Project work order
Follow the order as given below.
1.Cover page
2.Title page
3. Certificate page
4. Acknowledgement
5. Table of contents
5.1 objectives
5.2 Planning,System study, Analysis, Feasibility study
5.3 Algorithm
5.4 System design (You can use flowchart/DFD/UML/context diagram)
5.5 System development part/coding part/ put your code here.
5.6 input and output screenshot
5.7 Conclusion/summary
5.8 References/Bibliography
-----------------------------------------------------------------------------------------------------------------------------
Notes:-
1. Use passive voice while writing
2. Use third person (do not use I or we; instead use “it was done”)
3. For font:
· Use font size 12 pt. and “times new roman” as font
· Use 1.0 (single) spacing for sentences
· Use 1” for all sides as page set-up/margin. You can set little more for gutter (1”+0.0.2”)
· For titles and sub-titles, you can increase font size to 16 or 14 respectively
4. Use proper formatting (justify)
5. If you need then you can use header and footer properly
6.You can insert page number.
7. Include all source codes (C).
8.Include screenshot of any 6 pages(3 for inputs and 3 for outputs).
9. Do not write/print on both sides of the page. Use page size A4.
10. Maximum no. of pages should be in 25-35 pages.
11. Do not mix/use colors. Make it as simple as it has to be.
12. The work done by you should be genuine and not copied. If found so then in summarily it will be rejected. You may be asked to do again.
13. Do spiral binding.
note:
1. You have to make same format as given here
2. no copying or direct printing
3. On your exam day, bring all the works done (lab report and project work)in pen drive as well as in hardcopy. We may ask you to show softcopy.
4. Without lab -report and project work, you will not be permitted to sit in computer lab for board exam.
ICT and cyber law
ICT is applied area of computer science, electronics, telecommunication, business and of every fields that deal with processing, storing and transmitting information.
Positive impacts:
Education
Medicine
Banks
Business
Communication
Multimedia
Employment
Productivity
Ecommerce
Entertainment
Negative impacts:
Health problem
Piracy
Pornography
Computer viruses
Hacking
Privacy
Cost
Less employment
Loss of information
Digital socialization
Digital Divide and it's Conceptualization
The digital divide refers to the gap between the have and the does not have in computers, internet access, access to information and ecommerce.
Conceptualization:
Means of connectivity or how individuals and their associates are connecting and to what like infrastructure, location, and network availability.
Intensity of connectivity, or how sophisticated are the usage like mere access, retrieval, interactivity, innovative contributions.
Purpose of connectivity or why individuals and their associates are connecting like the reasons why individuals are online and use the internet and ICT's.
Lack of connectivity which means that why individuals and their associates are not connecting.
Computer ethics and Commandments of computer ethics
Ethics deals with placing a value on acts according to whether they are good or bad. Computer and information ethics can be understood as that branch of applied ethics which studies and analyzes such social and ethical impacts of ICT.
Commandments:
Do not use a computer to harm other people
Do not interfere with other people's computer work
Do not snoop or view around in other people's files
Do not use a computer to steal
Do not use or copy software for which you have not paid
Do not use other people's computer resources without authorization
Think about the social consequences of the program you write
Use a computer in ways that show consideration and respect
Intellectual property (IP)
Intellectual property (IP) refers to creations of the mind: inventions, literacy and artistic works, and symbols, names, images, and designs used in commerce. IP is divided into two categories: industrial property and copyright.
Anonymity and privacy
Anonymity means that the person does not expose his or her identity. It means outsiders cannot trace, link or observe the contents of the messages.
Privacy is the interest that the individuals have in sustaining a personal space, free from interference by other people and organizations.
Cyber law
Cyber law is a type of law which rules in the internet to prevent internet related crime.
Fields of cyber law
Electronic and digital signature
Computer crime
Intellectual property
Data protection and privacy
Telecommunication law
Cyber law of Nepal
Nepal cannot be isolated from emerging technology and the problems raised by the technology. The cyber law is on the process of development. Nepal passed the Electronic Transaction and Digital Signature Act 2004, also known as Cyber law.
