Text Iii Ingles 2022

Descargar como pdf o txt
Descargar como pdf o txt
Está en la página 1de 102

UNVERSIDAD MAYOR DE SAN SIMON FACULTAD DE CIENCIAS Y

TECNOLOGIA INFORMATICA _ SISTEMAS

PLAN GLOBAL Y ANALITICO


ENGLISH III

E-mail: [email protected]

DOCENTE: LIC.MA. ESTELA


GRILO SALVATIERRA

GESTION 2022
Cochabamba - Bolivia
UNVERSIDAD MAYOR DE SAN SIMON FACULTAD DE CIENCIAS Y
TECNOLOGIA INFORMATICA _ SISTEMAS

UNIVERSIDAD MAYOR DE SAN


SIMON FACULTAD DE CIENCIAS Y

TECNOLOGÍA

◼ Nombre de la Asignatura: Inglés III


◼ Código: 1803009
◼ Grupo: 1
◼ Carga horaria: 4 Hrs. Académicas/semana
◼ Materias con las que se relaciona: Todas
◼ Docente: Lic. Maria Estela Grilo Salvatierra
◼ Teléfono: 72750879
Correo Electrónico: [email protected]

En la actualidad el desarrollo de la tecnología tiene gran impacto en el uso de herramientas


tecnológicas para lo cual es menester tener como enlace al idioma Inglés. Por consiguiente, La
materia de inglés III es de real importancia dentro del currículo de la carrera de informática
porque permite al futuro Analista de Sistemas Informáticos acceder a fuentes de información
actualizadas las cuales, en su mayoría son publicadas en lengua inglesa. Por consiguiente, la
información de ediciones recientes permite ampliar los horizontes de conocimientos al investigar
y al mismo tiempo satisfacer las expectativas en relación con el desarrollo tecnológico en el área
de la informática e intercambiar experiencias y dar a conocer sus trabajos de investigación y
creación.

En el área de la Ingeniería informática se debe tomar en cuenta que la mayor parte de bibliografía
actualizada y confiable está en inglés. Por otra parte, se debe tener en cuenta que la mayoría de
los lenguajes de programación y material relacionados con tecnología de punta están en inglés,
por lo que se hace más necesario su comprensión, uso y la familiarización con los términos en el
idioma extranjero para posibilitar una mejor comprensión de textos y material relacionado.
UNVERSIDAD MAYOR DE SAN SIMON FACULTAD DE CIENCIAS Y
TECNOLOGIA INFORMATICA _ SISTEMAS

La información relacionada a tecnología informática y programación como: software, libros,


folletos, manuales, etc. se encuentran en inglés y se requiere tener manejo de terminología
Conseguir libros de tecnología actualizados en nuestro idioma es muchas veces imposible,
por lo tanto, si queremos mantenernos actualizados tendremos que recurrir al inglés para
poder actualizar nuestros conocimientos.
La materia de inglés III se relaciona directa o indirectamente con las diferentes
asignaturas del área tecnológica debido a que mediante el uso del idioma ingles se puede
tener acceso a fuentes de información y consulta confiables.

Hoy en día existen blogs de información tecnológica en español pero también hay mucho
por trabajar y explorar la diversidad de material existente pero no todos responden a las
necesidades y requerimientos como carrera de informática –sistemas.

Para concluir debemos mencionar que la materia de inglés III influye positivamente en la
formación del ingeniero del área de Ingeniería Informática y Sistemas ya que es una
herramienta necesaria que le permite avanzar y desarrollar su trabajo de manera más
eficiente, satisfaciendo las demandas del entorno social y laboral del mundo globalizado en
el que probablemente se presente la oportunidad de trabajar en convenios o cualquier otro
tipo de acuerdos con profesionales de otros países de habla inglesa o acceder a becas de
capacitación.
III. PROPÓSITOS

❖ Perfeccionar la competencia comunicativa oral y escrita en sus cuatro habilidades


desarrollando una capacidad tal que le permita al estudiante interactuar en situaciones
de la vida real con fluidez y especificidad.
❖ Adquirir un nivel de comprensión lectora que resulte aplicable en la lectura extensiva de
temas de Informática propuestos participando en forma activa,flexible y respetuosa.
❖ Adquirir estrategias para producir textos escritos sencillos y adecuados a las distintas
situaciones comunicativas, generales, disciplinares, y relacionadas con la vida real, el
contexto y las demandas del medio, manifestando una reflexión crítica y respetuosa
respecto de los formatos, propósitos y destinatarios.
UNVERSIDAD MAYOR DE SAN SIMON FACULTAD DE CIENCIAS Y
TECNOLOGIA INFORMATICA _ SISTEMAS

Integrar los objetivos específicos de la materia con los generales de la carrera a fin
de lograr un dominio integral de la lengua inglesa.
Desarrollar estrategias de comprensión lectora para que los futuros profesionales
puedan abordar textos de su área de especialidad en forma autónoma.

Sensibilizar al estudiante sobre la importancia de los estudios de idiomas, en particular


el inglés, en relación con la profesión elegida.

CONTENIDOS PROCEDIMENTALES

▪ Realizar ejercicios aplicando conocimientos de gramática


▪ Responder y elaborar preguntas orales y escritas
▪ Completar diálogos
▪ Completar espacios reconociendo vocabulario y aplicando en
contexto(Reconocimiento y producción)
▪ Realizar lecturas de textos.
▪ Realizar ejercicios de comprensión oral y auditiva a través de tutoriales.
▪ Responder cuestionarios de comprensión lectora con oraciones
simples,falso verdadero o respuestas de selección.
▪ realizar ejercicios de producción escrita

CONTENIDOS ACTITUDINALES

▪ Conciencia de la utilidad del idioma para su futuro desempeño en el


campoLaboral.
▪ Buena disposición para acordar, aceptar y respetar reglas para
intercambios comunicativos ( practicas , exámenes parciales y finales,
respeto a las fechas establecidas).
▪ Demostrar esfuerzo y perseverancia en la comprensión de términos
útiles que le signifiquen beneficio en su carrera profesional.
▪ Valoración del trabajo grupal.
▪ Actitud crítica y participativa, personal, Interpersonal y grupal.
▪ Disposición favorable para la lectura comprensiva, análisis de textos
y suAplicación a situaciones reales en relación a su carrera.
▪ Seguridad al realizar ejercicios con terminología técnica de
lectura,escritura o audio.
UNVERSIDAD MAYOR DE SAN SIMON FACULTAD DE CIENCIAS Y
TECNOLOGIA INFORMATICA _ SISTEMAS
IV. SELECCIÓN Y ORGANIZACIÓN DE CONTENIDO

PLAN ANALÍTICO
DURACIÓN: 1.5 semanas

1. WHAT IS AN OPERATING SYSTEM?


1.1. Main Concept
1.2. Types of Operating System
1.2.1. Batch Operating System
1.2.2. Multi-Tasking/Time-sharing Operating systems
1.2.3. Real time OS
1.2.4. Distributed Operating System
1.2.5. Network Operating System
1.2.6. Mobile OS
1.3. Functions of Operating System
1.4. Features of Operating System (os)
1.5. Advantages and Disadvantages of os
1.5.1. advantage of operating system
1.5.2. disadvantages of operating system
1.6. What is kernel in Operating System?
1.6.1. What is Kernel in Operating System
1.6.2. Features of Kernel

2. NETWORK PROTOCOL
2.1. Definition of Networks
2.2. Network Devices
2.3. Modem
2.3.1. Types of Modem
2.4. Network Topologies
2.4.1. Bus Topology
2.4.1.1. Advantages of Bus Topology
2.4.1.2. Disadvantages of Bus Topology
2.5. Ring Topology
2.5.1. Advantages of Ring Topology
2.5.2. Disadvantages of Ring Topology
2.6. Star Topology
2.6.1. Advantages of Star Topology
2.6.2. Disadvantages of Star Topology
2.7. Tree Topology
2.7.1. Advantages of Tree Topology
2.7.2. Disadvantages of Tree Topology
2.8. Types of Networks
2.8.1. PAN = personal area network
2.8.2. LAN- local area network
2.8.3. MAN- metropolitan area network
2.8.4. WAN- wide area network
2.8.5. WAN- wide area network
UNVERSIDAD MAYOR DE SAN SIMON FACULTAD DE CIENCIAS Y
TECNOLOGIA INFORMATICA _ SISTEMAS

3. PROGRAMMING LANGUAGE
3.1. Computer Programming Languages
3.2. Types OF Programming Languages
3.2.1. HIGH-LEVEL LANGUAGE (MOST COMMON)
3.2.2. LOW-LEVEL LANGUAGE
3.3. THE MOST COMMON PROGRAMMING LANGUAGES
3.3.1. PYTHON
3.3.2. JAVA
3.3.3. HTML = HYPERTEXT MARKUP LANGUAGE
3.3.4. PHP= acronym for "PHP: Hypertext Preprocessor"
3.3.5. C#

4. ARTIFICIAL INTELLIGENCE
4.1. What is artificial Intelligence (ai)?
4.2. How Artificial Intelligence (ai) Works?
4.3. Types of Artificial Intelligence
4.4. Applications of Artificial Intelligence
4.5. Use of Artificial Intelligence on a Practical Level

5. ROBOTICS
5.1. What is Robotics?
5.2. What is the Function of Robotics?
5.3. what is a Robot in Robotics?
5.4. Are Robotics and Artificial Intelligence the Same Thing?
5.5. Robotics Engineering
5.6. What is Difference Between Robotics and Robotic Engineering?
5.7. Is Robotics Part of AI? Is AI Part of robotics? what is the difference
between the two terms
5.8. Aspects of Robots
5.9. Components of a Robot
5.10. Parts of a Robot
5.11. Types of Robots

6. FUTURE TRENDS OF INFORMATION TECHNOLOGY (IT)


6.1. Artificial Intelligence AND Machine Learning
6.2. Types OF Machine Learning
6.3. Robotic process Of AutomatizatioN /RPA
6.4. Edge Computing
6.5. Quantum Computing
6.6. VirtuaL Reality AND Augmented Reality
6.7. Blockchain
6.8. Internet of Things
6.9. 5G
6.10. Cybersecurity
UNVERSIDAD MAYOR DE SAN SIMON FACULTAD DE CIENCIAS Y
TECNOLOGIA INFORMATICA _ SISTEMAS

V. METODOLOGIA
La metodología con que se va a trabajar en este semestre será en base a exposiciones
magistrales ya que los estudiantes construirán los nuevos aprendizajes a partir del análisis y
confrontación de sus conocimientos previos con los conocimientos. nuevos

El elemento de reflexión meta cognitiva será de importancia debido a que los aprendizajes
serán evaluados de forma individual o grupal.

Uso de plataformas Online (Classroom)

La metodología de esta asignatura será activa y diversificada y está basada en la aplicación


de un proceso de aprendizaje a través de la experiencia y se sirve de estrategias y técnicas
que comprenderán: ejercicios individuales o grupales en base a
textos leídos.
VI. CRONOGRAMA O DURACIÓN EN PERIODOS ACADÉMICOS

Unidad 1 8 horas académicas 2 semanas


Unidad 2 12 horas académicas 3 semanas
Unidad 3 8 horas académicas 2 semanas
Unidad 4 6 horas académicas 1.5 semana
Unidad 5 6 horas académicas 1.5 semana
Unidad 6 6 horas académicas 1.5 semana
Unidad 7 6 horas académicas 1.5 semana
Unidad 8 6 horas académicas 1.5 semana
Exámenes 4 horas académicas 1 semana
parciales
Devolución yrevisión 2 horas académicas ½ semana
de los
exámenes parciales

Examen final 2 horas académicas ½ semana


Devolución y 1 hora académica ¼ semana
revisión del
examen final
Segunda instancia 2 horas académicas ½ semana
Devolución y revisión de la 1 hora académica ¼ semana
segunda instancia
UNVERSIDAD MAYOR DE SAN SIMON FACULTAD DE CIENCIAS Y
TECNOLOGIA INFORMATICA _ SISTEMAS

VII. CRITERIOS DE EVALUACION

La evaluación será formativa ya que se evaluará durante el desarrollo de los temas donde se
podrá observar la capacidad asimilación de conceptos fundamentales en cada unidad por parte
del estudiante. La evaluación se realizará acorde al sistema de Evaluación de la Facultad de
Ciencias y Tecnología.
❖ Dos evaluaciones Parciales y una Final tienen un valor de 100 puntos.

❖ Las notas de Primer y Segundo parcial tienen un ponderado de 100 puntos. Y el estudiante
que obtenga 51 puntos o más ya habrá aprobado la materia.
❖ Si el estudiante no obtiene un puntaje de 51 puntos deberá presentarse al Examen Final.
❖ El estudiante puede aprobar la asignatura presentándose solo al Examen Final y obtener
una nota de 51.
El estudiante puede aprobar en SEGUNDA INSTANCIA obteniendo una nota de 51.
❖ El estudiante tiene la obligación de presentarse a los exámenes en las fechas y horas
establecidas.
❖ El requisito para ingresar al examen de SEGUNDA INSTANCIA es una nota ponderada en
los dos parciales mayor o igual a 26 puntos y la presentación de la Boleta de Segunda
Instancia.
❖ Los exámenes no serán reprogramados solo en caso de enfermedad donde la certificación
esté emitida por el Seguro Social Universitario (SSU).
❖ Las fechas de los exámenes serán programadas de acuerdo al Calendario Vigente.

❖ Todos los exámenes serán orales y escritos


UNVERSIDAD MAYOR DE SAN SIMON FACULTAD DE CIENCIAS Y
TECNOLOGIA INFORMATICA _ SISTEMAS

VIII. BIBLIOGRAFÍA

Texto base:
HOEPFNER, Roberto. ENGLISH ONE -FIRST GRAMMAR TEXT
Universidad Mayor de San Simón. 2011.
TEXTO DE LECTURA http://www.gcflearnfree.org/computerbasics (with minor style changes)
• REDMAN Stuart. ENGLISH VOCABULARY IN USE. Pre-reading & intermediate. 1997
• Information technology Glennding
• https://www.tutorialspoint.com/computer_fundamentals/computer_hardware.htm
• https://chortle.ccsu.edu/java5/notes/chap01/ch01_5.html HARDWARE MAIN
MEMORY AND SECO NDARY MEMORIY
• https://www.altexsoft.com/blog/engineering/the-good-and-the-bad-of-swift-
programming-language/
• https://www.tutorialspoint.com/computer_fundamentals/computer_operating_system.ht m
• https://www.webopedia.com/TERM/O/operating_system.html
• https://www.britannica.com/technology/protocol-computer-science
• https://www.javatpoint.com/computer-network-mcq
• https://www.techopedia.com/definition/190/artificial-intelligence-ai
• https://corporate.livingactor.com/en/glossary-artificial-intelligence-vocabulary/
• https://www.telusinternational.com/articles/50-beginner-ai-terms-you-should-know
• https://spanish.yourdictionary.com/spanish-language/learning-spanish/technology-
terms-in-spanish.html
10

NIT 0
GENERAL REVIEW

INTRODUCTIONLEVEL TEST

TASK 1 : In an extra paper or at the back of this page write your biography .

Introduce yourself. Writing about yourself can be tough, because there is so much
you can say. You have a lifetime of experiences, talents, and skills to
summarize in a paragraph, or two. Whatever kind of writing you are planning on
doing, whatever your purpose, just think about it like you are introducing yourself to
a stranger. What do they need to know? Answer questions like:

• Who are you?/where do you live ?


• What is your background?
• What are your interests?
• What are your talents?
• What are your achievements?
• What challenges have you faced?

TASK 4: READ THE FOLLOWING ARTICLE. 13

DIGITAL CITIZENSHIP IS THE NEW


CITIZENSHIP
Nicole Krueger

Digital media is changing how young people engage in civic issues, and educators
say we need to give all students opportunities to become engaged citizens using the
tools of the digital age.

During a refresh of the ISTE Standards for Students, a new definition of digital
citizenship emerged. Feedback from educators revealed a shift in perspective that
"spoke to students' use of technology to make the world a better place," says
Carolyn Sykora, senior directorof the ISTE Standards department.
11

"Educators recognized students were doing many good deeds using digital tools like
crowdfunding to raise money or using social media to mobilize action for causes
theycared about."

Rather than just warning young people about online risks or trying to curtail their
activities, educators are realizing the importance of helping students leverage the
power of digital media to work toward social justice and equity.

For today's students, the internet removes many of the barriers that have contributed
to a decades-long decline in civic engagement. Traditional modes of social action,
such as joining community groups or volunteering, can seem time-consuming and
burdensome to students who are already overwhelmed by their busy lives.

Digital media, on the other hand, can offer a "path of least resistance" for young
people, says Harvard researcher Lindsay Pettingill.

"While online, young people can come and go from sites as they please, and they
can make the best use of their time by multitasking — talking to friends, writing
emails and checking the sports scores — all while a video they are contributing to is
uploading," she says. "They don't have to leave the house, and they don't have to put
down the things they are tethered to.
Rather than see these 'social facts' as debilitating to democracy, they should be
leveraged to get the most out of young people's desire to be active and feel a part of
something beyond themselves."

