Approved by Curriculum Development Centre 51 Oasis Radiant Computer Science, Book 10 Due to the rapidly changing technological environment, ethical issues are also arising day by day. The present society is an information society in which all the information and communication technologies are related. Due to the advancement of ICT the world has been turned into something like a small village. The current pace of development of the society has been possible because of the advancement of information and communication technology. The growing use of ICT has had a major impact on the society and individuals. The use of ICT in every step of our life has brought some serious ethical questions for individuals and organisations. These issues have been raised to new and often excessive levels which have affected life in various ways. Information Communication Technology (ICT) has raised new ethical concerns about such issues as the protection of personal privacy, protection of intellectual property, user responsibility, acceptable access and use of information, software license and piracy. The question of ethics and the technological advancements responsible for the ethical concerns have come up for discussion. We hear about privacy, information rights, and intellectual property rights and ethical policy issues. Digital Citizenship A digital citizen is a person who is using information and communication technology (ICT) in order to engage in society, politics, and government. The digital Ethical and Social 2 Issues in ICT Chapter
Oasis Radiant Computer Science, Book 10 52 Approved by Curriculum Development Centre citizens are those who use the internet regularly and effectively. They also have a comprehensive understanding of digital citizenship, which is the appropriate and responsible behaviour when using technology. Since digital citizenship evaluates the quality of an individual’s response to membership in a digital community, it often requires the participation of all community members, both visible and those who are less visible. In other words, a digital citizen is skilled in using the internet in order to communicate with others, buy and sell things, and take part in politics, and who understands how to do this in a safe and responsible way. Digital Footprint The digital footprint includes the activities of a particular individual left on the internet as a result of that person’s online activity. There are several ways to ensure your digital footprint doesn’t damage your reputation, or any future employment opportunities. It also refers to one’s unique set of traceable digital activities, actions, contributions and communications manifested on the internet or on digital devices. On the World Wide Web, the internet footprint also known as cyber shadow, electronic footprint, or digital shadow, is the information left behind as a result of a user’s web-browsing. The term usually applies to an individual person, but can also refer to a business, organisation and corporation.
Approved by Curriculum Development Centre 53 Oasis Radiant Computer Science, Book 10 Digital footprint is the trail of data we create while using the internet. It includes different activities such as websites we visit, emails we send and the information we submit using internet for different online services. There are two main classifications for digital footprints: passive and active. A passive digital footprint is data collected without the owner knowing whereas active digital footprints are created when personal data is released deliberately by a user for the purpose of sharing information about oneself by means of websites or social media. National Information and Communication Technology Policy, 2015(2072) Introduction Nations are using Information and Communication Technology (ICT) tools to secure sustainable development and economic growth. As these technologies are shaping social interaction and public services, Nepal’s National Information and Communication Technology Policy, 2015 (2072BS), has emphasised their transformative potential in meeting development aspirations and poverty reduction goals. Vision To transform Nepal into an information and knowledge-based society and economy. Background Information and Communication Technologies are increasingly at the core of strategies aimed at securing the goals of sustainable development and stimulating economic growth in countries around the world. Among others, these technologies are shaping the way social interaction takes place and public services are delivered in some fundamental ways. It is precisely along these lines that the Government of Nepal has placed a great deal of importance on transformative potential of ICTs, positioning these technologies within the larger context of its far reaching developmental aspirations premised around poverty reduction as an overarching goal. Mission To create conditions for the intensified development and growth of ICT sector as a key driver for Nepal’s sustainable development and poverty reduction strategies.
Oasis Radiant Computer Science, Book 10 54 Approved by Curriculum Development Centre Objectives 1. To empower and facilitate Nepal’s participation in the Global Knowledge Society. 2. To transform the government’s service delivery regime by promoting transparency, efficiency, inclusiveness and participation through effective utilisation of information and communication technologies. 3. To promote ICT to further productivity among the sectors, that is, key drivers of the national economy. 4. To foster efficient, inter-operable, secure, reliable and sustainable national ICT infrastructure in alignment with grass-root needs, and compliant with regional and international standards. 5. To promote research and innovation on the role of ICT on the resilience of low-income communities amid potential environmental, economic and social shocks. 6. To further streamline clear strategies and obligations for licensed ICT service providers with respect to universal access/service goals and Quality of Service (QoS) and ensure cost-effective connectivity to ICT services such as Internet, e-commerce and e-government services. 7. To promote cost-effective and qualitative last-mile access technologies for providing secure access to internet including commercial and public information services, e-government applications by communities (including the disadvantaged and physically challenged) especially in rural and undeserved areas. 8. To create easily accessible, affordable and innovative public access points under a comprehensive community/village network initiative. 9. To create a favourable environment for cooperation and partnership in ICT among public and private sectors, civil society, and between all stakeholders at local, national, regional and international levels. 10. To increase the institutional capacity along infrastructure and human resource dimensions in public and private educational institutions including schools, colleges/universities that offer ICT courses and use ICTs for pedagogical purposes.
Approved by Curriculum Development Centre 55 Oasis Radiant Computer Science, Book 10 11. To create a conducive environment for increasing annual enrolment and output of students in key professional skills areas such as telecommunications/ electronics engineering, computer science/IT, etc. and promote market driven skills development initiatives in ICT. 12. To deploy ICTs at all levels of Nepali educational system in order to improve educational outcomes while expanding access to education and training facilities. 13. To support local and indigenous content development as well as applications targeting the capturing, archiving and dissemination of local and indigenous knowledge, content and information resources as well as the promotion of diverse linguistic and cultural heritage of Nepal. 14. To facilitate the participation of youths and women in ICTs, particularly in media and content development initiatives. 15. To address gender-based inequalities and promote gender-sensitive measures to encourage the active participation of women in national and community-based ICT initiatives. 16. To promote the use of free and open source software as well as open standard in software development for government agencies. 17. To create an innovative, market responsive, highly competitive and well regulated ICT industry. 18. To promote joint venture initiatives for local entrepreneurs with international private investors in the provision of public ICT goods and services in order to catalyse the growth of the sector. 19. To help develop ICT business incubators and promote start-up projects in close coordination with the private sector through the creation of a supportive ecosystem. 20. To create a favourable business environment and promote Nepal as an attractive destination for ICT-related investments, especially in the area of IT-ITES/BPO, within the region and on the international market. 21. To restructure the ICT market and technological base with a view to making the ICT sector a significant contributor to the social and economic development of the country.
Oasis Radiant Computer Science, Book 10 56 Approved by Curriculum Development Centre 22. To create conditions for intensified roll-out of national telecommunications infrastructure backbone as a way to expand broadband based ICT services across the country. 23. To ensure an integrated, coordinated and synergistic approach towards the development and deployment of ICTs, including other supporting physical infrastructure such as electricity and transport infrastructure. 24. To minimise duplication and costs through infrastructure sharing among public and private sector investment projects and to create an efficient and cost-effective government-wide communications network infrastructure linking national, provincial and district administration. 25. To facilitate regional economic integration by utilising regional and international telecommunications infrastructure projects and Asian Information Superhighway infrastructure initiatives. 26. To safeguard public sector information and investment against negative impacts of deploying and using ICTs. 27. To promote a stable, fair and competitive investment climate to facilitate the development of e-trade and e-commerce activities in the country. 28. To develop a highly competitive ICT industry capable of serving as the engine for driving Nepal’s active participation in global trade. 29. To facilitate the adoption of e-commerce, especially by SMEs in agriculture, tourism, and manufacturing as well as nontraditional exports to ensure productivity and growth. 30. To increase the competitiveness of farmers in production, processing and marketing of agricultural products and services through the effective and outcome oriented utilisation of ICTs. 31. To promote the development of ICT entrepreneurs at SME level as part of the rural agribusiness industry development and strengthen the development, application of ICTs in agriculture. 32. To improve communication systems across the country, especially in areas of touristic interest to support tourism development in the country. 33. To use ICTs in the documentation, promotion and effective marketing of the full potential of Nepal’s world class and niche tourist destinations to the local, regional and international market.
