Hotspot, Broadband, Digital Payments & Cybersecurity Terms
1. Hotspot and Broadband (with Examples)
- Hotspot: A hotspot is a wireless access point created using a mobile phone or router to share internet access over Wi-Fi1. It allows multiple devices to connect simultaneously2. For example, turning on the hotspot on a smartphone enables a laptop to access the internet3.
- Broadband: Broadband refers to high-speed, always-on internet delivered through DSL, fiber optics, or cable networks4. It supports activities like streaming, online classes, and gaming5. Examples include Airtel Xstream Fiber and Jio Fiber services provided for homes and offices6.
2. ISP and Its Role
ISP (Internet Service Provider): An ISP is a company that supplies internet connectivity to users7. The ISP assigns IP addresses to devices, maintains network infrastructure, and ensures stable and secure internet access8. It also provides services like email, web hosting, DNS resolution, and customer support9. Examples of ISPs in India include Airtel, Jio, BSNL, and ACT Fibernet10. ISPs act as a bridge between users and the global internet11.
3. Internet Banking and e-Wallets
Internet Banking: Internet banking enables customers to access banking services through a bank's website or mobile app12. It supports fund transfers, mini statements, tax payments, and online bill payments without visiting a branch13.
e-Wallets: e-Wallets are digital applications that store money electronically and allow quick payments using a mobile device14. Popular e-wallets like Paytm, PhonePe, and Google Pay simplify bill payments, mobile recharges, and online shopping15. Both tools promote digital transactions and financial convenience16.
4. QR Code
QR Code (Quick Response Code): A QR code is a two-dimensional barcode that stores information such as URLs, product details, or payment data17. When scanned using a smartphone camera or QR scanner, it quickly redirects users to the stored information18. QR codes are widely used for UPI payments (Scan & Pay), downloading applications, verifying product authenticity, and contactless menus in restaurants19. They ensure speed, accuracy, and ease of access20.
5. Netiquettes with Examples
Netiquettes are rules of acceptable behavior while using the internet aimed at promoting courtesy, respect, and responsible communication in digital spaces21.
Examples of netiquettes include:
- Not using abusive or offensive language in comments or chats22.
- Avoiding the spread of fake news or unverified information23.
- Respecting others' privacy by not sharing images or messages without permission24.
- Writing emails politely with proper subject lines25.
Following netiquettes ensures a safe and respectful online environment26.
6. E‑Governance with Examples
E‑governance refers to the delivery of government services through electronic means to improve transparency, efficiency, and accessibility27.
Example 1 (IRCTC Railway Reservation): Citizens can book train tickets, check schedules, and cancel bookings online28.
Example 2 (Passport Seva Portal): Applicants can apply for a passport, schedule appointments, and track application status online29. E‑governance reduces paperwork, travel, and time required for accessing public services30.
7. Common Cybercrimes in India
Common cybercrimes include:
- Phishing: Fraudulent emails or messages that trick users into revealing passwords or bank details31.
- Cyberbullying: Sending threatening or insulting messages through social media32.
- Ransomware Attack: Malware that encrypts user data and demands money for recovery33.
- Online Financial Fraud: Unauthorized UPI or card transactions done without the user's knowledge34.
These cybercrimes affect individuals' privacy, finances, and mental well‑being and require strong cyber hygiene practices35.
8. Cybercrimes Against Women and Children
Against Women: Women often face cyberstalking, where offenders repeatedly harass them through messages or calls36. Morphing involves editing photographs to create fake or inappropriate images37. Online harassment includes abusive comments, threats, or blackmail on social media38.
Against Children: Children face threats like online grooming, where criminals manipulate them through gaming or chat apps, and child pornography, which is strictly illegal39. These crimes have serious psychological and legal implications40.
9. RTGS vs NEFT
RTGS (Real-Time Gross Settlement): Transfers funds immediately in real time41. It is used for large-value transactions (above 2 lakh)42. It settles each transaction individually and is faster but may involve higher charges43.
NEFT (National Electronic Fund Transfer): Works on half-hourly batch settlement44. There is no minimum transaction limit45. It is slower compared to RTGS and widely used for regular payments and transfers46.
10. IMPS vs NEFT
IMPS: Provides instant, real-time fund transfers47. It is available 24×7, including holidays, and is ideal for small to medium payments48. It works via mobile number, MMID, or UPI49.
NEFT: Uses batch-based settlement and is slower compared to IMPS50. It requires bank account details and is suitable for scheduled or regular payments51.
11. AEPS and Its Use Cases
AEPS (Aadhaar Enabled Payment System): AEPS allows banking transactions using an Aadhaar number and biometric authentication52. It is useful for rural areas with limited banking facilities53.
- Use Cases: Cash withdrawal through micro-ATMs54.
- Balance inquiry using Aadhaar authentication55.
- Direct Benefit Transfer (DBT) withdrawals such as pensions or subsidies56.
