Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
23 views46 pages

ICT2021

The document provides an overview of the internet, its services, applications, and various aspects of social networking. It discusses key internet services such as email, file transfer, and online shopping, as well as the importance of IP addresses and URLs. Additionally, it covers popular social media platforms like Facebook, Twitter, and LinkedIn, highlighting their features and functionalities.

Uploaded by

Srinu Shahu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
23 views46 pages

ICT2021

The document provides an overview of the internet, its services, applications, and various aspects of social networking. It discusses key internet services such as email, file transfer, and online shopping, as well as the importance of IP addresses and URLs. Additionally, it covers popular social media platforms like Facebook, Twitter, and LinkedIn, highlighting their features and functionalities.

Uploaded by

Srinu Shahu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 46

UNIT-1

 Internet and its services:


 Internet:
 The internet is a global network that connects billions of computers all over
the world.
 It is a network of networks. The internet links different organizations,
academic institutions, government offices, and home users to share
information among large group of users.
 Internet services:
 Today the internet become a part of not only the big organizations,
universities, and offices, but has become the need of home users all over the
world.
 The internet services are:
1. E-Mail:
 Electronic mail or e-mail is a means of transmission of messages
electronically over communication networks.
 E-mail is one of the most widely used services on the internet.
 Anyone who has e-mail account can send an e-mail to any other person who
also has an e-mail account.
 Gmail.com, yahoomal.com, rediffmail.com, hotmail.com, etc. are provides
the e-mail facility to the users.
2. File transfer protocol:
 File transfer protocol is one of the oldest applications of the internet, which
is basically used for transferring files from one computer to another
computer, such as from a user’s personal computer to a web server.
 It is the preferred method of exchanging files because it is faster and
reliable.
3. Chatting:
 Chatting is a very popular service of the internet that allows two or more
online users come together to talk using an instant messenger.
 Chatting helps users to stay connected with concerned people in business or
family who live many miles away.
4. Electronic news paper:
 An online news paper is a newspaper on the internet, which is either
published separately or as an online version of a printed periodical.
5. World Wide Web:
 the technical definition of the World Wide Web or simply web can be given
as “all resources and users on the internet that are using the hypertext
transfer protocol” on the web, all the documents are formatted in a special
markup language is called HTML.
6. Online shopping:
 Online shopping refers to buying goods or services from merchants who sell
on the internet.
7. Search engine:
 The World Wide Web stores enormous amount of information on an
amazing variety of topics in hundreds of millions of pages.

 Internet addressing:
 Each computer and router on the internet must have a name so that it can be
uniquely identified.
 An Internet addressing or Internet protocol address or IP address consists of
32 bits, or four bytes.
 IP addresses as four natural numbers from 0-255. It is common to express
IP addresses as four natural numbers separated by dots.
 The network interface card (NIC) of every computer that wants to send or
receive messages on the internet must have atleast one address.
 This is similar to the need for you to have a unique address receive mail.
 On the internet, this address is called IP address.
 IP address is often expressed in the dotted decimal format, such as:
192.168.1.1

 IP address can be divided into 3 classes they are


1. Class A: supports 16 million hosts on each of 126 networks
2. Class B: supports 65 thousand hosts on each of 16 thousand networks.
3. Class C:suppors 254 hosts on each of 2 million networks.
 Internet applications:
 Internet is interconnection of large number of heterogeneous computer
networks all over the world that can share information back and forth.
 These interconnected network exchange information by using same
standards and products. The internet is treated as one of the biggest
invention.
 It has a large number of uses.
 Communication
 It is used for sending and receiving message from one and other through
internet by using electronic mail.
 Some of the web sites providing this service are yahoo mail. Com Hotmail.
Com rediffmail.com etc.
 Job searches
 Getting information regarding availability of job in different sectors and
areas.
 You can publish your resume in online for prospective job some of the web
sites providing this service are naukri.com, monster. Com, summer job.
Com, recuritmentidia.com etc.
 Finding books and study material
 Books and other study material stared around the world can be easily located
through internet. Latest encyclopedias are available online.
 Health and Medicine
 Internet provides information and knowledge about field of health and
medicine.
 People can have information about various diseases and can receive help.
Patient can be taken to virtual check room where they can meet doctors.
 Travel
 One can use internet to gather information about various tourist place.
 It can be used for booking holiday tours, hotels, train and flights.
 Some of the web sites providing this service air India travels. Org. com, raj
travel. Com, make mytrip. Com.
 Entertainment
 Songs, movies, latest sports update through internet some of the web sites
providing this services are cricinfo.com.
 Shopping
 Internet is also used for online shopping.
 By just giving accounts details you can perform the transaction you can
even pay your bills and perform bank related transaction.
 Stock Market Updates
 You can sell or bases shares white sitting on computer through interest
several websites like ndtv profit.com, money pore.com, provide information
regarding investment.
 Research
 A large number of people are using internet for research purposes you can
download any kind information by using internet.
 Business use of internet:
 Different ways by which internet can be used for business are:
1. Information about the product can be provided online to the customer.
2. Provide market information to the business.
3. It helps business to recruit talented people.
4. Help in locating suppliers of the product.
5. Fast information regarding customers view about company’s product.
6. Eliminate middle men and have a direct contact with customer
7. Providing information to the investor by providing companies
background and financial information on website.
 Entering a website address:
 The area which is dedicated to enter the website address in the internet
explorer is address bar. Put cursor at the address bar then type the address of
the website you want to open.

WWW.FACEBOOK.COM
 For example if you want to open Facebook website then type
www.facebook.com in the address bar and then press the enter button the
Facebook page will displayed at web page area in the browser

 Searching the internet:


 By using the search engines, searching the information on the internet is
easy.
 Search engine is an approach to organize the information and locating the
information on the web, which is a computer program.
 Popular search engines are: www.google.com, www.ask.com,
www.alltheweb.com, etc.
 for example you want to search about the applications of internet on the
internet. Then you have followed these steps:
1. Enter the website of the search engine at the address bar for example
www.google.com
2. After Google page opened then type “applications of internet” at the search
box and then press enter button on the keyboard.
3. The Google will search about “applications of internet” in its server and
displays some results.
4. Open the results one by one; in any one of them you got the relevant
information.