For students who have grown up holding the digital world in the palm of their hands,
the internet is the most natural place to take action. It's where they already are,
socializing withtheir peers and exploring their identities.

For many, working toward social equality and change is simply an organic extension
of their online behavior. Rather than taking place in a silo disconnected from
students' regular activities, civic participation can now become interwoven into the
fabric of their digital lives.

"The internet offers a new model of civic participation, one measured by one's level of
engagement as opposed to one's time commitment," says researcher Margaret
12

Weigel. "One can sign online petitions, vote in online elections and contribute $5 to a
cause of choice, all from a computer screen."

Students today are empowered with a whole new box of tools with which to act.
Online spaces can amplify students' voices while breaking down barriers to civic
participation. Social media serves as a potent means for coordinating and mobilizing
people who are geographically dispersed. But will students capitalize on these
opportunities?

Putting digital citizenship into action

Studies suggest young people are awakening to their digital power.

According to Harvard University's GoodWork Project, nearly 60 percent of teens


create digital content, and one in three share their creations online. And in a
nationwide survey, more than 40 percent of young people reported engaging in at
least one online act of participatory politics, defined as "interactive, peer-based
acts through which individuals and groups seek to exert both voice and influence on
issues of public concern."

For many, this participation comes in the form of posting an impassioned plea on
social media to inform or inspire peers to action.

But there's a big difference between posting something on Instagram and following a
project through to its end. When posts go viral, events can quickly spiral out of
control,
leaving young instigators reeling from the impact of their digital participation — even
when the outcome is overwhelmingly positive. Today's digital citizens need to be
prepared forthe possibility of massive success.

That's why parents, educators and leaders need to support students in putting digital
citizenship into action while also helping them understand:

The scale and scope of online action

In one study, nearly half of the students surveyed failed to include social media as
part of a strategy to effect change. Why? Possibly because they still haven't grasped
13

how digital tools can expand the scale and scope of their actions, says researcher
Amelia Peterson. Students need to consider scale when engaging online, asking
questions such as, "How big could I go? How big do I want to go?"

The efficacy of digital participation

Online modes of civic engagement — such as investigating issues, creating and


circulating content, and engaging in dialogue about civic matters — are often
dismissed as unimportant or disconnected from "real" social action, says
researcher Margaret Rundle. Reinforcing the significance and efficacy of these
actions can help encourage students to take advantage of the tools at their
disposal.

The implications of success

The odds of a social media post going viral are low, but it's always a possibility.
Students can prepare for this contingency by thinking beyond a project's
immediate goal and considering the what ifs. For example, "Who can I turn to for
help if this gets bigger than I expected?"

The nature of civic engagement is changing, says researcher Amelia Johns. Today's
students are "the standard bearers of what the digital world is going to look like in the
future, and, therefore, the shapers of what citizenship online will entail."

VIDEO ACTIVITY AND ANSWER THE QUESTIONS


https://www.youtube.com/watch?v=WxeH23leVCg

what is digital citizen ?


which is the power that we can get when we use electronic devices_?
what do they mention about the internet provider?
what do they mention about the information that is kept in our machine?
what is the meaning of being a good digital citizen ?
Is it easy to steal information?
which are the most important advices that they give?
what is the meaning of being a good digital citizen?
14

Preparation Circle the correct definition.


1. a digital citizen a. a person who lives in a modern world
b. a person who is active online

2. polite a. respectful and kind


b. disrespectful and rude

3. safe a. in dange
b. protected from danger

4. to worry a. to think about problems or fears


b. to feel nervous about meeting new people

5. sensible a. acting in a practical way


b. reacting quickly to changes

6. privacy settings a. special places where you can be private


b. controls to make your information private

7. laws a. rules that each country has


b. information about how to behave

8. illegal a. respecting official rules


b. breaking official rules
15

UNIT 1
WHAT IS AN OPERATING SYSTEM?

GLOSSARY
WORD CONCEPT
Compression
A method of packing data in order to save disk storage space or
download time Zip and mp3 are examples of two common file
compression algorithms.
Device driver
Software which converts the data from a component or peripheral
into data that an operating system can use
GUI (graphical An icon based link between a computer and its operator
user interface)
Most users prefer an icon-based GUI over a command line option.
Kernel
The fundamental part of an operating system responsible resource
management and file access The system administrator needed to
upgrade the kernel in order to provide native support for Serial ATA
drives.

Linux Linux was originally developed by Linus Torvalds, who wanted a


free Unix-like operating system that ran on standard PC hardware.

Multitasking Concurrent execution of two or more tasks by a processor.

Sign in to enter information related to an account name and its password in


order to access a computer resource.

Sign out To end a session with computer or network resource.

Operating Systems Software is a set of instructions, data or programs used to operate


computers and execute specific tasks.
binary Binary describes a numbering scheme in which there are only two
possible values for each digit -- 0 or 1 -- and is the basis for all
binary code used in computing systems.
Software A generic term describing all kinds of computer programs,
applications and operating systems
batch It is a system or mode of operation in which inputs are collected
and processed all at one time, rather than being processed as they
arrive, and a job, once started, proceeds to completion without
additional input or user interaction.
16

1. WHAT IS AN OPERATING SYSTEM?


Updated By Great Learning Team -Aug 4, 2022

An Operating System (OS) is the most important program that is first loaded on a computer
when you switch on the system. Operating System is system software. The communication
between a user and a system takes place with the help of operating systems.

Windows, Linux, and Android are examples of operating systems that enable the user to use
programs like MS Office, Notepad, and games on the computer or mobile phone. It is necessary
to have at least one operating system installed in the computer in order to run basic programs
like browsers.

Operating System - Examples

There are plenty of Operating Systems available in the market which include paid and unpaid
(Open Source). Following are the examples of the few most popular Operating Systems:
17

• Windows: This is one of the most popular and commercial operating systems
developed and marketed by Microsoft. It has different versions in the market like
Windows 8, Windows 10 etc and most of them are paid.
• Linux This is a Unix based and the most loved operating system first released on
September 17, 1991 by Linus Torvalds. Today, it has 30+ variants available like Fedora,
OpenSUSE, CentOS, UBuntu etc. Most of them are available free of charges though you
can have their enterprise versions by paying a nominal license fee.
• MacOS This is again a kind of Unix operating system developed and marketed by Apple
Inc. since 2001.
• iOS This is a mobile operating system created and developed by Apple Inc. exclusively
for its mobile devices like iPhone and iPad etc.
• Android This is a mobile Operating System based on a modified version of the Linux
kernel and other open source software, designed primarily for touchscreen mobile
devices such as smartphones and tablets.

2. FUNCTIONS OF OPERATING SYSTEM

2.1. Processor Management: An operating system manages the processor’s work by


allocating various jobs to it and ensuring that each process receives enough time
from the processor to function properly.

2.2. Memory Management: An operating system manages the allocation and de


allocation of the memory to various processes and ensures that the other process
does not consume the memory allocated to one process.
18

2.3. Device Management: There are various input and output devices. An OS controls
the working of these input-output devices. It receives the requests from these
devices, performs a specific task, and communicates back to the requesting process.

2.4. File Management: An operating system keeps track of information regarding the
creation, deletion, transfer, copy, and storage of files in an organized way. It also
maintains the integrity of the data stored in these files, including the file directory
structure, by protecting against unauthorized access.

2.5. Security: The operating system provides various techniques which assure the
integrity and confidentiality of user data. Following security measures are used to
protect user data:

o Protection against unauthorized access through login.

o Protection against intrusion by keeping Firefall active.

o Protecting the system memory against malicious access.

o Displaying messages related to system vulnerabilities.

2.6. Error Detection: From time to time, the operating system checks the system for
any external threat or malicious software activity. It also checks the hardware for
any type of damage. This process displays several alerts to the user so that the
appropriate action can be taken against any damage caused to the system.
2.7. Job Scheduling: In a multitasking OS where multiple programs run simultaneously,
the operating system determines which applications should run in which order and
how time should be allocated to each application.
3. FEATURES OF OPERATING SYSTEMS
19

Some important features or characteristics of operating systems are:

1. Provides a platform for running applications


2. Handles memory management and CPU scheduling
3. Provides file system abstraction
4. Provides networking support
5. Provides security features
6. Provides user interface
7. Provides utilities and system services
8.Supports application development

4. COMPONENTS OF OPERATING SYSTEM

The operating system has two components:

• Shell
• Kernel

4.1. WHAT IS SHELL?


It handles user interactions. It is the outermost layer of the OS and manages the interaction
between user and operating system by:
➢ Prompting the user to give input
➢ Interpreting the input for the operating system
20

➢ Handling the output from the operating system.


Shell provides a way to communicate with the OS by either taking the input from the user or the
shell script. A shell script is a sequence of system commands that are stored in a file.

4.2. WHAT IS KERNEL?


The kernel is the core component of an operating system for a computer (OS). All other
components of the OS rely on the core to supply them with essential services. It serves as the
primary interface between the OS and the hardware and aids in the control of devices,
networking, file systems, and process and memory management.

4.2.1. FUNCTIONS OF KERNEL

The kernel is the core component of an operating system which acts as an interface
between applications, and the data is processed at the hardware level.

When an OS is loaded into memory, the kernel is loaded first and remains in memory until
the OS is shut down. After that, the kernel provides and manages the computer resources
and allows other programs to run and use these resources. The kernel also sets up the
memory address space for applications, loads the files with application code into memory,
and sets up the execution stack for programs.

The kernel is responsible for performing the following tasks:

• Input-Output management
• Memory Management
• Process Management for application execution.
21

• Device Management
• System calls control

4.2.2. TYPES OF KERNEL

4.2.2 .1. Monolithic Kernel : A monolithic kernel is a single large program that
contains all operating system components. The entire kernel executes in the processor’s
privileged mode and provides full access to the system’s hardware. Monolithic kernels are
faster than microkernels because they don’t have the overhead of message passing. This
type of kernel is generally used in embedded systems and real-time operating systems.

4.2.2.2 Microkernel : A microkernel is a kernel that contains only the essential


components required for the basic functioning of the operating system. The microkernel
approach provides better modularity, flexibility, and extensibility. It is more stable and
secure than monolithic kernels.

4.2.2.3. Hybrid Kernel : A hybrid kernel is a kernel that combines the best features of
both monolithic kernels and microkernels. It contains a small microkernel that provides the
essential components for the basic functioning of the OS.

4.2.2.4. Exokernel An exokernel is a kernel that provides the bare minimum components
required for the basic functioning of the operating system. All other components are removed
from the kernel and implemented as user-space processes.

5. TYPES OF OPERATING SYSTEM


There are several different types of operating systems present.
▪ Batch OS ▪ Network OS
▪ Distributed OS
▪ Real-OS
▪ Multitasking OS
▪ Mobile OS
5.1. BATCH OS
Batch OS does not directly interact with the computer. Instead, an operator takes up similar jobs
and groups them together into a batch, and then these batches are executed one by one based
on the first-come, first, serve principle.
22

5.2. DISTRIBUTED OS
A distributed OS is a recent advancement in the field of computer technology and is utilized all
over the world that too with great pace. In a distributed OS, various computers are connected
through a single communication channel. These independent computers have their memory unit
and CPU and are known as loosely coupled systems. The system processes can be of different
sizes and can perform different functions. The major benefit of such a type of operating system
is that a user can access files that are not present on his system but in another connected
system. In addition, remote access is available to the systems connected to this network.

5.3. MULTITASKING OS
The multitasking OS is also known as the time-sharing operating system as each task is given
some time so that all the tasks work efficiently. This system provides access to a large number
of users, and each user gets the time of CPU as they get in a single system. The tasks
performed are given by a single user or by different users. The time allotted to execute one task
is called a quantum, and as soon as the time to execute one task is completed, the system
switches over to another task.

5.4. NETWORK OS
Network operating systems are the systems that run on a server and manage all the networking
functions. They allow sharing of various files, applications, printers, security, and other
networking functions over a small network of computers like LAN or any other private network.
In the network OS, all the users are aware of the configurations of every other user within the
network, which is why network operating systems are also known as tightly coupled systems.

5.5. REAL-TIME OS
Real-Time operating systems serve real-time systems. These operating systems are useful
when many events occur in a short time or within certain deadlines, such as real-time
simulations.
23

UNIT 1 PRACTICE

READING COMPREHENSION PRACTICE

LEARNING ABOUT OPERATING SYSTEMS

Taken from: https://www.english4it.com/unit/3/reading

An operating system is a generic term for the multitasking software layer that lets you perform a wide
array of 'lower level tasks' with your computer. By low-level tasks we mean:

• the ability to sign in with a username and password


• sign out the system and switch users
• format storage devices and set default levels of file compression
• install and upgrade device drivers for new hardware
• install and launch applications such as word processors, games, etc
• set file permissions and hidden files
• terminate misbehaving applications

A computer would be fairly useless without an OS, so today almost all computers come with an OS pre-
installed. Before 1960, every computer model would normally have it's own OS custom programmed for
the specific architecture of the machine's components. Now it is common for an OS to run on many
different hardware configurations.

the heart of an OS is the kernel, which is the lowest level, or core, of the operating system. The kernel is
responsible for all the most basic tasks of an OS such as controlling the file systems and device drivers.
The only lower-level software than the kernel would be the BIOS, which isn't really a part of the operating
system. We discuss the BIOS in more detail in another unit.

The most popular OS today is Microsoft Windows, which has about 85% of the market share for PCs and
about 30% of the market share for servers. But there are different types of Windows OSs as well. Some
common ones still in use are Windows 98, Windows 2000, Windows XP, Windows Vista, and Windows
Server. Each Windows OS is optimized for different users, hardware configurations, and tasks. For
instance Windows 98 would still run on a brand new PC you might buy today, but it's unlikely Vista would
run on PC hardware originally designed to run Windows 98.

There are many more operating systems out there besides the various versions of Windows, and each
one is optimized to perform some tasks better than others. Free BSD, Solaris, Linux and Mac OS X are
some good examples of non-Windows operating systems.

Geeks often install and run more than one OS an a single computer. This is possible with dual-booting or
24

by using a virtual machine. Why? The reasons for this are varied and may include preferring one OS for
programming, and another OS for music production, gaming, or accounting work.
An OS must have at least one kind of user interface. Today there are two major kinds of user interfaces in
use, the command line interface (CLI) and the graphical user interface (GUI). Right now you are most
likely using a GUI interface, but your system probably also contains a command line interface as well.

Typically speaking, GUIs are intended for general use and CLIs are intended for use by computer
engineers and system administrators. Although some engineers only use GUIs and some diehard
geeks still use a CLI even to type an email or a letter.

Examples of popular operating systems with GUI interfaces include Windows and Mac OS
X. Unix systems have two popular GUIs as well, known as KDE and Gnome, which run on top of X-
Windows. All three of the above-mentioned operating systems also have built-in CLI interfaces as well for
power users and software engineers. The CLI in Windows is known as MS-DOS. Today there are two
major kinds of user interfaces in use, the command line interface (CLI) and the graphical user
interface (GUI).There are many CLIs for Unix and Linux operating systems, but the most popular one is
called Bash.

In recent years, more and more features are being included in the basic GUI OS install, including
notepads, sound recorders, and even web browsers and games. This is another example of the concept
of 'convergence' which we like to mention.

A great example of an up and coming OS is Ubuntu. Ubuntu is a Linux operating system which is totally
free, and ships with nearly every application you will ever need already installed. Even a professional
quality office suite is included by default. What's more, thousands of free, ready-to-use applications can
be downloaded and installed with a few clicks of the mouse. This is a revolutionary feature in an OS and
can save lots of time, not to mention hundreds or even thousands of dollars on a single PC. Not
surprisingly, Ubuntu's OS market share is growing very quickly around the world.

As an IT professional, you will probably have to learn and master several, if not all, the popular operating
systems. If you think this sort of thing is fun and interesting, then you have definitely chosen the right
career ;)

We have learned a little about operating systems in this introduction and you are ready to do more
research on your own. The operating system is the lowest software layer that a typical user will deal with
every day. That is what makes it special and worth studying in detail.
25

READ THE TEXT AND CHOOSE THE CORRECT OPTION

TRUE OR FALSE?

