XI comp Trends in computing

Chapter 13: Trends in Computing and Ethical Issues

13.1 Introduction

  • The growth of technology is rapid; its impact is greater than imagined decades ago.

  • Examples of technological advancements:

    • Listening to news or music via voice commands.

    • Online shopping recommendations based on preferences.

  • Overview of chapter topics:

    • Recent trends in computing.

    • Cyber security threats.

    • Issues related to intellectual property.

13.2 Trends in Computing

  • Evolution of Computers: From room-sized machines to smartphones.

13.2.1 Artificial Intelligence (AI)

  • AI enables machines to think and learn akin to humans.

  • Characteristics of AI technology:

    • Mimics human thought processes (learn from mistakes).

    • Acts rationally and ethically when making decisions.

  • Notable examples of AI:

    • Social robot Sophia, personal assistants like Siri and Alexa, self-driving cars by Tesla.

  • Future predictions:

    • AI expected to excel in tasks like language translation and driving in the next 5-10 years.

13.2.2 Internet of Things (IoT)

  • IoT allows devices to transfer data over the Internet without direct user interaction.

  • Applications of IoT:

    • Health (e.g., wearable fitness gadgets).

    • Home Security (e.g., surveillance cameras).

    • Transport (e.g., driverless cars).

    • Smart cities (e.g., automated transportation and environmental monitoring).

13.2.3 Virtual Reality (VR)

  • VR offers immersive experiences in digitally created environments.

  • Key components of VR technology include:

    • VR headsets for 3D environments.

    • Sensor gloves for interactive experiences.

    • Full-body suits to mimic physical movements.

  • Applications of VR:

    • Military training simulations.

    • Pilot training and medical surgery practice.

13.2.4 Augmented Reality (AR)

  • AR enhances real-world views with digital overlays, as seen in games like Pokémon Go.

  • Devices enabling AR include:

    • Smartphones, AR glasses, and smart displays.

  • Differences between AR and VR:

    • AR overlays digital content on reality; VR creates a new virtual world.

13.3 Cyber Security

  • Importance of maintaining network security due to reliance on computer systems.

13.3.1 Threats to Computer Security

  • Types of security threats include:

    • Computer Viruses: Malicious programs damaging data.

    • Spyware: Software that tracks user behavior secretly.

    • Adware: Delivers unsolicited advertisements and slows computers.

    • Spamming: Sending bulk unsolicited emails, affecting productivity.

    • PC Intrusion: Unauthorized access or attacks on personal computers.

    • Phishing: Fraudulent attempts to obtain sensitive information.

13.3.2 Cyber Security Measures

  • Effective practices include:

    • Use of firewalls to block unauthorized access.

    • Active authentication processes (login IDs and passwords).

    • Regular updates of protective software.

13.4 Major Ethical Issues

  • Information Society and ethical challenges in computing.

13.4.1 Individual's Right to Privacy

  • Concerns regarding: collecting, storing, and distributing personal information.

  • Ethical considerations include not invading privacy through data collection practices.

13.4.2 Intellectual Property Rights

  • Rights to protect the efforts behind intellectual creations.

  • Actions to protect rights include:

    • Copyrighting, patenting, and using trademarks.

13.4.3 Accuracy of Information

  • Ensuring the authenticity and reliability of information provided to users.

13.5 Open Source and Its Philosophy

  • Open Source Software: Allows users to modify and share software freely.

13.5.1 Terminology

  • Free Software: Access without cost; emphasizes user freedom.

  • Open Source Software: Free to use but may involve payment options, with source code available.

13.5.2 Philosophy of Open Source

  • Principles include:

    • Free redistribution, access to source code, and allowance for modifications.

  • Provides benefits for community collaboration and innovation.

13.5.3 Definitions

  • OSS (Open Source Software) and FLOSS (Free Libre Open Source Software): terms used interchangeably for universally accessible software.

13.6 Netiquette

  • Rules for online behavior include:

    • Respectful communication and clear, concise writing.

    • Avoid spamming and personal attacks.

13.7 Email Etiquette

  • Key practices for effective email communication:

    • Be concise and clear in messaging.

    • Respond promptly, avoid excessive attachments, and use appropriate language.

robot