Page 6 - CA_165_V2.0_C9_Flipbook
P. 6
INSIDE THE SERIES
INSIDE THE SERIES
The key features of the series have been designed to ensure better learning, assessment and evaluation.
Learning Resources
Wi-Fi is used to establishs network in offices or within the small campus of an organisation. It establishes
a good network connectivity generally for locations within a distance of 100 m. It reduces the usage of
WiMAX stands for Worldwide Interoperability for Microwave Access. It is a type of telecommunication
spaces and cables.
facility that enables wireless transmission of data. It is specially used in places where
Internet connectivity is poor. A Local base station is created at such places where
Notes
WiMAX device is installed so that it catches signal, amplifies it and passes on to a local
network. Its range of operation is within 50 Km radius from base station.
It is a networking medium in which computing devices are connected via short-range wireless signals Notes
through infrared adapters. Infrared connections are commonly used in remote controls to operate TV, AC,
Infrared
etc. that can connect by signal transmission in a short range distance.
Cloud computing refers to the usage of IT applications that are available on Cyber network but stored This section contains additional Optical Disc
in a remote server. Rather than keeping files on a hard drive or local storage device, cloud-based storage
makes it possible to save program or data on a remote storage media and can be accessed anywhere
Do you know?
CLOUD COMPUTING
information to enrich the subject.
It makes it easier for organisations to use the same software at different locations or branches as
the application package can be used by numerous users thereby saving cost of multiple numbers of
Hard Disk is also known as Winchester Disk.
using Internet connections.
Computers connected to cloud computing technology are known as Cloud Computers. Cloud services
enable the users to use applications or remote servers. Thus it saves cost of purchasing additional software
licence. It also reduces data duplication of redundancy and removes data inconsistency or contradictions.
installations. l from the flat surface of the optical disc.
Cloud computing is also very helpful in transferring large files; e.g., E-mails have the limitation of sending
files up to 25MB in size only, but larger files can be sent through cloud storage options such as Google
Optical disc is commonly used as an external storage device in which the laser beam helps to read data
CD: CD or Compact Disc is a common optical disc. It is made up of light weight
plastic material with a chemical coating on one side where the data is stored.
Public Cloud: It is available through Internet to anyone who is willing to pay for the services of
It is inserted into a CD/DVD drive or CD/DVD writer of a CPU. CD ROM (Compact
application. Some examples of public cloud computing are AWS, Microsoft Azure, etc.
as well. The capacity of 120 mm standard CD is 700 MB.
Disc Read Only Memory) reads the data whereas in CD writer, data can be written
Private Cloud: It is generally an application that is developed and run by a particular organisation
for its own use at different branches or location. Some examples of private cloud computing are
l Drive. Some of the types of clouds are: l but has a capacity to store data up to 17.1 GB. DVD is the merging of video and
DVD: DVD or Digital Versatile/Video Disc is an optical disc which looks like a CD
l Google drive, One Drive, IDrive, etc. l to a DVD, one has to use a DVD writer).
Protocol refers to a set of common notions, norms or rules that coordinate or govern the functioning a Blue violet laser is used.
audio in a common format. To read information stored in a DVD, it has to be
inserted into a DVD ROM or DVD Writer or DVD player (to copy information on
by the Blu-ray Disc Association (BDA).
PROTOCOLS
Blu-ray Disc: Blu-ray disc can store data upto 128 GB. It has been developed
between two or more sets of computers or networks.
Basics of Information Technology 43 Do you know?
It is more advanced than CDs or DVDs. To read or write data on a Blu-ray disc,
data upto 1.5 GB.
player.
v Diameter of a CD, DVD or Blu-ray disc is 120 mm. DVD can also be of 80 mm diameter that can hold
Flash Memory
v CDs can be used or played in a DVD-ROM or a DVD player but DVD cannot be operated in a CD
v A combo drive is a device which contains all the features of a CD-Writer and a DVD ROM.
Do you Know? l transfer data to computer.
Flash Memory is a small sized external storage device that is commonly used in digital cameras, mobile
This section contains a re-writable and weighs less than 25 g. Nowadays, pen drives are the most
phones, MP3 players, etc. It can be plugged through USB or Fire wire port of a computer to fetch or
Pen/Flash Drive: It is small in size, handy and is a detachable device from
which data can be read, copied or transferred from one system to another. It is
fact about the topic. USB (Universal Serial Bus) port.
commonly used external storage and data transferring devices. It has an
attachment slot which can be easily inserted or attached into the computer’s
Basics of Information Technology
27
Glossary Century 21 st Skills #Information Literacy
1. Animation: It is the display of sequence of images in order to create extraordinary illusions. Glossary
2. Antivirus: It is utility software that helps the computer to be free from virus and it notifies when any
3. Application Software: Application Software refers to programs which are designed to accomplish This section contains
program gets infected and contaminate other files.
4. Autofill: It is a feature in spreadsheet package in which a certain kind of predefined series of data
particular type of tasks to meet a user’s specific needs.
such as name of months of a year, serial numbers, etc. are automatically generated once the user
5. AutoSpellcheck: It is a facility in OpenOffice Writer that enables to automatically check each word definition of common terms.
feeds the initial data.
as it is typed and displays a red wavy line under the misspelt words.
6. Callout: It is a text box, to which a line or arrow is connected for the purpose of pointing to a part of
the document, so that additional information, related to that specific part can be presented.
7. Cell: It is a rectangular box formed by the intersection of a row and a column. Update the Antivirus
8. Charts: It is a visual graphical representation of data from a worksheet which is very useful for instant
9. Communication Channel: It is the media through which data is transferred, (i.e., air, wires, waves,
analysis of data and decision making.
satellite connections, etc.) from sender to receiver and vice versa.
10. Communication: Communication refers to transfer of ideas or information from one place to another
11. Confidentiality: It refers to keep the data or information secret and allowing only authorised people computer.
between different individuals.
If some new virus has developed after the installation of the previously loaded antivirus, then it may not
be recognised by the loaded antivirus and therefore it may not detect that virus. In that case the existing
12. Editing: It refers to the process of making changes in the existing text. 243 Privacy in Information Technology refers to personal control over one’s own files and documents.
13. Format Paintbrush: It is a tool which is used to apply the same type of formatting which is on a
to access the information.
antivirus has to be updated in order to install its latest virus signature & clean new virus. For updating an
Recap Zone
antivirus, the user needs to connect to its URL, the antivirus would automatically get updated on the host
14. Formatting: It refers to the process of changing the appearance of text or document to make it more
particular content; to some other content.
files.
Cyber safety is a measure to prevent or safeguard from cybercrimes or cyber attacks.
prominent and attractive as per user’s requirement.
A password can be termed as a key of codes that protect our valuable content, documents or
Glossary
to access the information.
Confidentiality refers to keep the data or information secret and allowing only authorised people
Cyber stalking refers to the crime of using the Internet, e-mail, or other types of electronic
communications to harass or threaten other people by following them online.
Recap Zone Malware refers to infectious programs that hampers the functioning of a computer system.
Cybercrime refers to misuse of data and resources on Internet i.e., Cyber stalking, identity theft,
bank details theft, unauthorised access of computer or network (hacking), etc.
etc.
Some common types of malware are virus, worms, Trojan horse, spyware, etc.
This section contains summary trusted websites, installation of antivirus, scanning & cleaning of hard disk, update the antivirus,
Some of the popular preventive measures to keep virus at bay are: download information from
of the chapter.
70 Touchpad Computer Applications-IX