Approved by Curriculum Development Centre 57 Oasis Radiant Computer Science, Book 10 34. To ensure that all ICT related activities have very minimal negative environmental impact during construction, operation and disposal/de-commissioning; 35. To conserve natural resources and safeguard Nepal’s heritage using ICT tools. 36. To support the development of mid-to-long term basic planning that provides policy direction and tasks for e-government 37. To support formulation of development strategy for ICT converged services to support and plan for mid-to-long term resolution for overcoming the digital divide. 38. To ensure all installed ICT infrastructure and capacity is utilised effectively, contributing to resilience and redundancy. Strategies 1. Human resource development. 2. ICT in education, research & development. 3. Access, media and content. 4. ICT industry. 5. ICT for government service, innovation and good governance. 6. SMEs (Small and Medium Enterprises) and e-commerce. 7. Telecommunications infrastructure. 8. ICT in agriculture. 9. ICT in health. 10. ICT in tourism. 11. Telecommunication/ICTs in mitigating the impact of climate change. 12. ICT in environment and natural resources. 13. Telecommunication/ICTs for natural disaster preparedness, mitigation and relief. 14. Human exposure to electromagnetic fields and safe disposal of electronic waste. 15. Conformance, Interoperability and Standards in telecommunications/ICT.
Oasis Radiant Computer Science, Book 10 58 Approved by Curriculum Development Centre 16. Cloud computing. 17. Access to telecommunications/ICTs in rural and remote areas. 18. Access to telecommunications/ICTs for persons with disabilities and specific needs. 19. ICTs for youth, women and girls. 20. Building confidence and security in the use of ICTs. Implementation of Policy and Strategy Framework A National Information and Communication Technology Policy Implementation Steering Committee will be formed at the Ministry of Information Technology and Communication with the following structure: • Hon. Minister, Ministry of Information and Communication Technology - Chairperson, Member • National Planning Commission, Member • Secretary, Ministry of Education, Member • Secretary, Ministry of Health, Member • Secretary, Ministry of Agriculture, Member • Secretary, Ministry of Finance, Member • Secretary, Ministry of Local Development, Member • Secretary, Ministry of Information and Communication, Member • Chairman, Nepal Telecommunications Authority, Member • Representative Private Sector / Domain Expert, 2 Members • Joint-Secretary (Policy and Programme), Ministry of Information and Communication, Member - Secretary Electronic Transaction Act The electronic transaction is transactions of electronic records data by using electronic means. It contains electric records and valid digital medium and the exchange of all types of electronic records. An act related with electronic transactions is called the Electronic Transaction Act.
Approved by Curriculum Development Centre 59 Oasis Radiant Computer Science, Book 10 Objectives of the Electronic Transaction Act 2063 1. To make legal provisions for authentication and regulation of electronic data. 2. To make a reliable data generation, communication, and transmission. 3. To make a secured and authentic means of electronic communication. 4. To regulate all the relating matters of electronic transactions. Opportunities in Social Media Social media are interactive computer-mediated technologies that facilitate the creation or sharing of information, ideas, career interests and other forms of expression via virtual communities and networks. A variety of stand-alone and built-in social media services are currently available. Effective use of social media can bring great opportunities for all types of fields. The opportunities in Social media are as follows: a. Social media can be a cheap and effective way of starting a marketing campaign, with a big impact possible from minimal investment. b. Social media optimisation (SMO) is the use of a number of outlets and communities to generate publicity to increase the awareness of a product and service. c. Social media in education refers to the practice of using social media platforms as a way to enhance the education of students. d. A social networking service (also social networking site or social media) is an online platform which people use to build social networks or social relationship e. Social media as a public utility is a theory which states that social networking sites (such as Facebook, Twitter, YouTube, Google, Instagram) f. A social networking service is an online platform, which people use to build social networks or social relationship. g. Social media mining is the process of obtaining big data from user-generated content on social media sites and mobile apps in order to extract patterns.
Oasis Radiant Computer Science, Book 10 60 Approved by Curriculum Development Centre Threats in Social Media 1. Leakage of Personal Information. Personal information from social media sites can be stolen. Even if you have your account on the highest security settings, there are still ways for an identity thief to get your information. Most social network sites have information that is required, such as email address or birthday. It’s common for an identity thief to hack an email account by using social information. 2. Malicious Apps. The internet is smattered with malicious software and it’s only getting worse. Spyware, for example, is any software that collects personal information or sends spammy ads without your consent. Adware tracks personal and sensitive information in much the same way. All malicious apps are the application software that steal things like personal or sensitive information, passwords, and data without the knowledge of the user. 3. Social Scams and Phishing Attacks. Similar to malicious apps that try to collect sensitive data, phishing scams use social media to trick people into giving personal information such as banking details and passwords. 4. Malware Attacks and Hacks. Malware is the malicious software intentionally designed to cause damage to a computer, server, client, or computer network. It includes all malicious software such as including computer viruses, worms, Trojan horses, spyware, adware etc. Hacking is an act of gaining an unauthorised access of personal system, website etc. In order to gain an unauthorised access of information system hackers use malware software. After gaining an unauthorised access they modify information system, websites and even the programme and use them for their personal benefits. Hackers try to improve internet security by forcing IT departments and protection products to constantly innovate, while others hack for fun or to make a buck. Attacks can be focused and targeted, where ‘cyber gangs’ go after individual organisations with advanced malware campaigns. 5. Human Error. People unknowingly click on a phishing link, interact with a fake account, or accidently fill out a spammy form with sensitive information.
