Bharat Internet Utsav

 Department of Telecommunications (DoT) is pleased to announce the successful conclusion of the “Bharat Internet Utsav”, a celebration that brought together citizens from all corners of the nation to share their stories/videos about how the internet has transformed their lives. The event conducted in collaboration with MYGOV for 45 days (07.07.2023 to 21.08.2023), witnessed an overwhelming response with over 24,000 participations highlighting the profound impact of the internet on socio-economic development.

The DoT in partnership with MYGOV, extends its deepest gratitude to every participant who shared their stories/videos to the Bharat Internet Utsav. The sheer volume   (24,128 entries) reflects the widespread recognition of the internet’s impact on individual lives, communities, and the nation’s progress as a whole.

Since its launch on July 7, 2023, the Bharat Internet Utsav garnered an extraordinary influx of stories/videos from individuals, communities, and organizations across India. These heartwarming videos showcase on how the internet has become an integral part of daily life, enabling progress, connectivity and knowledge-sharing like never before. The event captured stories that spanned diverse sectors, ranging from education and healthcare to entrepreneurship and cultural preservation

As the event concludes, the evaluation process to select the most impactful stories/videos has begun. The jury will meticulously review each submission to determine the winners. As a part of appreciation participants will be felicitated as:

A)   Best three (3) stories/videos will be given certificate and cash prize of Rs.15,000, Rs.10,000 and Rs.5000 respectively.

b)        Rs. 1,000 cash prize along with certificate will be given to one best story/video from each state/UTs.

c)         In addition, 10 more best stories/videos will get the appreciation certificate.

d)        These stories/videos shall be displayed on various social media handles of Ministry of Communications, Government of India.

The overwhelming success of the Bharat Internet Utsav reaffirms the Department of Telecommunication’s commitment to provide secure, reliable, and affordable telecommunications services to every citizen, ensuring that the benefits of the digital age reach the farthest corners of the country.

For more updates and information about the Bharat Internet Utsav please visit https://innovateindia.mygov.in/bharat-internet-utsav/.

*******

India is moving towards a faster decade

With the introduction of 5G in Hyderabad and Bangalore, India has been able to get into the era of 5G. It is going to be a major change in the technological advancement in India. 

On the network front, the trials are still going on for 5G in some other parts of our country. There will be an introduction of 5G in the rest of the country also. The introduction will happen very soon. The telcos are currently busy giving the final ok to the network performance for a better experience for the public. 

Among all this, companies like BSNL have not been able to launch even 4G in our country. As the latest development, the contract has been given to TCS for the installation of the towers and the technology which will be taking care of the entire system. It will be the biggest order for a home-grown technical implementation in India. 

Now, the next phase for BSNL will be to launch the 5G services along with 4G as soon as possible. For that, the work is going on. It is expected that BSNL will launch 4G by December or January and 5G will be rolled out by August next year.

On the private telcos front, Jio is the one which has launched 5G in Hyderabad and Bangalore. Airtel is also working hard to launch the latest 5G network in the market. 

In the field of internet-related technology and especially equipment, there are some companies which are considered the world leader. The companies are Nokia, Ericsson and Huawei. 

https://unsplash.com/photos/eYwn81sPkJ8

So, if India becomes successful in developing the technology for implementing such revolutions in a country like India. Then, India will be one of the few countries that have been able to implement indigenous built technology in the country.

For those, who are not in touch with such development, the private telcos are planning to launch the services in the metro cities at first. After that, the rest of the country will be able to experience it. 

In case of advantages, 5G has better speeds than 4G. The network also provides a greater number of devices to be connected. The new network will also provide better stability than the previous generations.

These new implementations will also likely increase job opportunities in the tech field.

The new launch will also initiate more locally made technologies in the future. In recent times, even Tata has been able to get the opportunity to make iPhones in India.

There is also an initiative which will allow some companies to manufacture chips in our country. It is necessary as there is a shortage of chips in India. All of these changes will surely improve the scenario of the tech world in India.  There will also be some challenges to the implementation that the companies will have to tackle. It will also reveal some underlying concerns regarding the networks and the possible issues that the beta users will generally face during the trials. All of these factors will slowly disappear. Now, we will see how the 5G changes the face of our country. 

Cyber Security

Cyber Security is the practice of identifying the vulnerabilities and threats associated with digital systems and mitigating these risks. The term “cyber” refers to a nickname for an internet-connected computer or any other device that uses a processor, input/output and networking connections. The common threats include: viruses, worms, trojans and malware. A related term is cyber warfare which is the use of cyber tools in warfare to achieve objectives that would not be possible by using physical means such as bombs or missiles. The role of cyber security professionals is to protect critical systems and information. The main goal of cyber security is to prevent hackers from gaining access to information or using nefarious actions that would put the users’ information at risk.cyber security important because the government, military, law enforcement, and private industry use many critical resources that could be negatively affected by cyber attacks. Many of these systems are financial, such as banks, credit cards, ATMs, stock markets and networks. Government agencies use software to manage the US budget system and the military uses software to track troop movement. Because of these vital uses, cyber attacks could cripple important services or even destroy the country’s financial security.In order for companies to operate securely in today’s technological world they need to implement cyber security protections. These protections include firewall protection, anti-virus programs, encryption codes that keep hackers from easily accessing sensitive data and data backup systems in case any security breach occurs that causes damage to systems or information.