 URL, components of URL:


 URL: Uniform Resource Locator.
 URL can be seen to be synonymous with a 'web address'.
 The website address you have entered at the address bar is also called as
URL.
 Components of URL: components or parts of Uniform resource locator are:

 Types of URL: -
 URL s varies depending on the location of the documents to which user will
link.
 Basically URLS fall into two categories; Absolute and relative URL.
 Absolute URL:
 An absolute URL contains all the information necessary to find the files on
the internet.
 It contains the protocol indicator, host name, folder name and File name.
 Absolute URL are similar to address used by the U.S postal service, which
include a name, street address, apartment number, city, state and zip code.
 If same of the information is missing – bay, the street number or house
number. The carrier can’t deliver the mail to the right person.
 Similarly, if the protocol indicator or host name is missing from a URL,
browsers can not link to a specific file because they won’t know where and
how to look for the file.
 Likewise, if the folder or file name is missing, browsers won’t know which
piece of information to pull of the server.
 Relative URLS:
 A relative URL usually contains only the folder name and file name or even
just the file name.
 We can use these partial URLs when we are pointing to a file that’s located
within the same folder or on the same server as the originating file.
 In these cases, a browser doesn’t need the server name or the protocol
indicator because it assumes the files are located in a folder or on a server
that’s relative to the originating document.
 User can use relative URLS to refer to documents in relation to the
originating documents, which is called document.
 Relative URLS or to the server on which the originating document resides,
which is called server – related URLS.
 Browser:
 A browser is a software application used to locate, retrieve and display
content on the World Wide Web, including Web pages, images, video and
other files.
 Types of Browsers:
 Web Browsers are software installed on your PC. To access the Web, you
need a web browser, such as Netscape Navigator, Microsoft Internet
Explorer or Mozilla Firefox.

 Internet Explorer:
 Internet Explorer (IE) is a product from software giant Microsoft.
 This is the most commonly used browser in the universe.
 This was introduced in 1995 along with Windows 95 launch.

 Google Chrome:
 This web browser is developed by Google and its beta version was first
released on September 2, 2008 for Microsoft Windows.
 Today, chrome is known to be one of the most popular web browsers with
its global share of more than 60%.

 Mozilla Firefox:
 Firefox is a new browser derived from Mozilla.
 It was released in 2004 and has grown to be the second most popular
browser on the Internet.
 Safari:
 Safari is a web browser developed by Apple Inc. and included in Mac OS X.
 It was first released as a public beta in January 2003.
 Safari has very good support for latest technologies like XHTML, CSS2 etc.

 Opera:
 Opera is smaller and faster than most other browsers, yet it is full- featured.
Fast, user-friendly, with keyboard interface, and more.

 Introduction to Social networking:


 Social networking on social media websites involves the use of the internet
to connect users with their friends, family and associates.
 Social media websites are not necessarily about meeting new people online,
although this does happen. Instead, they are primarily about connecting with
friends, family and associates you already have in real life.
 The most well-known social media sites are Facebook, Twitter, Instagram
and LinkedIn.
 These sites allow you to share photos, videos and information, organise
events, chat, and play online games.
 Concepts in the social media are:
 Your Profile Page:
 When you sign up to a social media site you need to provide your email
address to verify your identity.
 This will automatically create your profile page.
 Depending on the social media site you're using, a profile page usually
allows you to post a picture and a few general details about you and your
interests.
 Your friends will be able to see your profile page and the information that
you share.
 They will also be able to leave comments or share information with you on
your profile page.

 Privacy:
 Social media sites have a variety of privacy settings you can adjust. This
means you can control who sees your profile page and other information you
share on the site.
 Some people do not mind having their personal information available for
anyone to view online. However, we strongly recommend that you don't
publish your home address and be mindful of posting other personal
information about yourself (including your birthday), or others especially if
you don't have their permission.
 Friends:
 The whole point of joining social media websites is to be in touch with your
friends and family.
 "Friends" in the context of social media, and Facebook in particular, has a
specific meaning.
 For example, for you to interact online with a friend, family member or
associate either one of you must first send a "friend request" to the other and
then have that request accepted.
 Once accepted, the technology recognises you as "friends" and you can
interact with each other online, so you can view the other person's profile
page, see their pictures, and send them messages.

 Twitter:
 It is an online social networking service that enables users to send and
read short 140- character messages called "tweets".
 Registered users can read and post tweets, but those who are unregistered
can only read them.
 Users access Twitter through the website interface, SMS or mobile
device app.
 Twitter was created in March 2006 by Jack Dorsey, Evan Williams, Biz
Stone, and Noah Glass and launched in July 2006.
 The service rapidly gained worldwide popularity; it was one of the ten
most-visited websites and has been described as "the SMS of the
Internet". As of March 2016, Twitter has more than 320 million monthly
active users.

 Tumblr:
 Tumblr is a micro-blogging and social networking website founded by
David Karp in 2007, and owned by Yahoo! since 2013.
 The service allows users to post multimedia and other content to a short-
form blog.
 Users can follow other users' blogs. Bloggers can also make their blogs
private.
 Linkedin:
 LinkedIn is a business-oriented social networking service.
 It was Founded on December 14, 2002, and launched on May 5, 2003.
 it is mainly used for professional networking.
 As of 2015, most of the site's revenue came from selling access to
information about its users to recruiters and sales professionals.
 As of March 2016, LinkedIn has more than 433 million users, out of which
more than 106 million are active.
 Facebook:
 Facebook is an online social networking service based in Menlo Park,
United States.
 The Facebook website was launched on February 4, 2004 by “Mark
Zuckerberg”, along with fellow Harvard College students and roommates,
the founders had initially limited the website's membership to Harvard
students; however, later they expanded it to higher education institutions in
the Boston area.
 Users can create a user profile, add other users as "friends", exchange
messages, post status updates and photos, share videos, use various
applications (apps), and receive notifications when others update their
profiles.
 Additionally, users may join common-interest user groups organized by
workplace, school, or other topics, and categorize their friends into lists such
as "People from Work" or "Close Friends".
 In groups, editors can pin posts to top.

