Semester-Iii Information and Communication Technology
Semester-Iii Information and Communication Technology
Semester-Iii Information and Communication Technology
SYLLABUS:
UNIT-I:
UNIT-II:
UNIT-III:
Overview of Internet security, E-mail threats and secure E-mail, Viruses and antivirus software,
Firewalls, Cryptography, Digital signatures, Copyright issues.
What are GOI digital initiatives in higher education? (SWAYAM, SwayamPrabha, National
Academic Depository, National Digital Library of India, E-Sodh-Sindhu, Virtual labs, e- acharya,
e-Yantra and NPTEL).
Unit-I
1. What is Internet? Write the evolution of Internet?
A.The Internet is the global system of interconnected computer networks that use the Internet
protocol suïte to link devices worldwide. The purpose of the internet is to communicate between
computers that are interconnected with each other. Internet is accessible to every user all over
the world.
It is a network of networks that consists of private, public, academic, business, and government
networks of local to global scope, linked by a broad array of electronic, wireless, and optical
networking technologies.
The Internet carries a vast range of information resources and services, such as the inter-linked
hypertext documents and applications of the World Wide Web (WWW), electronic mail,
telephony and file sharing. Browser is a tool used to access the internet using WWW (World
Wide Web) and HTTP (Hyper Text Transfer Protocol). In the browser, if the user types the
domain name such as www.tn.gov.in, the browser calls a protocol name DNS (Domain Name
Server). DNS is used to get the IP address of the domain names.
Evolution:
The concept of Internet was originated in 1969 and has undergone several technological &
Infrastructural changes as discussed below:
♦The origin of Internet devised from the concept of Advanced Research Project Agency Network
(ARPANET).
♦ARPANET was developed by United States Department of Defense.
♦Basic purpose of ARPANET was to provide communication among the various bodies of
government.
♦Initially, there were only four nodes, formally called Hosts.
♦In 1972, the ARPANET spread over the globe with 23 nodes located at different countries and
thus became known as Internet.
♦By the time, with invention of new technologies such as TCP/IP protocols, DNS, WWW,
browsers, scripting languages etc., Internet provided a medium to publish and access
information over the web.
A.Entering a web address, commonly known as a Uniform Resource Locator (URL), into an
internet browser is a fundamental skill for navigating the vast expanse of the World Wide Web.
Following are thegeneral steps to enter a web address:
A.The World Wide Web (WWW), commonly referred to as the web, is a vast and interconnected
network of digital information that is accessible through the internet. It consists of a collection of
web pages, documents, multimedia content, and resources linked together using hyperlinks.
The web allows users to access, share, and interact with a diverse range of content, including
text, images, videos, audio, and interactive applications.
Components of WWW:
Working of WWW:
The foundation of the World Wide Web relies on an assortment of distinct technologies,
encompassing Web browsers, Hypertext Markup Language (HTML), and Hypertext Transfer
Protocol (HTTP).A Web browser serves as the gateway to access web pages, functioning as
software that renders text, data, images, animations, and videos from the Internet. These
programs enable the exploration of hyperlinked resources found on the World Wide Web
through the interfaces they provide. While initially, Web browsers were primarily employed for
web browsing, their scope has significantly expanded. They now serve as versatile tools that
cater to a variety of tasks, including conducting searches, email communication, file transfers,
and more. Among the widely utilized browsers are Internet Explorer, Opera Mini, and Google
Chrome.
4.Define Browser. Explain the different types of Browsers?
A.A web browser is an interface that helps a computer user gain access to all the content that is
on the Internet and the hard disk of the computer. It can access web pages, images, text
documents, audio and video files, games, etc. More than one web browser can be installed in
the computer.
A software application used to access information on the World Wide Web is called a Web
Browser. When a user requests some information, the web browser fetches the data from a web
server and then displays the webpage on the user's screen.
Web Browser:
The first Web browser, called World Wide Web, was created in 1990. That browser's name was
changed to Nexus to avoid confusion with the developing information space known as the World
Wide Web. The first Web browser with a graphical user interface was Mosaic, which appeared
in 1993. Many of the user interface features in Mosaic went into Netscape Navigator. Microsoft
followed with its Internet Explorer (IE).
Types of Browser:-
1. Google Chrome:
Google Chrome is one of the most popular browsers in the world. The benefit of using the
Chrome browser is its compatibility with other Google services. You can also sync your
bookmarks, passwords, history, and more on all your devices. So it doesn't matter which device
you are using, your data will always be in sync across all your devices. Chrome runs smoothly
on any Windows PC or Laptop and the website also loads faster.
2. Mozilla Firefox:
Firefox was slower than Chrome. A web browser designed for simplicity, security, extensibility
yet flexibility and power. Available for Linux and android as well. There are lots of plugins and
extensions with some powerful developer tools.Session storage is also an important feature of
Firefox, which allows the user to regain access to the open tabs after he has closed the browser
window.
3.Internet Explorer:
Internet Explorer (IE) was a web browser developed by Microsoft that was the default browser
for Windows operating systems.IE allowed users to access websites, view multimedia content,
and interact with online applications. It introduced features like tabbed browsing and a download
manager.
4. Safari:
Safari is a web browser developed by Apple inc. It is the most popular browser with MAC users.
Safari is a clean browser, very fast based on the WebKit rendering engine. Safari comes with
the features you want in a modern browser, like tabbed browsing, popup blocking and built-in
search functionality. It also has one of the best RSS-reading feature available online, it is easier
to keep track a number of websites than using bookmarks.
5. Opera:
This browser was developed by Opera Software in 1996. It is a well-known browser that is
mainly used in Internet-activated mobile phones, PDAs, and smartphones. Opera Mini and
Opera Mobile are the browsers used in smartphones. It is compatible with many operating
systems such as Solaris, Linux, Mac OS X, and Microsoft Windows. It is also compatible with
Symbian and Windows Mobile operating systems for smartphones and PDAs.
6. Torch Browser:
If you are one of those people who download lots of media content from the internet, then this
browser is for you. The Torch browser comes with an integrated media grabber feature through
which you can easily download video or audio from most of the sites.
7.Brave Browser:
Brave Browser is another Chromium-based browser, and within a short span, it has earned the
reputation of a privacy-focused web browser. By default, the trackers and ad-blocker are
enabled, and it will also upgrade the connections to HTTPS so that you can surf the web
peacefully.
5.What is URL? Explain the components of URL?
A.URL stands for Uniform Resource Locator is the global address of documents and other
resources on the World Wide Web. Its main purpose is to identify the location of a document
and other resources available on the internet, and specify the mechanism for accessing it
through a web browser.
A URL (Uniform Resource Locator) is the address of a file (resource) accessible on the Internet.
The type of resource depends on the Internet application protocol.. Using the World Wide Web's
protocol, the Hypertext Transfer Protocol (HTTP), the resource can be an HTML page, an image
file, a program such as a common gateway interface application or Java applet, or any other file
supported by HTTP. The URL contains the name of the protocol required to access the
resource, a domain name that identifies a specific computer on the Internet, and a hierarchical
description of a file location on the computer.
On the web (which uses the Hypertext Transfer Protocol), an example of a URL is:
http://www.microsoft.com, which is the link to Microsoft's web page.
A URL for HTTP (or HTTPS) is normally made up of three or four components:
1. A scheme:
The scheme identifies the protocol to be used to access the resource on the Internet. It can be
HTTP (without SSL) or HTTPS (with SSL).
2. A host:
The host name identifies the host that holds the resource. For example, www.example.com. A
server provides services in the name of the host, but hosts and servers do not have a
one-to-one mapping. Refer to Host names. Host names can also be followed by a port number.
Refer to Port numbers. Well-known port numbers for a service are normally omitted from the
URL. Most servers use the well-known port numbers for HTTP and HTTPS, so most HTTP
URLs omit the port number.
3. A path:
The path identifies the specific resource in the host that the web client wants to access. For
example, /software/htp/cics/index.html.
