aj we;=<;a lsÍï i;Hdmkh A security process that requires two forms
of identification, something you know (like
In this process, after data is entered once, it a password) and something you have (like
is required to be entered again. a smartphone), to access an account.
fuu l%shdj,sfha§" o;a; tla jrla we;=<;a l< .sKqulg m%fõY ùu i|yd y÷kd.ekSfï
miq" th kej; we;=,a lsÍug wjYH fõ' wdldr folla" Tn okakd fohla ^uqrmohla
jeks& iy Tn i;= fohla ^iaud¾Ü cx.u
This is done to check whether the same ÿrl;khla jeks& wjYH jk wdrlaIl
data entered first is re-entered. l%shdj,shls
fuh isÿ lrkqfha m<uqj we;=<;a l< o;a;u
kej; we;=<;a lr we;ao hkak mÍlaId lsÍug
h'
60
ictfromabc.com
Data processing methods Parallel and Serial processing
o;a; ilik úê iudka;r ieliqu iy wkql%ñl ieliqu
Parallel processing
Batch processing and Real-time iudka;r ieliqu
processing
ldKav ieliqu iy ;;ald,Sk o;a; ieliqu A technique where multiple processors or
computers work on different parts of the
data simultaneously to speed up
Batch processing
ldKav ieliqu processing.
ieliSu fõ.j;a lsÍu i|yd nyq ilik fyda
mß.Kl u.ska o;a;j, úúO fldgia u;
Data is collected and processed in groups tljr l%shd lrk ;dËKhls'
at scheduled times.
kshñ; l< ld,hl§ ldKav jYfhka o;a; Ex.
/ia lr ilikq ,efí'
Analyzing large datasets in scientific
research or rendering graphics in video
Ex.
editing.
Payroll systems processing employee
úoHd;aul m¾fhaIKj, úYd, o;a; lÜg,
payments once a month. úYaf,aIKh lsÍu fyda ùäfhda ixialrKfha§
jegqma moaO;s uilg jrla fiajl f.ùï Ñ;%l úoeyqïlrKh'
ieliSu'
61
ictfromabc.com
Data output methods Soft Copy vs. Hard Copy
o;a; m%;sodk úê
Soft Copy
uDÿ msgm;
Direct Output vs. Storage
A digital version of data that can be viewed
Direct Output on electronic devices, such as computer
iDcq m%;sodkh
screens, tablets, or smartphones.
mß.Kl ;sr" geí,Ü" fyda iaud¾Ü f*daka jeks
This method involves sending data directly bf,lafg%dksl Wmdx. u; ne,sh yels f,i
to the user or an output device for mj;sk o;a;j, ixLHdxl wkqjdohls'
immediate use.
fuu l%uh uÕska laI‚l Ndú;h i|yd Examples include documents,
mßYS,lhd fyda m%;sodk Wmdx.hla fj; spreadsheets, and presentations stored in
iDcqju o;a; heùu we;=<;a fõ'
digital format.
WodyrK f,i äðg,a wdlD;sfhka .nvd lr
Examples include displaying results on a we;s f,aLk" me;=reïm;a iy we;=<;a fõ'
screen or printing a report right away.
WodyrK f,i ;srhla u; m%;sM, fmkaùu Hard Copy
fyda jd¾;djla jydu uqøKh lsÍu we;=<;a oDv msgm;
fõ'
62
ictfromabc.com
Data storage methods Online and Offline storage methods
o;a; .nvd úê ud¾..; iy ud¾..; fkdjk .nvd l%u
63
ictfromabc.com
Primary and Secondary storage Short term and Long term storage
methods methods
uQ,sl iy oaú;sl .nvd l%u flá ld,Sk iy È.= ld,Sk .nvd lsÍfï l%u
Examples
Hard Drives (HDDs) and Solid State Drives
(SSDs)
Cloud Backup Services
Physical Media (USBs, CD, DVD)
64
ictfromabc.com
Application of IT in Various Domains • Safe Practice for High-Risk Skills
úúO lafIa;%j, f;dr;=re ;dlaIKfha Ndú; wê wjodkï l=i,;d i|yd wdrlaIs;
mqyqKqj
Educational Sector Medical students practice surgeries and
wOHdmk lafIa;%h other critical procedures without risking
patient safety.
An educational approach where computers ffjoH isiqka Y,Hl¾u iy wfkl=;a
and digital technologies are utilized to ;SrKd;aul l%shd mámdá frda.k S f
a .a
wdrlaIdj wjodkulska f;drj isÿ lsÍu'
facilitate teaching and learning processes,
is defined as computer-based education
• Realistic Environmental Conditions
(CBE). h:d¾:jd§ mdßißl ;;a;ajhka
b.ekaùï iy bf.kqï l%shdj,Ska i|yd
For testing and training in fields like
myiqlï ie,iSu i|yd mß.Kl iy äðg,a
;dlaIKhka Ndú;d lrk wOHdmksl m%fõYh, aerospace and physics use simulations
mß.Kl mdol bf.kqu (CBE) f,i w¾: that mimic gravity, atmospheric
oelafõ' pressure, wind speed, and more.
wNHjldYh iy fN!;sl úoHdj jeks
lafIa;% ;=<" mÍlaIK iy mqyK q qj i|yd
CBE makes education more accessible, .=re;ajdl¾IKh" jdhqf.da,Sh mSvkh" iq<x
personalized and adaptable. fõ.h iy ;j;a fndfyda foa wkqlrKh
CBE wOHdmkh jvd;a m%fõY úh yels" lrk wkqyr q elrK Ndú;d lrhs.
mqoa.,dfrdams; iy wkqj¾;kh l< yels lrhs'
• Facilitates experiments with rare or
This involves in control, delivery, and hazardous materials
evaluation of learning as follows. ÿ¾,N fyda wka;rdhlr øjH iuÕ
fuh my; oelafjk mßÈ bf.kqï l%shdj,sh mÍlaIK i|yd myiqlï imhhs
md,kh" fnodyeÍu iy we.hSu yd iïnkaO VR-based labs allow students to
fõ' conduct experiments using substances
that may be costly, difficult to obtain, or
1. Simulations potentially dangerous
wkqyqrelrKh
VR u; mokï jQ úoHd.dr isiqkag ñ,
wêl" ,nd.ekSug wmyiq" fyda
The virtual, interactive environments where wk;=reodhl úh yels øjH Ndú;fhka
students can safely practice skills, conduct mÍlaIK lsÍug bv i,ihs'
experiments, and tackle complex problems
without real-world risks are simulations. • Real time feedback
ienE f,dalfha§ we;s wjodkï fkdue;s" j ;;H ld,Sk m%;sfmdaIK
isiqkag wdrlaIs;j l=i,;d mqyK q q lsÍug" provide immediate responses to student
w;ayod ne,Sï lsÍug iy ixlS¾K .eg¨j,g actions, especially useful in fields like
uqyKq §ug yels w;:H" wka;¾l%h s dldÍ robotics and mechanical engineering.
mßirhka wkqyr q elrK fõ' frdfnda ;dlaIKh iy hdka;%sl bxðfkare
úoHdj jeks lafIa;%j, úfYaIfhka
With the advancements in Virtual Reality m%fhdackj;a jk YsIH l%shd i|yd laI‚l
(VR) and Augmented Reality (AR) making m%;spdr ,nd foa'
simulations even more immersive and
• Cost Effective
effective. msßjeh M,odhS ùu
Virtual Reality (VR) iy Augmented Reality Consumable materials (chemicals, building
(AR) ys ÈhqKqj iuÕska wkqyr q elrK jvd;a supplies) are replaced with virtual
M,odhS njg m;a lrhs' alternatives.
mßfNdack øjH ^ridhksl øjH" f.dvke.s,s
iemhqï& w:;H úl,amhka iuÕ m%;sia:dmkh
fõ.
