Professional Documents
Culture Documents
FLUENCY
For First Semester
And
COLLEGEG1.
2021-22
DIGITAL FLUENCY NOTES
DIGITAL FLUENCY
Compulsory for All UG Courses (BA/B.Com/B.Sc/BBA/BSW etc.,)
Module III : Building Essential Skills Beyond Technology : Importance of the following :
i. Effective Communication Skills.
ii. Creative Problem Solving & Critical Thinking
iii. Collaboration and Teamwork Skills
iv. Innovation & Design Thinking
v. Use of tools in enhancing skills.
References :
1. Digital Fluency : S.P.Sajjan & S.B Ramoshi : Ekalavya E-educate : 2021
2. Digital Fluency : Suresh Palarimath : Siddalingeshwara Book Publications, Gulbarga
3. https://futureskillsprime.in
2 NEP - 2020
DIGITAL FLUENCY NOTES
In this way, a chatbot that is fed examples of text chats can learn to produce lifelike
exchanges with people, or an image recognition tool can learn to identify and describe objects
in images by reviewing millions of examples.
1. Learning Process
2. Reasoning Process
3. Self-correction Process
3 NEP - 2020
DIGITAL FLUENCY NOTES
1. Learning Process:
This aspect of AI programming focuses on acquiring data and creating rules for how to
turn the data into actionable information. The rules, which are called algorithms,
provide computing devices with step-by-step instructions for how to complete a
specific task.
2. Reasoning Process:
This aspect of AI programming focuses on choosing the right algorithm to reach a
desired outcome.
3. Self-correction Process:
This aspect of AI programming is designed to continually finetune algorithms and
ensure they provide the most accurate results possible.
History of Artificial Intelligence
Important research that laid the ground work for AI:
▪ In 1931, Goedellayed the foundation of Theoretical Computer Science 1920-30: He
published the first universal formal language and showed that math itself is either
flawed or allows for unprovable but true statements.
▪ In 1936, Turing reformulated Goedel’s result and Church’s extension thereof.
▪ In 1956, John McCarthy coined the term “Artificial Intelligence” as the topic of the
Dartmouth Conference.
▪ In 1957, The General Problem Solver (GPS) demonstrated by Newell, Shaw & Simon.
▪ In 1958, John McCarthy (MIT) invented the LISP language.
▪ In 1959, Arthur Samuel (IBM) writes the first game-playing program, for checkers to
achieve sufficient skill to challenge a world champion.
▪ In 1963, Ivan Sutherland’s MIT dissertation on Sketchpad introduced the ideas of
interactive graphics into computing.
▪ In 1966, Ross Quillian (PhD dissertation, Carnegic Inst. Of Technology; now CMU)
demonstrated semantic nets.
▪ In 1967, Doug Engelbart invernted the mouse at SRI.
▪ In 1968, Marvin Ministry & Seymour paper publish Perceptron’s demonstrating limits
of simple neural nets.
▪ In 1972, Prolog developed by Alain Colmerauer.
4 NEP - 2020
DIGITAL FLUENCY NOTES
▪ In mid 80’s, Neural Networks become widely used with the Backpropagation
algorithm.
▪ In 1990, Major advances in all areas of AI, with significant demonstrations in machine
learning, intelligent tutoring, case-based reasoning, multi-agent planning, scheduling,
uncertain reasoning, data mining, natural language understanding and translation,
vision, virtual reality, games etc.,
▪ In 1997, Deep Blue beats the World Chess Champion Kasparov.
▪ In 2002, iRobot, founded by researchers at the MIT Artificial Intelligence Lab,
introduced Roomba, a vacuum cleaning robot.
AI Technology Landscape:
1. Autonomous Systems:
Autonomous systems are defined as systems that are able to accomplish a task, achieve
a goal, or interact with its surroundings with minimal to no human involvement. It is
also essential that these systems be able to predict, plan, and be aware of the world
around them. For example, Autonomous Robots, Self-driving vehicles, Drones etc.,
5 NEP - 2020
DIGITAL FLUENCY NOTES
2. Machine Learning:
Algorithms that can learn from and make predictions on data. There are three types of
Machine Learning. Those are
1. Supervised Learning
2. Unsupervised Learning
3. Reinforcement Learning
3. Deep Learning:
A high-powered type of machine learning algorithms that uses a cascade of many
computing layers. Each layer uses the input from the previous later as input.