A major concern to cyber security is providing more efficient support to better protect against cyber related activities. This means an organization must have the information available to help identify possible threats including understanding what possible methods hackers may use to gain access, and how the organization can prepare for any potential attacks.
Cyber security is a constantly growing area of study and research. Some of the most recent research being done is focused on cyber security in cyber space. The purpose of this paper will be to analyze if a previous study found in 2012 correctly identified computers within an organization as well as their movement throughout the network. There are two main findings that are sought out which were: 1) how computers move across networks (e.g. LAN, WAN, etc.), and 2) how computers might behave in a network. The assumption is that computers within an organization move between locations (e.g., building or branch offices) and they may change their location(s). Also, the behavior of a computer can be tracked as observed (e.g., its IP address changes from one to another, or its Whois information changes from one domain name service provider to another).

Cyber security offers a variety of career paths depending on the level of experience you have and your area of expertise. You can be an analyst/engineer, network administrator, programmer, or data analyst and many more other positions available depending on your area of interest and experience. Some jobs a required while others are possible as long as it relates to your field in the security field such as computer science or finance. If you’re looking for a career that will pay well, then cyber security is the right choice for you because it’s relatively new and will only continue to grow.


“Security used to be an inconvenience sometimes, but now it’s a necessity all the time.”

Impact of Social Media on Youth.

Social media is an plateform which is build that facilitates the users to create content and sharing of information, ideas, interests and different contents ,through virtual communities and networks technology.

Over the last two decades, social media has gained tremendous growth and fame. Despite the fact that almost everyone in the world is connected to at least one social media platform, youth and teens are the ones who who are using social media and are becoming so socially hampered that they even interfere their lives with social media. According to researchers, they have found that these different social media plateforms have a profound impact on the lives of our youth in society in terms of morality, behavior, and even education.

The use of social media has both negative and positive impacts on our youth today. The positive effects of social media on young people today is keeping up to date with what’s happening around the world and being able to network and stay connected with classmates and friends without physical meetings. For example, people in one city can connect and interact with friends in other cities and neighborhoods, bridging the gap between them. In addition, social media platforms allow young people to create pages and groups based on their profession, beliefs, and other aspects of life, creating more connections and more opportunities in their respective fields. This could even create more employment opportunities for unemployed youth.

According to a BBC News report, social media sites appear to continue to connect and inform more people, but it’s also causing social isolation among youths as it reduces the number of face-to-face interactions between young people, as they usually spend most of their time on these online social platforms. Analysis of many studies by various scientists has shown that social isolation can have a variety of effects on youth’s physical, emotional, mental and psychological estate which can create different problems in them. This, in turn, can lead to depression, anxiety, and many other problems. Also, using short forms and abbreviations can lead to misspellings and misuse of words and tenses. This has a direct impact on the student’s language skills and tends to adversely affect the student as it leads to poor language performance.

Also, young teens under the age of 18 can be exposed to online content that may not be appropriate for their age. Social media often introduce these teens to pornographic content which may be shared on online social groups and this may mislead them . The morals of these teenagers are also manipulated because they are granted access to immoral literature and video. This can harm their phycology of seeing things differently in life.

The social media can be used effectively by youth as long hours on social media can be devoted to productive activities that enable people to grow, earn a living, and be educated, such as using online tutorials and online research materials.
Social media may harm ones creativity and also can reduces the productivity of teens by chatting for long periods on social media sites . This may cause young people to not be independent, and rely on the help from others . Social media also provides a great platform for cyber theft and bullying. This increases the chances of personal information theft and incidents. This poses a lot of risk to young people as their personal information can be stolen because they are stored in places they do not know or where security is unknown or suspicious.

At last, social media opens a communication channel for young people and has many benefits. This includes the development of oneself and opening to wide range of social networks that promote opportunities and cultural abilities. However, it is very important that youth should use different social platforms carefully to avoid being victimized by cybercriminals and using it in limit so that it may not harm their mental and phycology abilities.

The negative impact of Television and Internet on Children

Photo by cottonbro on Pexels.com

Children are being negatively impacted because of exposure to tv and internet. Today kids spend more time watching tv or on phone which tends to slow down thier metabolism rate. Infact browsing stuffs online to playing games all day can make  them dull and unproductive. Spending insignificant amount of time on tv and internet can make children suffer from lack of sleep and cause serious health problems. Henceforth, a healthy balance and strict timetable needs to be devised by parents which should restrict the amount of time a child spends on tv and internet. For instance, a child can watch educational videos on youtube which can help them to understand their lessons better or can watch news on tv to get equipped with current affairs apart from just playing games or watching cartoons. Limiting the amount of time being spent on tv and internet, parents can involve their children in other healthy activities such as practising yoga or taking up a sport or say learning a new musical instrument. That way a child can do better not only in his academics but can also excel in other creative artforms

Internet Protocol

What is an IP address?

