Friday, March 19, 2021

Electronic Transaction act 2063

 Electronic Transaction act 2063 (2008): 

यसको बारेमा more details भित्र छ (more details)

➤ Date of Authentication and Publication - 22 Mansir 2063 (December 8, 2006), Act number 27 of the year 2063.

Preamble: WHEREAS, it is expedient to make, legal provisions for authentication and regularization of the recognition, validity, integrity and reliability of generation, production, processing, storage, communication and transmission system of electronic records by making the transactions to be carried out by means of electronic data exchange or by any other means of electronic communications, reliable and secured; And where as, for controlling the acts of unauthorized use of electronic records or of making alteration in such records through the illegal manner, Now, therefore, be it enacted by the House of Representatives in the First Year of the issuance of the Proclamation of the House of Representatives, 2063(2007) . 

Chapter - 1 Preliminary:

1. Short Title, Extension and Commencement: (1) This Act may be called "The Electronic Transactions act,2063 (2008)". (2) This Act shall be deemed to have been commenced from 24 Bhadra 2063 ( sep.2, 2006). (3) This Act shall extend throughout Nepal and shall also apply to any person residing anywhere by committing an offence in contravention to this act.

2. Definitions: Unless the subject or context otherwise requires, in this Act,-

  1. "Asymmetric Crypto System" means a system that creates a secured key-pair consisting of a private key creating a digital signature and a public key to verify the digital signature.
  2. "License"
  3. "Originator"
  4. "Computer
  5. Computer Database
  6. Computer Network
  7. Computer system
  8. Computer Resource
  9. Subscriber
  10. Key Pair
  11. Data
  12. Tribunal
  13. Private Key
  14. Digital signature
  15. Access
  16. Appellate Tribunal
  17. Certificate
  18. Certification Practice statement
  19. Certifying Authority
  20. Addressee
  21. Electronic Record
  22. Electronic Form
  23. Public Key
  24. Information
  25. Information System
  26. Software
  27. Computer Accessory
  28. Government Authority
  29. Public Institution
Chapter - 2 Provisions Relating to Electronic Record and Digital Signature:

3. Authenticity of Electronic Record:
4. Legal Recognition of Electronic record: 
5. Legal Recognition of Digital Signature:
6. Electronic Records to be kept Safely:
7. Electronic Record May Fulfill the Requirement of Submission of any Original Document:
8. Secured Electronic Records:
9. Secured Digital Signature:

Chapter - 3 Provision Relating to Dispatch, Receipt and acknowledgement of Electronic Records:

10. Electronic Record to be Attributed to Originator:
11. Procedure of Receipt and Acknowledgement of Electronic Records:
12. Time and Place Of Dispatch and Receipt of Electronic Record:

Chapter 4. Provisions Relating to controller and certifying Authority:

13. Appointment of the Controller and other Employees:
14. Functions, Duties and Powers of the Controller:
15. License to be Obtained:
16. Application to be submitted for a License:
17. Other Functions and Duties of the Certifying Authority:
18. Procedure of License:
19. Renewal of License:
20. License may be suspended:
21. License may be revoked:
22. Notice of Suspension or revocation of a license:
23. Recognition to Foreign Certifying Authority may be given:
24. The Controller may issue Orders:
25. The Controller may delegate power:
26. The Controller may investigate: 
27. Performance Audit of Certifying Authority:
28. The Controller to have the Access to Computers and data:
29. Record to be maintained:

Chapter-5 Provisions Relating to Digital Signature and Certificates

30. Certifying Authority may issue a Certificate: 
31. Apply to obtain a Certificate:
32. Certificate may be suspended:
33. Certificate may be revoked:
34. Notice of Suspension or Revocation: 

Chapter-6 Functions, Duties and Rights of Subscriber

35. To Generate Key pair:
36. To Accept a Certificate:
37. To retain the private key in a secured manner:
38. To Deposit the Private Key to the Controller:

Chapter-7 Electronic Record and Government use of Digital Signature 

39. Government Documents may be published in electronic form: 
40. To Accept the Document in Electronic Form:
41. Use of Digital Signature in Government Offices:
 
