IT Literacy
Category : Railways
IT Literacy
Literacy is being able to read, write, listen, speak, view and represent while thinking critically and creatively about ideas and information. Literacy enables us 10 understand ourselves and the world around us, to interact with others and to share thinking.
Now days, IT Literacy programmed are initiated by the Central Govt. and State Govt. and made it compulsory to create IT skilled professionals in their recruitment policies. IT literacy is also known as computer Literacy.
Computer Literacy
Computer literacy is the ability to use computers and related technology efficiently, with a range of skills covering levels from elementary use to programming and advanced problem solving. By another measure, computer literacy requires some understanding of computer programming and how computers work.
10 things we have to know to be computer literate:
Using a search engine is more than typing in the address, putting a couple of keywords into the big text box, clicking
Search, and choosing the first result. While that may work, it won't give you the best results much of the time. Learning the advanced search, Boolean operators, and how to discern good results from bad results goes a long way toward enabling you to use a computer as a powerful research tool.
Word processing is one of the oldest uses for a computer.
And it continues to be extremely important, even though in many ways its functions have been put into other applications. (For example, people may write more emails than documents, but the task is nearly identical.) It is tough to claim to be computer literate if the basic functions of word processing - like spell check, table creation, and working with headers - are outside your capabilities.
A spreadsheet is an interactive computer application for organization, analysis and storage of data in tabular form.
Spreadsheets are developed as computerized simulations of paper accounting worksheets. The program operates on data entered in cells of a table. Each cell may contain either numeric or text data, or the results of formulas that automatically calculate and display a value based on the contents of other cells. A spreadsheet may also refer to one such electronic document.
Mastering techniques like opening links in new window using bookmarks, editing URLs to perform navigation clearing the browser cache, and understanding common error messages will give us access to a world of unlimited information instead of keeping we stuck with only what web site designers make obvious.
Much of typical computer maintenance is automated unneeded at that point, but it is still essential to understand how to check a system for nasty bugs, spyware, and other malicious applications. While the scanning tools come with real-time monitors, something can still slip onto the system before the scanner has the right filter for it. So it's critical know how to trigger a manual virus/malware scan, as well how to use alternative systems, spot signs of an infection and other similar tasks.
Every operating system has some universal keyboard commands.
Learning these commands is more a matter of routine than anything else. If anyone does know how to copy/paste without a mouse, so we can say he is a computer literate.
There are some certain terminologies that we will need to aware of when working with hardware.
The hardware is the physical aspect of the computer system architecture. That means that it is not abstract and we c actually see it in operation. There are literally dozens potential accessories and peripherals that can add to CPU order to make it functional.
Networking problems create the most common trouble w most computers. While we don't need to be able to prong a Cisco router, we should know how to:
Despite the color coding of connections and the fact d most cords can be plugged into only one hole, tons of people still can't hook up a computer. It is tough to claim to be computer literate if we can't even get it hooked up and turned on without some help.
It is a dangerous world out there! We absolutely must know how to protect yourself from attackers on the Internet and keep your personal data private. Everything from knowing to check a link before you click it to verifying that encryption is being used to transmit sensitive data to researching sites before giving them our personal data are all critical skills for the modem computer user.
Advantages of Computer Literacy
With a little training in basic computer skills we could be flying in our career! Digital skill training has a way of opening doors and directing dreams. We can easily sign up and study part-time so that you can bridge the gap in your understanding.
There are different markers of development along the education journey. Assuming a child receives early exposure to computer skills training, one of the end-goals as that child matures is to be computer literate.
So there is always a level of computer literacy involved.
ICT Literacy
ICT is any Information and Communication Technology that helps us to find process and communicate information. ICT tools include the Internet, cell phones, global positioning systems (GPS), texting, video games, digital cameras, MP3 players, wilds, blogs and more. Some of these tools are being used today in classrooms and will be used even more in the future to support learning.
Literacy with ICT is the ability to find, evaluate, use and share information by thinking critically, creatively and ethically.
COMPUTER AND ITS COMPONENTS
A computer system consists of mainly four basic units; namely input unit, storage unit, central processing unit and output unit.