An IP address abbreviation of Internet Protocol address, it is an address that is provided by the Internet Service Provider to the user, it is just like a postal address code that is pin code to find the location or place where to send the message.  An IP address is a unique group of number what are separated by the period (.), it varies from 0 to 255, and   every device has a separate and unique IP address that is assigned by the specific Internet Service Provider (ISP) to identify which particular device is communicating with them and accessing the internet from there.

If you want to access internet from you device which may be your Android, I phone, Computer the service provider assigned them a particular, unique  address  that is help them to communicate send, receive information from the right person without any misunderstanding, mistake the message is pass to the authentic person to whom it has to send.  This problem is solved by the IP address, in olden days; we have postal address to send the message/letter to the person, the message that has to be sent with the help of the address which may be his house number, city, town, postal code.  The sender will write the address on the top of the letter envelope so that it will be delivery to the right person.  If the person connected his device to internet provide by the hotel, the hotel‘s Internet Service Provider will assign an IP address to the device.

Types of IP addresses

There are different types of IP based on different categories, types.

Consumer IP addresses

A Consumer IP addresses is the individual IP addresses of a customer who connects his/her  device to a public or private  network.  A consumer connects his device through internet from his Internet Service Provider, or from the Wi-Fi.  In these days the Consumer has many electronic gadgets which he connects to his router that transfer the data from the Internet Service Provider.

Private IP addresses

A  Private IP addresses are a secure one that is connected Private Network and every devices that is connected to this Private Network is assigned a unique IP address that is assigned by the Internet Service Provider.  All Mobile devices, Computer, and Internet of Things that are connected to this private network are assigned a unique string number to the devices.

Public IP addresses

A Public IP addresses is the main address that is related to your network, as stated above that the IP address are assigned by the Internet Service Provider, the Public IP address is also assigned by the Internet Service Provider, The Internet Service Provider has a large amount of IP addresses that are stored and assigned to the customer. The public IP address is the address that  devices that are outside the network use to identify the network.

The Public IP addresses are further classified into two types they are:

  1. Dynamic
  2. Static

Dynamic IP addresses

                The Dynamic  IP address  are the IP address that changes very frequently, so the Internet  Service Providers  purchase a very huge amount of IP addresses , they assign it mechanically to the customer . This frequently changing the IP address helps the customer not to make the security actions. The frequently changing IP address won’t let the hacks to track or pool your data.

 Static IP addresses

The Static IP addresses is the contradictory to the Dynamic IP address, it remain fixed. The IP address remains fixed when it is assigned by the Internet Service Provider.  The mostly many person and business man don’t   choose static because it is risk of getting easily track, but most business which are trying host her own website server choose Static IP address so it will easier  for the customer to find them.

                The IP address can be protect by 2 ways that are using proxy and the other one is use of Virtual Private Network.   A proxy server acts as a intermediary between the internet server and your internet service providers, when you visit any website it will show the proxy IP address not yours. 

Where to find IP address is Device?

                The IP address set up in every device that is connected to the Internet, but the steps or direction is different in different devices. Some of device direction is given below:

In Window or any other Personal Computer

  1. Go to the Start Menu
  2. Type  ‘Run’ in the Search bar
  3. A Run Tab pops up
  4. Type  ‘cmd’
  5. A black screen pops up
  6. Type ‘ipconfig’
  7. Your  IP address is found.

In Android Mobile

  1. Go to the Settings
  2. Tap on Network and Internet
  3. Tap on Wi-Fi, it will show the IP address

INTERNET

The Internet is a vast network that connects computers all over the world. Through the Internet, people can share information and communicate from anywhere with an Internet connection.In the present world without internet nothing will happen.INTERNET is a short form of Interconnected Network of all the Web Servers Worldwide. It is also called the World Wide Web or simply the Web.The Internet is used for many things, such as electronic mail, online chat, file transfer, and the interlinked web pages and other documents of the World Wide Web. The most used service on the Internet is the World Wide Web.Internet is a system that interconnects the different computer systems across the world. … The Internet system carries an extensive range of information resources and services including World Wide Web (WWW), telephony, electronic mail, etc. It uses standard internet protocols, such as TCP/IP and HTTP, etc.


Internet is a global network that connects billions of computers across the world with each other and to the World Wide Web. It uses standard internet protocol suite to connect billions of computer users worldwide. It is set up by using cables such as optical fibers and other wireless and networking technologies. At present, internet is the fastest mean of sending or exchanging information and data between computers across the world.