1. Multitasking is the generic term for multi variables T F


2. The OS is the shortest software layer that a typical user will deal with every day . T F
3. GUI and Mac OS X. Unix systems have two popular GUIs T F
4. There are two major kinds of user interfaces in use, the command line interface and
the graphical user interface T F
5. The most popular OS today is kernel, which has about 85% of the market share for PCs
and about 30% of the market share for servers. T F
6. At the heart of every operating system is the kernel, which controls the supply of
electricity to the processor. T F
7. Files permissions & hidden files are controlled by file compression. T F
8. Low-level tasks include formatting storage devices & managing device drivers. T F

Questions: ANSWER THE FOLLOWING QUESTIONS

1. What is the only part of a communications process that a user sees?

-----------------------------------------------------------------------------------------------------------------

2. Which layer ensures that the message is transmitted in a language that the receiving
computer can interpret?

---------------------------------------------------------------------------------------------------------------------

3. Which layer protects the data being sent?

---------------------------------------------------------------------------------------------------------------------

4. What does the network layer form data into?

---------------------------------------------------------------------------------------------------------------------

5. Why may an intermediate node reroute the message?

BIBLIOGRAPHY
https://afteracademy.com/blog/what-is-kernel-in-operating-system-and-what-are-the-various-types-of-kernel
https://www.mygreatlearning.com/blog/what-is-operating-system/#functions-of-operating-systems
https://www.youtube.com/watch?v=8kujH0nlgv
26

UNIT 2
NETWORK PROTOCOL
GLOSSARY
https://bjc.edc.org/bjc-r/cur/programming/summaries/vocab4.html?topic=nyc_bjc%2F4-
internet.topic
WORD CONCEPT
Channel Physical medium like cables over which information is exchanged is
called channel. Transmission channel may be analog or digital.
This data channel may be a tangible medium like copper wire cables or
broadcast medium like radio waves.
Data Transfer Rate The speed of data transferred or received over transmission channel,
measured per unit time, is called data transfer rate. The smallest unit of
measurement is bits per second (bps). 1 bps means 1 bit (0 or 1) of
data is transferred in 1 second.
• 1 Bps = 1 Byte per second = 8 bits per second
• 1 kbps = 1 kilobit per second = 1024 bits per second
• 1 Mbps = 1 Megabit per second = 1024 Kbps
• 1 Gbps = 1 Gigabit per second = 1024 Mbps
Bandwidth Data transfer rates that can be supported by a network is called its
bandwidth. It is measured in bits per second (bps). Modern day
networks provide bandwidth in Kbps, Mbps and Gbps.
A bridge It is a hardware and software combination used to connect the
same type of networks.
A backbone It is the main transmission path, handling the major data Traffic,
connecting different LANs together.
A router It is a special computer that directs communicating messages when
several networks are connected together?
A LAN is a network contained within a small area, for example a Company
department.
A gateway A gateway is an interface that enables dissimilar networks to
communicate, such as two LANs based on different topologies or
network operating systems
Computer network Two or more computers linked together to facilitate the sharing of
information
Network topology The physical layout of a network.
Network protocol A set of rules for transferring information over a network.
Ethernet protocol Used to facilitate communication within LANs
Scalability It is the ability of the internet to keep working as it grows.
A firewall It is a security system that controls the kinds of connections that can be
made between a computer network and the outside world.
Encryption It is the process of encoding data to prevent unauthorized access
Decryption It is the process of decoding data.
27

Protocol Protocol is a set of rules and regulations used by devices to


communicate over the network.
Hub the effective center of an activity, region, or network
Gateway It is a network device used to connect two or more dissimilar networks.
Layer In computer programming, layering is the organization of programming
into separate functional components that interact in some sequential
and hierarchical way, with each layer usually having an interface only to
the layer above it and the layer below it.

1. WHAT IS A NETWORK PROTOCOL?

A network protocol is a set of established rules that dictate how to format, transmit and receive
data so that computer network devices -- from servers and routers to endpoints -- can
communicate, regardless of the differences in their underlying infrastructures, designs or
standards.

To successfully send and receive information, devices on both sides of a communication


exchange must accept and follow protocol conventions. In networking, support for protocols can
be built into software, hardware or both.

Without computing protocols, computers and other devices would not know how to engage with
each other. As a result, except for specialty networks built around a specific architecture, few
networks would be able to function, and the internet as we know it wouldn't exist. Virtually
all network end users rely on network protocols for connectivity.
28

2. HOW NETWORK PROTOCOLS WORK


Network protocols break larger processes into discrete, narrowly defined functions and tasks
across every level of the network. In the standard model, known as the Open Systems
Interconnection (OSI) model, one or more network protocols govern activities at each layer in
the telecommunication exchange. Lower layers deal with data transport, while the upper layers
in the OSI model deal with software and applications.

A set of cooperating network protocols is called a protocol suite. The Transmission Control
Protocol/Internet Protocol (TCP/IP) suite, which is typically used in client-server models,
includes numerous protocols across layers -- such as the data, network, transport and
application layers -- working together to enable internet connectivity. These include the
following:

TCP, which uses a set of rules to exchange messages with other internet points at the
information packet level;User Datagram Protocol, or UDP, which acts as an alternative
communication protocol to TCP and is used to establish low-latency and loss-tolerating
connections between applications and the internet;
IP, uses a set of rules to send and receive messages at the level of IP addresses; and
additional network protocols, including Hypertext Transfer Protocol (HTTP) and File Transfer
Protocol (FTP), each of which has defined sets of rules to exchange and display information.
Every packet transmitted and received over a network contains binary data. Most computing
protocols will add a header at the beginning of each packet in order to store information about
the sender and the message's intended destination. Some protocols may also include a footer
at the end with additional information. Network protocols process these headers and footers as
part of the data moving among devices in order to identify messages of their own kind.

3. MAJOR TYPES OF NETWORK PROTOCOLS


Generally speaking, there are three types of protocols in networking -- communication, such
as Ethernet; management, such as Simple Mail Transfer Protocol (SMTP); and security, such
as Secure Shell, or SSH.

Falling into these three broad categories are thousands of network protocols that uniformly
handle an extensive variety of defined tasks, including authentication, automation, correction,
compression, error handling, file retrieval, file transfer, link aggregation, routing, semantics,
29

synchronization and syntax.

Networks can be categorized depending on size, complexity, level of security, or geographical


range. These are the most popular networks.

3.1. PAN = PERSONAL AREA NETWORK

PAN is the acronym for Personal Area Network. PAN is the interconnection between devices
within the range of a person’s private space, typically within a range of 10 metres. If you have
transferred images or songs from your laptop to mobile or from mobile to your friend’s mobile
using Bluetooth, you have set up and used a personal area network.

A person can connect her laptop, smart phone, personal digital assistant and portable printer in
a network at home. This network could be fully Wi-Fi or a combination of wired and wireless.

3.1. PAN = PERSONAL AREA NETWORK

LAN or Local Area Network is a wired network spread over a single site like an office, building or
manufacturing unit. LAN is set up to when team members need to share software and hardware
resources with each other but not with the outside world. Typical software resources include
official documents, user manuals, employee handbook, etc. Hardware resources that can be
easily shared over the network include printer, fax machines, modems, memory space, etc. This
decreases infrastructure costs for the organization drastically.

A LAN may be set up using wired or wireless connections. A LAN that is completely wireless is
30

called Wireless LAN or WLAN.

3.3. MAN- METROPOLITAN AREA NETWORK

MAN is the acronym for Metropolitan Area Network. It is a network spread over a city, college
campus or a small region. MAN is larger than a LAN and typically spread over several
kilometres. Objective of MAN is to share hardware and software resources, thereby decreasing
infrastructure costs. MAN can be built by connecting several LANs.

The most common example of MAN is cable TV network.

3.4. WAN- WIDE AREA NETWORK

WAN or Wide Area Network is spread over a country or many countries. WAN is typically a
network of many LANs, MANs and WANs. Network is set up using wired or wireless
connections, depending on availability and reliability.
31

The most common example of WAN is the Internet.

4. HOW TO IMPLEMENT NETWORK PROTOCOLS?

Network protocols must be coded to work within software -- either as part of the computer's
operating system (OS) or as an application -- or implemented within the computer's hardware.
Most modern OSes possess built-in software services that are prepared to implement some
network protocols. Other applications, such as web browsers, are designed with software
libraries that support the protocols necessary for the application to function. In addition, TCP/IP
and routing protocol support is implemented in direct hardware for enhanced performance.

Whenever a new protocol is implemented, it is added to the protocol suite. The organization of
protocol suites is considered to be monolithic since all protocols are stored in the same address
and build on top of one another.

5. WHAT ARE THE VULNERABILITIES OF NETWORK PROTOCOLS?


Network protocols are not designed for security. Their lack of protection can sometimes enable
malicious attacks, such as eavesdropping and cache poisoning, to affect the system. The most
common attack on network protocols is the advertisement of false routes, causing traffic to go
through compromised hosts instead of the appropriate ones.

6. HOW ARE NETWORK PROTOCOLS USED?

Network protocols are what make the modern internet possible since they enable computers to
communicate across networks without users having to see or know what background operations
are occurring. Some specific examples of network protocols and their uses include the following:

• Post Office Protocol 3, or POP3, is the most recent version of a standard protocol that
is used for receiving incoming emails.

• SMTP (Simple Mail Transfer Protocol) is used to send and distribute outgoing emails.

• FTP (File Transfer Protocol) is used to transfer files from one machine to another. It
refers to a group of rules that govern how computers transfer files from one system to another
over the internet.
32

• Telnet :Teletype Network is a collection of rules used to connect one system to another
via a remote login. The local computer sends the request for connection, and the remote
computer accepts the connection.

7. NETWORK DEVICES
They are used for communication between different hardware’s used in the computer network
are known as network devices. These devices are also known as physical devices, networking
hardware, and network equipment otherwise computer networking devices. In a computer
network, each network device plays a key role based on their functionality, and also works for
different purposes at different segments.

8. NETWORK TOPOLOGY

Network topology is the schematic description of the arrangement of the physical and logical
elements of a communication network.

Network topology refers to the manner in which the links and nodes of a network are arranged
to relate to each other. Topologies are categorized as either physical network topology, which is
the physical signal transmission medium, or logical network topology, which refers to the
33

manner in which data travels through the network between devices, independent of physical
connection of the devices. Logical network topology examples include twisted pair Ethernet,
which is categorized as a logical bus topology, and token ring, which is categorized as a logical
ring topology.
Physical network topology examples include star, mesh, tree, ring, point-to-point, circular,
hybrid, and bus topology networks, each consisting of different configurations of nodes and
links. The ideal network topology depends on each business’s size, scale, goals, and budget.
There are different logical and physical network topologies from which administrators can
choose to build a secure, robust, and easily maintainable topology. The most popular
configurations include:

8.1. BUS TOPOLOGY

It is also known as backbone network topology; this configuration connects all devices to a
main cable via drop lines. the advantages of bus network topology lie in its simplicity, as there
is less cable required than in alternative topologies, which makes for easy installation

The data travels in both the directions along the bus. When the destination terminal sees the
data, it copies it to the local disk. the advantages of using bus topology are−

• Easy to install and maintain


• Can be extended easily
• Very reliable because of single transmission line

8.2. RING TOPOLOGY

In ring topology each terminal is connected to exactly two nodes, giving the network a
circular shape. Data travels in only one pre-determined direction.
34

When a terminal has to send data, it transmits it to the neighboring node which transmits it to
the next one. Before further transmission data may be amplified. In this way, data raverses the
network and reaches the destination node, which removes it from the network. If the data
reaches the sender, it removes the data and resends it later.

8.3. STAR TOPOLOGY

In star topology, server is connected to each node individually. Server is also called the central
node. Any exchange of data between two nodes must take place through the server. It is the
most popular topology for information and voice networks as central node can process data
received from source node before sending it to the destination node.

8.4. TREE TOPOLOGY

Tree topology has a group of star networks connected to a linear bus backbone cable. It
incorporates features of both star and bus topologies. Tree topology is also called hierarchical
topology.
35

9. TCP/IP TRANSMISSION CONTROL PROTOCOL

TCP/IP stands for Transmission Control Protocol/Internet Protocol. TCP/IP is a set of


layered protocols used for communication over the Internet. The communication model of this
suite is client-server model. A computer that sends a request is the client and a computer to
which the request is sent is the server.

9.1. TCP/IP HAS FOUR LAYERS

APPLICATION
APPLICATION
LAYER(HTTP)
LAYER(HTTP)

APPLICATION APPLICATION
LAYER (TCP) LAYER(TCP)

APPLICATION APPLICATION
LAYER (IP) LAYER (IP)

DATA LINK
DATA LINK
LAYER
MEDIA FOR DATA TRANSFER LAYER
36

TCP/IP is widely used in many communication networks other than the Internet.

• Application layer − Application layer protocols like HTTP and FTP are used.

• Transport layer − Data is transmitted in form of datagrams using the Transmission


Control Protocol (TCP). TCP is responsible for breaking up data at the client side and
then reassembling it on the server side.

• Network layer − Network layer connection is established using Internet Protocol (IP) at
the network layer. Every machine connected to the Internet is assigned an address
called IP address by the protocol to easily identify source and destination machines.

• Data link layer − Actual data transmission in bits occurs at the data link layer using the
destination address provided by network layer.

10. WHO USES NETWORK PROTOCOLS?

Network protocols aren’t only relevant to certified network specialists or IT professionals.


Billionsof people use network protocols daily, whether they know it or not.

Every time you use the internet, you leverage network protocols. Though you may not know
how network protocols work or how frequently you encounter them, they are necessary for
using the internet or digital communications in any capacity.

In order for network protocols to work, they must be coded within software, either a part of the
computer's operating system (OS) or as an application, or implemented within the computer's
hardware. Most modern operating systems possess built-in software services that are
prepared to implement some network protocols. Other applications, such as web browsers,
are designed with software libraries that support whatever protocols are necessary for the
application to function. Furthermore, TCP/IP and routing protocol support is implemented in
direct hardware forenhanced performance.
Whenever a new protocol is implemented, it is added to the protocol suite. The organization
of protocol suites is considered to be monolithic since all protocols are stored in the same
address and build on top of one another.
37

11. VULNERABILITIES OF NETWORK PROTOCOLS

One major vulnerability found in network protocols is that they are not designed for
security. Their lack of protection can sometimes allow malicious
attacks, such as eavesdropping and cache poisoning, to affect the system. The most
common attack on network protocols is the advertisement of false routes, causing traffic to go
through compromised hosts instead of the appropriate ones.

Network protocol analyzers have been designed and installed in response to these
vulnerabilities. Network protocol analyzers protect systems against malicious activity by
supplementing firewalls, anti-virus programs and anti-spyware software.

BIBLIOGRAPHY
https://www.techtarget.com/searchnetworking/definition/protocol
https://www.computerhope.com/jargon/n/network.htm
https://www.heavy.ai/technical-glossary/network-topology
https://www.elprocus.com/what-are-network-devices-and-their-types/
https://www.techtarget.com/searchnetworking/definition/network-topology
https://www.geeksforgeeks.org/types-of-network-topology/

PRACTICE
https://www.youtube.com/watch?v=znIjk-7ZuqI
https://www.youtube.com/watch?v=614QGgw_FA4

TASK 1: CHOOSE THE CORRECT OPTION

1 Protocols are set of rules to govern


a) Communication b) Standard c) Metropolitan communication d) Bandwidth

2. An internet is a
a) Collection of WANS b) Network of networks c) Collection of LANS
d)Collection of identical LANS and WANS

3. Checksum is used in Internet by several protocols although not at the


a) Session layer b) Transport layer c) Network layer d) Data link layer

4. Network layer at source is responsible for creating a packet from data coming from
another
38

a) Station b) Link c) Node d) Protocol


5. The term HTTP stands for?
a) Hyper terminal tracing program b) Hypertext tracing protocol
c)Hypertext transfer protocol d) Hypertext transfer program

6. Which one of the following is not a network topology?


a) Star b) Ring c) Bus d) Peer to Peer

7. The term WAN stands for?


a) Wide Area Net b) Wide Access Network c) Wide Area Network d) Wide Access Net

8. The term LAN stands for?


a) Local Area Net b) Local Aera Networ c) Local Array Network d)Local Array

TASK 2. READING COMPREHENSION

NETWORK COMMUNICATIONS

1. The application layer is the only part of а communications process that а user sees, and even then,
the user doesn't see most of the work that the application does to prepare а message for sending over
а network. The layer converts а message's data from human-readable form into bits and attaches а
header identifying the sending and receiving computers.

2. The presentation layer ensures that the message is transmitted in а language that the receiving
computer can interpret (often ASCII). This layer translates the language, if necessary, and then
compresses and perhaps encrypts the data. It adds another header specifying the language as well as
the compression and encryption schemes.

3. The session layer opens communications and has the job of keeping straight the communications
among аll nodes on the network. It sets boundaries (called bracketing) for the beginning and end of the
message, and establishes whether the messages will be sent half-duplex, with each computer taking
turns sending and receiving, or full-duplex, with both computers sending and receiving at the same
time. The details of these decisions are placed into а session header.

4. The transport layer protects the data being sent. It subdivides the data into segments, creates
checksum tests - mathematical sums based on the contents of data - that can be used later to
determine if the data was scrambled. It can also make backup copies of the data. The transport header
identifies each segment's checksum and its position in the message.

5. The network layer selects а route for the message. It forms data into packets, counts them, and
adds а header containing the sequence of packets and the address of the receiving computer.