Chapter –8 Provisions Relating to Network Service

42. Liability of Network Service Providers:
43. Network Service Provider not to be Liable:

Chapter -9 Offence Relating To Computer 

44. To Pirate, Destroy or Alter computer source code: 
45. Unauthorized Access in Computer Materials:
46. Damage to any Computer and Information System:
47. Publication of illegal materials in electronic form: 
48. Confidentiality to Divulge:
49. To inform False statement:  
50. Submission or Display of False License or Certificates:
51. Non-submission of Prescribed Statements or Documents:
52. To commit computer fraud: 
53. Abetment to commit computer related offence:
54. Punishment to the Accomplice:
55. Punishment in an offence committed outside Nepal:
56. Confiscation:
57. Offences Committed by a corporate body:
58. Other Punishment:
59. No Hindrance to Punish Under the Laws prevailing: 

Chapter-10 Provisions Relating to Information Technology Tribunal

60. Constitution of a Tribunal:
61. Qualification of the Member of the Tribunal:
62. Terms of office, remuneration and conditions of service of the Member of Tribunal:
63. Circumstances under which office shall be fallen vacant and filling up of vacancy: 
64. Staff of the Tribunal:
65. Procedures to be followed by the Tribunal:

Chapter-11 Provisions Relating to Information Technology Appellate Tribunal 

66. Establishment and formation of the Appellate Tribunal:
67. Qualification of the Member of Appellate Tribunal:
68. Terms of Office, Remuneration and Terms & Conditions of the service of the Member of                 Appellate Tribunal:
 69. Conditions of Vacancy of Office and filling up of such Vacancy:
70. Staff of the Appellate Tribunal:
71. Procedures to be followed by the Appellate Tribunal:

Chapter-12 Miscellaneous:

72. Provision may be made by an Agreement:
73. Government of Nepal may issue Directives:
74. Time Limitation to file a Complaint:
75. Government of Nepal to be a Plaintiff:
76. Compensation to be Recovered:
77. This Act shall not Apply:
78. Power to Frame Rules:
79. To Frame and Enforce the Directives:
80. Effect of inoperativeness of The Electronic Transactions Ordinance, 2063 (2008):









IT Policy Of Nepal

 ICT Policy,2072: यसको बारेमा more details भित्र छ ( More Details)

➤ National Information and communication Technology Policy 2072 (2015).

Past Policy endeavors:

➤ National communication policy in 1992.

➤ Telecommunications Act and Regulation in 1997.

➤ Information Technology Policy (IT Policy) announced in the year 2000.

➤ The IT Policy has since been revised in 2010.

➤ The formation of draft broadband policy in the year 2014.

Achievement:

Cellular telephony in particular has registered impressive uptake as evidenced by its sustained growth trajectory over the past few years with current penetration rate crossing well over 90 %. (विशेष गरी सेलुलर टेलिफोनीले विगत केही वर्षहरूमा यसको निरन्तर वृद्धि प्रवेगबाट प्रमाणित गरेको छ कि वर्तमान प्रवेश दर rate 90 % भन्दा बढि पार गरीरहेको छ।)

A fourth Kathmandu - Hetauda backbone is available through Nepal Electricity Authority which has now commenced hauling optic fiber cable with the roll out of high power electrical lines feeding into these backbones to expand telecommunications /ICT access to locations at the extremities of commercial broadband coverage. (चौथो काठमाडौं - हेटौंडा बैकबोन नेपाल विद्युत् प्राधिकरण मार्फत उपलब्ध छ जसले टेलिकम्युनिकेसन / आईसीटी पहुँच विस्तार गर्न वाणिज्य ब्रोडब्यान्ड कभरेजको स्थानमा विस्तार गर्नका लागि यी बैकबोनहरूमा उच्च शक्ति विद्युतीय लाइनहरूको रोल आउटसहित अप्टिक फाइबर केबल निकाल्ने काम सुरु गरिसकेको छ।)

Goals of ICT Policy:

At least 75 percent of the population will have digital literacy skills by the end of 2020.

90 percent of the population will be able to access the broadband service.

At least 7.5 % of GDP by 2020.

80% of all citizen facing government services would be offered online by 2020.

A broadband internet user penetration rate of 30% at a minimum of 512 KBPS and making available at least 10 Mbps download speed on demand in urban areas by 2018.