Advantages of the Internet:–


Instant Messaging: You can send messages or communicate to anyone using internet, such as email, voice chat, video conferencing, etc.


Get directions: Using GPS technology, you can get directions to almost every place in a city, country, etc. You can find restaurants, malls, or any other service near your location.


Online Shopping: It allows you to shop online such as you can be clothes, shoes, book movie tickets, railway tickets, flight tickets, and more.


Pay Bills: You can pay your bills online, such as electricity bills, gas bills, college fees, etc.


Online Banking: It allows you to use internet banking in which you can check your balance, receive or transfer money, get a statement, request cheque-book, etc.


Online Selling: You can sell your products or services online. It helps you reach more customers and thus increases your sales and profit.


Work from Home: In case you need to work from home, you can do it using a system with internet access. Today, many companies allow their employees to work from home.


Entertainment: You can listen to online music, watch videos or movies, play online games.


Cloud computing: It enables you to connect your computers and internet-enabled devices to cloud services such as cloud storage, cloud computing, etc.


Career building: You can search for jobs online on different job portals and send you CV through email if required.

Types of internet connections include:-

* DSL (digital subscriber line).


* cable broadband.


* fibre optic broadband.


* wireless or Wi-Fi broadband.


* satellite and mobile broadband.
dedicated leased line.

Disadvantages of the Internet:-

* Addiction, time-waster, and cause distraction.


* Bullying, trolls, stalkers, and crime

* Spam and advertising.


* Pornographic and violent images.


* Never being able to disconnect from work.


* Identity theft, hacking, viruses, and cheating.


* Affects focus and patience.

5 Scariest Creepypastas that are creeping around the internet!

 

This is an image of 5 creepiest creepy pastas creeping around the internet!

Creepypastas are stories or lores that have made it to the world of internet and have become internet lores. Many of these originate from legends, mysteries, and unexplained occurrences that are passed on among generations or shared amidst people on a large basis. It’s a delight and a hair-raising feeling to read them back to back in a single place. And that’s why we bring to you this list of scariest creepypastas that are wandering around the internet. Waiting for you to read!

1.Slender Man

This Slender Man was pushed into the world of the internet based on an urban legend. It stated that in the woods amidst the dense fog, there lived a slender figure who laid in wait for preying on unsuspecting children. He possessed superficially long limbs and wore a suit. 

As if being in the woods and becoming a part of scary campfire stories weren’t enough. He started inhabiting the minds of people. Some were terrified of him while the others became obsessed with him. Murders and crimes were committed in his name as offenders claimed that he asked them to do so! 

You can experience the fear he induces by watching the sinister movie series. If you dare!

2. Robert the Doll

This is an image of Robert the Doll


Creepypastas are only limited to some of the stories surrounding it. Otherwise the doll does exist in reality! The doll was gifted to an artist named Robert Eugine Otto during the late 19th or early 20th century. It was said to have been cursed by Robert’s family servant before it was given to him. He named the doll after him and his neighbors claimed to have seen the doll standing eerily by his window, staring at them! 

Countless supernatural occurrences surrounded the doll in the coming ages. Today the doll rests in a museum and it is best for people to leave it alone. You can watch the 2014 movie Annabelle to get a taste of what living with Robert would be like!

3. The Russian Sleep experiment

This is an image of Russian sleep experiment.


After world war 2, five prisoners were shut inside a room filled with gas that would prevent them from falling asleep. All was well for a few days, at least in comparison to what comes later. As a week passed by, the prisoners were slowly going insane. Another week passed and they started committing acts of unthinkable horror! Upon the third week, 2 of them were dead! 30 days later when the experimenters went to check on the remaining prisoners, or what was left of them, was beyond recognition. They were subjected to unimaginable levels of abuse inflicted by each other!

The story goes into gory details that have been omitted for the squeamish ones among you readers. With no supernatural elements and simply evil intentions of some deranged humans. This creepypasta is effectively one among the scariest on the internet!

4. Jeff the killer

This creepypasta is well known for the image it is represented by. Picture this, a sore white face, with a bloody grin and lidless green eyes! This is what Jeff looks like. If you are reminded of the Joker, Jeff also has a backstory for his appearance like the Joker. Some say that Jeff was involved in a fire accident that burnt his face severely and tore off his eyelids. While the others say that he was involved in a chemical accident that affected his face and drove him insane. Whatever the truth may be, both the iterations of his backstory are scary! 

Jeff is said to have killed his entire family after his accident and took of into the woods, only to be hiding in people’s closets and asking them to go to sleep, before he murders them too. 

5. Amora Petrova 

Amora Patrova was a skating enthusiast who googled her name and found a wikipedia page about her. Apparently the page had a lot of nice things to say about her which was beyond the truth. But slowly everything mentioned in the page began to happen! Amora became a very successful and renowned skater in America, just like the page suggested. However, that wasn’t enough for her and she tried to alter the pager by adding a more prestigious title in the field of skating to her name. 