6. The data-link layer supervises the transmission. It confirms the checksum, then addresses and
duplicates the packets. This layer keeps а сору of each packet until it receives confirmation from the
next point along the route that the packet has arrived undamaged.
39

7. The physical layer encodes the packets into medium that will carry them – such as analogue signal,
if the message is going across telephone line – and sends the packets along that medium.

8. An intermediate node calculates and verifies checksum for each packet. It may also reroute
message to avoid congestion on the network.

9. At the receiving node, the layered process sent the message on its way is reversed. The physical
layer reconverts the message into the data-link layer recalculates the checksum, confirms arrival, and
logs in the packets. The network layer recounts incoming packets for security and billing purposes. The
sport layer recalculates the checksum and reassembles the message segments. The session layer
holds the parts of the message until the message is complete and sends it to the next layer. The
presentation layer expands and decrypts the message. The application layer converts the bits into
readable characters, and directs the data to the correct application.

A. Fill in the missing words in the following sentences then put the sentences in the
correct order:

a) The checksum is recalculated by the _______________ layer which also reassembles the
message _______________.

b) The message is _______________ and _______________ by the presentation layer.

c) The message is reconverted into _______________ by the physical layer.

d) The session layer then sends the message to the next _______________ .

е) The application layer converts the bits into _______________ characters, and directs the
data to the correct .... .

f) The incoming _______________ are recounted by the network layer for _______________
and billing purposes.

g) The______________ layer confirms the arrival of the packets, ____________them in, and
calculates the ______________ for each packet.

h) The parts of the message are _______________ by the _______________ layer until the
message is _______________.

B. Match the term in Table A with the statement in Table B.

TABLE A TABLE B
1.Transmission mode in which each computer takes turns
A. Bracketing
sending and receiving.
B. Half - duplex
2. Mathematical calculations based on the contents of data.
C. full-duplex
3. Set boundaries for the beginning and end of a message.
D. Checksum
4.Transmission mode in which both computers send and
receive at the same time.
40

C. Mark the following statements as TRUE or FALSE

1. Most of the work that an application does to prepare a message for sending over a network
is not seen by the user. TRUE FALSE
2. SCII is always used to transmit data. TRUE FALSE
3.The encryption layer compresses the message.TRUE FALS
4.The network layer keeps track of how many packets are in each message. TRUE FAL SE
5. The network layer keeps a copy of each packet until it arrives at the next node undamaged.
TRUE FALSE
6.Analogue signals are used on ordinary telephone lines. TRUE FALSE
7.When a message arrives at its destination, it passes through the same seven network
communications layers as when it was sent but in reverse order. TRUE FALSE
41

UNIT 3
PROGRAMMING LANGUAGE

GLOSSARY
WORD DEFINITION
Low level language this code is written to specific hardware, and will only operate on the hardware it
was written for and has almost no abstraction from the hardware; reads machine
code and assembly language
Application A program which makes the computer a useful tool

Compiler Converts a program to a language that the computer understands.

Scripts In programming, a series of scripts, or sets of steps, are written for a


computer to follow. Computers process the steps line-by-line from top to
bottom. Each step is created by writing a statement.
Compile It is to transform a program written in a high-level programming language from
source code into object code.
• This can be done by using a tool called compiler.
• A compiler reads the whole source code and translates it into a complete
machine code program to perform the required tasks which is output as a new file.
Code In computer programming, computer code refers to the set of instructions, or a
system of rules, written in a particular programming language
A high-level language (HLL) is a programming language that lets the developer
High-level language write programs irrespective of the nature or type of computer. If a computer has to
understand a high-level language, it should be compiled into a machine
language.
A low-level language is a language that is very close to machine language and
Low-level language provides a little abstraction of programming concepts. Low-level languages are
closer to the hardware than human languages. The most common examples of
low-level languages are assembly and machine code.
A markup language is a relatively simple language that consists of easily
Markup language understood keywords and tags, used to format the overall view of the page and its
contents.
42

ASCII Short for American Standard Code for Information Interexchange, ASCII is a
standard that assigns letters, numbers, and other characters
HTML First developed by Tim Berners-Lee in 1990, HTML is short for Hypertext
Markup Language. HTML is used to create electronic documents (called pages)
that are displayed on the World Wide Web. Each page contains several
connections to other pages called hyperlinks.

1. WHAT IS A COMPUTER LANGUAGE?

A programming language is a computer language engineered to create a standard form of


commands. These commands can be interpreted into a code understood by a machine.
A programming language refers also to the means of communication that is used by humans
to instruct computers to perform specified tasks.

A programming language is a computer language programmers use to develop software


programs, scripts, or other sets of instructions for computers to execute.

Although many languages share similarities, each has its own syntax. Once a programmer
learns the languages rules, syntax, and structure, they write the source code in a text
editor or IDE. Then, the programmer often compiles the code into machine language that can be
understood by the computer. Scripting languages, which do not require a compiler, use
an interpreter to execute the script.

A programming language consists of a vocabulary containing a set of grammatical rules


intended to convey instructions to a computer or computing device to perform specific tasks.
Each programming language has an unique set of keywords along with a special syntax to
organize the software’s instructions.
43

There are low-level and high-level programming languages which, although simple compared to
human languages, are more complex than machine languages.

2. TYPES OF PROGRAMMING LANGUAGES


Each of the different programming languages mentioned in the next section can be broken into
one or more of the following types (paradigms) of languages.

2.1. HIGH-LEVEL LANGUAGE (MOST COMMON)

High-level languages, on the other hand, are designed to be easy to read and understand,
allowing programmers to write source code naturally, using logical words and symbols.

Sometimes abbreviated as HLL, a high-level language is a computer programming language


that isn't limited by the computer, designed for a specific job, and is easier to understand. It is
more like human language and less like machine language. However, for a computer to
understand and run a program created with a high-level language, it must be compiled into
machine language.

2.2. LOW-LEVEL LANGUAGE

Low-level languages include assembly and machine languages. An assembly language


contains a list of basic instructions and is much harder to read than a high-level language.
A low-level language is a programming language that provides little or no abstraction of
programming concepts and is very close to writing actual machine instructions. Two examples
of low-level languages are assembly and machine code.

Low-level languages are useful because programs written in them can be crafted to run very
fast and with a very minimal memory footprint. However, they are considered harder to utilize
becausethey require a deeper knowledge of machine language.
3. MAIN FEATURES OF PROGRAMMING LANGUAGES

According to Chakray organization, the features that a programming language must have to
stand out are the following:

• Simplicity: the language must offer clear and simple concepts that facilitate learning
and application, in a way that is simple to understand and maintain. Simplicity is a
difficult balance to strike without compromise the overall capability.
44

• Naturalness: this means that its application in the area for which it was designed must
be done naturally, providing operators, structures and syntax for operators to work
efficiently.
• Abstraction: it is the ability to define and use complicated structures or operations while
ignoring certain low-level details.
• Efficiency: Programming languages must be translated and executed efficiently so as
not to consume too much memory or require too much time.
• Structuring: the language allows programmers to write their code according to
structured programming concepts, to avoid creating errors.
• Compactness: with this characteristic, it is possible to express operations concisely,
without having to write too many details.
• Locality: refers to the code concentrating on the part of the program with which you are
working at a given time.

4. THE MOST POPULAR PROGRAMMING LANGUAGES


4.1.JAVASCRIPT

JavaScript is one of the world’s most popular programming languages on the web. As per the
survey, more than 97 percent of the websites use JavaScript on the client-side of the
webpage.
• It has a well-organized codebase that provides enhanced productivity and readability.
• Easy to learn and is highly in demand.
• Platform independence and greater control of the browser.
• Provide user input validation features.
• The top companies using JavaScript are Microsoft, Uber, PayPal, Google, Walmart, etc.
45

4.2. PYTHON

Python can be regarded as the future of programming languages. As per the latest
statistics, Python is the main coding language for around 80% of developers. The
presence of extensive libraries in Python facilitates artificial intelligence, data science, and
machine learning processes. Currently, Python is trending and can be regarded as the king of
programming languages.
It is one of the most lucrative languages that offers amazing features like:

• Easy to learn and code.


• Extensive libraries and frameworks that support a plethora of applications.
• Incorporated the variants of Java and C like CPython, Jython, etc.
• GUI support.
• Companies working on Python: Intel, Facebook, Spotify, Netflix, etc.

3.1.1. PYTHON ADVANTAGES AND DISADVANTAGES

4.3. JAVA
46

Java is an object-oriented programming language that produces software for multiple


platforms. When a programmer writes a Java application, the compiled code (known as
bytecode) runs on most operating systems (OS), including Windows, Linux and Mac OS.

Java is one of the most powerful programming languages that is currently used in more
than 3 billion devices. Java is currently one of the most trending technology. It is used in
desktop applications, mobile applications, web development, Artificial intelligence, cloud
applications, and many more.
Some of the prominent features of Java are:
• Platform independence and Object-oriented programming
• Enhanced productivity, performance, and security
• It is the most secure language
WHAT IS JAVA USED FOR?

Here are some important Java applications:

• It is used for developing Android Apps


• Helps you to create Enterprise Software
• Wide range of Mobile java Applications
• Scientific Computing Applications
• Use for Big Data Analytics
• Java Programming of Hardware devices

4.4. JAVASCRIPT
1. JavaScript is one of the world’s most popular programming languages on the web. It has a
well-organized codebase that provides enhanced productivity and readability. It is an object-
oriented computer programming language commonly used to create interactive effects within web
browsers.
JavaScript is the Programming Language for the Web. JavaScript can update and change
both HTML and CSS. JavaScript can calculate, manipulate and validate data.
47

The characteristics of Java Script are:


• Easy to learn and is highly in demand.
• Platform independence and greater control of the browser.
• Provide user input validation features.
• The top companies using JavaScript are Microsoft, Uber, PayPal, Google, Walmart,
etc.

4.5. C#

What is C# used for? Like other general-purpose programming languages, C# can be used
to create a number of different programs and applications: mobile apps, desktop apps,
cloud-based services, websites, enterprise software and games.
Like other general-purpose programming languages, C# can be used to create a number of
different programs and applications: mobile apps, desktop apps, cloud-based services,
websites, enterprise software and games. Lots and lots of games. While C# is remarkably
versatile, there are three areas in which it is most commonly used.
C# is :
• Simple to learn and understand.
• It is fully integrated with .NET libraries.
• The top companies working on C# are Microsoft, Stack Overflow, Accenture, and Alibaba
Travels.
4.6. KOTLIN
48

Kotlin is a general purpose, free, open source, statically typed “pragmatic” programming
language initially designed for the JVM (Java Virtual Machine) and Android that combines
object-oriented and functional programming features. It is focused on interoperability, safety,
clarity, and tooling support.

Kotlin is a cross-platform programming language designed to develop apps. It is being used


by more than 60% of android developers. Kotlin beholds fourth place among the fastest-
growing programming language on several renowned indices. Some of the prominent features
of Kotlin are:
• Concise code and structured concurrency.
• Enhanced security features.
• Coding is approximately 20% less as compared to Java.
• It is 100% interoperable.
• Companies working on Kotlin are Pinterest, Uber, Trello, Amazon, etc.

4.7.PHP acronym for "PHP: Hypertext Preprocessor"

PHP can be used in a large number of applications, given that it’s an open source programming
language. PHP is a server side scripting language that is embedded in HTML. It is used to
manage dynamic content, databases, session tracking, even build entire e-commerce
sites.
PHP is one of the general-purpose scripting languages that will continue to hold its
importance in the upcoming years. It is among the first server-side language that can be
embedded with HTML to add functionality to web pages. Due to the increasing online
trend, PHP developers are in high demand. Some of the astonishing features are:
49

• Simple and easy to learn.


• Faster than other scripting languages
• Highly secure to prevent threats and attacks.
• Amazing websites like Facebook, Yahoo, and Wikipedia run on PHP.
5. Go
Go, also known as Golang, is an open-source, compiled, and statically typed programming
language designed by Google. It is built to be simple, high-performing, readable, and efficient.
Go is one of the most reliable and efficient programming languages that stands out from the
rest. It was originally designed at Google in 2007 to manage its rapidly growing
infrastructure. It quickly gained amazing popularity and has become one of the top
programming languages. Some of the amazing features of Go are:

• Simple to learn and understand.


• Supports automation processes.
• It facilitates AI and data science processes.
• Companies working on Go are Google, BBC, Medium, and Uber.

PRACTICE
READING COMPREHENSION PRACTICE

COMPUTER LANGUAGES

Unfortunately for us, computers can't understand spoken English or any other natural language. The only
language they can understand directly is machine code, which consists of 1s and 0s (binary code).

Machine code is too difficult to write. For this reason, we use symbolic languages to communicate
instructions to the computer. For example, assembly languages use abbreviations such as ADD, SUB,
MPY to represent instructions. The program is then translated into machine code by a piece of software
called an assembler. Machine code and assembly languages are called low-level languages because
they are closer to the hardware. They are quite complex and restricted to particular machines. To make
the programs easier to write, and to overcome the problem of intercommunication between different
types of computer, software developers designed high-level languages, which are closer to the English
language. Here are some examples:

FORTRAN was developed by IBM in 1954 and is still used for scientific and engineeringapplications.

COBOL (Common Business Oriented Language) was developed in 1959 and is mainly used forbusiness
applications.

BASIC was developed in the 1960s and was widely used in microcomputer programming because it was
easy to earn. Visual BASIC is a modern version of the old BASIC language, used to build graphical
elements such as buttons and windows in Windows programs.
50

PASCAL was created in 1971. It is used in universities to teach the fundamentals ofprogramming.

C was developed in the 1980s at AT&T. It is used to write system software, graphics and commercial
applications. C++ is a version of C which incorporates object-oriented programming the programmer
concentrates on particular things (a piece of text, a graphic or a table, etc.) and gives each object
functions which can be altered without changing the entire program. For example, to add a new graphics
format, the programmer needs to rework just the graphics object. This makes programs easier to modify.

Java was designed by Sun in 1995 to run on the Web. Java applets provide animation and interactive
features a web pages.

Programs written in high-level languages must be translated into machine code by a compiler or an
interpreter. A compiler translates the source code into object code - that is, it converts the entire
program into machine code in one go. On the other hand, an interpreter translates the source code line by
line as the program is running.

It is important not to confuse programming languages with markup languages, used to create web
documents. Markup languages use instructions, known as markup tags, to format and link text files.
Some examples include:

HTML allows us to describe how information will be displayed on web pages.

XML, which stands for Extensible Markup Language. While HTML uses pre-defined tags, XML enables us
to define our own tags; it is not limited by a fixed set of tags.

VoiceXML, which makes Web content accessible via voice and phone. VoiceXML is used to create voice
applications that run on the phone, whereas HTML is used to create visual applications (for example, web
pages).

<xml>
< name> Andrea Finch </name>

< homework> Write a paragraph describing the C language </homework></xml>

READ THE TEXT AGAIN AND ANSWER THESE QUESTIONS

1. Do computers understand human languages? Why? / Why not?


51

2. What is the function of an assembler?

3. Why did software developers design high-level languages?

4. Which language is used to teach programming techniques?

5. What is the difference between a compiler and an interpreter?

6. Why are HTML and VoiceXML called markup languages?

IX. COMPLETE THESE SENTENCES WITH A COMPUTER LANGUAGE FROM THE


TEXT

1. allows us to create our own tags to describe our data better. We aren't
constrainer by a pre-defined set of tags the way we are with HTML.
2. IBM developed in the l 950s. It was the first high-level language in data
processing.
3. applets are small programs that run automatically on web pages and let
you watch animated characters, play games, etc.
4. is the HTML of the voice web? Instead of using a web browser and a
keyboard, interact with a voice browser by listening to pre-recorded audio
output and sending,audio input through a telephone.
5. This language is widely used in the business community. For example, the
statement ADDVAT NET-PRICE could be used in a program.

BIBLIOGRAPHY
https://www.youtube.com/watch?v=FhrJAi-eHwI
https://www.geeksforgeeks.org/top-10-programming-languages-to-learn-in-2022/
https://www.snhu.edu/about-us/newsroom/stem/what-is-computer-programming

https://www.computerhope.com/jargon/p/programming-language.htm#types

https://hackr.io/blog/best-programming-languages-to-learn

https://www.chakray.com/programming-languages-types-and-features/
52

https://www.pluralsight.com/blog/software-development/everything-you-need-to-know-about-c-

UNIT 4

ARTIFICIAL INTELLIGENCE

GLOSSARY
WORD CONCEPT
CHATBOT / BOT It is also known as a conversational agent or virtual assistant, is a system
capable of carrying on a dialogue with users based on conversations that
have been scripted upstream. Its role is to respond with maximum relevance to
questions that are frequently asked by internet users, clients or personnel.
DATA CRUNCHING Data crunching is the automated analysis of vast amounts of data originating
from Big Data.