Approved by Curriculum Development Centre 61 Oasis Radiant Computer Science, Book 10 Points to remember • A digital citizen is a person skilled in using the internet in order to communicate with others, buy and sell things, and take part in politics, and who understands how to do this in a safe and responsible way. • Digital citizenship evaluates the quality of an individual’s response to membership in a digital community. • The digital footprint includes the activities of a particular person that exists on the internet as a result of online activity. • It includes different activities such as websites we visit, emails we send and the information we submit using internet for different online services. • There are two main classifications for digital footprints: passive and active. • The main vision of National Information and Communication Technology Policy, 2015(2072BS) is to transform Nepal into an information and knowledge-based society and economy. • There are 12 members in National Information and Communication Technology Policy Implementation Steering Committee. • An act related with electronic transactions is called Electronic Transactions Act. • Social media are interactive computer-mediated technologies that facilitate the creation or sharing of information, ideas, career interests and other forms of expression via virtual communities and networks. • Malware is the malicious software intentionally designed to cause damage to a computer, server, client, or computer network. Exercises 1. Fill in the blanks with suitable word(s) : a. The person who is using ICT in order to engage in society, politics and the government is …..........…….. b. Digital footprint is the trail of data we create while using the ……………. c. Nations are using ................ tools to secure sustainable development
Oasis Radiant Computer Science, Book 10 62 Approved by Curriculum Development Centre and economic growth. d. A National Information and Communication Technology Policy Implementation Steering Committee is formed under the chairmanship of …………………… e. A National Information and Communication Technology Policy Implementation Steering Committee consists of .......... members all together. 2. Write the technical terms for the following: a. The moral issues that deal with the use of ICT. b. Transactions of electronic records data by using any electronic means. c. The policy formulated for the overall development of ICT and society. d. The interactive computer-mediated technologies. . e. The interactive computer-mediated technology that facilitates the sharing of information, ideas, career interests and other forms of expression through virtual communities and network. f. An online platform which enables people to build social networks. g. The software intentionally designed to cause damage to a computer, server, client, or computer network. h. The person who gains an unauthorised access to an information system and to use it for his/her personal benefits. i. The software that steals personal or sensitive information, passwords, and data without the knowledge of the user. 3. Choose the best answer(s) : a. The person who uses ICT in every steps of life is ............................................. i. Virtual Citizen ii. Digital Citizen iii. Advanced Citizen iv. Intelligent Citizen b. Digital footprint includes the activity(ies) like ............ that we perform using internet i. Websites we visit ii. E-mails we send iii. The information we submit iv. All of the above c. The IT policy of Nepal was formed to ............... i. Establish knowledge-based society and industry ii. Develop the country through the development of ICT
Approved by Curriculum Development Centre 63 Oasis Radiant Computer Science, Book 10 iii. Change the lifestyle of people by removing the poverty. iv. All of the above. d. A National Information and Communication Technology Policy Implementation Steering Committee consists of ..................... i. 11 members ii. 16 Members ii. 10 Members iv. 12 Members e. The transaction of electronic records or data by using electronic means is termed as ..................... i. IT Policy ii. Cyber Law iii. Electronic Transaction Act iv. None of the above f. The interactive computer-mediated technologies that facilitate the creation or sharing of information, ideas, career interests and other forms of expression through virtual communities and networks is .......... i. Digital Society ii. Social Media iii. Electronic Media iv. None of the above g. The software intentionally designed to cause damage to a computer, server, client, or computer network. i. Malware ii. Hardware iii. Application Software iv. All of the above h. The person who gains an unauthorised access to others’ information system to steal sensitive data for personal benefit is ..................... i. Hacker ii. Cracker iii. Programmer iv. All of the above 4. Match the following: Group “A” Group “B” a. Digital Citizen i. Social Media b. The policy formulated by the government of Nepal ii. 2063 BS c. Electronic Transaction Act iii. IT Policy d. Interactive Computer-Mediated Technology iv. Person who is advanced in ICT v. 2036 BS
Oasis Radiant Computer Science, Book 10 64 Approved by Curriculum Development Centre Chapter 3 Computer Security ffl The concept of computer system security ffl Security measures ffl Data and environmental security ffl Software security THIS CHAPTER COVERS :
Approved by Curriculum Development Centre 65 Oasis Radiant Computer Science, Book 10 Computer Security 3 Chapter Security has always been a prime concern of humankind. For any organisation information plays a vital role in running the business. So, it is required to safeguard information from reaching the illegal hands. When data take the digital form, a different security procedure is required for their security. This is called computer system security. We have to apply the technological and managerial procedures on computer systems to ensure their availability, integrity and confidentiality of information against unwanted access, damage, modification, or other type of destruction. It deals with transmission of data in a secured environment to the people sitting thousands of miles away from each other. We know computer security describes the process to protect computers from different types of failure or attacks like unauthorised access, accidental or natural disaster, cyber theft, physical and software damage. The processes adopted to protect the system from such threats or failures are called security measures. Computer security is the process of detecting and preventing any unauthorised use of your laptop/computer. It involves the process of safeguarding against trespassers from using your personal or office based computer resources with malicious intent or for their own gains, or even for gaining any access to them accidentally. Information Security Information Security (InfoSec) is the act of securing information from unauthorised access. InfoSec is basically the practice of preventing unauthorised access,
Oasis Radiant Computer Science, Book 10 66 Approved by Curriculum Development Centre use, disclosure, disruption, modification, inspection, recording or destruction of information. Information can be physical or electronic. Information can be anything like your details or we can say your profile on social media, your data in mobile phone, your biometrics etc. Thus Information Security spans so many research areas like Cryptography, Mobile Computing, Cyber Forensics, Online Social Media etc. Information Security programmes are built around 3 objectives, commonly known as CIA – Confidentiality, Integrity, Availability. Computer security rests on confidentiality, integrity, and availability. So security management of computer deals with the process to maintain these three aspects. • Confidentiality: Information should be available to that person who is authorised to accept it. It should be strictly controlled to ensure that only the authorised person has access to the concerned data. It is possible by using a password system. • Integrity: Information should not be modified and lost due to unauthorised access. • Availability: Information should be available in complete form when authorised users need it. Security Threats A computer security threat can be intentional such as hacking or accidental such as malfunctioning of or physical damage. Following are the most common types of computer security threats: • Physical damage − It includes fire, water, pollution. • Natural events − It includes climatic, earthquake, volcanic activity. • Loss of services − It includes electrical power, air conditioning, telecommunication. • Technical failures − It includes problems in equipment, software. • Deliberate type − It includes spying, illegal processing of data. Following are the common terms frequently used to define computer security threat − • Virus Threats : A computer virus is a programme designed to disrupt the normal functioning of the computer without the permission of the user.