65
ictfromabc.com
2. Distance Learning and E- Learning Examples for open education resource
ÿria: bf.kSu iy bf,lafg%dksl bf.kSu platforms:
újD; wOHdmk iïm;a fõÈld i|yd
Distance learning and e-learning refer to WodyrK(
modern educational methods that enable
students to attend classes and access o www.schoolnet.lk
learning materials remotely, without the o nenasala.lk
need to travel to a physical learning center. o e-thaksalawa
ÿria: bf.kSu iy úoHq;a bf.kSu hkq o edulanka.lk
fN!;sl bf.kqï uOHia:dkhlg hdfï o vidumanpetha.com
wjYH;djhlska f;drj isiqkag mka;sj,g o www.dpeducation.lk
iyNd.S ùug iy ÿria:j bf.kqï øjH fj;
m%fõY ùug yels kùk wOHdmk l%u fõ' o W3schools
o Khan Academy
• Online classrooms
ud¾..; mka;s ldur
66
ictfromabc.com
4. Individualized Learning 5. Learning Management Systems (LMS)
bf.kqï l,uKdlrK moaO;s
Students with individual needs can be
assisted using personalized learning that Learning Management Systems (LMS)
aligns their unique learning styles. provide a central hub for online learning,
;ks mqoa., wjYH;d we;s isiqkag Tjqkf a .a accessible 24/7.
wkkH bf.kqï ú,dihka fm<.iajk bf.kqï l<ukdlrK moaO;s (LMS) ud¾..;
mqoa.,dfrdams; b.ekaùï Ndú;fhka iydh úh bf.kSu i|yd m%fõY úh yels flakø a Sh
yel' a ia:dkhla 24$7 mqrd imhhs.
flakø
67
ictfromabc.com
Advantages of ICT in the Education Health sector
Sector fi!LH lafIa;%h
wOHdmk fËa;%fha f;dr;=re yd ikaksfõok
;dlaIKh we;s jdis Diagnostic systems
frda. úksYp
a h moaO;sh
o Access Anytime, Anywhere
´kEu ;ekl isg ´kEu fõ,djl m%fõY
ùfï yelshdj Computerized Axial Tomography (CAT)
o Variety of Resources
iïm;a j, úúO;ajh
68
ictfromabc.com
Positron Emission Tomography (PET) Magnetic Resonance Imaging (MRI)
Then the PET scanner detects gamma rays These signals are processed to create
emitted when the radiotracer interacts with detailed cross-sectional images,
body electrons, using this data to create a highlighting different soft tissues with high
3D image of internal functions. contrast.
miqj PET ialEkrh fraäfhda fÜ%i¾ YÍrfha fuu by< m%;súfrdaO;d iys; úúO uDÿ mgl
bf,lafg%dk
a iuÕ wka;¾l%shd lrk úg ksl=;a biau;= lrñka fuu ix{d ilia lr
jk .eud lsrK y÷kdf.k" wNHka;r iúia;rd;aul yrialv rEm ks¾udKh lrhs'
l%shdldrlïj, ;%sudK rEmhla ks¾udKh
lsÍug fuu o;a; Ndú;d lrhs' MRI is useful for diagnosing various
conditions, such as neurological disorders,
joint injuries, and cancers, without using
harmful radiation.
MRI hkq ydkslr úlsrK Ndú;d fkdlr
iakdhq wdndO" ikaê ;=jd, iy ms<sld jeks
úúO ;;ajhka y÷kd .ekSu i|yd
m%fhdackj;a ;dËKhls'
69
ictfromabc.com
Feature PET Scanner CT Scanner MRI Machine
Imaging Principle Detects gamma rays Uses X-rays Uses magnetic fields
rEm uQ,O¾uh from an injected X-lsrK Ndú;d lrhs' and radio waves.
tracer. pqïnl lafI;% iy
tkak;a lrk ,o fraäfhda ;rx. Ndú;d
Üfrai¾ tllska .eud lrhs'
lsrK y÷kd .kS'
70
ictfromabc.com
Electroencephalography (EEG) Cardiac screening machine
71
ictfromabc.com
Wearable Health Trackers Home Health Supervision
me<¢h yels fi!LH ksÍlaIK Wmdx. ksjfia isg fi!LH wëlaIKh
A wearable health tracker is a device, like a Devices are used to monitor patients'
smartwatch or fitness band, that monitors health remotely.
health metrics such as heart rate and sleep frda.k
S f
a .a fi!LHh ÿria:j ksÍlaIKh lsÍug
Wmdx. Ndú; flfra'
patterns, syncing with smartphones to
provide real-time insights for better health Improves patient comfort and proactive
management. management of chronic illnesses, enabling
me<¢h yels fi!LH ksÍlaIK Wmdx.hla hkq
easy access to hospital care if needed.
iaud¾Ü Trf,daiqjla fyda fhda.H;d máhla
jeks Wmdx.hla jk w;r th yDo iamkaok frda.h
s df.a iqjmyiqj jeä ÈhqKq lsÍu iy
fõ.h iy ksko a rgd jeks fi!LH m%ñ;sl ksoka.; frda. l%shdYS,Sj l<ukdlrKh
ksÍlaIKh lrhs" jvd fyd| fi!LH lsÍug" wjYH kï frday,a m%;sldr i|yd
l<ukdlrKhla i|yd ;;H ld,Sk myiqfjka m%fõY ùug yelshdj ,nd fohs'
wjfndaOhla ,nd §ug iaud¾Üf*daka iuÕ
iuuqy¾q ; lrhs'
Lab-diagnostic System
Examples for wearable health trackers: ridhkd.dr-frda. úksYp
a h moaO;sh
me<¢h yels fi!LH ksÍlaIK Wmdx.i|yd
WodyrK( A lab-diagnostic system is a computer-
based setup that conducts and analyzes
o Apple Watch medical tests, producing accurate reports
o Fitbit Charge Series quickly.
o Smart rings (Oura ring) ridhkd.dr-frda. úksYp a h moaO;shla hkq
ffjoH mÍlaIK meje;aùu iy úYaf,aIKh
lsÍu" ksjerÈ jd¾;d blaukska ksIamdokh
lsÍu i|yd mß.Kl mokï lr.;a
ieliquls'
72
ictfromabc.com
Pharmacy Information System Remote surgery
T!Iëh f;dr;=re moaO;sh ÿria: Y,Hl¾u
Surgery
Y,H lafIa;%h
73
ictfromabc.com
Surgical Imaging Tools It enables researchers to access vast
ie;alï i|yd Ndú;d lrk leurd WmlrK medical databases, utilize advanced
statistical tools, and communicate findings
Surgeons can get real-time, detailed views quickly.
of a patient's internal structures during tu.ska m¾fhaIlhkag úYd, ffjoH o;a;
operations. iuqodhka fj; m%fõY ùug" Wiia ixLHdk
Y,H ffjoHjrekag Y,Hl¾ufha§ frda.h s df.a fuj,ï Ndú;d lsÍug iy fidhd.ekSï
wNHka;r jHqyhka ms<sn| ;;H ld,Sk blaukska ikakf s õokh lsÍug yelshdj ,efí'
iúia;rd;aul oiqka ,nd .; yel'
Bioinformatics
Virtual Reality (VR) and Augmented ffcj f;dr;=re úoHdj
Reality (AR) in Surgery
Y,Hl¾ufha§ w;:H h:d¾:h (VR) iy jeä
ÈhqKq l< h:d¾:h (AR) Ndú;h
E-channeling
Medical Research
ffjoH m¾fhaIK
74
ictfromabc.com
Agricultural Sector Precision Farming
lDIsld¾ñl lafIa;%h ksrjoH f.dú;ek
75
ictfromabc.com
Use of Machinery and Equipment. • Automated weed removers
hka;% iy WmlrK Ndú;h iajhxl%Sh j,a me,Eá bj;a lrkak hka;%
• Telematics
76
ictfromabc.com
Crop Monitoring and Management • Crop Management Software
fnda. wëlaIKh iy l<ukdlrKh fnda. l<ukdlrK uDÿldx.
