Approved by Government of Nepal, Ministry of Education, Curriculum Development
Centre, Sanothimi, Bhaktapur as an Additional Learning Material.
NEW GATEWAY
TO
COMPUTER SCIENCE
10
Authors
Dinesh Adhikari
Dilendra Prasad Bhatta
Shekhar Poudel
Laxman Adhikari
Shubharambha Publication Pvt. Ltd.
Kathmandu, Nepal
Published by:
Shubharambha Publication Pvt. Ltd.
Kathmandu, Nepal
URL: www.shubharambhapublication.com.np
E-mail: [email protected]
www.facebook.com/shubharambhapublication
New Gateway to Computer Science Book-10
Authors : Dinesh Adhikari, Dilendra Prasad Bhatt,
Shekhar Poudel, Laxman Adhikari
Layout Design : Ram Malakar
Video Content : Dinesh Adhikari
Language Editor : Krishna Prasad Regmi
Copyright © : Dinesh Adhikari
Edition : 2077
ISBN : 9789937579315
© : Publisher
No part of this book may be reproduced or transmitted by means (electronic, photocopying,
recording or otherwise) without prior written permission from the publisher. Any breach of this
condition will entail legal action and prosecution.
Printed in Nepal
Prreeffaacece
It has become a fundamental right of children to get computer education. It is
very essential to get basic to advance knowledge about computer education to
compete the future. Nepal government has prescribed the syllabus and course
outline for the computer education from primary to secondary level. But
students are not able to get quality education due to the lack of systematic course
book and the computer system in the school. So we have developed the complete
series of computer science.
Along with the evolution of human beings new thoughts, area of knowledge and
technology also developed together. Among the eruptions, ICT (Information and
Communication Technology) is one which has unquestionably become important
part of human beings. A person is not better than a caged pigeon if s/he is far
from computer technology in this century. New Gateway to Computer Science is
a complete package which obviously supports a lot to the students as this is one
of the most useful textbook, so far available in the market.
This book is completely prepared considering the level of the students. This
text has various salient features like it focuses on child psychology, pictorial
descriptions, practical sections, let’s Review, sufficient exercise, etc.
It is impossible to acknowledge all who have directly or indirectly encouraged
me to prepare this book on this single page. My special thanks go to the students
and teachers of different schools for their regular interactions during the
preparation of this book.
Comments and constructive suggestions are highly welcomed from the readers
and professionals to update this text book.
Dinesh Adhikari
[email protected]
Content
Unit 1 Introduction to Technology Fundamentals.............5-97
Lesson 1: Computer Networking & Telecommunications..................................6
Lesson 2: Ethical and Social Issues in ICT........................................................36
Lesson 3: Computer Security System................................................................53
Lesson 4: E-Commerce.....................................................................................66
Lesson 5: Contemporary Technology................................................................74
Lesson 6: Computer Number System...............................................................83
Unit 2 Database Management System (MS-ACCESS)......98-136
Lesson 7: Database Management System.........................................................99
Unit 3 Programming Language....................................137-283
Lesson 8: Review on Qbasic Programming....................................................138
Lesson 9 : Modular Programming in QBASIC...............................................164
Practical Section on SUB Procedure.........................................178
Practical Section on FUNCTION Procedure.............................205
Lesson 10 : File Handling in QBASIC............................................................232
Practical Section on File Handling............................................242
Lesson 11 : Programming in C.......................................................................255
Practical Section in C Programming..........................................274
List of Abbreviations.........................................284-288
Introduction to
Technology Fundamentals
Unit
1
This unit covers the following topics:
Lesson 1: Computer Networking & Telecommunications
Lesson 2: Ethical and Social Issues in ICT
Lesson 3: Computer Security System
Lesson 4: E-Commrce
Lesson 5: Contemporary Technology
Lesson 6: Computer Number System
Lesson Computer Networking
& Telecommunications
1
Learning Outcomes
At the end of this lesson, students will be able to:
define data communication and telecommunication.
explain the components of data communication.
tell about the data transmission mode and speed.
explain transmission media.
explain the elements of computer networking.
explain computer networking.
tell about networking topology.
tell about network architecture.
explain the types of computer networking.
explain about internet and its services.
Simply, communication is the process of sharing
ideas, message or information with each other.
The term ‘communication’ is derived from the
word ‘communicare’ which means ‘to share’.
Data communication is the way of sharing
a virtual message. A conversation between
two or many more people is an example of
communication. Data communications refer to
the sharing of a virtual message with the help
of emails, messengers, phone calls and other
various electronic devices. Data communications technologies deal with the means
and methods of data transfer from one location to another using wired or wireless
transmission medium. The purpose of data communications is to provide us with the rules
and regulations that allow computers with different disk operating systems, languages,
cabling and locations to share resources.
Telecommunication systems are a specialized system for communication. The term
telecommunication sometimes is also referred to as telecom. Telecommunication devices
are telephones, telegraph, radio, fiber optics, satellites and the internet. Telecommunication
is a vast range of information-transmitting technology such as mobile phones, land lines
6 New Gateway to Computer Science Book -10
telephone, VOIP and broadcast network. Here, we are going to discuss some functions of
telecommunication.
It transmits information to far distance and establish interface between sender and
receiver.
Transmission of the data and reception of the message is done in an uninterrupted way.
These systems also ensure that right message is received by the right user only and while
transmitting is also check for transmission errors.
Telecommunication is responsible for converting and managing the speed of
transmission.
It controls the flow of information that depends on the communication channels and the
terminals used to transmit information.
Components of Data Communication
A datum communication system has the following components:
Message or Data: It is the information or data to be communicated. It can consist of text,
numbers, pictures, sound, video or any combination of these. Communication of data
means a message or data will be transmitted from one device and will be received in the
destination or target device. The component in a data communication network is data or
message.
Sender: The computer or device that is used for sending data is called sender, source or
transmitter. A datum has to be sent to a destination from a source. The device that sends
data to the destination or target is the sender. It can be a computer, cell phone, video
camera and so on.
Receiver: The device that receives data is called receiver. It is the device or computer
that receives the message. The destination of a transmitted data is the receiver which
will receive the data. The device that receives the data that was sent by the sender is the
receiver. A receiver can be a computer, a cell phone, a video camera and so on.
Transmission Medium: It is the channel or physical path through which the message
is carried from sender to the receiver. The medium can be wired like twisted pair cable,
coaxial cable, fiber-optic cable or wireless like laser, radio waves, and microwaves.
Protocol: It is a set of rules that govern the communication between the devices. This
is like an arrangement between the two devices to successfully communicate with each
other. For example, how the data will be sent, how the data will be travelling, how to
ensure that full data has been received, how to handle errors in transmission, etc. Both
sender and receiver follow same protocols to communicate with each other.
New Gateway to Computer Science Book -10 7
For example, when you speak to your friend on telephone, you are the sender,
telephone is the medium, and your friend is the receiver. Similarly, in data communication,
sender and receiver are the machines and transmission medium is a wire or wireless data
communication channel.
Let’s Review
Data communication technologies deal with the means and methods of data
transfer from one location to another using wired or wireless transmission medium.
Telecommunication systems are a specialized system for communication.
Transmission is the channel or physical path through which message is carried from
the sender to the receiver.
The device that sends data to the destination or target is the sender.
Data Transmission Mode
Transmission mode means transferring of data between two devices. It is also known as
communication mode. The three modes of data transmission are simplex, half-duplex and
full duplex. They are explained below.
Transmission Mode
Simplex Mode Half Duplex Mode Full Duplex Mode
Simplex Mode
In a simplex communication mode, data
can transmit in one direction only. It One Direction
is suitable for connecting send-only
like keyboard or receive only like
monitor devices. In simplex mode, the
communication is unidirectional. The simplex mode can use the entire capacity of the
channel to send data in one direction. The best example of simplex mode is radio and
television broadcasting. In this mode, there is just one communication channel. So, we
can receive data on that channel but could not be able to transmit on the same channel.
8 New Gateway to Computer Science Book -10
Half-Duplex Mode
In a half-duplex communication mode, Send Receive
data can transmit in both directions A is sending, B is receiving
but only one direction at a time. It can
alternately send and receive data. When
one device is sending, the other device
can only receive, and vice versa. The
half-duplex mode is used in cases where Receive Send
there is no need for communication in
B is sending, A is receiving
both directions at the same time. The
entire capacity of the channel can be
utilized for each direction. The best
example of this communication mode
is Walkie-talkie in which message is sent one at a time and messages are sent in both the
directions.
Full-Duplex Mode
In full-duplex mode, a connection between two devices is capable of sending data in
both directions at the same time. In this transmission mode, the communication between
sender and receiver can occur simultaneously. The sender and receiver can both transmit
and receive data at the same time. The full duplex transmission mode is like a two-way
road in which traffic can flow in both directions at the same time. The best example of this
communication mode is telephone in which two people can communicate, and both are
free to speak and listen at the same time.
Let’s compare simplex, half-duplex and full duplex transmission mode.