Approved by Curriculum Development Centre 67 Oasis Radiant Computer Science, Book 10 • Spyware Threats: Spyware is a computer programme that monitors user’s online activities or installs programmes without user’s consent for profit or theft of personal information. • Hackers: Hackers are programmers who put others to threats for their personal gain by breaking into computer systems with the purpose to steal, change or destroy information. • Phishing Threats: It is an illegal activity through which phishers attempt to steal sensitive financial or personal data by means of fraudulent email or instant messages. How to secure computer systems from threats? Following are the significant tips through which you can protect your system from different types of threat: • Install, use, and keep updated Anti-Virus in computer • Install, use, and keep updated Firewall programme. • Always take backups of important files and folders. • Use strong and typical passwords. • Take precautions especially when downloading and installing programmes. • Install, use, and keep updated file encryption programme. • Take precautions especially when reading email with attachments. • Keep the children aware of internet threats and safe browsing. Malicious Code Malicious code is the term used to describe any code that is intended to cause undesired effects, security breaches or damage to a system. Malicious code is an application security threat that cannot be efficiently controlled by conventional antivirus software alone. Malicious code describes a broad category of system security terms that includes attack scripts, viruses, worms, Trojan horses, backdoors and malicious active content. b. Security mechanisms: (i) Authentication System Authentication provides the identification of the originator. It confirms to the receiver that the data received has been sent only by an identified and
Oasis Radiant Computer Science, Book 10 68 Approved by Curriculum Development Centre verified sender. Authentication service has two types: • Message authentication identifies the originator of the message without any regard to router or system that has sent the message. • Entity authentication is assurance that data has been received from a specific entity, say a particular website. • Apart from the originator, authentication may also provide assurance about other parameters related to data such as the date and time of creation/transmission. Password A password is a string of characters used for authenticating a user on a computer system. For example, you may have an account on your computer that requires you to log in. In order to successfully access your account, you must provide a valid username and password. This combination is often referred to as a login. While usernames are generally public information, passwords are private to each user. Most passwords comprise several characters, which can typically include letters, numbers, and most symbols, but not spaces. While it is good to choose a password that is easy to remember, you should not make it so simple that others can guess it. The most secure passwords use a combination of letters and numbers and do not contain actual words. Biometrics • Biometrics refers to digitally encoding physical attributes of a user to gain access to data or computer systems. • Fingerprints, facial recognition, and voice patterns are among some of the most widespread uses of biometrics today in both consumer and commercial use. • By using physical identifiers that are unique to individuals, biometrics seeks to make hacking or gaining unauthorised access to computer systems much more difficult. One common method of employing biometrics is the use of fingerprints as identification. This system can be used in more high-tech or highsecurity situations, but it has more recently been adapted on the individual consumer level. For example, Apple was the first major phone manufacturer
Approved by Curriculum Development Centre 69 Oasis Radiant Computer Science, Book 10 to implement a fingerprint login system, starting with its iPhone 5s, and other companies followed soon after. Other systems of biometrics include iris or retina scans and voice recognition software. (i) Firewells A firewall is a security mechanism that can help protect your network by filtering traffic and blocking outsiders from gaining unauthorised access to the private data on computer. Firewalls can provide different levels of protection. Firewalls provide protection against outside cyber attackers by shielding your computer or network from malicious or unnecessary network traffic. Firewalls can also prevent malicious software from accessing a computer or network via the internet. (iii) Cryptography The word ‘cryptography’ was coined by combining two Greek words, ‘Krypto’ meaning hidden and ‘graphene’ meaning writing. The art and science of concealing the messages to introduce secrecy in information security is recognised as cryptography. Cryptography is a technique of securing information and communications through use of codes so that only those for whom the information is intended can understand it and process it. This prevents unauthorised access to information. The prefix “crypt” means “hidden” and suffix graphy means “writing”. In Cryptography the techniques which are used to protect information are obtained from mathematical concepts and a set of rule based calculations known as algorithms to convert messages in ways that make it hard to decode it. These algorithms are used for cryptographic key generation, digital signing, verification to protect data privacy, web browsing on internet and to protect confidential transactions such as credit card and debit card transactions. Features of Cryptography are as follows: 1. Confidentiality: Information can only be accessed by the person for whom it is intended and no other person can access it. 2. Integrity: Information cannot be modified in storage or transition between sender and intended receiver without any addition to information being detected.
Oasis Radiant Computer Science, Book 10 70 Approved by Curriculum Development Centre 3. Non-repudiation: The creator/sender of information cannot deny his or her intention to send information at later stage. 4. Authentication: The identities of sender and receiver are confirmed. As well as destination/origin of information is confirmed. (iv) Antivirus : Antivirus protection software is designed to prevent, detect, and help remove threats from computer systems. These threats take the form of software viruses and other malware such as ransomware, worms, Trojans, and adware. Antivirus software helps protect your computer against malware and cybercriminals. Antivirus software looks at data — web pages, files, software, applications — travelling over the network to your devices. It searches for known threats and monitors the behaviour of all programmes, flagging suspicious behaviour. It seeks to block or remove malware as quickly as possible. (v) Backup system: The duplicate files of data and system programmes on specified storage section are called backup. Data and system programme files are very important part of a computer system. It may damage the computer system. It may damage due to some threats as we have discussed in physical and environmental security on computer system. It is very important to protect data. So we need to store the data and system programmes on separate storage areas or locations so that we can restore them if there is a damage in its primary locations. c) Hardware Security Computer system is directly or indirectly influenced by the working environment. Protecting the computer hardware from the physical damage, loss or theft is known as hardware security. The hardware components of the computer may get physically damaged due to some reasons. So, we need to protect computer hardware. The following security measures can be applied to protect computer hardware from physical loss or damage. There are some factors that should be considered for the system from environmental threats. • Use of proper power supply devices
Approved by Curriculum Development Centre 71 Oasis Radiant Computer Science, Book 10 • Dust-free environment • Air conditioner system • Fire protection • Insurance • Thief Regular maintenance of hardware: We know that hardware deals with the physical structure of computer. It includes all types of checks to detect the errors and processes to correct them. It protects the machine and peripheral devices from theft, electronic intrusion, failure of devices and damages. It is also termed a physical security. Regular maintenance of hardware components is required for security to the hardware components. 1. Use of proper power supply device: Computer system is an electronic device. It works with electronic pulses. To generate such pulses it uses electricity. It needs 220-240 voltage with frequency of alternating current (AC) ranging from 49 to 50 hertz (HZ). So it is essential to supply the power to the computer according to this range. Fluctuations of voltage may damage the system and corrupt the data and programmes. So we have to use UPS to supply constant power in case of failure of regular supply to the computer system. Whenever the electric supply is cut or stops from main source, UPS will maintain a regular supply to the system. UPS works like a power reservoir and is able to supply power for some hours or days. 2. Dust-free environment: Computer system has different components, some components with static electrical charges that cause the attraction of dust particles. Dust forms an insulate layer that causes overheating of the system which fails the components of computer. It damages the storage section like hard disk, floppy disk also. 3. Air conditioning system: Environmental factors like temperature, relative humidity and climate also give threats to the computer system. It is suggested to maintain the room temperature from 21°C to 24°C to work on a computer. So use of exhaust fans and air conditioning environment is recommended for proper use of computer.
Oasis Radiant Computer Science, Book 10 72 Approved by Curriculum Development Centre 4. Fire protection: Fire protection is necessary for computer system. It may happen due to short circuit on electrical wires. So we have to use fire alarms so that any short circuit can be controlled in time to minimise the damage. 5. Insurance: It is necessary to insure the computer system so that we can recover our loss due to the threats to the system. As we know, computer system may fail due to hardware failure, failure of software and corruption of data so after insurance of computer we can claim some financial gains from insurance company. 6. Regular maintenance of hardware: Computer system is a very delicate system. Due to some threats or environmental components chances of failure of system are very high. So we have to perform the preventive work by doing regular maintenance on the system. 7. Thief: Computers are expensive devices which store important and valuable information. So, we should protect the computers from thief. We should not allow the unauthorised persons to enter inside the computer room. The unauthorised persons can steal computer hardware, software and data. We can use Alarms, Security lights and Closed Circuit Television (CCTV) camera for protecting computer from thief. Points to remember • Computer security describes the process to protect computer from different types of failure or attacks from unauthorised access, accidental or natural disaster, cyber theft, and other software damages. • Security management of computer deals with confidentiality, integrity and availability. • Hardware security or physical security deals with the security to the machine and other peripherals. • Cryptography is a technique of securing information and communications through the use of codes. • Security given to the data and application programmes and system software is data and software security. • We can protect the data and software by using backup system, password, scanning, protection from virus.
Approved by Curriculum Development Centre 73 Oasis Radiant Computer Science, Book 10 • Backup system deals with the duplicate files or data and system programme stored on specified location of storage. • Biometrics is a technique of securing information and communications through the use of codes. • Use of code words to prevent the system from unauthorised access to the system is called password mechanism. • Micro programmes that infect the programme database and system is called virus. We can remove such viruses using antivirus software. • Antivirus refers to digitally encoding physical attributes of a user to gain access to data or computer systems. • Computer system needs a regular and constant voltage to work. So we have to use some power protection devices like UPS and voltage regulator. • UPS is a popular uninterruptible power supply device that supplies the power regularly to the computer system and absorbs small power surge and alerts the user about power surges. Exercises 1. Answer the following questions. a. What is computer security? b. What are the threats to a computer system? Write about them. c. What is hardware security? Write the methods to provide such security. d . Explain some methods to provide data and software security. e. What is a backup system? f. What is password? Write its use to provide security to a computer system. g. Why is it necessary to use UPS or voltage regulator on a computer system? h. Write full forms of: a. UPS b. AC c. DC d. Hz e. CCTV i. Fill in the blanks. i. Security to the machine and peripheral devices is called ____ security. ii. provides regular power supply.