• Remote Sensing and UAVs (drones) ICT platforms provide tools for
ÿria: ixfõo iy UAV ^fv%dak& recording and analyzing data on crop
performance, pest outbreaks, and yield
UAV stands for unmanned aerial forecasts, facilitating informed
vehicle. They can be fully or partially decision-making.
autonomous. f;dr;=re yd ikakfs õok ;dlaIK fõÈld
UAV hkq unmanned aerial vehicle fõ' fnda. ld¾h idOkh" m<sfndaO me;sÍu iy
tAjd iïmQ¾Kfhkau fyda w¾O jYfhka wiajekak wkdjels ms<sn| o;a; má.;
iajhxmd,l úh yelsh' lsÍu iy úYaf,aIKh lsÍu" oekqj;a
;SrK .ekSu i|yd myiqlï imhhs'
77
ictfromabc.com
2. Livestock Farming • Automated Milking
mY= iïm;a f.dú;ek iajhxl%Sh lsß foùu
78
ictfromabc.com
3. Fishing Industry Aquaculture Management
ëjr l¾udka;h c,Ôj j.d l<ukdlrKh
79
ictfromabc.com
Changes in agriculture before and after the involvement of ICT
f;dr;=re yd ikaksfõok ;dlaIK Ndú;hg fmr iy miq lDIsl¾ufha fjkialï
Aspect Before (fmr) After (miq)
Information Traditional knowledge Real-time weather forecasts, market prices,
Access and local expertise. and crop management techniques through
f;dr;=re m%fõYh mdrïmßl oekqu iy foaYSh apps and online platforms.
úfYaI{ oekqu fhÿï iy ud¾..; fõÈld yryd ;;H ld,Sk
ld,.=K wkdjels" fj<|m, ñ, iy fnda.
l<ukdlrK Ys,amh S l%u
Data Management Manual record-keeping Farm management software for efficient data
o;a; and paper-based collection, analysis, and storage.
l<ukdlrKh documentation. w;ahqre ld¾hlaIu o;a; tl;= lsÍu" úYaf,aIKh iy
f,i jd¾;d ;nd .ekSu iy .nvd lsÍu i|yd f.dúm, l<ukdlrK
lvodis u; mokï jQ uDÿldx.
,shlshú,s'
Market Access Dependent on local Online trading platforms provide direct
fj<|m, m%fõYh markets and middlemen. access to markets globally.
foaYSh fj,|fmd,j,a iy ud¾..; fj<| fõÈld f.da,Sh jYfhka
w;rueÈhka u; r|d mj;S' fj<|m, fj; iDcq m%fõYh imhhs'
Decision Making Based on intuition and Informed decisions using data analytics,
;SrK .ekSu experience. predictive modeling, and expert systems.
nqoaêh iy w;aoelSï u; o;a; úYaf,aIK" mqfrdal:k wdlD;slrKh iy
mokïj' úfYaI{ moaO;s Ndú;d lrñka oekqj;a ;SrK'
80
ictfromabc.com
Business and Finance Sector • Inventory Management
jHdmdr iy uq,H lafIa;%h f;d. l<ukdlrKh
• Employee Databases
fiajl o;a; iuqodhka
81
ictfromabc.com
• CDM (Cash Deposit Machine) • Cryptocurrencies: Cryptocurrency is a
uqo,a ;ekam;= hka;%h digital form of currency using
blockchain technology. Cryptocurrency
Allows customers to deposit cash payments are processed via digital
directly into their bank accounts wallets, providing alternatives to
without visiting a bank. traditional banking.
.kqfokqlrejkag nexl=jlg fkdmeñK
Tjqkfa .a nexl= .sKqï fj; iDcqju uqo,a Cryptocurrency: Blockchain ;dlaIKh
;ekam;a lsÍug bv i,ihs' Ndú;d lrk äðg,a wdldrfha uqo,a
j¾.hls' Cryptocurrency f.ùï äðg,a
• Kiosk uqo,a miqïì yryd ilikq ,nk w;r"
iïm%odhsl nexl=lrKhg úl,am imhhs'
Provides self-service for a range of
banking functions like passbook
• Financial Management Systems
printing, loan inquiries, account
uq,H l<ukdlrK moaO;s
updates, and bill payments.
mdiafmd;a uqøKh" Kh úuiSï" .sKqï Banks utilize computer systems for
hdj;ald,Sk lsÍï iy ì,am;a f.ùï jeks
nexl= ld¾hhka rdYshla i|yd iajhx managing financial records, interest
fiajd imhhs' charges, and investment portfolios.
nexl= uQ,H jd¾;d" fmd,S .dia;= iy
• Digital payment systems. wdfhdack l<ukdlrKh i|yd mß.Kl
äðg,a f.ùï moaO; moaO;s Ndú; lrhs'
82
ictfromabc.com
E- Commerce and Online Shopping • Personalized Recommendations
bf,lafg%dksl-jd‚cHh iy ud¾..; idmamq
ijdß E-commerce platforms use data
analytics to offer personalized product
• Product Information Access
ksIamdok f;dr;=re m%fõYh suggestions based on past purchases,
browsing history, and preferences,
Customers can access comprehensive enhancing customer satisfaction.
product details, helping customers to B-jd‚cHh fõÈld w;S; ñ,§ .ekSï"
.fõIK b;sydih iy ukdmhka u;
make informed decisions.
mokïj mqoa.,SlrKh l< ksIamdok
mdßfNda.ls hskg
a iúia;rd;aul ksIamdok fhdackd bÈßm;a lsÍug o;a; úYaf,aIK
úia;r fj; m%fõY úh yels w;r" Ndú;d lrhs" mdßfNda.l s ;Dma;sh jeä
oekqj;a ;SrK .ekSug Wmldr lrhs' lrhs'
• Online Shopping • Customer Support and Chatbots
ud¾..; idmamq ijdß
83
ictfromabc.com
Engineering Sector • 3D Printing
Bxðfkare lafIa;%h 3D uqøKh
• Use of VR and AR
VR iy AR Ndú;h
84
ictfromabc.com
• Virtual Tours
Tourism w;:H pdßld
ixpdrl lafIa;%h
Allow travelers to explore attractions,
• Information Access hotels, and landscapes from the
f;dr;=re i|yd m%fõYh comfort of their homes.
ixpdrlhskg a Tjqkf
a .a ksfjiaj,
Tourists can access information about iqjmyiqj isg wdl¾IŒh ia:dk" fydag,a
destinations, attractions, and local iy N+ o¾Yk .fõIKh lsÍug bv
i,ihs'
customs through online resources,
travel blogs, and review sites, enabling
• Online Visa applications
better trip planning and decision- ud¾..; ùid whÿï lsÍu
making.
ixpdrlhskg a .ukdka;" wdl¾IK ia:dk Streamlines the visa process, allowing
iy foaYh S isß;a úß;a ms<sn| f;dr;=re
travelers to apply, upload documents,
ud¾..; iïm;a" ixpdrl íf,d.a iy
iudf,dapk wvú yryd m%fõY úh yels and track their application status
w;r" jvd fyd| ixpdr ie,iqï lsÍu iy digitally.
;SrK .ekSfï yelshdj ,nd foa' ixpdrlhskg a ùid whÿï lsÍug" f,aLk
Wvq.; lsÍug iy Tjqkf a .a whÿïm;a
• Online Booking ;;a;ajh äðg,a f,i ksÍlaIKh lsÍug
ud¾..; fjkalrjd .ekSï wjir foñka ùid l%shdj,sh úêu;a lrhs'
85
ictfromabc.com
Media and Journalism Holographic Technology presents
udOH iy ckudOHlrKh lifelike visuals, especially for events,
press releases, creating attractive
• Content Creation and Design reporting experiences.
wka;¾.; ks¾udKh iy ie,iqïlrKh'
Holographic ;dlaIKh u.ska Ôjudk
o¾Yk bÈßm;a lrñka" úfYaIfhka
ICT tools help journalists create visually
isÿùï" udOH ksfõok" wdl¾YkSh
engaging and well-designed articles, jd¾;dlrK w;aoelSï ks¾udKh lrhs'
enhancing content quality.
f;dr;=re yd ikakf s õok ;dlaIK fuj,ï • Real Time News
udOHfõ§kag oDYHuh jYfhka is;a ;:H ld,Sk mqj;a
weo.kakdiq¿ iy fyd¢ka ie,iqï l< ,sms
ks¾udKh lsÍug Wmldr lrhs"
wka;¾.;fha .=Kd;aul Ndjho by< Journalists can report and share news
kxjhs' instantly through live broadcasting,
websites, social media platforms and
o Graphic Design Software messages.