AEPS promotes financial inclusion by enabling banking without cards or smartphones57.
12. USSD and Its Use Cases
USSD (Unstructured Supplementary Service Data): USSD is a mobile-based banking service accessed by dialing *99# that works without internet connectivity58.
- Use Cases: Checking bank account balance59.
- Transferring money using UPI over USSD60.
- Mini statements and fund requests61.
USSD helps users without smartphones or internet access perform basic banking functions62.
13. MAC Address and Uses
A MAC Address (Media Access Control Address) is a unique hardware identifier assigned to the network interface card (NIC) of a device63. It is permanent and embedded by the manufacturer64.
- Uses: Helps identify devices in a local network65.
- Enables MAC filtering in routers to allow or block devices66.
- Assists in network troubleshooting and monitoring67.
MAC addresses ensure secure and efficient communication within local networks68.
14. IP Address and Its Types
An IP Address is a numerical label assigned to a device connected to a network for identification and communication69.
- Types: IPv4: 32-bit address such as 192.168.1.1, widely used70.
- IPv6: 128-bit address such as 2001:db8::1, designed to overcome IPv4 limitations71.
IP addresses help route data packets from source to destination72.
15. UPI and Its Features
UPI (Unified Payment Interface): UPI is a real-time digital payment system managed by NPCI that links multiple bank accounts into a single mobile app73.
- Features: Instant money transfer 24×774.
- QR-based merchant payments75.
- Uses UPI ID instead of bank details76.
- Supports bill payments, recharges, and person-to-person transfers77.
UPI has transformed digital payments in India due to its speed and convenience78.
16. OTP and Its Importance
OTP (One-Time Password): An OTP is a temporary numeric code used for user authentication during online transactions or logins79.
- Importance: Prevents unauthorized access even if the password is compromised80.
- Adds an extra layer of security for banking and e-commerce81.
- Reduces chances of fraud and identity theft82.
- OTPs expire quickly, making them safe and reliable for verification83.
17. Malware and Ransomware
- Malware: Refers to malicious software created to harm, steal, or damage data, including viruses, worms, trojans, and spyware84.
- Ransomware: A type of malware that encrypts user data and demands payment to restore access85. It spreads through phishing emails or unsafe downloads86. Examples include WannaCry and Locky ransomware attacks87. Ransomware disrupts businesses and causes financial loss88.
18. Blogs and Their Uses
A blog is an online platform where individuals or organizations publish articles (posts) on various topics such as education, technology, cooking, or travel89.
- Uses: Sharing knowledge or personal opinions90.
- Providing tutorials and educational content91.
- Publishing reviews of products or services92.
- Creating personal branding or business marketing93.
Blogs promote communication, creativity, and information sharing94.
19. Point of Sale (PoS) Example
A PoS (Point of Sale) device is used for electronic payments in shops or retail counters95. It reads card details through swiping, inserting, or tapping96.
For example, when a customer pays using a debit card at a supermarket, the PoS machine processes the transaction and generates a receipt97. PoS devices support card, UPI, and wallet payments, making transactions quick and secure98.
20. IMEI and Its Uses
IMEI (International Mobile Equipment Identity): IMEI is a unique 15-digit number that identifies every mobile handset99.
- Uses: Helps track lost or stolen phones by police or service providers100.
- Prevents misuse of stolen devices by blocking their network access101.
- Assists in device warranty verification102.
IMEI enhances mobile security and helps in law enforcement103.
21. Cloud Computing Example
Cloud computing provides on-demand access to computing resources like servers, databases, and storage over the internet104.
Example: Google Drive allows users to store documents online, access them anywhere, and share files easily105. Cloud computing reduces hardware costs, supports remote work, and ensures automatic backups106.
22. Virtual Reality and Applications
Virtual Reality (VR) creates an immersive, computer-generated environment that users can interact with using VR headsets107.
Applications:
- Education: Medical students practicing surgeries108.
- Gaming: Fully immersive 3D games109.
- Training: Military and pilot training simulations110.
VR enhances learning and entertainment through realistic simulations111.
23. Big Data Analytics and Uses
Big Data Analytics involves collecting, processing, and analyzing huge volumes of structured and unstructured data to find patterns and support decision-making112.
Applications:
- E-commerce platforms use it to recommend products113.
- Banks detect fraud through transaction analysis114.
- Healthcare predicts disease outbreaks using patient data115.
Big data helps organizations improve efficiency and customer experience116.
24. e-Wallets and Online Bill Payment
e-Wallets: Store money digitally and allow payments through mobile apps without using physical cash or cards. Examples include Paytm, Amazon Pay, and PhonePe118.
Online Bill Payment: Enables users to pay electricity, water, DTH, and mobile bills through apps or websites119. It saves time, avoids queues, and provides instant receipts120. Together, they promote digital transactions and financial convenience121.
English with a size of 13.81 KB