Central Processing unit further includes Arithmetic logic unit and control unit. A computer performs five major operations or functions irrespective of its size and make. These are
Functional Units
Central Processing Unit (CPU) takes data and instructions from the storage unit and makes all sorts of calculations based on the instructions given and the type of data provided. It is then sent back to the storage unit. CPU includes Arithmetic logic unit (ALU) and Control unit (CU)
Memory
Computer's memory can be classified into two types; primary memory and secondary memory
RAM
RAM or Random Access Memory is the unit in a computer system. It is the place in a computer where the operating system, application programs and the data in current use are kept temporarily so that they can be accessed by the computer's processor. It is said to be Volatile' since its contents are accessible only as long as the computer is on. The contents of RAM are no more available once the computer is turned off.
ROM or Read Only Memory is a special type of memory which can only be read and contents of which are not lost even when the computer is switched off. It typically contains manufacturer's instructions. Among other things, ROM also stores an initial program called the 'bootstrap loader' whose function is to start the operation of computer system once the power is turned on
RAM is volatile memory having a limited storage capacity. Secondary/auxiliary memory is storage other than the
RAM. These include devices that are peripheral and are connected and controlled by the computer to enable permanent storage of programs and data.
CD ROM
Secondary storage devices are of two types; magnetic and optical. Magnetic devices include hard disks and optical storage devices are CDs, DVDs, Pen drive, Zip drive etc.
Hard Disk
Hard disks are made up of rigid material and are usually a stack of metal disks sealed in a box. The hard disk and the hard disk drive exist together as a unit and is a permanent part of the computer where data and programs are saved. These disks have storage capacities ranging from 1GB to 80 GB and more. Hard disks are rewritable.
Compact Disk
Compact Disk (CD) is portable disk having data storage capacity between 650-700 MB. It can hold large amount of information such as music, full-motion videos, and text etc. CDs can be either read only or read write type.
Digital Video Disk
Digital Video Disk (DVD) is similar to a CD but has larger storage capacity and enormous clarity. Depending upon the disk type it can store several Gigabytes of data. DVDs are primarily used to store music or movies and can be played back on your television or the computer too. These are not rewritable.
Input / Output Devises
These devices are used to enter information and instructions into a computer for storage or processing and to deliver the processed data to a user. Input / Output devices are required for users to communicate with the computer. In simple terms, input device bring information INTO the computer and output devices bring information OUT of a computer system. This input and output devices are also known as peripherals since they surround the CPU and memory of a computer system.
Input Devices
An input device is any device that provides input to a computer. There are many input devices, but the two most common ones are a keyboard and mouse. Every key you press on the keyboard and every movement or click you make with the mouse sends a specific input signal to the computer.
Output Devices
Output device receives information from the CPU and presents it to the user in the desired from. The processed data, stored in the memory of the computer is sent to the output unit, which then converts it into a form that can be understood by the user. The output is usually produced in one of the two ways - on the display device, or on paper (hard copy).
Non-impact printers do not touch the paper while printing. They use chemical, heat or electrical signals to etch the symbols on paper. Ink Jet, Desk Jet, Laser, Thermal printers fall under this category of printers.
It interprets computer commands and makes line drawing on paper using multi colored automated pens. It is capable of producing graphs, drawings, charts, maps etc.
Sound cards enable the computer to output sound through speakers connected to the board, to record sound input from a microphone connected to the computer, and manipulate sound stored on a disk.
TYPES OF COMPUTER
Supercomputer
The most powerful computers in terms of performance and data processing are the Supercomputers. These are specialized and task specific computers used by large organizations. These computers are used for research and exploration purposes, like NASA uses supercomputers for launching space shuttles, controlling them and for space exploration purpose.
The supercomputers are very expensive and very large in size. It can be accommodated in large air-conditioned rooms; some super computers can span an entire building.
Seymour Cray designed the first Supercomputer "CDC 6600" in 1964. CDC 6600 is known as the first ever Supercomputer.
Exascale Supercomputer
The Exascale Super computer will be 30 times faster and more powerful than today's fastest Super Computers. The need to develop such a high performance Supercomputer comes after China's surge in high performance computing.
Presently, China's "Tianhe-2" is the world's faster Supercomputer. The Tianhe-2 can perform 100 Petaflops, i.e. quadrillions of floating point operations per second.
The following table shows list of top five most powerful
Supercomputers in the world, you can also view complete list of Top 500 Supercomputers in the world.
Top five Supercomputers |
||||||
RANK |
SITE |
SYSTEM |
CORES |
RMAX (TFLOPS/S) |
RPEAK (TFLOPS/S) |
POWER(KW)
|
1 |
National super computer in Guanzhou, China |
Tianhe-2 (Milky Way-2) |
3,120,000 |
33,862.70 |
54,902.40 |
17,808 |
2 |
DOE/SC/Oak Ridge National Laboratory, United States |
Titan-Cray XK7,Cray Inc. |
560,640 |
17,590.00 |
27,112.50 |
8,209 |
3 |
DOE/NNSA/LLNL, United States |
Sequoia-Blue Gene/Q, IBM |
1,572,864 |
17,173.20 |
20,132.70 |
7,890 |
4 |
RIKEN Advanced Institute for Computational Science (AICS)Japan |
K Computer, Tofu Interconnect Fujits u. |
705,024 |
10,510.00 |
11,280.40 |
12,660 |
5 |
DOE/SC/Argonne National Laboratory, United States |
Mira-Blue Gene/Q, Custom IBM |
786,432 |
8,586.60 |
10,066.30 |
3,945 |
Popular Supercomputers
Mainframe Computer
Although Mainframes are not as powerful as supercomputers, but certainly they are quite expensive nonetheless, and many large firms & government organizations uses Mainframes to run their business operations. The Mainframe computers can be accommodated in large air-conditioned rooms because of its size. Super-computers are the fastest computers with large data storage capacity, Mainframes can also process & store large amount of data. Banks educational institutions & insurance companies use mainframe computers to store data about their customers, students & insurance policy holders.
Popular Mainframe Computers
Minicomputer
Minicomputers are used by small businesses & firms. Minicomputers are also called as "Midrange Computers". These are small machines and can be accommodated on a disk with not as processing and data storage capabilities as super-computers & Mainframes. These computers are not designed for a single user. Individual departments of a large company or organizations use Minicomputers for specific purposes. For example, a production department can use Mini-computers for monitoring certain production process.
Popular Minicomputers
Microcomputer
Desktop computers, laptops, personal digital assistant (PDA), tablets & smartphones are all types of microcomputers. The micro-computers are widely used & the fastest growing computers. These computers are the cheapest among the other three types of computers. The Micro-computers are specially designed for general usage like entertainment, education and work purposes. Well known manufacturers of Micro-computer are Dell, Apple, Samsung, Sony & Toshiba.
Desktop computers. Gaming consoles, Sound &Navigation system of a car, Netbooks, Notebooks, PDA's, Tablet PC's, Smartphones, Calculators are all type of Microcomputers.
Filenames
A filename (or file name) is used to identify a storage location in the file system. Most file systems have restrictions on the length of filenames. In some file systems, filenames are not case sensitive
(i.e., filenames such as FOO and too refer to the same file); in others, filenames are case sensitive (i.e., the names FOO, Foo and too refer to three separate files).
Most modem file systems allow filenames to contain a wide range of characters from the Unicode character set. However, they may have restrictions on the use of certain special characters, disallowing them within filenames; those characters might be used to indicate a device, device type, directory prefix, file path separator, or file type.
Directories
File systems typically have directories (also called folders) which allow the user to group files into separate collections. This may be implemented by associating the file name with an index in a table of contents or an inode in a Unix-like file system. Directory structures may be flat (i.e. linear), or allow hierarchies where directories may contain subdirectories. The first file system to support arbitrary hierarchies of directories was used in the Multics operating system. The native file systems of Unix-like systems also support arbitrary directory hierarchies, as do, for example, I
Apple's Hierarchical File System, and its successor HFS+ in classic Mac OS (HFS+ is still used in Mac OS X), the FAT file system in MS-DOS 2.0 and later versions of MS-DOS and in Microsoft
Windows, the NTFS file system in the Windows NT family of operating systems, and the ODS-2 (On-Disk Structure-2) and higher levels of the Files-11 file system in Open VMS.
Number System
We are familiar with numbers, characters and symbols. But this type of data are not suitable for microprocessor, logic circuits, computers etc. For this reason data is converted into electronic pulses and each pulse is identified as code. Then this code is converted into numeric format by ASCII, where each number, character and symbol have numerical equivalent. E.g.: Character A has ASCII value 65.
Using this equivalent, the data is interchanged into numeric format. For this numeric conversions we use number systems having a base number, which indicates the number of digits in that 1 number system.
Types of Number System
Binary Number System
Octal Number System
Decimal Number System
Hexadecimal Number System
Machine and Assembly Languages
A machine language consists of the numeric codes for the operation that a particular computer can execute directly. The codes are strings of 0s and 1s, or binary digits ("bits"), which are frequently converted both from and to hexadecimal (base 16) for human viewing and modification. Machine language instructions typically use some bits to represent operations, such as addition, and some to represent operands, or perhaps the location of the next instruction. Machine language is difficult to read and write, since it does not resemble conventional mathematical notation or human language, and its codes vary from computer to computer. Assembly language is one level above machine language. It uses short mnemoniccodes for instructions and allows the programmer introduce names for blocks of memory that hold data. One might thus write "add pay, total" instead of "0110101100101000" for an instruction that adds two numbers.
Assembly language is designed to be easily translated into machine language. Although blocks of data may be referred to by name instead of by their machineaddresses, assembly language does not provide more sophisticated means of organizing complex information. Like machine language, assembly language requires detailed knowledge of internal computer architecture. It is useful when such details are important, as in programming a computer to interact withinput/output devices (printers, scanners, storage devices, and so forth).
Algorithmic languages
Algorithmic languages are designed to express mathematical or symbolic computations. They can express algebraic operations in notation similar to mathematics and allow the use of subprograms that package commonly used operations for reuse. They were the first high-level languages.
Business-oriented Languages
Education-oriented Languages
Pascal to teach structured programming, which emphasized the orderly use of conditional and loop control structures without GOTO statements. Although Pascal resembled
ALGOL in notation, it provided the ability to define data types with which to organize complex information, a feature beyond the capabilities of ALGOL as well as FORTRAN and
COBOL. User-defined data types allowed the programmer to introduce names for complex data, which the language translator could then check for correct usage before running a program.
During the late 1970s and '80s, Pascal was one of the most widely used languages for programming instruction. It was available on nearly all computers, and, because of its familiarity, clarity, and security, it was used for production softwareas well as for education.
Object-oriented languages
Object-oriented languages help to manage complexity in large programs. Objects package data and the operations on them so that only the operations are publicly accessible and internal details of the data structures are hidden. This information hiding made large-scale programming easier by allowing a programmer to think about each part of the program in isolation. In addition, objects maybe derived from more general ones, "inheriting" their capabilities. Such an object hierarchy made it possible to define specialized objects without repeating all that is in the more general ones.
C++
The C++ language, developed by Bjarne Stroustrup at AT&T in the mid-1980s, extended C by adding objects to it while preserving the efficiency of C programs. It has been one of the most important languages for both education and industrial programming. Large parts of many operating systems, such as the Microsoft Corporation's Windows 98, were written in C++++.
ADA
Ada, the language, was developed in the early 1980s for the U.S. Department of Defense for large-scale programming. It combined Pascal-like notation with the ability to package operations and data into independent modules. Its first form, Ada 83, was not fully object-oriented, but the subsequent Ada 95 provided objects and the ability to construct hierarchies of them. While no longer mandated for use in work for the Department of Defense, Ada remains an effective language for engineering large programs.
JAVA
In the early 1990s, Java was designed by Sun Microsystems, Inc., as a programming language for the World Wide Web (WWW). Although it resembled C-H-++ in appearance, it was fully object oriented. In particular, Java dispensed with lower-level features, including the ability to manipulate data addresses, a capability that is neither desirable nor useful in programs for distributed systems. In order to be portable, Java programs are translated by a Java Virtual Machine specific to each computer platform, which then executes the Java program. In addition to adding interactive capabilities to the Internet through Web "applets," Java has been widely used for programming small and portable devices, such as mobile telephones.
Basic Data Structure
Data Structure is a way to organized data in such a way that it can be used efficiently. This tutorial explains basic terms related to data structure.
Data Definition
Data Definition defines a particular data with following characteristics.
Data Object
Data Object represents an object having a data.
Data Type
Data type is way to classify various types of data such as integer string etc. which determines the values that can be used with the corresponding type of data, the type of operations that can performed on the corresponding type of data. Data type of two types:
Built-in Data Type
Those data types for which a language has built-in support as known as Built-in Data types. For example, most of the language provides following built-in data types:
Derived Data Type
Those data types which are implementation independent as the can be implemented in one or other way are known as derived data types. These data types are normally built by combination of primary or built-in data types and associated operations on them. For example?
Basic Operations
The data in the .data structures are processed by certain operations. The particular data structure chosen largely depends on the frequency of the operation that needs to be performed on the data structure.
You need to login to perform this action.
You will be redirected in
3 sec