.%e*sla ks¾udK uDÿldx. iÔù úldYkh" fjí wvú" iudc udOH
Ex: Adobe Illustrator, Canva fõÈld iy m‚úv yryd laI‚lj
m%jD;a;s jd¾;d lsÍug iy fnod .ekSug
udOHfõ§kag yelshdj ,efí'
o Video Editing Software
ùäfhda ixialrK uDÿldx. • Social Media
Ex: Adobe Premiere Pro iudc udOH
86
ictfromabc.com
Mobile Journalism (MoJo) Advantages of usage of ICT in media and
cx.u mqj;am;a l,dj (MoJo) journalism
udOH iy mqj;am;a l,dfõ f;dr;=re yd
ikaksfõok ;dlaIK Ndú;fha jdis
• Efficiency
ld¾hlaIu;dj
• Global Reach
f.da,Sh m%fõYh
• Increased audience engagement
fm%alaIl iyNd.S;ajh jeä ùu
• Improved collaboration among
journalists
udOHfõ§ka w;r iyfhda.; S dj jeä ÈhqKq
lsÍu
• Data-driven Journalism
Using mobile devices like smartphones and o;a; u; mokï jQ mqj;am;a l,dj
tablets, journalists can quickly capture
multimedia content, conduct interviews, • Real-time Reporting
;;H ld,Sk jd¾;dlrKh
and publish stories in real-time.
iaud¾Ü f*daka iy geí,Ü jeks cx.u Wmdx. • Greater accessibility to information
Ndú;fhka udOHfõ§kag nyqudOH f;dr;=re i|yd jeä m%fõYhla
wka;¾.;hka blaukska .%yKh lr .ekSug"
iïuqL idlÉPd meje;aùug iy ;;H ld,Skj
mqj;a m%ldYkhg m;a lsÍug yelsh' Disadvantages of usage of ICT in media
and journalism
udOH iy mqj;am;a l,dfõ f;dr;=re yd
ikaksfõok ;dlaIK Ndú;fha wjdis
Fact Checking and Verifying
lreKq mÍlaId lsÍu iy i;Hdmkh o Misinformation, Fake News and
clickbait
Fact checking software (Google Fact Check,
jerÈ f;dr;=re" jHdc mqj;a iy clickbait
Snopes) and AI based tools are used for
verifying sources, checking facts, and o Digital Divide
wxls; fnÈu
reducing the spread of misinformation.
uQ,dY% i;Hdmkh lsÍu" lreKq mÍËd lsÍu o Potential for censorship by
iy jerÈ f;dr;=re me;sÍu wju lsÍu i|yd governments or platforms
lreKq mÍËK uDÿldx. (Google Fact rchka fyda fõÈld u.ska jdrKh lsÍfï
Check, Snopes) iy AI mokï jQ fuj,ï yelshdj
Ndú; flfra' o Information Overload
f;dr;=re jeäùu
o Digital content piracy
äðg,a wka;¾.; uxfld,a,lEu
o Loss of Traditional Skills
mdrïmßl l=i,;d ke;sùu
o Ethical Challenges
iodpdrd;aul wNsfhda.
o Job loss
/lshd wysñ ùu
87
ictfromabc.com
Security and Law Enforcement • Home security systems
wdrlaIdj iy kS;sh n,d;aul lsÍu ksjdi wdrlaIK moaO;s
88
ictfromabc.com
• Digital Forensics Entertainment
äðg,a wêlrK ffjoH úoHdj úfkdaodiajdoh
89
ictfromabc.com
• Live Performances and Events Immersive Technologies
iÔù ixo¾Yk iy isÿùï Immersive ;dlaIKhka
90
ictfromabc.com
• Simulation Holographic projections and
wkqyqrelrKh volumetric displays, can bring
performers and characters to life in
Ex: Flight simulators, Driving simulators, three-dimensional form.
Theme Park simulators. fydf,da.e% *sla m%lafIamk iy mßudñ;sl
ixo¾Yl" ;%sudK wdldrfhka rx.k
Ys,amSka iy pß; Ôjudk l< yelsh'
o Accessibility
m%fõY
• AI-Generated Content
AI-W;amdÈ; wka;¾.;h o Interactivity
wka;¾ l%shdldß;ajh
Music compositions, books, films o Personalization
mqoa.,SlrKh
scripts, and virtual worlds can be
generated by AI. o Distribution
ix.S; ixhq;s" fmd;a" Ñ;%mg msgm;a" iy fnod yeÍu
w;:H f,dal AI u.ska ckkh l< yel' o Participation
iyNd.S;ajh
Ex: DALL-E, Amper Music, Lumen5, o Immersion
Midjourney AI, Stability AI .s,aùu
o Globalization
f.da,ShlrKh
o Addiction
• Holographic Performances weíneys ùu
fydf,da.%e*sla m%ix. o Privacy
fm!oa.,sl;ajh
Holographic performances, also known o Traditional Decline
as hologram concerts, are shows that iïm%odhsl mßydksh
use holographic technology and o Dependency
artificial intelligence to recreate hemSu
deceased artists. o Quality Control
fydf,da.e% *sla m%ix." fydf,da.E% ï m%ix. ;;a;aj md,kh
f,io ye¢kafõ" ñh .sh l,dlrejka
m%;sk¾s udKh lsÍu i|yd fydf,da.e% *sla o Cyberbullying
;dËKh iy lD;su nqoaêh Ndú;d lrk ihsn¾ ysßyer lsÍu
ixo¾Yk fõ'
91
ictfromabc.com
Aspect Before (fmr) After (miq)
Access m%fõY Limited access to Wide range of entertainment options
entertainment options. available globally.
úfkdaodiajdo úl,am i|yd f.da,Sh jYfhka ,nd .; yels mq¿,a
iSñ; m%fõYh' mrdihl úfkdaodiajdo úl,am'
Distribution Limited distribution channels Digital distribution platforms (e.g.,
fnod yeÍu (e.g., TV, radio, theaters). streaming services, online stores).
iSñ; fnodyeÍfï kd,sld ^Wod( äðg,a fnodyeÍfï fõÈld ^Wod( m%jdy
rEmjdyskh s " .=jkaúÿ,sh" fiajd" ud¾..; fj<|ie,a&'
iskudy,a&'
Interactivity Passive consumption (e.g., Interactive experiences (e.g., gaming,
wka;¾l%shdldÍ;ajh watching TV, listening to social media interaction).
radio). wka;¾l%shdldÍ w;aoelSï ^Wod'" l%Svd"
ksIal%Sh mßfNdackh ^Wod( iudc udOH wka;¾l%h s d&'
rEmjdyskh s keröu" .=jka
úÿ,shg ijka §u&'
Cost Costly entertainment options Wide range of free and paid options,
msßjeh (e.g., movie tickets, physical including subscription services and
media). ad-supported platforms.
ñ, wêl úfkdaodiajdo úl,am odhl;aj fiajd iy oekaùï-iydh
^Wod( Ñ;%mg álÜm;a" fN!;sl olajk fõÈld we;=¿j" fkdñf,a iy
udOH&' f.jk úl,amj, mq¿,a mrdihla'
92
ictfromabc.com
Travel and transport • Digital Video Recorder (DVR)
.ukd.ukh iy m%jdykh (Dash cams)
• Using GPS
GPS Ndú;h
93
ictfromabc.com
Features of Driver Assist Systems • Air Traffic Monitoring System
ßhÿre iydhl moaO;sj, úfYaIdx. .=jka .uka ksÍlaIK moaO;sh
• Collision Avoidance
.eàfuka je<lSu
• Parking Assistance
Air Traffic Monitoring System is a
jdyk keje;aùfï iydh
technology used to track and manage
• Traffic Sign Recognition the movement of aircraft in the sky and
r:jdyk ix{d y÷kd.ekSu on the ground.
