Page 6 - CA_165_V2.0_C9_Flipbook
P. 6

INSIDE THE SERIES
                                              INSIDE THE SERIES



                  The key features of the series have been designed to ensure better learning, assessment and evaluation.


                   Learning Resources



                   Wi-Fi is used to establishs network in offices or within the small campus of an organisation. It establishes
                   a good network connectivity generally for locations within a distance of 100 m. It reduces the usage of
                      WiMAX stands for Worldwide Interoperability for Microwave Access. It is a type of telecommunication
                   spaces and cables.
                      facility that enables wireless transmission of data. It is specially used in places where
                      Internet  connectivity  is  poor.  A  Local  base  station  is  created  at  such  places  where
                      Notes
                       WiMAX device is installed so that it catches signal, amplifies it and passes on to a local
                       network. Its range of operation is within 50 Km radius from base station.
                     It is a networking medium in which computing devices are connected via short-range wireless signals   Notes
                     through infrared adapters. Infrared connections are commonly used in remote controls to operate TV, AC,
                     Infrared
                     etc. that can connect by signal transmission in a short range distance.
                     Cloud computing refers to the usage of IT applications that are available on Cyber network but stored   This section contains additional   Optical Disc
                     in a remote server. Rather than keeping files on a hard drive or local storage device, cloud-based storage
                      makes it possible to save program or data on a remote storage media and can be accessed anywhere
                                                                                              Do you know?
                      CLOUD COMPUTING
                                                      information to enrich the subject.
                      It  makes  it  easier  for  organisations  to  use  the  same  software  at  different  locations  or  branches  as
                      the application package can be used by numerous users thereby saving cost of multiple numbers of
                                                                                             Hard Disk is also known as Winchester Disk.
                      using Internet connections.
                      Computers connected to cloud computing technology are known as Cloud Computers. Cloud services
                      enable the users to use applications or remote servers. Thus it saves cost of purchasing additional software
                       licence. It also reduces data duplication of redundancy and removes data inconsistency or contradictions.
                      installations.                                                          l  from the flat surface of the optical disc.
                       Cloud computing is also very helpful in transferring large files; e.g., E-mails have the limitation of sending
                       files up to 25MB in size only, but larger files can be sent through cloud storage options such as Google
                                                                                            Optical disc is commonly used as an external storage device in which the laser beam helps to read data
                                                                                             CD: CD or Compact Disc is a common optical disc. It is made up of light weight
                                                                                             plastic material with a chemical coating on one side where the data is stored.
                        Public Cloud: It is available through Internet to anyone who is willing to pay for the services of
                                                                                            It is inserted into a CD/DVD drive or CD/DVD writer of a CPU. CD ROM (Compact
                         application. Some examples of public cloud computing are AWS, Microsoft Azure, etc.
                                                                                            as well. The capacity of 120 mm standard CD is 700 MB.
                                                                                            Disc Read Only Memory) reads the data whereas in CD writer, data can be  written
                         Private Cloud: It is generally an application that is developed and run by a particular organisation
                         for its own use at different branches or location. Some examples of private cloud computing are
                       l  Drive. Some of the types of clouds are:                              l  but has a capacity to store data up to 17.1 GB. DVD is the merging of video and
                                                                                                DVD: DVD or Digital Versatile/Video Disc is an optical disc which looks like a CD
                       l   Google drive, One Drive, IDrive, etc.                          l     to a DVD, one has to use a DVD writer).
                        Protocol refers to a set of common notions, norms or rules that coordinate or govern the functioning      a Blue violet laser is used.
                                                                                                audio in a common format. To read information stored in a DVD, it has to be
                                                                                                inserted into a DVD ROM or DVD Writer or DVD player (to copy information on
                                                                                           by the Blu-ray Disc Association (BDA).
                        PROTOCOLS
                                                                                           Blu-ray Disc: Blu-ray disc can store data upto 128 GB. It has been developed
                        between two or more sets of computers or networks.
                                        Basics of Information Technology  43               Do you know?
                                                                                           It is more advanced than CDs or DVDs. To read or write data on a Blu-ray disc,
                                                                                           data upto 1.5 GB.
                                                                                           player.
                                                                                          v     Diameter of a CD, DVD or Blu-ray disc is 120 mm. DVD can also be of 80 mm diameter that can hold
                                                                                        Flash Memory
                                                                                          v   CDs can be used or played in a DVD-ROM or a DVD player but DVD cannot be operated in a CD
                                                                                          v  A combo drive is a device which contains all the features of a CD-Writer and a DVD ROM.
                                                           Do  you Know?                l  transfer data to computer.
                                                                                        Flash Memory is a small sized external storage device that is commonly used in digital cameras, mobile