4. Pattern Recognition:
A branch of machine learning and deep learning which focusses on recognition of
patterns in data.
5. Natural Language Processing:
Technologies that enable computer systems to interact seamlessly with human
languages.
6. Chat Bots:
A software robot that interacts with humans online, receiving and sending
conversational text with the aim of emulating the way a human communicates.
7. Real Time Emotion Analytics:
The application of AI to analyze brain signals, voice and facial expression to detect
human emotions.
8. Virtual Companion:
Cloud connected, virtual reality-based avatars powered by AI engines that can behave
and interact just as a human would.
9. Real Time Universal Translation:
The application of natural language processing to enable two humans (with no common
language) to understand each other in real-time.
10. Though Controlled Gaming:
The application of AI, wearable technology, and brain computing interface technology
to enable seamless interaction with social gaming environments in real-time, through
avatars without the need for joystick type devices.
6 NEP - 2020
DIGITAL FLUENCY NOTES
AI Trends in Healthcare:
1. AI and Machine Learning Offer Better way to Spot Diseases:
AI and ML are also growing to offer new and innovative ways to identify disease,
diagnose conditions, crowdsource and develop treatment plans, monitor health
epidemics, create efficiencies in medical research and clinical trials, and make
operations more efficient to handle increasing demand.
2. Robots in Healthcare can Conduct More Varied Tasks:
Robots will be able to help doctors examine and treat patients in rural areas through
telepresence, transporting medical supplies, disinfecting hospital rooms, helping
patients with rehabilitation or with prosthetics, and automating labs and packaging
medical devices.
3. Computer and Machine Vision Can Help Give Appropriate Care:
There are various ways computers and machine vision are being used in medicine for
diagnostics, viewing scans and medical images, surgery, and more.
It is helping doctors to know exactly how much blood a woman loses while delivering
in order to provide immediate care to reduce the mortality of mothers from post-partum
hemorrhaging.
7 NEP - 2020
DIGITAL FLUENCY NOTES
8 NEP - 2020
DIGITAL FLUENCY NOTES
AI in Business
▪ Virtual Agent:
Facial recognition software, machine learning, and natural language enable virtual
agents to greet you personally, anticipate orders and provide directions.
▪ Shopper’s Profile:
Machine learning personalizes promotions to match shoppers profile. In store beacons
send offers to their smart phones as they browse through the store.
▪ Identifies Articles:
Computer vision with deep learning identifies articles bagged by shoppers; adding data
from sensors. AI allows non-stop checkout and automatic payment.
▪ Last-mile Delivery:
Autonomous drones using deep learning technology complete last-mile delivery, and
are able to handle obstacles or absent recipient.
▪ Complementary Product:
Interactive screens and tabletops enabled with computer vision and deep learning can
identify articles and recommend complementary products and uses that fit shopper’s
lifestyle profile.
▪ Home Delivery:
An autonomous shopping cart follows you in the store, and can find its way to your
vehicle or to a robot or drone for home delivery.
▪ Optimizes prices in Real Time:
Store updates and optimize prices in real time, with machine learning leveraging data
on competitor’s prices, weather, and inventory levels to maximize revenues.
▪ Track Inventory:
AI enhanced robots continuously track inventory, recognize empty shelves, and
replenish them; other robots fill the bags in the warehouse.
AI Prediction for Future:
1. AI increasingly becomes a matter of International Politics:
In the face of tariffs and export restrictions on goods and services used to create AI
imposed by the US Government, China has stepped up its efforts to become self-reliant
when it comes to research and development.
9 NEP - 2020
DIGITAL FLUENCY NOTES
MACHINE LEARNING
What is Machine Learning?
• Machine learning is a specific subset of AI that trains a machine how to learn.
• Machine learning is a method of data analysis that automates analytical model building.
• It is a branch of artificial intelligence based on the idea that systems can learn from
data, identify patterns and make decisions with minimal human intervention.
Methods of Machine Learning:
• Supervised Machine Learning
• Unsupervised Machine Learning
• Semi-supervised Machine Learning
• Reinforcement Machine Learning
10 NEP - 2020
DIGITAL FLUENCY NOTES
11 NEP - 2020
DIGITAL FLUENCY NOTES
DEEP LEARNING
What is Deep Learning?
