{"id":37526,"date":"2024-04-12T10:55:49","date_gmt":"2024-04-12T10:55:49","guid":{"rendered":"https:\/\/edukemy.com\/blog\/?p=37526"},"modified":"2024-04-12T10:55:51","modified_gmt":"2024-04-12T10:55:51","slug":"computers-upsc-science-technology-notes","status":"publish","type":"post","link":"https:\/\/edukemy.com\/blog\/computers-upsc-science-technology-notes\/","title":{"rendered":"Computers &#8211; UPSC Science &#038; Technology Notes"},"content":{"rendered":"\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/edukemy.com\/upsc\/upsc-cse-gs-integrated-course?utm_source=Blog&amp;utm_medium=Banner&amp;utm_campaign=GS+Integrated\" target=\"_blank\" rel=\"noreferrer noopener\"><img fetchpriority=\"high\" decoding=\"async\" width=\"1280\" height=\"300\" src=\"https:\/\/edukemy.com\/blog\/wp-content\/uploads\/2024\/06\/8.png\" alt=\"\" class=\"wp-image-42401\" srcset=\"https:\/\/edukemy.com\/blog\/wp-content\/uploads\/2024\/06\/8.png 1280w, https:\/\/edukemy.com\/blog\/wp-content\/uploads\/2024\/06\/8-1170x274.png 1170w, https:\/\/edukemy.com\/blog\/wp-content\/uploads\/2024\/06\/8-585x137.png 585w\" sizes=\"(max-width: 1280px) 100vw, 1280px\" \/><\/a><\/figure>\n\n\n\n<p>The evolution of computers began in the mid-20th century, progressing through various stages known as &#8220;computer generations.&#8221; Each generation brought significant advancements in size, price, precision, and speed, ultimately culminating in the sleek and powerful modern computers we use today.&nbsp;<\/p>\n\n\n\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_73 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<label for=\"ez-toc-cssicon-toggle-item-69d46fc590523\" class=\"ez-toc-cssicon-toggle-label\"><p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-cssicon\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/label><input type=\"checkbox\"  id=\"ez-toc-cssicon-toggle-item-69d46fc590523\"  \/><nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/edukemy.com\/blog\/computers-upsc-science-technology-notes\/#Lets_delve_into_the_distinct_generations_of_computers\" title=\"Let&#8217;s delve into the distinct generations of computers:&nbsp;\">Let&#8217;s delve into the distinct generations of computers:&nbsp;<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/edukemy.com\/blog\/computers-upsc-science-technology-notes\/#Supercomputers\" title=\"Supercomputers:&nbsp;&nbsp;\">Supercomputers:&nbsp;&nbsp;<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/edukemy.com\/blog\/computers-upsc-science-technology-notes\/#Key_Features_and_Operations_of_Supercomputers\" title=\"Key Features and Operations of Supercomputers&nbsp;\">Key Features and Operations of Supercomputers&nbsp;<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/edukemy.com\/blog\/computers-upsc-science-technology-notes\/#Historical_Milestones_in_Supercomputing\" title=\"Historical Milestones in Supercomputing&nbsp;\">Historical Milestones in Supercomputing&nbsp;<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/edukemy.com\/blog\/computers-upsc-science-technology-notes\/#Key_Milestones\" title=\"Key Milestones:&nbsp;\">Key Milestones:&nbsp;<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/edukemy.com\/blog\/computers-upsc-science-technology-notes\/#Contemporary_Supercomputers\" title=\"Contemporary Supercomputers&nbsp;\">Contemporary Supercomputers&nbsp;<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/edukemy.com\/blog\/computers-upsc-science-technology-notes\/#Supercomputer_in_India\" title=\"Supercomputer in India&nbsp;\">Supercomputer in India&nbsp;<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/edukemy.com\/blog\/computers-upsc-science-technology-notes\/#Supercomputing_Initiatives_in_India\" title=\"Supercomputing Initiatives in India&nbsp;\">Supercomputing Initiatives in India&nbsp;<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-9\" href=\"https:\/\/edukemy.com\/blog\/computers-upsc-science-technology-notes\/#Key_Developments\" title=\"Key Developments:&nbsp;\">Key Developments:&nbsp;<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-10\" href=\"https:\/\/edukemy.com\/blog\/computers-upsc-science-technology-notes\/#National_Supercomputing_Mission\" title=\"National Supercomputing Mission&nbsp;\">National Supercomputing Mission&nbsp;<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-11\" href=\"https:\/\/edukemy.com\/blog\/computers-upsc-science-technology-notes\/#Application_of_Supercomputer\" title=\"Application of Supercomputer:&nbsp;\">Application of Supercomputer:&nbsp;<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-12\" href=\"https:\/\/edukemy.com\/blog\/computers-upsc-science-technology-notes\/#Computer_Hardware_and_Software\" title=\"Computer Hardware and Software:&nbsp;\">Computer Hardware and Software:&nbsp;<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-13\" href=\"https:\/\/edukemy.com\/blog\/computers-upsc-science-technology-notes\/#Types_of_Computer_Hardware\" title=\"Types of Computer Hardware&nbsp;\">Types of Computer Hardware&nbsp;<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-14\" href=\"https:\/\/edukemy.com\/blog\/computers-upsc-science-technology-notes\/#Computer_Software\" title=\"Computer Software:&nbsp;&nbsp;\">Computer Software:&nbsp;&nbsp;<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-15\" href=\"https:\/\/edukemy.com\/blog\/computers-upsc-science-technology-notes\/#Types_of_Computer_Software\" title=\"Types of Computer Software&nbsp;\">Types of Computer Software&nbsp;<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-16\" href=\"https:\/\/edukemy.com\/blog\/computers-upsc-science-technology-notes\/#Internet\" title=\"Internet&nbsp;\">Internet&nbsp;<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-17\" href=\"https:\/\/edukemy.com\/blog\/computers-upsc-science-technology-notes\/#Objectives_of_the_Internet\" title=\"Objectives of the Internet:&nbsp;\">Objectives of the Internet:&nbsp;<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-18\" href=\"https:\/\/edukemy.com\/blog\/computers-upsc-science-technology-notes\/#Transmission_Control_ProtocolInternet_Protocol_TCPIP\" title=\"Transmission Control Protocol\/Internet Protocol (TCP\/IP):&nbsp;\">Transmission Control Protocol\/Internet Protocol (TCP\/IP):&nbsp;<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-19\" href=\"https:\/\/edukemy.com\/blog\/computers-upsc-science-technology-notes\/#Understanding_Networks\" title=\"Understanding Networks&nbsp;\">Understanding Networks&nbsp;<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-20\" href=\"https:\/\/edukemy.com\/blog\/computers-upsc-science-technology-notes\/#Types_of_Networks\" title=\"Types of Networks:&nbsp;\">Types of Networks:&nbsp;<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-21\" href=\"https:\/\/edukemy.com\/blog\/computers-upsc-science-technology-notes\/#Internet_of_Things_IoT\" title=\"Internet of Things (IoT)&nbsp;\">Internet of Things (IoT)&nbsp;<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-22\" href=\"https:\/\/edukemy.com\/blog\/computers-upsc-science-technology-notes\/#How_IoT_Works\" title=\"How IoT Works:&nbsp;\">How IoT Works:&nbsp;<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-23\" href=\"https:\/\/edukemy.com\/blog\/computers-upsc-science-technology-notes\/#The_fundamental_attributes_of_IoT_are_outlined_below\" title=\"The fundamental attributes of IoT are outlined below:&nbsp;\">The fundamental attributes of IoT are outlined below:&nbsp;<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-24\" href=\"https:\/\/edukemy.com\/blog\/computers-upsc-science-technology-notes\/#Diverse_Applications_of_Internet_of_Things\" title=\"Diverse Applications of Internet of Things&nbsp;\">Diverse Applications of Internet of Things&nbsp;<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-25\" href=\"https:\/\/edukemy.com\/blog\/computers-upsc-science-technology-notes\/#Importance_of_Blockchain\" title=\"Importance of Blockchain:&nbsp;\">Importance of Blockchain:&nbsp;<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-26\" href=\"https:\/\/edukemy.com\/blog\/computers-upsc-science-technology-notes\/#Essential_Elements_of_Blockchain_Technology\" title=\"Essential Elements of Blockchain Technology:&nbsp;\">Essential Elements of Blockchain Technology:&nbsp;<\/a><ul class='ez-toc-list-level-4' ><li class='ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-27\" href=\"https:\/\/edukemy.com\/blog\/computers-upsc-science-technology-notes\/#1_Distributed_Ledger\" title=\"1. Distributed Ledger:&nbsp;\">1. Distributed Ledger:&nbsp;<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-28\" href=\"https:\/\/edukemy.com\/blog\/computers-upsc-science-technology-notes\/#2_Smart_Contracts\" title=\"2. Smart Contracts:&nbsp;\">2. Smart Contracts:&nbsp;<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-29\" href=\"https:\/\/edukemy.com\/blog\/computers-upsc-science-technology-notes\/#3_Public_Key_Cryptography\" title=\"3. Public Key Cryptography:&nbsp;\">3. Public Key Cryptography:&nbsp;<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-30\" href=\"https:\/\/edukemy.com\/blog\/computers-upsc-science-technology-notes\/#4_Blockchain_Structure_and_Design\" title=\"4. Blockchain Structure and Design:&nbsp;\">4. Blockchain Structure and Design:&nbsp;<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-31\" href=\"https:\/\/edukemy.com\/blog\/computers-upsc-science-technology-notes\/#5_Blocks\" title=\"5. Blocks:&nbsp;\">5. Blocks:&nbsp;<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-32\" href=\"https:\/\/edukemy.com\/blog\/computers-upsc-science-technology-notes\/#6_Block_Time\" title=\"6. Block Time:&nbsp;\">6. Block Time:&nbsp;<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-33\" href=\"https:\/\/edukemy.com\/blog\/computers-upsc-science-technology-notes\/#7_Hard_Forks\" title=\"7. Hard Forks:&nbsp;\">7. Hard Forks:&nbsp;<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-34\" href=\"https:\/\/edukemy.com\/blog\/computers-upsc-science-technology-notes\/#8_Decentralization\" title=\"8. Decentralization:&nbsp;\">8. Decentralization:&nbsp;<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-35\" href=\"https:\/\/edukemy.com\/blog\/computers-upsc-science-technology-notes\/#9_Finality\" title=\"9. Finality:&nbsp;\">9. Finality:&nbsp;<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-36\" href=\"https:\/\/edukemy.com\/blog\/computers-upsc-science-technology-notes\/#10_Openness\" title=\"10. Openness:&nbsp;\">10. Openness:&nbsp;<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-37\" href=\"https:\/\/edukemy.com\/blog\/computers-upsc-science-technology-notes\/#11_Public_Blockchain\" title=\"11. Public Blockchain:&nbsp;\">11. Public Blockchain:&nbsp;<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-38\" href=\"https:\/\/edukemy.com\/blog\/computers-upsc-science-technology-notes\/#Components_of_Blockchain_Technology\" title=\"Components of Blockchain Technology:&nbsp;&nbsp;\">Components of Blockchain Technology:&nbsp;&nbsp;<\/a><ul class='ez-toc-list-level-4' ><li class='ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-39\" href=\"https:\/\/edukemy.com\/blog\/computers-upsc-science-technology-notes\/#Secure_Digital_Identity\" title=\"Secure Digital Identity:\u00a0\">Secure Digital Identity:\u00a0<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-40\" href=\"https:\/\/edukemy.com\/blog\/computers-upsc-science-technology-notes\/#Peer_Consensus\" title=\"Peer Consensus:\u00a0\">Peer Consensus:\u00a0<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-41\" href=\"https:\/\/edukemy.com\/blog\/computers-upsc-science-technology-notes\/#Mathematical_Validation\" title=\"Mathematical Validation:\u00a0\">Mathematical Validation:\u00a0<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-42\" href=\"https:\/\/edukemy.com\/blog\/computers-upsc-science-technology-notes\/#Types_of_Blockchain_Networks\" title=\"Types of Blockchain Networks&nbsp;\">Types of Blockchain Networks&nbsp;<\/a><ul class='ez-toc-list-level-4' ><li class='ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-43\" href=\"https:\/\/edukemy.com\/blog\/computers-upsc-science-technology-notes\/#1_Private_Blockchain_Networks\" title=\"1. Private Blockchain Networks:&nbsp;\">1. Private