 Flickr:
 Flickr is an image hosting and video hosting website and web services suite
that was created by Ludicorp in 2004 and acquired by Yahoo in 2005.
 In addition to being a popular website for users to share and embed personal
photographs, and effectively an online community, the service is widely
used by photo researchers and by bloggers to host images that they embed in
blogs and social media.
 Skype:
 Skype is an application that provides video chat and voice call services.
Users may exchange such digital documents as images, text, video and any
others, and may transmit both text and video messages.
 Skype allows the creation of video conference calls.
 Skype is available for Microsoft Windows, Macintosh, or Linux, as well as
Android, Blackberry, and both Apple and Windows smart phones and
tablets.
 Skype Credit or a subscription is required to call a landline or a mobile
phone number.
 At the end of 2010, there were over 660 million worldwide users, with over
300 million estimated active each month as of August 2015.
 Yahoo!:
 Yahoo is an American multinational technology company headquartered in
Sunnyvale, California.
 It is globally known for its Web portal, search engine Yahoo! Search, and
related services, including Yahoo! Directory, Yahoo! Mail, Yahoo! News,
Yahoo! Finance, Yahoo! Groups, Yahoo! Answers, advertising, online
mapping, video sharing, fantasy sports and its social media website.
 It is one of the most popular sites in the United States. Yahoo was founded
by Jerry Yang and David Filo in January 1994 and was incorporated on
March 2, 1995. Marissa Mayer, a former Google executive, serves as CEO
and President of the company.
 YouTube:
 YouTube is a global video-sharing website headquartered in San Bruno,
California, United States.
 The service was created by three former PayPal employees in February
2005.
 In November 2006, it was bought by Google for US$1.65 billion.
 YouTube now operates as one of Google's subsidiaries.
 The site allows users to upload, view, rate, share, and comment on videos,
and it makes use of WebM, H.264 / MPEG-4 AVC, and Adobe Flash Video
technology to display a wide variety of user-generated and corporate media
video.
 Available content includes video clips, TV clips, music videos, movie
trailers, and other content such as video blogging, short original videos, and
educational videos.
 Whatsapp:
 WhatsApp Messenger is a proprietary cross-platform, encrypted, instant
messaging client for smartphones.
 It uses the Internet to send text messages, documents, images, video, user
location and audio messages to other users using standard cellular mobile.
 As of February 2016, WhatsApp had a user base of one billion, making it the
most popular messaging application.
 WhatsApp Inc., based in Mountain View, California, United States, was
acquired by Facebook Inc. on February 19, 2014, for approximately US$19.3
billion.
UNIT-2
 E-Mail:
 E-Mail or electronic mail is a system for sending messages from one
individual to another via telecommunications links between computers or
terminals using dedicated software.
 The sender and receiver must have email addresses to share their data.
 Advantages and disadvantages:
 Advantages:
 As in the early days of the telephone, the original users of email only had a
limited number of people whom they could communicate.
 Now that email is more prevalent, some of the advantages of using email
are:
1. Convenience: there are not trips to post office and no need to search for
stationary and stamps. Sending information through email is easy.
2. Speed: email is fast, based on the speed of the underlying communication
network.
3. Inexpensive: once you are on-line, the cost of sending a message is small.
4. Printable: a hard copy is easy to obtain.
5. Global: increasingly, people and business all over the world are using email.
 Disadvantages:
 Despite all of the advantages, we should bear in mind that not everyone
everywhere has access to email.
 Although the telephone is not truly universal either, it still far outdistances
email in terms of its worldwide availability.
1. Misdirection: with email, you are your own worst enemy. It is far more
likely that you will accidentally send email to an unintended recipient than it
is for someone actually to intercept your email.
2. Forgery: email does not preclude forgeries, that is, someone impersonating
the sender, since the sender is usually not authenticated in any way.
3. Overload: email can also be too convenient and result in a flood of mail.
4. Junk: another more recent negative development involves junk email. This
flooding of undesirable or inappropriate email is sometime referred to as
spam and is becoming serious problem.
5. No response: A mild frustration sometimes associated with using email is
dealing with recipients who do not read and respond to their email on a
regular basis.

 User ID, Password, Email addresses:


 User ID:
 User ID or User name or account name.
 User id is the concatenation of the word “user” and “id” stands for
identification.
 Your user id identifies you to the computer.
 User names must be single word containing group of alphabets, digits and
symbols.
 If your name were Mary H. Lamb, sensible login names would be mhlamb,
marylamb, mlamb, or lamb.
 Note that uppercase or lowercase is normally not significant in email names.
 Password:
 your password is a secret code that authenticates you to the computer.
 In theory, you are the only one who knows the password to your account,
and no one except you should be able to log on to your account.
 A good password should be: at least five letters long contain a non
alphabetical symbol such as # *, contain a number, posses uppercase and
lowercase letters.
 Email Addresses:
 The basic form of email address is “username@domainname”.
 The text before the @ sign specifies the username of the individual, while
the text after the @ sign indicates how the computer system can locate the
individual mail box.
 For example [email protected] here aniltimes13 is username and
gmail.com is domain name or server name.
 Domain names:
 Domain names are used to identify one or more IP addresses.
 For example, the domain name microsoft.com represents about a dozen IP
addresses.
 Domain names are used in URLs to identify particular Web pages.
 For example, in the URL http://www.pcwebopedia.com/index.html, the
domain name is pcwebopedia.com.
 Every domain name has a suffix that indicates which top level domain
(TLD) it belongs to.
 There are only a limited number of such domains. For example:
1. gov - Government agencies
2. edu - Educational institutions
3. org - Organizations (non profit)
4. mil – Military
5. com - commercial business
6. net - Network organizations

 Mailers:
 A mailer is the software that allows you to manage, read, and compose
email.
 Examples for mailers are: gmail.com, mail.yahoo.com, rediffmail.com,
ymail.com, etc.
 Message components:
 An email message consists of the following general components:
 Headers:
 The message headers contain information concerning the sender and
recipients.
 The exact content of mail headers can vary depending on the email system
that generated the message.
 Generally, headers contain the following information:
1. Subject. Subject is a description of the topic of the message and displays in
most email systems that list email messages individually.
2. Sender (From). This is the sender's Internet email address. It is usually
presumed to be the same as the Reply-to address, unless a different one is
provided.
3. Date and time received (On). The date and time the message was received.
4. Reply-to. This is the Internet email address that will become the recipient of
your reply if you click the Reply button.
5. Recipient (To :). First/last name of email recipient, as configured by the
sender.
6. Recipient email address. The Internet mail address of the recipient, or where
the message was actually sent.
7. Attachments. Files that are attached to the message.
8. Body: The body of a message contains text that is the actual content, such as
"Employees who are eligible for the new health care program should contact
their supervisors by next Friday if they want to switch." The message body
can also include signatures or automatically generated text that is inserted by
the sender's email system.

 Message composition: To create and send a new email message, then


follow these steps:
1. Click compose button.
2. Type the recipient's email address in the To box. Enter multiple addresses
by separating them with a comma. NOTE: If the person is in your Address
Book, you can just start typing the email address (or the name you've entered
as their "Display Name") and a list of choices will appear. Just choose the
correct one from the list.