ARTIFICIAL an automated system capable of analyzing data and making


choices autonomously.
INTELLIGENCE (AI)

MACHINE LEARNING Machine learning is one of the building blocks of artificial intelligence. The
53

term refers to a process in which a machine, for example, a chatbot, is


/AUTOMATIC LEARNING
endowed with the capacity to learn automatically.
ALGORITHM. A set of rules that a machine can follow to learn how to do a task.
AUTONOMOUS: A machine is described as autonomous if it can perform its task or tasks without needing
human intervention.
DATASET: A collection of related data points, usually with a uniform order and tags.
STRONG AI: This field of research is focused on developing AI that is equal to the human mind when it
comes to ability.
WEAK AI: Also called narrow AI, this is a model that has a set range of skills and focuses on one
particular set of tasks. Most AI currently in use is weak AI, unable to learn or perform tasks
outside of its specialist skill set.
DEEP LEARNING Machine learning technique that teaches computers how to learn by rote (i.e.
machines mimic learning as a human mind would, by using classification
techniques)
Reinforcement Reinforcement learning is an area of machine learning
Learning (RL) concerned with how intelligent agents ought to take actions in an environment
in order to maximize the notion of cumulative reward.
1. WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

According to Nicole Laskowski, Artificial intelligence is the simulation of human intelligence


processes by machines, especially computer systems. Specific applications of AI include expert
systems, natural language processing, speech recognition and machine vision.

Artificial intelligence (AI) is an area of computer science that involves building smart machines
that are able to perform tasks which usually require human intelligence. Advances in deep
learning and machine learning have allowed AI systems to enter almost every sector in the tech
industries.

Artificial intelligence (AI) refers to the simulation of human intelligence in machines that are
programmed to think like humans and mimic their actions. The term may also be applied to any
machine that exhibits traits associated with a human mind such as learning and problem-
solving.

The ideal characteristic of artificial intelligence is its ability to rationalize and take actions that
have the best chance of achieving a specific goal. A subset of artificial intelligence is machine
learning (ML), which refers to the concept that computer programs can automatically learn from
and adapt to new data without being assisted by humans. Deep learning techniques enable
this automatic learning through the absorption of huge amounts of unstructured data such as
text, images, or video.
54

Artificial intelligence allows machines to replicate the capabilities of the human mind. From the
development of self-driving cars to the proliferation of smart assistants like Siri and Alexa, AI is
a growing part of everyday life. As a result, many tech companies across various industries are i
Artificial intelligence (AI), also known as machine intelligence, is a branch of computer science
that focuses on building and managing technology that can learn to autonomously make
decisions and carry out actions on behalf of a human being.

AI is not a single technology. It is an umbrella term that includes any type of software or
hardware component that supports machine learning, computer vision, natural language
understanding (NLU) and natural language processing (NLP).

Today’s AI uses conventional CMOS hardware and the same basic algorithmic functions that
drive traditional software. Future generations of AI are expected to inspire new types of brain-
inspired circuits and architectures that can make data-driven decisions faster and more
accurately than a human being .

What are the 4 types of AI and how do they differ?

AI initiatives are often talked about in terms of their belonging to one of four categories:

1. Reactive AI relies on real-time data to make decisions.


2. Limited Memory AI relies on stored data to make decisions.
3. Theory of Mind AI can consider subjective elements such as user intent when making
decisions.
4. Self-Aware AI possesses a human-like consciousness that is capable of independently
setting goals and using data to decide the best way to achieve an objective.

2. HOW DOES AI WORK?

In general, AI systems work by ingesting large amounts of labeled training data, analyzing the
data for correlations and patterns, and using these patterns to make predictions about future
states. In this way, a chatbot that is fed examples of text chats can learn to produce lifelike
exchanges with people, or an image recognition tool can learn to identify and describe objects in
images by reviewing millions of examples.

Artificial intelligence uses machine learning to mimic human intelligence. The computer has to
learn how to respond to certain actions, so it uses algorithms and historical data to create
something called a propensity model.
55

AI can do much more than this, but those are common uses and functionality for marketing. And
while it might seem like the machines are ready to rise up and take over, humans are still
needed to do much of the work.

Mainly, we use AI to save us time — adding people to email automation and allowing AI to do
much of the work while we work on other tasks.

3. WHY IS ARTIFICIAL INTELLIGENCE IMPORTANT?

AI is important because it can give enterprises insights into their operations that they may not
have been aware of previously and because, in some cases, AI can perform tasks better than
humans. Particularly when it comes to repetitive, detail-oriented tasks like analyzing large
numbers of legal documents to ensure relevant fields are filled in properly, AI tools often
complete jobs quickly and with relatively few errors.

4. WHAT ARE THE ADVANTAGES AND DISADVANTAGES OF ARTIFICIAL


INTELLIGENCE?

Artificial neural networks and deep learning artificial intelligence technologies are quickly
evolving, primarily because AI processes large amounts of data much faster and makes
predictions more accurately than humanly possible.

While the huge volume of data being created on a daily basis would bury a human researcher,
AI applications that use machine learning can take that data and quickly turn it into actionable
information. As of this writing, the primary disadvantage of using AI is that it is expensive to
process the large amounts of data that AI programming requires.

ADVANTAGES DISADVANTAGES

• Good at detail-oriented jobs; • Expensive;


• Reduced time for data-heavy tasks; • Requires deep technical expertise;

• Delivers consistent results; and • Limited supply of qualified workers to build


AI tools;
• AI-powered virtual agents are always
available. • Only knows what it's been shown; and

• Lack of ability to generalize from one


task to another
56

5. WHAT ARE THE 4 TYPES OF AI?

Artificial intelligence can be categorized into one of four types.

• Reactive AI uses algorithms to optimize outputs based on a set of inputs. Chess-


playing AIs, for example, are reactive systems that optimize the best strategy to win the
game. Reactive AI tends to be fairly static, unable to learn or adapt to novel situations.
Thus, it will produce the same output given identical inputs.
• Limited memory AI can adapt to past experience or update itself based on new
observations or data. Often, the amount of updating is limited (hence the name), and
the length of memory is relatively short. Autonomous vehicles, for example, can "read
the road" and adapt to novel situations, even "learning" from past experience.
• Theory-of-mind AI are fully-adaptive and have an extensive ability to learn and retain
past experiences. These types of AI include advanced chat-bots that could pass
the Turing Test, fooling a person into believing the AI was a human being. While
advanced and impressive, these AI are not self-aware.
• Self-aware AI, as the name suggests, become sentient and aware of their own
existence. Still in the realm of science fiction, some experts believe that an AI will never
become conscious or "alive".

6. WHAT ARE EXAMPLES OF AI TECHNOLOGY AND HOW IS IT USED


TODAY?

AI is incorporated into a variety of different types of technology. Here are six examples:
57

• Automation. When paired with AI technologies, automation tools can expand the volume
and types of tasks performed. An example is robotic process automation (RPA), a type of
software that automates repetitive, rules-based data processing tasks traditionally done by
humans. When combined with machine learning and emerging AI tools, RPA can automate
bigger portions of enterprise jobs, enabling RPA's tactical bots to pass along intelligence
from AI and respond to process changes.

• Machine learning. This is the science of getting a computer to act without programming.
Deep learning is a subset of machine learning that, in very simple terms, can be thought of
as the automation of predictive analytics. There are three types of machine learning
algorithms:

o Supervised learning. Data sets are labeled so that patterns can be detected and used
to label new data sets.

o Unsupervised learning. Data sets aren't labeled and are sorted according to
similarities or differences.

o Reinforcement learning. Data sets aren't labeled but, after performing an action

6.WHAT ARE THE APPLICATIONS OF AI?

Artificial intelligence has made its way into a wide variety of markets. Here are SOME examples.

6.1. AI in healthcare. The biggest bets are on improving patient outcomes and reducing costs.
Companies are applying machine learning to make better and faster diagnoses than humans.
One of the best-known healthcare technologies is IBM Watson. It understands natural language
and can respond to questions asked of it.

AI in business. Machine learning algorithms are being integrated into analytics and customer
relationship management (CRM) platforms to uncover information on how to better serve
customers. Chatbots have been incorporated into websites to provide immediate service to
customers. Automation of job positions has also become a talking point among academics and
IT analysts.

AI in education. AI can automate grading, giving educators more time. It can assess students
and adapt to their needs, helping them work at their own pace. AI tutors can provide additional
58

support to students, ensuring they stay on track. And it could change where and how students
learn, perhaps even replacing some teachers.

AI in finance. AI in personal finance applications, such as Intuit Mint or TurboTax, is disrupting


financial institutions. Applications such as these collect personal data and provide financial
advice. Other programs, such as IBM Watson, have been applied to the process of buying a
home. Today, artificial intelligence software performs much of the trading on Wall Street.

7.USE OF ARTIFICIAL INTELLIGENCE ON A PRACTICAL LEVEL

AI is currently being applied to a range of functions both in the lab and in commercial/consumer
settings, including the following technologies:

• Speech Recognition allows an intelligent system to convert human speech into text or
code.
• Natural Language Processing enables conversational interaction between humans
and computers.
• Computer Vision allows a machine to scan an image and use comparative analysis to
identify objects in the image.
• Machine learning focuses on building algorithmic models that can identify patterns and
relationships in data.
• Expert systems gain knowledge about a specific subject and can solve problems as
accurately as a human expert on this subject.

PRACTICE

TASK 1. READING COMPREHENSION ACTIVITY


THE RETURN OF ARTIFICIAL INTELLIGENCE

A After years in the wilderness, the term 'artificial intelligence' (AI) seems poised to make a
comeback. AI was big in the 1980s but vanished in the 1990s. It re-entered public consciousness
with the release of Al, a movie about a robot boy. This has ignited a publicdebate about AI, but the
term is also being used once more within the computer industry. Researchers, executives and
marketing people are now using the expression without irony or inverted commas. And it is not
always hype. The term is being applied, with some justification, to products that depend on
59

technology that was originally developed by AI researchers. Admittedly, the rehabilitation of the term
has a long way to go, and some firms still prefer to avoid using it. But the fact that others are starting
to use it again suggests that AI has moved on from being seen as an over-ambitious and under-
achieving field of research.

B The field was launched, and the term 'artificial intelligence' coined, at a conference in 1956 by
a group of researchers that included Marvin Minsky, John McCarthy, Herbert Simon and Alan
Newell, all of whom went on to become leading figures in the field. The expression provided an
attractive but informative name for a research programme that encompassed such previously
disparate fields as operations research, cybernetics, logic and computer science. The goal they
shared was an attempt to capture or mimic human abilities using machines. That said, different
groups of researchers attacked different problems, from speech recognition to chess playing, in
different ways; AI unified the field in name only. But it was a term that captured the public
imagination.

C Most researchers agree that AI peaked around 1985. A public reared on science-fiction
movies and excited by the growing power of computers had high expectations. For years, AI
researchers had implied that a breakthrough was just around the corner. Marvin Minsky said in 1967
that within a generation the problem of creating' artificial intelligence' would be substantially solved.
Prototypes of medical-diagnosis programs and speech recognition software appeared to be making
progress. It proved to be a false dawn. Thinking computers and household robots failed to
materialize, and a backlash ensued. `There was undue optimism in the early 1980s; says David
Leaky, a researcher at Indiana University. 'Then when people realized these were hard problems,
there was retrenchment. By the late 1980s, the term AI was being avoided by many researchers,
who opted instead to align themselves with specific sub-disciplines such as neural networks, agent
technology, case-based reasoning, and so on.

D Ironically, in some ways AI was a victim of its own success. Whenever an apparently
mundane problem was solved, such as building a system that could land an aircraft unattended, the
problem was deemed not to have been AI in the first plate. 'If it works, it can't be AI; as Dr Leaky
characterizes it. The effect of repeatedly moving the goal-posts in this way was that AI came to refer
to 'blue-sky' research that was still years away from commercialization. Researchers joked that AI
stood for `almost implemented'. Meanwhile, the technologies that made it onto the market, such as
speech recognition, language translation and decision-support software, were no longer regarded as
AI. Yet all three once fell well within the umbrella of AI research.

E But the tide may now be turning, according to Dr Leake. HNC Software of San Diego, backed
by a government agency, reckon that their new approach to artificial intelligence is the most
powerful and promising approach ever discovered. HNC claim that their system, based on a cluster
60

of 30 processors, could be used to spot camouflaged vehicles on a battlefield or extract a voice


signal from a noisy background - tasks humans can do well, but computers cannot. 'Whether or not
their technology lives up to the claims made for it, the fact that HNC are emphasizing the use of AI is
itself an interesting development; says Dr Leaky.
F Another factor that may boost the prospects for AI in the near future is that investors are now
looking for firms using clever technology, rather than just a clever business model, to differentiate
themselves. In particular, the problem of information overload, exacerbated by the growth of e-mail
and the explosion in the number of web pages, means there are plenty of opportunities for new
technologies to help filter and categorize information - classic AI problems. That may mean that
more artificial intelligence companies will start to emerge to meet this challenge.

G The 1969 film, 2001: A Space Odyssey, featured an intelligent computer called HAL 9000. As
well as understanding and speaking English, HAL could play chess and even learned to lip- read.
HAL thus encapsulated the optimism of the 1960s that intelligent computers would be widespread
by 2001. But 2001 has been and gone, and there is still no sign of a HAL-like computer. Individual
systems can play chess or transcribe speech, but a general theory of machine intelligence still
remains elusive. It may be, however, that the comparison with HAL no longer seems quite so
important, and AI can now be judged by what it can do, rather than byhow well it matches up to a
30-year-old science-fiction film. 'People are beginning to realize that there are impressive things that
these systems can do; says Dr Leake hopefully.

TASK 2: DO THE FOLLOWING STATEMENTS AGREE WITH THE INFORM ATION GIVEN IN THE
READING? WRITE: TRUE/ FALSE / NOT GIVEN ( If there is no information on this)

1. The researchers who launched the field of AI had worked together on other projects
in thepast. …………..

2. In 1985, AI was at its lowest point. ……….

3. Research into agent technology was more costly than research into neural networks. ……..

4. Applications of AI have already had a degree of success. ………..

5. The problems waiting to be solved by AI have not changed since 1967. ……….

TASK 3: Choose the correct letter, A, B, C or D.

1. According to researchers, in the late 1980s, there was a feeling that


a. a general theory of AI would never be developed.
b. original expectations of AI may not have been justified.
c. a wide range of applications was close to fruition.
d. more powerful computers were the key to further progress.

2. In Dr Leake's opinion, the reputation of AI suffered as a result of


61

a. changing perceptions.
b. premature implementation.
c. poorly planned projects.
d. commercial pressures.

3. The prospects for AI may benefit from


a. existing AI applications.
b. new business models.
c. orders from Internet-only companies.
d. new investment priorities.

TASK 4: ANSWER THE FOLLOWING QUESTIONS


1. What springs to mind when you hear the term Artificial Intelligence?-
__________________________________________________________________________
__________________________________________________________________________
2. What is Artificial intelligence in simple words, give some examples?
__________________________________________________________________________
__________________________________________________________________________
3. In your words what are the danger of Artificial Intelligence?
__________________________________________________________________________
__________________________________________________________________________
4. Mention some benefits of Artificial intelligence, how is it helping us today? Give some
examples.
____________________________________________________________________________
____________________________________________________________________________
5. How can Artificial Intelligence be dangerous?
____________________________________________________________________________
____________________________________________________________________________

6. Who is known as the -Father of AI"?


____________________________________________________________________________
____________________________________________________________________________
7. The main tasks of an AI agent are
____________________________________________________________________________
__________________________________________________________________________
8. Weak Artificial Intelligence is……….

ARTIFICIAL INTELLIGENCE QUESTIONS PRACTICE 2


62

This set of Artificial Intelligence Multiple Choice Questions) focuses on “Robotics –”.