Comparison Simplex Half Duplex Full Duplex
Two-directional,
Direction of Unidirectional Two-directional, simultaneously
only one direction at
Communication a time Sender can send and
receive data
Send / Receive Sender can only Sender can send and simultaneously
send data. receive data, but one Most performing
a time. mode of transmission
Performance Least performing
Example mode of Better than simplex
transmission
Walkie-talkie Telephone
Radio, Television
broadcasting
New Gateway to Computer Science Book -10 9
Let’s Review
In a simplex mode, signal is sent in one direction.
In a half-duplex mode, signal is sent in both directions, but only one direction at a
time.
In a full duplex mode, signal is sent in both directions at the same time.
In a simplex mode, only one device can transmit the signal like this in a half-duplex
mode, both devices can transmit the signal, but one at a time and in a full duplex
mode, both devices can transmit the signal at the same time.
Full duplex performs better than half-duplex and half-duplex performs better than
simplex mode.
Data Transmission Speed
The speed in which data can be transmitted from one device to another across a
communication channel is called data transmission rate. Data transmission rates are
measured in Kbps, Mbps, Gbps, etc.
The difference between the highest and the lowest frequencies on a transmission is called
bandwidth. Bandwidth of a communication system refers to its data transfer rate. The
data transfer capacity, or speed of transmission, of a digital communication system is
measured in bps (Bits Per Second). Based on the data transmission speed, there are three
basic categories of communication channels which we are going to discuss below.
Narrowband: Narrowband is used where data volume is relatively slow or fewer amounts
of data are to be transmitted. These utilize the channel frequency that is considered flat or
which will use a less number of frequency sets.
Wideband: Wideband channel has a medium capacity of data transmission rate. Wideband
channels can carry more information than narrowband channels, but they typically require
more power to do so.
Broadband: Broadband channel is a high speed, high capacity transmission medium
that supports a wide range of frequency and carries multiple signals at a time. Cable TV
networks, Microwave, Satellite, etc. are examples of broadband channels.
10 New Gateway to Computer Science Book -10
Analog and Digital Signal
A signal is a wave that is suitable for carrying information
over a transmission medium. Signals can be electric,
light, electromagnetic, or radio signals for carrying
information in free space. The electric signals have
limited bandwidth and cannot be used in long distance
communication.They need to be amplified or regenerated.
Here, we are going to discuss two major signals used in
data transmission.
Analog Signal: An analog signal is a wave that
continuously changes its information carrying properties
over time. An analog signal can be used to measure
changes in some physical phenomena such as light,
sound, pressure, or temperature. For example, an analog
microphone can convert sound waves into an analog signal. Even in digital devices, there
is typically some analog component that is used to take in information from the external
world, which will then get translated into digital form using an analog-to-digital converter.
Digital Signal: A digital signal is a wave that takes limited number of values at discrete
intervals of time. These signals are non-continuous, they change in individual steps. The
transfer of data in the form of digit is called digital signal or digital data transmission.
Digital signals consist of binary digits 0 & 1. Electrical pulses are used to represent binary
digits. Data transmission between computers is in the form of digital signals.
Let’s Review
The speed in which data can be transmitted from one device to another across a
communication channel is called data transmission rate.
The difference between the highest and the lowest frequencies on a transmission
is called bandwidth.
There are three basic categories of communication channels. They are narrowband,
wideband and broadband.
The electric signals have limited bandwidth and cannot be used in long distance
communication.
An analog signal is a wave that continuously changes its information carrying
properties over time.
A digital signal is a wave that takes limited number of values at discrete intervals of
time.
New Gateway to Computer Science Book -10 11
Transmission Media (Communication Channel)
The transmission media is also known as communication channel. In data communication
terminology, a transmission medium is a physical path between the transmitter and
the receiver. It is the channel through which data are sent from one place to another.
Transmission media is a pathway that carries the information from the sender to receiver.
We use different types of cables or waves to transmit data. Transmission Media is
broadly classified into two types. Let’s observe the given chart and explain the various
communication channels.
Guided Media
Guided media is also called bounded media or wire media. In this communication media,
data travel through the wire instead of wave. This transmission media are the cables that
are tangible or have physical existence and are limited by the physical geography. Popular
bound transmission media in use are twisted pair cable, co-axial cable and fiber optical
cable. Each of them has its own characteristics like transmission speed, effect of noise,
physical appearance, cost, etc.
Types of Transmission
Media
Guided Media Unguided Media
Twisted Pair Coaxial Optical Radio waves Microwaves Infrared
Cable Cable Cable
Twisted Pair Cable: It consists of two separately insulated conductor wires wounded
about each other. Generally, several such pairs are bundled together in a protective sheath.
They are the most widely used transmission media. There are two types of twisted pair
cable.
Unshielded Twisted Pair (UTP): This type of cable has the
ability to block interference and does not depend on a physical
shield. It is used for telephonic applications. It is easy to install
and it has high capacity. It is a cable with wires that are twisted
together to reduce noise and crosstalk.
12 New Gateway to Computer Science Book -10
Shielded Twisted Pair (STP): This type of cable consists of a special jacket to block
external interference. It is used in fast-data-rate Ethernet and in voice and data channels
of telephone lines. It has better performance at a higher data rate in comparison to UTP
cable. This cable is more expensive than UTP cable.
Coaxial Cable: It has an outer plastic covering containing two
parallel conductors each having a separate insulated protection
cover. Coaxial cable transmits information in two modes: Baseband
mode (dedicated cable bandwidth) and Broadband mode (cable
bandwidth is split into separate ranges). Cable television and analog
television networks has coaxial cables. It has high bandwidth and it
is easy to install and expand.
Optical Fiber Cable: In this cable, data transmission rate is very high.
The data travel in the form of light. It uses the concept of reflection of
light through a core made up of glass or plastic. The core is surrounded
by a less dense glass or plastic covering called the cladding. It is
used for transmission of large volumes of data. It has more capacity
and bandwidth but it is difficult to maintain and install. The cost of
this cable is very high in the comparison to others. Optical fiber is
rapidly replacing copper wires in telephone lines, internet communication and even cable
television connections because transmitted data can travel to very long distances. Fiber
optic cable can have maximum segment length of 2 kms and bandwidth of up to 100
Mbps.
Unguided Media
Unguided media is also called unbounded media or wireless media. In this communication
media, data travel through the air instead of cable. An unguided transmission media
transmits the electromagnetic waves without using any physical medium. This media is
also known as wireless transmission. Unguided signals can be travelled from source to the
destination in several ways. These ways include ground propagation, sky propagation and
line of sight propagation. The commonly used unguided media are explained below.
Radio Waves: Radio waves are a type of electromagnetic radiation
used in communication technologies, such as television, mobile
phones and radios. These devices receive radio waves and convert
them into mechanical vibrations in the speaker to create sound
waves. Radio waves have frequencies as high as 300 gigahertz
(GHz) to as low as 30 hertz (Hz). Radio waves are generated
artificially by transmitters and received by radio receivers, using antennas. Radio waves
are widely used in modern technology for fixed and mobile radio communication,
New Gateway to Computer Science Book -10 13
broadcasting, radar, communications satellites, wireless computer networks and so many
other applications. The radio waves from many transmitters pass through the air
simultaneously without interfering with each other.
Microwaves: Microwave transmission refers to the technique
of transmitting information over a microwave link. It has
higher frequency than the radio waves. Microwave links are
widely used for point-to-point communications because their
small wavelength allows conveniently-sized antennas to
direct them in narrow beams, which can be pointed directly
at the receiving antenna. Microwave links are commonly
used by television broadcasters to transmit television programmes.
Infrared: Infrared waves are used for very short distance communication. In this
transmission media the frequency Range is from 300GHz – 400THz. Low frequency
infrared waves are used for very short distance communication like TV remote, wireless
speakers, automatic doors, hand held devices, etc. Infrared signals can spread within a
room. Due to such short range, it is considered to be one of the secure transmission
modes.
Satellite: In this mode of communication, the satellite station at
the space receives signals from the earth with the help of an
antenna. The signals are amplified to an optimum level and then
with the help of transponders they are retransmitted back to the
earth. The earth station then receives the signal from the satellite,
and re-amplifies it and helps in the communication. The satellites are generally equipped
with an antenna and transponder to facilitate the communication process.
Wi-Fi Technology: Wi-Fi which stands for Wireless Fidelity is one
of the most important technological developments of this modern
age. Wi-Fi is a technology that uses radio waves to provide network
connectivity. A Wi-Fi connection is established using a wireless
adapter to create hotspots areas in the area of a wireless router that
is connected to the network and allows users to access internet
services. Although Wi-Fi is typically used to access the internet on
portable devices like smartphones, tablets, or laptops. It also provides access to a local
network of connected devices.
Bluetooth Technology: Bluetooth is an open wireless technology
for transmitting fixed and mobile electronic device data over short
distances. Bluetooth works on radio waves, specifically in the
2.4GHz range. This short-range frequency is commonly used by
14 New Gateway to Computer Science Book -10
most appliances that need wireless connectivity, including Wi-Fi routers. When Bluetooth
connects two devices, it forms a Personal Area Network (PAN) which does not require an
internet connection or mobile service to transfer files or anything else.
Let’s Review
Transmission media is a pathway that carries the information from the sender to
receiver.
Guided media is also called bounded media or wire media. In this communication
media, data travel through the wire instead of wave.