What follows later will justify the reason why I referred to her in past tense! Amora died a traumatic death, stripped off all the accolades she had earned. If this doesn’t teach you to be careful what you wish for, nothing else will.

If these creepypastas don’t keep you awake, nothing else will!


References


By Xavier Piedra 

Best apps that will make you want to install them! 

 

This is an image of best apps that make you want to install them.

Apps assure us that we can do so much with the touch of a button. Or more appropriately, with the touch of a screen. Want to go somewhere in particular? With the press of a ‘screen’, you will know how to get there and the mode of transport available to reach your destination. Do you wish that you had ready-made food at your table? Within a few clicks, you will be having your desired meal without having to leave your house. 

All these are made possible by the applications that are available on playstore and other app stores. There are apps available today for every function that you can imagine. So to make the best use of your android phone. Take a look at some of the best apps that will make you want to install them!

1.Bitwarden Password Manager

With the Bitward Password Manager app, you would no longer face the hassle of resetting your passwords for your social media and other important sites. This app provides you with a vault to secure your passwords and usernames and retrieve them when required. You no longer need to worry about forgetting your passwords or facing the risk of its disclosure to anyone due to the app’s encryption functionality. This app surely makes the netizens want to install it.  

2. Credit Karma

Credit Karma is a lighthearted financial application. Its purpose is to allow you to check your credit score for free. Furthermore, the app will alert you when your credit score changes significantly. Other features of the app include notifying you of credit cards that you might be eligible for based on your credit score.You will also receive notifications if a new account has been opened in your name. This app has indeed the best to offer for free of charge!

3. Gboard

Gboard is a virtual keyboard app, brought to you by the master of the search engines, namely Google. It is a simple tech app that allows you to type with gestures and voice commands. It also allows you to search for emojis and GIFs. The icing on the cake here is that you can search the web on this keyboard without having to leave the app you were using. If not in your life, it will certainly make you want to install it. 

4. Google Drive

Google Drive is your one stop drive to access and store your Google Docs, Google Files, Google Photos, Google Slides, Google Sheets and other Google data you can think of as they are all integrated with the Google drive app. In a traditional sense, you can access your word documents, excel sheets, powerpoint presentations and photos, all at one place. 

It also makes it easier to locate files and downloads on your device, and also enables easy sharing of your documents through mail or messaging apps. Thus making it one of the best apps that makes you want to install it. 

5. Zedge

Do you often find yourself scouring through the internet looking for wallpapers and ringtones? Let your search end with Zedge, a one stop app where you will find wallpapers, ringtones, notification tones, and alarms across a variety of genres. This will certainly make you want to install this app on your phone as it boasts several options and varieties in its content. 

So these are some of the best apps that you may want to check out. I am looking forward to downloading the Gboard app. 


References


Joe Hindy, December 2021, 15 best free Android apps available right now, http://www.androidauthority.com

INTERNET

The Internet is a vast network that connects computers all over the world. Through the Internet, people can share information and communicate from anywhere with an Internet connection.In the present world without internet nothing will happen.INTERNET is a short form of Interconnected Network of all the Web Servers Worldwide. It is also called the World Wide Web or simply the Web.The Internet is used for many things, such as electronic mail, online chat, file transfer, and the interlinked web pages and other documents of the World Wide Web. The most used service on the Internet is the World Wide Web.Internet is a system that interconnects the different computer systems across the world. … The Internet system carries an extensive range of information resources and services including World Wide Web (WWW), telephony, electronic mail, etc. It uses standard internet protocols, such as TCP/IP and HTTP, etc.

Internet is a global network that connects billions of computers across the world with each other and to the World Wide Web. It uses standard internet protocol suite to connect billions of computer users worldwide. It is set up by using cables such as optical fibers and other wireless and networking technologies. At present, internet is the fastest mean of sending or exchanging information and data between computers across the world.

Advantages of the Internet:


Instant Messaging: You can send messages or communicate to anyone using internet, such as email, voice chat, video conferencing, etc.


Get directions: Using GPS technology, you can get directions to almost every place in a city, country, etc. You can find restaurants, malls, or any other service near your location.


Online Shopping: It allows you to shop online such as you can be clothes, shoes, book movie tickets, railway tickets, flight tickets, and more.


Pay Bills: You can pay your bills online, such as electricity bills, gas bills, college fees, etc.


Online Banking: It allows you to use internet banking in which you can check your balance, receive or transfer money, get a statement, request cheque-book, etc.


Online Selling: You can sell your products or services online. It helps you reach more customers and thus increases your sales and profit.


Work from Home: In case you need to work from home, you can do it using a system with internet access. Today, many companies allow their employees to work from home.


Entertainment: You can listen to online music, watch videos or movies, play online games.


Cloud computing: It enables you to connect your computers and internet-enabled devices to cloud services such as cloud storage, cloud computing, etc.


Career building: You can search for jobs online on different job portals and send you CV through email if required.

Types of internet connections include:-

* DSL (digital subscriber line).