.=jka .uka ksÍlaIK moaO;s hkq wyfia
• Cross Traffic Alert iy fmd<fjys .=jka hdkd j, p,kh
ud¾. ;onoh ms<sn| wk;=re weÕùu ksÍlaIKh lsÍug iy l<ukdlrKh
lsÍug Ndú;d lrk ;dlaIKhls'
• Autonomous driving
iajhxl%Sh ßh Odjkh ICT tools like radar, satellite navigation,
and communication networks help
controllers track aircraft, coordinate
The ability of a vehicle to navigate and flights, and guide pilots.
operate without human intervention is fravd¾" pkaøsld ixpd,kh" iy
autonomous driving. ikakf s õok cd, jeks f;dr;=re yd
jdykhlg ñksia ueÈy;aùulska f;drj ikakf s õok ;dlaIK fuj,ï md,lhkag
ießieÍug iy l%shd lsÍug we;s yelshdj .=jka hdkd ksÍlaIKh lsÍug" .=jka .uka
iajhxl%Sh ßh meoùuls' iïnkaëlrKh lsÍug iy kshuqjkag uÕ
fmkaùug Wojq lrhs'
94
ictfromabc.com
GPS 4. Triangulation/Trilateration
The Global Positioning System (GPS) is a
satellite-based navigation system that
provides location, time, and velocity
information globally.
The Global Positioning System (GPS) hkq
f.da,Sh jYfhka msyà s u" fõ,dj iy m%fõ.
f;dr;=re imhk pkaøsld u; mokï jQ
ixpd,k moaO;shls'
1. Satellite Constellation
GPS consists of a constellation of at least 24 The receiver calculates the time delay of
satellites in medium Earth orbit, arranged signals to determine its distance from each
to ensure that a GPS receiver on Earth can satellite.
access signals from at least 4 satellites at .%dylhd ix{d .uka ld,h u; mokïj
any time. pkaøsld j,g tys isg we;s ÿr .Kkh lrhs'
GPS moaO;sh uOHu mDÓú llaIfha wju
jYfhka pkaøsld 24 lska iukaú; jk w;r" 1 Satellite: The receiver can only determine
mDÓúfha we;s GPS .%dylfhl=g ´kEu it is somewhere on a sphere centered on
fõ,djl wju jYfhka pkaøsld 4 lska ix{d that satellite.
fj; m%fõY úh yels nj iy;sl lsÍug .%dylhd we;af;a tu pkaøsldj flakø a lr.;a
ilid we;' f.da,hla u; nj muKla thg ;SrKh l<
yel'
2. Signal Transmission
ix{d iïmafraIKh 2 Satellites: The two spheres from the
satellites intersect in a circle. The receiver
Satellites continuously broadcast signals, lies somewhere on this circle.
including: pkaøsld foflka iEfok f.da, fol rjqulska
my; oE we;=<;aj pkaøsld wLKavj ix{d fþokh fõ' .%dylh fuu rjqfï fld;ekl
úldYkh lrhs fyda msygs d we;'
95
ictfromabc.com
Production Sector Smart Manufacturing
ksIamdok lafIa;%h
• Manufacturing Execution Systems
Automation and Robotics (MES)
iajhxl%ShlrKh iy frdfnda ;dlaIKh ksIamdok l%shd;aul lsÍfï moaO;s (MES)
• Computer-Aided Manufacturing
(CAM)
mß.Kl wdOdrl ksIamdokh
96
ictfromabc.com
Production Planning and Scheduling Quality Control and Assurance
ksIamdok ie,iqï lsÍu iy Wmf,aLk.; ;;a;aj md,kh iy iy;sllrKh
lsÍu
• Machine Vision Systems
hka;% oDIaÀ moaO;
• Enterprise Resource Planning (ERP)
Systems
jHjidh iïm;a ie,iqï (ERP) moaO;s
97
ictfromabc.com
Advantages of usage of ICT in E-government
Production b-rdcH md,kh
ksIamdokfha§ ICT Ndú;fha jdis
ICT plays a pivotal role in the development
o Enhanced Efficiency and Accuracy and implementation of e-government,
ld¾hlaIu;dj iy ksrjoH;djh jeä which aims to improve the efficiency,
ÈhqKq ùu accessibility, transparency, and quality of
o Optimized Resource Management government services.
m%Yia; iïm;a l<ukdlrKh ICT u.ska úoHq;a rdcH ixj¾Okh iy
l%shd;aul lr rdcH fiajdjkays
o Flexibility and Customization ld¾hlaIu;dj" m%fõYH;dj" úksúoNdjh iy
kuHYS,S nj iy wNsreÑlrKh .=Kd;aul nj jeä ÈhqKq lrhs'
o Remote Access and Control https://www.gov.lk/
ÿria: m%fõYh iy md,kh
o Improved Quality Assurance There are essentially four types of
;;a;aj iy;slh jeä ÈhqKq ùu e-governance.
o Scalability uQ,slj b-rdcH md,k j¾. y;rla we;'
mßudKh fjkialsÍfï yelshdj
• Government to Citizens (G2C)
o Rapid Prototyping and Product rchlska mqrjeishkag
Development
fõ.j;a uQ,dlD;slrKh iy ksIamdok This ensures that citizens can access a wide
ixj¾Okh
range of public services efficiently.
fuu.ska mqrjeishkag mq¿,a mrdihl uyck
Disadvantages of usage of ICT in fiajdjka ld¾hlaIuj ,nd .; yels nj
Production iy;sl lrhs'
ksIamdokfha§ ICT Ndú;fha wjdis
List of Sri Lanka government departments
o Complexity and agencies
ixlS¾K;ajh › ,xld rcfha fomd¾;fïka;= iy wdh;k
,ehsia;=j
o Environmental Impact
https://www.gov.lk/government/web-sites
mdßißl n,mEu
o Data Loss and Failures Educational Resources
o;a; ke;sùu iy ÿ¾j,;d wOHdmksl iïm;a
https://www.e-thaksalawa.moe.gov.lk/
o Initial and Ongoing Maintenance
costs Payment of utility bills
uQ,sl iy wLKav kv;a;= úhoï Wmfhda.; s d ì,am;a f.ùu
https://payment.ceb.lk/instantpay
Renewal of Vehicle Licenses
jdyk n,m;% w¨;a lsÍu
98
ictfromabc.com
• Government to Business (G2C) • Government to Government (G2C)
rchlska jHdmdrj,g rchlska rchlg
99
ictfromabc.com
Benefits of ICT • Increased civic engagement and
f;dr;=re ;dlaIKfhys ys m%;s,dN social good
jeä isú,a kshe,Su iy iudc hym;
Social Benefits
iudc m%;s,dN Social media platforms have become
powerful tools for activism and raising
• Enhanced communication and awareness for social causes.
connection iudc udOH fõÈld l%shdldÍ;ajh iy iudc
jeäÈhqKq l< ikakf
s õokh iy fya;= i|yd oekqj;a lsÍu i|yd m%n, fuj,ï
iïnkaO;djh njg m;aj we;'
100
ictfromabc.com
Economic Benefits This creates new job opportunities in areas
wd¾Ól jdis like digital marketing, web development,
and logistics, driving economic growth in
• Increased productivity and efficiency the digital sector.
M,odhs;dj iy ld¾hlaIu;dj jeä lsÍu fuh äðg,a wf,úlrKh" fjí ixj¾Okh
iy iemhqï jeks lafIa;%j, kj /lshd wjia:d
ICT empower businesses to automate tasks, ks¾udKh lrhs" äðg,a wxYfha wd¾Ól
improve communication within teams, and j¾Okhg fya;= fõ'
streamline workflows.
ld¾hhka iajhxl%Sh lsÍug" lKavdhï ;=< • Improved global collaboration
ikakfs õokh jeä ÈhqKq lsÍug iy ld¾h jeäÈhqKq l< f.da,Sh iyfhda.S;dj
m%jdyhka úêu;a lsÍug f;dr;=re ;dlaIKh
jHdmdr iún, .kajhs' Video conferencing, instant messaging,
and cloud-based collaboration tools
Project management tools, cloud storage facilitate seamless collaboration between
solutions, and data analytics software all businesses and individuals across borders.
contribute to increased productivity, faster ùäfhda iïuka;%K" laI‚l m‚úv heùu iy
turnaround times, and cost reduction. j,dl=¿ u; mokï jQ iyfhda.; S d fuj,ï
jHdmD;s l<ukdlrK fuj,ï" j,dl=¿ foaYiSud yryd jHdmdr iy mqoa.,hka w;r
wdphk úi÷ï iy o;a; úYaf,aIK uDÿldx. ndOdjlska f;drj iyfhda.; S djhg myiqlï
ish,a, M,odhs;dj jeä lsÍug" fõ.j;a imhhs'
yerjqï ld,hlg iy msßjeh wvq lsÍug
odhl fõ' This opens new markets for international
trade, fosters innovation through
knowledge sharing, and strengthens global
supply chains.
fuh cd;Hka;r fj<|du i|yd kj
fj,|fmd,j,a újD; lrhs" oekqu fnod.ekSu
yryd kfjda;amdokhka fmdaIKh lrhs" iy
f.da,Sh iemhqï odu Yla;su;a lrhs'
101
ictfromabc.com
• Enhancements of Gross Domestic Issues caused by ICT
Product (GDP) f;dr;=re ;dlaIKh ksid we;s jk .eg¿
o< foaYh
S ksIamdÈ;fha ^^GDP&& jeäÈhqKq
ùu 1.Social issues
iudc .eg¿
ICT tools streamline processes, reduce
manual labor, and enhance efficiency, A) Digital divide
wxls; fnÿu
directly increasing output and contributing
to GDP growth.
The digital divide is the gap between
ICT fuj,ï u.ska iDcqju ksuejqï jeä
lrñka iy o< foaYh S ksIamdÈ;fha j¾Okhg people who have access to technology and
odhl fjñka l%shdj,s úêu;a lrhs" ñksia Y%uh the internet and those who do not.
wvq lrhs" iy ld¾hlaIu;dj by< kxjkq wxls; fn§u hkq f;dr;=re ;dlaIKhg iy
,nhs' wka;¾cd,hg m%fõYh we;s mqoa.,hska iy
tfia fkdue;s wh w;r we;s mr;rh fõ'
ICT supports the rise of digital platforms, e-
Causes of digital divide
commerce, and data-driven industries, wxls; fn§u we;sùug n,mdk fya;=
significantly boosting GDP.
o< foaYh S ksIamdÈ;h ie,lsh hq;= f,i by, Lower income levels limit access to
kxjñka wxls; fõÈld" B-jd‚cHh iy o;a;
technology and internet services.
u; mokï jQ l¾udka;j, ÈhqKqj i|yd ICT wvq wdodhï uÜgï ;dËKh iy wka;¾cd,
iydh olajhs' fiajd fj; m%fõYh iSud lsÍu'
• Expansion of the Economy Rural areas often lack the infrastructure for
wd¾Ólh mq¿,a lsÍu
high-speed internet.
.%dóh m%foaYj, fndfyda úg wêfõ.S
ICT facilitates international trade by wka;¾cd,h i|yd há;, myiqlï fkdue;s
improving communication, logistics, and ùu'
digital transactions, expanding market
reach. Differences in ICT education lead to varying
ikakfs õokh" iemhqï iy wxls; .kqfokq levels of digital literacy.
jeäÈhqKq lsÍu" fj<|m, m%fõYh mq¿,a lsÍu ICT wOHdmkfha fjkialï úúO uÜgï äðg,a
u.ska ICT cd;Hka;r fj<|dug myiqlï idlaIr;djhg fya;= ùu'
imhhs'
Older individuals may have less experience
Countries with advanced ICT infrastructure and skills with technology.
attract foreign direct investment (FDI), jeäysá mqoa.,hskg a ;dlaIKh ms<sn| wvq
fueling further economic expansion w;aoelSï iy l=i,;d ;sìu'
ÈhqKq f;dr;=re yd ikakf s õok ;dlaIK
há;, myiqlï iys; rgj,a ;jÿrg;a Attitudes toward technology can influence
wêfõ.S wd¾Ól m%idrKh i|y úfoaY iDcq
usage and acceptance in certain
wdfhdack ^FDI& wdl¾IKh lr .kS'
communities.
ixialD;sl iïu;hka( ;dËKh flfrys
olajk wdl,am we;eï m%cdjkays Ndú;hg iy
ms<s.ekSug n,mEï l< yels ùu'
'
102
ictfromabc.com
Digital Bridge • Equal opportunities for all
wxls; fia;=j ieug iudk wjia:d ,nd§u
The process of bridging the digital divide is Making internet services available for
simply known as digital bridge. all by programs such as free public wifi
wxls; fnÿu ke;s lsÍfï l%shdj,sh wxls; and so on.
fia;=j f,i ir,j yÿkajkq ,efí' fmdÿ jhs*hs l,dm jeks jHdmaD;s u.ska
wka;¾cd, myiqlu ieug ,nd§u'
Implement government-supported
subsidies to make tablets, computers,
and smartphones more affordable for
underserved populations.
wvq myiqlï iys; ck.ykh i|yd
geí,Ü" mß.Kl iy iaud¾Üf*daka jvd;a
oeßh yels ñ,lg ,nd §u i|yd rcfha
wkq.y
% h ,nk iykdOdr l%shd;aul lsÍu'
103
ictfromabc.com
B) Cyberbullying Effects of addiction
ihsn¾ ysßyer lsÍu weíneysùu ksid isÿ jk n,mEï
104
ictfromabc.com
D) Spread of misinformation and fake News Websites and Blogs: Some websites
news mimic sources, sharing misleading articles
jerÈ f;dr;=re iy wi;H mqj;a me;srùu or headlines to draw attention.
mqj;a fjí wvú iy íf,d.a( iuyr fjí wvú
Misinformation: Incorrect or misleading uQ,dY% wkqlrKh lrhs" wjOdkh fhduq lsÍu
information shared without harmful intent, i|yd fkduÕ hjk iq¿ ,sms fyda isria;,
such as unverified health advice or fnod .kS'
outdated news.
jerÈ f;dr;=re( i;Hdmkh fkdl< fi!LH Prevention and Management
Wmfoia fyda h,a mek .sh mqj;a jeks ydkslr je<elaùu iy l<ukdlrKh
fÉ;kdjlska f;drj fnod .kakd ,o jerÈ
fyda fkduÕ hjk f;dr;=re fõ' Websites like Snopes, FactCheck.org, and
PolitiFact verify and debunk popular myths
Fake News: Deliberately falsified
or false claims.
information crafted to deceive, often to
Snopes, FactCheck.org iy PolitiFact jeks
promote an agenda, generate outrage, or fjí wvú ckm%sh ñ:Hdjka fyda jHdc ysñlï
gain financial or political benefit. i;Hdmkh lr bj;a lrkq ,nhs'
jHdc mqj;a( fndfyda úg kHdh m;%hla
m%j¾Okh lsÍu" fldamh ckkh lsÍu fyda
uQ,H fyda foaYmd,k m%;s,dN ,nd .ekSu i|yd Teaching users to critically assess online
/jàug ie,iqï lrk ,o f;dr;=re jHdc information and identify credible sources
f;dr;=re fõ' helps reduce susceptibility.
ine¢ f;dr;=re úfõpkd;aulj ;lafiare
Common Platforms for Spread lsÍug iy úYajikSh uQ,dY% y÷kd .ekSug
me;sÍu i|yd fmdÿ fõÈld mßYS,lhskga b.ekaùu' th ixfõ§;dj wvq
lsÍug WmldÍ fõ'
Social Media: Platforms like Facebook,
Twitter, and Instagram allow rapid
dissemination due to easy sharing, which
enables misinformation to go viral.
iudc udOH( f*aianqla" Üúg¾ iy bkaiag.%Eï
jeks fõÈld myiqfjka fnod.ekSu fya;=fjka
fõ.fhka fnod yeÍug bv i,ihs" tuÕska
jerÈ f;dr;=re ffjria ùug yels fõ'
105
ictfromabc.com
2. Health Issues Taking frequent breaks, using ergonomic
fi!LH .eg¨ equipment, and practicing hand stretches
can help reduce RSI risk.
The use of Information and ks;r úfõl .ekSu" ergonomic WmlrK
Communication Technology (ICT) can lead q q lsÍu RSI
Ndú;d lsÍu iy w;a È.= lsÍu mqyK
to a range of health issues due to wjodku wvq lsÍug WmldÍ fõ'
prolonged screen time, repetitive
movements, and other physical and mental
C) CTS – Carpel Tunnel Syndrome
demands.
ldmd, fodakd iy,laIKh
f;dr;=re yd ikakf s õok ;dlaIKh (ICT)
Ndú;h È.= ;sr ld,h" mqkrdj¾;k p,khka
Carpel tunnel syndrome is the feeling of a
iy fjk;a YdÍßl yd udkisl b,a,Sï
fya;=fjka fi!LH .eg¨ rdYshlg fya;= úh numbness and pain in the fingers.
yel' ldmd, fodakd iy,laIKh hkq weÕs,sj,
ysßjeàula iy fõokdjla oekSuhs'
A) Musculoskeletal Problems
udxYfmaYs iy wiaÓ wdY%s; .eg¿ The pain arises due to the pressure exerted
on the wrist. Incorrect use of the key board
Non-stop use of a computer can bring and the mouse or placing them in the
about pain in different muscles and bones incorrect positions are reasons for the
of the human system. The main reason for syndrome.
this is the wrong posture taken with the use ue‚la lgqj u; we;s jk f;rmSu fya;=fjka
fõokdj mek k.S' h;=re mqjrej iy uQislh
of the computer jerÈ f,i Ndú;d lsÍu fyda tAjd jerÈ
mß.Klhla fkdkj;ajd Ndú;d lsÍu ñksia ia:dkj, ;eîu fï i|yd fya;= fõ'
moaO;sfha úúO udxY fmaYj s , iy wiaÓj,
fõokdj we;s l< yelsh' fuhg m%Odk fya;=j
Ergonomic wrist supports, minimizing wrist
mß.Klh Ndú;fha§ jerÈ bßhõ j,ska
isàuhs' strain, taking breaks, and in severe cases,
medical treatments like wrist splints or
surgery can help reduce CTS risk.
B) RSI – Repetitive Stress Injury Ergonomic ue‚la lgqj wdOdrl" ue‚la
mqkrdj¾;S wd;;s mSvdj lgqfjys wd;;sh wju lsÍu" úfõl .ekSu"
iy oreKq wjia:dj, § ue‚la lgqj iama,skÜ a
Repetitive stress injury is the pain lsÍu fyda Y,Hl¾u jeks ffjoH m%;sldr CTS
extending from the shoulder to the fingers wjodku wvq lsÍug WmldÍ fõ'
of the body.
mqkrdj¾;S wd;;s mSvdj hkq Wrysfia isg
YÍrfha weÕs,s olajd úysfok fõokdjhs'
106
ictfromabc.com
D) CVS - Computer Vision Syndrome Reducing screen time, adjusting lighting,
mß.Kl oDIaÀ iy,laIKh hydrating, and practicing relaxation
techniques can alleviate headaches related
Staying glued to the computer for 6 to 7 to ICT use.
hours continuously can cause eye irritation, ;srfha ld,h wvq lsÍu" wdf,dalh ilia lsÍu"
which is known as computer vision ic,kh lsÍu iy ,sy, s a lsÍfï l%u mqyK
q q
syndrome. lsÍu f;dr;=re yd ikakf s õok ;dlaIK
meh 6 la 7 la muK wLKavj mß.Klfha we,S Ndú;hg wod< ysiroh iukh l< yelsh'
isàfuka weiaj, wdid;añl;d we;s úh yels
w;r th mß.Kl oDIaÀ iy,laIKh f,i
y÷kd .efka' Correct posture while using computer
mß.Kl Ndú;fha ksjerÈ bßhõj
Signs of discomfort include dry eyes, eye
redness, tearing, blurred vision, or head,
neck, or back pain.
weia úh<su" weiaj, r;= meyeh" lÿ¿ .e,Su"
fkdmeyeÈ,s fmkSu" fyda ysi" fn,a, fyda
msgqmi fõokdj wmyiq;djfha ,laIK fõ'
107
ictfromabc.com
3. Economical issues Some of the lost jobs are as follows.
wd¾Òl .eg¿ tA wdldrhg wysó jQ /lshd lsym s hla my;
mßÈ fõ'
A) De-Skilling
yiqre l=i,;d wfydais ùu • Driver - The popularity of autonomous
vehicles like Tesla, Zeekr.
ßhÿre - Tesla, Zeekr jeks iajhxl%Shj
Odjkh l< yels jdyk j¾. ckm%sh ùu'
108
ictfromabc.com
But with information and communication B) Increased income inequality
technology there are many new job wdodhï wiudk;djh jeä ùu
opportunities. Some of them are as follows.
kuq;a f;dr;=re yd ikakf s õok ;dlaIKh;a Wealth concentration among tech
iuÕ ìysjQ kj /lshd wjia:d úYd, companies and the outsourcing of jobs to
m%udKhla mj;S' bka lsyms hla my; mßÈ fõ' lower-wage regions further exacerbate
• Data Analys economic disparities.
o;a; úYaf,aIl ;dlaI‚l iud.ï w;r Okh ixflakø a Kh
ùu iy wvq jegqma iys; l,dmj,g /lshd
• Cybersecurity Specialist ndysßka ,nd §u wd¾Ól úIu;d ;j ÿrg;a
ihsn¾ wdrlaIK úfYaI{ W.% lrhs'
• Software Developer
uDÿldx. ixj¾Ol
• Web Developer
fjí ixj¾Ol
• Cloud Engineer
j,dl=¿ bxðfkare
• UX/UI Designer
UX$UI ks¾udKlre
This can widen the gap between the rich
• Network Administrator and the poor.
cd, mßmd,l fuu.ska Okj;=ka iy ÿmam;=ka w;r mr;rh
\ jeä úh yelsh'
• Virtual Reality Developer
w;:H ;;H:d ixj¾Ol
• IoT Specialist
IoT úfYaI{
• Robotics Engineer
frdfnda bxðfkare
109
ictfromabc.com
4. Environmental issues How to properly dispose of e-waste?
mdßißl .eg¿ bf,lafg%dksl wmøjH ksismßÈ neyer
lrkafka flfiao@
A) E-waste generation
bf,lafg%dksl wmøjH ckkh Here the concept of 3R can be used.
fuys§ 3R ixl,amh Ndú;d l< yelsh'
When an electronic device reaches the end
of its useful life, it becomes electronic Reduce
waste. Ndú;h wju lsÍu'
bf,lafg%dksl Wmdx.hl l%shdldÍ ld,h
wjika jQ úg th bf,lafg%dksl wmøjHhla One should buy electronic devices only if
njg m;afõ' they are essential.
;ukag w;HjYH kï muKla bf,lafg%dksl
Wmdx. ñ,§ .ekSuhs'
Reuse
kej; m%fhdackhg .ekSu'
110
ictfromabc.com
Increased energy consumption and 5. Ethical issues
global warming iodpdrd;aul .eg¿
n,Yla;s mßfNdackh iy f.da,Sh WIaK;ajh
jeä ùu A) Plagiarism
rpkd fp!r;ajh
The growth of ICT has led to increased
energy consumption, contributing to Plagiarism is the act of using someone
global warming due to higher greenhouse else's ideas without proper permission and
gas emissions. presenting it as your own.
f;dr;=re yd ikakf s õok ;dlaIK j¾Okh rpkd fp!r;ajh hkq fjk;a flfkl=f.a
ksid n,Yla;s mßfNdackh by< f.dia we;s woyia ksis wjirhlska f;drj Ndú;d lr th
w;r" by< yß;d.dr jdhq úfudapkh Tfíu f,i bÈßm;a lsÍuhs'
fya;=fjka f.da,Sh WIaK;ajh by< hdug
odhl fõ' There are three main ways to remove
plagiarism from a content.