Blockchain Networks:&nbsp;<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-44\" href=\"https:\/\/edukemy.com\/blog\/computers-upsc-science-technology-notes\/#2_Public_Blockchain_Networks\" title=\"2. Public Blockchain Networks:&nbsp;\">2. Public Blockchain Networks:&nbsp;<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-45\" href=\"https:\/\/edukemy.com\/blog\/computers-upsc-science-technology-notes\/#3_Permissioned_Blockchain_Networks\" title=\"3. Permissioned Blockchain Networks:&nbsp;\">3. Permissioned Blockchain Networks:&nbsp;<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-46\" href=\"https:\/\/edukemy.com\/blog\/computers-upsc-science-technology-notes\/#4_Consortium_Blockchains\" title=\"4. Consortium Blockchains:&nbsp;\">4. Consortium Blockchains:&nbsp;<\/a><ul class='ez-toc-list-level-4' ><li class='ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-47\" href=\"https:\/\/edukemy.com\/blog\/computers-upsc-science-technology-notes\/#5_Hybrid_Blockchains\" title=\"5. Hybrid Blockchains:&nbsp;\">5. Hybrid Blockchains:&nbsp;<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-48\" href=\"https:\/\/edukemy.com\/blog\/computers-upsc-science-technology-notes\/#6_Sidechains\" title=\"6. Sidechains:&nbsp;\">6. Sidechains:&nbsp;<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-49\" href=\"https:\/\/edukemy.com\/blog\/computers-upsc-science-technology-notes\/#7_Blockchain_Layers\" title=\"7. Blockchain Layers:&nbsp;\">7. Blockchain Layers:&nbsp;<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-50\" href=\"https:\/\/edukemy.com\/blog\/computers-upsc-science-technology-notes\/#Application_of_Blockchain_Management\" title=\"Application of Blockchain Management:\u00a0\">Application of Blockchain Management:\u00a0<\/a><ul class='ez-toc-list-level-4' ><li class='ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-51\" href=\"https:\/\/edukemy.com\/blog\/computers-upsc-science-technology-notes\/#Smart_Contracts\" title=\"Smart Contracts:&nbsp;\">Smart Contracts:&nbsp;<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-52\" href=\"https:\/\/edukemy.com\/blog\/computers-upsc-science-technology-notes\/#Supply_Chain_Management\" title=\"Supply Chain Management:&nbsp;\">Supply Chain Management:&nbsp;<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-53\" href=\"https:\/\/edukemy.com\/blog\/computers-upsc-science-technology-notes\/#Asset_Protection\" title=\"Asset Protection:&nbsp;\">Asset Protection:&nbsp;<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-54\" href=\"https:\/\/edukemy.com\/blog\/computers-upsc-science-technology-notes\/#Personal_Identification\" title=\"Personal Identification:&nbsp;\">Personal Identification:&nbsp;<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-55\" href=\"https:\/\/edukemy.com\/blog\/computers-upsc-science-technology-notes\/#Payment_Processing\" title=\"Payment Processing:&nbsp;\">Payment Processing:&nbsp;<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-56\" href=\"https:\/\/edukemy.com\/blog\/computers-upsc-science-technology-notes\/#Crowdfunding\" title=\"Crowdfunding:&nbsp;\">Crowdfunding:&nbsp;<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-57\" href=\"https:\/\/edukemy.com\/blog\/computers-upsc-science-technology-notes\/#Governance\" title=\"Governance:&nbsp;\">Governance:&nbsp;<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-58\" href=\"https:\/\/edukemy.com\/blog\/computers-upsc-science-technology-notes\/#Insurance\" title=\"Insurance:&nbsp;\">Insurance:&nbsp;<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-59\" href=\"https:\/\/edukemy.com\/blog\/computers-upsc-science-technology-notes\/#Healthcare\" title=\"Healthcare:&nbsp;\">Healthcare:&nbsp;<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-60\" href=\"https:\/\/edukemy.com\/blog\/computers-upsc-science-technology-notes\/#Automotive\" title=\"Automotive:&nbsp;\">Automotive:&nbsp;<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-61\" href=\"https:\/\/edukemy.com\/blog\/computers-upsc-science-technology-notes\/#Tourism\" title=\"Tourism:&nbsp;\">Tourism:&nbsp;<\/a><\/li><\/ul><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-62\" href=\"https:\/\/edukemy.com\/blog\/computers-upsc-science-technology-notes\/#Cyber_Security\" title=\"Cyber Security&nbsp;\">Cyber Security&nbsp;<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-63\" href=\"https:\/\/edukemy.com\/blog\/computers-upsc-science-technology-notes\/#Motives_behind_Cyber_Attacks\" title=\"Motives behind Cyber Attacks&nbsp;\">Motives behind Cyber Attacks&nbsp;<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-64\" href=\"https:\/\/edukemy.com\/blog\/computers-upsc-science-technology-notes\/#Various_Cyber_Attacks\" title=\"Various Cyber Attacks:&nbsp;\">Various Cyber Attacks:&nbsp;<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-65\" href=\"https:\/\/edukemy.com\/blog\/computers-upsc-science-technology-notes\/#Cyber_warfare\" title=\"Cyber warfare&nbsp;\">Cyber warfare&nbsp;<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-66\" href=\"https:\/\/edukemy.com\/blog\/computers-upsc-science-technology-notes\/#Key_Types_of_Cyber_Warfare_Attacks\" title=\"Key Types of Cyber Warfare Attacks:\u00a0\">Key Types of Cyber Warfare Attacks:\u00a0<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-67\" href=\"https:\/\/edukemy.com\/blog\/computers-upsc-science-technology-notes\/#Challenges_Posed_by_Cyber_Attacks\" title=\"Challenges Posed by Cyber Attacks:&nbsp;\">Challenges Posed by Cyber Attacks:&nbsp;<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-68\" href=\"https:\/\/edukemy.com\/blog\/computers-upsc-science-technology-notes\/#Cyber_Security_Initiatives_in_India\" title=\"Cyber Security Initiatives in India:&nbsp;&nbsp;\">Cyber Security Initiatives in India:&nbsp;&nbsp;<\/a><ul class='ez-toc-list-level-4' ><li class='ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-69\" href=\"https:\/\/edukemy.com\/blog\/computers-upsc-science-technology-notes\/#1_National_Cyber_Security_Policy\" title=\"1. National Cyber Security Policy:&nbsp;\">1. National Cyber Security Policy:&nbsp;<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-70\" href=\"https:\/\/edukemy.com\/blog\/computers-upsc-science-technology-notes\/#2_Cyber_Surakshit_Bharat_Initiative\" title=\"2. Cyber Surakshit Bharat Initiative:&nbsp;\">2. Cyber Surakshit Bharat Initiative:&nbsp;<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-71\" href=\"https:\/\/edukemy.com\/blog\/computers-upsc-science-technology-notes\/#3_Indian_Cyber_Crime_Coordination_Centre_I4C\" title=\"3. Indian Cyber Crime Coordination Centre (I4C):&nbsp;\">3. Indian Cyber Crime Coordination Centre (I4C):&nbsp;<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-72\" href=\"https:\/\/edukemy.com\/blog\/computers-upsc-science-technology-notes\/#4_Cyber_Swachhta_Kendra_Botnet_Cleaning_and_Malware_Analysis_Centre\" title=\"4. Cyber Swachhta Kendra (Botnet Cleaning and Malware Analysis Centre):&nbsp;\">4. Cyber Swachhta Kendra (Botnet Cleaning and Malware Analysis Centre):&nbsp;<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-73\" href=\"https:\/\/edukemy.com\/blog\/computers-upsc-science-technology-notes\/#5_Computer_Emergency_Response_Team_%E2%80%93_India_CERT-In\" title=\"5. Computer Emergency Response Team &#8211; India (CERT-In):&nbsp;\">5. Computer Emergency Response Team &#8211; India (CERT-In):&nbsp;<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-74\" href=\"https:\/\/edukemy.com\/blog\/computers-upsc-science-technology-notes\/#6_Critical_Information_Infrastructure_CII_Protection\" title=\"6. Critical Information Infrastructure (CII) Protection:&nbsp;\">6. Critical Information Infrastructure (CII) Protection:&nbsp;<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-75\" href=\"https:\/\/edukemy.com\/blog\/computers-upsc-science-technology-notes\/#7_Defence_Cyber_Agency_DCyA\" title=\"7. Defence Cyber Agency (DCyA):&nbsp;\">7. Defence Cyber Agency (DCyA):&nbsp;<\/a><\/li><\/ul><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-76\" href=\"https:\/\/edukemy.com\/blog\/computers-upsc-science-technology-notes\/#FAQs\" title=\"FAQs\">FAQs<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-77\" href=\"https:\/\/edukemy.com\/blog\/computers-upsc-science-technology-notes\/#Q_What_is_a_computer\" title=\"Q: What is a computer?\">Q: What is a computer?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-78\" href=\"https:\/\/edukemy.com\/blog\/computers-upsc-science-technology-notes\/#Q_What_are_the_main_components_of_a_computer\" title=\"Q: What are the main components of a computer?\">Q: What are the main components of a computer?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-79\" href=\"https:\/\/edukemy.com\/blog\/computers-upsc-science-technology-notes\/#Q_What_is_an_operating_system\" title=\"Q: What is an operating system?\">Q: What is an operating system?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-80\" href=\"https:\/\/edukemy.com\/blog\/computers-upsc-science-technology-notes\/#Q_What_is_the_difference_between_hardware_and_software\" title=\"Q: What is the difference between hardware and software?\">Q: What is the difference between hardware and software?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-81\" href=\"https:\/\/edukemy.com\/blog\/computers-upsc-science-technology-notes\/#Q_What_is_the_cloud\" title=\"Q: What is the cloud?\">Q: What is the cloud?<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-82\" href=\"https:\/\/edukemy.com\/blog\/computers-upsc-science-technology-notes\/#In_case_you_still_have_your_doubts_contact_us_on_9811333901\" title=\"In case you still have your doubts, contact us on 9811333901.&nbsp;\">In case you still have your doubts, contact us on 9811333901.&nbsp;<\/a><ul class='ez-toc-list-level-4' ><li class='ez-toc-heading-level-4'><ul class='ez-toc-list-level-4' ><li class='ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-83\" href=\"https:\/\/edukemy.com\/blog\/computers-upsc-science-technology-notes\/#Visit_our_YouTube_Channel_%E2%80%93_here\" title=\"Visit our YouTube Channel &#8211;&nbsp;here\">Visit our YouTube Channel &#8211;&nbsp;here<\/a><\/li><\/ul><\/li><\/ul><\/li><\/ul><\/nav><\/div>\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Lets_delve_into_the_distinct_generations_of_computers\"><\/span><strong>Let&#8217;s delve into the distinct generations of computers:<\/strong>&nbsp;<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p><strong>First Generation Computers (1940-1956):<\/strong> The earliest computers were massive and cumbersome machines, occupying entire rooms and consuming considerable amounts of electricity. They lacked an operating system and programming was challenging due to their reliance on high-level languages. Powered by fragile vacuum tubes, they were primarily used for calculations, storage, and control tasks. Iconic first-generation computers include ENIAC, EVAC, and UNIVAC.&nbsp;<\/p>\n\n\n\n<p><strong>Second Generation Computers (1956 \u2013 1963):<\/strong> The second generation saw a transition from bulky vacuum tubes to more efficient transistor technology. These computers were smaller in size, consumed less energy, and performed better than their predecessors. Notable examples include IBM 1920, IBM 7094, and CDC 3600.&nbsp;<\/p>\n\n\n\n<p><strong>Third Generation Computers (1964 \u2013 1971):<\/strong> During the third generation, transistors were replaced by Integrated Circuits (ICs), enhancing efficiency and reliability. Computers became more compact and capable, marking a significant advancement in computing technology. Prominent examples include CDC 1700 and the IBM 360 Series.&nbsp;<\/p>\n\n\n\n<p><strong>Fourth Generation Computers (1971 \u2013 Present):<\/strong> The fourth generation witnessed the advent of Very Large Scale Integrated (VLSI) Circuits, or microprocessors. Microprocessor chips, consisting of thousands of integrated circuits on a single silicon chip, revolutionized computing. Personal computers (PCs) became more prevalent during this era. Noteworthy examples include Apple and the CRAY-1 supercomputer.&nbsp;<\/p>\n\n\n\n<p><strong>Fifth Generation Computers (Present and Beyond): <\/strong>The fifth generation is characterized by the integration of artificial intelligence (AI) into computing systems. AI enables computers to mimic human thought processes and behaviors, paving the way for innovative applications and advancements. Research in this field continues to evolve, with notable examples such as PARAM 10000 and IBM notebooks leading the way.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Supercomputers\"><\/span><strong>Supercomputers:&nbsp;<\/strong>&nbsp;<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Supercomputers represent the pinnacle of computing prowess, designed to tackle intricate computational challenges with unparalleled efficiency. They harness multiple central processing units (CPUs) to divide tasks into smaller segments and process them concurrently, resulting in lightning-fast computations. The performance of supercomputers is quantified in terms of floating-point operations per second (FLOPs).&nbsp;<\/p>\n\n\n\n<p>Supercomputers serve both general and specialized purposes, exemplified by Belle, Hydra, and Deep Blue, the chess-playing marvels.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Key_Features_and_Operations_of_Supercomputers\"><\/span><strong>Key Features and Operations of Supercomputers<\/strong>&nbsp;<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Supercomputers boast several distinctive features distinguishing them from conventional computers:&nbsp;<\/p>\n\n\n\n<ol class=\"wp-block-list\"><li><strong>Multiple CPUs:<\/strong> Supercomputers integrate multiple CPUs to enhance computational power.\u00a0<\/li><li><strong>Speed: <\/strong>They support high CPU computation speeds, critical for complex calculations.\u00a0<\/li><li><strong>Storage:<\/strong> Supercomputers offer vast storage capacity, enabling swift retrieval of data and instructions.\u00a0<\/li><li><strong>Vector Arithmetic:<\/strong> Leveraging Vector Arithmetic, they process pairs of number lists for enhanced efficiency.\u00a0<\/li><li><strong>Multi-User Access:<\/strong> Supercomputers facilitate simultaneous access for multiple users.\u00a0<\/li><\/ol>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Historical_Milestones_in_Supercomputing\"><\/span><strong>Historical Milestones in Supercomputing<\/strong>&nbsp;<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>The journey of supercomputing began in the late 1950s, fueled by consistent U.S. government funding for high-performance computing, primarily for military applications.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Key_Milestones\"><\/span><strong>Key Milestones:<\/strong>&nbsp;<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<ul class=\"wp-block-list\"><li>1976: Introduction of the Cray-1, pioneering vector processing.&nbsp;<\/li><li>1985: Cray-2, the first computer to surpass one billion FLOPS with four processors.&nbsp;<\/li><li>Roadrunner, built by IBM, exceeding 1,000 TFLOPS or 1 petaFLOPS.&nbsp;<\/li><\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Contemporary_Supercomputers\"><\/span><strong>Contemporary Supercomputers<\/strong>&nbsp;<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Presently, IBM Summit holds the distinction of the world&#8217;s fastest supercomputer, as per the TOP500 list. Close behind is Sierra, another American supercomputer boasting a peak speed of 125 petaFLOPS. <strong><em>Notable supercomputers include Sunway TaihuLight in Wuxi (China), Tianhe-2 in Guangzhou (China), Dell Frontera in Austin (USA), Piz Daint in Lugano (Switzerland), and AI Bridging Cloud Infrastructure (ABCI) in Tokyo (Japan). <\/em><\/strong>The United States leads the top 10 rankings with five supercomputers, followed by China with two.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Supercomputer_in_India\"><\/span><strong>Supercomputer in India<\/strong>&nbsp;<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>In 1987, India&#8217;s quest for acquiring the Cray X-MP from the USA for academic and weather forecasting purposes was denied, prompting the nation to embark on its own supercomputing journey.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Supercomputing_Initiatives_in_India\"><\/span><strong>Supercomputing Initiatives in India<\/strong>&nbsp;<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Several agencies spearheaded India&#8217;s supercomputing endeavors, including the Centre for Development of Advanced Computing (C-DAC), Centre for Development of Telematics (C-DOT), National Aerospace Laboratories (NAL), Bhabha Atomic Research Centre (BARC), and Advanced Numerical Research and Analysis Group (ANURAG).&nbsp;&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Key_Developments\"><\/span><strong>Key Developments:<\/strong>&nbsp;<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<ul class=\"wp-block-list\"><li>C-DOT engineered &#8220;CHIPPS,&#8221; a high-performance Parallel Processing System.\u00a0<\/li><li>BARC pioneered the Anupam series of supercomputers.\u00a0<\/li><li>ANURAG developed the PACE series of supercomputers. Param Series: The PARAM supercomputers, crafted by the Centre for Development of Advanced Computing (C-DAC) in Pune, India, stand as flagship innovations.\u00a0<\/li><li>&#8220;PARAM&#8221; derives from Sanskrit, signifying &#8220;supreme&#8221; and serving as an acronym for &#8220;PARAllelMachine.&#8221;\u00a0<\/li><li>The PARAM 8000, introduced in 1991, marked C-DAC&#8217;s success in delivering a gigaFLOPS range parallel computer.\u00a0<\/li><li>In 1993, the PARAM 9000 series debuted, boasting a peak computing power of 5 GFLOPS.\u00a0<\/li><li>By 1998, the PARAM 10000 series showcased a sustained performance of 38 GFLOPS on the LINPACK benchmark.\u00a0<\/li><li>The AI Supercomputer &#8216;AIRAWAT&#8217; and PARAM Siddhi \u2013 AI presently stand as India&#8217;s fastest supercomputers, with AIRAWAT ranking 75th globally as of June 2023.\u00a0<\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"National_Supercomputing_Mission\"><\/span><strong>National Supercomputing Mission<\/strong>&nbsp;<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>In 2015, the Ministry of Electronics and Information Technology unveiled the &#8220;National Supercomputing Mission&#8221; (NSM), aimed at deploying 73 indigenous supercomputers across India by 2022.&nbsp;<\/p>\n\n\n\n<p>Objectives: The NSM seeks to establish a network of high-performance computing centres interconnected by the National Knowledge Network (NKN), fostering collaboration and innovation. It endeavors to bolster India&#8217;s capabilities in high-performance computing, empowering academic and research institutions to excel in their domains.&nbsp;&nbsp;<\/p>\n\n\n\n<p>Key Features:&nbsp;&nbsp;<\/p>\n\n\n\n<p>Infrastructure: The mission entails setting up high-performance computing centres, including the installation of three petascale supercomputers.&nbsp;&nbsp;<\/p>\n\n\n\n<p>Financial Commitment: With a budget of $730 million (Rs. 4,500 crores) over seven years, the NSM reflects a substantial investment in elevating India&#8217;s supercomputing prowess.&nbsp;&nbsp;<\/p>\n\n\n\n<p>Indigenous Development: The mission emphasizes indigenous production of all components, promoting self-reliance and technological autonomy.&nbsp;&nbsp;<\/p>\n\n\n\n<p>Implementing Partners: The Centre for Development of Advanced Computing (C-DAC) and the Indian Institute of Science are spearheading the mission&#8217;s execution.&nbsp;&nbsp;<\/p>\n\n\n\n<p>Milestones: In 2020, PARAM Shivay, India&#8217;s inaugural supercomputer under the NSM, was inaugurated at IIT, BHU. Noteworthy installations include PARAM Pravega (IISc, Bangalore), PARAM Utkarsh (C-DAC, Bangalore), PARAM Ananta (IIT, Gandhinagar), PARAM Himalaya (IIT, Mandi), PARAM Siddhi-AI (C-DAC, Pune), and the PARAM Vidya series.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Application_of_Supercomputer\"><\/span><strong>Application of Supercomputer:<\/strong>&nbsp;<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Supercomputers serve a multitude of purposes across various fields, demonstrating their versatility and impact:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Weather Forecasting and Climate Research: <\/strong>By assimilating data from satellites, radars, and weather balloons, supercomputers empower meteorologists to predict atmospheric conditions accurately. The Derecho supercomputer, for instance, explores the effects of solar geoengineering on rainfall patterns.&nbsp;<\/li><li><strong>Genome Sequencing: <\/strong>Supercomputers enable rapid DNA sequencing, aiding scientists in diagnosing diseases swiftly. Stanford University researchers achieved the Guinness World Record for the fastest genomic sequencing.&nbsp;<\/li><li><strong>Aviation Engineering:<\/strong> In aviation, supercomputers predict solar flares, turbulence, and aeroelasticity, enhancing aircraft design. Frontier, partnered with GE Aerospace, tests open fan engine architecture to reduce carbon emissions.&nbsp;<\/li><li><strong>Space Exploration:<\/strong> Utilizing data from satellites and telescopes, supercomputers simulate outer space conditions, aiding NASA in mission preparations for the Artemis moon program.&nbsp;<\/li><li><strong>Nuclear Fusion Research:<\/strong> Supercomputers simulate plasma conditions in tokamak research, optimizing energy loss and performance. Projects led by General Atomics benefit from simulations on Frontier and Summit.&nbsp;<\/li><li><strong>Oil and Gas Exploration:<\/strong> Supercomputers process seismic data to identify and develop oil reserves efficiently.&nbsp;<\/li><li><strong>Military and Defense: <\/strong>Supercomputing facilitates virtual testing of nuclear explosions and ballistic weapons, enhancing military readiness.&nbsp;<\/li><li><strong>Smog Prediction:<\/strong> Scientists utilize supercomputers to forecast pollution and smog levels accurately, aiding in environmental research.&nbsp;<\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Computer_Hardware_and_Software\"><\/span><strong>Computer Hardware and Software:<\/strong>&nbsp;<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Computer hardware and software are integral components of a computer system, working together to make it functional and compatible with user needs. Let&#8217;s explore the fundamental distinctions between computer hardware and computer software.&nbsp;<\/p>\n\n\n\n<p><strong>Computer Hardware:<\/strong> The Physical Components Computer hardware encompasses the tangible components of a computer system. It includes electronic devices that can be physically touched and manipulated. Examples of computer hardware include the processor, memory devices, monitor, printer, keyboard, mouse, and central processing unit (CPU).&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Types_of_Computer_Hardware\"><\/span><strong>Types of Computer Hardware<\/strong>&nbsp;<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<ol class=\"wp-block-list\"><li>Input Devices: Input devices facilitate user interaction with the computer by entering data and information. Common input devices include keyboards, mice, and scanners.\u00a0<\/li><li>Output Devices: Output devices display the results of user tasks. Monitors, printers, and speakers are typical output devices.\u00a0<\/li><li>Storage Devices: Storage devices store data and are also referred to as secondary storage devices. Examples include CDs, DVDs, and hard disks.\u00a0<\/li><li>Internal Components: Internal components are essential hardware devices within the system, such as the CPU and motherboard.\u00a0<\/li><\/ol>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Computer_Software\"><\/span><strong>Computer Software:&nbsp;<\/strong>&nbsp;<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Instructions and Procedures Software comprises a collection of instructions, procedures, and documentation that perform various tasks on a computer system. It is executed on a computer processor, encompassing machine-level code or code written for an operating system. Examples of software include MS-Word, Excel, Google Chrome, and Photoshop.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Types_of_Computer_Software\"><\/span><strong>Types of Computer Software<\/strong>&nbsp;<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<ol class=\"wp-block-list\"><li>System Software: System software directly interacts with computer hardware, controlling internal functions and hardware devices like printers and storage devices. Operating systems, language processors, and device drivers are examples of system software.\u00a0<\/li><li>Application Software: Application software serves specific user tasks and includes word processors, spreadsheets, and other productivity tools. Types of application software range from general-purpose to customized solutions.\u00a0<\/li><\/ol>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Internet\"><\/span><strong>Internet<\/strong>&nbsp;<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>The Internet stands as the largest global network, connecting computers and servers worldwide through routers and switches. Functioning akin to home or office networks but on an immense scale, it interlinks millions of computers, routers, and switches. Comprising various computer networks, the Internet binds LANs, WANs, and individual computers, earning its moniker as the Information Superhighway. The Internet serves as a vast repository of information, enabling access to diverse content from any location, at any time. From downloading research papers, sending emails, streaming movies, to online banking and e-commerce, the Internet facilitates myriad activities. <strong><em>Accessing the Internet necessitates connection through an Internet Service Provider (ISP), and each computer on the network is referred to as a host. <\/em><\/strong>ISPs, offering permanent Internet connections, charge users for access to the Internet.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Objectives_of_the_Internet\"><\/span><strong>Objectives of the Internet:<\/strong>&nbsp;<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<ul class=\"wp-block-list\"><li>Communication: Facilitating seamless communication between individuals and groups.&nbsp;<\/li><li>Information Access: Providing access to a wealth of valuable information.&nbsp;&nbsp;<\/li><li>E-commerce: Enabling online transactions for goods and services.&nbsp;&nbsp;<\/li><li>Community Building: Fostering a sense of community and collaboration among diverse individuals.&nbsp;&nbsp;<\/li><li>Integration: Integrating the physical and digital worlds. Utilization Optimization: Coordinating and optimizing resource utilization.&nbsp;&nbsp;<\/li><li>Content Sharing: Facilitating the exchange of text, images, sounds, videos, and data. Global Connectivity: Promoting global information sharing and communication.&nbsp;<\/li><li>Advancement: Driving progress in science, medicine, engineering, design, and defense.&nbsp;<\/li><li>Educational and Entertainment: Offering both academic and entertainment content.&nbsp;&nbsp;<\/li><\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Transmission_Control_ProtocolInternet_Protocol_TCPIP\"><\/span><strong>Transmission Control Protocol\/Internet Protocol (TCP\/IP):<\/strong>&nbsp;<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>TCP\/IP is a communication protocol set utilized for connecting network devices to the Internet. It can also function as a private network communication protocol (intranet or extranet). <strong><em>TCP\/IP is a routable protocol that determines the most efficient data transmission path. <\/em><\/strong>Comprising a suite of protocols, TCP\/IP governs data exchange over the Internet, addressing, routing, and packet transmission. It ensures network reliability by automatically recovering from device failures. <strong><em>The main protocols in TCP\/IP, TCP and IP, respectively govern communication channel establishment and packet addressing and routing.<\/em><\/strong> TCP\/IP&#8217;s non-proprietary nature fosters flexibility and adaptability, as it is not controlled by a single entity.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Understanding_Networks\"><\/span><strong>Understanding Networks<\/strong>&nbsp;<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>A network refers to the pathways through which information circulates within an organization, defining its communication patterns. It serves as the conduit for employees to relay information to one another, comprising both formal and informal channels. Formal networks adhere to task-oriented communication and follow hierarchical chains of authority. In contrast, informal networks, often termed the grapevine, traverse various directions, bypassing authority levels, and meeting social as well as task-related needs. Networks form the fundamental infrastructure of modern business, facilitating activities ranging from internet access to document printing and email attachment downloads. They span from small-scale setups in single rooms to vast networks linking millions of devices globally, categorized by purpose and scale.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Types_of_Networks\"><\/span><strong>Types of Networks:<\/strong>&nbsp;<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<ol class=\"wp-block-list\"><li><strong>Personal Area Network (PAN): <\/strong>PANs represent the simplest network form, typically encompassing a wireless modem, a few devices like computers, phones, or printers, and centered around a single user in a localized setting. Commonly found in homes or small offices, PANs are managed by individuals or organizations using a single device. Thomas Zimmerman pioneered the concept of the Personal Area Network. PANs are classified into:\u00a0<ul><li>Wireless Personal Area Network: Utilizing wireless technologies like WiFi and Bluetooth with a limited range.\u00a0<\/li><li>Wired Personal Area Network: Employing USB connections to establish a wired network.\u00a0<\/li><\/ul><\/li><li><strong>Local Area Network (LAN): <\/strong>Designed for small-scale environments such as offices, clusters of buildings, or factories, LANs are simple to set up and troubleshoot. They interconnect personal computers and workstations within a defined physical area. LANs range from basic setups linking two computers to complex infrastructures spanning entire buildings. Common uses of LANs include resource sharing like printers and shared drives. These private networks operate at relatively high speeds compared to wide area networks (WANs). Various Media Access Control methods like Ethernet and Token Ring are employed in LANs. They unite computers within a specific geographic zone, whether it&#8217;s a building, block, or campus.\u00a0<\/li><li><strong>Campus Area Network (CAN): <\/strong>CANs are prevalent in universities, large K-12 school districts, and small businesses. They are larger than LANs but smaller than Metropolitan Area Networks (MANs). Distributed across multiple close buildings, CANs enable resource sharing among users.\u00a0<\/li><li><strong>Metropolitan Area Network (MAN): <\/strong>Emerging in the 1980s, MANs serve as larger versions of LANs. Employing similar technology, MANs cover entire cities. They interconnect several LANs or use a single cable. Primarily owned by private or public entities, MANs cater to towns and cities up to 50 km.\u00a0<\/li><li><strong>Wide Area Network (WAN): <\/strong>WANs can be private or public leased networks, covering vast areas like states within a country. Designing and maintaining WANs is challenging. PSTN or satellite links are typical communication mediums. WANs span long distances, from states to continents, using satellites and public telephone networks linked by routers.\u00a0<\/li><li><strong>Wireless Local Area Network (WLAN): <\/strong>Functioning akin to LANs, WLANs utilize wireless technology like Wi-Fi. Devices communicate wirelessly instead of through physical cables. Wi-Fi stands out as the most common WLAN example.\u00a0<\/li><li><strong>Storage Area Network (SAN): <\/strong>SANs are high-speed networks linking storage devices to multiple servers. Independent of LANs or WANs, SANs establish their robust network. They facilitate block-level data storage access, forming networks of discs accessed by server networks.\u00a0<\/li><li><strong>System Area Network (SAN): <\/strong>A System Area Network (SAN) links a cluster of high-performance computers. It boasts high bandwidth and a connection-oriented setup. SANs efficiently handle substantial data volumes and large requests. They excel in applications demanding top-notch network performance. For instance, Microsoft SQL Server 2005 interfaces with SAN through a virtual interface adapter.\u00a0<\/li><li><strong>Passive Optical Local Area Network (POLAN): <\/strong>POLAN operates akin to a LAN but integrates optical technology. It eases concerns regarding traditional Ethernet protocols and network applications like PoE (Power over Ethernet). By splitting an optical signal from a single strand of single-mode optical fiber into multiple signals via optical splitters, POLAN distributes users and devices. It adopts a point-to-multipoint LAN architecture.\u00a0<\/li><li><strong>Enterprise Private Network (EPN): <\/strong>EPN serves businesses needing secure connections across multiple locations to share computer resources.\u00a0<\/li><li><strong>Virtual Private Network (VPN): <\/strong>VPN extends a private network over the internet, enabling users to send and receive data as if on a private network. It offers remote access via a virtual point-to-point connection, safeguarding users from malicious sources by ensuring a secure network connection.\u00a0<\/li><\/ol>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><a href=\"https:\/\/edukemy.com\/upsc\/upsc-csat?utm_source=Blog&amp;utm_medium=Banner&amp;utm_campaign=Blog+CSAT\" target=\"_blank\" rel=\"noreferrer noopener\"><img decoding=\"async\" width=\"1280\" height=\"300\" data-src=\"https:\/\/edukemy.com\/blog\/wp-content\/uploads\/2024\/06\/Attempt-our-Daily-Weekly-Current-Affairs-Quiz-now-6-1.png\" alt=\"\" class=\"wp-image-42381 lazyload\" data-srcset=\"https:\/\/edukemy.com\/blog\/wp-content\/uploads\/2024\/06\/Attempt-our-Daily-Weekly-Current-Affairs-Quiz-now-6-1.png 1280w, https:\/\/edukemy.com\/blog\/wp-content\/uploads\/2024\/06\/Attempt-our-Daily-Weekly-Current-Affairs-Quiz-now-6-1-1170x274.png 1170w, https:\/\/edukemy.com\/blog\/wp-content\/uploads\/2024\/06\/Attempt-our-Daily-Weekly-Current-Affairs-Quiz-now-6-1-585x137.png 585w\" data-sizes=\"(max-width: 1280px) 100vw, 1280px\" src=\"data:image\/gif;base64,R0lGODlhAQABAAAAACH5BAEKAAEALAAAAAABAAEAAAICTAEAOw==\" style=\"--smush-placeholder-width: 1280px; --smush-placeholder-aspect-ratio: 1280\/300;\" \/><\/a><\/figure><\/div>\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Internet_of_Things_IoT\"><\/span><strong>Internet of Things (IoT)<\/strong>&nbsp;<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>The Internet of Things (IoT) encompasses a network of physical objects embedded with sensors, software, and technology, enabling them to connect and exchange data via the internet. These objects vary from everyday household items to sophisticated industrial tools, all linked to the internet through embedded devices.&nbsp;<\/p>\n\n\n\n<p>IoT stands as one of the most rapidly evolving technologies, offering significant opportunities for individuals, communities, and governments. Here&#8217;s how IoT functions:&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"How_IoT_Works\"><\/span><strong>How IoT Works:<\/strong>&nbsp;<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<ol class=\"wp-block-list\"><li>Data Collection: IoT devices or sensors gather data from their surroundings, such as temperature and humidity, for further processing in the cloud.\u00a0<\/li><li>Data Transmission: The collected data is transmitted to the cloud via a Gateway, utilizing both cellular and satellite communication methods.\u00a0<\/li><li>Data Processing: In the cloud, the collected data undergoes processing to generate optimal responses. For instance, it may monitor the temperature range of an air conditioner.\u00a0<\/li><li>Data Visualization: Information and alerts are presented for proactive responses, ensuring effective monitoring and management.\u00a0<\/li><li>Data Analysis and Prediction: Through data analytics, the accumulated data is analyzed to offer actionable insights and predict future events. This can include forecasting potential machine malfunctions based on historical data.\u00a0<\/li><\/ol>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"The_fundamental_attributes_of_IoT_are_outlined_below\"><\/span><strong>The fundamental attributes of IoT are outlined below:<\/strong>&nbsp;<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<ol class=\"wp-block-list\"><li>Scalability: IoT systems possess the ability to scale up to accommodate a vast number of devices, making them suitable for a diverse array of applications, ranging from small-scale home automation to large-scale industrial setups. Projections suggest that globally, there will be 26.4 billion IoT devices in service by 2026.\u00a0<\/li><li>Connectivity: Connectivity serves as the foundation of IoT. Devices are interconnected through various communication protocols such as Wi-Fi, cellular networks, etc., enabling seamless communication and data sharing over the internet.\u00a0<\/li><li>Remote Accessibility: IoT devices can be remotely managed and controlled, allowing users to interact with them through various devices, including smartphones, via web applications.\u00a0<\/li><li>Customization: IoT offers personalized solutions tailored to meet the specific needs of diverse users, ensuring flexibility and adaptability in its applications.\u00a0<\/li><li>Real-Time Monitoring: IoT devices provide real-time data, enabling immediate responses and decision-making based on up-to-date information, enhancing efficiency and productivity.\u00a0<\/li><li>Interoperability: Standardized protocols and communication technologies promote interoperability among different IoT devices and platforms, facilitating seamless collaboration and integration.\u00a0<\/li><li>Sensor Integration: IoT devices are equipped with sensors capable of collecting data about their environment or specific parameters such as temperature, humidity, pressure, motion, light, and more, enabling comprehensive monitoring and analysis.<\/li><\/ol>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Diverse_Applications_of_Internet_of_Things\"><\/span><strong>Diverse Applications of Internet of Things<\/strong>&nbsp;<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>The Internet of Things (IoT) represents a versatile and burgeoning technology with wide-ranging applications across various vital sectors, profoundly influencing numerous aspects of human existence.&nbsp;<\/p>\n\n\n\n<ol class=\"wp-block-list\"><li>Smart Homes: Home automation systems, employing embedded systems, energy management, and climate adaptation technologies, streamline everyday tasks like regulating lights, controlling appliances, and adjusting thermostats for enhanced convenience and comfort.\u00a0<\/li><li>Health and Wellbeing (Internet of Medical Things):\u00a0<\/li><\/ol>\n\n\n\n<ul class=\"wp-block-list\"><li>IoT for Patients: Wearable devices and wirelessly connected gadgets such as fitness bands monitor health parameters like heart rate and oxygen saturation, facilitating personalized health tracking.&nbsp;<\/li><li>IoT for Doctors: Data from IoT devices aids physicians in crafting tailored treatment plans for patients, leveraging wearables and home monitoring equipment.&nbsp;<\/li><li>IoT for Hospitals: Sensor-equipped IoT devices track the real-time location of medical equipment, enhancing operational efficiency and resource management in healthcare facilities.&nbsp;<\/li><\/ul>\n\n\n\n<ol class=\"wp-block-list\" start=\"3\"><li>Smart Industry: Industrial IoT optimizes productivity through real-time data analytics and seamless automation, fostering enhanced output quality and efficiency within industrial settings, a pivotal aspect of Industry 4.0.\u00a0<\/li><li>Smart Energy: IoT-enabled smart grids empower consumers and governments to make informed decisions regarding energy consumption, promoting energy conservation and sustainability through advanced connectivity and communications.\u00a0<\/li><li>Smart Agriculture: Precision farming facilitated by IoT technologies optimizes agricultural operations by monitoring crucial parameters such as soil moisture and nutrients, enhancing crop management processes and bolstering productivity levels.<\/li><li>Smart Environment: IoT environmental sensors provide real-time data on factors like humidity, temperature, and pollutants, fostering informed decision-making and enabling effective climate modeling for enhanced environmental management.\u00a0<\/li><li>IoT in Disaster Management: IoT technologies aid in hazard mapping and early warning systems, facilitating timely responses and effective disaster mitigation strategies, as demonstrated by systems like the National Advanced Seismic System in the United States.\u00a0<\/li><li>Smart Water Monitoring: Sensor-based IoT devices deployed under initiatives like the National Jal Jeevan Mission in India monitor water quality in villages, ensuring safe and sustainable water resources management.\u00a0<\/li><li>Smart Cities: IoT-powered smart infrastructure in cities enhances quality of life for residents, optimizes resource allocation, and improves operational efficiency through applications like smart traffic management, energy-efficient street lighting, and optimized waste management systems.\u00a0<\/li><li>IoT in Defense: The Internet of Military Things (IoMT) enables advanced combat operations and intelligence-driven warfare by fostering real-time connectivity among devices and enhancing situational awareness in defense operations, exemplified by initiatives like the Joint All Domain Command and Control system in the United States.\u00a0<\/li><\/ol>\n\n\n\n<p><strong>Blockchain Technology:<\/strong> Blockchain is a method of recording information that ensures it is nearly impossible to change, hack, or manipulate the system.&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Distributed Ledger<\/strong>: It functions as a distributed ledger, duplicating and distributing transactions across a network of computers connected by a blockchain.&nbsp;<\/li><li><strong>Structure<\/strong>: Blockchain technology stores public transactional records, known as blocks, across multiple databases (the &#8220;chain&#8221;) in a network connected by peer-to-peer nodes, creating a secure digital ledger.&nbsp;<\/li><li><strong>Security<\/strong>: Each transaction in the ledger is authorized by the owner&#8217;s digital signature, ensuring authentication and preventing tampering, thereby ensuring high security.&nbsp;<\/li><li><strong>Analogy<\/strong>: The digital ledger operates akin to a Google spreadsheet shared among networked computers, where transactional records are stored based on actual purchases, ensuring transparency and integrity.&nbsp;<\/li><li><strong>Immutable Cryptographic Signature<\/strong>: Transactions in blockchain are recorded with an immutable cryptographic signature called a hash, making any changes to a block immediately evident.&nbsp;<\/li><\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Importance_of_Blockchain\"><\/span><strong>Importance of Blockchain:<\/strong>&nbsp;<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Challenges in Traditional Databases<\/strong>: Traditional database technologies pose challenges in recording financial transactions due to issues such as trust and validation.\u00a0<\/li><li><strong>Property Transaction Example<\/strong>: In scenarios like property transactions, the involvement of a trusted third party is necessary to supervise and validate transactions, leading to potential legal issues and a single point of failure.\u00a0<\/li><li><strong>Decentralized, Tamper-Proof System<\/strong>: Blockchain addresses these concerns by establishing a decentralized, tamper-proof system for recording transactions.\u00a0<\/li><li><strong>Property Transaction in Blockchain<\/strong>: For instance, in a property transaction, blockchain creates separate ledgers for the buyer and seller, where all transactions must be approved by both parties and are automatically updated in real-time in both ledgers, ensuring transparency and preventing tampering.\u00a0<\/li><li><strong>Application Across Industries<\/strong>: The characteristics of blockchain, such as decentralization and security, have led to its application across various industries, including the creation of digital currencies like Bitcoin.\u00a0<\/li><\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Essential_Elements_of_Blockchain_Technology\"><\/span><strong>Essential Elements of Blockchain Technology:<\/strong>&nbsp;<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<h4 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"1_Distributed_Ledger\"><\/span><strong>1. Distributed Ledger:<\/strong>&nbsp;<span class=\"ez-toc-section-end\"><\/span><\/h4>\n\n\n\n<ul class=\"wp-block-list\"><li>A distributed ledger serves as the shared database of the blockchain network, akin to a collaborative document accessible to all team members.&nbsp;<\/li><li>Unlike conventional shared files, distributed ledgers have strict editing rules, preventing deletion of entries once recorded.&nbsp;<\/li><\/ul>\n\n\n\n<h4 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"2_Smart_Contracts\"><\/span><strong>2. Smart Contracts:<\/strong>&nbsp;<span class=\"ez-toc-section-end\"><\/span><\/h4>\n\n\n\n<ul class=\"wp-block-list\"><li>Smart contracts are blockchain-based programs that enable self-execution of business contracts without third-party involvement.&nbsp;<\/li><li>These contracts, stored on the blockchain, automatically execute predefined actions when specific conditions are met, ensuring secure and reliable transactions.&nbsp;<\/li><\/ul>\n\n\n\n<h4 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"3_Public_Key_Cryptography\"><\/span><strong>3. Public Key Cryptography:<\/strong>&nbsp;<span class=\"ez-toc-section-end\"><\/span><\/h4>\n\n\n\n<ul class=\"wp-block-list\"><li>Public key cryptography uniquely identifies participants in the blockchain network by generating two sets of keys: public and private.&nbsp;<\/li><li>While the public key is shared among network members, the private key remains with each participant, collectively unlocking ledger data.&nbsp;<\/li><\/ul>\n\n\n\n<h4 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"4_Blockchain_Structure_and_Design\"><\/span><strong>4. Blockchain Structure and Design:<\/strong>&nbsp;<span class=\"ez-toc-section-end\"><\/span><\/h4>\n\n\n\n<ul class=\"wp-block-list\"><li>A blockchain is a distributed, immutable, and decentralized ledger comprised of interconnected blocks, each containing transactional data.\u00a0<\/li><li>Cryptographic linking ensures the integrity and security of data, maintained through a consensus mechanism among network nodes.\u00a0<\/li><\/ul>\n\n\n\n<h4 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"5_Blocks\"><\/span><strong>5. Blocks:<\/strong>&nbsp;<span class=\"ez-toc-section-end\"><\/span><\/h4>\n\n\n\n<ul class=\"wp-block-list\"><li>Blockchain blocks consist of:\u00a0<\/li><li>Header: Contains metadata like timestamps and hash of the preceding block.\u00a0<\/li><li>Data: Stores main block information, including transactions and smart contracts.\u00a0<\/li><li>Hash: A unique cryptographic value representing the entire block, crucial for verification.\u00a0<\/li><\/ul>\n\n\n\n<h4 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"6_Block_Time\"><\/span><strong>6. Block Time:<\/strong>&nbsp;<span class=\"ez-toc-section-end\"><\/span><\/h4>\n\n\n\n<ul class=\"wp-block-list\"><li>Block time refers to the duration needed to generate a new block in a blockchain, varying across different blockchain platforms.&nbsp;<\/li><li>Shorter block times facilitate faster transaction confirmations, while longer times reduce conflicts but prolong confirmation timing.&nbsp;<\/li><\/ul>\n\n\n\n<h4 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"7_Hard_Forks\"><\/span><strong>7. Hard Forks:<\/strong>&nbsp;<span class=\"ez-toc-section-end\"><\/span><\/h4>\n\n\n\n<ul class=\"wp-block-list\"><li>A hard fork in a blockchain signifies a permanent split in its history due to fundamental protocol changes.&nbsp;<\/li><li>This divergence can lead to the creation of new cryptocurrencies or the division of existing ones, requiring consensus among network participants to resolve.&nbsp;<\/li><\/ul>\n\n\n\n<h4 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"8_Decentralization\"><\/span><strong>8. Decentralization:<\/strong>&nbsp;<span class=\"ez-toc-section-end\"><\/span><\/h4>\n\n\n\n<ul class=\"wp-block-list\"><li>Decentralization is a fundamental feature of blockchain, eliminating a central authority&#8217;s control over the network.&nbsp;<\/li><li>Decision-making power is distributed among a network of nodes, promoting transparency, trust, and security while minimizing the risk of data manipulation.&nbsp;<\/li><\/ul>\n\n\n\n<h4 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"9_Finality\"><\/span><strong>9. Finality:<\/strong>&nbsp;<span class=\"ez-toc-section-end\"><\/span><\/h4>\n\n\n\n<ul class=\"wp-block-list\"><li>Finality denotes the irreversible confirmation of transactions added to a blockchain, ensuring data integrity and preventing double spending.&nbsp;<\/li><li>Once transactions are confirmed and added to a block, they become immutable and cannot be reversed.&nbsp;<\/li><\/ul>\n\n\n\n<h4 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"10_Openness\"><\/span><strong>10. Openness:<\/strong>&nbsp;<span class=\"ez-toc-section-end\"><\/span><\/h4>\n\n\n\n<ul class=\"wp-block-list\"><li>Blockchain&#8217;s openness allows anyone to participate in the network, subject to consensus rules, enabling transaction validation and block addition.\u00a0<\/li><li>This inclusivity fosters transparency, innovation, and broader stakeholder participation.\u00a0<\/li><\/ul>\n\n\n\n<h4 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"11_Public_Blockchain\"><\/span><strong>11. Public Blockchain:<\/strong>&nbsp;<span class=\"ez-toc-section-end\"><\/span><\/h4>\n\n\n\n<ul class=\"wp-block-list\"><li>Public blockchains are accessible to all participants, allowing anyone to perform transactions and engage in the consensus process.&nbsp;<\/li><li>Transparency is a key feature, as all transactions are publicly recorded, ensuring accountability and openness.&nbsp;<\/li><\/ul>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/edukemy.com\/refer-and-earn\" target=\"_blank\" rel=\"noreferrer noopener\"><img decoding=\"async\" width=\"1280\" height=\"300\" data-src=\"https:\/\/edukemy.com\/blog\/wp-content\/uploads\/2024\/09\/Attempt-our-Daily-Weekly-Current-Affairs-Quiz-now-10-1.png\" alt=\"\" class=\"wp-image-46428 lazyload\" data-srcset=\"https:\/\/edukemy.com\/blog\/wp-content\/uploads\/2024\/09\/Attempt-our-Daily-Weekly-Current-Affairs-Quiz-now-10-1.png 1280w, https:\/\/edukemy.com\/blog\/wp-content\/uploads\/2024\/09\/Attempt-our-Daily-Weekly-Current-Affairs-Quiz-now-10-1-1170x274.png 1170w, https:\/\/edukemy.com\/blog\/wp-content\/uploads\/2024\/09\/Attempt-our-Daily-Weekly-Current-Affairs-Quiz-now-10-1-585x137.png 585w\" data-sizes=\"(max-width: 1280px) 100vw, 1280px\" src=\"data:image\/gif;base64,R0lGODlhAQABAAAAACH5BAEKAAEALAAAAAABAAEAAAICTAEAOw==\" style=\"--smush-placeholder-width: 1280px; --smush-placeholder-aspect-ratio: 1280\/300;\" \/><\/a><figcaption><a href=\"https:\/\/edukemy.com\/refer-and-earn\" target=\"_blank\" rel=\"noopener\" title=\"\">Refer &amp; Earn NOW<\/a><\/figcaption><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Components_of_Blockchain_Technology\"><\/span><strong>Components of Blockchain Technology:&nbsp;<\/strong>&nbsp;<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Blockchain technology operates through the integration of three core components:&nbsp;<\/p>\n\n\n\n<ol class=\"wp-block-list\"><li><strong>Cryptographic Keys:<\/strong>&nbsp;<\/li><\/ol>\n\n\n\n<ul class=\"wp-block-list\"><li>Cryptographic keys consist of a private key and a public key, enabling secure transactions between parties.&nbsp;<\/li><li>Each participant possesses both keys, which are utilized to establish a secure digital identity reference.&nbsp;<\/li><\/ul>\n\n\n\n<ol class=\"wp-block-list\" start=\"2\"><li><strong>Peer-to-Peer Network (P2P) with a Shared Ledger:<\/strong>&nbsp;<\/li><\/ol>\n\n\n\n<ul class=\"wp-block-list\"><li>The blockchain operates on a peer-to-peer network where participants share a common ledger.&nbsp;<\/li><li>This network allows individuals to interact directly, facilitating transactions and record-keeping without the need for intermediaries.&nbsp;<\/li><\/ul>\n\n\n\n<ol class=\"wp-block-list\" start=\"3\"><li><strong>Computing Method for Storing Network Transactions and Records:<\/strong>&nbsp;<\/li><\/ol>\n\n\n\n<ul class=\"wp-block-list\"><li>Blockchain employs a computing method to store and manage network transactions and records securely.&nbsp;<\/li><li>Transactions are stored in blocks, cryptographically linked to form a sequential chain, ensuring transparency and integrity.&nbsp;<\/li><\/ul>\n\n\n\n<p>In essence, the workings of blockchain technology involve the following steps:&nbsp;<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Secure_Digital_Identity\"><\/span><strong>Secure Digital Identity:<\/strong>\u00a0<span class=\"ez-toc-section-end\"><\/span><\/h4>\n\n\n\n<ul class=\"wp-block-list\"><li>Participants utilize cryptographic keys to establish a secure digital identity, known as a digital signature.&nbsp;<\/li><li>This digital signature serves as a means of authorization and control for transactions within the blockchain network.&nbsp;<\/li><\/ul>\n\n\n\n<h4 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Peer_Consensus\"><\/span><strong>Peer Consensus:<\/strong>\u00a0<span class=\"ez-toc-section-end\"><\/span><\/h4>\n\n\n\n<ul class=\"wp-block-list\"><li>The digital signature is integrated into the peer-to-peer network, where numerous individuals act as authorities.&nbsp;<\/li><li>These network participants use the digital signature to reach consensus on transactions and other network-related matters.&nbsp;<\/li><\/ul>\n\n\n\n<h4 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Mathematical_Validation\"><\/span><strong>Mathematical Validation:<\/strong>\u00a0<span class=\"ez-toc-section-end\"><\/span><\/h4>\n\n\n\n<ul class=\"wp-block-list\"><li>Transactions approved by network participants undergo mathematical validation to ensure authenticity and security.&nbsp;<\/li><li>Once validated, transactions are securely recorded on the blockchain ledger, establishing a permanent and immutable record.&nbsp;<\/li><\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Types_of_Blockchain_Networks\"><\/span><strong>Types of Blockchain Networks<\/strong>&nbsp;<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<h4 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"1_Private_Blockchain_Networks\"><\/span><strong>1. Private Blockchain Networks:<\/strong>&nbsp;<span class=\"ez-toc-section-end\"><\/span><\/h4>\n\n\n\n<ul class=\"wp-block-list\"><li>Private blockchains operate within closed networks, typically within private businesses or organizations.&nbsp;<\/li><li>These networks offer customizable accessibility and security features, allowing entities to manage network parameters and authorization preferences.&nbsp;<\/li><li>Managed by a single authority, private blockchains cater to the specific needs of organizations.&nbsp;<\/li><\/ul>\n\n\n\n<h4 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"2_Public_Blockchain_Networks\"><\/span><strong>2. Public Blockchain Networks:<\/strong>&nbsp;<span class=\"ez-toc-section-end\"><\/span><\/h4>\n\n\n\n<ul class=\"wp-block-list\"><li>Public blockchains, like Bitcoin and other cryptocurrencies, function on open networks, promoting the adoption of distributed ledger technology (DLT).\u00a0<\/li><li>They address challenges such as security vulnerabilities and centralization by distributing data across peer-to-peer networks.\u00a0<\/li><li>Consensus algorithms like proof of stake (PoS) and proof of work (PoW) authenticate transactions and ensure network integrity.\u00a0<\/li><\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"3_Permissioned_Blockchain_Networks\"><\/span><strong>3. Permissioned Blockchain Networks:<\/strong>&nbsp;<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<ul class=\"wp-block-list\"><li>Permissioned blockchains, also termed hybrid blockchains, are private networks granting access to authorized individuals.&nbsp;<\/li><li>Organizations utilize these networks to blend the benefits of public and private blockchains, enabling structured participation and transaction control.&nbsp;<\/li><\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"4_Consortium_Blockchains\"><\/span><strong>4. Consortium Blockchains:<\/strong>&nbsp;<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<ul class=\"wp-block-list\"><li>Consortium blockchains involve multiple organizations managing a single blockchain network.&nbsp;<\/li><li>While complex to establish initially, consortium blockchains offer enhanced security and are conducive to collaborative efforts among diverse entities.&nbsp;<\/li><\/ul>\n\n\n\n<h4 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"5_Hybrid_Blockchains\"><\/span><strong>5. Hybrid Blockchains:<\/strong>&nbsp;<span class=\"ez-toc-section-end\"><\/span><\/h4>\n\n\n\n<ul class=\"wp-block-list\"><li>Hybrid blockchains integrate aspects of both public and private networks, offering transparency and privacy where needed.&nbsp;<\/li><li>Certain segments are publicly accessible, while others remain private and accessible only to authorized participants.&nbsp;<\/li><li>Ideal for scenarios requiring a balance between transparency and confidentiality, such as supply chain management.&nbsp;<\/li><\/ul>\n\n\n\n<h4 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"6_Sidechains\"><\/span><strong>6. Sidechains:<\/strong>&nbsp;<span class=\"ez-toc-section-end\"><\/span><\/h4>\n\n\n\n<ul class=\"wp-block-list\"><li>Sidechains operate alongside the main blockchain, providing additional functionality and scalability.&nbsp;<\/li><li>They facilitate experimentation with new features and applications without compromising the integrity of the primary blockchain.&nbsp;<\/li><li>Sidechains can handle main blockchain transactions to enhance scalability and reduce congestion.&nbsp;<\/li><\/ul>\n\n\n\n<h4 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"7_Blockchain_Layers\"><\/span><strong>7. Blockchain Layers:<\/strong>&nbsp;<span class=\"ez-toc-section-end\"><\/span><\/h4>\n\n\n\n<ul class=\"wp-block-list\"><li>Blockchain layers involve building multiple tiers of blockchains atop one another, each with distinct consensus mechanisms and functionalities.&nbsp;<\/li><li>Transactions can be processed in parallel across layers, enhancing scalability and performance.&nbsp;<\/li><li>Examples include the Lightning Network, a second-layer solution enabling faster and cheaper transactions on the Bitcoin blockchain through payment channels.&nbsp;<\/li><\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Application_of_Blockchain_Management\"><\/span><strong>Application of Blockchain Management:<\/strong>\u00a0<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<h4 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Smart_Contracts\"><\/span><strong>Smart Contracts:<\/strong>&nbsp;<span class=\"ez-toc-section-end\"><\/span><\/h4>\n\n\n\n<ul class=\"wp-block-list\"><li>Industries heavily reliant on contracts, such as insurance, finance, real estate, construction, entertainment, and law, can leverage blockchain for updating, managing, tracking, and securing contracts.&nbsp;<\/li><li>Smart contracts embedded with if\/then statements enable execution without intermediary involvement, offering efficiency and transparency.&nbsp;<\/li><\/ul>\n\n\n\n<h4 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Supply_Chain_Management\"><\/span><strong>Supply Chain Management:<\/strong>&nbsp;<span class=\"ez-toc-section-end\"><\/span><\/h4>\n\n\n\n<ul class=\"wp-block-list\"><li>Blockchain serves as an ideal platform for managing transactions and asset status changes within supply chains, ensuring transparency and traceability whenever money changes hands or asset statuses shift.&nbsp;<\/li><\/ul>\n\n\n\n<h4 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Asset_Protection\"><\/span><strong>Asset Protection:<\/strong>&nbsp;<span class=\"ez-toc-section-end\"><\/span><\/h4>\n\n\n\n<ul class=\"wp-block-list\"><li>Blockchain technology safeguards assets by establishing an irrefutable real-time ownership record, benefiting individuals like musicians seeking royalties for their music and property owners securing their property rights.&nbsp;<\/li><\/ul>\n\n\n\n<h4 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Personal_Identification\"><\/span><strong>Personal Identification:<\/strong>&nbsp;<span class=\"ez-toc-section-end\"><\/span><\/h4>\n\n\n\n<ul class=\"wp-block-list\"><li>Governments manage vast amounts of personal data, including birth certificates, passports, and census records. Blockchain offers a secure and streamlined solution for managing and authenticating such data, enhancing security and efficiency.&nbsp;<\/li><\/ul>\n\n\n\n<h4 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Payment_Processing\"><\/span><strong>Payment Processing:<\/strong>&nbsp;<span class=\"ez-toc-section-end\"><\/span><\/h4>\n\n\n\n<ul class=\"wp-block-list\"><li>Blockchain technology has the potential to revolutionize payment processing for businesses by eliminating the need for intermediaries prevalent in traditional payment systems, thereby enhancing efficiency and reducing costs.&nbsp;<\/li><\/ul>\n\n\n\n<h4 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Crowdfunding\"><\/span><strong>Crowdfunding:<\/strong>&nbsp;<span class=\"ez-toc-section-end\"><\/span><\/h4>\n\n\n\n<ul class=\"wp-block-list\"><li>Blockchain-powered crowdfunding campaigns enable communities to secure investment for new projects, akin to traditional crowdfunding methods.&nbsp;<\/li><li>Contributions are often made in the form of cryptocurrencies like bitcoin, offering innovative avenues for fundraising and investment.&nbsp;<\/li><\/ul>\n\n\n\n<h4 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Governance\"><\/span><strong>Governance:<\/strong>&nbsp;<span class=\"ez-toc-section-end\"><\/span><\/h4>\n\n\n\n<ul class=\"wp-block-list\"><li>Blockchain technology enhances governance by ensuring transparency in public records through digital platforms. It enables the auditing of government documents and maintains document authenticity, significantly reducing processing time.&nbsp;<\/li><\/ul>\n\n\n\n<h4 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Insurance\"><\/span><strong>Insurance:<\/strong>&nbsp;<span class=\"ez-toc-section-end\"><\/span><\/h4>\n\n\n\n<ul class=\"wp-block-list\"><li>Blockchain revolutionizes insurance operations by creating transparent, secure, decentralized, and immutable networks for documents, claim settlements, and fraud detection.&nbsp;<\/li><\/ul>\n\n\n\n<h4 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Healthcare\"><\/span><strong>Healthcare:<\/strong>&nbsp;<span class=\"ez-toc-section-end\"><\/span><\/h4>\n\n\n\n<ul class=\"wp-block-list\"><li>Prioritizing patient health and data security, blockchain secures patient records, consent forms, billing processes, and public health monitoring within a secure network infrastructure.&nbsp;<\/li><\/ul>\n\n\n\n<h4 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Automotive\"><\/span><strong>Automotive:<\/strong>&nbsp;<span class=\"ez-toc-section-end\"><\/span><\/h4>\n\n\n\n<ul class=\"wp-block-list\"><li>Blockchain addresses automotive industry challenges by streamlining manufacturing, deliveries, and billing processes. It also facilitates the creation of an after-sales support ecosystem to track vehicle maintenance records efficiently.&nbsp;<\/li><\/ul>\n\n\n\n<h4 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Tourism\"><\/span><strong>Tourism:<\/strong>&nbsp;<span class=\"ez-toc-section-end\"><\/span><\/h4>\n\n\n\n<ul class=\"wp-block-list\"><li>In tourism, blockchain minimizes passenger document handling delays and establishes a decentralized hotel booking ecosystem with minimal transaction fees. It ensures the privacy and security of passengers&#8217; personal information.&nbsp;<\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Cyber_Security\"><\/span><strong>Cyber Security<\/strong>&nbsp;<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Cyber Security is protecting cyber space including critical information infrastructure from attack, damage, misuse and economic espionage.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Motives_behind_Cyber_Attacks\"><\/span><strong>Motives behind Cyber Attacks<\/strong>&nbsp;<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<ul class=\"wp-block-list\"><li>To seek commercial gain by hacking banks and financial institutions.\u00a0<\/li><li>To attack critical assets of a nation.\u00a0<\/li><li>To penetrate into both corporate and military data servers to obtain plans and intelligence.\u00a0<\/li><li>To hack sites to virally communicate a message for some specific campaign related to politics and society.\u00a0<\/li><\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Various_Cyber_Attacks\"><\/span><strong>Various Cyber Attacks:<\/strong>&nbsp;<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<ol class=\"wp-block-list\"><li><strong>Malware:<\/strong> Malware, an umbrella term for malicious software, encompasses various types like ransomware, spyware, worms, viruses, and Trojans, designed to inflict harm on individual computers, servers, or networks.\u00a0<\/li><li><strong>Phishing:<\/strong> Phishing entails deceptive emails and websites aimed at extracting personal information from unsuspecting users through fraudulent means.\u00a0<\/li><li><strong>Denial of Service (DoS) Attacks:<\/strong> DoS attacks disrupt target machines or networks by inundating them with excessive traffic or triggering crashes through the transmission of overwhelming information.\u00a0<\/li><li><strong>Man-in-the-Middle (MitM) Attacks:<\/strong> MitM attacks, also known as eavesdropping attacks, involve intruders intercepting and tampering with data transmission between two parties, allowing them to filter and pilfer sensitive information.\u00a0<\/li><li><strong>SQL Injection:<\/strong> SQL injection targets servers utilizing Structured Query Language (SQL) to manage data, exploiting vulnerabilities to extract unauthorized information by injecting malicious code.\u00a0<\/li><li><strong>Cross-Site Scripting (XSS):<\/strong> XSS attacks inject malicious code into websites, executing in users&#8217; browsers when they visit the compromised site, targeting users directly rather than the site itself.\u00a0<\/li><li><strong>Social Engineering:<\/strong> Social engineering leverages human interaction to deceive users into breaching security protocols, enabling attackers to gain access to sensitive information typically safeguarded by security measures.\u00a0<\/li><\/ol>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Cyber_warfare\"><\/span><strong>Cyber warfare<\/strong>&nbsp;<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Cyber warfare entails orchestrated cyberattacks targeting a nation&#8217;s infrastructure, both civilian and governmental, with the potential to disrupt vital processes and cause harm, including fatalities.&nbsp;<\/p>\n\n\n\n<p>While nation-states predominantly engage in cyber warfare, terrorist groups or non-state actors may also execute attacks to advance the interests of hostile states.&nbsp;<\/p>\n\n\n\n<p>Despite numerous reported instances of cyber warfare, a universally accepted definition of cyber warfare remains elusive.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Key_Types_of_Cyber_Warfare_Attacks\"><\/span><strong>Key Types of Cyber Warfare Attacks:<\/strong>\u00a0<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<ol class=\"wp-block-list\"><li><strong>Espionage:<\/strong>&nbsp;<\/li><\/ol>\n\n\n\n<ul class=\"wp-block-list\"><li>Involves clandestine monitoring and theft of sensitive information from other countries using methods like botnets or spear phishing attacks to infiltrate and extract data.&nbsp;<\/li><\/ul>\n\n\n\n<ol class=\"wp-block-list\" start=\"2\"><li><strong>Sabotage:<\/strong>&nbsp;<\/li><\/ol>\n\n\n\n<ul class=\"wp-block-list\"><li>Hostile entities may compromise, destroy, or exploit sensitive information to undermine government organizations, leveraging insider threats or external attacks.&nbsp;<\/li><\/ul>\n\n\n\n<ol class=\"wp-block-list\" start=\"3\"><li><strong>Denial-of-Service (DoS) Attacks:<\/strong>&nbsp;<\/li><\/ol>\n\n\n\n<ul class=\"wp-block-list\"><li>Overwhelm target websites with fake requests, rendering them inaccessible to legitimate users, disrupting critical operations, and impeding access to sensitive sites.&nbsp;<\/li><\/ul>\n\n\n\n<ol class=\"wp-block-list\" start=\"4\"><li><strong>Electrical Power Grid Targeting:<\/strong>&nbsp;<\/li><\/ol>\n\n\n\n<ul class=\"wp-block-list\"><li>Attacks on power grids can disrupt critical infrastructure, communication networks, and essential services, potentially leading to bodily harm and widespread disruption.&nbsp;<\/li><\/ul>\n\n\n\n<ol class=\"wp-block-list\" start=\"5\"><li><strong>Propaganda Attacks:<\/strong>&nbsp;<\/li><\/ol>\n\n\n\n<ul class=\"wp-block-list\"><li>Manipulate public opinion by disseminating false information, revealing embarrassing truths, or instigating distrust among citizens, military, or security personnel.&nbsp;<\/li><\/ul>\n\n\n\n<ol class=\"wp-block-list\" start=\"6\"><li><strong>Economic Disruption:<\/strong>&nbsp;<\/li><\/ol>\n\n\n\n<ul class=\"wp-block-list\"><li>Target computer networks of economic institutions like stock markets and banks to steal funds or obstruct financial transactions, causing economic turmoil.&nbsp;<\/li><\/ul>\n\n\n\n<ol class=\"wp-block-list\" start=\"7\"><li><strong>Surprise Attacks:<\/strong>&nbsp;<\/li><\/ol>\n\n\n\n<ul class=\"wp-block-list\"><li>Surprise cyber assaults aim to catch the target off guard, akin to historical surprise attacks like Pearl Harbor, weakening defenses and paving the way for subsequent physical or hybrid warfare tactics.&nbsp;<\/li><\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Challenges_Posed_by_Cyber_Attacks\"><\/span><strong>Challenges Posed by Cyber Attacks:<\/strong>&nbsp;<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<ol class=\"wp-block-list\"><li><strong>Critical Infrastructure Vulnerability:<\/strong>&nbsp;<\/li><\/ol>\n\n\n\n<ul class=\"wp-block-list\"><li>India&#8217;s critical infrastructure, including power grids, transportation systems, and communication networks, is prone to cyber attacks capable of disrupting essential services, jeopardizing public safety, and undermining national security.&nbsp;<\/li><li>An attempted cyber-attack on the Kudankulam Nuclear power plant in October 2019 underscored the vulnerability of critical infrastructure.&nbsp;<\/li><\/ul>\n\n\n\n<ol class=\"wp-block-list\" start=\"2\"><li><strong>Financial Sector Threats:<\/strong>&nbsp;<\/li><\/ol>\n\n\n\n<ul class=\"wp-block-list\"><li>The financial sector in India is highly susceptible to cyberattacks, exposing banks, financial institutions, and online payment systems to financial losses, identity theft, and erosion of trust.&nbsp;<\/li><\/ul>\n\n\n\n<ul class=\"wp-block-list\"><li>A notable incident occurred in March 2020 when malware targeted the City Union Bank\u2019s SWIFT system, resulting in unauthorized transactions worth USD 2 million.&nbsp;<\/li><\/ul>\n\n\n\n<ol class=\"wp-block-list\" start=\"3\"><li><strong>Data Breaches and Privacy Concerns:<\/strong>&nbsp;<\/li><\/ol>\n\n\n\n<ul class=\"wp-block-list\"><li>India&#8217;s transition to a digital economy has amplified the risk of data breaches, with personal and government data increasingly stored online.&nbsp;<\/li><li>Instances such as the leakage of personally identifiable information (PII) and test results of 190,000 CAT applicants in May 2021 underscore the severity of data breaches.&nbsp;<\/li><\/ul>\n\n\n\n<ol class=\"wp-block-list\" start=\"4\"><li><strong>Cyber Espionage:<\/strong>&nbsp;<\/li><\/ol>\n\n\n\n<ul class=\"wp-block-list\"><li>India faces cyber espionage threats aimed at stealing confidential information, influencing foreign policy, and impeding economic development.&nbsp;<\/li><li>Notably, Operation SideCopy, attributed to a Pakistani threat actor in 2020, targeted Indian military and diplomatic personnel with malware and phishing emails.&nbsp;<\/li><\/ul>\n\n\n\n<ol class=\"wp-block-list\" start=\"5\"><li><strong>Advanced Persistent Threats (APTs):<\/strong>&nbsp;<\/li><\/ol>\n\n\n\n<ul class=\"wp-block-list\"><li>APTs, characterized by sophisticated and prolonged cyber attacks, pose significant challenges to India&#8217;s cybersecurity landscape.&nbsp;<\/li><li>In February 2021, a China-linked APT group targeted entities in India&#8217;s power sector with malware capable of causing power outages, highlighting the severity of APT attacks.&nbsp;<\/li><\/ul>\n\n\n\n<ol class=\"wp-block-list\" start=\"6\"><li><strong>Supply Chain Vulnerabilities:<\/strong>&nbsp;<\/li><\/ol>\n\n\n\n<ul class=\"wp-block-list\"><li>Supply chain vulnerabilities, exemplified by the SolarWinds cyberattack in December 2020, pose substantial risks to Indian organizations.&nbsp;<\/li><li>Attackers exploit weaknesses in software or hardware components to compromise systems and services, impacting entities such as the National Informatics Centre (NIC) and Bharat Heavy Electricals Limited (BHEL).&nbsp;<\/li><\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Cyber_Security_Initiatives_in_India\"><\/span><strong>Cyber Security Initiatives in India:&nbsp;<\/strong>&nbsp;<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<h4 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"1_National_Cyber_Security_Policy\"><\/span><strong>1. National Cyber Security Policy:<\/strong>&nbsp;<span class=\"ez-toc-section-end\"><\/span><\/h4>\n\n\n\n<ul class=\"wp-block-list\"><li>Aims to fortify cyberspace for citizens, businesses, and the government, with strategies to protect information and infrastructure, enhance capabilities to thwart cyber attacks, and minimize damages through coordinated efforts.&nbsp;<\/li><\/ul>\n\n\n\n<h4 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"2_Cyber_Surakshit_Bharat_Initiative\"><\/span><strong>2. Cyber Surakshit Bharat Initiative:<\/strong>&nbsp;<span class=\"ez-toc-section-end\"><\/span><\/h4>\n\n\n\n<ul class=\"wp-block-list\"><li>Launched to raise awareness about cyber crimes and bolster safety measures for Chief Information Security Officers (CISOs) and frontline IT staff across all government departments.&nbsp;<\/li><\/ul>\n\n\n\n<h4 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"3_Indian_Cyber_Crime_Coordination_Centre_I4C\"><\/span><strong>3. Indian Cyber Crime Coordination Centre (I4C):<\/strong>&nbsp;<span class=\"ez-toc-section-end\"><\/span><\/h4>\n\n\n\n<ul class=\"wp-block-list\"><li>Provides a comprehensive framework for law enforcement agencies to combat cyber crimes, featuring components like threat analytics, reporting portal, training center, ecosystem management, research and innovation center, forensic laboratory ecosystem, and joint investigation team platform.&nbsp;<\/li><\/ul>\n\n\n\n<h4 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"4_Cyber_Swachhta_Kendra_Botnet_Cleaning_and_Malware_Analysis_Centre\"><\/span><strong>4. Cyber Swachhta Kendra (Botnet Cleaning and Malware Analysis Centre):<\/strong>&nbsp;<span class=\"ez-toc-section-end\"><\/span><\/h4>\n\n\n\n<ul class=\"wp-block-list\"><li>Established in 2017 to secure cyberspace by detecting and addressing botnet infections, thereby safeguarding end users&#8217; systems from further compromise.&nbsp;<\/li><\/ul>\n\n\n\n<h4 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"5_Computer_Emergency_Response_Team_%E2%80%93_India_CERT-In\"><\/span><strong>5. Computer Emergency Response Team &#8211; India (CERT-In):<\/strong>&nbsp;<span class=\"ez-toc-section-end\"><\/span><\/h4>\n\n\n\n<ul class=\"wp-block-list\"><li>Operated under MeitY, CERT-In collects, analyses, and disseminates information on cyber incidents, issuing alerts on cybersecurity threats to ensure timely response and mitigation.&nbsp;<\/li><\/ul>\n\n\n\n<h4 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"6_Critical_Information_Infrastructure_CII_Protection\"><\/span><strong>6. Critical Information Infrastructure (CII) Protection:<\/strong>&nbsp;<span class=\"ez-toc-section-end\"><\/span><\/h4>\n\n\n\n<ul class=\"wp-block-list\"><li>Identifies vital computer resources whose destruction could significantly impact national security, economy, public health, or safety, with the National Critical Information Infrastructure Protection Centre (NCIIPC) safeguarding sectors like power, banking, telecom, transport, and strategic enterprises.&nbsp;<\/li><\/ul>\n\n\n\n<h4 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"7_Defence_Cyber_Agency_DCyA\"><\/span><strong>7. Defence Cyber Agency (DCyA):<\/strong>&nbsp;<span class=\"ez-toc-section-end\"><\/span><\/h4>\n\n\n\n<ul class=\"wp-block-list\"><li>A tri-service command of the Indian Armed Forces, DCyA specializes in countering cyber security threats through operations such as hacking, surveillance, data recovery, encryption, and countermeasures against various cyber adversaries.\u00a0<\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"FAQs\"><\/span>FAQs<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Q_What_is_a_computer\"><\/span>Q: <strong>What is a computer?<\/strong> <span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>A computer is an electronic device capable of performing various tasks by executing pre-programmed instructions. It processes data input from users or other devices, manipulates it according to the instructions, and generates output for further use.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Q_What_are_the_main_components_of_a_computer\"><\/span>Q: <strong>What are the main components of a computer?<\/strong> <span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Computers consist of several essential components, including the central processing unit (CPU), which serves as the &#8220;brain&#8221; of the computer, memory (RAM) for temporary storage of data and instructions, storage devices like hard drives or SSDs for long-term data storage, input devices such as keyboards and mice for user interaction, and output devices like monitors and printers for displaying information.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Q_What_is_an_operating_system\"><\/span>Q: <strong>What is an operating system?<\/strong> <span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>An operating system (OS) is software that manages computer hardware and provides common services for computer programs. It acts as an intermediary between applications and the hardware, facilitating communication and resource allocation. Popular examples of operating systems include Microsoft Windows, macOS, and Linux.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Q_What_is_the_difference_between_hardware_and_software\"><\/span>Q: <strong>What is the difference between hardware and software?<\/strong> <span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Hardware refers to the physical components of a computer system, such as the CPU, memory, storage devices, and input\/output devices. Software, on the other hand, refers to the programs, applications, and data that instruct the hardware how to perform tasks. In simple terms, hardware is tangible, while software is intangible.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Q_What_is_the_cloud\"><\/span>Q: <strong>What is the cloud?<\/strong> <span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>The cloud refers to a network of remote servers hosted on the internet that store, manage, and process data rather than a local server or a personal computer. Cloud computing allows users to access data and applications from anywhere with an internet connection, providing flexibility, scalability, and often cost-effectiveness compared to traditional on-premises solutions. Examples of cloud services include online storage, web-based email, and software-as-a-service (SaaS) applications.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><a href=\"https:\/\/edukemy.com\/upsc\/upsc-essay?utm_source=Blog&amp;utm_medium=Banner&amp;utm_campaign=Essay\" target=\"_blank\" rel=\"noreferrer noopener\"><img decoding=\"async\" data-src=\"https:\/\/edukemy.com\/blog\/wp-content\/uploads\/2024\/06\/UPSC-Essay-Course-1280\u00d7300-1-3.svg\" alt=\"\" class=\"wp-image-42688 lazyload\" width=\"781\" height=\"182\" src=\"data:image\/gif;base64,R0lGODlhAQABAAAAACH5BAEKAAEALAAAAAABAAEAAAICTAEAOw==\" style=\"--smush-placeholder-width: 781px; --smush-placeholder-aspect-ratio: 781\/182;\" \/><\/a><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"block-c6ab63ae-7083-4831-b519-cb89dacafb18\"><span class=\"ez-toc-section\" id=\"In_case_you_still_have_your_doubts_contact_us_on_9811333901\"><\/span><strong>In case you still have your doubts, contact us on 9811333901.<\/strong>&nbsp;<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p id=\"block-52c5a91b-6ed6-46e3-b781-7cc0c63a0b76\">For UPSC Prelims Resources,&nbsp;<a href=\"https:\/\/edukemy.com\/upsc-cse-prelims-resource-centre\" target=\"_blank\" rel=\"noreferrer noopener\">Click here<\/a><\/p>\n\n\n\n<p id=\"block-d014fe86-d628-49d8-82ce-6c60dc6e7a73\">For Daily Updates and Study Material:<\/p>\n\n\n\n<p id=\"block-38177954-e668-4d8d-b250-d0fbd5a09390\">Join our Telegram Channel &#8211;&nbsp;<a href=\"https:\/\/t.me\/WithEdukemy4IAS\" target=\"_blank\" rel=\"noreferrer noopener\">Edukemy for IAS<\/a><\/p>\n\n\n\n<ul class=\"wp-block-list\" id=\"block-49ca2fe3-109f-4a88-b72e-9df49c3d328e\"><li>1. Learn through Videos &#8211;&nbsp;<a href=\"https:\/\/bit.ly\/3vOD8sU\" target=\"_blank\" rel=\"noreferrer noopener\">here<\/a><\/li><li>2. Be Exam Ready by Practicing Daily MCQs &#8211;&nbsp;<a href=\"https:\/\/bit.ly\/3Q9z2nF\" target=\"_blank\" rel=\"noreferrer noopener\">here<\/a><\/li><li>3. Daily Newsletter &#8211; Get all your Current Affairs Covered &#8211;&nbsp;<a href=\"https:\/\/bit.ly\/3bE2y5J\" target=\"_blank\" rel=\"noreferrer noopener\">here<\/a><\/li><li>4. Mains Answer Writing Practice &#8211;&nbsp;<a href=\"https:\/\/bit.ly\/3mZuVxl\" target=\"_blank\" rel=\"noreferrer noopener\">here<\/a><\/li><\/ul>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"block-43ccddc1-5348-445f-ab6b-7baaf29fe58d\"><span class=\"ez-toc-section\" id=\"Visit_our_YouTube_Channel_%E2%80%93_here\"><\/span>Visit our YouTube Channel &#8211;&nbsp;<a href=\"https:\/\/www.youtube.com\/@EduKemyforIAS\" target=\"_blank\" rel=\"noreferrer noopener\">here<\/a><span class=\"ez-toc-section-end\"><\/span><\/h4>\n","protected":false},"excerpt":{"rendered":"<p>The evolution of computers began in the mid-20th century, progressing through various stages known as &#8220;computer generations.<\/p>\n","protected":false},"author":17,"featured_media":37529,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_eb_attr":"","om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"_lmt_disableupdate":"","_lmt_disable":"","footnotes":""},"categories":[279],"tags":[3124,376,232,213,140],"class_list":["post-37526","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-science-and-technology-general-studies","tag-computers","tag-science-and-technology","tag-upsc","tag-upsc-notes","tag-upsc_preparation_strategy"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/edukemy.com\/blog\/wp-json\/wp\/v2\/posts\/37526","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/edukemy.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/edukemy.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/edukemy.com\/blog\/wp-json\/wp\/v2\/users\/17"}],"replies":[{"embeddable":true,"href":"https:\/\/edukemy.com\/blog\/wp-json\/wp\/v2\/comments?post=37526"}],"version-history":[{"count":1,"href":"https:\/\/edukemy.com\/blog\/wp-json\/wp\/v2\/posts\/37526\/revisions"}],"predecessor-version":[{"id":37530,"href":"https:\/\/edukemy.com\/blog\/wp-json\/wp\/v2\/posts\/37526\/revisions\/37530"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/edukemy.com\/blog\/wp-json\/wp\/v2\/media\/37529"}],"wp:attachment":[{"href":"https:\/\/edukemy.com\/blog\/wp-json\/wp\/v2\/media?parent=37526"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/edukemy.com\/blog\/wp-json\/wp\/v2\/categories?post=37526"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/edukemy.com\/blog\/wp-json\/wp\/v2\/tags?post=37526"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}