4. A query string:
If a query string is used, it follows the path component, and provides a string of information that
the resource can use for some purpose (for example, as parameters for a search or as data to
be processed). The query string is usually a string of name and value pairs; for example,
term=bluebird. Name and value pairs are separated from each other by an ampersand (&); for
example,
A.. A social network service as a service which focuses on the building and verifying of online
social networks for communities of people who share interests and activities, or who are
interested in exploring the interests and activities of others, and which necessitates the use of
software. The following are the different social networking websites:
1. Twitter:
Twitter was designed by Jack Dorsey in March 2006. Ders Twitter is a social networking and
microblogging online service that allows users to send and receive text-based messages or
posts of up to 140 characters called "tweets."
2. Linkedin:
Linkedin is a social networking website designed for business professionals. It allows you to
share work-related information with other users and keep an online list of professional contacts.
Like Facebook and MySpace, Linkedin allows you to create a custom profile.
3. Facebook:
Facebook is a social networking website that was originally designed for college students, but is
now open to anyone 13 years of age or older. Facebook users can create and customize their
own profiles with photos, videos, and information about themselves. Friends can browse the
profiles of other friends and write messages on their pages.
4. Skype:
Skype is a hybrid instant messaging and voice chat application that allows users to connect with
one another from any global location with Internet access. With over 663 million users, Skype is
one of the most popular communications platforms in the world.
5. YouTube:
YouTube is a video sharing service that allows users to watch videos posted by other users and
upload videos of their own. The service was started as an independent website in 2005 and was
acquired by Google in 2006. Videos that have been uploaded to YouTube may appear on the
YouTube website and can also be posted on other websites, though the files are hosted on the
YouTube server.
6.WhatsApp:
WhatsApp Messenger, or simply WhatsApp, is an American freeware, cross-platform
centralized messaging and voice-over- IP (VoIP) service owned by Facebook, Inc. It allows
users to send text messages and voice messages, make voice and video calls, and share
images, documents, user locations, and other content.
UNIT-II
1. Define E-mail. Explain its advantages and disadvantages?
Ans. Electronic mail is popularly known as email where textual messages are sent to the
receiver through tele-communication links. Here, computer terminals are, connected together in
a network to transfer a message from one to one or one to many. The sender first types the
message on a computer screen and then sends it to the receiver.
The respective message is dropped in the receiver's mailbox and the receiver can read the
message and answer if required. Both sending and receiving of email are processed and
directed by mail server computers which are connected through a network.
Email is a store and forward (S&F) Service where it is not necessary for the receiver to be
present at the computer. The message resides in the receiver's mailbox until it is read or
deleted. File, data, sound, image, or video clip can also be sent through email as an attachment.
According to Newstron and Davis, "Electronic mail is a computer- based communication
system.”
Advantages:
1. Flexibility:
It provides flexibility. A message can be sent to morg than one person at a time.
2. More Convenient:
Email is more convenient than any other mode of communication. The sender can send
multiple copies of an email message.
3. Record:
Email carries a record or evidence all the time because if you don't delete mail from your
mailbox a mail never destroyed. So, if you need this next time you may see it anytime
anywhere.
4. Auto-response:
Email can provide an auto-response when it receives an email from any person so, it ensures
the sender that email is sent successfully. Most people give their basic information with this
confirmation message.
5. No time barrier to send email:
Email can be used nonstop 24x7 it is not like another traditional communication process. So,
you can send an email at any time as your demand.
Disadvantages:
1. Poor privacy:
All electronic mails must pass through mail server protocols. This exposes the mail to incessant
exposure and information leakage if the network server is hacked. In light of this, email
messaging has little or no privacy.
2. Virus infection:
This is one of the major disadvantages of emails. Viruses and over malicious files can be sent
through emails and when such emails are opened, the viruses will spread and cause damage to
the computer.
3. Spamming:
Spams are unwanted emails that are sent randomly to the email server. Such emails can be
quite disgusting. Most spammy emails usually carry viruses and can easily damage the
computer system.
4. Lack of cordiality:
Email does not have a personal touch for cordiality since there is no audio or face to face
interaction. For instance, some messages require to be conveyed in auditory mode if such
messages are sent as emails then the efficacy of the information might be lacking.
5. Overlooking of messages:
Email does not have delivery alerts hence most of the messages are usually overlooked and
this can cause message overloading.
A. 1. User-Ids:
A user ID is a unique identifier, commonly used to log on to a website, app, or online service. It
may be a username, account number, or email address. Many websites require an email
address for the user ID. This provides two benefits:
♥It is a simple way of ensuring you select a unique username.
♥It automatically associates your email address with your account.
Usernames allow multiple users to use the same computer or online service with their personal
settings and files. When used on a website, a username enables you to maintain personal
settings and identification with that website or service.
User ID is one of the most common authentication mechanisms used within computing systems,
networks, applications and over the Internet.
2. Passwords:
A password is a string of characters used for authenticating a user on a computer system. A
password is used to restrict access to a system, application or service to only those users who
have memorized or stored and/or are authorized to use it. A password may also be called an
access code, PIN or secret code.
A password is a basic security mechanism that consists of a secret pass phrase created using
alphabetic, numeric, alphanumeric and symbolic characters, or a combination.
3. E-mail Addresses:
An email address is a unique identifier for an email account. It is used to both send and receive
email messages over the Internet. Similar to physical mail, an email message requires an
address for both the sender and recipient in order to be sent successfully.
Every email address has two main parts: a username and domain name. The username comes
first, followed by an at (@) symbol, followed by the domain name. In the example below,
"degreestudents" is the username and "gmail.com" is the domain name.
degreestudents@gmail.com
A.Domain name system (DNS) is a hierarchical naming system built on a distributed database.
This system transforms domain names to IP addresses and makes it possible to assign domain
names to groups of Internet resources and users, regardless of the entities' physical location.
DNS is a TCP/IP protocol used on different platforms. The domain name space is divided into
three different sections: generic domains, country domains, and inverse domain.
1. Generic Domains:
It defines the registered hosts according to their generic behavior. Each node in a tree defines
the domain name, which is an index to the DNS database. It uses three-character labels, and
these labels describe the organization type.
2.Country Domain:
The format of country domain is same as a generic domain, but it uses two-character country
abbreviations (e.g., us for the United States) in place of three character organizational
abbreviations.
3. Inverse Domain:
The inverse domain is used for mapping an address to a name. When the server has received a
request from the client, and the server contains the files of only authorized clients. To determine
whether the client is on the authorized list or not, it sends a query to the DNS server and ask for
mapping an address to the name.
DNS WORKING PROCESS :-
The Domain Name System (DNS) translates domain names into IP addresses so that users can
access internet resources. The DNS process works like this:
A. An email message consists of two major sections: Header and Body 1) Header: The header
of an email is structured into various fields such as summary, sender, receiver, and other
information about the email. The header of an email can be easily distinguished from the body
of the email. Various fields included within header are:
1. From:
Contains the email address, and optionally name, of the sender of the message.
2. To:
The email address(es), and optionally name(s), of the receiver(s) of the message.
3. Subject:
A brief summary of the contents of the message.
4. Date:
The local time and date when the message was originally sent.
5. CC:
Stands for Carbon Copy. It contains email address(es) of those who will receive a copy of the
message in addition to receiver(s) mentioned in To field.
6. Message-ID:
It shows the number assigned to the message by the mail program at the host machine.
7. A series of Received:
These are the lines, showing details of the systems through which the email has passed (useful
for troubleshooting if mail bounces back).
8. A Reply-to:
Gives the preferred address for replies (usually but not always the same as the sender's
address).
9. Signature:
Many e-mail programs also allow you to include a signature that gets attached to the bottom of
your messages. A signature 15 similar to letterhead on stationery.
II) Body:
The Body of an email contains the message itself mosti in text form. An account may be
configured to automatically assign a signature (of the user) at the end. Signature is the text
appearing at the end of the body by default in each message. Normally, it is the name of the
sender and other contact details.
Congratulations! Your account has been created. From now onwards every time you sign in you
just have to enter your email id and password. And every time you sign-in don't forget to
sign-out because it prevents others from viewing your emails.
A. Google Drive is a cloud-based storage service that enables users to store and access files
online. The service syncs stored documents, photos and more across all the user's devices,
including mobile devices, tablets and PCs.
Google Drive integrates with the company's other services and systems -- including Google
Docs, Gmail, Android, Chrome, YouTube, Google Analytics and Google+. Google Drive
competes with Microsoft OneDrive, Apple iCloud, Box, Dropbox and SugarSync.
Features:
1. File Storage:
Google Drive provides users with a place to store files securely in the cloud. Users can upload
various types of files, including documents, images, videos, and more.
2. Accessibility:
Users can access their files stored on Google Drive from any device with internet access,
including computers, smartphones, and tablets.
3. File Synchronization:
Google Drive synchronizes files across devices, ensuring that changes made on one device are
reflected on all other devices linked to the same Google account. This feature enables seamless
access and collaboration on files from different devices.
4. Collaboration Tools:
Google Drive includes collaboration features that allow multiple users to view, edit, and
comment on documents simultaneously in real-time. This feature is particularly useful for
teamwork and remote collaboration.
5. File Sharing:
Google Drive enables users to share files and folders with others via email, link sharing, or by
granting specific permissions. Users can control who can view, edit, or comment on shared files,
making it suitable for both personal and professional use.
6. Search Functionality:
Google Drive offers robust search capabilities, allowing users to quickly find files and folders
using keywords, file types, or other criteria. This feature is especially helpful for users with large
amounts of stored data.
7. Security and Privacy:
Google Drive employs various security measures to protect users' data, including encryption
both in transit and at rest, two-factor authentication, and access controls.
8. Storage Capacity:
Google Drive provides users with a certain amount of free storage space (typically 15 GB) for
storing files. Additional storage can be purchased through subscription plans if needed.
A. Google Forms is a questionnaire tool that allows users to create fillable forms, quizzes,
applications, and other documents that require user input. A variety of question types, including
multiple-choice, short- answer, paragraph, and file uploads, can be included in your Google
Forms, allowing for a diverse set of data to be collected.
Features:
Google Forms is a free online survey tool that has many features. Here are some of the
features:
1. Templates:
Google Forms offers 17 pre-designed templates for surveys, quizzes, event registrations,
orders, and more. These templates are customizable and can be categorized into Personal,
Work, and Education.
2. Question types:
Google Forms offers a variety of question types, including multiple-choice, checkboxes,
drop-down, short answers, paragraphs, and multiple-choice grid questions.
3. Collaboration tools:
Google Forms allows users to create, edit, and analyze responses together as a team.
A. Internet security refers to securing communication over the internet. Security refers to follow
some rules and guideline to protect the data and information shared on the internet. There is a
huge risk of data when you are online if you are not following some basic protocols.
Internet security consists of a range of security tactics for protecting activities and transactions
conducted online over the internet. These tactics are meant to safeguard users from threats
such as hacking into computer systems, email addresses, or websites; malicious software that
can infect and inherently damage systems; and identity theft by hackers who steal personal data
such as bank account information and credit card numbers.
In today's digital landscape, many of our daily activities rely on the internet. Various forms of
communication, entertainment, and financial and work-related tasks are accomplished online.
This means that tons of data and sensitive information are constantly being shared over the
internet. The internet is mostly private and secure, but it can also be an insecure channel for
exchanging information. With a high risk of intrusion by hackers and cybercriminals, internet
security is a top priority for individuals and businesses alike.
While the web presents users with lots of information and services, it also includes several risks.
Cyber-attacks are only increasing in sophistication and volume, with many cybercriminals using
a combination of different types of attacks to accomplish a single goal. Though the list of
potential threats is extensive, here are some of the most common internet security threats:
1. Malware:
Short for "malicious software," malware comes in several forms, including computer viruses,
worms, Trojans, and dishonest spyware.
2. Computer worm:
A computer worm is a software program that copies itself from one computer to the next. It does
not require human interaction to create these copies and can spread rapidly and in great
volume.
3. Spam:
Spam refers to unwanted messages in your email inbox. In some cases, spam can simply
include junk mail that advertises goods or services you aren't interested in. These are usually
considered harmless, but some can include links that will install malicious software on your
computer if they're clicked on.
4. Phishing:
Phishing scams are created by cybercriminals attempting to solicit private or sensitive
information. They can pose as your bank or web service and lure you into clicking links to verify
details like account information or passwords.
5. Botnet:
A botnet is a network of private computers that have been compromised. Infected with
malicious software, these computers are controlled by a single user and are often prompted to
engage in nefarious activities, such as sending spam messages or denial-of-service (DoS)
attacks.
A.A firewall is a network security device that monitors incoming and outgoing network traffic and
permits or blocks data packets based on a set of security rules. Its purpose is to establish a
barrier between your internal network and incoming traffic from external sources (such as the
internet) to block malicious traffic such as viruses and hackers.
There are various types of firewalls in a computer network, which are as follows:
1. Packet Filtering. Firewalls:
A packet filtering firewall is an essential type of firewall. It facilitates a management program that
monitors web traffic and filters incoming packets based on configured security methods.
These firewalls are created to block network traffic IP protocols, an IP address, and a port
number if a data packet does not connect to the established rule-set.
2. Application Level Gateway Firewall:
It is also known as Proxy Firewalls. Proxies are mainly used to control or monitor outbound
traffic. Some application proxies cache the data requested.
This lower bandwidth requirement decreases the access time for the following user to access
the same data. It also gives unquestionable evidence of what was transferred.
3. Circuit-level Gateways:
Circuit-level gateways are another type of firewall that can easily configure to allow or block
traffic without significant computing resources.
These types of firewalls typically operate at the OSI model's session-level by verifying TCP
(Transmission Control Protocol) connections and sessions. Circuit-level gateways are designed
to ensure that the regular sessions are protected.
4. Next-Generation Firewalls (NGFW):
These works by filtering traffic moving by a network by the filtering is specified by the
applications or traffic methods and the ports they are created.
5, Stateful Multi-Layer Inspection (SMLI) Firewalls:
Stateful multilayer inspection firewalls contain both packet inspection technology and TCP
handshake verification. It can create SMLI firewalls better than packet-filtering firewalls or
circuit-level gateways. These types of firewalls keep track of the status of established
connections.
6. Network address translation (NAT) Firewalls:
It allows multiple devices with independent network addresses to connect to the internet using a
single IP address, keeping individual IP addresses hidden.
7. Threat-focused NGFW:
Threat-focused NGFW contains all the features of a traditional NGFW. They can also support
advanced threat detection and remediation. These types of firewalls can react against attacks
quickly.
8. Cloud Firewalls:
Whenever a firewall is created using a cloud solution, it is called a cloud firewall or FaaS
(firewall-as-service). Cloud firewalls are supported and run on the Internet by third-party
vendors.
A.Cryptography is the study of secure communications techniques that allow only the sender
and intended recipient of a message to view its contents. The term is derived from the Greek
word kryptos, which means hidden. It is closely associated to encryption, which is the act of
scrambling ordinary text into what's known as ciphertext and then back again upon arrival. .
Features:
1. Confidentiality:
Information can only be accessed by the person for whom it is intended and no other person
except him can access it.
2. Integrity:
Information cannot be modified in storage or transition between sender and intended receiver
without any addition to information being detected.
3. Non-repudiation:
The creator/sender of information cannot deny his or her intention to send information at later
stage.
4. Authentication:
The identities of sender and receiver are confirmed. As well as destination/origin of information
is confirmed.
Types of Cryptography:
Advantages of Cryptography
♦ Some techniques such as hashing, are known to preserve the integrity of the message .
♦It is used to guard highly confidential information and data.
♦It offers protection from users not intended to have access to a message.
♦Digital signatures provide non-repudiation against disputes that arise in situations where the
sender denies passing of the message.
Disadvantages of Cryptography:
♦It can prove to be dangerous if the system design is not properly managed.
♦Sometimes, a strongly encrypted message cannot be read by even the intended or legitimate
user. This has been known to happen in many cases.
♦The whole concept of cryptography relies on the complexity of mathematical algorithms. What
if someone breaks through the complex algorithms, the entire cryptosystem would be vulnerable
to threats.
A.Digital signatures are the public-key primitives of message authentication. In the physical
world, it is common to use handwritten signatures on handwritten or typed messages. They are
used to bind signatory to the message.
Similarly, a digital signature is a technique that binds a person/entity to the digital data. This
binding can be independently verified by receiver as well as any third party.
Digital signature is a cryptographic value that is calculated from the data and a secret key
known only by the signer.
The digital signature scheme is based on public key cryptography. The model of digital signature
scheme is depicted in the following illustration:
It should be noticed that instead of signing data directly by signing algorithm, usually a hash of
data is created. Since the hash of data is a unique representation of data, it is sufficient to sign
the hash in place of data. The most important reason of using hash instead of data directly for
signing is efficiency of the scheme.
A.SWAYAM stands for Study Webs of Active Learning for Young Aspiring Minds. It is a
government initiative. It is aimed at offering free and high-quality e-learning education to
students ranging from Class 9th to post-graduation. The platform employs cutting-edge
pedagogy and upgraded audio-visual and multimedia tools to deliver courses. It covers a wide
range of subjects in higher education and provides skill development courses for the skill sector.
Features of SWAYAM:
Some of the important features of the SWAYAM platform are given below:
The objective of the SWAYAM initiative is to make top-quality educational resources accessible
to everyone, especially those who have been underserved. This includes:
▲ Offering a comprehensive web and mobile platform with interactive e-content for all
educational levels, from High School to University
▲Delivering a high-quality learning experience through multimedia, available at any time and
from anywhere
▲ Creating opportunities for peer interaction and discussion forums to address questions and
concerns
Approach of SWAYAM:
The SWAYAM portal implements a four-quadrant-based approach for the betterment of the
children and students. The four quadrants of SWAYAM are:
1. Video lectures:
Under this initiative, the government targets to deliver free education to all individuals who
require it through interactive video lectures. Expert mentors will deliver these lectures, and they
will be of high quality.
2. Specially prepared reading material:
The easily downloadable and printable e-material through pdf, ppt, etc. will be provided. It will
help in learning and revision through self-reading.
3. Self-assessment tests:
The portal will also hold regular tests and quizzes to assess learning properly and to check
performance.
Features:
1. High-Quality Content:
NPTEL courses are designed and taught by experienced faculty members from premier
institutions like the Indian Institutes of Technology (IITs) and the Indian Institute of Science
(IISc). The content is curated to meet academic standards and cover the latest advancements in
the respective fields.
2. Diverse Course Catalog:
NPTEL offers a wide range of courses covering various disciplines, including engineering,
science, humanities, management, and more. This diversity allows learners to explore different
subjects according to their interests and career aspirations.
3. Free Access:
NPTEL courses are available for free to anyone with an internet connection. Learners can
access course materials, lectures, assignments, and exams without any cost, making quality
education accessible to a broader audience.
4. Video Lectures:
NPTEL provides video lectures for most courses, allowing students to learn from expert
professors in an engaging and interactive manner. These video lectures often include visual
aids, animations, and real-world examples to facilitate better understanding of concepts.
5. Online Assignments and Exams:
NPTEL courses typically include online assignments and exams to assess the understanding
and knowledge retention of students. These assessments are designed to test conceptual
clarity and problem-solving skills.
6. Certification:
NPTEL offers certification for successful completion of courses and exams. Certificates are
issued by the respective IITs or IISc, adding value to learners' resumes and academic profiles.