Unguided media is also called unbounded media or wireless media. In this
communication media, data travel through the air instead of cable.
Radio waves are a type of electromagnetic radiation used in communication
technologies, such as television, mobile phones and radios.
Shielded Twisted Pair cable consists of a special jacket to block external interference.
Microwave transmission refers to the technique of transmitting information over a
microwave link.
Computer Network
A computer network is an interconnection of two or more computers that are connected
together to share the resources and information from one computer to several other
computers. The purpose of a computer network is to create a link between multiple
computer systems and support communication between them. Computers in a network
can share data with each other. Various types of networking topologies are used in
computer networks to exchange the information. A computer network is a set of connected
computers. Computers on a network are called nodes. The connection between computers
can be done through cabling or wireless through radio waves. Connected computers can
share resources, like access to the Internet, printers, file servers, and others. A network is
a multipurpose connection, which allows a single computer to do more.
Common uses of computer network
To share the data and other peripheral devices.
To back up the software and program files.
For workgroup applications.
Allows the electronic transfer of data.
Advantages of computer networks
Sharing of information is easier.
Sharing of different peripheral devices is possible.
Easy to communicate with each other.
Easy to control the computers in a network.
New Gateway to Computer Science Book -10 15
Disadvantages of computer networks
It is difficult to establish.
It is expensive to establish.
A trained person is required to handle.
Network faults can cause loss of data and resources.
Elements of Computer Network
There are various hardware and software elements used to create a networking mechanism
which we are going to discuss below.
Hardware Elements
NIC (Network Interface Card)
A NIC is a device that helps the computer to communicate
with another device. It is also called network card. NIC is a
printed circuit board which connects one of the expansion
slots of a computer and provides a port for attaching a network
cable. There are two types of network interface cards namely
wireless and wired. The wireless NIC is used by the modern
laptops devices. Wireless NIC is a connection that is made using the antenna which
employs the radio wave technology. Like this, the wired NIC uses wire to transfer data
over the medium.
Connectors
A connector is a device that terminates a segment of cabling or
provides a point of entry for networking devices such as computers,
hubs, and routers. Connectors can be distinguished according to their
physical appearance, such as jacks and plugs (male connectors) or
sockets and ports (female connectors).
Hub
A Hub is a multiport central connectivity networking device that
splits the network connection into multiple devices. When the
computer requests for information from a computer, it sends
the request to the hub. Hub distributes this request to all the
interconnected computers. Hub is a device that connects cables
from computers and other devices such as printers in a local area network. Hubs are used
in start topology networks but they are often used with other configuration to make it easy
to add and remove computers without bringing down the network.
16 New Gateway to Computer Science Book -10
Switches
A switch is a networking device that groups all the devices over
the network to transfer the data to another device. It is better than
hub as it does not broadcast the message over the network, i.e., it
sends the message to the device for which it belongs to. Therefore,
we can say that the switch sends the message directly from source
to the destination.
Router
A router is a device that connects the LAN to the internet. It
connects two different networks having the same protocol. The
router is mainly used to connect the separate networks or connects
the internet to multiple computers. The router organizes the network
in terms of logical network segment. Each network segment is
assigned an address so that every packet has both the destination
network address and destination device address. Routers determine whether the source
and destination are on the same network or whether data must be transferred from one
network type to another.
MODEM
The MODEM stands for Modulation and Demodulation. It connects the computer to the
internet over the existing telephone line. A modem is not integrated with the computer
motherboard. It is a separate part on the PC slot found on the motherboard. Modem speed
is measured in bps , Kbps, Mbps, etc. which is the speed in which the modem can send
and receive data. The common use for modems is to both sending and receiving of the
digital information between personal computers.
Repeater
A repeater is a networking device which is used to increase the length
of networking by amplifying weak signals. A repeater is applied
in computer networks to expand the coverage area of the network.
Repeaters amplify the received/input signal to a higher frequency
domain so that it is reusable, scalable and available. Repeaters were
introduced in wired data communication networks due to the limitation
of a signal in transmitting over a longer distance. Repeater are common installation in
wireless networks these days.
New Gateway to Computer Science Book -10 17
Let’s Review
A computer network is an interconnection of two or more computers that are
connected together to share the resources and information.
A NIC is a printed circuit board which connects to one of the expansion slot of a
computer and provides a port for attaching a network cable.
A hub is a multiport central connectivity device that splits the network connection into
multiple devices.
A router is a device that connects the LAN to the internet. It connects two different
networks having the same protocol.
A repeater is a networking device which is used to increase the length of networking
by amplifying weak signals.
Gateway
A gateway is a node in a computer network.
It connects two networks having dissimilar
communication protocol. A gateway device provides communication to a remote network
or an independent system that is out of bounds for the host network nodes. Gateways serve
as the entry and exit point of a network; all data routed inward or outward must first pass
through and communicate with the gateway in order to use routing paths. Generally, a
router is configured to work as a gateway device in computer networks. For basic Internet
connections at home, the gateway is the Internet Service Provider that gives you access
to the entire Internet.
Bridge
A bridge is a type of computer network device
that provides interconnection with other bridge
networks using the same protocol. It reduces
the amount of traffic on a LAN by dividing it
into two segments. Bridge devices work at the
data link layer of the Open System Interconnect (OSI) model, connecting two different
networks together and providing communication between them. Bridges are similar to
repeaters and hubs in that they broadcast data to every node.
Software Elements
Network Operating System (NOS)
An operating system that enables a machine to participate in the network is called
networking operating system. Network operating systems are designed for client computers
18 New Gateway to Computer Science Book -10
and provide functions. There is difference between network operating systems and stand-
alone operating systems. Linux, Unix , Xenix , Windows 2000 server , Windows XP ,
Windows 7, Windows8, OS/2, etc. are the examples of network operating system. The
function of network operating systems are file and print sharing, account administration
for users and security, etc.
Communication Protocol
The set of rules and regulations that must be followed by the sender and the receiver while
communicating with each other over the network is called protocol. Network protocols
define rules and conventions for communication between different devices, participating
in a computer network. Devices participating in network communication should know
about the common network protocols and communicate according to the way, defined
by the network protocol. In other words, standard network protocol software must run
on both devices participating in network communication. TCP/IP, HTTP, FTP, SMTP,
POP, IPX/SPX, Apple Talk and NetBEUI are the types of network protocols which are
explained shortly below.
TCP / IP: Transmission Control Protocol / Internet Protocol (TCP/IP) are the most
commonly used protocols in the internet. They mainly deal with slicing the data into
small sized packets and routing them along the communication channel.
FTP: File Transfer Protocol (FTP) is used to transfer the files from one computer to
another even they run on different platforms or operating systems.
SMTP: Simple Mail Transfer Protocol (SMTP) is used for the delivery of E-Mail. It
enables the sender to keep a copy of the mail until it is actually delivered. It enhances the
reliability of message delivery.
HTTP: Hyper Text Transfer Protocol (HTTP) is used by web browsers and web servers
to communicate with each other.
POP: Post Office Protocol (POP) is the server where incoming mails are collected on
your mailbox. It allows single-user host to read mails from server.
IPX/SPX: Internetwork Packet Exchange / Sequential Packet Exchange is a networking
protocol that interconnects networks that use Novell’s NetWare clients and servers. This
protocol is not used for the internet. It exchanges the information between the network
clients, applications, and network peripherals.
Apple Talk: AppleTalk is a set of LAN communication protocol that is developed for
apple computers. This network can support up to 32 devices and data can be exchanged
at a speed of 230.4 Kbps.
New Gateway to Computer Science Book -10 19
Net BEUI: It stands for NetBIOS Extended User Interface. This network protocol is
used for small size LANs which do not require any configuration to implement. It is
a very small administrator. NetBEUI is supported by all Microsoft Windows network
operating systems; its implementation on Windows NT is called the NetBEUI Frame
(NBF) protocol.
Device Driver
A device driver is a software program that controls a particular type of hardware device
that is attached to the computer network. Many device drivers are available with an
operating system. However, if a user buys a new type of device that the operating system
does not detect, the new device driver will have to be installed. A device driver essentially
allows smooth communication between a connected hardware device and the operating
system.
Let’s Review
A gateway is a node in a computer network. It connects two networks
having dissimilar communication protocol.
A bridge is a type of computer network device that provides interconnection with
other bridge networks using the same protocol.
The set of rules and regulations that must be followed by the sender and the receiver
while communicating with each other over the network is called protocol.
A device driver is a software program that controls a particular type of hardware
device that is attached to the computer network.
TCP/IP, HTTP, FTP, SMTP, POP, IPX/SPX,Apple Talk and NetBEUI are the types of
network protocols.
Types of Computer Network
On the Basis of Distance
Local Area Network (LAN)
A Local Area Network (LAN) is a network of computers,
which is limited within a very small geographical location
such as a room or a building. A LAN may contain small
number or large number of computers connected to
each other to share resources within a small geographic
location. The media used on LAN must be of the same type and the protocol used in it
is generally same. It is simpler and cheaper than other networking system. This network
cannot cover more than a kilometre. LANs are typically used for single sites where people
need to share resources among themselves but not with the rest of the outside.