3. In the CC box (carbon copy) type the email addresses you want to receive
a copy of the email. (A recipient who is CC is able to see and correspond
with the other recipients of the message.)
4. In the BCC box (blind carbon copy) type the email addresses you want to
receive a copy of the email. (The email addresses of recipients who are BCC
will not appear in the headers of the message.)
5. Type a brief description of the email message in the Subject box. For
example, if you're sending out a recipe for oatmeal cookies, the subject
might be "My oatmeal cookies recipe".
6. Type the body of the email message.
7. If you wish to add a signature to your email, select one from the Signature
pull-down menu.
8. If you wish to attach files to this message, use the Browse buttons at the
bottom of the page to choose files from your hard drive. You can include up
to three attachments with a message.
9. If you want to send your email message now, click Send.
10. If you want to send your email message later, or work on it more at a
later time, click Save as a draft and you'll be able to retrieve it from the
Drafts folder later.
 Mail management:
 Email management is a systematic approach to maximizing the efficiency of
email practices and minimizing the negative effects that email handling can
have on an individual's productivity and job satisfaction.
 Tips for effective email management include:
1. Limiting the number of times you process mail in a day.
2. Limiting the amount of time you dedicate to processing email in a given
session.
3. Only keeping your email program open while you are actively dealing with
it.
4. Checking email only when you are going to process it.
5. Deleting as many messages as possible immediately.
6. Responding immediately to messages that can be answered very briefly.
7. Moving messages to be dealt with later to a separate folder.
8. Responding to only emails that require responses.
9. Limiting recipients to as few individuals as possible.
10. Keeping responses brief.
11. Deleting all messages that are not archived after a specific amount of time.

 Introduction to G-Suite:
 G Suite gives your business two things:
1. Gmail accounts for everyone at your company
2. A suite of office software for your company
 We will get these tools with G Suite:
1. Gmail – email
2. Google Calendar – calendar tool
3. Google Docs – cloud word documents
4. Google Sheets – cloud spreadsheets
5. Google Slides – cloud presentations
6. Google Drive – cloud storage for all your documents
7. Google Meet – video conferencing tool
8. Google Forms – survey tool
 G Suite is like Microsoft Office with everything in the cloud, plus you get a
company Gmail.
 What’s the Difference between G Suite and Gmail?
 Basically, Gmail is free and for individuals. G Suite is paid and for
companies.
 With Gmail, you get a personal email account, some storage in Google
Drive, and access to apps like Google Docs, Slides, and Sheets.
 All for free.
 The storage space is limited and you can’t add additional users.
 You’re also stuck with an email address that looks like [email protected].
 G Suite gives your entire company access to Gmail accounts and the suite
of office products.
 You’ll be able to easily manage users with G Suite Admin, get more storage
in Google Drive, and have email addresses that look like
[email protected].
 But you have to pay a monthly fee for each user at your company.
 Google Drive
 Google Drive is a free service from Google that allows you to store files
online and access them anywhere using the cloud.
 Google Drive also gives you access to free web-based applications for
creating documents, spreadsheets, presentations, and more.
 Google Drive is one of the most popular cloud storage services available
today.
 Because files can be accessed from any computer with an Internet
connection,
 Drive eliminates the need to email or save a file to a USB drive.
 Google Drive allows you to share files; working with others becomes much
easier.
 Creating a Google account In order to use Google Drive, you will need a
Google account.
 Google accounts are free, and signing up for one is fairly simple.
 In order to create a Google account, you'll need to enter some information,
including your name, birth date, and location.
 Creating a Google account will automatically create a Gmail email address
and a Google+ profile.
 If you have a Gmail address, you already have a Google account, so you
won't need to create an account— you can simply sign in to Drive using
your Gmail information.
 How to create Google account:
 To create a Google account:
 1. Go to www.google.com Locate and select the Sign in button in the top-
right corner of the page.

2. Click Create an account.

3. The sign-up form will appear. Follow the directions and enter the
required information.
4. Next enter your phone number. Google will send a verification code to
your phone that you will use to complete the sign up process.
5. Enter the verification code sent to your phone and click Verify.

6. The personal information page will appear. Follow the directions and
enter your information, including your birth date and gender.
7. Review Google's Terms of Service and Privacy Policy, then click I agree

8. Your account will be created.


 Google documents
 Google Drive gives you access to a suite of tools that allows you to create
and edit a variety of files, including documents, spreadsheets, and
presentations.
 There are five types of files you can create on Google Drive:
1. Documents: For composing letters, flyers, essays, and other text-based
files (similar to Microsoft Word documents)
2. Spreadsheets: For storing and organizing information (similar to
Microsoft Excel workbooks)
3. Presentations: For creating slideshows (similar to Microsoft
PowerPoint presentations)
4. Forms: For collecting and organizing data
5. Drawings: For creating simple vector graphics or diagrams
 The process for creating new files is the same for all file types.
 To create a new file:
1. From Google Drive, locate and select the new button, then choose the
type of file you want to create. In our example, we'll select Google
Docs to create a new document.

2. Your new file will appear in a new tab on your browser. Locate and select
untitled document in theupper-left corner.
3. The Rename dialog box will appear. Type a name for your file, then click
OK.

4. Your file will be renamed. You can access the file at any time from your
Google Drive, where it will be saved automatically. Simply double-click
to open the file again.
5. You may notice that there is no Save button for your files. This is because
Google Drive uses autosave, which automatically and immediately saves
your files as you edit them.

 Google spread sheets


 Google Sheets is a web-based spreadsheet application that allows you to
store and organize different types of information, much like Microsoft
Excel.
 While Google Sheets does not offer all of Excel's advanced features, it's
easy to create and edit spreadsheets ranging from the simple to the
complex.
 To create a new Google spreadsheet:
1. While viewing your Google Drive, click New and select Google Sheets
from the drop-down menu.
2. The spreadsheet will appear in a new browser tab.

3. To name your spreadsheet, locate and select untitled spreadsheet at the


top of the page. Type a name for your spreadsheet, and then press Enter
on your keyboard.

4. Your spreadsheet will be renamed.


5. Whenever you need to view or edit your spreadsheet, you can access it
again from your Google Drive, where it will be saved automatically.

6. You may notice that there is no save button. This is because Google
Drive uses autosave, which automatically and immediately saves your files
as you edit them.

 Google Slides
 Google Slides allows you to create dynamic slide presentations.
 These presentations can include animation, narration, images, videos, and
much more.
 Google Slides interface and the basics of setting up your document,
including the menu and shortcut toolbars, zoom settings, and choosing a
theme.
 The Google Slides interface when you create a new presentation in Google
Slides, the interface for Slides will appear.
 This interface displays the toolbar, along with the main view of your
presentation.
 It allows you to create and modify slides, choose a theme, and share the
presentation with others.
 Click the buttons in the interactive below to learn about the interface for
Google Slides.

 Choosing a theme when you first create a new presentation, Google Slides
will prompt you to choose a theme.
 Themes give you a quick and easy way to change the overall design of your
presentation.
 Each theme has a unique combination of colors, fonts, and slide layouts.
 Select a theme from the panel on the right side of the window, and it will be
applied to your entire presentation.
 You can choose from a variety of new themes at any time, giving your
entire presentation a consistent, professional look.
 If you want to change your theme, you can open the Themes panel again by
clicking the Theme command on the shortcut toolbar.

 The Google Slides interface uses a traditional menu system with a shortcut
toolbar.
 The menus contain commands grouped by function.
 The shortcut toolbar has buttons for some frequently used commands.

 Showing and hiding the menus


 You can choose to minimize the menu bar to free up more space to display
your slides.
 Click the Hide the menus command to hide the menu bar, leaving only the
shortcut toolbar at the top of the window.
 Click it again to show the menu bar again.
 Zooming in and out
 You can zoom in and out of your presentation with the Zoom shortcut.
 Click Zoom on the shortcut toolbar, then move the mouse cursor over your
slide.
 The cursor will change to a magnifying class with a plus sign inside of it.
 Now you can left-click to zoom in or right-click to zoom out.
 Press Escape on your keyboard to return your cursor to normal.

 Within the View drop-down menu, hover over Zoom and there you will see
options to set the zoom more precisely.

 Playing the presentation When you are ready to show your presentation—
or if you want to see what it will look like during a presentation—click the
Present button to the right of the menus.
 You can also click the drop-down arrow for additional presentation options
 Google forms.
 Google Forms allows you to create your own custom online forms and send
them to others.
 These forms can include surveys, quizzes, sign-ups, and more. When
someone completes the form, the responses will be stored in a Google
Sheets spreadsheet.
 An easy way to access Google Forms is through Google Drive.
1. Click the new button.

2. Then click More > Google Forms.


3. Then The Google Forms interface displayed on the screen.
4. The Google form interface is easy to use and allows you to create new
forms, open recent ones, access a variety of templates, and more.
5. Click the buttons in the interactive below to become more familiar with
the Google Forms interface.
 Google Forms has several uses, both personal and professional.
1. Personal: You can use it to create your own event invitations, gather
contact information, and find the best time to meet with various people.
2. Work: Smaller businesses can easily use Google Forms to make their
own job applications, order forms, feedback forms, and more.
3. Education: Teachers can use Google Forms to create quizzes and
worksheets for their students to complete.
UNIT-III

 Overview of Internet security


 Internet security consists of a range of security tactics for protecting
activities and transactions conducted online over the internet.
 These tactics are meant to safeguard users from threats such as hacking into
computer systems, email addresses, or websites; malicious software that
can infect and inherently damage systems; and identity theft by hackers
who steal personal data such as bank account information and credit card
numbers.
 Internet security is a specific aspect of broader concepts such as cyber
security and computer security, being focused on the specific threats and
vulnerabilities of online access and use of the internet.
 In today's digital landscape, many of our daily activities rely on the
internet.
 Various forms of communication, entertainment, and financial and work-
related tasks are accomplished online.
 This means that tons of data and sensitive information are constantly being
shared over the internet.
 The internet is mostly private and secure, but it can also be an insecure
channel for exchanging information.
 With a high risk of intrusion by hackers and cybercriminals, internet
security is a top priority for individuals and businesses alike.
 Types of internet security threats
 While the web presents users with lots of information and services, it also
includes several risks.
 Cyber attacks are only increasing in sophistication and volume, with many
cybercriminals using a combination of different types of attacks to
accomplish a single goal.
 Though the list of potential threats is extensive.
 There are some of the most common internet security threats:
1. Malware:
 Short for "malicious software," malware comes in several forms,
including computer viruses, worms, Trojans, and dishonest spyware.
2. Computer worm:
 A computer worm is a software program that copies itself from one
computer to the next.
 It does not require human interaction to create these copies and can
spread rapidly and in great volume.
3. Spam:
 Spam refers to unwanted messages in your email inbox.
 In some cases, spam can simply include junk mail that advertises goods
or services you aren't interested in.
 These are usually considered harmless, but some can include links that
will install malicious software on your computer if they're clicked on.
4. Phishing:
 Phishing scams are created by cybercriminals attempting to solicit private
or sensitive information.
 They can pose as your bank or web service and lure you into clicking
links to verify details like account information or passwords.
5. Botnet:
 A botnet is a network of private computers that have been compromised.
Infected with malicious software, these computers are controlled by a
single user and are often prompted to engage in nefarious activities, such
as sending spam messages or denial-of-service (DoS) attacks.
 E-mail threats and secure E-mail
 Common Threats
 Because e-mail is widely deployed, well understood, and used to
communicate with untrusted, external organizations, it is frequently the
target of attacks.
 Attackers can exploit e-mail to gain control over an organization, access
confidential information, or disrupt IT access to resources.
 Common threats to e-mail systems include the following:
1. Malware.
 Increasingly, attackers are taking advantage of e-mail to deliver a variety
of attacks to organizations through the use of malware, or “malicious
software,” that include viruses, worms, Trojan horses, and spyware.
 These attacks, if successful, may give the malicious entity control over
workstations and servers, which can then be exploited to change
privileges, gain access to sensitive information, monitor users’ activities,
and perform other malicious actions.
2. Spam and phishing.
 Unsolicited commercial e-mail, commonly referred to as spam, is the
sending of unwanted bulk commercial e-mail messages.
 Such messages can disrupt user productivity, utilize IT resources
excessively, and be used as a distribution mechanism for malware.
 Related to spam is phishing, which refers to the use of deceptive
computer-based means to trick individuals into responding to the e-mail
and disclosing sensitive information.
 Compromised e-mail systems are often used to deliver spam messages
and conduct phishing attacks using an otherwise trusted e-mail address.
3. Social engineering.
 Rather than hack into a system, an attacker can use e-mail to gather
sensitive information from an organization’s users or get users to perform
actions that further an attack.
 A common social engineering attack is e-mail spoofing, in which one
person or program successfully masquerades as another by falsifying the
sender information shown in e-mails to hide the true origin.
4. Entities with malicious intent.
 Malicious entities may gain unauthorized access to resources elsewhere
in the organization’s network via a successful attack on a mail server.
 For example, once the mail server is compromised, an attacker could
retrieve users’ passwords, which may grant the attacker access to other
hosts on the organization’s network.
5. Unintentional acts by authorized users.
 Not all security threats are intentional. Authorized users may
inadvertently send proprietary or other sensitive information via e-mail,
exposing the organization to embarrassment or legal action.