• Deep learning is a machine learning method that takes in an input X, and uses it to
predict an output of Y.
• As an example, given the stock prices of the past week as input, my deep learning
algorithm will try to predict the stock price of the next day.
• Given a large dataset of input and output pairs, a deep learning algorithm will try to
minimize the difference between its prediction and expected output.
• By doing this, it tries to learn the association/pattern between given inputs and outputs
12 NEP - 2020
DIGITAL FLUENCY NOTES
Neural Network:
• Let’s look inside the brain of our AI.
• Like animals, our estimator AI’s brain has neurons. They are represented by circles.
These neurons are inter-connected.
• The neurons are grouped into three different types of layers:
o Input Layer
o Hidden Layer(s)
o Output Layer
• The input layer receives input data. In our case, we have four neurons in the input layer:
Origin Airport, Destination Airport, Departure Date, and Airline. The input layer passes
the inputs to the first hidden layer.
• The hidden layers perform mathematical computations on our inputs. One of the
challenges in creating neural networks is deciding the number of hidden layers, as well
as the number of neurons for each layer.
• The “Deep” in Deep Learning refers to having more than one hidden layer.
• The output layer returns the output data. In our case, it gives us the price prediction.
13 NEP - 2020
DIGITAL FLUENCY NOTES
14 NEP - 2020
DIGITAL FLUENCY NOTES
• Big Data can be used in many applications like banking, communication, healthcare,
media, advertisement, manufacturing, transportation, retail and business.
Classification of Big Data:
1. Structured Data
2. Unstructured Data
3. Semi-structured Data
Structured Data:
• Structured Data is used to refer to the data which is already stored in databases, in an
ordered manner.
• It accounts for about 20% of the total existing data and used the most in programming
and computer related activities.
• There two sources of structured data – machines and humans
Unstructured Data:
• Unstructured data is the opposite to structured data.
• They have no clear format in storage.
• The rest of data created, about 80% of the total account for unstructured big data.
• Unstructured data is also classified based on its source, machine-generated and human
generated.
Machine & Human generated Unstructured Data:
• Machine generated data accounts for all the satellite images, the scientific data from
various experiments and radar data captured by various facets of technology.
• Human generated unstructured data is found in abundance across the internet since it
includes social media data, mobile data, and website content
Semi-structured Data:
• The line between unstructured data and semi-structured data has always been unclear
since most of the semi-structured data appear to be unstructured data at a glance.
• Information that is not in the traditional database format as structured data, but contains
some organizational properties which make it easier to process, are included in semi-
structured data.
15 NEP - 2020
DIGITAL FLUENCY NOTES
Types of Databases:
▪ Hierarchical Database
▪ Network Database
▪ Relational Database
▪ Object-oriented Database
▪ Distributed Database
What is DBMS?
▪ Database Management Systems (DBMS) refer to the technology solution used to
optimize and manage the storage and retrieval of data from databases.
▪ DBMS offers a systematic approach to manage databases via an interface for users as
well as workloads accessing the databases via apps
Components of DBMS:
▪ Software: DBMS is primarily a software system that can be considered as a
management console or an interface to interact with and manage databases.
▪ Data: DBMS contains operational data, access to database records and metadata as a
resource to perform the necessary functionality.
▪ Procedures: While not a part of the DBMS software, procedures can be considered as
instructions on using DBMS.
▪ Database languages: These are components of the DBMS used to access, modify,
store, and retrieve data items from databases. Types of DBMS languages include Data
Definition Language (DDL), Data Manipulation Language (DML), Database Access
Language (DAL) and Data Control Language (DCL).
16 NEP - 2020
DIGITAL FLUENCY NOTES
▪ Query processor: As a fundamental component of the DBMS, the query processor acts
as an intermediary between users and the DBMS data engine in order to communicate
query requests.
▪ Database Manager: Database manager allows a set of commands to perform different
DBMS operations that include creating, deleting, backup, restoring, cloning, and other
database maintenance tasks.
▪ Database Engine: This is the core software component within the DBMS solution that
performs the core functions associated with data storage and retrieval via applications.