20 New Gateway to Computer Science Book -10
Characteristics of LAN
LAN is normally used by single organizations.
LAN operate at relatively high speed when compared to the typical WAN.
There are different types of Media Access Control (MAC) methods in a LAN, the
prominent ones are Ethernet, Token ring, etc.
It connects computers in a single building or block, i.e. they work in a small
geographical area.
Metro Area Network (MAN)
A Metropolitan Area Network (MAN) is a network
that interconnects users with computer resources in
a geographic area such as within a city or a town.
This type of network is larger than LAN and smaller MAN
than WAN. Instead of using bounded media, it can
use unbounded media. For example, a bank having
branches in three different places within a city can
use MAN to interconnect each LAN of a branch.
The interconnection is done through phone line, any cable or wireless communication
system. This type of network is more flexible than the LAN. It has many more advantages
than LAN but has more chances of leakage of data. A MAN is often used to connect
several LANs together to form a bigger network, referred to as a campus area network,
or CAN.
Characteristics of MAN
It generally covers a single town or city.
Communication medium used for MAN are optical fibres, cables, etc.
Data rates are adequate for distributed computing applications.
Wide Area Network (WAN)
A Wide Area Network (WAN) connects two or
more LANs together generally across a wide
geographical area. WANs can be used to connect
cities, states, or even countries. WANs are usually
owned by large organizations and government
agencies due to high cost in building and
maintaining them. A WAN connects the systems
of dissimilar types through telecommunication,
satellite or microwave relays in a large geographical area. The data transmission speed is
New Gateway to Computer Science Book -10 21
very slow which is measured in terms of kilobytes per seconds (Kbps). The internet is a
single, larger and global Wide Area Network.
Characteristics of WAN
It generally covers large distances such as states, countries, continents, etc.
Communication medium used are satellite and telephone networks which are
connected by routers.
It is an expensive system compared to other networking types.
On the Basic of Architecture
Client / Server Network
A network in which one or more computers are designated as
a server(s) and the other computers on the network can request
service from the server is called client/server network. In this
network, a dedicate computer known as server provides sharing
resources. All other computers known as clients are used to
access the shared resources. This type of network is commonly
used in organizations. It provides great security features but requires special hardware
and software to setup.
Peer-to-Peer Network
A group of computers that functions both as a client and a
server is called peer-to-peer network. Sometimes it is also
called a workgroup computer. Such type of network is
commonly used in small organizations.
Centralized Network
Centralized networking systems use client/server architecture
where one or more nodes are directly connected to a central
server. This is the most commonly used in many organizations
where client sends a request to a company server and receives
the response. Centralizednetwork model allows administrators
to manage the resources centrally. The network servers and
other critical network resources are located in a central location in a secure and dedicated
server room. In Centralized computer network model, the network resources are placed
and managed from a main location. Centralized network model provides Network and
System Administrators better access to network devices. In centralized network model,
network resources can be managed more easily and it provides better network security.
22 New Gateway to Computer Science Book -10
Let’s Review
A Local Area Network (LAN) is a network of computers, which is limited within a
very small geographically location such as a room or a building.
A Metropolitan Area Network (MAN) is a network that interconnects users with
computer resources in a geographic area such as within a city or a town.
A Wide Area Network (WAN) connects two or more LANs together generally
across a wide geographical area.
A network in which one or more computers are designated as a server(s) and the
other computers on the network can request service from the server is called client/
server network.
Centralized networking systems use client/server architecture where one or more
nodes are directly connected to a central server.
Network Topology
Network topology refers to the layout of the network in which all the devices are
connected. The network topologies can be physical or logical. Physical topology refers
to the physical shape or design structure of a network including the nodes, devices
and cables. Logical topology refers to how data are transferred or exchanged between
computers within the network. Network topology also refers to the physical topology
where topology is the way in the cables and devices that connect the computers in the
network. The commonly used network topologies are Bus, Star and Ring which we are
going to discuss below.
Star Topology
In this topology, all the computers are connected to a centrally
placed device called hub or switch. This topology is mostly used
in LAN to connect several computers to the server that controls
communication between any two local computers by establishing
a logical path. In this topology all the workstations are connected
to central device with a point-to-point connection. So it can be
said that every computer is indirectly connected to every other
node with the help of hub.
Advantages
It is less expensive networking mechanism.
If any node other than the host node fails; remaining nodes are unaffected.
It is easy to detect the failure link in star topology.
New Gateway to Computer Science Book -10 23
Disadvantages
If the centre connectivity device like hub or switch fails to work, the entire network
system stops to work.
Failure of the server causes the failure of entire computers in the network.
The use of hub, a router or a switch as central connectivity devices increases the overall
cost of the network.
Ring Topology
In this topology all the computers are connected to each other
in a closed loop by a single cable with each other. The last
computer connects to the first one to from a ring like structure.
Each workstation is connected to two other components on either
side, and it communicates with these two adjacent neighbours.
Data travel around the network, in one direction. Sending and
receiving of data takes place with the help of TOKEN.
Advantages
It supports optical fiber cable so that data transmission rate is very high.
It is more reliable than a star topology because communication is not dependent on a
single central node.
If a link between any two nodes fails or if one of the nodes fails, alternate routing is
possible.
Disadvantages
Any node failure causes whole network failure.
It is difficult to detect failure links.
It requires more complicated control software than in star topology.
Bus Topology
In bus topology, all the nodes are connected to a single
cable, with the help of interface connectors. The cable used
in this topology is the backbone of the network. Every
workstation communicates with the other device through this
Bus. Peripheral devices and computers can be added to the
topology of the network in a linear fashion without the same
demands for cable length.
Advantages
It requires less cable length so its cost is effective.
The failure of a node does not affect communication among other nodes in the network.
Addition of new nodes to the network is easy.
24 New Gateway to Computer Science Book -10
Disadvantages
A broken connection brings the whole network down.
It is difficult to find out the problem if the entire network shuts down.
If the shared communication line fails, the entire network fails to work.
Let’s Review
Network topology refers to the layout of the network in which all the devices are
connected.
Topology refers to the physical shape or design structure of a network including
the nodes, devices and cables.
In start topology, all the computers are connected to a centrally placed device called
hub or switch.
In ring topology, all the computers are connected to each other in a closed loop with a
single cable with each other.
In bus topology, all the nodes are connected to a single cable, with the help of
interface connectors.
Internet and Its Services
Internet is defined as an interconnection of networks. which allows computers on different
kind of networks to interact with each other. It is the largest computer network spread
all over the world including the connection of millions of computers. It is a network of
networks sharing a common mechanism for identifying computers, and a common set of
communication protocol for communication between two or more than two computers
on the network. In order to connect to the Internet, we must have access to an Internet
Service Provider (ISP), which acts as the mediator between user and the Internet. You can
get information, access data, communicate with others, play games and many more by
connecting your computer through Internet. Internet has been the main source in different
fields like Education, Science, research and others to develop, design and do many other
things.
In 1964, Paul Barren brought the concept of Internet. In 1969, the Advanced Research
Project Agency (DARPA) under the US Defence Department applied this concept and
constructed a computer network among four computers. The first computer network,
was called ARPANET (Advance Research Project Agency Network). After that different
technologies and techniques started to develop and their involvement with the Internet
brought today’s medium status.
New Gateway to Computer Science Book -10 25
Advantages and disadvantages of the internet
Advantages
The internet is faster than any other communication services.
The internet is the source of knowledge so all kinds of information can be displayed.
The internet is the most popular form of entertainment. We can watch movies, songs,
videos, games, etc. that are available in the internet for free.
The internet is massively used in social networking media such as facebook, twitter,
etc.
The internet tools can be for E commerce services like online hotel reservations, online
ticket booking, online shopping, etc.
Disadvantages
The information or any important files can be easily taken by the hackers.
The unnecessary emails, advertisements, spam mails may slow down the system and
create lots of problems while working with computer.
The malware or virus threats affects the system to a greater extent.
More chances of social isolation problems.
Services of Internet
Search Engine
Search engines are the websites that allow the users to search
information based on keyword or a combination of keywords.
Search engines are used to locate web sites and information. To
search the information, users need to enter the desired search term
into the search field. After that, the search engine looks through its index for relevant
websites and displays them in the form of a list. www.google.com, www.yahoo.com,
www.bing.com, www.ask.com, etc. are some examples of search engines.
Web Browser
A browser is a software that is used to access the internet to view
the web pages. It allows us to visit websites and do the various
activities within them. The most common web browser software
are Microsoft Internet Explorer, Google’s Chrome, Mozilla
Firefox, Apple’s Safari, and Opera. The availability of browser
depends on the operating system that your computer system has used.
26 New Gateway to Computer Science Book -10
Downloading
The process of receiving information at your computer from another computer through
a network is called downloading. This is a process of transferring a copy of a file from
a remote computer to the requesting (local) computer. It is just the reverse of uploading.
Each time when you visit a webpage, your computer or mobile device must download
the HTML, CSS, images, and any other relevant data in order to display the page in your
web browser.