1. What is the name for information sent from robot sensors to robot controllers?
a) temperature b) pressur c) feedback d) signal
2. Which of the following terms refers to the rotational motion of a robot arm?
a) swivel b) axle c) retrograde d) roll
3. Which of the following terms IS NOT one of the five basic parts of a robot?
a) peripheral tools b) end effectors c) controller d) drive
4. Decision support programs are designed to help managers make:
a) budget projections b) visual presentations
c) business decisions d) vacation schedules
5. PROLOG is an AI programming language which solves problems with a form of
symbolic logic known as predicate calculus. It was developed in 1972 at the University of
Marseilles by a team of specialists. Can you name the person who headed this team?
a) Alain Colmerauer b) Nicklaus Wirth
c) Seymour Papert d) John McCarthy
6. The number of moveable joints in the base, the arm, and the end effectors of therobot
determines
a) degrees of freedom b) payload capacity c) operational limits d) flexibility
7.Which of the following places would be LEAST likely to include operational robots?
a) warehouse b) factor c) hospitals d) private homes
8.For a robot unit to be considered a functional industrial robot, typically, howmany
degrees of freedom would the robot have?
a) three b) four c) six d) eight
Which of the basic parts of a robot unit would include the computer circuitry thatcould be
programmed to determine what the robot would do?
a) sensor b) controller c) arm d) end effector
63

BIBLIOGRAPHY
https://www.techopedia.com/definition/32836/robotics
https://www.futurelearn.com/info/courses/begin-robotics/0/steps/2840
https://www.techtarget.com/searchenterpriseai/definition/AI-Artificial-Intelligence
64

UNIT 5
ROBOTICS

GLOSSARY

WORD CONCEPT
ACCELEROMETER A device for measuring acceleration or force. These are related by
Newton’s second law: force = mass * acceleration
ACCURACY he precision with which a computed or calculated robot position can be
attained.
ACTUATOR a motor that reads programming signals and translates them into
mechanical movement.
ANDROID a humanoid robot designed to resemble an adult human male. The ‘andro’
prefix is in reference to the assigned masculine gender of the machine.
CONTROLLER SYSTEM a computer of some type that stores data, executes programs, and directs
the operations of the robot.
CYBORG shorthand for ‘cybernetic organism’, it is any being that possesses both
biological and artificial parts.
COBOTS robots that interface directly with humans.
END EFFECTOR An end effector is a device at the end of a robotic arm, designed to interact
with the environment, such as our patented suction picker.
CONTROLLER The main device that processes information and carries out instructions in a
robot. Also known as the processor.
CONTROL SYSTEM A method of directing the type of path a robot takes.
JOINT The location at which two or more parts of a robotic arm make contact.
Joints allow parts to move in different directions.
KINEMATICS In robotics, kinematics involves studying the mapping of coordinates in
motion.
PICK AND PLACE The process of picking up an object or part in one location and placing it in
another location
SIMULATOR A software application that creates a virtual world in which robots can be
tested.
ROBOTICS Science of designing, building and applying robots.
GRIPPER Gripper (usually with two fingers) grasping objects of different shape, mass
and material. It is actuated by either pneumatic, hydraulic or electrical
motors. It can be equipped with sensors of force or of proximity
AUTONOMOUS ROBOT Robot with ability to produce and execute its own plan and strategy of
movement.
PROLOG 1. a high-level computer programming language first devised for artificial
intelligence applications.
Active sensor 2. A sensor which instigates an action and then waits for a response –
65

such as transmitting a signal and measuring the response when it


comes back.
ACCELERATION 3. A change in velocity (that is changing speed and/or direction of
travel).
BRAIN-COMPUTER 4. A direct connection between a brain and a computer, allowing the brain to
INTERFACE command the computer or the computer to monitor the brain.
SENSOR 5. A device which is used to measure a quantity – such as the distance
to an object or the speed of a robot.
6.
*IF YOU WANT TO KNOW ABOUT THE HISTORY OF ROBOTICS VISIT https://www.g2.com/articles/history-of-robots?hsCtaTracking=314fbdf4-
ec3d-40a6-bbdb-5141a44d5781%7C0de54460-a6b2-49cf-9256-4580d2a73c0f

1. WHAT IS ROBOTICS?

Answer the following questions(Answer in your notebook)

Would you like a robot to help you in your daily life?

What would you want it to do for you?

Would you prefer your robot to look like a human or a machine?

What are some ways technology can help us in our everyday lives?
How can doctors use technology to helppeople?

Did you ever see a robot? Where did you see it? What did it do?

2. WHAT DOES ROBOTICS MEAN?

According to the concepts of Technopedia ,Robotics is the engineering and operation of


machines that can autonomously or semi-autonomously perform physical tasks on behalf of a
human. Typically robots perform tasks that are either highly repetitive or too dangerous for a
human to carry out safely. The study of Robots is called Robotics.
66

Mechanical robots use sensors, actuators and data processing to interact with the physical
world. Someone who makes their living in robotics must have a strong background in
mechanical engineering, electrical engineering and computer programming.

In recent years, the field of robotics has begun to overlap with machine learning and artificial
intelligence. To help avoid confusion, the word bot is no longer being used to describe a
physical robot. Instead, it's used to describe a software robot that does not have a mechanical
body.The field of robotics has greatly advanced with several new general technological
achievements. One is the rise of big data, which offers more opportunity to build programming
capability into robotic systems. Another is the use of new kinds of sensors and connected
devices to monitor environmental aspects like temperature, air pressure, light, motion and more.
All of this serves robotics and the generation of more complex and sophisticated robots for
many uses, including manufacturing, health and safety, and human assistance.

Robotics is an interdisciplinary branch of engineering and science that includes mechanical


engineering, electronic engineering, information engineering, computer science, and others.
Robotics is the engineering and operation of machines that can autonomously or semi-
autonomously perform physical tasks on behalf of a human. Typically robots perform tasks that
are either highly repetitive or too dangerous for a human to carry out safely.

Mechanical robots use sensors, actuators and data processing to interact with the physical
world. Someone who makes their living in robotics must have a strong background in
mechanical engineering, electrical engineering and computer programming.

The field of robotics has greatly advanced with several new general technological
achievements. One is the rise of big data, which offers more opportunity to build programming
capability into robotic systems. Another is the use of new kinds of sensors and connected
devices to monitor environmental aspects like temperature, air pressure, light, motion and more.
All of this serves robotics and the generation of more complex and sophisticated robots for
many uses, including manufacturing, health and safety, and human assistance.

3. WHAT IS THE FUNCTION OF ROBOTICS?


Robotics is an interdisciplinary research area at the interface of computer science and
67

engineering. Robotics involves design, construction, operation, and use of robots. The goal
of robotics is to design intelligent machines that can help and assist humans in their day-to-day
lives and keep everyone safe.

4. WHAT IS A ROBOT IN ROBOTICS?


robot is a machine built to carry out a complex task (or set of tasks) by physically moving and
interacting with the world around it. Robots can usually be programmed by a user.

The word “Robot” come from the Czech word “robota” meaning “slavery or forced labour”. It was
first used by Czech writer, Karel Čapek, in his 1921 science-fiction play R.U.R. (Rossum’s
Universal Robots).

Robot is automatically operated machine that replaces human effort, though it may not
resemble human beings in appearance or perform functions in a humanlike manner. By
extension, robotics is the engineering discipline dealing with the design, construction, and
operation of robots.
Robots are programmable machines which are usually able to carry out a series of actions
autonomously, or semi-autonomously.
In my opinion, there are three important factors which constitute a robot:

1. Robots interact with the physical world via sensors and actuators.
2. Robots are programable.
3. Robots are usually autonomous or semi-autonomous.

5. ASPECTS OF ROBOTS
The robots have mechanical construction form, or shape designed to accomplish a
particular task
. They have electrical components which power and control the machinery.
They contain some level of computer program that determines what, when and
how a robot does something
68

5.1. Legged Locomotion


This type of locomotion consumes more power while demonstrating walk, jump, trot,
hop, climbup or down, etc.
It requires more number of motors to accomplish a movement. It is suited for rough as
well as smooth terrain where irregular or too smooth surface makes it consume more
power for a wheeled locomotion. It is little difficult to implement because of stability issues.
It comes with the variety of one, two, four, and six legs. If a robot has multiple legs
then leg coordination is necessary for locomotion.
The total number of possible gaits (a periodic sequence of lift and release events for each
of the total legs) a robot can travel depends up on the number of its legs .If a robot has k
legs, then the number of possible events N = (2k-1)!.

Hence there are six possible different


events:1. Lifting the Left leg
2. Releasing the Left leg
3. Lifting the Right leg
4. Releasing the Right leg
5. Lifting both the legs together
Releasing both the legs together.
In case of k=6 legs, there are 3 9916800 possible events. Hence the complexity of robots
isdirectly proportional to the number of legs Wheeled Locomotion
It requires fewer number of motors to accomplish a movement.
It is little easy to implement as there are less stability issues in case of a greater
number of wheels. It is power efficient as compared to legged locomotion.
Standard wheel: Rotates around the wheel axle and around the contact
Castor wheel: Rotates around the wheel axe and the offset steering joint
Swedish 45° and Swedish 90° wheels: Omni wheel, rotates around the contact
point, aroundthe wheel axle, and around the rollers.

• Ball or spherical wheel: Omni directional wheel, technically difficult to implement.

A. COMPONENTS OF A ROBOT

Robots are constructed with the following:


Power Supply: The robots are powered by batteries, solar power, hydraulic, or
pneumaticpower sources.
69

Actuators They convert energy into movement.


Electric motors (AC/DC): They are required for rotational movement.
Pneumatic Air Muscles: They contract almost 40% when air is sucked in them.
Muscle Wires: They contract by 5% when electric current is passed through them.
Piezo Motors and Ultrasonic Motors: Best for industrial robots
. Sensors: They provide knowledge of real time information on the task
Environment. Robots are equipped with vision sensors to be to compute the depth in
the environment.
A tactile sensor imitates the mechanical properties of touch receptors of human fingertips.
6.2. Computer Vision:
This is a technology of AI with which the robots can see. The computervision plays vital
role in the domains of safety, security, health, access, and entertainment.
Computer vision automatically extracts s, analyzes, and comprehends useful information
from a single image or an array of images. This process involves development of
algorithms to accomplish automatic visual comprehension.

6.3. Hardware of Computer Vision System


This involves:
Power supply
Image acquisition device such as camera
a processor
a software
A display device for monitoring the system accessories such as camera stands,
cables, and connector

7. PARTS OF A ROBOT

Robots can be made in surprisingly many ways, using all manner of materials. But most
robots share a great deal in common. Below you will find descriptions of the most common
70

elements that are used in constructing robots.


7.1. SENSORS
Robot Vision Sensors are what allow a robot to gather information about its environment.
This information can be used to guide the robot's behavior. Some sensors are relatively
familiar pieces of equipment. Cameras allow a robot to construct a visual representation of
its environment. This allows the robot to judge attributes of the environment that can only
be determined by vision, such as shape and color, as well as aid in determining other
important qualities, such as the size and distance of objects.

Microphones allow robots to detect sounds. Sensors such as buttons embedded in


bumpers can allow the robot to determine when it has collided with an object or a wall.
Some robots come equipped with thermometers and barometers to sense temperature and
pressure.
Other types of sensors are more complex, and give a robot LIDAR equipped mobile robot
more interesting capabilities. Robots equipped with LIght Detection And Ranging (LIDAR)
sensors use lasers to construct three dimensional maps of their surroundings as they
navigate through the world. Supersonic sensors are a cheaper way to accomplish a similar
goal only using high frequency sound instead of lasers. Finally, some robots are equipped
with specialized sensors such as accelerometers and magnetometers that allow the robot
to sense its movement with respect to the Earth's gravity and magnetic field.
7.2. EFFECTORS

The effectors are the parts of the robot that actually do the work. Effectors can be any sort
of tool that you can mount on your robot and control with the robot's computer. Most of the
time, the effectors are specific to the tasks that you want your robot to do. For example, in
addition to some of the very common effectors listed below, the Mars rovers have tools like
hammers, shovels, and a mass spectrometer to use in analyzing the soil of Mars.
Obviously, a mail- delivering robot would not need any of those.
Get the Flash Player to see this video.

End-Effectors are the tools at the end of robotic arms and other robotic appendixes that
directly interact with objects in the world. A "gripper" at the end of a robotic arm is a
common end- effector. Others include spikes, lights, hammers, and screw-drivers. Medical
robots have their own specialized effectors, such as tools for cutting in surgery and suturing
incisions.
71

Motors can be used for many of the moving parts Servo motor of a robot, from joints on
robotic limbs to wheels on robotic vehicles, to the flaps and propellers on a robotic airplane.
Pneumatics and hydraulics are another way of moving parts of the robot, particularly
where the robot needsa lot of strength to perform a particular task.

Speakers can allow certain robots to talk to us or generate other sounds. Speech is, after
all, a behavior intended to modify the environment, usually by conveying some sort of
information to the people around us.
8. CONTROL SYSTEMS (THE "BRAINS")

A robot's "control system" is that part of the robot that determines the robot's behavior.
A. Pre-Programmed Robots

The very simplest pre-programmed robot merely repeats the same operations over and
over. Such a robot is either insensitive to changes in its environment or it can detect on
very limited information about very limited parts of the environment. Such a robot will
require little in the way of "controls" but it will perform properly only if the environment
behaves in accord with the robot's pre-programmed actions.

9. TYPES OF ROBOTS

Mechanical bots come in all shapes and sizes to efficiently carry out the task for which they are
designed. All robots vary in design, functionality and degree of autonomy. From the 0.2
millimeter-long “RoboBee” to the 200 meter-long .
9.1. Pre-Programmed Robots
Pre-programmed robots operate in a controlled environment where they do simple, monotonous
tasks. An example of a pre-programmed robot would be a mechanical arm on an automotive
assembly line. The arm serves one function — to weld a door on, to insert a certain part into the
engine, etc. — and its job is to perform that task longer, faster and more efficiently than a
human.

9.2. Humanoid Robots

Humanoid robots are robots that look like and/or mimic human behavior. These robots usually
perform human-like activities (like running, jumping and carrying objects), and are sometimes
72

designed to look like us, even having human faces and expressions. Two of the most prominent
examples of humanoid robots are Hanson Robotics’ Sophia
9.3. Autonomous Robots

Autonomous robots operate independently of human operators. These robots are usually
designed to carry out tasks in open environments that do not require human supervision. They
are quite unique because they use sensors to perceive the world around them, and then employ
decision-making structures (usually a computer) to take the optimal next step based on their
data and mission. An example of an autonomous robot would be the Roomba vacuum cleaner,
which uses sensors to roam freely throughout a home.

10. ARE ROBOTICS AND ARTIFICIAL INTELLIGENCE THE SAME THING?


The first thing to clarify is that robotics and artificial intelligence are not the same thing at
all. In fact, the two fields are almost entirely separate.
A Venn diagram of the two would look like this:

People sometimes confuse the two because of the overlap between them: Artificially
Intelligent Robots.
1.To understand how these three terms, relate to each other, let's look at each of them
individually. The term robotics was introduced by writer Isaac Asimov. In his science fiction
book, I, Robot, published in 1950, he presented three laws of robotics:
2. A robot may not injure a human being, or, through inaction, allow a human being to
come to harm.

3. A robot must obey the orders given it by human beings except where such orders
would conflict with the First Law.

4. A robot must protect its own existence as long as such protection does not conflict
73

with theFirst or Second Law.

5. ROBOTICS ENGINEERING

Robotics is an interdisciplinary branch of engineering and science that includes mechanical


engineering, electrical engineering, computer science, and others. Robotics deals with the
design, construction, operation, and use of robots as well as computer system for their control
and information process.

It is the interdisciplinary branch of engineering and science that includes mechanical


engineering, electrical engineering, computer science, and others.

It deals with the design, construction, operation, and use of robots, as well as computer
systemsfor their control, sensory feedback, and information processing.

Robots used in various applications. There are many jobs which humans would rather leave
to robots. The job may be boring, such as domestic cleaning, or dangerous, such as exploring
inside a volcano.

Today's robots assist in high precision surgeries such as brain and heart surgery. They are
also used to test quality control in pharmaceuticals.

11.IS ROBOTICS PART OF AI? IS AI PART OF ROBOTICS? WHAT IS THE DIFFERENCE


BETWEEN THE TWO TERMS
Robotics and artificial intelligence serve very different purposes. However, people often get them
mixed up. A lot of people wonder if robotics is a subset of artificial intelligence or if they are the
same thing.
The first thing to clarify is that robotics and artificial intelligence are not the same thing at all. In
fact, the two fields are almost entirely separate.

Robots are aimed at manipulating the objects by perceiving, picking, moving, modifying the
physical properties of object, destroying it, or to have an effect thereby freeing manpower from
doing repetitive functions without getting bored, distracted, or exhausted.
74

WORK THE FOLLOWING ACTIVITIES


TASK 1: ANSWER BRIEFLY THE FOLLOWING QUESTIONS.

1. What do you understand by the term, robotics?


______________________________________________________________________
______________________________________________________________________
2. What is Robotic Automation?
______________________________________________________________________
______________________________________________________________________
3. What are the benefits of Robotic Process Automation?
______________________________________________________________________
_____________________________________________________________________
4. What are the components of a robot?
______________________________________________________________________
______________________________________________________________________
5. What are the laws of robotics? (Mention and explain)
______________________________________________________________________
______________________________________________________________________
6. List the name of the areas where robotics can be applied?
______________________________________________________________________
______________________________________________________________________
7. Why do we use robots in the industry?
______________________________________________________________________
______________________________________________________________________
8. What is AI? Why do we implement AI in the robots?
______________________________________________________________________
______________________________________________________________________
9. What are the various types of sensors used in robotics?
______________________________________________________________________
______________________________________________________________________
10. What is a robot Locomotion?
_______________________________________________________________________
_______________________________________________________________________
11. What is an Autonomous robot?
75

______________________________________________________________________
______________________________________________________________________
12. What is, “human-robot interaction”
_______________________________________________________________________
_______________________________________________________________________
13. How to send information from the robot sensors to the robot controllers?
______________________________________________________________________
______________________________________________________________________
14. What is the Pneumatic System in robotics?