* cable broadband.


* fibre optic broadband.


* wireless or Wi-Fi broadband.


* satellite and mobile broadband.
dedicated leased line.

Disadvantages of the Internet:-

* Addiction, time-waster, and cause distraction.


* Bullying, trolls, stalkers, and crime.


* Spam and advertising.


* Pornographic and violent images.


* Never being able to disconnect from work.


* Identity theft, hacking, viruses, and cheating.


* Affects focus and patience.

MASS MEDIA

As the name itself suggests, Mass Media refers to an array of methods which help to promote a variety of things/messages/ideas among the masses through different communication outlets. In today’s times, the various kinds of mass media include, Cinema, Radio, Television, Internet, Print, Recordings, Mobile phones, etc. People may opt for a particular medium of communication based on the availability of technology, type of message/product to endorse and ease of mass communication.

CINEMA

Movie making is certainly gaining a lot of popularity in this era. Cinema Media has a lot of potential to create an impact on the society at large. The film industry inclusive of Hollywood, Bollywood, Tollywood, so on and so forth manifests the reflection of society in the past and the present. Today, the youth does look up to movies for recreation. A good cinema can entertain, educate and inspire the viewer in several ways.

EXAMPLE – The movie JOKER, impacted it’s audience with inspirations like, leaning to forgive, succeeding despite having mental issues, never giving up on your dreams, etc.

RADIO

The credit of being able to enjoy broadcasting in the earlier times and today as well, goes to Guglielmo Marconi, the developer of the first radio transmitter and receiver. With scarce means of recreation in the olden times, Radio bound families, peers, neighbors together. The auditory mode of communication, Radio is also used to maintain contacts with the flights and ships that are out in the air and water. Radio is also an essential element used at war zones to transmit information through morse codes.

EXAMPLE – Africa considers radio as the most important too of communication. Radio is quite cost efficient, does not need any expensive data package, helps to reach out to a broader audience and is also easily portable.

TELEVISION

Television is an audio visual type of Mass medium. It is used by broadcasters to air sports, daily soap, movies, news, etc. The progress of the T.V is easily noticeable, as it started from the black and white version and has now developed to a very high extent in the form of OLED, LCD, LED, and HD. It is used by direction and production houses to entertain, inform and educate viewers. It can be considered as an ultimate Pandora’s Box.

EXAMPLE – Viewers ranging from the kids to the elderly at home, are often seen glued to the television for the purpose of entertainment.

INTERNET

Sharing information and communication has become a piece of cake since the invention of the Internet. This mass medium has bypassed almost all other media of communication. Internet is now considered as a boon to e-sellers, social media influencers, researchers and all the other end users as well. The Internet has become a global networking platform which anyone can access at any point of time.

EXAMPLE – People do resort to the Internet to pay their bills, listen to music, manage finances, to shop online or even to communicate with people all across the globe.

Mass Media plays a significant role in this era. Making appropriate usage of it will give us fruitful results. Mass media helps in transmitting values, heritage, cultures and information and acts as a watchdog on society.

Twitter Testing to Flag ‘Misleading’ Content

Twitter on Tuesday declared a modern highlight to permit clients to hail substance that may contain deception, a flay that has as it were developed amid the pandemic. “We’re testing a highlight for you to report Tweets that appear deluding – as you see them,” the social arrange said from its security and security account.

Starting Tuesday, a button would be obvious to a few clients from the Joined together States, South Korea, and Australia to select “it’s deluding” after clicking “report tweet.” Users can at that point be more particular, hailing the deceiving tweet as possibly containing deception around “wellbeing,” “legislative issues” and “other.”

“We’re surveying on the off chance that typically an viable approach so we’re beginning little,” the San Francisco-based company said. “We may not take activity on and cannot react to each report within the experiment, but your input will offer assistance us recognize patterns so that we will move forward the speed and scale of our broader deception work.” Twitter, like Facebook and YouTube, frequently comes.

But the stage does not have the assets of its Silicon Valley neighbors, and so regularly depends on exploratory strategies that are less costly than selecting armed forces of moderators. Such endeavors have inclined up as Twitter toughened its deception rules amid the COVID-19 widespread and amid the US presidential decision between Donald Trump and Joe Biden.

For case, Twitter started blocking clients in Walk who have been cautioned five times almost spreading wrong data almost vaccines. And the organize started hailing tweets from Trump with a pennant caution of their deluding substance amid his 2020 re-election campaign, some time recently the then-president was at long last prohibited from the site for posting actuations to viciousness and messages undermining the race results. Moderators are eventually dependable for deciding which substance really damages Twitter’s terms of utilize, but the arrange has said it trusts to inevitably utilize a framework that depends on both human and mechanized ana

Quantum internet

Numerous of us have transferred our lives to the web. Managing an account, work emails, social media, dating profiles, therapeutic records – all that imperative, touchy data. So it could be a small perturbing that the web features a lethal security imperfection.