Uploading
The process of transferring the information from your computer to another computer
through a network is called uploading. This is a process of transferring a copy of a
file from a local computer to the requesting computer. The most common method of
uploading a file to another computer or server is by using FTP (File Transfer Protocol). If
you are uploading a file to another site, you must have permission to access the site and
the directory where the file is to be placed.
Let’s Review
Internet is defined as an interconnection of networks. with allows computers on
different kind of networks to interact with each other.
Search engines are the websites that allow the users to search information
based on keyword or a combination of keywords.
Search engines are used to locate web sites and information.
The most common web browser software are Microsoft Internet Explorer, Google’s
Chrome, Mozilla Firefox, Apple’s Safari, Opera, etc.
The process of receiving information at your computer from another computer
through a network is called downloading.
The process of transferring the information from your computer to another
computer through a network is called uploading.
Web Chat
A web chat is a system that allows users to communicate in real time using easily
accessible web interfaces. It is an online interactive communication mechanism that
allows people to have real time discussion with one or more people through the Internet.
New Gateway to Computer Science Book -10 27
Videoconference
A videoconference is a set of interactive
telecommunication technologies which allow two
or more locations to interact through the two-way
video and audio transmissions simultaneously. It is
the transmission of image/video and speech / audio
back and forth between two or more geographically
dispersed persons.
Domain Name
A domain name is the address where the internet users can access your website. A domain
name is used for finding and identifying computers on the internet. The popular domain
names are .com, .edu , .org , .net , .mil, etc. A domain name can be any combination
of letters and numbers, and it can be used in combination of the various domain name
extensions. The domain name must be registered before you use it. Every domain name is
unique. No two websites can have the same domain name. Let’s discuss the given points
how domain name works and how they are used.
Domain names have two parts that are separated by a dot.
A domain name can be used to identify a single IP address or group of IP addresses.
A domain name is used as a part of a URL to identify a website.
The IP address in the domain name’s background is converted to a recognizable,
alphanumeric domain name by a system known as the domain name system (DNS).
IP Address
Internet Protocol address, is an identifying number for network hardware that helps to
connect to a network. IP address allows a device to communicate with other devices.
An IP address provides an identity to a networked device on the internet. There are two
versions of IP and they are internet protocol version 4 (IPv4) and internet protocol version
6 (IPv6). IPv6 is the upgraded IP version of IPv4.
Let’s Review
A web chat is a system that allows users to communicate in real time using easily
accessible web interfaces.
A domain name is the address where the internet users can access your website.
A domain name is used for finding and identifying computers on the internet.
Internet Protocol address, is an identifying number for network hardware that
helps to connect to a network.
IP address allows a device to communicate with other devices.
28 New Gateway to Computer Science Book -10
WWW
World Wide Web was invented by Tim Berners-Lee in 1989. This was invented initially
for scientists to easily share data available as part of their experiments. It is a collection
of web resources and pages found on the network. To access the www, we must have web
browser. Web consists of three main components they are listed below.
HTML: Hypertext Mark-up Language is a standard mark-up language used to create
web pages.
URL: Uniform Resource Locator is the understandable form of a web address
which is used to identify a resource.
HTTP: Hyper Text Transfer Protocol acts as the foundation of the Web.
Telnet (Terminal Emulation Network)
Telnet was developed in 1969 to support in remote connectivity between computers over
a network. Telnet allows us to connect remote computers over a TCP/IP network. It is a
network protocol used on the Internet or local area networks to provide a bidirectional
interactive communications facility. The term telnet also refers to software which
implements the client part of the protocol.
Newsgroups
A newsgroup is an Internet-based online discussion forum where so many people can
put their views and ideas on a particular area of interested topic. It enables remotely
connected users to share, discuss and learn about their topic of interest by exchanging text
messages, images, videos and other forms of digital contents. It was created in 1979 by
some university students to exchange their messages with each other.
Electronic Mail
Electronic mail also called as an E- mail is a digital
message used for creating, sending, receiving and
storing textual data in the digital format over a
network. Electronic mail is one of the most widely
used features of the Internet. It allows us to send and
receive messages to and from anyone with an email
address, anywhere in the world. Instead of using a
pen to write a letter on paper, we are using keyboard
or voice to write an email message on an electronic
device like a phone or computer. Email addresses are written with a custom username at
the beginning followed by the email service provider’s domain name, with an @ sign.
Email system uses multiple protocols within the TCP/IP . When you configure an email
New Gateway to Computer Science Book -10 29
account, you must define your email address, password, and the mail servers used to send
and receive messages. E-mail messages are usually encoded in ASCII text. However,
you can also send non-text files, such as graphic images and sound files, as attachments.
Features and an E-mail
You can send attachments with an email that contains important documents, images or
any files.
It is simple and easy to use. It also allows for the easy and quick access of information
and contacts.
The sent and received messages can be stored, and searched safely and easily.
It can be accessed from anywhere when you are connected to the internet.
It reduces the cost of paper. And also can be delivered within a second.
Same message can be sent easily and quickly at a same time to many recipients.
It allows for instant access of information and files.
Let’s Review
Telnet was developed in 1969 to support in remote connectivity between
computers over a network.
A newsgroup is an Internet-based online discussion forum where so many people
can put their views and ideas on a particular area of interested topic.
Electronic mail is one of the most widely used features of the Internet.
Email allows us to send and receive messages to and from anyone with an email
address, anywhere in the world.
Hypertext Transfer Protocol is a set of rules for transferring files, such as text,
graphic images, sound, video, and other multimedia files, on the www.
Innovative Task
Take a short interview with you principal and subject teacher about the ISP that is
being used at your school. Also ask them about the positive and negative aspects
of it. Then, prepare a project report.
List out the name of various ISP of Nepal and make a short report.
Prepare a project report about the networking mechanism that is being used in your
school.
Visit some organizations nearby you and observe the networking structure over
there. Also prepare a report and submit to your teacher.
Visit a computer shop and list out the various types of Wi-Fi router models available
there.
30 New Gateway to Computer Science Book -10
Assignment
1. Select the best answer from the given options.
A. Physical layout of computer:
a. Network b. LAN c. Topology d. MAN
B. Which of the following is protocol?
a. TCP / IP b. FTP c. HTTP d. All of the above
C. A networking device with multiple ports:
a. HUB b. MAN c. LAN d. WAN
D. Band-Width is measured in :
a. KBPS b. BPS c. KPS d. None of the above
E. Which is internet service?
a. Telnet b. Star c. Hub c. Ring
F. Which of the following is network topology?
a. Star b. Bus c. Ring d. All of the above
G. Newspaper and books are examples of :
a. Half duplex b. Full Duplex c. Simplex d. None of the above
H. One of the most expensive cables of the network:
a. Coaxial cable b. UTP c. UTP d. Optical fiber cable
I. Which of these domains is restricted to qualified organizations?
a. .com b. .org c. .net d. .edu
J. Yahoo ! is a :
a. Search engine b. Web browser
c. Home page d. Newsgroup
K. Which of the following is a valid E-mail ID?
a. dinesh@yahoo@com b. nayaghare.dinesh@com
c. [email protected] d. [email protected]
L. Which of the following is a web browser?
a. Internet Explorer b. Mozilla Firefox
c. Opera d. All of the above
New Gateway to Computer Science Book -10 31
M. The process of transferring a copy of a file from a remote computer to the requesting
computer is:
a. Uploading b. Downloading
c. Searching d. File Transfer Protocol
N. ARPANET is related to:
a. Internet b. Operating System
c. Microsoft Office d. Adobe Programs
O. Actual internet address is numerical and is called:
a. Domain Name b. IP address c. DNS d. Domain Letter
P. Which of the following symbol is used in email?
a. # b. @ c. * d. +
Q. The website contains:
a. Dynamic pages b. Static Pages
c. Both of the above d. None of the above
R. Which of the following is a search engine?
a. google.com b. facebook.com c. ask.com d. both (a) and (c)
2. Fill in the blanks with correct words / phrases.
a. Transmission is the channel or physical path through which the message is carried
from …………. to the …………………...
b. In a ……………….., signal is sent in one direction.
c. ……………… is also called unbounded media or wireless media.
d. …………….. are a type of electromagnetic radiation used in communication
technologies, such as television, mobile phones and radios.
e. ……………… is a device that connects the LAN to the internet. It connects two
different networks having the same protocol.
f. A ……………. is a software program that controls a particular type of hardware
device that is attached to the computer network.
g. ………………. refers to the physical shape or design structure of a network
including the nodes, devices and cables.
h. In …………… topology all the computers are connected to each other in a closed
loop with a single cable with each other.