The main laws are:
The law covers most of the issues related with cyber activities and is supposed to forecast to be landmark legislation for development of IT industry in Nepal.
Conducts such as hacking, deleting data, stealing e-document, software piracy and posting offensive information are capable of criminal and civil sanctioning under the new cyber law.
The government can punish cyber offenders with up to 5 years of imprisonment and /or fine of up to Rs. 50,000. However, much depends on the harshness of the crime.
The law has tightened the security for banking transactions through electronics means, which should boost the economic activities across the internet via Nepal.
It gives legal status to information posted on the websites of government offices, government run corporations and local bodies.
It has also granted legal status to digital signatures sent through the electronic media like e-banking, e-commerce, etc.
The law has also made a new judicial body to listen to complaints, cases and matters concerning cyber crime.
Computer Crime
Computer crime has been defined broadly as a criminal act that has been committed using a computer as the primary tool.
Forms of computer crime
The theft of money, for example, the transfer of payments to the wrong accounts
The theft of information, for example, by tapping into data transmission lines or databases at no cost.
The theft of goods by their diversion to the wrong destination
The theft of computer time, for example, use of an employer's computer resources for personal work.
Besides of these, computer crime can also take form of hacking, cracking, sabotage and blackmail.
IT policies
The policies of IT are the action adopted for the implementation of strategies to achieve goals and fulfill the objectives. Some of the policies of IT are as follows:
To declare information technology sectors a prioritized sector.
To provide internet facilities to all village development committees.
To render assistance to educational institutions and encourage native and foreign training.
To computerize the records of each governmental office.
To increase the use of computers in the private sector.
To develop physical and virtual information technology park.
To use information-technology to promote e-commerce, e-education, e-health, among others.
To establish National Information Technology Centre.
To establish a national level fund by mobilizing the resources.
To establish Nepal in the global market through the use of information technology.
source:-
http://www.khullakitab.com/information-communication-technology-and-cyber-law/notes/computer-science/grade-12/332/notes
Contemporary technology
E-commerce refers to online transactions, buying and selling of goods and/or services over the internet.
E-business covers online transactions, but also extends to all internets based interactions with business partners, suppliers and customers.
Advantages of e-commerce:
a. It makes buying selling procedure faster, as well as easy to find products.
b. It makes buying/selling possible 24/7.
c. There are no theoretical geographical limitations hence more reach to customers.
d. It reduces operational costs and provides better quality of services.
e. It does not require physical company set ups.
f. It is easy to start and manage a business.
Disadvantages of e-commerce:
a. Any one, good or bad can easily start a business. And there are many bad sites which eat up customer's money.
b. There is no guarantee of product quality.
c. Mechanical failures can cause unpredictable effects on the total processes.
d. As there is minimum chance of direct customer to company interactions, customer loyalty is always on a check.
e. There are many hackers who look for opportunities and thus an ecommerce site, service payment gateways all are always prone attack.
E-learning
E-learning is a new concept of delivering digital contents in learner oriented environment using information and communication te4chnology (ICT). Delivery of the digital content is the main characteristic of e-learning.
Advantages of e-learning:
It maintains the consistency of content.
It is easy for customization.
There is no any geographical limitation for learning.
It is quite favorable for learner as it can happen at any time and anywhere.
It reduces or eliminates travel costs to attend learning events.
It reduces or eliminates need for classroom/instructor infrastructure.
Disadvantages of e-learning:
Learners with low motivation or bad study habits may fall behind
Without the routine structures of a traditional class, students may get lost or confused about course activities and deadlines
Students may feel isolated from the instructor and classmates
Instructor may not always be available when students are studying or need help
Slow Internet connections or older computers may make accessing course materials frustrating
Managing computer files and online learning software can sometimes seem complex for students with beginner-level computer skills
Hands-on or lab work is difficult to simulate in a virtual classroom.
