Professional Documents
Culture Documents
OVERVIEW OF
INFORMATICS
Computer
Computer is an electronic device used in almost every field. In the modern era we
cannot imagine a world without computers. These days, computers are used
extensively by engineers and scientists and also by millions of people around the
world. That is why this age is called as the era of Information Technology (IT).
A computer is an electronic data processing device, which accepts and stores data
input, processes the data input, and generates the output in a required format.
If we look at it in a very broad sense, any digital computer carries out the
following five functions:
Step 2-Stores the data/instructions in its memory and uses them as required.
• Computer technology provides the basics for processing data to convert it into useful
information.
Informatics
Informatics is the science and study of information, information flow, data management,
information systems engineering and information outcomes.
Informatics is defined as, "the study of the structure, behaviour and interactions of natural and
engineered computational systems".
Types of informatics are business informatics, medical informatics, health informatics, fashion
informatics etc.
MOBILE
APPLICATION
FINANCIAL
SERVICES
EMAIL
SERVICES
DIRECTORY
BUSINESS
SERVICES
Local Area Network (LAN) is a data communication network connecting various terminals or
computers within a building or limited geographical area. The connection among the devices
LAN
could be wired or wireless.
Eg : college lab. A wireless LAN(WLAN) is a LAN that uses radio signals (Wi-Fi)to connect
computers instead of cables.
MAN stands for Metropolitan Area Network. It is a computer network that connects
MAN number of LANs to form larger network, so that the computer resources can be
shared. This type of network covers larger area than a LAN but smaller than the area
covered by a WAN which is designed to extend over the entire city. Eg : Cable TV
network.
VPN (Virtual Private Network) provides secure connection over the internet
VPN and uses it for data transmission. It works by encapsulating data for one
network inside of an ordinary Internet Protocol (IP) packet and transporting
that packet to another network. When the packet arrives at the destination
network, it is unwrapped and delivered to the appropriate host on the
destination network By encapsulating the data using cryptographic techniques,
the data is protected from tampering and snooping while it is transported over
the public network.
Microwave transmission
Optical Fibre Cable
Bus topology
Star topology
Ring topology
Mesh topology
Hybrid topology
Tree topology
The Internet
Internet serves many purposes and is involved in many aspects of life. Some of them are:
• Web sites,
• E-mail,
• Instant Messaging.
• Blogging.
• Social Media,
• Marketing,
• Networking,
• Resource Sharing,
• Audio and Video Streaming, etc.
• Medium of communication
• Source of information
• Medium for entertainment
• Provide services
• Facilitates e-commerce
• Social relationship
• Conferencing
• Product information
• Recruitment new employees
Intranet
Extranet
GUARANTEE WARRANTY
Knowledge
Knowledge is a combination of information, experience, wisdom and
insight that may benefit the individual or the organisation.
Knowledge Management
• To capture knowledge
• To improve knowledge access
• To enhance the knowledge environment
• To manage knowledge as an asset
Benefits of KM
• Optimum use of knowledge
• Leads to new knowledge
• Better utilisation of resources
• Ability to solve problems
• Helps training
• Improves communication
• Better work allocation
Wi-Fi
• It can be used to provide support for scholarly research and preserving digital materials for the
long-term use. Hence internet is truly a knowledge repository.
• In the short term, knowledge repositories are important for the documentation of findings and
research in academic institutions.
• Long-term knowledge preservation in digital format will be useful to the coming generations.
Several academic institutions worldwide (notably MIT, Oxford, etc.) have implemented
knowledge repositories to capture, store, index, preserve and redistribute their scholarly research
in digital formats.
Search Engines
• We can communicate with others instantly via e-mail, video conferencing, chatting
instant messaging, blogs, social networks, etc. using internet. All these activities
indicate the presence in the cyber world.
SOCIAL INFORMATICS
IT and Society
Digital Divide
BOOKS
Applications of IT
EDUCATION
Applications of IT
FINANCE
Applications of IT
HEALTH CARE
Applications of IT
SECURITY
Applications of IT
COMMUNICATION
Applications of IT
EMPLOYMENT
Artificial Intelligence
Applications of AI
• Heavy Industries
• Finance
• Aviation
• Weather Forecast
• Games
Virtual Reality
Bio-Computing
Management of e-waste
To promote green computing concepts at all possible levels, the following four
complementary approaches are employed:
• Green use: Minimizing the electricity consumption of computers and their peripheral
devices and using them in an eco-friendly manner
Cyber world
Cyber world refers to online environment or it is the world of online computers and communications.
The term Cyber can be defined as, “one relating to computers or involving computer or computer
networks.”
3. Entertainment
4. Social network
5. E commerce
6. Online education
7. E-mail
• Addiction
• Relational problems
• Health
• Pornography
• Women
• Cyber crimes
Cyberspace refers to the virtual computer world. It is also known as a virtual space.
Cyberspace is a term which cannot be precisely and perfectly defined. But it can be defined as,
"the total interconnectedness of human beings through computers and telecommunication
without regard to physical geography".
• Lack of clarity
• Multiple sources of information
• Lack of time
Cyber Ethics is the study of moral, legal and social issues involving cyber technology
and the code of responsible behaviour on the internet. These are the moral values that
stop one from doing anything that is not legal and that does not harm or damage
anyone's interests while using internet. (It helps the online environment to be more safe,
friendly and co-operative for others around.)
• Be honest
• Show respect to others
• Respect the privacy of others
• Strictly adhere to cyber laws
• Do not use rude or offensive language.
• Do not harm others
• Do not be a bully on the internet.
Digital Signature is another breed of the electronic signatures, the only difference is
that it involves the use of a code or algorithm to sign and validate the authenticity
of a document.
The Indian Information Technology Act 2000 came into effect from October 17, 2000.
The Act is by and large based on the United Nations Commission on International Trade
Law (UNCITRAL) model law on electronic commerce adopted in1996 .
India enacted the Information Technology Act, 2000, the mother legislation dealing with
e-commerce and e-transaction and to facilitate e-governance and to prevent cyber crime.
Eventhough, IT Act, 2000 being the primary legislation governing e-commerce and e-
transactions, it was subjected to a lot of criticism. Certain specific areas like data
protection, privacy and new forms of cyber crimes, penal provisions, etc. were left
unaddressed by IT Act, 2000.
After the amendment of 2008, IT Act, 2000 was renamed as Information Technology
(Amendment) Act, 2008, commonly referred as ITAA, 2008. The new Act came into
force on October 27, 2009. Thus, the scope and applicability of IT Act, 2000 was
increased by its amendment in 2008.
• Time saving
• Building Customer relationship by obtaining regular feedback from CUSTOMERS
• 24 X7 availability
• Instant updates of catalogues and prices
• Worldwide visibility
• Creating opportunities for the buyers
• An effective option for the physically challenged
• Reduction in distribution cost
1.Hacking
Types of Hackers
2. Identity Theft
a. Phishing
b. Pharming
4. Web Hijacking
5. Pornography
7. Malicious software
8. Financial crimes