Oasis Radiant Computer Science, Book 10 74 Approved by Curriculum Development Centre iii. Surge suppressor is __________ that regulates the power supply to system. iv. The harmful increase in voltage to damage the system is called _____________. v. _________________is the duplicate form of files and programmes. vi. Code word or secret notation used for access control to computer system is called mechanism. vii. Integrity deals with__________. viii. Suitable temperature range required to operate the computer system is ______ to __________degree Celsius. 2. State True or False. • Unauthorised access and damage to the computer system are called threats. • UPS supplies regular power to computer system. • Surge suppressor is the device that supplies regular power supply to the computer system. • An electrical regulator designed to automatically maintain a constant voltage level is called spike. • A device that protects the computer system from power surges and voltage fluctuations is called a voltage regulator. • Duplicate copies of data and programmes are called backup system. • Password mechanism maintains the confidentiality on a computer system. • Micro programmes that are attached with computer programmes and damage the system are called viruses. • Regular maintenance is not necessary for hardware security. 3. Class Activities and Project Works. • List some viruses and antivirus software available in your lab. • Discuss various types of security management to apply to computer system and prepare a report including different threats and security measures. • Write the functions of the following for security management. • UPS • Air condition • Password • Backup system • Insurance policy
Approved by Curriculum Development Centre 75 Oasis Radiant Computer Science, Book 10 Chapter 4 E-COMMERCE ffl Introduction of E-commerce ffl History of E-commerce ffl Advantage or benefits of E-comerce ffl Limitation of E-commerce ffl Online Payments THIS CHAPTER COVERS :
Oasis Radiant Computer Science, Book 10 76 Approved by Curriculum Development Centre E-commerce 4 Chapter Introduction E-commerce, also known as electronic commerce, refers to the buying and selling of goods or services online, with the help of the internet or World Wide Web. It is a paperless exchange of business information. With the help of internet, e-commerce has become accessible to anyone equipped with an internet connection and a web browser. Now-a-days internet users are shopping online, opening online bank accounts and trading stocks, and doing more. E-commerce is the present and future business of everyone. History of E-Commerce The history of e-commerce begins with the first ever online sale: on August 11, 1994 a man sold a CD to his friend through his website Net Market, an American retail platform. This is the first example of a consumer purchasing a product from a business through the World Wide Web or “e-commerce” as we commonly know it today. Over the years technology continued to grow with new innovations and thousands and thousands of online businesses coming to the market. Electronic Data Interchange and teleshopping in the 1970s paved the way for the modern day e-commerce store. The history of e-commerce is closely intertwined with the history of the internet. Online shopping only became possible when the internet was opened
Approved by Curriculum Development Centre 77 Oasis Radiant Computer Science, Book 10 to the public in 1991. Amazon.com was one of the first e-commerce sites in the US to start selling products online and thousands of businesses have followed it. Since then, e-commerce has evolved to make products easier to discover and purchase through online retailers and marketplaces. Independent freelancers, small businesses, and large corporations have all benefited from e-commerce, which enables them to sell their goods and services at a scale that was not possible with traditional offline retail. Advantages/Benefits of E-Commerce:- E-commerce is one the best and growing technology. It provides convenience & ease to its customers, It attracts new customers with search engines. It provides products at a low cost. There are many more facilities it can provide. Some of the advantages of e-commerce are: 1. E-commerce has overcome geographical limitations. If a person has a physical store in a particular area, he/she is limited to sell products to persons limited to that geographical area. But with the use of e-commerce and m-commerce (e-commerce through mobiles), there is no geographical boundary, people around the world can purchase the things from your store with the help of websites and other means. 2. E-commerce is cost effective. E-commerce provides the products at a very cheap price to its customers. It provides heavy discounts to customers. The reasons for decreased cost of e-commerce are as follows:- • Advertisements through web sites, social media, and search engines are cheaper, so e-commerce is cost effective. • For billing, payments, inventory management, checkout and other operational process, physical employees are not required, so this brings down the cost. • For running e-commerce business, a physical location is not required , so it is cost effective.
Oasis Radiant Computer Science, Book 10 78 Approved by Curriculum Development Centre 3. Locate the Product Quicker In e-commerce, customers needn’t to go to physical store and search the desired product in the whole store. With a search command, customers can easily search products and navigate through the whole store without physical presence. Some websites remember customer preferences and shopping lists to facilitate repeat purchase. 4. Eliminate Travel Time and Cost E-commerce helps the customer to purchase the products without actually travelling to that area and purchasing it from his/her preferred place. E-commerce allows them to visit the same store virtually, with just a few mouse clicks. Thus it reduces our travel time and, of course, the cost. 5. Remain Open All the Time E-commerce websites can run all the time (24/7/365). From the merchant›s point of view, this increases the number of orders they receive. From the customers point of view, an always open store is more convenient. Limitations of E-Commerce:- 1. Security Security is the biggest drawback of e-commerce. Customers fear to provide personal and financial
Approved by Curriculum Development Centre 79 Oasis Radiant Computer Science, Book 10 information, even though several improvements have been made in relation to data encryption. There are many websites that do not have capabilities to conduct authentic transactions. Fear of providing credit card information and risk of identity theft is limiting the growth of e-commerce. 2. Tax issue In e-commerce whenever a buyer or seller are situated in different locations there is an implementation of sales tax by the government which is another big issue. If the government will remove tax from web stores then there is more chance that physical store will lose business. 3. Fear People fear to operate in a paperless and faceless electronic world. Some of the business organisations do not have physical existence, People do not know with whom they are conducting commercial transactions. This aspect makes people to opt for physical stores for purchases. 4. Duplicate products Sometimes the picture of the product and the real ones are totally different or customer gets the duplicate one. Customers have to compromise with what they get and it may not suit the needs of the buyers. The lack of ‘touch and feel’ prevents people from online shopping. 5. Technical limitations Some protocols are not standardised around the world. Certain software used by vendor to show electronic images may not be a common
Oasis Radiant Computer Science, Book 10 80 Approved by Curriculum Development Centre one. It may not be possible to browse through a particular page due to lack of standardised software. Insufficient telecommunication bandwidth may also pose technical problems. Types of E-Commerce:- E-commerce is thought of as purchasing goods or services with the help of internet. There are three basic types of e-commerce transactions which specify the category under which goods and services are transferred: Business-to-Business (B2B), Business-to-Consumer (B2C), Consumerto-Consumer (C2C). BUSINESS-TO-BUSINESS (B2B) B2B e-commerce refers to all electronic transactions of goods and sales that are conducted between two companies. This type of e-commerce typically explains the relationship between the producers of a product and the wholesalers who advertise the product for purchase to consumers. BUSINESS-TO-CONSUMER (B2C) B2C e-commerce is the electronic business between businesses and consumers. In this business organisations directly deal with consumers and allow them to shop around the world for the best price. Moreover consumers can view the reviews and then decide about the product quality and other features. This e-commerce category also enables businesses to develop a more personalised relationship with their customers. ONSUMER-TO-CONSUMER (C2C) C2C e-commerce is the electronic transaction in which one consumer is selling goods or services to another consumer online. For example eBay, olx.in etc. in which a third-party site helps to take care of the details of the transaction,
Approved by Curriculum Development Centre 81 Oasis Radiant Computer Science, Book 10 usually referred to as a marketplace. The purpose of consumer-to-consumer e-commerce is to enable consumers to sell directly to other consumers without having to go through a middleman, or spending a huge amount of money building and maintaining their own online storefront. CONSUMER-TO-BUSINESS (C2B) C2B e-commerce is a type of business where a consumer makes their services or products available for companies to purchase. An example of this would be a graphic designer customising a company logo or a photographer taking photos for an e-commerce website. M-Commerce:- M-commerce also known as MobileCommerce is the buying and selling of products, goods, services etc. with the help of mobile devices like smartphones or tablets. It is one of the forms of e-commerce in which users can perform online shopping and many other similar types of jobs without the help of desktop computer. Some examples of m-commerce are mobile banking, mobile apps (like Amazon), digital wallets (paying apps) etc. Types of m-commerce (a) Mobile Shopping: Mobile shopping is done through a mobile device or any hand held device. It allows a customer to purchase a product from a mobile device, using an application such as Amazon, Daraz or any other web application. (b) Mobile Banking: Mobile banking is the banking transaction like money transfer, balance enquiry, statement report or any other banking job through mobile devices. This is done through a secure, dedicated application provided by the banking institution.