Vision:

To transform Nepal into an information and knowledge based society and economy. (नेपाललाई सूचना र ज्ञानमा आधारित समाज र अर्थव्यवस्थामा रूपान्तरण गर्ने।)

Mission:

To create conditions for the intensified development and growth of ICT sector as a key driver for Nepal's sustainable development and poverty reduction strategies. (नेपालको दिगो विकास र गरीबी निवारण रणनीतिको प्रमुख चालकको रूपमा आईसीटी क्षेत्रको तीव्र विकास र बृद्धिका लागि सर्तहरू सिर्जना गर्ने।)

Objectives of National ICT Policy:

To empower and facilitate Nepal's participation in the Global knowledge based society. (विश्वव्यापी ज्ञान आधारित समाजमा नेपालको सहभागिताको सशक्तीकरण र सहजीकरण गर्न।)

To promote ICT to further productivity among the sectors that is key drivers of the national economy. (राष्ट्रिय अर्थतन्त्रको प्रमुख चालक क्षेत्रहरू बीच आईसीटी बढि उत्पादकत्वको प्रबर्धन गर्ने।)

To conserve natural resources and safeguard Nepal's heritage using ICT tools. (आईसीटी उपकरण प्रयोग गरी प्राकृतिक स्रोत संरक्षण र नेपालको सम्पदाको रक्षा गर्न।)

List of Acronyms:

➤ ADSL = Asymmetric Digital Subscriber Line

➤ EMF = Electro Magnetic Fields

➤ FTTH = Fiber to the home

➤ GNI = Gross National Income

➤ ICNIRP = International Commission on Nonionizing Radiation Protection

➤ IXP = Internet Exchange Points

➤ LAPA = Local Adaption Plan of Action

➤ NCERT = Nepal Computer Emergency Response Team

➤ NDLI = National Digital Literacy Initiative

➤ QoS = Quality of Service

➤ RTDF = Rural Telecommunications Development Fund

➤ ITES = IT- enable service

➤ BPO = Business Process Outsourcing

➤ NITS = Nepal Trade 










ASCII and Unicode Standards

 Introduction to ASCII and Unicode Standards:

ASCII means American Standard Code for Information Interchange.
➤ ASCII is a character encoding standard for electronic communication.
➤ ASCII codes represent text in computers, telecommunications equipment and other devices.
➤ It uses the 7 bit code.
➤ It support 128 bit.
➤ Latest  8 bit ASCII support the 256 characters.

EBCDIC:
EBCDIC means Extended Binary Coded Decimal Interchange.
EBCDIC is an 8 bit character encoding used mainly on IBM mainframe and IBM mid range computer operating systems.
➤ It used the 8 bit code.
➤ It represents the 256 characters.


UNICODE STANDARDS:

➤ The Unicode standard is a character coding system designed to support the worldwide interchange, processing and display of the written texts of the diverse language and technical disciplines of the modern worlds. (युनिकोड मानक एक चरित्र कोडिंग प्रणाली हो जुन विश्वव्यापी ईन्टरचेन्ज, प्रोसेसिंग र आधुनिक भाषाहरूको विविध भाषा र प्राविधिक विषयहरूको लिखित ग्रन्थहरूको प्रदर्शन समर्थन गर्दछ।)
➤ It supports 64000 Characters.

Nepali Unicode Keyboard layouts:

Two type of Nepali keyboard layouts are available till date Traditional and Romanized layout.

1. Traditional layouts: Traditional layout is designed for true Font (TTF) like, Preeti, Kantipur etc.)

2. Romanized Layout: It is translation of the Nepali using English character. E.g. Aa(आ), ba(ब),Nepali(नेपाली).








Computer number system (computer fundamental)

 Number System: The symbol which is used to measure quantity/ count the specific value that is number system.

1. Binary number system: 
➤ A number system that uses two different symbols (0,1) to measure quantity.
➤ It's base is 2
➤ Total number (0,1), used by computer
➤ It is also called machine language.

2. Octal number system:
➤ It is used Eight different number (0,1,2,3,4,5,6,7), base is 8

3. Decimal number system:
➤ Use 10 distinct symbols (0,1,2,3,4,5,6,7,8,9), base is 10

4. Hexadecimal number system:
➤ The number which include number and alphabet both.
➤ It is used 0-9, and A-F symbol,16 symbols, (0,1,2,3,4,5,6,7,8,9,A,B,C,D,E,F)

Logic Gate:

➤ Logic gate are the basic building block of any digital system.
➤ Electronic circuit has more than one input and only output.
➤ It is used in CPU (ALU)
Types of logic gates:
1. OR gate: It take two or more input and give one output and produce false result when all input are false otherwise result always true. A+B=AB, (0+0=0, 0+1=1, 1+0=1, 1+1=1).

