BPO (Business Process Outsourcing)

BPO (Business Process Outsourcing) Business process outsourcing (BPO) is a method of subcontracting various business-related operations to third-party vendors. Although BPO originally applied solely to manufacturing entities, such as soft drink manufacturers that outsourced large segments of their supply chains, BPO now applies to the outsourcing of Services, as well. Many businesses, from small startups … Read more

Code of ethics

Code of ethics Ethics codes are as old as antiquity. Religious traditions and civic cultures have codes as their foundations. The Mosaic Decalogue (Ten Commandments) is the keystone for Judaism, Islam and Christianity. Pericles made the Athenian code the underpinning of ancient Greek politics and culture. In each case codes carry general obligations and admonitions, … Read more

Right to Privacy

The Right to Privacy: A Balancing Act in the Digital Age The right to privacy, a fundamental human right enshrined in many constitutions and international legal instruments, has taken on new dimensions in the digital age. As technology advances and data collection becomes increasingly pervasive, the boundaries of privacy are constantly being redefined. This article … Read more

Information and communication technology

Information and Communication technology We are in a digital era. It is difficult to think of any event in our daily life that is not using Information and Communication Technology. Our schools and classrooms are no exceptions. This course is meant for introducing you with these technologies with the intension that you meaningfully integrate technology … Read more

Digital divide & its prevention

Digital divide & its prevention Digital technologies have spread rapidly in much of the world. Digital dividends—the broader development benefits from using these technologies have lagged behind. In many instances digital technologies have boosted Growth, expanded opportunities, and improved service delivery. Yet their aggregate impact has fallen short and is unevenly distributed. For digital technologies … Read more

Data Programmes

A computer program is a collection of instructions that performs a specific task when executed by a computer. A computer requires programs to function and typically executes the program’s instructions in a central processing unit.A computer program is usually written by a computer programmer in a programming language. Computer language or programming language is a … Read more

Internal Security

–2/”>a >DOCTYPE html PUBLIC “-//W3C//DTD XHTML 1.0 Transitional//EN” “http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd”> Role of external state and Non-state actor's in creating challenges to internal security  INFRASTRUCTURE. Communication networks refer to an interconnection of communicating entities such as computers, laptops, mobiles, telephones etc. via which provides the basis for information exchange for all other sectors including voice, data, video, and Internet connectivity.    Communication … Read more

Telecommunication

 Telecommunication Telecommunications, also known as telecom, is the exchange of information over significant distances by electronic means and refers to all types of voice, data and video transmission. This is a broad term that includes a wide range of information transmitting technologies such as telephones (wired and wireless), microwave communications, fiber optics, satellites, … Read more

Polity Booster- State and non-State actors in creating challenges to internal security

State and non-State actors in creating challenges to Internal Security India was partitioned in the backdrop of large-scale communal riots, but the partition of the country on religious lines, without taking into consideration its multiple identities, instead of bringing the communal tensions down, in fact, worsened the situation. The two-nation theory created Pakistan, and it … Read more

Exit mobile version