The growth of technology is rapid; its impact is greater than imagined decades ago.
Examples of technological advancements:
Listening to news or music via voice commands.
Online shopping recommendations based on preferences.
Overview of chapter topics:
Recent trends in computing.
Cyber security threats.
Issues related to intellectual property.
Evolution of Computers: From room-sized machines to smartphones.
AI enables machines to think and learn akin to humans.
Characteristics of AI technology:
Mimics human thought processes (learn from mistakes).
Acts rationally and ethically when making decisions.
Notable examples of AI:
Social robot Sophia, personal assistants like Siri and Alexa, self-driving cars by Tesla.
Future predictions:
AI expected to excel in tasks like language translation and driving in the next 5-10 years.
IoT allows devices to transfer data over the Internet without direct user interaction.
Applications of IoT:
Health (e.g., wearable fitness gadgets).
Home Security (e.g., surveillance cameras).
Transport (e.g., driverless cars).
Smart cities (e.g., automated transportation and environmental monitoring).
VR offers immersive experiences in digitally created environments.
Key components of VR technology include:
VR headsets for 3D environments.
Sensor gloves for interactive experiences.
Full-body suits to mimic physical movements.
Applications of VR:
Military training simulations.
Pilot training and medical surgery practice.
AR enhances real-world views with digital overlays, as seen in games like Pokémon Go.
Devices enabling AR include:
Smartphones, AR glasses, and smart displays.
Differences between AR and VR:
AR overlays digital content on reality; VR creates a new virtual world.
Importance of maintaining network security due to reliance on computer systems.
Types of security threats include:
Computer Viruses: Malicious programs damaging data.
Spyware: Software that tracks user behavior secretly.
Adware: Delivers unsolicited advertisements and slows computers.
Spamming: Sending bulk unsolicited emails, affecting productivity.
PC Intrusion: Unauthorized access or attacks on personal computers.
Phishing: Fraudulent attempts to obtain sensitive information.
Effective practices include:
Use of firewalls to block unauthorized access.
Active authentication processes (login IDs and passwords).
Regular updates of protective software.
Information Society and ethical challenges in computing.
Concerns regarding: collecting, storing, and distributing personal information.
Ethical considerations include not invading privacy through data collection practices.
Rights to protect the efforts behind intellectual creations.
Actions to protect rights include:
Copyrighting, patenting, and using trademarks.
Ensuring the authenticity and reliability of information provided to users.
Open Source Software: Allows users to modify and share software freely.
Free Software: Access without cost; emphasizes user freedom.
Open Source Software: Free to use but may involve payment options, with source code available.
Principles include:
Free redistribution, access to source code, and allowance for modifications.
Provides benefits for community collaboration and innovation.
OSS (Open Source Software) and FLOSS (Free Libre Open Source Software): terms used interchangeably for universally accessible software.
Rules for online behavior include:
Respectful communication and clear, concise writing.
Avoid spamming and personal attacks.
Key practices for effective email communication:
Be concise and clear in messaging.
Respond promptly, avoid excessive attachments, and use appropriate language.