2. AND gate: 
➤ Take more input and produce one output.
➤ It works the multiply function .e.g. A*B=C, (0*0=0, 0*1=0, 1*0=0, 1*1=1)

3. NOT gate: 
➤ The not gate is circuit that work as inverter.
➤ It has one input signal.
➤ input/output (0=1,1=0).



















Thursday, March 18, 2021

Computer Networking (Computer Fundamental)

1. Introduction of Networking:

A set /group of distributed intelligence machine that share data/information/communication through any /line cable without cable that is called network. (वितरित खुफिया मेशिनको सेट / समूह जसले डेटा / जानकारी / सञ्चार साझेदारी गर्दछ कुनै पनि / लाइन केबल मार्फत, केबल बिना नेटवर्क भनिन्छ।)

Types of Network:

LAN (Local Area Network): A computer network spanned inside a building and operated under the single administrator system that is local area network. (एक कम्प्युटर नेटवर्क भवन भित्र फ्याँकिएको छ र एकल प्रशासक प्रणाली अन्तर्गत सञ्चालन हुन्छ जुन स्थानीय क्षेत्र नेटवर्क हो।)

➤ MAN (Metropolitan Area Network): The network that interconnected user with cable in geographical area of nay one region to another region/ city that is called Metropolitan area network. (नेटवर्क जुन प्रयोगकर्तालाई नाभिको एक भौगोलिक क्षेत्रमा अर्को क्षेत्र / शहरमा केबलको साथ जोड्दछ जुन मेट्रोपोलिटन क्षेत्र नेटवर्क भनिन्छ।)

➤ WAN (Wide Area Network): A wide area network such as which span a large geographical area such as one country to another country. It uses satellite technology. (विस्तृत क्षेत्र नेटवर्क जस्तै: ठूलो भौगोलिक क्षेत्र जसरी एउटा देशबाट अर्को देशमा विस्तार हुन्छ। यसले उपग्रह प्रविधि प्रयोग गर्दछ।)

2. E-mail/Internet/Intranet/Extranet/WWW:

E-mail: A services which allow us to send and receive element massage over the internet. E-mail called electronic mail. (एक सेवा जसले हामीलाई इन्टरनेटमा एलिमेन्ट message पठाउन र प्राप्त गर्न अनुमति दिँदछ। इ-मेललाई इलेक्ट्रॉनिक मेल भनिन्छ।)

E-mail Address: Each e-mail is signed a unique name for his e-mail account this name is known a E-mail address. Each user have different e-mail address which not match anyone. E-mail name are not allowed space and capital latter. E.g. awasthimohan21@gmail.com (प्रत्येक इ-मेलमा आफ्नो ई-मेल खाताको लागि एक अद्वितीय नाममा हस्ताक्षर हुन्छ जुन यो नामलाई इ-मेल ठेगाना भनेर चिनिन्छ। प्रत्येक प्रयोगकर्तासँग फरक ईमेल ठेगाना हुन्छ जुन कसैसँग मेल खाँदैन। इ-मेल नाम खाली ठाउँ र ठूला अक्षर पछि अनुमति छैन।)

Internet: Internet is a worldwide network that contain vast collection of information and resource available to your computer. It is network of network. (इन्टर्नेट एक विश्वव्यापी नेटवर्क हो जुन तपाईंको कम्प्युटरमा उपलब्ध जानकारी र संसाधनहरूको विशाल संग्रह हुन्छ। यो नेटवर्क को नेटवर्क हो।)

Intranet: Intranet is a private network (LAN) for use by user in network. This is network that is not available to the world outside of the internet. Limited user of Company. It is own server and firewall. (इन्ट्रानेट एक निजी नेटवर्क (LAN) नेटवर्कमा प्रयोगकर्ता द्वारा प्रयोगको लागि हो। यो नेटवर्क हो जुन ईन्टरनेट बाहिरको संसारमा उपलब्ध छैन। कम्पनीको सीमित उपयोगकर्ता। यो आफ्नै सर्वर र फायरवाल हो।)

Extranet: This refers to network within an organization  using internet to connect the outside in controlled. It is opener firm supplier and customer. (यसले बाह्य नियन्त्रित जडान गर्न इन्टरनेट प्रयोग गर्ने संस्था भित्रको नेटवर्क बुझाउँछ। यो ओपनर फर्म आपूर्तिकर्ता र ग्राहक हो।)

Internet browsers:

Web browser: The software is used to access internet. Internet client software designed for to access retrieve and view document/information on the internet/website. (सफ्टवेयर इन्टरनेट पहुँच गर्न प्रयोग गरीन्छ। इन्टरनेट ग्राहक सफ्टवेयर पुन: प्राप्ति गर्न र इन्टरनेट / वेबसाइट मा कागजात / जानकारी हेर्नका लागि डिजाइन गरिएको।) E.g. Mosaic, Microsoft edge, Internet explorer, opera, Mozilla, safari, google chrome, Netscape, lynx.

Search engine: The search engine a tool to locate /find /search information or resource in website /internet which can search the link file page on internet. (खोजी इन्जिन एक उपकरण खोज्न / खोज जानकारी वा स्रोत / वेबसाइट / इन्टरनेटमा श्रोत जसले इन्टरनेटमा लिंक फाइल पृष्ठ खोजी गर्न सक्छ।)
E.g. google.com, yahoo.com, bing.com, info.com, excite.com, ask.com, inkomi.com, lycos.com, altavista.com etc.

E-mail server: A mail server is a computer system that sends and receives email. E.G. gmail.com, hotmail.com, msn.com, yahoomail.com.

IP Address: 
➤ An IP address is unique address of particular computer other network devices on particular network. 
➤ It is part of internet. 
➤ Identifier of computer /devices on TCP/IP network.
➤ Protocols are based on IP address.
➤ Internet IP address 32 bit (4 bytes) long.
➤ The IP address is unique set of group (8 bit).
➤ E.g. 254.180.68.150

Subnet mask: 
➤ 32 bit logical organization.
➤ A subnet mask is a number that defines a range of IP address available within a network.
➤ Communication of network address and host address.
➤ E.g. 255.255.255.0

Network Media: Network transmission device connect/provide data and receive data/information that media is called transmission media.
1. Guided media: A computer that is connected with another with cable physical media that is called guided media media/bound cable transmission media.

types of guided media:
1. Twisted pair cable:
➤  A twisted pair cable is mode of two plastic insulated copper wire twisted together form a single media.
➤ Set up 4 pair = 8 wire
➤ connecter media RJ-45 connecter
➤ Used in LAN (maximum)
➤ Reduced noise.

2. Cereal cable: 
➤ Coaxial cabling has a single copper conductor at its center.
➤ The coaxial cable has high frequency than twisted pair cable.
➤ It has 450 MBPS bandwidth
➤ RG-59(TV), RG-58 (thin Ethernet)
➤ RG 11 (Thick Ethernet)
➤ Coaxial cable use the BNC connecter and T connecter.

3. Fiber optical cable: 
➤ A cable with central glass tube cupper with protect shield which transmit data using photos is fiber optical cable.
➤ It works on the laser beam (light technology)
➤ It made with high quality glass and plastic.
➤ Fastest cable media (technology)
➤ Electromagnetic technology
➤ 200 MBPS - 26 km- Speed
➤ Fiber optic cable are two types: Single mode and Multimode.
Connector: SC, ST, MT, RJ, un-direction, bi-direction both
1. Unguided media:
    ➤ The media is used to connect computer without cable and without any physical media.
    ➤ wireless media

Types of unguided media:
Infra - Red: It is allow computing device to communicate via-short range wireless signal, infra-ray, bidirectional, speed 1-2 MBPS E.g. TV- Remote

➤ Radio wave: The electro-magnetic radiation of frequency ranging from 30 KHZ - 300 GHZ through air. It connect similar/state line one transmitter from another E.g. mobile network tower.

➤ Microwave: It transmits data in same/similar/ particular device/ station. It space larger than radio wave. 1 GHZ - 30 GHZ speed, it transmit data by antenna E.g. Dish home.
 
➤ Wi-Fi: Popular Technology to exchange data /computer networking internet connect. Used in radio wave.

Network Architecture:

➤ Two or more computer are connected to established communication in network that are a physical connection that is called network architecture. (दुई वा अधिक कम्प्युटरहरू नेटवर्कमा स्थापित संचारमा जडित छन् जुन एक भौतिक जडान हो जसलाई नेटवर्क आर्किटेक्चर भनिन्छ।)

Types of Architecture:
➤  OSI (Open System Interconnection): It is most popular communication system, OSI developed by ISO company, It has 7 Layer (Application layer, Presentation layer, Session layer, Transport layer, network layer, data link layer, physical layer)
➤ IBM Network: Computer networking architecture which developed by IBM, It used the protocol, it created the set of rule for transfer data.