Oasis Radiant Computer Science, Book 10 82 Approved by Curriculum Development Centre (c) Mobile Payments: Purchasing a product using a mobile device is mobile payment. Digital wallets, such as Apple Pay, allow a customer to buy a product without needing to swipe a card or pay with physical cash. Advantages of mobile commerce • It is easily accessible by everyone, so getting more popular as a transaction tool these days. • Convenient in comparing prices, reading reviews and making purchase without hesitation. • Large number of products and services available. Disadvantages of mobile commerce • Some mobiles don’t support apps and other means required and thus discourage the customers to make purchases. • Some mobile payment options are not available in every geographic location and may not support every type of digital wallet. • Some businesses are limited to a particular country or region due to tax laws and regulations. Online Payments:- An electronic transaction in which monetary fund is transferred from one bank account to another directly through banks or using credit/debit card is online payment. Online payment involves the use of computer networks, the internet and digital stored value systems. Companies accepting online payment must provide better security facilities to their customers. In the case of recurring billing where the customer data is stored, the merchant needs to enforce a longer list of security features and protocols. To accept an online payment the merchant needs to have access to an Online
Approved by Curriculum Development Centre 83 Oasis Radiant Computer Science, Book 10 Payment Gateway. The online payment gateway is a service provider that is integrated with the credit card and transfers the online payment information between the merchant and the payment processor. The online payment process has the following stages: 1. Customer submits the payment information to the merchant. For example customer completes the payment form on the merchant website and submits the information. 2. The merchant submits the payment information to the online payment gateway. 3. The online payment gateway submits the payment to the payment processor. 4. The payment processor authorises the payment and responds to the payment gateway. 5. The payment gateway responds back to the merchant. 6. The merchant responds back to the customer showing if the online payment was successful or not and taking the appropriate action. Exercises 1. Give very short answers to the following questions. a) What is buying and selling goods or services online? b) Name any two online payment services of Nepal. c) List any 2 sites providing C2B services. d) Under which type of service does booking air tickets through any handheld devices comes? e) Why do we call m-commerce a handy service? 2. Short answer questions: f) Define e-commerce. g) List the advantages of e-commerce. h) What are the different types of e-commerce? i) Define m-commerce? j) Differentiate between e-commerce and m-commerce. 3. Long answer questions: k) “E-commerce is the demand of modern society both in terms of time and money.” Elaborate on the statement.
Oasis Radiant Computer Science, Book 10 84 Approved by Curriculum Development Centre l) How can business organisations boom with the help of e-commerce in Nepal? Explain in your words. 4. Prepare an organisational chart showing the different types of e-commerce, including 2 example web sites for each them, and list out the products or services they provide. [ Note: Try to include the web sites of Nepal.] 5. Match the following : A B a) M-commerce i. cashless payment b) B2C ii service on go c) Online payment iii Daraz.com d) E-commerce iv cheque payment v. selling/purchasing online 6. State whether the following statements are true or false: a. E-commerce can be regulated without internet. b. Credit card is the only solution of online payment. c. Bank transaction is possible in online payment. d. M-commerce is a sub type of e-commerce. e. We can book movie tickets with the help of e-sewa service in Nepal. f. E-commerce service can be enjoyed 24/7 days. g. Consumers cannot be service providers in e-commerce. h. M-commerce is easier compared to e-commerce. i. There are no e-commerce sites in Nepal. j. E-commerce supports globalisation of commerce. 7. Write the full-form of the following abbreviations: a. C2B b. B2C c. B2B d. E-commerce e. M-commerce
Approved by Curriculum Development Centre 85 Oasis Radiant Computer Science, Book 10 Chapter 5 Contemporary Technology ffl Introduction of Contemporary Technology ffl Cloud computing ffl Artificial intelligence (AI) ffl Virtual Reality THIS CHAPTER COVERS :
Oasis Radiant Computer Science, Book 10 86 Approved by Curriculum Development Centre Contemporary Technology 5 Chapter Introduction Contemporary means current era and the technology that uses modern tools and techniques to present current world is contemporary technology. Contemporary technology includes e-commerce, e-business, e-government, AI and VR (virtual reality). These means of contemporary technology have changed the whole world into an electronic world. It is a world where everything is done at an electronic speed, much faster than the traditional method used earlier. Now each and every transaction, whether it is related to banks, business, government, entertainment etc, is in the hands of user, done with a few clicks. This contemporary technology has made our work faster and easier. Cloud Computing Cloud computing is the remote storage space on the internet where a user can store, process and manage his/her local computer. It helps the user keep the databases on the internet at a cheaper price on rent, without the need to purchase the space, on a yearly basis. These services can be enjoyed anywhere, anytime and through any devices with the help of internet. Some cloud service providers are Amazon Web Service, Telnet Pvt. Ltd., Cloud Himalaya Pvt. Ltd., Microsoft Azure, Google Cloud Platform, IBM cloud etc. Advantages of cloud computing: a) User needs to pay for the purchased space that means, less space results in less expense and vice versa. b) For managing hardware and software no experts or trained persons are required. It is managed by the company itself.
Approved by Curriculum Development Centre 87 Oasis Radiant Computer Science, Book 10 c) Servers are controlled and managed by the owner company so it is well secured. d) Lost data can be easily recovered in it. e) New features are added automatically through the servers as soon as we are connected to the internet. Disadvantages of cloud computing: a) Internet connection is necessary to grab the benefits of cloud computing. User needs a network in order to send files to the cloud and retrieve them. b) User has to stick to the features provided by service provider that means the bandwidth, storage space and backup. User has to purchase different packages for getting premium service and extra space. c) User is totally dependent on the service provider for the security of data. So we have to trust the other party anyhow for the security of our data. d) There are many cases of data being hacked by hackers so one of the greatest disadvantages of cloud computing is that we don’t know which providers we can trust. e) If user experiences any technical issues, the user has no choice but to call service provider’s technical support for help. User cannot fix problems and some providers do not offer technical support all the time (limited working hours). Artificial Intelligence (AI) The term AI was first coined by John McCarthy in the year 1956. He defined AI as science and engineering of making intelligent machines. AI is incorporated in computer systems to make it able to think and talk. Some examples of AI are, a Robot based restaurant in Kathmandu, where the Robot takes the orders from the customer and provides services to them. Alexa, developed by Amazon, is capable of voice interaction, music playback, making to-do lists, setting alarms, playing audio books, and providing weather, traffic, sports, and other real-time information. Google AI Eye Doctor identifies diabetic retinopathy, Facebook has face verification & auto tag service, and Twitter’s AI identifies hate speech or terrorist language.