Electronic devices consume significant hï wka;¾.;hl rpkd fp!r;ajh bj;a
electricity, often from non-renewable lrk m%Odk l%u ;=kla mj;S'
sources, raising carbon emissions.
bf,lafg%dksl Wmdx. fndfyda úg mqk¾ckkSh Citing
fkdjk m%Njhkaf.ka ie,lsh hq;= úÿ,shla Wmqgd oelaùu
mßfNdackh lrhs" tu.ska ldnka úfudapkh Mentioning the rightful owner and his/her
by< kxjhs' information.
i;H rplhd iy Tyqf.a$wehf.a f;dr;=re
Sustainable practices, like using renewable i|yka lsÍuhs'
energy and improving energy efficiency,
are needed to reduce ICT's environmental Quoting
impact. f.kyer oelaùu
ICT ys mdßißl n,mEu wju lsÍu i|yd The use of inverted commas (“…..”) to
mqk¾ckkSh n,Yla;sh Ndú;d lsÍu iy identify a selected or borrowed section.
n,Yla;s ld¾hlaIu;dj jeä ÈhqKq lsÍu jeks msgm;a lr.;a fldgi y÷kd .ekSug Wvq
;sridr Ndú;hka wjYH fõ' fldud ^^—'''''˜&& Ndú;d lsÍuhs'
Referencing
fhduqj oelaùu
Specifying the address of the web page
from which the information is collected.
This is usually done at the end of an essay
or article.
f;dr;=re /ia lrk ,o fjí msgqfõ ,smskh
i|yka lsÍuhs' fuh idudkHfhka wka;¾.;h
wjidkfha isÿ flf¾'
111
ictfromabc.com
The belongs and not belongs for plagiarism are as follows.
rpkd fp!r;ajh i|yd wh;a jk foa iy wh;a fkdjk foa my; mßÈ fõ'
Using someone else's ideas without proper Facts widely known and undisputed (e.g.,
credit. “The Earth orbits the Sun”).
ksis i|yka lsÍula fkdue;sj fjk;a mq¿,a f,i okakd iy wújdÈ; lreKq ^Wod( —
flfkl=f.a woyia Ndú;d lsÍu' mDÓúh iQ¾hhd jgd mßN%uKh fõ—&'
Presenting another person’s work as your Content that is accurately referenced with
own. proper citations.
fjk;a mqoa.,fhl=f.a jev Tfíu f,i ksis Wmqgd oelaùï iuÕ ksjerÈj i|yka lr
bÈßm;a lsÍu' we;s wka;¾.;h'
Reusing your own previously published Direct quotes enclosed in quotation marks
work without disclosure. and sourced correctly.
fy<sorõ lsÍulska f;drj Tfíu l,ska iDcq Wmqgd oelaùï WoaOD; ,l=Kqj, we;=<;a
m%ldYs; foa kej; Ndú;d lsÍu' lr ksjerÈj uQ,dY% lr we;'
Using parts of content verbatim without Materials that are free from copyright and
quotation marks or citation. available for unrestricted use.
WoaOD; ,l=Kq fyda Wmqgd oelaùulska f;drj m%ldYk ysñlfuka ksoyia iy iSud rys;
wka;¾.;fha fldgia jdÑlj Ndú;d lsÍu' Ndú;h i|yd ,nd .; yels wka;¾.;hka'
112
ictfromabc.com
6. Privacy issues B) Data Breaches
fm!oa.,sl;aj .eg¿ o;a; lvlsÍï
113
ictfromabc.com
7. Legal Issues C) Data thefts
ffk;sl .eg¨ o;a; fidrlu
114
ictfromabc.com
E) Unauthorized access into computer • Patent
systems fmagkaÜ n,m;%
mß.Kl moaO;s j,g wkjirfhka we;=,a ùu
A license is given to the owner of an
Accessing a personal computer or a invention conferring a right or title for a set
network of computers without the consent period, especially the sole right to exclude
of the owner. others from making, using, or selling the
whs;slref.a wjirhlska f;drj mqoa.,sl invention.
mß.Klhlg fyda mß.Kl cd,hlg m%fõY kj ks¾udKlrefjlag hï ld,hla hk;=re
ùuhs' ksuejqul ysñlu ,ndfok n,m;%hls' fuu
ld,h f.fjk;=re fjk;a wfhlag fuu
In most cases, the information of the user ks¾udKh Ndú;hg fyda úlsŒug whs;shla
fkdue;'
is disclosed or stolen.
fndfyda wjia:dj,§" mßYS,lhdf.a f;dr;=re
wkdjrKh lsÍu fyda fidrlï lsÍu isÿ lrkq • Trademarks
,efí' fj<| ,l=K
115
ictfromabc.com
Licensed software and Unlicensed Free and open source software (FOSS)
software ksoyia iy újD; uq,dY% uDÿldx. (FOSS)
n,m;%,dNS uDÿldx. iy n,m;% rys;
uDÿldx. Open Source Software
újD; uQ,dY% uDÿldx.
Licensed Software
n,m;%,dNS uDÿldx. Software with publicly accessible source
code, allowing users to use, modify, and
Software that requires users to purchase or distribute it freely under specific open-
obtain permission to use, often under source licenses.
specific terms set by the owner. m%isoaêfha m%fõY úh yels uQ,dY% fla;h iys;
fndfyda úg ysñlre úiska ilik ,o ksYÑ a ; uDÿldx." mßYS,lhskg a úfYaIs; újD; uQ,dY%
kshuhka hgf;a mßYS,lhskg a ñ,§ .ekSug n,m;% hgf;a th Ndú;d lsÍug" fjkia
fyda Ndú;hg wjir ,nd .ekSug wjYH lsÍug iy fnod yeÍug bv i,ihs'
uDÿldx. fõ'
Ex. Microsoft Office, Adobe Photoshop Ex. Linux operating system, Apache web
server, GIMP
Proprietary Software
ysñlï iys; uDÿldx.
116
ictfromabc.com
Aspect Licensed Software Free and Open-Source Software
(FOSS)
Cost Usually requires payment (one- Free to use, modify, and distribute.
msßjeh time, subscription, or per-user Ndú;d lsÍu" fjkia lsÍu iy fnod
fees). yeÍu fkdñf,a isÿ l< yel'
idudkHfhka f.ùula wjYH fõ
^tla-jrla" .%dyl f.ùula fyda
tAl-mßYS,l .dia;=&'
Source Code Source code is proprietary and Source code is openly available for
Access not available to users. anyone to view, modify, or share.
uQ,dY% fla; uQ,dY% fla;h ysñldÍ jk w;r ´kEu flfkl=g ne,Sug" fjkia
m%fõYh mßYS,lhskg a ,nd .; fkdyel' lsÍug fyda fnod .ekSug uQ,dY% fla;h
újD;j mj;S'
Customization Limited or not allowed due to Fully customizable by modifying the
wNsreÑlrKh restricted access to source code. source code.
m%Nj fla;hg m%fõYh iSud lsÍu uQ, fla;h fjkia lsÍfuka
fya;=fjka iSñ; fyda wjir ke;' iïmQ¾Kfhkau wNsreÑlrKh l<
yelsh'
Support and Provided by the software Often community-driven; some
Updates vendor, often as part of the projects offer paid support.
iydh iy license fee. fndfyda úg m%cdj úiska fufyhjkq
hdj;ald,Sk fndfyda úg n,m;% .dia;=fõ ,efí¦ iuyr jHdmD;s uqo,a f.jd
fldgila f,i uDÿldx. wdOdr lrhs'
wf,úlre úiska imhkq ,efí'
Ownership and Owned by the vendor or Users have full ownership of the
Rights company, and users get limited code they modify and adhere to
ysñldß;ajh iy rights to use it. open-source licenses.
whs;sjdislï wf,úlreg fyda iud.ug ysñ jk mßYS,lhskg a Tjqka fjkia lrk iy
w;r" mßYS,lhskg a th Ndú;d újD; uQ,dY% n,m;%j,g wkql+, jk
lsÍug iSñ; ysñlï ,efí' fla;fha mQ¾K ysñldß;ajh we;'
Security Security patches are managed Code is publicly reviewed, which can
wdrlaIdj by the vendor, but code lead to faster identification and
transparency is limited. fixing of vulnerabilities.
wdrlaIl wx. wf,úlre úiska fla;h m%isoaêfha iudf,dapkh lrkq
l<ukdlrKh lrkq ,efí" kuq;a ,efí" th blaukska y÷kd .ekSug iy
fla; úksúoNdjh iSñ;h' wjodkï ksjerÈ lsÍug fya;= úh yel'
117
ictfromabc.com
How to protect data Avoiding Suspicious Emails and Links:
o;a; wdrlaId lr.kakd wdldrh iel iys; Bfï,a iy ine¢ j<lajd .ekSu(
118
ictfromabc.com