Network Model:

1. Client server network model:
    ➤ This model one server computer and many client computers connected, server is more powerful which star whole data and authority.

2. Peer to Peer network model:
    ➤ It has more computer but all are powerful and similar. It has no server work both client and server operations.

 Network Topology:

➤ It is used in LAN technology.
➤ It is also called physical arrangement of computer in network.

Types of Topology: more details

1. Bus Topology: 
    ➤ Bus network is topology is contains many computer with in single line/cable. Cable not used more than other Topology.

2. Ring Topology: Each device or computer is connected one to another computer in the shape of closed loop (ring).
 
3. Star Topology: It network used the any devices (Hub/Switch) in central point of computer.

4. Tree Topology: The various terminal and computer are link/connect to a main computer/server in network.

5. Hybrid Topology: It is portly combination of star and bus with ring topology.

6. Mesh Topology: This network all point/ node are connected each other all computer not depended one computer

Communication Mode:

1. Simplex: It transmit data one way one side. (यसले डाटा एक तर एक तर्फ प्रसारित गर्दछ।)

2. Half duplex: It transmit data both side /two way but in one time can't it transmit one time one way. (यसले दुबै पक्ष / दुई तर्फ डाटा प्रसारण गर्दछ तर एक पटकमा यसले एक पटक एक पटक प्रसारित गर्न सक्दैन।)

3. Full duplex: A system transmit data simultaneously both direction over channel. Transmit data two way say in same time. (एक प्रणाली डाटा एक साथ दुबै दिशामा च्यानल प्रसारण गर्दछ। डाटा प्रसारण दुई तरीकाले एकै समयमा भन्नुहोस्।)

Firewall:

➤ A firewall is hardware or software that helps control the spread of malicious software on your network and helps to protect your devices when you use the internet. (फायरवाल हार्डवेयर वा सफ्टवेयर हो जुन तपाईंको नेटवर्कमा मालिसियस सफ्टवेयरको प्रसारलाई नियन्त्रण गर्न मद्दत गर्दछ र जब तपाईं इन्टरनेट प्रयोग गर्नुहुन्छ तपाईंको उपकरणहरूको सुरक्षा गर्न मद्दत गर्दछ।)

Dial-Up Networking:

➤ The DUN connects the system to the ISP, which than provides the system a certain IP address and internet gateway address to be connected to and be a part of the network. (DUN ले प्रणालीलाई ISP मा जोड्दछ, जसले प्रणालीलाई जडान हुन र नेटवर्कको एक हिस्सा हुन एक निश्चित IP ठेगाना र इन्टरनेट गेटवे ठेगाना प्रदान गर्दछ।)








Wednesday, March 17, 2021

Basic File Management System (Computer Fundamental)

 1. Physical Structure of the Disk: 

Floppy disk: A floppy disk is basically a circular sheet of plastic, coated with magnetic material. (फ्लपी डिस्क मूलतः प्लास्टिकको गोलाकार पाना हो, चुम्बकीय सामग्रीको साथ लेपित।)

Hard disk: A hard disk is made of a stack of circular platters, also coated with magnetic material. It is a sealed unit containing a stack of circular platters mounted on a common spindle. Electromagnetic read/write heads are located above and below each platter. The patters rotate at a constant speed, eg. 7200 rpm. The disk is divided tracks and sectors. (हार्ड डिस्क गोलाकार प्लेटर्सको स्ट्याकबाट बनेको हुन्छ, यसको चुम्बकीय सामग्रीसँग लेप गरिएको हुन्छ। यो एक सिल गरिएको इकाई हो जुन सामान्य स्पिन्डलमा आरोहित गोलाकार प्लेटर्सको स्ट्याक हुन्छ। विद्युत चुम्बकीय पठन / लेखन हेडहरू प्रत्येक थालको माथि र तल अवस्थित छन्। प्याटर्स स्थिर गतिमा घुमाउँदछ, उदाहरणका लागि। 7200 rpm डिस्कलाई ट्र्याक र क्षेत्रहरू विभाजित गरिएको छ।)