Oasis Radiant Computer Science, Book 10 88 Approved by Curriculum Development Centre Advantages of Artificial Intelligence: 1) It is used in weather forecasting where the possibility of human error is very less as programmes are created through previously gathered information. Therefore the chance of reaching accuracy with a greater degree of precision is possible. 2) AI overcomes the risk to human life such as by creating robots, which in turn are used to defuse bomb, explore deepest parts of oceans, mine for coal and oil, go to Mars or in any kind of natural disasters. 3) AI-based machines can work 24x7 without any break and getting bored, unlike humans. Many helpline and educational institutes are solving queries and issues through AI. 4) AI based machines can do repetitive work without any hesitation, which when done by humans lead to errors and mistakes. In banks many verifications of documents and cheques are done through AI-based machines. 5) Around 20 years ago, when we’d be planning to go somewhere, we used to ask a person who already went there for directions. But now all we have to do is say “OK Google, where is Pokhara?” It will show you Pokhara’s location on Google map and the best path between you and Pokhara. Disadvantages of Artificial Intelligence: 1) AI’s creation requires huge costs as they are very complex machines. Moreover repair and maintenance of machines is very costly. 2) AI is making humans lazy with its applications automating the majority of the work. Humans tend to get addicted to these inventions which can cause a problem to future generations. 3) AI is creating the possibility of unemployment as a majority of the repetitive tasks and other works is done by robots. Every organisation is looking forward to replace the minimum qualified individuals with AI robots which can do similar work with more efficiency. 4) AI-based machines cannot develop a bond with humans which is an essential attribute when comes to Team Management. They cannot replace the human connection that makes the team.
Approved by Curriculum Development Centre 89 Oasis Radiant Computer Science, Book 10 5) Machines can perform only those tasks which they are designed or programmed to do. For anything out of that they tend to crash or give irrelevant outputs, which could be a major drawback. Virtual Reality An artificial environment created with certain hardware and software, which seems to be real, is Virtual Reality. VR is a simulated experience that can be similar to or completely different from the real world. It includes entertainment (i.e. video games) and educational purposes (i.e. medical or military training). Advantages of Virtual Reality 1. The visualisations provided by VR is much qualitative because it shows us the reality assumption. 2. VR has cleared the language bar between different countries as using a VR headset you can comfortably merge yourself in a foreign language. 3. VR has increased the level of interest in education as boring and theoretical topics have become much more creative and interesting with VR. 4. It is easy to recall content very deeply in mind due to the use of VR. Disadvantages of Virtual Reality 1. VR has become addictive to some students and games. They have become slaves to this technology and just cannot let it go. 2. It is like a one-man show whenever you are learning through VR as it does not provide any room for interaction. User cannot ask questions or give suggestions. 3. VR is expensive and can be afforded by a minority of people which makes it unfair for the majority of people.
Oasis Radiant Computer Science, Book 10 90 Approved by Curriculum Development Centre E-Governance The use of computer and internet to provide services to citizens, government and other persons in a country is e-government. It helps in simplifying the activities for government, citizens and business, among others, in national as well as local level. It helps in promoting good governance. Advantages of E-Government 1) E-government allows government transparency as the public knows about government works and policies they are trying to implement. 2) E-government saves money and time as it reduces paper-based work and gives emphasis to electronic system. 3) E-government service is accessible to its citizens irrespective of their location as the society is moving towards the mobile connections. 4) E-government provides efficient, improved and better accessibility of its services. Disadvantages of E-Government a) E-government implementation requires a highly expensive infrastructure. b) For smooth functioning of e-government, skilled manpower is required. c) Implementation of e-government requires a powerful cyber law. d) E-government can create a language barrier in rural areas. e) Data security is always a problem for e-government. Types of E-Government 1. Government-to-Citizen (G2C) The Government which provides facilities to the citizen is G2C. It helps its citizen access its services anytime from anywhere. Many services like license renewals, paying tax, paying administrative fees online etc. is provided by G2C. The facility of Government-to-Citizen enables the ordinary citizen to overcome time limitation.
Approved by Curriculum Development Centre 91 Oasis Radiant Computer Science, Book 10 2. Government-to-business (G2B) The exchange of services between Government and Business organisations is G2B. The G2B also consists of many services exchanged between business sectors and government. G2B plays a crucial role in business development. A business organisation can have easy and convenient online access to government agencies. It enhances the efficiency and quality of communication and transparency of government projects. 3. Government-to-Government (G2G) The interaction between different government departments, organisations, and agencies is G2G. In G2G the government departments can work together, as government agencies can share the same database using online communication. It can communicate with global government and local government as well. It provides safe and secure inter-relationship between domestic or foreign governments. 4. Government-to-Employee (G2E) The interaction between the Government and its Employees is G2E. G2E provides online facilities to the employees. It helps employee to apply for leave, viewing salary payment record and checking the balance. It provides human resource training and development. G2E is the relationship between employees, government institutions, and their management. Mobile Computing Interaction between human and computer for the transmission of data, voice and video is mobile computing. It includes mobile communication (protocols, data and technology), mobile hardware (devices and components), and mobile software (mobile applications). Mobile computing devices are portable devices capable of operating, executing and providing services and applications. These devices are also known as handheld computing devices like notebook, smart phones, tablet PCs and PDAs.
Oasis Radiant Computer Science, Book 10 92 Approved by Curriculum Development Centre Advantages of Mobile Computing 1) It reduces the time and cost of productivity as it can be used out in the field of various companies by clients. 2) It is mostly used for entertainment for personal purpose and even for showing presentation to clients. 3) These devices are portable as they can be used from any location for any purpose and can be easily taken to different locations. 4) Cloud computing service is available for saving documents on an online server with the ability to access them anytime and anywhere when you have a connection to the internet. You can access these files on several mobile devices or even PCs at home. Disadvantages of Mobile Computing 1) It always needs quality connectivity like GPRS, 3G, 4G, Wi-Fi etc. and if these facilities are not available access to the data is limited or not at all. 2) From a security point of view it is not safe because mobile devices can be hacked easily through some apps or programmes so we have to be very careful in giving access to different programmes and software. 3) Mobile devices always work through a power source so they need to be charged regularly and if a situation comes where there is no source of power supply than it can result in letdown. Internet of Things (IoT) IoT (Internet of Things) is a huge network which connects various devices, which share data about how they are used and where they are used (environment). These all are done with the help of sensors which are embedded in devices. IoT provides common platforms to all these devices, so that they can communicate with each other. Further the collected data is used to extract required
Approved by Curriculum Development Centre 93 Oasis Radiant Computer Science, Book 10 valuable information and shared for better experiences. Hence IoT can be called as Smart Working. It can be a person with a heart monitor implant, a farm animal with a biochip transponder, an automobile that has built-in sensors to alert the driver when tire pressure is low or any other natural or man-made object that can be assigned an Internet Protocol (IP) address and is able to transfer data over a network. Advantages of IoT a. Efficient resource utilisation Proper use of IOT increases an efficient mode of resource utilisation and it also monitors natural resources. b. Minimise human effort In IOT most of the tasks are done for the human beings through the interaction and communication of IoT devices, as a result it minimises the human effort. c. Save time The tasks are done for the people through the IOT devices, reducing the human effort. This ultimately saves our time. So time and effort are primary factors in an IoT platform. d. Enhance data collection by maintaining accuracy If we use the IoT device to collect and manipulate data it saves our time and can maintain the accuracy of data. e. Improve security The interconnection of different IoT devices makes a complete system, hence we can make the system more secure and efficient by adopting different security measures. Disadvantages of IoT a. Security The IoT devices are interconnected, forming a system which communicates over network. But the system provides less control as it communicates over network. This may lead to security threats and various kinds of network attacks.