Read the following passage carefully. Then complete the exercises that follow.
76

Read each question carefully. Circle the letter or the number of the correct answer.

1.ASIMO traveled to Edinburgh, Scotland, for the annual Edinburgh International ScienceFestival.
The festival takes place in February every year.
Annual means
a. scientific. b.international. c.every year.
2.ASIMO is designed to run, climb stairs, and kick a soccer ball. It can even conduct an
orchestra.
a. Designed means b. Conduct means
1. made. 1. play.
2. performed. 2. lead.
3. climbed. 3. perform.

3.Everyone at the concert was amazed not only by Yo Yo Ma, but also by ASIMO.
c. Amazed means
1. confused.
2. surprised.
3. interested.
d. Not only . . . but also means
1. however.
2. except.
3. and.
e. Why were the people amazed by ASIMO?
1. It’s a good conductor.
2. It can play the cello.
3. It’s a robot.

4.Scientists developed robots more than 60 years ago. For many years, robots have workedin
factories. They do uninteresting jobs such as packaging food or assembling cars.
a. Developed means
1. learned about.
2. thought about.
3. made.
77

b. Something uninteresting is
1. dangerous.
2. boring.
3. difficult.
c. Packaging food is
1. making food for a company.
2. carrying food to a truck.
3. putting food into boxes.
d. Assembling means
1. putting together.
2. driving.
3. checking.

TOPICS FOR DISCUSSION AND WRITING


1. Robots can do many different jobs. What jobs do you think robots cannot do? Why not? Discuss
your ideas with your classmates.

2. Robots do many dangerous and boring jobs. Robots also do interesting jobs. For example,
ASIMO can conduct an orchestra. Will people be happy if robots do interesting jobs for them? Why or
why not?

3. What are some of the advantages of having robots work in factories and other places, uch as
hospitals and homes for senior citizens? What are some of the disadvantages?

4. Write in your journal. Imagine that you have a robot teacher. Write a letter to a friend, and describe
your robot teacher. Tell your friend about your class. Do you enjoy your robot teacher? Why or why not?

BIBLIOGRAPHY
https://robotical.io/blog/robot-terminology/
https://www.devopsschool.com/blog/what-is-robotics-and-what-are-the-advantages-and-
disadvantages-in-detail/
https://www.techopedia.com/definition/32836/robotics
https://robotical.io/blog/robot-terminology/
78

UNIT 6

FUTURE TRENDS OF INFORMATION TECHNOLOGY (IT)

Information systems have evolved at a rapid pace ever since their introduction in the
1950s. The Internet has made the entire world accessible to us, allowing us to
communicate and collaborate with each other like never before.

Technology today is evolving at a rapid pace, enabling faster change and progress,
causing an acceleration of the rate of change. However, it is not only technology
trends and emerging technologies that are evolving, a lot more has changed this
year due to the outbreak of COVID-19 making IT professionals realize that their role
will not stay the same in the contactless world tomorrow. And an IT professional in
2021-22 will constantly be learning, unlearning, and relearning (out of necessity if not
desire).

Information Technology is the concept involving the development, maintenance,


and use of computer systems, software, and networks for the processing and
distribution of data. Often in the context of a business or other enterprise. IT is
considered to be a subset of information and communications technology (ICT).

In this Unit we present the 9 emerging technology trends that we should watch for
and try at in 2022, and possibly secure one of the jobs that will be created by these
new technology trends, that includes:
79

1. Artificial Intelligence and Machine Learning

2. Robotic Process Automation (RPA)

3. Edge Computing

4. Quantum Computing

5. Virtual Reality and Augmented Reality

6. Blockchain

7. Internet of Things

8. 5G

9. Cybersecurity

1. ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING

1.1. What Is Artificial Intelligence?

Artificial Intelligence is a method of making a computer, a computer-controlled robot, or a


software think intelligently like the human mind. AI is accomplished by studying the patterns of
the human brain and by analyzing the cognitive process. The outcome of these studies
develops intelligent software and systems.
1.2. How does AI work?
AI systems work by merging large with intelligent, iterative processing algorithms. This
combination allows AI to learn from patterns and features in the analyzed data. Each time an
Artificial Intelligence system performs a round of data processing, it tests and measures its
performance and uses the results to develop additional expertise.

1.3. Ways of implementing AI?


1.3.1. MACHINE LEARNING

Machine Learning is an application of Artificial Intelligence that enables systems to learn from
vast volumes of data and solve specific problems. It uses computer algorithms that improve
their efficiency automatically through experience.
80

Taken from: https://www.simplilearn.com/tutorials/machine-learning-tutorial/types-of-machine-learning

Machine learning is a core sub-area of Artificial Intelligence (AI). ML applications learn from
experience (or to be accurate, data) like humans do without direct programming. When
exposed to new data, these applications learn, grow, change, and develop by themselves. In
other words, machine learning involves computers finding insightful information without being
told where to look. Instead, they do this by leveraging algorithms that learn from data in an
iterative process.

As you input more data into a machine, this helps the algorithms teach the computer, thus
improving the delivered results. When you ask Alexa to play your favorite music station on
Amazon Echo, she will go to the station you played most often. You can further improve and
refine your listening experience by telling Alexa to skip songs, adjust the volume, and many
more possible commands.

1.3.2. TYPES OF MACHINE LEARNING

1. Supervised learning is a type of machine learning that uses labeled data to train
machine learning models. In labeled data, the output is already known. The model just
81

needs to map the inputs to the respective outputs. An example of supervised learning is to
train a system that identifies the image of an animal.

2. Unsupervised learning is a type of machine learning that uses unlabeled data to train
machines. Unlabeled data doesn’t have a fixed output variable. The model learns from
the data, discovers the patterns and features in the data, and returns the output. An
example of an unsupervised learning technique that uses the images of vehicles to
classify if it’s a bus or a truck.

3. Reinforcement Learning trains a machine to take suitable actions and maximize its
rewards in a particular situation. It uses an agent and an environment to produce
actions and rewards. The agent has a start and an end state. But, there might be
different paths for reaching the end state, like a maze. In this learning technique, there
is no predefined target variable. An example of reinforcement learning is to train a
machine that can identify the shape of an object, given a list of different objects. In the
example shown, the model tries to predict the shape of the object, which is a square in
this case.

2. ROBOTIC PROCESS OF AUTOMATIZATION /RPA

2.1. WHAT IS RPA?

Robotic Process Automation is the use of software with Artificial Intelligence (AI)
and machine learning (ML) capabilities to handle high-volume, repeatable tasks that
previously required humans to perform. Some of these tasks include:
82

• Addressing queries

• Making calculations

• Maintaining records

• Making transactions

Traditional automation involves programming application programming interfaces (APIs) and


integration tools to integrate different systems.

2.2. RPA Characteristics

• Rich analytical suite - RPA monitors and manages automated functions from a central
console. This console can be accessed from anywhere and offers basic metrics on robots,
servers, workflows, and more.

• Simple creation of bots - RPA tools enables the quick creation of bots by capturing
mouse clicks and keystrokes with built-in screen recorder components.

• Scriptless automation - RPA tools are code-free and can automate any application in any
department. Users with less programming skills can create bots through an intuitive GUI.

• Security - RPA tools enable the configuration and customization of encryption capabilities to
secure certain data types to defend against the interruption of network communication.

• Hosting and deployment - RPA systems can automatically deploy bots in groups of
hundreds. Hence, RPA bots can be installed on desktops and deployed on servers to access
data for repetitive tasks.

• Debugging - Some RPA tools need to stop running to rectify the errors while other tools
allow dynamic interaction while debugging. This is one of the most powerful features of RPA.

2.3. What RPA is Not?

When you hear the term automation, you might think of a robot doing its job without any human
intervention. And yes, you’re partially right. However, you could have a few misconceptions,
such as:

• RPA is not a humanoid robot and doesn’t exist physically

• RPA bots cannot entirely replace humans

• RPA bots do not possess logical thinking or decision-making skills, which is why they cannot
replicate human cognitive functions
83

3. EDGE COMPUTING

Edge Computing has transformed how data from multiple devices is handled,
processed, and delivered across the world. It is a distributed computing framework. It
ensures the proximity of enterprise applications to data sources

Edge computing is the computational processing of sensor data away from the
centralized nodes and close to the logical edge of the network, toward individual
sources of data. It may be referred to as a distributed IT network architecture that
enables mobile computing for data produced locally.

The process of edge computing differs from cloud computing because it takes time,
sometimes up to 2 seconds to relay the information to the centralized data center,
delaying the decision-making process. The signal latency can lead to the organization
incurring losses, hence organizations prefer edge computing to cloud computing.

Cloud Computing Vs Edge Computing


• Centralized servers stored in faraway • Highly distributed and global computing
large-scale data centers. infrastructure, closer to users.

• Costly and intensive operational activities • Automatized scalability, with zero-touch


for the company. provisioning.

• Connectivity, data migration, bandwidth, • Less bandwidth requirement and lower


and latency features are pretty expensive. latency, improved performance and
reduced operational costs

The main difference between cloud and edge containers is the location. Edge containers are
located at the edge of a network, closer to the data source, while cloud containers
operate in a data center. Organizations that have already implemented containerized cloud
solutions can easily deploy them at the edge.

it’s important to understand that cloud and edge computing are different, non-
interchangeable technologies that cannot replace one another. Edge computing is used
84

to process time-sensitive data, while cloud computing is used to process data that is
not time-driven.

cloud computing has become mainstream, with major players AWS (Amazon Web
Services), Microsoft Azure and Google Cloud Platform dominating the market. The
adoption of cloud computing is still growing, as more and more businesses migrate to a
cloud solution.

4. QUANTUM COMPUTING

Quantum computers are incredibly powerful machines that take a new approach to processing
information.
Quantum computing is an area of computer science that uses the principles of quantum
theory. Quantum theory explains the behavior of energy and material on the atomic and
subatomic levels.

Quantum computing uses subatomic particles, such as electrons or photons. Quantum bits, or
qubits, allow these particles to exist in more than one state (i.e., 1 and 0) at the same time.

• Quantum computing uses phenomena in quantum physics to create new ways of


computing.
• Quantum computing involves qubits.

Quantum theory explains the nature and behavior of energy and matter on
the quantum (atomic and subatomic) level. Quantum computing uses a combination of bits to
perform specific computational tasks. All at a much higher efficiency than their classical
counterparts. Development of quantum computers mark a leap forward in computing
capability, with massive performance gains for specific use cases. For example quantum
85

computing excels at like simulations.

Quantum computing has the capability to sift through huge numbers of possibilities and
extract potential solutions to complex problems and challenges. Where classical computers
store information as bits with either 0s or 1s, quantum computers use qubits. Qubits carry
information in a

Quantum computers are different from digital electronic computers based on transistors.
Quantum computation uses quantum bits called qubits.
Compared to traditional computing done by a classical computer, a quantum computer should
be able to store much more information and operate with more efficient algorithms. This
translates to solving extremely complex tasks faster.

4.1. THE ESSENTIAL ELEMENTS OF QUANTUM THEORY:

• Energy, like matter, consists of discrete units; as opposed to a continuous wave.

• Elementary particles of energy and matter, depending on the conditions, may behave like
particles or waves.

• The movement of elementary particles is inherently random, and, thus, unpredictable.

• The simultaneous measurement of two complementary values -- such as the position and
momentum of a particle -- is flawed. The more precisely one value is measured, the more
flawed the measurement of the other value will be.

USES AND BENEFITS OF QUANTUM COMPUTING

Quantum computers could be used to improve the secure sharing of information. Or to improve
radars and their ability to detect missiles and aircraft. Another area where quantum computing
is expected to help is the environment and keeping water clean with chemical sensors.

These are some potential benefits of quantum computing:

• Financial institutions may be able to use quantum computing to design more effective
and efficient investment portfolios for retail and institutional clients. They could focus on
creating better trading simulators and improve fraud detection.
86

• The healthcare industry could use quantum computing to develop new drugs and
genetically-targeted medical care. It could also power more advanced DNA research.
• For stronger online security, quantum computing can help design better data encryption
and ways to use light signals to detect intruders in the system.
• Quantum computing can be used to design more efficient, safer aircraft and traffic
planning systems.

FEATURES OF QUANTUM COMPUTING

Superposition and entanglement are two features of quantum physics on which quantum
computing is based. They empower quantum computers to handle operations at speeds
exponentially higher than conventional computers and with much less energy consumption.

Superposition
According to IBM, it's what a qubit can do rather than what it is that's remarkable. A qubit
places the quantum information that it contains into a state of superposition. This refers to a
combination of all possible configurations of the qubit. "Groups of qubits in superposition can
create complex, multidimensional computational spaces. Complex problems can be
represented in new ways in these spaces.

Entanglement
Entanglement is integral to quantum computing power. Pairs of qubits can be made to become
entangled. This means that the two qubits then exist in a single state. In such a state, changing
one qubit directly affects the other in a manner that's predictable.
87

Quantum algorithms are designed to take advantage of this relationship to solve complex
problems. While doubling the number of bits in a classical computer doubles its processing
power, adding qubits results in an exponential upswing in computing power and ability.

LIMITATIONS OF QUANTUM COMPUTING

Quantum computing offers enormous potential for developments and problem-solving in many
industries. However, currently, it has its limitations.

• Decoherence, or decay, can be caused by the slightest disturbance in the qubit


environment. This results in the collapse of computations or errors to them. As noted
above, a quantum computer must be protected from all external interference during the
computing stage.
• Error correction during the computing stage hasn't been perfected. That makes
computations potentially unreliable. Since qubits aren't digital bits of data, they can't
benefit from conventional error correction solutions used by classical computers.
• Retrieving computational results can corrupt the data. Developments such as a
particular database search algorithm that ensures that the act of measurement will
cause the quantum state to decohere into the correct answer hold promise.
• Security and quantum cryptography is not yet fully developed.
• A lack of qubits prevents quantum computers from living up to their potential for
impactful use.

QUANTUM COMPUTER VS. CLASSICAL COMPUTER

Quantum computers have a more basic structure than classical computers. They have no
memory or processor. All a quantum computer uses is a set of superconducting qubits.

Quantum computers and classical computers process information differently. A quantum


computer uses qubits to run multidimensional quantum algorithms. Their processing power
increases exponentially as qubits are added. A classical processor uses bits to operate various
programs. Their power increases linearly as more bits are added. Classical computers have
much less computing power.

BIBLIOGRAPHY

https://www.investopedia.com/terms/q/quantum-computing.asp
88

5. VIRTUAL REALITY AND AUGMENTED REALITY

The next exceptional technology trend - Virtual Reality (VR) and Augmented Reality (AR), and
Extended Reality (ER). VR immerses the user in an environment while AR enhances their
environment. Although this technology trend has primarily been used for gaming thus far, it has
also been used for training, as with Virtual Ship, a simulation software used to train U.S. Navy,
Army and Coast Guard ship captains.

In 2022, we can expect these forms of technologies being further integrated into our lives.
Usually working in tandem with some of the other emerging technologies we’ve mentioned in
this list, AR and VR have enormous potential in training, entertainment, education, marketing,
and even rehabilitation after an injury.

The three main VR categories are the following:


• Non-Immersive Virtual Reality: This category is often overlooked as VR simply because it’s
so common. Non-immersive VR technology features a computer-generated virtual environment
where the user simultaneously remains aware and controlled by their physical environment.
Video games are a prime example of non-immersive VR.
• Semi-Immersive Virtual Reality: This type of VR provides an experience partially based in a
virtual environment. This type of VR makes sense for educational and training purposes with
graphical computing and large projector systems, such as flight simulators for pilot trainees.

• Fully Immersive Virtual Reality: Right now, there are no completely immersive VR
technologies, but advances are so swift that they may be right around the corner. This type of VR
generates the most realistic simulation experience, from sight to sound to sometimes even
olfactory sensations. Car racing games are an example of immersive virtual reality that gives the
user the sensation of speed and driving skills. Developed for gaming and other entertainment
purposes, VR use in other sectors is increasing.

• What’s the Difference Between Virtual Reality and Augmented Reality?


• Virtual reality (VR) is an all-enveloping artificial and fully immersive experience that
obscures the natural world.
• Augmented reality (AR) enhances users’ real-world views with digital overlays that
incorporate artificial objects.
89

• VR creates synthetic environments through sensory stimuli. Users’ actions impact, at


least partially, what occurs in the computer-generated environment. Digital environments
reflect real places and exist apart from current physical reality.
• In AR, the real world is viewed directly or via a device such as a camera to create a
visual and adds to that vision with computer-generated inputs such as still graphics,
audio or video. AR is different from VR because it adds to the real-world experience
rather than creating a new experience from scratch.

PROS AND CONS OF VIRTUAL REALITY


PROS
Visual effects seem to be better than reality. Virtual reality technology is used in video games
and does a great job in enhancing the user experience. Users get the sensation that they are in
another world. While using certain gaming controllers and consoles, users may experience a
variety of sensory stimulation, like sound, and tactile feedback, such as touch. The use of
sounds and graphics has been increasingly incorporated into virtual reality and generates
excellent gaming experiences for users. In addition, gaming experiences can feel realistic, and
get one’s heart pumping, as is the case when flying an airplane or fighting zombies.