2. Concept of File and Folder:

File: A file is an item that contains information for example, text or image or music. A file can look like a text document or a picture. On your computer, file are represented with icons, this makes it easy to recognize a type of file by looking at its icon. (फाईल: फाईल एक आईटम हो जुन जानकारी, उदाहरणका लागि पाठ वा छवि वा संगीतको लागि समावेश गर्दछ। फाइल पाठ कागजात वा तस्वीर जस्तो देखिन्छ। तपाइँको कम्प्युटरमा, फाईलहरू आईकनहरूसहित प्रतिनिधित्व हुन्छन्, यसले यसको आइकन हेरेर फाइलको प्रकार चिन्न सजिलो बनाउँदछ।)
👍 Identification of file is file name.
👍 File name have two name : Primary and Secondary name.
👍 A part portion of computer program which some data information command of any one program/ same type program.
File name: 1. Primary name: The name before dot/point/period.
                    👍 The name create/ define by user.
                    👍 Valid symbol for file name : A-Z, 0-9, a-z, @,$,!,_,-,(),# etc.
                    👍 Primary name: 1 to 8 character in DOS and 255 in Windows.
                    2. Secondary name: also called extension name.
                    👍 It indicates the format of source application.
                    👍 The name which is give after period by program automatically.

Wild Character: 
👍 Which character/letter/symbol is used by computer system already.
👍 Reserved character by system/computer.
👍 The Wild character are not supported in file name and folder name eg. /,\.?,|.

Folder: 

👍 A location to save the file.

👍 A folder in a container or cabinet of file you can use to store files in. (कन्टेनर वा फाइलको क्याबिनेटमा रहेको फोल्डर तपाईंले फाइलहरू भण्डारण गर्न प्रयोग गर्न सक्नुहुनेछ)
👍 It is used for store, delete, move, file or subfolder.


File system: 
👍 The organization of file in disk is called File System.
👍 File system used by the computer or more appropriately, the operating system.
    (डिस्कमा फाईलको संगठनलाई फाइल सिस्टम भनिन्छ।)
      (कम्प्युटर द्वारा प्रयोग गरिएको फाईल प्रणाली वा अधिक उपयुक्त, operating प्रणाली।)

Types of File System: 

1. FAT File System: The File Allocation Table (FAT) file system was designed for small disks and simple directory structures. (फाइल आलोकेशन टेबल (FAT) फाइल प्रणाली सानो डिस्क र साधारण निर्देशिका संरचनाहरूको लागि डिजाइन गरिएको 
Version of FAT
                        ➤ FAT 12
                        ➤ FAT 16
                        ➤ FAT 32
2. NTFS File system: NTFS stands for New Technology File System. It has more performance, reliability, security and compatibility. This NTFS File system is not only secure but also supports larger file sizes. (योसँग अधिक प्रदर्शन, विश्वसनीयता, सुरक्षा र अनुकूलता छ। यो NTFS फाइल प्रणाली सुरक्षित मात्र छैन तर ठूला फाईल आकारहरू पनि समर्थन गर्दछ।)
















Concept of Multimedia (Computer fundamental)

Multimedia: 

💗 It is a integration of different types of media such as text, graphics, audio, video, animation.

(यो पाठ, ग्राफिक्स, अडियो, भिडियो, एनिमेसन को रूप मा मिडिया को बिभिन्न प्रकारको एकीकरण हो।)

 💗 It allows managing different media component like Text, Sound and still or animated graphics images. (यसले पाठ, ध्वनि र स्थिर वा एनिमेटेड ग्राफिक्स छविहरू जस्तो विभिन्न मिडिया कम्पोनेन्टहरू प्रबन्ध गर्न अनुमति दिन्छ।)

 💗 In live situation, the use of a speaker or actors and "props" together with sound, images and motion video. (प्रत्यक्ष स्थितिमा, स्पिकर वा कलाकारहरूको प्रयोग र "प्रप्स" सँगै ध्वनि, छविहरू र गति भिडियो।)

Computer related threats (computer fundamental)

Computer Threats:

 Virus: It is self-replication program its self-copy file folder, loss/damages the data of computer. It is also called malware.

(Translate in Nepali: भाइरस: यो सेल्फ-नक्कल प्रोग्राम हो यो यसको सेल्फ-कपि फाइल फोल्डर हो, कम्प्युटरको डाटालाई नोक्सान / नोक्सान पुर्‍याउँछ। यसलाई मालवेयर पनि भनिन्छ।) 

Types of virus:

Boot sector virus (corrupt the system file)

Application virus (make automatic application file)

Startup virus (stop the computer boot)

worm (copy itself)

Trojan horse, time bomb, leap mac, storm worm, Joshi, Zenas 2007, creeper, spyware, my doom,        virus etc.