Oasis Radiant Computer Science, Book 10 94 Approved by Curriculum Development Centre b. Privacy The privacy of personal data and personal record is very low because it makes the personal data accessible to other users at a maximum level without her/ his active participation. c. Complexity The process of designing, developing and maintaining an IoT system is very complicated and time consuming. Exercises 1. Give very short answers. a. Define contemporary technology. b. Write the name of storage that keeps database on rent. c. Who coined the term AI and when? d. AI-based machines can work for how many hours and days? e. Who developed Alexa and what task can it perform? f. What makes boring and theoretical subjects creative and interesting? 2. Answer the following questions in short. a. What is Cloud Computing? b. What do you understand by the term AI? c. Mention any two advantages and two disadvantages of cloud computing. d. Write any two advantages and two disadvantages of Artificial Intelligence. e. Define Virtual Reality. Write any one advantage and any one disadvantage of it. f. List different types of e-government. g. Define e-government. Write any one advantage and any one disadvantage of it. 3. Long answer questions: a. How can e-government help in reducing corruption in Nepal? b. Describe how the use of IoT has changed the lifestyle of our society. Mention some real life examples.
Approved by Curriculum Development Centre 95 Oasis Radiant Computer Science, Book 10 c. Write a paragraph of 100 words in a discussion of advantages and disadvantages of VR. 4. Match the following : Column A Column B d. Cloud Computing i) robot e. AI ii) online facility to employee. f. G2B iii) portable g. G2E iv) license renewals. h. Mobile v) smart working i. IoT vi) global/local government. j. G2C vii) remote storage k. G2G viii) helps in business development. 5. Write suitable technical terms for the following. a. It is also known as smart working. b. PDAs, Notebook, smart phones are examples of….. c. Government providing online facility to employees. d. The exchange of services between government and business organisation. e. Government providing facilities to its citizens. f. Inter-relationship between domestic and foreign governments. g. The use of computer and internet for providing services to citizens. h. Artificial environment which seems to be real. 6. Write the full-form of the following abbreviation. AI, 3G, 4G, G2C, G2B, G2G, G2E, VR, IoT 7. Assignment Prepare an organisational chart showing types of e-government, with their examples and name of websites. Take help of your teacher and the internet.
Oasis Radiant Computer Science, Book 10 96 Approved by Curriculum Development Centre Chapter 6 Number System ffl Various types of number system ffl The process of number conversions ffl Binary addition and subtraction ffl Binary division and multiplication THIS CHAPTER COVERS : 1 × 20 = 1 1 × 21 = 2 0 × 22 = 0 1 × 23 = 8 1 × 24 = 16 0 × 25 = 0 0 × 26 = 0 1 × 27 = 128 = 155 Decimal Octal Binary 0 0 000 1 1 001 2 2 010 3 3 011 4 4 100 5 5 101 6 6 110 7 7 111
Approved by Curriculum Development Centre 97 Oasis Radiant Computer Science, Book 10 Number System 6 Chapter Introduction History of the number system goes back to the primitive age of human beings. The development of number system has happened in line with the development of human beings. In primitive age, people used to count using stones and pebbles. Hindu philosophers developed the decimal numbers. From these numbers, various other numbers are derived and developed. These numbers are binary numbers, octal numbers, hexadecimal numbers, etc. Decimal (Denary) Numbers The number of base or radix ten is called the decimal number. It is the first number system in which all the ancient and modern mathematical calculations are done. Other number systems are derived from this. It is generated with the combination of 0,1,2,3,4,5,6,7,8,9. We can represent these numbers with suffix, too. Eg (9810)10. The following chart displays relations among several number systems derived from the decimal number. System Base 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 Hexadecimal 16 0 1 2 3 4 5 6 7 8 9 A B C D E F Decimal 10 0 1 2 3 4 5 6 7 8 9 Octal 8 0 1 2 3 4 5 6 7 Binary 2 0 1 Binary Number Binary number is a number of two base numbers represented by 1 and 0. The number, 1 or 0, is called a binary digit. These numbers represent two logical conditions of human life: TRUE and FALSE. We can generate this number with the combination of 0 and 1. It is represented with suffix two. Eg (10101)2.
Oasis Radiant Computer Science, Book 10 98 Approved by Curriculum Development Centre The following table shows some decimal numbers and their equivalent binary numbers. Decimal Binary 0 0 1 1 2 10 3 11 4 100 5 101 6 110 7 111 8 1000 9 1001 Conversion of Binary to Decimal and Vice Versa We multiply each binary digit by its weighted position, and add each of the weighted value together. Weighted Value: 25 24 23 22 21 20 32 16 8 4 2 1 To convert decimal number into binary number, repeated division by two is needed. Examples Convert following decimal into binary numbers: a) (45)10 = (101101)2 2 45 1 2 22 0 2 11 1 2 5 1 2 2 0 1
Approved by Curriculum Development Centre 99 Oasis Radiant Computer Science, Book 10 = (101101)2 b) (225)10 = (10111001)2 2 225 1 2 112 0 2 56 0 2 23 1 2 11 1 2 5 1 2 2 0 1 = (10111001)2 Binary to Decimal Conversions Examples Convert (10011011)2 into decimal equivalent. (1 0 0 1 1 0 1 1)2 1 × 20 = 1 1 × 21 = 2 0 × 22 = 0 1 × 23 = 8 1 × 24 = 16 0 × 25 = 0 0 × 26 = 0 1 × 27 = 128 = 155 (10011011)2 = (155)10 Convert following binary numbers into decimal equivalents: a) (00111)2 b) (01011)2 c) (10100)2 d) (11011) 2
Oasis Radiant Computer Science, Book 10 100 Approved by Curriculum Development Centre a. (00111)2 1 × 20 = 1 1 × 21 = 2 1 × 22 = 4 0 × 23 = 0 0 × 24 = 0 = 7 b. (01011)2 1 × 20 = 1 1 × 21 = 2 0 × 22 = 0 1 × 23 = 8 0 × 24 = 0 = 11 c. (10100)2 0 × 20 = 0 0 × 21 = 0 1 × 22 = 4 0 × 23 = 0 1 × 24 = 16 = 20 d. (11011) 2 1 × 20 = 1 1 × 21 = 2 0 × 22 = 0 1 × 23 = 8 1 × 24 = 16 = 27 Convert following binary numbers into decimal. a) (1001) 2 = 1 x 23 + 0 x 22 + 0 x 21 + 1 x 20 = 8 + 0 + 0 + 1 = (9)10 b) (1101) 2 = 1 x 23 + 1 x 22 + 0 x 21 + 1 x 20 = 8 + 4 + 0 + 1 = (13)10