▪ Reporting: The report generator extracts useful information from DBMS files and
displays it in structured format based on defined specifications
Benefits of DBMS:
▪ Data Security: DBMS allows organizations to enforce policies that enable compliance
and security. The databases are available for appropriate users according to
organizational policies.
▪ Data Sharing: Fast and efficient collaboration between users.
▪ Data Access and Auditing: Controlled access to databases. Logging associated access
activities allows organizations to audit for security and compliance.
▪ Data Integration: Instead of operating island of database resources, a single interface
is used to manage databases with logical and physical relationships.
▪ Abstraction and Independence: Organizations can change the physical schema of
database systems without necessitating changes to the logical schema that govern
database relationships.
What is MySQL?
▪ A Swedish company called MySQL AB originally developed MySQL in 1994.
▪ The US tech company Sun Microsystems then took full ownership when they bought
MySQL AB in 2008.
▪ US tech giant Oracle in 2010 acquired Sun Microsystems itself, and MySQL has been
practically owned by Oracle since.
▪ MySQL is an open-source relational database management system (RDBMS) with a
client-server model.
▪ RDBMS is a software or service used to create and manage databases based on a
relational model
17 NEP - 2020
DIGITAL FLUENCY NOTES
What is MongoDB?
▪ MongoDB is an open-source document-based database management tool that stores
data in JSON-like formats.
▪ It is a highly scalable, flexible, and distributed NoSQL database.
▪ MongoDB Atlas is a cloud database solution for contemporary applications that is
available globally.
▪ MongoDB Cloud is a unified data platform that includes a global cloud database,
search, data lake, mobile, and application services
INTERNET OF THINGS
▪ IoT is an evolution of mobile, home and embedded applications interconnected to each
other.
▪ Using the internet and data analytics, billions of devices connected to each other create
an intelligent system of systems.
▪ When these connected devices use cloud computing, analyze huge amounts of data and
provide services.
▪ The Internet of Things (IoT) describes physical objects, that are embedded with sensors,
processing ability, software, and other technologies using Internet.
Google Nest – An example of IoT
▪ Google Nest is a home automation product includes:
▪ Thermostat that use motion-detecting sensors to detect when the owners are
about
▪ A camera-equipped doorbell
▪ Also gather data from other products – including cars, ovens, fitness trackers
and evens sensor-equipped beds – to help “save energy and stay safe”
18 NEP - 2020
DIGITAL FLUENCY NOTES
▪ Many banks now provide applications for popular wearables like Apple Watch and
FitPay, which is already working with the Bank of America.
▪ Some banks have even launched their own devices, with Barclays unveiling bPay
wearable contactless payment solutions and other wearable bands.
Connected Cars:
▪ Connected cars not only have the potential to improve customer relationships, but also
boost revenues.
▪ But smarter vehicles represent an opportunity for banks, too: for example, Idea Bank
runs a fleet of cars, each customized with an integrated security deposit box and an
ATM, which can visit the customer, rather than vice versa.
▪ The bank’s data suggests that the average deposit at one of its mobile, car-based ATMs
is three times higher than at the branch.
Banking at Home:
▪ With IoT, it is now possible to pay their bills through Amazon’s Alexa, Google Home,
integrating its API with the smart speaker to enable users to carry out balance queries
and payments through voice commands.
IoT Architecture:
▪ The four stages of IoT Architecture are –
1. Sensors and Actuators – Sensing layer for Data Gathering
2. Internet gateways and Data Acquisition Systems – Network layer for Data
Transmission
3. Edge IT - Data Analytics, Pre-processing
4. Data Center and Cloud – Apps & services
19 NEP - 2020
DIGITAL FLUENCY NOTES
IoT Security:
▪ IoT Security is key for the secure development and secure operation of scalable IoT
applications and services that connect the real and virtual worlds between objects,
systems and people.
▪ IoT Security happens on four different levels
o Delivery Security
o Communication Security
o Cloud Security
o Lifecycle Management Security
Future of IoT:
▪ Smart Home: Within next 2 years, smart devices will be filling our homes.
▪ Smart Cities: IoT helps to determine the roads, rails and bridges that need to undergo
reconstruction, heavy traffics and locating empty parking spots, monitoring pollution
levels, health monitoring of buildings etc.,
▪ Driverless Cars: By 2020 75% of all the cars around the world will be connected to the
internet along with driverless cars.