Don’t freeze; our private data is safe for presently. But some time recently exceptionally long the encryption calculations that ensure us online are attending to crack. That is the pressing driving drive behind a modern, more secure kind of web that saddles the control of the quantum domain. Once up and running, the framework will be able to do a parcel more than ensure our data.

It could bring us unanticipated quantum apps, and possibly gotten to be the platform for a world-spanning quantum computer of extraordinary power. Building the quantum web could be a colossal and multi-faceted building challenge, but the establishments are as of now being laid. Systems of filaments are spreading. Researchers are chatting in mystery on neighborhood systems. There are indeed plans to utilize minor satellites to empower long-dist

CYBERBULLYING-THE SOCIAL EVIL

INTRODUCTION

Tormenting is the manner by which individual damage or undermines somebody who is actually more vulnerable or less incredible as well as powers them to do something they would prefer not to. This issue is one that has existed as far back as we can recollect human instinct is to such an extent that it is basically ordinary. While a few measures have been taken against it, the issue proceeds to develop and dodge discipline. In its most recent portion, harassing has utilized innovation to advance. How about we comprehend cyberbullying…The innovation that has come in late many years has made a few things conceivable that would have been unimaginable. They have permitted ordinary schedules in life to move to the virtual circle. Tragically, with the great additionally comes the terrible. The improvements intended to make life simpler for people are being utilized rather than threaten the individuals who can’t tolerate upping to these domineering jerks. Cyberbullying is harder to manage than customary harassing and hence is amazingly common among the present youth. Regardless of laws against it, web-based media just proliferates this type of torture. Furthermore, it is likewise hard to stay away from since individuals utilize the web and online media for an assortment of purposes.

WHAT IS CYBERBULLYING?

Cyberbullying is characterized as the utilization of electronic correspondence to menace an individual. It includes the utilization of computerized gadgets like cell phones and workstations. Harassing happens over messaging applications, web-based media, or, in any event, gaming stages. Cyberbullying takes many structures, including messaging, compromising or embarrassing messages, posting and additionally sharing contrary, bogus, or mean pictures or remarks about the individual, and surprisingly sharing private data about them that outcomes in shame and embarrassment.

An investigation tracked down that about 35% of teenagers have encountered it in any event. While any tormenting is harming for the person in question, cyberbullying is especially so. It causes mental issues like uneasiness and low confidence. Because of its namelessness, it is additionally hard to reveal the culprits.

Procedures that a cyberbully utilizes incorporate making counterfeit profiles and claiming to be another person. This breaks the casualty into a misguided feeling that all is well and good. They share private data with the individual they believe is a companion, just to be deceived and embarrassed. A cyberbully can menace somebody based on race, sex, sexual direction, financial status, and so forth. It might even be out of envy. They could ceaselessly message somebody destructive things. The most serious technique is empowering self-hurt and even self-destruction. In the event that they start light and steadily raise the stakes, it brings about the casualty’s soul is broken. They might even hotel to self-destruction.

THE ADVERSE IMPACT OF CYBERBULLYING

Cyberbullying causes mental and mental issues, like embarrassment and outrage. They are disengaged from their companions and alienated in light of the fact that children would prefer not to be related to somebody going through such treatment (because of a paranoid fear of being the following objective). The beneficiary feels frail to stop the harassing, hazardous even with loved ones and furthermore amazingly outrage. They might even look for retribution. Mental impacts incorporate nervousness, sadness, and low confidence. Subsequently, scholastic execution might go down. Self-hurt and even self-destruction have been consequences of cyberbullying.

Other issues that cyberbullying causes include drinking, illicit drug use, adolescent misconduct, and other conduct issues. There may even be actual impacts, for example, rest issues. This demonstrates that cyberbullying swarms each part of its objective and squashes its spirit. It can’t be stayed away from, on the grounds that that would require disposing of the youngster’s telephone. This is clearly unrealistic, thinking about present reliance on innovation. They are along these lines left inclination that “cyberbullying is all over the place.”

An investigation detailed that cyberbullying is more common among young ladies than young men, both as far as being the person in question and the culprit. 15% of young ladies have answered to have encountered it, rather than 6% of young men. The examination likewise found that essentially half of the individuals from the LGBT+ people group have answered to be casualties of it, which is an amazingly high figure.

POSITION OF LAW

Cyberbullying is a moderately new wonder. For the initial not many years after it started to spread, there were no laws forestalling it. For one, it was hard to find and distinguish. For another, it generally goes unreported because of dread and obscurity notwithstanding, a few nations before long perceived and acquainted laws with forestalling it. India’s Information Technology Act, 2000, just as a few arrangements in the Indian Penal Code, manages cyberbullying. The indictment has been made simple by the way that proof can never be cleaned. It generally exists on the web. Helplines have additionally been made for anybody languishing. It has been recommended that schools be considered capable, educators rebuffed for allowing it to occur. Or on the other hand that schools should deal with disciplines on the off chance that it occurs. There are unforgiving disciplines for it, yet it actually keeps on existing. There are still suicides that have been an immediate aftereffect of this torture. Innovation has made harassment a lot simpler.