 Security Safeguards / secure E-mail


 Management, operational, and technical safeguards are necessary to
ensure that the confidentiality, integrity, and availability needs of the
mail system, its supporting environment, and the data handled by it are
addressed.
 The National Institute of Standards and Technology is a nonregulatory
agency within the Department of Commerce.
 Its Information Technology Laboratory recommends that organizations
employ the following guidelines in planning, implementing, and
maintaining secure e-mail systems.
1. Implement Management Controls
2. Management security controls-such as organization-wide information
security policies and procedures, risk assessments, configuration management
and change control, and contingency planning-are essential to the effective
operation and maintenance of a secure e-mail system and the supporting
network infrastructure. Additionally, organizations should implement and
deliver security awareness and training, because many attacks rely either
partially or wholly on social engineering techniques to manipulate users.
3. Carefully Plan the System Implementation
 The most critical aspect of deploying a secure e-mail system is careful
planning before installation, configuration, and deployment.
 As is often said, security should be considered from the initial planning
stage, at the beginning of the system development life cycle, to maximize
security and minimize costs.
4. Secure the Mail Server Application
 Organizations should install the minimal mail server services required and
eliminate any known vulnerabilities through patches, configurations, or
upgrades.
 If the installation program installs unnecessary applications, services, or
scripts, these should be removed immediately after the installation process is
complete.
 Securing the mail server application generally includes patching and
upgrading the mail server; configuring the mail server user authentication
and access and resource controls; configuring, protecting, and analyzing log
files; and periodically testing the security of the mail server application.
5. Secure the Mail Client
 In many respects, the client side of e-mail represents a greater risk to
security than the mail server.
 Providing an appropriate level of security for the mail client requires
carefully considering and addressing numerous issues.
 Securely installing, configuring, and using mail client applications generally
includes patching and upgrading the mail client applications; configuring the
mail client security features (e.g., disable automatic opening of messages);
enabling antivirus, antispam, and antiphishing features; configuring mailbox
authentication and access; and securing the client’s host operating system.
6. Secure the Transmission
 Most standard e-mail protocols send, by default, user authentication data and
e-mail content in the clear; that is, unencrypted.
 Sending data in the clear may allow an attacker to easily compromise a user
account or intercept and alter unencrypted e-mails.
 At a minimum, most organizations should encrypt the user authentication
session even if they do not encrypt the actual e-mail data.
 A related control to protect the confidentiality and integrity of the message is
to deploy a secure e-mail solution such as leveraging PKI technology to
encrypt and sign the message.
 Digital rights management and data leakage prevention systems can be used
to prevent the accidental leakage and exfiltration of sensitive information.
7. Secure the Supporting Operating Environment
 While the mail server and mail clients are the two primary components of an
e-mail system, the supporting network infrastructure is essential to its secure
operations.
 Many times, the network infrastructure, including such components as
firewalls, routers, and intrusion detection and prevention systems, will
provide the first layer of defense between untrusted networks and a mail
server.
 Viruses and antivirus software
 A computer virus is a kind of malicious computer program, which when
executed, replicates itself and inserts its own code.
 When the replication is done, this code infects the other files and program
present on your system.
 These computer viruses are present in various types and each of them can
infect a device in a different manner.
 Since the computer virus only hits the programming of the device, it is not
visible.
 But there are certain indications which can help you analyse that a device is
virus-hit.
 Types of Computer Virus
 There are the different types of computer viruses:
1. Boot Sector Virus –
 It is a type of virus that infects the boot sector of floppy disks or the Master
Boot Record (MBR) of hard disks.
 The Boot sector comprises all the files which are required to start the
Operating system of the computer.
 The virus either overwrites the existing program or copies itself to another
part of the disk.
2. Direct Action Virus –
 When a virus attaches itself directly to a .exe or .com file and enters the
device while its execution is called a Direct Action Virus.
 If it gets installed in the memory, it keeps itself hidden. It is also known as
Non-Resident Virus.
3. Resident Virus –
 A virus which saves itself in the memory of the computer and then infects
other files and programs when it’s originating program is no longer working.
 This virus can easily infect other files because it is hidden in the memory
and is hard to be removed from the system.
4. Multipartite Virus –
 A virus which can attack both, the boot sector and the executable files of an
already infected computer is called a multipartite virus.
 If a multipartite virus attacks your system, you are at risk of cyber threat.
5. Overwrite Virus –
 One of the most harmful viruses, the overwrite virus can completely remove
the existing program and replace it with the malicious code by overwriting
it.
 Gradually it can completely replace the host’s programming code with the
harmful code.
6. Polymorphic Virus –
 Spread through spam and infected websites, the polymorphic virus are file
infectors which are complex and are tough to detect.
 They create a modified or morphed version of the existing program and
infect the system and retain the original code.
7. File Infector Virus –
 it first infects a single file and then later spreads itself to other executable
files and programs.
 The main sources of this virus are games and word processors.
8. Spacefiller Virus –
 It is a rare type of virus which fills in the empty spaces of a file with viruses.
 It is known as cavity virus.
 It will neither affect the size of the file nor can be detected easily.
9. Macro Virus –
 A virus written in the same macro language as used in the software program
and infects the computer if a word processor file is opened.
 Mainly the source of such viruses is via emails.
 Anti-Virus
 An anti-virus is software which comprises programs or set of programs
which can detect and remove all the harmful and malicious software from
your device.
 This anti-virus software is designed in a manner that they can search through
the files in a computer and determine the files which are heavy or mildly
infected by a virus.
 list of few of the major antivirus software which is most commonly used:
1. Norton Antivirus
2. F-Secure Antivirus
3. Kaspersky Antivirus
4. AVAST Antivirus
5. Comodo Antivirus
6. McAfee Antivirus
 These are few of the much anti-virus software widely used to remove viruses
from a device.
 Firewalls
 A Firewall is a security system to protect an internal network from
unauthorized servers and networks based on predefined rules.
 It acts as a barrier and only allows the secured network to send or receive
data.
 A firewall is a security network designed to protect computer systems and
networks from malicious attacks.
 Whereas, Antivirus is a software utility program designed to protect a
system from internal attacks from viruses.
 Functions of Firewall
 Following are the function of a Firewall.
1. Any data which enters or exits a computer network has to pass through
the Firewall.
2. All the valuable information stays intact if the data packets are securely
passed through the Firewall
3. Every time a data packets passed through a Firewall, it records it which
allows the user to record the network activity
4. No data can be modified as it is held securely within the data packets
 Precisely, a Firewall ensures that all the data is secure and any malicious
data trying to enter the internal network is not allowed to pass through.