▪ Smart Offices: more efficient office operations, energy saving, comfortable work
environment and increased employee productivity. Smart thermostat to determine the
most effective workplace temperature, access control system instead of keys and locks,
advanced digital assistance, smart lighting control.
▪ Industrial Internet of Things (IIoT), is a vital element of Industry 4.0. IIoT harnesses
the power of smart machines and real-time analysis to make better use of the data.
1. Smart machines capture and analyze data in real-time, which humans cannot.
2. Smart machines communicate their findings in a manner that is simple and fast,
enabling faster and more accurate business decisions.
20 NEP - 2020
DIGITAL FLUENCY NOTES
Examples of IIoT:
▪ As simple as a connected rat trap which relays information about catching a rat to a
mobile phone.
▪ Slightly complex like a soil sensor which relays data about humidity and nutrient
content to a system
▪ Complex system like smart parking and traffic management.
▪ A very complex set-up like a fully automated automobile assembly line relaying data
in real-time to human supervisors.
Comparison between IoT and IIoT:
21 NEP - 2020
DIGITAL FLUENCY NOTES
Benefits of IIoT:
▪ Improvement of Operational Performance: through increased productivity,
improved plant efficiency, asset uptime and quality, reduced operational risks,
overhead costs and changeover times.
▪ Ensuring Safety and Compliance: through creating a naturally safer environment and
abiding by health, safety and environment laws; complying with regulatory frameworks
like energy, food and drug laws, labour laws etc.
▪ Increasing Flexibility and Agility: through updating and easy reprogramming of
machines and robots to adhere to shifting and increasingly customized customer
requirements.
CLOUD COMPUTING
What is Cloud Computing?
▪ The term cloud refers to a network or the internet.
▪ It is a technology that uses remote servers on the internet to store, manage, and access
data online rather than local drives.
▪ The data can be anything such as files, images, documents, audio, video, and more.
Operations of Cloud Computing:
▪ Developing new applications and services
▪ Storage, back up, and recovery of data
▪ Hosting blogs and websites
▪ Delivery of software on demand
▪ Analysis of data
▪ Streaming videos and audios
Why Cloud Computing?
▪ IT companies, follow the traditional methods to provide the IT infrastructure.
▪ That means for any IT company, we need a Server Room with basic needs like a
database server, mail server, networking, firewalls, routers, modem, switches, QPS,
configurable system, high net speed, and the maintenance engineers.
▪ To establish such IT infrastructure, we need to spend lots of money. To overcome all
these problems, Cloud Computing comes into existence.
22 NEP - 2020
DIGITAL FLUENCY NOTES
23 NEP - 2020
DIGITAL FLUENCY NOTES
24 NEP - 2020
DIGITAL FLUENCY NOTES
3. Hybrid Cloud:
▪ Hybrid Cloud is a combination of the public cloud and the private cloud.
▪ Hybrid cloud is partially secure because the services which are running on the
public cloud can be accessed by anyone, while the services which are running on a
private cloud can be accessed only by the organization's users.
▪ Example: Google Application Suite (Gmail, Google Apps, and Google Drive),
Office 365 (MS Office on the Web and One Drive), Amazon Web Services.
4. Community Cloud:
▪ Community cloud allows systems and services to be accessible by a group of several
organizations to share the information between the organization and a specific
community.
▪ It is owned, managed, and operated by one or more organizations in the community,
a third party, or a combination of them.
▪ Example: Health Care community cloud.
25 NEP - 2020
DIGITAL FLUENCY NOTES
2. Application Security:
▪ Application security uses software and hardware methods to tackle external threats
that can arise in the development stage of an application.
▪ Applications are much more accessible over networks, causing the adoption of
security measures during the development phase to be an imperative phase of the
project.
▪ Types of application security:
o Antivirus programs
o Firewalls
o Encryption programs
3. Network Security:
▪ As cyber security is concerned with outside threats, network security guards against
unauthorized intrusion of your internal networks due to malicious intent.
▪ Common examples of network security implementation:
o Extra logins
o New passwords
o Application security
✓ Antivirus programs
✓ Antispyware software
✓ Encryption
✓ Firewalls
✓ Monitored internet access
4. Cloud Security:
▪ Improved cyber security is one of the main reasons why the cloud is taking over.