E-governance
E-governance is the application of electronic means to improve the interaction between government and citizens; and to increase the administrative effectiveness and efficiency in the internal government operations.
Despite the government of Nepal has positively giving attention towards the development of ICTs and subsequent implementing e-governance, a number of issues has yet addressed. Some of the challenges for successful implementation of e-governance are presented as:
Information transparency
Legal issues
Resources availability
Infrastructure including connectivity in rural area
Capacity and awareness
Political will and government action
Advantages of E-governance
E-Governance offers many benefits and advantages for the government, corporate sector and society. E-Governance facilitates better delivery of government services to citizens, improved interactions with business and industry, citizen empowerment through access to information, or more efficient government management. It simplifies internal operations and improves performance of government departments while helping all sections of society to avail government services at lower cost with maximum ease of use.
Virtual reality
Virtual reality is a new computational paradigm that redefines the interface between human and computer becomes a significant and universal technology and subsequently penetrates applications for education and learning.
Application fields of Virtual reality
Virtual Reality in the Military:
Virtual Reality in Education:
Virtual Reality in Healthcare:
Virtual Reality in Business:
Virtual Reality in Engineering:
Virtual Reality and Scientific Visualization:
Virtual Reality Programming Languages:
E-medicine
E-medicine refers to an approach that provides medical services whenever and wherever required using information and communication technology.
With the help of this approach, even small number of doctors can provide medical service to large number of people scattered in different locations. The people of rural areas who are unable to get service of doctors can be benefitted from this approach. The patients share his/her medical problems to the doctors. This approach is now getting more popularity among the doctors too. They can post their experiences and issues in the online discussion forum. Without good facility of information and communication technology, e-medicine cannot be effective. This is the problem facing in the developing countries like Nepal.
Impact of Robotics in human life
Positive Impacts:
Robots can provide a wide variety of benefits to society. The most prominent benefit of robots is that they allow physical tasks to be performed at a greater speed than humans could reasonably achieve, and that tasks can be performed by robots that are beyond the reasonable physical capabilities of humans. For example, in manufacturing, mechanized processes allow production to take place at a great speed, with little human effort required. This allows for the low-cost mass-production of goods. These manufacturing processes allow for great precision, and can allow products of a very high quality to be produced.
Negative Impacts:
As they are out to use to do common tasks, Humans are increasingly becoming lazy, and thus their health is adversely affected. Also, as robots become more and more autonomous, the chances that they commit a mistake are very high. These mistakes can lead to serious problems if unchecked. Also, as self-learning Robots evolve, they may make decisions that are harmful to Human beings. From another perspective, If the robots are not self-learning, they will do jobs only which they are programmed for. Updating their functions will thus require more expertise.
source:-
http://www.khullakitab.com/contemporary-technology/notes/computer-science/grade-12/335/notes
ans:
Alternatively referred to as cyber crime, e-crime, electronic crime, or hi-tech crime. Computer crime is an act performed by a knowledgeable computer user, sometimes referred to as a hacker that illegally browses or steals a company's or individual's private information. In some cases, this person or group of individuals may be malicious and destroy or otherwise corrupt the computer or data files.
Child pornography - Making or distributing child pornography.
Cyber terrorism - Hacking, threats, and blackmailing towards a business or person.Cyberbully or Cyberstalking - Harassing others online.
Creating Malware - Writing, creating, or distributing malware (e.g. viruses and spyware.)
Denial of Service attack - Overloading a system with so many requests it cannot serve normal requests.
Espionage - Spying on a person or business.
Fraud - Manipulating data, e.g. changing banking records to transfer money to an account.
Harvesting - Collect account or other account related information on other people.
ans:-
Electronic governance or e-governance is the application of information and communication technology (ICT) for delivering government services, exchange of information, communication transactions, integration of various stand-alone systems and services between government-to-customer (G2C), government-to-business (G2B), government-to-government (G2G) as well as back office processes and interactions within the entire government framework.
Its components are:
1)G2c: