Digital Reforms in India – Payment & Governance – Major Computer Terminologies (Part - 4) (Download PDF)


Download PDF of This Page (Size: 263.09 K)

Here we will be covering solutions of the most important questions for upcoming November 2017 NET exam on Computer. We will be continuing the series with environment and computers which is gaining importance based on the current trend. Also note since this time there is no choice for paper 1 questions and all 50 questions are compulsory, you need to have a strong preparation for all topics including Computer Terminologies.

Loading video•••

Digital Reforms in India: Payment & Governance Major Computer Terminologies (In English)

Dr. Manishika Jain explains the various digital reforms and key terminologies in computers Data Analytics


  • Personal Storage space linked to Aadhar number
  • Includes –
  • My certificate – includes digital documents and uploaded documents
  • Profile, Issuer, Requester and Directories


With Aadhar number enrol for appointment in hospitals for OPD, lab report and blood availability

Digitize India Platform (DIP)

  • To provide digitization services for scanned document images or physical documents for any organization
  • Aim is to digitize and make usable all the existing content in different formats and media, languages, digitize and create data extracts for document management, IT applications and records management.
  • Innovative solution by combining machine intelligence and a cost effective crowd sourcing model
  • Process and extract relevant data from document images in a format usable for meta-data tagging, IT application processing and analysis.


  • Pro-Active Governance and Timely Implementation
  • Address common man’s grievances, and simultaneously monitor and review important programs
  • At 3 levels: PMO, Union Government Secretaries, and Chief Secretaries of the States

National Cloud – MeghRaj

Cloud computing in governance

Optimum use of infrastructure for eGov

Services Offered:

  • Infrastructure as a Service (IaaS)
  • Platform as a Services (PaaS)
  • Software as a Services (SaaS)
  • Storage as a Service (STaaS)

Public Wi-Fi Hotspots

  • Certification provided by Wireless Broadband Alliance 1 (WBA), which owns and controls the “Wi - Fi Certified” logo that can be applied to products that satisfy certain interoperability criteria.
  • WLANs created using Wi - Fi technology can be used to connect personal computers, mobile phones, tablets and other appliances to a local network, which in turn provides connectivity to the Internet.
  • WLAN can be operated as hotspots – at railway stations and cities

National Optical Fibre Network (NOFN)

  • Information super-highway
  • Creation of a robust middle-mile infrastructure for reaching broadband connectivity to Gram Panchayats
  • Connect 2.5 Lakh Gram Panchayats
  • Provides 100 Mbps connectivity in Gram Panchayats


  • To provide on demand, affordable broadband connectivity of 2 Mbps to 20 Mbps for all households and on demand capacity to all institutions
  • Funded by Universal service Obligation Fund (USOF)
  • Phase 1: Connect 1 lakh gram panchayats by March 2017
  • Phase 2: Connect 2,50,500 gram panchayats by Dec 2018
  • Phase 3: state-of-the-art, future-proof network - fibre between districts and blocks, with ring topology to provide redundancy by 2018 - 23

Computer Malware

Loading video•••

Computer Malware & Types of Malware - Weapons of 21st Century!

Dr. Manishika Jain explains Malware & Types of Malware in this lecture. This is important due to the recent ransomware “Wannacry” in news.

Endpoint Security Solutions – by C-DAC

  • Browser JSGuard (Secure browser add-on) – browser addon that detects and defends malicious HTML & JS attacks made through the web browser based on Heuristics
  • AppSamvid (Application Whitelisting Solution) - allows only approved applications to execute on end system. Whitelisting requires less frequent updates compared to blacklisting as in antivirus software
  • USB Pratirodh - Controls unauthorized usage of portable USB mass storage devices like pen drive, only authorized users can access it
  • Application and Device Control (ADC) - indigenous antimalware security solution to prevent unauthorized access of USB mass storage device and prevent execution of unauthorized application on endpoint systems
  • M-Kavach - Comprehensive mobile device security solution for Android devices - addresses threats like stealing personal data & credentials, misuse of Wi-Fi and Bluetooth resources, lost or stolen mobile device, spam SMSs, premium-rate SMS and unwanted incoming calls.

Secure E-Mail

Includes 2 aspects – authentication & encryption

Rely on public-key cryptography where users can each publish a public key that others can use to encrypt messages to them, while keeping secret a private key they can use to decrypt such messages or to digitally encrypt and sign messages they send.

Protocols for email encryption/authentication include:

  • SMTP (Secure Mail Transfer Protocol)
  • TLS (Transport Layer Security)
  • SSL (Secure Sockets Layer)
Loading video•••

Digital Reforms in India: Payment & Governance Major Computer Terminologies (In Hindi)

Dr. Manishika Jain explains the various digital reforms and key terminologies in computers Data Analytics

- Published/Last Modified on: September 13, 2017


Get unlimited access to the best preparation resource for UGC Sociology- fully solved questions with step-by-step exaplanation- practice your way to success.

Developed by: