Showing posts with label Sci & Tech. Show all posts
Showing posts with label Sci & Tech. Show all posts

Aadhaar GS

Aadhaar : A Dream Project of the Government of India


What is Aadhaar? 
Aadhaar is a 12 digit individual identification number issued by the Unique Identification Authority of India on behalf of the Government of India. This number will serve as a proof of identity and address, anywhere in India. Any individual, irrespective of age and gender, who is a resident in India and satisfies the verification process laid down by the UIDAI can enroll for Aadhaar.Each individual needs to enroll only once which is free of cost. Each Aadhaar number will be unique to an individual and will remain valid for life. Aadhaar number will help you provide access to services like banking, mobile phone connections and other Govt and Non-Govt services in due course.


Quick points about Aadhaar:
·        
            Easily verifiable in an online, cost-effective way
·         Unique and robust enough to eliminate the large number of duplicate and fake identities in government and private databases
·         A random number generated, devoid of any classification based on caste, creed, religion and geography
·         Aadhaar-based identification will have two unique features:
·         Universality, which is ensured because Aadhaar will over time be recognized and accepted across the country and across all service providers.
·         Every resident's entitlement to the number.
·         The number will consequently form the basic, universal identity infrastructure over which Registrars and Agencies across the country can build their identity-based applications.
·         Unique Identification of India (UIDAI) will build partnerships with various Registrars across the country to enroll residents for the number. Such Registrars may include state governments, state Public Sector Units (PSUs), banks, telecom companies, etc. These Registrars may in turn partner with enrolling agencies to enroll residents into Aadhaar.
·         Aadhaar will ensure increased trust between public and private agencies and residents. Once residents enroll for Aadhaar, service providers will no longer face the problem of performing repeated Know Your Customer (KYC) checks before providing services. They would no longer have to deny services to residents without identification documents. Residents would also be spared the trouble of repeatedly proving identity through documents each time they wish to access services such as obtaining a bank account, passport, or driving license etc.
·         By providing a clear proof of identity, Aadhaar will empower poor and underprivileged residents in accessing services such as the formal banking system and give them the opportunity to easily avail various other services provided by the Government and the private sector. The centralized technology infrastructure of the UIDAI will enable 'anytime, anywhere, anyhow' authentication. Aadhaar will thus give migrants mobility of identity. Aadhaar authentication can be done both offline and online, online authentication through a cell phone or land line connection will allow residents to verify their identity remotely. Remotely, online Aadhaar-linked identity verification will give poor and rural residents the same flexibility that urban non-poor residents presently have in verifying their identity and accessing services such as banking and retail. Aadhaar will also demand proper verification prior to enrolment, while ensuring inclusion. Existing identity databases in India are fraught with problems of fraud and duplicate or ghost beneficiaries. To prevent these problems from seeping into the Aadhaar database, the UIDAI plans to enroll residents into its database with proper verification of their demographic and biometric information. This will ensure that the data collected is clean from the beginning of the program. However, much of the poor and under-privileged population lack identity documents and Aadhaar may be the first form of identification they will have access to. The UIDAI will ensure that its Know Your Resident (KYR) standards do not become a barrier for enrolling the poor and has accordingly developed an Introducer system for residents who lack documentation. Through this system, authorized individuals ('Introducers') who already have an Aadhaar, can introduce residents who don't have any identification documents, enabling them to receive their Aadhaar.


Aadhaar: The UID brand name
The brand name of the Unique Identification number (UID) will be Aadhaar. The name and logo for the unique numbers to be issued by the UIDAI have been developed keeping in mind the transformational potential of the program. Together, they communicate the essence and spirit of the UIDAI's mandate to people across the country.

The UIDAI's mandate is to issue every resident a unique identification number linked to the resident's demographic and biometric information, which they can use to identify themselves anywhere in India, and to access a host of benefits and services. The number (referred to until now as the 'UID') has been named Aadhaar, which translates into 'foundation', or 'support'. This word is present across most Indian languages and can therefore be used in branding and communication of the UIDAI program across the country.

As Mr. Nandan Nilekani, Chairman of the UIDAI notes, "The name Aadhaar communicates the fundamental role of the number issued by the UIDAI the number as a universal identity infrastructure, a foundation over which public and private agencies can build services and applications that benefit residents across India."
·         Aadhaar's guarantee of uniqueness and centralized, online identity verification would be the basis for building these multiple services and applications, and facilitating greater connectivity to markets
·         Aadhaar would also give any resident the ability to access these services and resources, anytime, anywhere in the country
·         Aadhaar can for example, provide the identity infrastructure for ensuring financial inclusion across the country – banks can link the unique number to a bank account for every resident, and use the online identity authentication to allow residents to access the account from anywhere in the country
·         Aadhaar would also be a foundation for the effective enforcement of individual rights. A clear registration and recognition of the individual's identity with the state is necessary to implement their rights –to employment, education, food, etc. The number, by ensuring such registration and recognition of individuals, would help the state deliver these rights.



Aadhaar card, bank account mandatory for direct cash transfer :
For the direct cash transfer programme ,the Centre has made it clear that money will be transferred to beneficiaries only when they provide an Aadhaar card and a bank account number by the cut-off date in the respective districts. There should be no phased roll-out within any particular district; the entire district should switch to direct cash transfer at one-go on a given date. Working on the roll-out on a war footing, the government is according priority to digitization of beneficiary databases with names, addresses and Aadhaar numbers. All ministries are to ensure this immediately, the sources said. There must be a 95 per cent Aadhaar penetration level for all beneficiaries and over 95 per cent of the beneficiaries should have bank accounts, with all banks being Aadhaar-compliant. 

Computer Terminology 1 Questions Asked in Previous Years UPSC S&T

Computer Terminology
Questions Asked in Previous Years


Firewall
In computing, a firewall is a software or hardware-based network security system that controls the incoming and outgoing network traffic by analyzing the data packets and determining whether they should be allowed through or not, based on a rule set.

Malware
Malwareshort for malicious (or malevolent) software, is software used or programmed by attackers to disrupt computer operation, gather sensitive information, or gain access to private computer systems. It can appear in the form of codescripts, active content, and other software. 'Malware' is a general term used to refer to a variety of forms of hostile or intrusive software.

MPEG
The Moving Picture Experts Group (MPEG) is a working group of experts that was formed by ISO and IEC to set standards for audio and video compression and transmission.

ISP
An Internet service provider (ISP, also called Internet access provider) is a business or organization that offers users access to the Internet and related services. Many but not all ISPs aretelephone companies. They provide services such as Internet transitdomain name registration and hosting, dial-up accessleased line access and colocation.

HTML
HyperText Markup Language (HTML) is the main markup language for creating web pages and other information that can be displayed in a web browser.


ASCII 
The American Standard Code for Information Interchange is a character-encoding scheme originally based on the English alphabet. ASCII codes represent text in computerscommunications equipment, and other devices that use text. Most modern character-encoding schemes are based on ASCII, though they support many additional characters.

Root Kit
rootkit is a stealthy type of software, often malicious, designed to hide the existence of certain processes or programs from normal methods of detection and enable continued privileged accessto a computer. The term rootkit is a concatenation of "root" (the traditional name of the privileged account on Unix operating systems) and the word "kit" (which refers to the software components that implement the tool). The term "rootkit" has negative connotations through its association with malware.


Computer Architecture
In computer science and engineeringcomputer architecture is the art that specifies the relations and parts of a computer system. Computer architecture is different than the architecture of buildings, the latter is a form of visual arts while the former is part of computer sciences. In both instances (building and computer), a complete design has many details, and some details are implied by common practice.



Search Engine
web search engine is a software system that is designed to search for information on the World Wide Web. The search results are generally presented in a line of results often referred to assearch engine results pages (SERPs). The information may be a specialist in web pages, images, information and other types of files. Some search engines also mine data available in databasesor open directories. Unlike web directories, which are maintained only by human editors, search engines also maintain real-time information by running an algorithm on a web crawler.

CAD
Computer-aided design (CAD) is the use of computer systems to assist in the creation, modification, analysis, or optimization of a design.CAD software is used to increase the productivity of the designer, improve the quality of design, improve communications through documentation, and to create a database for manufacturing. CAD output is often in the form of electronic files for print, machining, or other manufacturing operations.

CAM
cam is a rotating or sliding piece in a mechanical linkage used especially in transforming rotary motion into linear motion or vice-versa.It is often a part of a rotating wheel (e.g. an eccentric wheel) or shaft (e.g. a cylinder with an irregular shape) that strikes alever at one or more points on its circular path. The cam can be a simple tooth, as is used to deliver pulses of power to a steam hammer, for example, or an eccentric disc or other shape that produces a smooth reciprocating (back and forth) motion in the follower, which is a lever making contact with the cam.

Thin Film
thin film is a layer of material ranging from fractions of a nanometer (monolayer) to several micrometers in thickness. Electronic semiconductordevices and optical coatings are the main applications benefiting from thin-film construction.


CIM
The Common Information Model (CIM) is an open standard that defines how managed elements in an IT environment are represented as a common set of objects and relationships between them. This is intended to allow consistent management of these managed elements, independent of their manufacturer or provider.

Artificial Intelligence
Artificial intelligence (AI) is the intelligence of machines or software, and is also a branch of computer science that studies and develops intelligent machines and software. 


Clock Rate
The clock rate typically refers to the frequency at which a CPU is running. It is measured in the SI unit Hertz.

HTTP
The Hypertext Transfer Protocol (HTTP) is an application protocol for distributed, collaborative, hypermedia information systems. HTTP is the foundation of data communication for the World Wide Web.

CPU
central processing unit (CPU), also referred to as a central processor unit, is the hardware within a computer that carries out the instructions of a computer program by performing the basic arithmetical, logical, and input/output operations of the system. The term has been in use in the computer industry at least since the early 1960s. The form, design, and implementation of CPUs have changed over the course of their history, but their fundamental operation remains much the same.

ROM
Read-only memory (ROM) is a class of storage medium used in computers and other electronic devices. Data stored in ROM cannot be modified, or can be modified only slowly or with difficulty, so it is mainly used to distribute firmware (software that is very closely tied to specific hardware, and unlikely to need frequent updates).

BIOS
In IBM PC compatible computers, the Basic Input/Output System (BIOS), also known as the system BIOS or ROM BIOS, is a de facto standard defining a firmware interface. The name originated from the Basic Input Output System used in the CP/M operating system (released in 1976). The BIOS software is built into the PC, and is the first software run by a PC when powered on. The fundamental purposes of the BIOS are to initialize and test the system hardware components, and to load an operating system or other programs from a mass memory device. The BIOS provides a consistent way for application programs and operating systems to interact with the keyboard, display, and other input/output devices. Variations in the system hardware are hidden by the BIOS from programs that use BIOS services instead of directly accessing the hardware.

Modem
modem (modulator-demodulator) is a device that modulates an analog carrier signal to encode digital information, and also demodulates such a carrier signal to decode the transmitted information. The goal is to produce a signal that can be transmitted easily and decoded to reproduce the original digital data. Modems can be used over any means of transmitting analog signals, from light emitting diodes to radio. The most familiar example is a voice band modem that turns the digital data of a personal computer into modulated electrical signals in the voice frequency range of a telephone channel. These signals can be transmitted over telephone lines and demodulated by another modem at the receiver side to recover the digital data.

Computer Virus
computer virus is a computer program that can replicate itself and spread from one computer to another. The term "virus" is also commonly, but erroneously, used to refer to other types of malware, including but not limited to adware and spyware programs that do not have a reproductive ability.


India’s Space Programme