32 New Gateway to Computer Science Book -10
i. ……………….. is the largest computer network spread all over the world with
the connection of millions of computers.
j. ……………. stands for Wireless Fidelity.
k. Search engines are used to ………………. and information.
l. The process of transferring the information from your computer to another
computer through a network is called ……………….
m. Actually internet addresses are numerical and called as …………..….
n. The main page of any website should be named as ………………
3. State whether the following statements are true or false.
a. The device that sends data to the destination or target is the receiver.
b. In a simplex mode, only one device can transmit the signal.
c. In a full duplex mode, only one device can transmit the signal at the same time.
d. Guided media is also called unbounded media or wire media.
e. Gateway is a central connectivity device that splits the network connection into
multiple devices.
f. A bridge is a type of computer network device that provides interconnection with
other bridge networks using the same protocol.
g. TCP/IP, HTTP and FTP are the types of networking systems.
h. In bus topology, all the computers are connected to a centrally placed device called
hub or switch.
i. In 1964 Paul Barren brought the concept of Internet.
j. Web browsers are the websites that allow the users to search information based
on keyword or a combination of keywords.
k. The most common web browser software is Microsoft Internet Explorer, Google’s
Chrome, etc.
l. The process of receiving information at your computer from another computer
through a network is called uploading.
m. Telnet was developed in 1969 to support in remote connectivity.
n. Postal mail allows us to send and receive messages to and from anyone with an
email address, anywhere in the world.
o. Electronic mail is one of the most widely used features of the Internet.
p. Opera and safari are the names of search engines.
New Gateway to Computer Science Book -10 33
4. Write down the single technical term for the followings.
a. A set of rules with which computers communicate with each other over a network.
b. A form of wireless transmission in which signals are sent via pulses of infrared
light.
c. A device that connects multiple networks using the same protocol.
d. A device or software that converts data into dissimilar networks.
e. A device that is used to translate analog signals into digital and vice versa.
f. A networking architecture which covers a geographical location.
g. The differences between the highest and the lowest frequencies of a transmission
media.
h. Devices on one network that can communicate with devices on another network
through a device
i. The visual communication of parties around the world.
j. The huge collection of hypertext document on internet.
k. The service that allows sending text messaged, graphics/images using computer.
l. A program that allows to log into another computer on the Internet.
m. Online postal service.
n. The internal interface produced by adjacent pair of twisted pair cable.
o. A company that provides E-mail and Internet services to the user.
p. Message sent electrically through computer network.
5. Match the following.
Newsgroup Interconnection of several computers
Internet Online discussion group
Web chat Prevent unauthorized access to network
Firewalls Real time discussion zone
6. Write down the full form for the followings.
FAQ ISP DNS E-mail DARPA ARPANET
ADSL DSL FTP HTTP ASCII LAN
MAN WAN POP HTML HTTP WWW
IP TCP/IP FTP STP UTP MODEM
OSI bps PAN Wi-Fi Net BEUI
34 New Gateway to Computer Science Book -10
7. Answer the following questions.
a. Define simplex and half-duplex mode with examples.
b. What is communication media? Write with examples
c. What is a computer network? Define it with advantages.
d. What are the common uses of the computer network?
e. What are network transmission devices? Explain any two of them.
f. What do you mean by network topology? Draw a figure of ring topology and
mention its advantages.
g. Define star and bus topology with their advantages and disadvantages.
h. What do you mean by communication media? Differentiate between bounded and
unbounded media.
i. Define LAN, MAN and WAN with suitable examples.
j. What is a protocol? Write a few examples of protocol.
k. What is internet? What are the major functions of the internet?
l. What are the internet services? Explain few of them.
m. What is a search engine, Give some examples of search engines.
n. What do you mean by web chat? Define the term newsgroup.
o. What is e-mail? Mention any four features of e-mail.
p. What are the differences between the terms “Uploading” and “Downloading”?
q. Define web browser with examples.
r. What is World Wide Web? Mention any two advantages.
s. Define the following terms:
Router, Optical fibre, Bandwidth, Repeaters, Gateway, Firewall
New Gateway to Computer Science Book -10 35
Lesson
2 Ethical and Social Issues in ICT
Learning Outcomes
At the end of this lesson, students will be able to:
tell about the ethical and social issues in ICT.
know about the ICT policy of Nepal.
tell about electronic transaction act.
tell about digital citizenship.
tell about digital footprint.
explain about the opportunities and threats in social media.
explain the different platforms of social media.
Ethical and social issues arising from the use of technology in all areas of our lives such
as business, health sector, education and so on. Because of the recent development in the
technology and their ability to transmit vast amounts of information in a short amount of
time, there is a great impact of ICT in the society. The implementations of technology in the
workplace create various social and ethical concerns so there should be further analysis of
technology in an organization. Information Communication Technology (ICT) has raised
new ethical concerns about the protection of personal privacy, protection of intellectual
property, user responsibility, acceptable access and use of information, software licenses
and piracy. A good ICT policy must be able to adequately consider these, and many other
associated issues.
ICT Policy – 2015
The first IT policy was introduced in 2057 B.S. which was related to the IT education
and some other activities. Ministry of Information and Communication, Government of
Nepal introduced second National Information and Communication Technology Policy In
2015AD. In this chapter we are going to discuss about it.
36 New Gateway to Computer Science Book -10
Background
Information and Communication Technologies are increasingly at the core of strategies
aimed at securing the goals of sustainable development and stimulating economic growth
in countries around the world. Among others, these technologies are shaping the way
social interaction takes place and public services are delivered in some fundamental ways.
It is precisely along these lines that the Government of Nepal has placed a great deal of
importance on transformative potential of ICTs and positioning these technologies within
the larger context of its far reaching developmental aspirations premised around poverty
reduction as an overarching goal.
ICTs assume particular significance in the light of fact that efficiency more than ever is
now an indicator of competitiveness. As such, nations, private sector entities and people
that find the means to become more efficient will advance and prosper.
Among others, ICTs hold the potential to help create conditions for better governance,
with more transparent and efficient bureaucracies. Similarly, ICTs can help address
structural problems in education systems enabling expanded access to education services
as well as help bridge quality gaps in education. ICTs can also significantly improve the
health sector by enabling expanded outreach to health care services and driving efficiency
through the system.
In addition to the roles these technologies play in development, the sector also offers
tremendous prospects for economic growth and employment creation through enablement
of IT-ITeS/BPO based business models.
It is within these contexts that the Government of Nepal has accorded high level of policy
emphasis for the development ICT sector. Nepal has the opportunity to make a difference
by adopting and using ICT as a tool available to reduce the development divide and
increase the chances of improving the quality of life of the citizens.
Apart from opportunities however, the ever evolving nature of ICTs also offers a host of
challenges from policy perspectives. For one, fast paced technological innovations in ICT
domain come attendant with far reaching policy implications which traditional policy
formulation approaches fail to address properly. As a result, existing policy provisions in
Nepal need to be revisited in the light of dynamism that characterizes the sector.
This policy is premised around the realization that there is an urgent need to formulate
strategic responses to account for technological trends shaping the ICT sector. Formulating
policy responses in alignment with the dynamism of the sector becomes all the more
important given the need to adequately factor in key strategic imperatives impinging
on faster uptake of ICTs in the country, namely issues surrounding cyber security,
data protection, privacy and respect for intellectual property rights. Equally important
New Gateway to Computer Science Book -10 37
is the need to address the challenges posed by technological convergence especially
from regulatory and governance perspectives. Given that telecom connectivity is fast
expanding across the country, inching closer to saturation point, the focus should now
should also shift on demand side fundamentals that need to be strengthened in order
to ensure strategic alignment of resourcefulness offered by ICTs with our growth and
development aspirations.
Key Issues and Challenges
The presence of disparate policy initiatives and institutional arrangements for the
development of ICT sector in Nepal however also points towards lack of coherent strategy
in line with the technological trends that have been shaping up the sector over the years.
Rapid take-up of Internet and mobile wireless communications has been some of the
key trends shaping the ICT landscape. These trends have come attendant with policy
implications of varied nature. For example, the Internet has truly become mainstream
with predominant use of social media, making it relevant for so many people in their
daily lives. Security concerns and concerns about privacy, personal saftey and intellectual
property rights have accompanied such technological changes. In addition, as indicated
earlier, the wider take-up and convergence of ICTs also raises new regulatory issues that
traditionally would be seen as separate from telecommunications policy and regulation.
In such a rapidly evolving field, it is necessary to ensure that policy and regulation adapt
to new developments.
The existence of a number of institutional arrangements with overlapping mandates and
spheres of influence surrounding the ICT sector in Nepal has resulted in project execution
difficulties and hampered smooth rollout of ICT projects.
Given the current state of telecommunications and information technology sector, Nepal
needs to enhance its overall readiness for effectively harnessing these technologies by
articulating its policy positions on new technologies like Voice over Internet Protocol
(VoIP), Internet Protocol Television (IPTV), new forms of social networking, etc.
This policy is formulated basically in response to the felt need for realigning the
underpinning substance of existing ICT related policy and regulatory regime with the
ramifications of ever-intensifying technological innovation. Among others, transformation
from circuit-based telecommunication networks to packet-based ones using the Internet
protocol (IP) has brought about digital convergence and offered a host of challenges and
opportunities from policy perspectives.
It has been observed that the lack of a coherent policy position befitting the technological
dynamism that has characterised the ICT landscape has offered many challenges for the
holistic development of the ICT sector. The current state of policy incongruence has
hindered, for example, the growth of IT and IT enabled services sector to the detriment
of economic growth prospects that this sector could open up. Similarly, government
38 New Gateway to Computer Science Book -10
transformation prospects anchored in potentialities offered by ICTs have not gained
traction on account of lack of a coherent policy framework grounded on latest development
in the sector.