▪ Cloud security is a software-based security tool that protects and monitors the data
in your cloud resources. Cloud providers are constantly creating and implementing
new security tools to help enterprise users better secure their data.
▪ Cloud computing security is similar to traditional on-premise data centres, only
without the time and costs of maintaining huge data facilities, and the risk of
security breaches is minimal.
26 NEP - 2020
DIGITAL FLUENCY NOTES
27 NEP - 2020
DIGITAL FLUENCY NOTES
28 NEP - 2020
DIGITAL FLUENCY NOTES
6. Zero-day Exploit:
A Zero-day Exploit refers to exploiting a network vulnerability when it is new and
recently announced before a patch is released and/or implemented. Zero-day attackers
jump at the disclosed vulnerability in the small window of time where no
solution/preventative measures exist.
7. Password Attack:
Passwords are the most widespread method of authenticating access to a secure
information system, making them an attractive target for cyber attackers. By accessing
a person’s password, an attacker can gain entry to confidential or critical data and
systems, including the ability to manipulate and control said data/systems.
***
29 NEP - 2020
DIGITAL FLUENCY NOTES
30 NEP - 2020
DIGITAL FLUENCY NOTES
1. Healthcare:
Big data analytics have improved healthcare by providing personalized medicine and
prescriptive analytics. Researchers are mining the data to see what treatments are more
effective for particular conditions, identify patterns related to drug side effects, and gains
other important information that can help patients and reduce costs. It’s possible to predict
disease that will escalate in specific areas. Based on predictions, it’s easier to strategize
diagnostics and plan for stocking serums and vaccines.
2. Media & Entertainment:
Various companies in the media and entertainment industry are facing new business
models, for the way they – create, market and distribute their content.
31 NEP - 2020
DIGITAL FLUENCY NOTES
32 NEP - 2020
DIGITAL FLUENCY NOTES
33 NEP - 2020
DIGITAL FLUENCY NOTES
34 NEP - 2020
DIGITAL FLUENCY NOTES
35 NEP - 2020
DIGITAL FLUENCY NOTES
***
36 NEP - 2020
DIGITAL FLUENCY NOTES
37 NEP - 2020
DIGITAL FLUENCY NOTES
6. Respect:
Respecting what others have to say and acknowledging them is an important aspect of
communication. Being respectful can be as simple as paying attention to what they have to
say, using the person’s name, and not being distracted. By respecting others, the other
person will feel appreciated, which will lead to a more honest and productive conversation.
7. Using the correct medium:
There are several different forms of communication to use – it is important to choose the
right one. For example, communicating in person about serious matters (layoffs, salary
changes, etc.) is more appropriate than sending an email regarding the matter.
Good Communication Skills for a Great Career
Succeeding in your career requires good communication skills. You need to know what you
want and how you are going to attain it. Being an excellent communicator can help propel your
career.
Good communication skills can aid in helping you land an interview and pass the selection
process. Being able to articulate well provides a significant advantage! To do your job
effectively, you have to discuss problems, request information, interact with others, and have
good human relations skills – these are all part of having good communication skills. They help
in being understood well and in helping understand the needs of those around you.
Bad Communication in the Workplace
Communication drives workplace success. Although the detriments of poorly communicating
with others may not be apparent in the short term, it has a crippling effect on the workplace in
the long-term. Here are some signs of bad communication:
▪ Lack of specific communication
▪ Using the incorrect mediums to convey important messages
▪ Passive-aggressive communication
▪ Lack of follow-through and consideration
▪ Blaming and intimidating others
▪ Failing to listen
38 NEP - 2020
DIGITAL FLUENCY NOTES
39 NEP - 2020
DIGITAL FLUENCY NOTES
40 NEP - 2020
DIGITAL FLUENCY NOTES
What is teamwork?
Teamwork is the qualities, abilities and processes of working well with one or more people to
accomplish a common goal. Teamwork in the workplace is a group's ability to work together
effectively, communicate well, define roles and leadership, share resources and actively listen
to each other. Teamwork is a set of learned skills that can boost morale in the workplace, build
rapport, increase the quality and quantity of output and improve retention rates.