 Types of Firewall
 There are various types of Firewalls.
1.Packet Filtering Firewall
 One of the oldest types of Firewall
 This type of Firewall creates a checkpoint at the traffic router. Only the
secure and verified IP address or networks are allowed for the further flow
of data
 The data packets are not verified, i.e. the information or data is not opened at
the Firewall stage
 They are easy to use and do not overload the device and do not affect its
processing or functioning speed
2. Application Level Gateway Firewall
 It is also known as Proxy Firewall
 When the user connects with the destination server, it forms a connection
with the application gateway
 The proxy then connects with the destination server and takes up the
decision of forwarding the data packets
 It is a bit more secure in comparison to Packet Filtering Firewall
 Strong Memory and processors are required for using this Firewall
3. Circuit Level Gateway Firewall
 This works as the Sessions layer of the OSI Model
 Using this, two Transmission Control Protocol (TCP) connections can be set
up together
 It can easily let the flow of data packets continue without consuming major
computer resources
 These Firewalls are not much efficient as they do not check the data packets
and incase a data packet comprises malware, it will allow it to pass if the
TCP connections are successfully done
4. Stateful Inspection Firewall
 It is a combination of data packet inspection and TCP connection. Until both
the fields are verified, the information cannot be approved
 They are less straining for the computer resources
 However, they are a bit slow in comparison to other Firewalls
5. Next-Generation Firewall
 The recently launched Firewall systems are known as the Next-Gen
Firewalls
 Under this, the data packets are also thoroughly checked before being passed
on to the destination address
 These are still on the platform of improving and evolving and intend to use
modern technology for automatic detection of errors and network safety
6. Software Firewall
 Any firewall which is installed in a local device or a cloud server is called a
Software Firewall
 They can be the most beneficial in terms of restricting the number of
networks being connected to a single device and control the in-flow and out-
flow of data packets
 Software Firewall also time-consuming
7. Hardware Firewall
 They are also known as Physical-appliance based firewalls
 It ensures that the malicious data is stopped before it reaches the endpoint of
the network at risk
 Cryptography
 Cryptography is technique of securing information and communications
through use of codes so that only those people for whom the information is
intended can understand it and process it. Thus preventing unauthorized
access to information.
 The prefix “crypt” means “hidden” and suffix graphy means “writing”.
 In Cryptography the techniques which are use to protect information are
obtained from mathematical concepts and a set of rule based calculations
known as algorithms to convert messages in ways that make it hard to
decode it.
 These algorithms are used for cryptographic key generation, digital signing,
and verification to protect data privacy, web browsing on internet and to
protect confidential transactions such as credit card and debit card
transactions.
 Features Of Cryptography
1. Confidentiality: Information can only be accessed by the person for whom
it is intended and no other person except him can access it.
2. Integrity: Information cannot be modified in storage or transition between
sender and intended receiver without any addition to information being
detected.
3. Non-repudiation: The creator/sender of information cannot deny his or her
intention to send information at later stage.
4. Authentication: The identities of sender and receiver are confirmed. As
well as destination/origin of information is confirmed.
 Types of Cryptography:
 In general there are three types of cryptography:
1. Symmetric Key Cryptography:
 It is an encryption system where the sender and receiver of message use a
single common key to encrypt and decrypt messages.
 Symmetric Key Systems are faster and simpler but the problem is that
sender and receiver have to somehow exchange key in a secure manner.
 The most popular symmetric key cryptography system is Data Encryption
System (DES).
2. Hash Functions:
 There is no usage of any key in this algorithm.
 A hash value with fixed length is calculated as per the plain text which
makes it impossible for contents of plain text to be recovered.
 Many operating systems use hash functions to encrypt passwords.
3. Asymmetric Key Cryptography:
 Under this system a pair of keys is used to encrypt and decrypt information.
 A public key is used for encryption and a private key is used for decryption.
 Public key and Private Key are different.
 Even if the public key is known by everyone the intended receiver can only
decode it because he alone knows the private key.
 Digital signatures
 The full form of DSC is the Digital Signature Certificate.
 DSC is a protected digital key provided by the certifying authorities to
verify and confirm the identity of the individual keeping such certificate.
 Digital signatures use the authentication of the public key to build the
signature.
 DSC contains information on the user’s profile, pin code, nation, email
address, certificate issuance date and the certifying authority’s name.
 Types of DSC
 The type of client and the purpose for which the DSC is acquired determines
the Class of DSC to be applied.
 There are three types of DSC available
1. Type 1 Certificates
 These are given to the person or private users that are used to verify that
perhaps the recipient’s name and contact details from the clearly specified
subject area in the certifying agency‘s database.
2. Type 2 Certificates
 These are issued to the director or signatory authority of the organizations
for e-filing with ROC (Registrar of Companies).
 Type 2 certification is mandatory for people who have had to sign manual
documents when submitting ROC returns.
3. Type 3 Certificates
 These certificates are used for online participation or bidding at online
tenders & e-auctions all around India.
 Sellers wishing to participate in online bidding should have a Type 3 digital
signature certificate.
 Advantages of DSC
1. It can be used to verify personal details and knowledge of an entity when
doing business online.
2. You can sign a digital format of a PDF file and start sending it to the
receiver, rather than signing and scanning a hard copy of the file to mail it.
In reality, it is not mandatory for the owner of the digitally signed certificate
to physically present a company for the approval.
3. Everywhere in India, these documents are used for online participation or
bidding at e-auctions and online tenders. Vendors wishing to engage in
online bidding must have a Class 3 digital certificate.
 How do digital signatures work?
 Digital signatures, like handwritten signatures, are unique to each signer.
 Digital signature solution providers, such as DocuSign, follow a specific
protocol, called PKI.
 PKI requires the provider to use a mathematical algorithm to generate two
long numbers, called keys.
 One key is public, and one key is private.
 When a signer electronically signs a document, the signature is created using
the signer’s private key, which is always securely kept by the signer.
 The mathematical algorithm acts like a cipher, creating data matching the
signed document, called a hash, and encrypting that data.
 The resulting encrypted data is the digital signature.
 The signature is also marked with the time that the document was signed.
 If the document changes after signing, the digital signature is invalidated.
 To protect the integrity of the signature, PKI requires that the keys be
created, conducted, and saved in a secure manner, and often requires the
services of a reliable Certificate Authority (CA).
 Digital signature providers, like DocuSign, meet PKI requirements for safe
digital signing.

 Copyright issues
 Copyright is a type of intellectual property that applies to creative work.
 It is a legal right that gives exclusive rights to the creator of an original work
to use and distribute it.

 It has to be revised from time to time.
 The issue with copyright is that it only safeguards the expression of ideas by
the creator and not the underlying idea.
 Works of literature, music or art (barring Photographs) are granted the
protection of copyright for a period which spans the creator's life and 60
years from the year of the author's demise.
 Copyright issues include Copyright infringement.
 Copyright infringement is using works protected by copyright law without
prior permission, breaching certain exclusive rights granted to the copyright
holder, such as the right to reproduce, distribute, display or perform the
protected work.
 With the internet era going on, anything you take off the web is copyrighted.
 Hence, to avoid such infringement issues, one must have the knowledge of:
1. The Copyright law:
 One must have complete information of the law.
 This will prove to be helpful when you will be able to distinguish plagiarism
from authentic copying.
 If someone writes something from your work but gives due credit to you,
you cannot put him under the scanner.
 You must also have the ability to examine what all copyright does not
protect.
 Hence, knowledge of the law is required if you want to safeguard your work
properly.
2. Creativity:
 One must be creative enough to make sure he himself is not creating
something that is already available on the internet.
 Although copyright does not protects the underlying idea but fictional
characters, storyline and the likes are guarded.
 Thus, the bulb of creativity must glow the brightest.
3. Know the difference between different intellectual properties:
 There is a legit difference between copyright, trademark and patent.
 Copyright safeguards your creative work, trademark gives you exclusive
right over a logo, symbol or a name, and patent excludes others from
manufacturing or trading an invention.
 Therefore, absolute knowledge of the kinds of intellectual property plays an
important role in handling various copyright issues.
 Hence, copyright comes with a lot of responsibilities.
 Copyright Law of India
1. The Copyright Act of 1957 was the first legislation regarding Copyright in
Independent India. To this date, the law has been amended six times (the
latest being the Copyright Amendment Act, 2012)
2. India is a member of some of the most important international conventions,
such as the Universal Copyright Convention. These international bodies deal
with anything regarding copyright laws.
3. The rights covered under the Copyright laws include: – the right to
reproduce copyrighted work, communicate your work to the public,
adaptation and translation of the work.
4. The Indian Copyright Laws protect literary works, musical works, dramatic
works, artistic works, sound recordings and cinematography.
5. The Copyright Act of 1957 provides three kinds of remedies: administrative,
civil and criminal
6. The criminal remedies are covered under Chapter XIII of the statute and the
penalties upon infringement include imprisonment of up to 3 years along
with a fine of up to Rs.200,000
7. Copyrights of works of the countries mentioned in the International
Copyright Order are protected in India as if such works are Indian works.
The term of copyright in a work shall not exceed that which is enjoyed by it
in its country of origin.

 Digital initiatives in higher education


1. SWAYAM (Study Webs of Active Learning for Young Aspiring Minds)
 Under the ‘Digital India’ initiative of Government of India, Important thrust
area is ‘Massive Online Open Courses (MOOCs)’.
 MHRD, Government of India has embarked on a major initiative called
‘Study Webs of Active Learning for Young Aspiring Minds’ (SWAYAM):
to provide an integrated platform and portal for online.
2. SWAYAM PRABHA
 The SWAYAM PRABHA is a group of 34 DTH channels devoted to
telecasting of high quality educational programmes on a 24X7 basis using
the GSAT-15 satellite.
 Every day, there will be new content for at least four hours which would be
repeated 5 more times in a day, allowing the students to choose the time of
their convenience.
 The channels are uplinked from BISAG, Gandhinagar.
 The contents are provided by NPTEL, IITs, UGC, CEC, IGNOU, NCERT
and NIOS.
3. National Academic Depository (NAD)
 The vision of National Academic Depository (NAD) is born out of an
initiative to provide an online storehouse of all academic awards.
 National Academic Depository (NAD) is a 24X7 online storehouse of all
academic awards viz. certificates, diplomas, degrees, mark-sheets etc. duly
digitised and lodged by academic institutions/boards/eligibility assessment
bodies.
 NAD not only ensures easy access to and retrieval of an academic award but
also validates and guarantees its authenticity and safe storage. National
Academic Depository comprises of two interoperable digital depositories
viz. CDSL Ventures Limited (CVL) and NSDL Database Management
Limited (NDML).
 These digital depositories have ensured hardware, network facilities and
software of prescribed quality for smooth and secured operationalisation of
NAD
4. National Digital Library of India (NDL India)
 National Digital Library of India (NDL India) is an all-digital library that
stores information (metadata) about different types of digital contents
including:
1. Books,
2. Articles
3. Videos
4. Audios
5. Thesis
6. Other educational material
 It provides a single-window search facility to access digital contents
currently existing in India as well as other digital sources under a single
umbrella.
5. E-Shodh Sindhu (eSS)
 The MHRD has formed e-Shodh Sindhu merging three consortia initiatives,
namely UGC-INFONET Digital Library Consortium, NLIST and INDEST-
AICTE Consortium to provide access to peer-reviewed journals and a
number of bibliographic, citation and factual databases in different
disciplines to the Research and academic community in the country.
6. Virtual Labs
 Virtual Labs project is an initiative of the Ministry of Human Resource
Development (MHRD), Government of India under the aegis of National
Mission on Education through Information and Communication Technology
(NMEICT).
 This project is a consortium activity of twelve participating institutes and IIT
Delhi is coordinating institute.
 It is a paradigm shift in ICT-based education
 An initiative has been taken-up in remote-experimentation
 Under Virtual Labs project, over 100 Virtual Labs consisting of
approximately 700+ web-enabled experiments were designed for remote-
operation and viewing.
7. e-Yantra
 Project e-Yantra is an initiative to spread education in Embedded systems
and Robotics by IIT Bombay sponsored by Ministry of Human Resource
Development through the National Mission on Education through ICT
(NMEICT).
8. e-Acharya
 e-Acharya is an integrated e-content portal developed under National
Mission for Education through ICT (NME-ICT).
 The portal provides facility to search and browse the learners all learning
materials includes audio, video, textual materials, etc. through a single
interface.
 The portal cover quality learning resources from top institutions in the
country in eight subject categories viz Agriculture Science, Biological
Science, Chemical Science, Physical Science, Medical and Health Sciences,
Engineering and Technology, Social Sciences, and Arts and Humanities.
9. The National Programme on Technology Enhanced Learning (NPTEL)
 The National Programme on Technology Enhanced Learning (NPTEL) was
initiated by seven Indian Institutes of Technology (Bombay, Delhi, Kanpur,
Kharagpur, Madras, Guwahati and Roorkee) along with the Indian Institute
of Science, Bangalore in 2003.
 Five core disciplines were identified, namely, civil engineering, computer
science and engineering, electrical engineering, electronics and
communication engineering and mechanical engineering and 235 courses in
web/video format were developed in this phase.
 The main goal of NPTEL
 To build on the engineering and core science courses launched previously in
NPTEL Phases, at the undergraduate and postgraduate levels and
management courses at the postgraduate level.
10. DIGI LOCKER
 DigiLocker is a platform for issuance and verification of documents &
certificates in a digital way, thus eliminating the use of physical documents.
 Indian citizens who sign up for a DigiLocker account get a dedicated cloud
storage space that is linked to their Aadhaar (UIDAI) number.

You might also like