It is precisely along those lines that this policy stresses the need for a well-defined
and consistent policy and regulatory framework for addressing converged regime of
telecommunications, broadcasting, and ICT.
Guiding principles of the proposed policy
The implementation of this Policy shall be guided, among other things by the right of access
to information as well as the need to promote transparency, fairness and accountability
in the delivery of government services and execution of roles and responsibilities of
government agencies. The following constitutes some of the guiding principles of the
policy:
This policy is intended to create foundational groundwork for an overarching vision
of “Digital Nepal”. As per this vision, Information and Communication Technology
will be a key driving force in transforming Nepali society into knowledge and
information based society and strengthening Nepal’s pursuit of equality and sustainable
growth by leveraging Information and communication technology.
This policy is primarily designed to guide and mainstream the use of ICTs in all sectors
of the Nepalese economy within the overall context of socio-economic development
and poverty reduction agenda pursued by the country.
In order for this policy to make meaningful impact on social and economic development
of the country.
The implementation of this policy shall take into account relevant regional and global
strategies and best practices in transforming the nation into a knowledge based society
by cultivating strong linkages with the UN Millennium Development Goals (MDGs),
WSIS beyond 2015, WTO, Broadband Commission, UN-ESCAP, post 2015
sustainable development agenda etc.
Nepal will continue to uphold the principle of freedom of expression on the Internet
and net neutrality
The policy intends to promote platform neutral services in e-governance
Goals of Information and Communication Technology policy
Nepal will strive towards enhancing overall national ICT readiness with the objective
of being at least in the top second quartile of the international ICT development index
and eGovernment rankings by 2020.
New Gateway to Computer Science Book -10 39
At least 75 present of the population will have digital literacy skills by the end of
2020.
A universal broadband access to all people on an equitable basis will be in place. By
2020, 90 present of the population will be able to access the broadband services.
The role and significance of ICT industries and services (including telecom services)
will increase in the Nepali economy with ICT value added (including digital content
and service industry) accounting for at least 7.5% present of GDP by 2020.
By 2020, entire population of Nepal would have access to internet
80% of all citizen facing government services would be offered on line by 2020
E-procurement will be promoted as means of driving transparency through government
procurement processes covering all public procurement of goods and services
irrespective of cost and volume of such procurements by 2018
G2G implementation would be promoted with a view to achieving complete automation
of the operations of land administration, revenue administration and management,
vital registration, passport and citizenship certificate services by 2020.
Broadband access will be expanded across the country with the goal of achieving a
broadband Internet user penetration rate of 30% at a minimum of 512kbps and making
available at least 10 Mbps download speed on demand in urban areas by 2018.
Special funding arrangements will be developed and implemented within 2018 to
support innovation and incubation of on-line businesses and start-ups
Policy
Human Resource
ICT in education, research & development
Promoting public access and content development
Developing the ICT Industry Sector
ICT for Government service innovation and good governance
ICT in SMEs & promotion of e-Commerce
Telecommunications Infrastructure
Convergence of Telecommunications, ICTs and broadcasting
ICT in agriculture
ICT in Health
40 New Gateway to Computer Science Book -10
ICT in tourism
Telecommunication and ICTs in mitigating the impact of Climate Change
ICT in Environment and natural resources
Telecommunications and ICTs for natural disaster preparedness, mitigation and relief
Human Exposure to Electromagnetic fields and safe disposal of electronic waste
Conformance, Interoperability and Standards in Telecommunications and ICTs
Cloud computing
Access to telecommunications and ICT services for rural and remote areas
Access to Telecommunications and ICT services for persons with disabilities and
specific needs
ICTs for Youth , women and Girls
Building confidence and security in the use of ICTs
Vision
To transform Nepal into an information and knowledge-based society and economy
Mission
To create conditions for the intensified development and growth of ICT sector as a key
driver for Nepal’s sustainable development and poverty reduction strategies.
Objectives of National Information and Communication Technology Policy
To empower and facilitate Nepal’s participation in the Global Knowledge Society.
To transform Government service delivery regime by promoting transparency,
efficiency, inclusiveness and participation through effective utilization of information
and communication technologies
To promote ICT to further productivity among the sectors that is key drivers of the
national economy.
To promote research and innovation on the role of ICT on the resilience of low-income
communities amid potential environmental, economic and social shocks
To create easily accessible, affordable and innovative public access points under a
comprehensive E-community / Village network initiative;
To increase the institutional capacity along infrastructure and human resource
dimensions in public and private educational institutions including schools, colleges/
universities that offer ICT courses and use ICTs for pedagogical purposes;
New Gateway to Computer Science Book -10 41
To create a conducive environment for increasing annual enrolment and output
of students in key professional skills areas such as telecommunications/electronics
engineering, computer science/IT, etc. and promote market driven skills development
initiatives in ICT
To deploy ICTs at all levels of Nepali educational system in order to improve
educational outcomes while expanding access to education and training facilities
To facilitate the participation of youths and women in ICTs particularly in media and
content development initiatives;
To address gender-based inequalities and promote gender-sensitive measures to
encourage the active participation of women in national and community-based ICT
initiatives
To promote the use of free and open source software as well as open standard in
software development for government agencies
To create an innovative, market responsive, highly competitive and well regulated
ICT industry
To help develop ICT business incubators and promote start-up projects in close
coordination with the private sector through the creation of a supportive eco-system
To promote a stable, fair and competitive investment climate to facilitate the
development of e-Trade and E-Commerce activities in the country;
To develop a highly competitive ICT industry capable of serving as the engine for
driving Nepal’s active participation in global trade;
To increase the competitiveness of farmers in production, processing and marketing of
agricultural products and services through the effective and outcome oriented
utilization of ICTs;
To improve communication systems across the country especially in areas of touristic
interest to support tourism development in the country
To use ICTs in the documentation, promotion and effective marketing of the full
potential of Nepal’s world class and niche tourist destinations to the local, regional
and international market;
To ensure that all ICT related activities have very minimal negative environmental
impact during construction, operation and disposal/de-commissioning;
To conserve natural resources and safeguard Nepal’s heritage using ICT tools.
To support formulation of development strategy for ICT converged services to support
and plan for mid-to-long term resolution for overcoming the digital divide
To ensure all installed ICT infrastructure and capacity is utilized effectively and
contributes to resilience and redundancy.
42 New Gateway to Computer Science Book -10
Strategies
Human Resource Development
ICT in education, research & development
Access, media and Content
ICT Industry
ICT for Government service innovation and good governance
SMEs and e-Commerce
Telecommunications infrastructure
Convergence of Telecommunication, ICTs and broadcasting
ICT in agriculture
ICT in Health
ICT in Tourism
Telecommunication/ICTs in mitigating the impact of climate change
ICT in environment and natural Resources
Telecommunication/ICTs for natural disaster preparedness, mitigation and relief
Human exposure to Electromagnetic fields and safe disposal of electronic waste
Conformance, Interoperability and Standards in telecommunications/ICT
Cloud Computing
Access to telecommunications/ICTs in rural and remote areas
Access to Telecommunications/ICT services for persons with disabilities and specific
needs
ICTs for Youth, women and girls
Building confidence and Security in the use of ICTs
Institutional arrangement
Implementation of policy and strategy framework
A National Information and Communication Technology Policy Implementation Steering
Committee will be formed at the Ministry of Information Technology and Communication
with the following structure.
New Gateway to Computer Science Book -10 43
Hon. Minister, Ministry of Information and Communication Technology Chairperson
Member, National Planning Commission Member
Secretary, Ministry of Education Member
Secretary, Ministry of Health Member
Secretary, Ministry of Agriculture Member
Secretary, Ministry of Finance Member
Secretary, Ministry of Local Development Member
Secretary, Ministry of Information and Communication Member
Chairman, Nepal Telecommunications Authority Member
Representative Private Sector / Domain Expert 2 Members
Joint-Secretary (Policy and Programme),
Ministry of Information and Communication Member-Secretary
The primary role of Information and Communication Technology Policy Implementation
Steering Committee is to provide overall coordination support for the effective
implementation of policy provisions along with monitoring and evaluation of policy
interventions.
The Steering Committee will form an ICT Policy Implementation Sub-Committee
comprising of representation from the stakeholder community and domain experts,
including the private sector, to provide it with domain specific expert advice and
recommendations in relation to the execution of policy provisions.
Formulation of National ICT Master Plan/National E-strategies
The policy and strategy framework will be implemented through National ICT Master
plan/National e-Strategies to be developed and endorsed by the Government of Nepal.
Resource Mobilization
The overall goals of Information and Communication Technology Policy will be achieved
through the mobilization of both public and private sector resources. The proposed
policy framework is expected to create conditions for private sector investment in the
sector complemented by public sector resource mobilization based, among others, upon
universal service obligation commitments through the use of RTDF. The possible grants
and technical assistance from bilateral, multilateral and other international agencies could
also be used.
44 New Gateway to Computer Science Book -10
Legal and regulatory arrangements
Appropriate Legal and regulatory arrangements will be made for the implementation of
this policy and provisions therein if deemed necessary.