41 NEP - 2020
DIGITAL FLUENCY NOTES
42 NEP - 2020
DIGITAL FLUENCY NOTES
Design or making is the process of turning ideas into things. In this design process there is a
vision or an idea, it can be figured out by some drawings work with fabrications of crafts and
if everything worked out right then it be materialized. So, there is a direct correspondence
between ideas, drawings, and finished products.
Design thinking is a methodology that designers use to brainstorm and solve complex problems
related to Designing. It is a human- centered approach to innovation that draws from the
designer’s toolkit to integrate the needs of people, the possibilities of technology, and the
requirements for business success. Design thinking is a blend of logic, powerful imagination,
systematic reasoning and intuition to bring to generate the ideas that consist to solve the
problems of the clients with desirable outcomes.
43 NEP - 2020
DIGITAL FLUENCY NOTES
Online learning tools refer to any program, app, or technology that can be accessed via an
internet connection and enhance a teacher's ability to present information and a student's ability
to access that information. Online teaching tools help in enhancing the online learning and
teaching experience. It overcomes the boundaries of online teaching; these tools are designed
for students as well as teachers. The online teaching tools create a better teaching-learning
experience. These tools reduce the dependence of the students on teachers. The basic concepts
of videos, feedback, doubt solving, good graphics, audio-visuals, and many other features have
popularized live classes.
The change in educational services has demanded the digitalization of traditional methods.
Regular development of technologies in education supports the increased use of live teaching
apps, virtual classrooms, and digital resources.
An example:
Public speaking and English communication can be challenging to students who are still
developing their communication skills at school. Some people are born to speak in front of
others and do it easily, but the truth is, anyone can learn at least the basic public speaking skills
and gain some confidence in the process. With the help of technology, it is possible to imbibe
communication skills and improve public speaking.
44 NEP - 2020
DIGITAL FLUENCY NOTES
***
45 NEP - 2020
DIGITAL FLUENCY NOTES
Lab Sessions:
1. Prepare a chart representing the data storage units and give relevant real-world
examples belonging to each category.
2. Prepare a word processor report listing any five real time case studies of big data usages
in India.
3. Prepare a chart that explains about cloud services under Digital India Initiative with
relevant pictures.
4. Demonstrate how you will collect the information from the user using Google Form.
5. You have CCTV cameras installed in your home. You are able to remotely monitor the
CCTV footage on your mobile from anywhere. Do you think your CCTV footage can
be intercepted and viewed by hackers?
6. You use your mobile to pay for services online through internet banking or using debit
card. You do not have any antivirus program installed on your mobile. Do you think it
is possible for hackers to get access to your password/CVV without you sharing the
info?
7. Using search engines, calculate the total data consumed by any five popular social
media applications in a day, month, and year.
8. Prepare a report/presentation on how big data can be used to help education sector. List
any five big data applications in education.
9. Creating word document from Android app and accessing from computer
1) On your smartphone, install Google Docs App from Play store
2) Open the Google Docs app and create a new document
3) Write your resume and save
4) Enable sync option for Google Docs app
5) After successful syncing of document, open the web browser on computer/laptop
6) Login to Google Docs website
7) You should be able to see your resume on Google Docs website
10. Create a DigiLocker account and upload your documents in DigiLocker Account.
11. Understand and analyse strength of password
1. Open the web browser on your computer/smartphone
2. Browse to https://www.security.org/how-secure-is-my-password/
47 NEP - 2020
DIGITAL FLUENCY NOTES
3. Enter password of different number of characters as given below and write down
the strength of password:
i. Consisting of less than 8 characters (only alphabets)
ii. Consisting of 8 characters (only alphabets)
iii. Consisting of 8 characters (lowercase alphabets + numbers)
iv. Consisting of 8 characters (lowercase alphabets + numbers + special characters)
v. Consisting of 8 characters (lowercase and uppercase alphabets + numbers +
special characters)
vi. Consisting of more than 8 characters (lowercase and uppercase alphabets +
numbers + special characters)
4. Analyse the strength of password for above cases
5. Write down your observations in a paragraph
12. Check email ID for any breach
1. Open the web browser on your computer/smartphone
2. Browse to https://haveibeenpwned.com/
3. Enter your email ID and click on pwned?
13. Prepare a chart representing the data storage units and give relevant real-world
examples belonging to each category.
14. Prepare a word processor report listing any five real time case studies of big data usages
in India.
***
48 NEP - 2020