IS SOCIAL MEDIA POLARIZING SOCIETY?

PROLOGUE

Today, society isn’t just the buyer of data however the maker too. Practically 1.49 billion individuals sign into Facebook day by day. All things considered, around 6,000 tweets are tweeted on Twitter each second. From the hour of its commencement, more than 40 billion photos have been posted on Instagram. Web-based media should turn into an extension between far off individuals, yet it has become a divider between close individuals.

Tragically, counterfeit news has become an industry today and is common all over. Its development, thus, prompts a developing doubt in the traditional press. Counterfeit news has contributed drastically to the reverberation chamber wonder. “Reverberation chamber” alludes to a circumstance where explicit thoughts, convictions, or information focuses are solidified through reiteration of a shut framework that doesn’t permit elective or contending thoughts or ideas.

A PEEP INTO ASCH CONFORMITY EXPERIMENTS

Incredible social analyst Solomon Asch had led a progression of mental trials called the Asch Conformity Experiments during the 1950s. These trials expected to comprehend the degree to which an individual’s perspectives are affected by a gathering. Through the series of investigations, Asch, amazingly, tracked down that an individual was able to try and offer an off-base response just to adjust to the larger part see. The respondents furnished wrong responses for various reasons. Some of them were hesitant to be derided or considered as exceptional. Others dreaded judgment or shame. Some of them likewise accepted that the gathering should be preferred educated over them, so they ought to go with their viewpoint. Method for correspondence and commitment have fostered a great deal since the 1950s, yet the human intuition to fit in stays as before. This clarifies the effect of phony news on the web, which adds to a spellbound society.

HOW IS SOCIAL MEDIA POLARIZES SOCIETY?

Clients in a social framework bond more with ones who are like them in assessment than with ones who are divergent. This is called client homophily. An investigation did by Aalto University on expanding polarization via online media found that elements like client homophily and algorithmic sifting lead to upholding and supporting conviction frameworks. This frequently guarantees that we don’t open our psyches to assorted feelings. Individuals look for educated and reliable thoughts through channels just from individuals they trust. They even search for news that affirms their perspective to mollify themselves. This outcomes in individuals developing inflexible assessments of issues and not the appropriate range to the issues. For instance, Twitter regularly prompts individuals to follow individuals holding a comparative perspective.

Most web-based media destinations are more than able to play abettors. The provisions of receptiveness, lack of definition, and anonymity that were intended to invigorate underestimated networks are currently giving trawlers the qualification to discourteous remarks. This additionally makes space for mean expectations to develop. Also, there has been a developing pattern of deception principally because of predispositions or human mistakes. A steadily developing society of phony records is likewise noticeable. It is fundamentally accomplished for pushing a political plan or annoying individuals. These days there is disinformation also. Disinformation alludes to counterfeit news made deliberately.

OTHER FACTORS OF POLARIZATION

In the early occasions, the print machine was viewed as inconvenience by the Ottomans. The speed at which books were printed and conveyed led to doubt. The principal Greek printing house set up in 1627 distributed a booklet focusing on Jews. Books were just a medium, actually like web-based media is today. Forbidding books and accusing web-based media are the outcomes of comparable wrong rationale. On the off chance that web-based media had an inclination towards evil, stories couldn’t ever have discovered a method of articulation. Web-based media likewise houses numerous accounts of lost kids being discovered, canines being embraced, cash being raised for different causes, and comparative great deeds and human cases.

As indicated by the BI-2018 review, the quantity of people with admittance to TV has is 835 million. Cell phone entrance has developed to around 300 million. The quantity of every day dynamic clients on WhatsApp and Facebook are 200 million and 194 million, individually. The details plainly feature that online media in India is as yet a specialty marvel. Web-based media stages are multilingual, multicultural, and are comprehensive. These stages permit equivalent freedoms for all, independent of class, belief, race, religion, sex, age, or monetary assets. Consequently faulting web-based media for each online wrongdoing doesn’t appear to be persuading.

TOWARDS THE END

Online media is catching society in thin, uneven, and ordinarily counterfeit perspectives. This is disturbing. There isn’t anything amiss with being stubborn. In any case, being inflexible in suppositions is without a doubt wrong. There are consistently different sides to a similar coin. It isn’t care for online media has unfriendly impacts as it were. Online media has a few efficacies also. It interfaces far off individuals and works with the fast scattering of data.

While web-based media faces the worldwide difficulties of data barrage, which is verifiable and counterfeit, it likewise empowers underestimated networks to get to their privileges and voice their viewpoints. So it relies upon the client how he chooses to utilize online media as an instrument or as a weapon. Ideally, individuals will figure out how to be more liable for what they offer, and web-based media stages will recover their tragically missing trust.