Monitoring and evaluation
A framework will be developed within the fiscal year 2072/73 (2015/16) to serve as a
basis for carrying out periodic monitoring and evaluation of the execution of Information
and Communication Technology Policy and ICT master plan. It will be the primary
responsibility of Implementation Steering Committee to carry out monitoring and
evaluation of programs and policy provisions relating to ICT services and infrastructure
build-out.
Assumptions and Risks
The following constitutes key assumptions and risk perceptions in relation to the proposed
Information and Communication Technology Policy.
Assumptions:
ICT as one of the core elements of development agenda will enjoy high level of
political commitment in the days ahead resulting in significant resource commitments on
harnessing ICTs to achieve policy outcomes across sectors
There will be intensified demand for ICT services driven by increased public sector
deployment of ICT application and services, thereby creating conditions for more
private sector investment in the sector
Necessary legal and regulatory reforms in the area of licensing and spectrum
governance will be taken in an urgent basis to promote investment in the sector
Risks:
Overall investment climate might be compromised on account of delays in much
needed legal, regulatory and institutional reforms
The continuing challenges associated with chronic power shortages could dampen the
overall demand for ICT services and create disincentive for investment
Lack of oversight giving rise to skewed, purely market driven expansion of ICT
services resulting in exclusion of the communities outside urban areas resulting in
widening digital divide
New Gateway to Computer Science Book -10 45
Let’s Review
Ethical and social issues arising from the use of technology in all areas of our lives,
business, health sector, education sector and so on.
Nepal will continue to uphold the principle of freedom of expression on the
Internet and net neutrality is the guiding priciple of the ICT policy.
At least 75 present of the population will have digital literacy skills by the end of
2020 is the goal of ICT policy.
Telecommunication and ICTs in mitigating the impact of Climate Change is the
policy of ICT policy.
The vision of ICT policy is to transform Nepal into an information and knowledge-
based society and economy.
The mission of ICT policy is to create conditions for the intensified development
and growth of ICT sector as a key driver for Nepal’s sustainable development and
poverty reduction strategies.
One of the objective of ICT policy is to empower and facilitate Nepal’s participation
in the Global Knowledge Society.
The overall goals of Information and Communication Technology Policy will be
achieved through the mobilization of both public and private sector resources.
Electronic Transaction Act
Electronic Transaction Act deals with the issues that are related to cybercrime. This act
also helps to make and implement the laws. In Nepal, the House of Representatives
approved this act on December 4, 2063. At that time, ministry of environment, science
and technology formulated the Regulations. The new legislation has not only legalised all
forms of electronic transactions and digital signatures but has also clearly suggested out
the ways to regulate various computer-based activities and punish cybercrimes.
The electronic transaction and digital signature is valid not only for the private sector
but also for the government agencies. It allows the government offices to use electronic
medium for tender notice, vacancy announcement and others. It also validates public
procurement and acceptance of electronic applications.
The computer and cybercrimes such as hacking, piracy, copyright violation, fraudulent
and all other deceitful activities have been clearly defined and punishments are set
accordingly. The action against such crimes and punishment will be in the range of a
minimum Rs. 50,000 to a maximum Rs 3,00,000 in cash and six months to three years
custody.
46 New Gateway to Computer Science Book -10
Digital Citizenship
Digital citizenship refers to the responsible use
of technology by anyone who uses computers,
the internet, and digital devices to engage with
society on any level. As the rate of technological
advancement continues to increase, the world as a
whole is becoming more dependent on the Internet
for day-to-day activities like checking a bank
account, purchasing a product, or simply keeping
in touch with a friend. A good digital citizenship
engages students and shows them how to connect
with one another, empathize with each other, and
create relationships through digital tools. Bad digital
citizenship, involves cyber bullying, irresponsible
social media usage, and a general lack of knowledge about how to safely use the Internet.
The examples of digital citizenship are: communicating with respect, respecting other’s
privacy, seeing things from another perspective, adding helpful information, supporting
others by offering useful feedback, encouraging them, or sharing work they’re proud of,
etc.
Digital Footprint
A digital footprint is a track of data that you create while using the internet. It includes the
websites that you visit, email that you send, uploading videos or digital images and any
other form of transmission of information. Publishing a blog and posting social media
updates are another popular ways to expand your digital footprint. The status that you
have update and publish on Facebook or twitter contributes to your digital footprint. The
more you spend time on social networking websites, the larger your digital footprint will
be. Even “liking” a page or a Facebook post adds to your digital footprint, since the data
is saved on Facebook’s servers.
There are two types of digital footprint they are active and passive footprints which
depends on how your information is acquired. Posting on Facebook, Instagram, Twitter,
and other social media platforms, filling online forms, agreeing to install cookies on your
devices are the examples of active footprint.
In the same way, websites that install cookies in your device without disclosing it to you,
social media news channels and advertisers that use your likes, shares, and comments are
the examples of passive footprint.
New Gateway to Computer Science Book -10 47
Opportunities and Threats in Social Media
The use of social media is increasing
rapidly these days in our country.
Most of the people are using social
media mainly for communication
and to exchanging the information
with each other. It is very easy to
collect the information from the
one corner of the world to another
corner. Human life is being easier
due to the use of social media. In
general, social media refers to the websites and applications that are designed to allow
people to share content quickly, efficiently, and in real-time. All of the social media has
the ability to share photos, opinions, events, etc. in real-time has transformed the way
we live and, also, the way we do business. These days’ social media are the integral
part of the marketing strategy of many business organizations. If we do not use social
media in proper way, it may create lots of threats and social problems. Social media has
grown tremendously in the last few years. From 2006 AD onwards the growth rate is
unexpectedly very high. Especially Facebook and Twitter have grown much faster and
captured millions of users in just a few years. Social media has some opportunities and
threats which are listed below.
Opportunities of Using Social Media
People from anywhere can connect with anyone. Regardless of the location and
religion.
Millions of people are using social media platforms so it has a great opportunity to
promote business.
Social media allows you to connect directly with your audience.
It helps to create a brand of your company, product or a service.
It is very fast way of exchanging the information.
Communication mechanism is very simple and easy.
You can share your ideas and views in a particular area of interest.
Sharing and posting of pictures, videos and audio is very easy.
It has a lot of benefits for the students and teachers.
Social media also create awareness and innovate the way people live.
48 New Gateway to Computer Science Book -10
Threats of Using Social Media
Personal data and privacy can easily be hacked and shared on the Internet.
More chances of creating fake account.
It can easily collapse someone’s reputation just by creating a false story and spreading
across the social media.
Decrease the working efficiency of people.
It may create health problems.
More changes of spreading unnecessary rumour soon.
Different Platforms of Social Media
Facebook: Facebook is a one of the world’s largest social network platform. It is a free
social networking website which allows the user to register and create profiles, upload
photos, video, send messages and keep in touch with friends, family and colleagues.
Twitter: Twitter is a free micro-blogging service that allows registered members to
broadcast short posts called tweets. Twitter members can broadcast tweets and follow
other users’ tweets by using multiple platforms and device.
Google+: It is read as Google plus. It is a Google’s social networking project, designed
to replicate the way people interact offline more closely than is the case in other social
networking services.
Instagram: It is a free photo and video sharing apps that allows the users to apply digital
filters, frames and special effects to their photos and then share them on a variety of social
networking sites.
Wikipedia: Wikipedia was founded in 2001 January. It is a free, open content online
encyclopaedia created through the collaborative effort of a community of users known as
Wikipedians. Anyone registered on the site can create an article for publication; however,
registration is not required to edit articles.
Blogs: Blog is a platform for casual dialogue and discussions on a specific topic or opinion.
Flickr: It is an image and video hosting website and online community. Photos can be
shared on Facebook, Twitter and other social networking sites.
LinkedIn Groups: It is a place where groups of professionals with similar areas of
interest can share information and participate in the conversations.
New Gateway to Computer Science Book -10 49
Let’s Review
Electronic Transaction Act deals with the issues that are related to cybercrime.
The electronic transaction and digital signature is valid not only for the private
sector but also for the government agencies.
Digital citizenship refers to the responsible use of technology by anyone who uses
computers, the internet, and digital devices to engage with society on any level.
A digital footprint is a track of data that you create while using the internet.
Human life is being easier due to the use of social media.
Social media are the integral part of the marketing strategy of many business
organizations.
Facebook is a one of the world’s largest social network platform.
Wikipedia was founded in 2001 January.
Innovative Task
Ask with any 20 people in locality and prepare a report about what types of social
media that they are using? How long time they use it in a day? And what type of
information and content they like to read?
Assignment
1. Select the best answer from the given options.
a. The first IT policy was introduced in Nepal in:
i. 2057 BS ii. 2061 BS iii. 2052 BS iv. 2072 BS
b. Which of the following is social media?
i. Photoshop ii. Facebook iii. Graphics iv. Television
c. When Electronic Transaction Act was approved in Nepal?
i. 2054 BS ii. 2063 BS iii. 2073 BS iv. 2050 BS
d. Which of the following is related to digital citizenship?
i. Communicating with respect ii. Harming to others with technology
iii. Junk Mails iv. Doing piracy
e. Which of the following is active digital footprint?
i. Posting on facebook ii. Filling online forms
iii. Chatting with others iv. Both i and ii
50 New Gateway to Computer Science Book -10