➔ First virus appear in ARPANET.

Phishing: Phishing is term used to describe a malicious individual or group of individuals who scam users. They do so by sending emails or creating web page that are designed to collect an individuals online bank, credit card, or other login information. because these emails and web page look like legitimate companies users trust them and enter their personal information.

(Translate in Nepali: Phishing - शब्द एक व्यक्तिलाई दुर्भावनापूर्ण व्यक्ति वा समूहको बयान गर्न प्रयोग गर्दछ जसले प्रयोगकर्ताहरूलाई घोटाला गर्दछ। तिनीहरू ईमेल पठाउँदै वा वेब पृष्ठ सिर्जना गरेर त्यसो गर्छन् जुन व्यक्ति अनलाईन बैंक, क्रेडिट कार्ड, वा अन्य लगइन जानकारी संकलन गर्न डिजाइन गरिएको हो। किनभने यी ईमेलहरू र वेब पृष्ठ वैध कम्पनीहरूले उनीहरूलाई विश्वास गर्दछन् र उनीहरूको व्यक्तिगत जानकारी प्रविष्ट गर्दछ।)

Trojans: A trojan is another type of malware named after the wooden horse that the Greeks used to infiltrate Troy. It is a harmful piece of software that looks legitimate.

(Translate in Nepali: ट्रोजन: ट्रोजन अर्को प्रकारको मालवेयर हो जुन काठको घोडाको नामले ग्रीकहरूले ट्रोयमा घुसाउने गर्थे। यो सफ्टवेयरको एक हानिकारक टुक्रा हो जुन वैध देखिन्छ।)

Worms: Computer worms are similar to viruses in that they replicate functional copies of themselves and can cause the same type of damage.

(Translate in Nepali: गँड्यौलाहरू: कम्प्युटर गँड्यौलाहरू भाइरससँग मिल्दोजुल्दो छ कि तिनीहरू आफैंको कार्यात्मक प्रतिहरू दोहोर्याउँदछन् र उही प्रकारको नोक्सान निम्त्याउन सक्छ।)

Antivirus: The program that detect and remove (clean) the virus from computers. E.g. Kaspersky, AVG and Avira, MacAfee, Norton, Dr. Solomon, 360 total security, K7, Avast, Panda, F-prot, ecsan, quick heal etc.

(Translate in Nepali: एन्टिभाइरस: प्रोग्राम जसले कम्प्युटरबाट भाइरस पत्ता लगाउँदछ र हटाउँछ (सफा) गर्दछ।)



Sunday, March 14, 2021

Setting and Protection of Computer Room and Computer (Computer fundamental)

 

 Power and Protection: (शक्ति र सुरक्षा:)

UPS (Uninterrupted Power Supply)(निर्बाध बिजुली आपूर्ति) : It is provide short-term electrical power should the normal supply fail. (Translate in Nepali: यो छोटो अवधिको बिजुली शक्ति प्रदान गर्दछ सामान्य आपूर्ति असफल हुनु पर्छ।)

Cables and Sockets: Shutdown the computer system and unplug the power cable and socket from main line after the office time. (Translate in Nepali: कम्प्युटर प्रणाली बन्द गर्नुहोस् र अफिसको समय पछि मुख्य लाइनबाट पावर केबल र सकेट अनप्लग गर्नुहोस्।)


Backup: It is important to regularly make copies of data so that these additional copies can be used to restore information in the event of a data loss. (Translate in Nepali: ब्याकअप: यो नियमित रूपमा डाटाको प्रतिलिपि बनाउन महत्त्वपूर्ण छ ताकि यी अतिरिक्त प्रतिलिपिहरू डाटा हराउने घटनामा जानकारी पुनर्स्थापना गर्न प्रयोग गर्न सकिन्छ।)

Security and safety: It is essential that the computer room be fully secured. don't install the computer in an insecure location. (Translate in Nepali: सुरक्षा र सुरक्षा: यो आवश्यक छ कि कम्प्युटर कोठा पूर्ण रूपमा सुरक्षित होस्। असुरक्षित ठाउँमा कम्प्युटर स्थापना नगर्नुहोस्।)


Microsoft Excel

Limitation of Excel: Maximum number of Row: 65,536(office 2003) and 1048576(office 2007) Maximum number of column: 256 (office 2003) and 163...