                                                           This section contains a       re-writable  and weighs less  than  25 g.  Nowadays,  pen drives are the most
                                                                                        phones, MP3 players, etc. It can be plugged through USB or Fire wire port of a computer to fetch or
                                                                                         Pen/Flash Drive:  It is small in size, handy  and  is a  detachable  device  from
                                                                                         which data can be read, copied or transferred from one system to another. It is
                                                           fact about the topic.        USB (Universal Serial Bus) port.
                                                                                         commonly used external  storage  and  data  transferring  devices.  It  has  an
                                                                                         attachment slot which can be easily inserted or attached into the computer’s
                                                                                                      Basics of Information Technology
                                                                                                               27
                              Glossary  Century  21 st  Skills  #Information Literacy
                    1.  Animation: It is the display of sequence of images in order to create extraordinary illusions.  Glossary
                    2.   Antivirus: It is utility software that helps the computer to be free from virus and it notifies when any
                     3.   Application Software: Application Software refers to programs which are designed to accomplish   This  section  contains
                     program gets infected and contaminate other files.
                     4.   Autofill: It is a feature in spreadsheet package in which a certain kind of predefined series of data
                      particular type of tasks to meet a user’s specific needs.
                      such as name of months of a year, serial numbers, etc. are automatically generated once the user
                     5.   AutoSpellcheck: It is a facility in OpenOffice Writer that enables to automatically check each word   definition of common terms.
                      feeds the initial data.
                       as it is typed and displays a red wavy line under the misspelt words.
                      6.   Callout: It is a text box, to which a line or arrow is connected for the purpose of pointing to a part of
                       the document, so that additional information, related to that specific part can be presented.
                      7.  Cell: It is a rectangular box formed by the intersection of a row and a column.   Update the Antivirus
                      8.   Charts: It is a visual graphical representation of data from a worksheet which is very useful for instant
                       9.   Communication Channel: It is the media through which data is transferred, (i.e., air, wires, waves,
                        analysis of data and decision making.
                        satellite connections, etc.) from sender to receiver and vice versa.
                       10.   Communication: Communication refers to transfer of ideas or information from one place to another
                       11.   Confidentiality: It refers to keep the data or information secret and allowing only authorised people   computer.
                        between different individuals.
                                                                                          If some new virus has developed after the installation of the previously loaded antivirus, then it may not
                                                                                          be recognised by the loaded antivirus and therefore it may not detect that virus. In that case the existing
                        12.  Editing: It refers to the process of making changes in the existing text.   243    Privacy in Information Technology refers to personal control over one’s own files and documents.
                        13.   Format Paintbrush: It is a tool which is used to apply the same type of formatting which is on a
                         to access the information.
                                                                                          antivirus has to be updated in order to install its latest virus signature & clean new virus. For updating an
                                                                                          Recap Zone
                                                                                          antivirus, the user needs to connect to its URL, the antivirus would automatically get updated on the host
                        14.   Formatting: It refers to the process of changing the appearance of text or document to make it more
                         particular content; to some other content.
                                                                                          files.
                                                                                            Cyber safety is a measure to prevent or safeguard from cybercrimes or cyber attacks.
                          prominent and attractive as per user’s requirement.
                                                                                            A password can be termed as a key of codes that protect our valuable content, documents or
                                              Glossary
                                                                                          to access the information.
                                                                                           Confidentiality refers to keep the data or information secret and allowing only authorised people
                                                                                           Cyber stalking refers to the crime of using the Internet, e-mail, or other types of electronic
                                                                                         communications to harass or threaten other people by following them online.
                                                   Recap Zone                             Malware refers to infectious programs that  hampers the functioning  of a computer  system.
                                                                                           Cybercrime refers to misuse of data and resources on Internet i.e., Cyber stalking, identity theft,
                                                                                         bank details theft, unauthorised access of computer or network (hacking), etc.
                                                                                         etc.
                                                                                         Some common types of malware are virus, worms, Trojan horse, spyware, etc.
                                                   This section contains summary         trusted websites, installation of antivirus, scanning & cleaning of hard disk, update the antivirus,
                                                                                          Some of the popular preventive measures to keep virus at bay are: download information from
                                                   of the chapter.
                                                                                      70  Touchpad Computer Applications-IX
   1   2   3   4   5   6   7   8   9   10   11