Virtual reality technology is very useful for people with disabilities because, disabled
people can feel that they can explore the real world without having to physically travel. Films
produced for virtual reality give the audience the possibility of seeing all the surroundings in
every scene; therefore, creating an interactive visual effect for users.
CONS

– High Cost
One of the main cons of virtual reality is that not everyone can afford it. It is very
expensive and people who cannot afford it are left out of this technological world.
– Communication through virtual reality should not replace direct communication.
Another disadvantage of virtual reality is that it cannot be used as a replacement for direct
communication between people. Additionally, this technology is susceptible to deception.
– Feeling of uselessness
Virtual reality users may feel useless as they may get the feeling that they are trying to escape
from the real world.
– Users addicted to the virtual world
90

Users can become addicted to the virtual world. This addiction can cause various health
related issues. Thus, like anything, it is important to monitor one’s activity.
– The technology is still experimental
Although virtual reality technology is used in various fields, it is still experimental and has not
been developed to its full potential.
– Training in virtual reality environments is not always realistic.

5.1. DIFFERENCE BETWEEN AR, VR AND MR

VIRTUAL REALITY (VR) AUGMENTED REALITY(AR) MIXED REALITY(MR)

Implies a complete immersion Adds digital elements to a live Experience, which combines
experience that shuts out the view often by using the camera elements of both AR and VR,
physical world. Using VR devices on a smartphone. Examples of real-world and digital objects
such as HTC Vive, Oculus Rift or augmented reality experiences interact. Mixed reality technology
Google Cardboard, users can be include Snapchat lenses and the is just now starting to take off
transported into a number of game Pokemon Go. with Microsoft’s HoloLens one of
real-world and imagined the most notable early mixed
environments such as the middle reality apparatuses.
of a squawking penguin colony
or even the back of a dragon.
91

6. BLOCKCHAIN

Blockchain technology is a digital database where information is grouped in encrypted blocks,


which are interlinked with other blocks that allow transactions to be carried out. It offers greatly
improved security and lower intermediation costs, as it allows transactions to be carried out
between users located anywhere in the world.
Blockchain is a system of recording information in a way that makes it difficult or impossible to
change, hack, or cheat the system. A blockchain is essentially a digital ledger of transactions
that is duplicated and distributed across the entire network of computer systems on the
blockchain.
Can the blockchain be hacked?
If a security flaw exists on the blockchain network where a smart contract operates, hackers
may be able to steal money from users without being detected because the fraudulent activity is
not reflected. If the security practices surrounding the exchanges are weak, hackers will have
easier access to data
6.1. ADVANTAGES AND DISADVANTAGES OF BLOCKCHAIN

6.1.1. Advantages of Blockchain


Decentralization. This is the main feature of blockchain technology, and the strong point is that
to authenticate transactions or operations no other instance is required to act as an
intermediary, reducing transaction validation times.
Network distribution. This point provides, at the same time, several benefits since, by having
this network distributed, in the first instance, no one owns the network, allowing different
users to always have multiple copies of the same information.

Low costs for users. The decentralized nature of Blockchain, allows for the validation
of person-to-person transactions quickly and securely. Eliminating the need for an intermediary
92

reduces costs for users.


6.1.2. Disadvantages of Blockchain

High implementation costs. Just as this technology represents low costs for users,
unfortunately, it also implies high implementation costs for companies, which delays its mass
adoption and implementation.
93

7. INTERNET OF THINGS

IoT: The Internet of Things. When the Internet became commonplace, we were all
connected as an Internet of people. That has been life-changing. But it’s about to change
all over again. Soon it will be our devices (and cars and phones and appliances and more)
that are connected, not us, and this shift is going to turn our world upside down—in a very
good way, according to most experts. Some predict the changes will be so extreme, IoT
will lead to the next Industrial Revolution.

it’s “the interconnection via the Internet of computing devices embedded in everyday
objects, enabling them to send and receive data.” At a consumer level, these devices can
be placed in our cars, phones, appliances, medical equipment, wristbands, livestock and
more. At an industrial level, these devices can be in machinery, shipping equipment,
vehicles, robots, warehouses and more. But where the devices are located matters less
than what they do. And what they do is “talk” to each other, sharing data and getting
feedback based on that data and all the other data that is being generated, analyzed and
acted on.

The Internet of Things (IoT) describes the network of physical objects—“things”—that are

embedded with sensors, software, and other technologies for the purpose of connecting
and exchanging data with other devices and systems over the internet. These devices

range from ordinary household objects to sophisticated industrial tools. With more than 7

billion connected IoT devices today, experts are expecting this number to grow to 10

billion by 2020 and 22 billion by 2025

Why is Internet of Things (IoT) so important?


Over the past few years, IoT has become one of the most important technologies of the 21st
century. Now that we can connect everyday objects—kitchen appliances, cars, thermostats,
94

baby monitors—to the internet via embedded devices, seamless communication is possible
between people, processes, and things.

What technologies have made IoT possible?

While the idea of IoT has been in existence for a long time, a collection of recent advances in a
number of different technologies has made it practical.

• Access to low-cost, low-power sensor technology. Affordable and reliable


sensors are making IoT technology possible for more manufacturers.
• Connectivity. A host of network protocols for the internet has made it easy to
connect sensors to the cloud and to other “things” for efficient data transfer.
• Cloud computing platforms. The increase in the availability of cloud platforms
enables both businesses and consumers to access the infrastructure they need to scale up
without actually having to manage it all.
• Machine learning and analytics. With advances in machine learning and analytics,
along with access to varied and vast amounts of data stored in the cloud, businesses can
gather insights faster and more easily. The emergence of these allied technologies
continues to push the boundaries of IoT and the data produced by IoT also feeds these
technologies.
• Conversational artificial intelligence (AI). Advances in neural networks have
brought natural-language processing (NLP) to IoT devices (such as digital personal
assistants Alexa, Cortana, and Siri) and made them appealing, affordable, and viable for
home use

What is industrial IoT?


Industrial IoT (IIoT) refers to the application of IoT technology in industrial settings, especially
with respect to instrumentation and control of sensors and devices that engage cloud
technologies.

https://www.insiderintelligence.com/insights/internet-of-things-devices-examples/
95

8. 5G

5g will become even more widespread, and we will start to see operators launching 5g
stand-alone networks, delivering even more incredible speeds and quality of service to
consumers.

5G is next generation wireless network technology that’s expected to change the way
people live and work. It will be faster and able to handle more connected devices than the
existing 4G LTE network, improvements that will enable a wave of new kinds of tech
products.
5G is the 5th generation mobile network. It is a new global wireless standard after 1G,
2G, 3G, and 4G networks. 5G enables a new kind of network that is designed to connect
virtually everyone and everything together including machines, objects, and devices.

5G wireless technology is meant to deliver higher multi -Gbps peak data speeds, ultra-
low latency, more reliability, massive network capacity, increased availability, and a
more uniform user experience to more users. Higher performance and improved
efficiency empower new user experiences and connects new industries.

8.1.Why 5G?

Companies are racing to have the fastest or largest 5G networks. And countries are ompeting to
be the first to deploy fully functional, nationwide 5G. That’s because the benefits of the new
96

technology are expected to fuel transformative new technologies, not just for consumers but also
for businesses, infrastructure and defense applications.

8.2. How fast is 5G?

5G can be significantly faster than 4G, delivering up to 20 Gigabits-per-second (Gbps) peak data
rates and 100+ Megabits-per-second (Mbps) average data rates. 5G has more capacity than 4G.
5G is designed to support a 100x increase in traffic capacity and network efficiency.

8.3. Benefits of 5G?

Much of the hype around 5G has to do with speed. But there are other perks, too. 5G will
have greater bandwidth, meaning it can handle many more connected devices than previous
networks. That means no more spotty service when you’re in a crowded area. And it will
enable even more connected devices like smart toothbrushes and self-driving cars.
8.4. How does it work?

With 5G, signals run over new radio frequencies, which requires updating radios and other
equipment on cell towers. There are three different methods for building a 5G network,
97

depending on the type of assets a wireless carrier has: low-band network (wide coverage
area but only about 20% faster than 4G), high-band network (superfast speeds but signals
don’t travel well and struggle to move through hard surfaces) and mid-band network
(balances speed and coverage).
8.5. ADVANTAGES AND DISADVANTAGES OF 5G TECHNOLOGY
8.5.1. Advantages of 5G technology
• Higher Download Speed. The 5G network will have the capacity to increase download speeds
by up to 20 times (from 200 Mbps (4G) to 10 Gbps (5G)) and decreasing latency (response time
between devices). These speeds will maximize the browsing experience by facilitating
processes that, although possible today, still present difficulties.
• Hyperconnectivity. The 5G network promises the possibility of having a hyper-interconnected
environment to reach the point of having the much desired “smart cities”. The correct
performance of these new dynamics will depend on the bandwidth of 5G and the Internet of
Things (IoT).
• Process optimization. It is also expected to revolutionize areas such as medicine (remote
operations, for example), and traffic management and autonomous vehicles, as well as its
implementation in the construction sector to optimize resources and reduce risks.

8.5.2. Disadvantages of 5G technology


• Immediate Obsolescence. The transition to the 5G network will require devices that can
support it; current 4G devices do not have this capability and will become immediately
obsolete.
• Technological exclusion. The implementation of the 5G network also implies a lack of
immediate accessibility for average pockets, combined with a delay in its implementation due to
a lack of means for its use.
• Insufficient Infrastructure. For the 5G network to function properly will require a whole
ambitious investment in infrastructure to increase bandwidth and expand coverage, and this
is not cheap. This situation will necessarily lead to delays in its implementation due to the high
costs that governments will have to cover for 5G to function properly
• Risks in security and proper data handling. All of this requires optimal data management,
and this is where the most conflictive part of the advantages versus disadvantages lies. And the
98

fact is that, in the management of all this information, both from companies and individuals and
even governments, not only issues such as Big Data techniques are involved in its study.

BIBLIOGRAPHY
https://www.techtarget.com/searchnetworking/definition/5G
https://www.verizon.com/about/our-company/5g/what-5g
https://www.gomultilink.com/blog/multilog/the-pros-cons-and-potentials-of-5g
https://whatsag.com/5g/5g-advantages_disadvantages.php
99

9. CYBERSECURITY
Cybersecurity is the protection of internet-connected systems such as hardware, software and
data from cyberthreats

Cybersecurity is a set of processes, tools and frameworks to protect networks, devices,


programs and data from cyberattacks. Cybercriminals launch such attacks to gain unauthorized
access to IT systems, interrupt business operations, modify, manipulate or steal data, engage in
corporate espionage, or extort money from victims.
9.1. Why Do We Need Cybersecurity?

Cybercrime is an increasingly serious problem, and to address it, strong cybersecurity is critical.

Individuals, governments, for-profit companies, not-for-profit organizations, and educational


institutions are all at risk of cyberattacks and data breaches. In the future, the number of attacks
will grow as digital technologies evolve, the number of devices and users increase, global
supply chains become more complex, and data becomes more critical in the digital economy.
To minimize the risk of an attack and to secure systems and data, strong cybersecurity will be
vital.
In today’s connected world, everyone benefits from advanced cyberdefense programs. At an
individual level, a cybersecurity attack can result in everything from identity theft, to extortion
attempts, to the loss of important data like family photos. Everyone relies on critical
infrastructure like power plants, hospitals, and financial service companies. Securing these and
other organizations is essential to keeping our society functioning.

Everyone also benefits from the work of cyberthreat researchers, like the team of 250 threat
researchers at Talos, who investigate new and emerging threats and cyber attack strategies.
They reveal new vulnerabilities, educate the public on the importance of cybersecurity, and
strengthen open source tools. Their work makes the Internet safer for everyone.
9.2. Difference Between Cybersecurity and Information Security

IT security is the practice of protecting IT assets, such as endpoints, databases, servers,


networks, and data from unauthorized access in order to prevent misuse or theft. It is an
overarching process that is concerned with how enterprise data is handled on a day-to-day
basis. These attacks may come from inside or outside an organization. Information security
refers to protecting the confidentiality, integrity and availability of data by preventing
unauthorized access, modification, manipulation, or destruction.
100

Cybersecurity is a “subset” of IT security. It deals with protecting assets from hacks or


cyberattacks, i.e. threats originating from or via the Internet.

Cybersecurity is the state or process of protecting and recovering computer systems, networks,
devices, and programs from any type of cyber attack. Cyber-attacks are an increasingly
sophisticated and evolving danger to your sensitive data, as attackers employ new methods
powered by social engineering and artificial intelligence (AI) to circumvent traditional data
security controls.
9.3. Advantages and Disadvantages of Cyber Security
9.3.1. Advantages:
1) Protects system against viruses, worms, spyware and other unwanted programs.
2) Protection against data from theft.
3) Protects the computer from being hacked.
4) Minimizes computer freezing and crashes.
5) Gives privacy to users
9.3.2. Disadvantages:
1) Firewalls can be difficult to configure correctly.
2) Incorrectly configured firewalls may block users from performing certain actions on the
Internet, until the firewall configured correctly.
3) Makes the system slower than before.
4) Need to keep updating the new software in order to keep security up to date.
5) Could be costly for average user.
9.4. TYPES OF CYBERSECURITY
Network Security
This type of security refers to the protection of your computer network from attacks inside and
outside of the network. It employs numerous different techniques to prevent malicious software
or other data breaches from occurring. Network security uses many different protocols to block
attacks but allows authorized user access to the secure network.
One of the most important layers to secure your network is a firewall, which acts as a protective
barrier between your network and external, untrusted network connections. A firewall can block
and allow traffic to a network based on security settings.
Since phishing attacks are the most common form of cyberattack, email security is the most
important factor in creating a secure network. Email security might consist of a program
designed to scan incoming and outgoing messages to monitor for potential phishing attacks.
101

Application Security
his is the process of protecting sensitive information at the app-level. Most of these security
measures should be implemented before the application is deployed. Application security might
involve tactics like requiring a strong password from the user.
Cloud Security
Most of our online life is stored in the cloud. To be honest, I haven’t saved anything to my
personal hard drive in quite some time. Most people use online systems such as Google Drive,
Microsoft OneDrive, and Apple iCloud for storage. It is important for these platforms to remain
secure at all times due to the massive amounts of data stored on them.
Operational Security
This term refers to the risk management process for all internal cybersecurity. This type of
management usually employs a number of risk management officers to ensure there is a
backup plan in place if a user’s data becomes compromised. Operational security includes
ensuring that employees are educated on the best practices for keeping personal and business
information secure

BBIBLIOGRAPHY
https://www.oracle.com/internet-of-things/what-is-iot/
https://www.cisco.com/c/en/us/products/security/what-is-cybersecurity.html
https://www.techtarget.com/searchsecurity/definition/cybersecurity
https://darktrace.com/blog/the-future-of-cyber-security-2022-predictions-from-darktrace
https://www.techtarget.com/searchsecurity/definition/cybersecurity
https://darktrace.com/blog/the-future-of-cyber-security-2022-predictions-from-darktrace
102

GENERAL BIBLIOGRAPHY

https://www.cisco.com/c/en/us/products/security/what-is-cybersecurity.html#~how-
cybersecurity-works
https://afteracademy.com/blog/what-is-kernel-in-operating-system-and-what-are-the-various-
types-of-kernel
https://www.mygreatlearning.com/blog/what-is-operating-system/#functions-of-operating-
systems
https://www.youtube.com/watch?v=8kujH0nlgv
https://www.techtarget.com/searchnetworking/definition/protocol
https://www.computerhope.com/jargon/n/network.htm
https://www.heavy.ai/technical-glossary/network-topology
https://www.elprocus.com/what-are-network-devices-and-their-types/
https://www.techtarget.com/searchnetworking/definition/network-topology
https://www.geeksforgeeks.org/types-of-network-topology/
https://www.youtube.com/watch?v=znIjk-7ZuqI
https://www.youtube.com/watch?v=614QGgw_FA4
https://www.youtube.com/watch?v=FhrJAi-eHwI
https://www.geeksforgeeks.org/top-10-programming-languages-to-learn-in-2022/
https://www.snhu.edu/about-us/newsroom/stem/what-is-computer-programming
https://www.computerhope.com/jargon/p/programming-language.htm#types
https://hackr.io/blog/best-programming-languages-to-learn
https://www.chakray.com/programming-languages-types-and-features/
https://www.pluralsight.com/blog/software-development/everything-you-need-to-know-about-c-
https://www.techopedia.cm/definition/32836/robotics
https://www.futurelearn.com/info/courses/begin-robotics/0/steps/2840
https://www.techtarget.com/searchenterpriseai/definition/AI-Artificial-Intelligence
https://www.techopedia.com/definition/32836/robotics
https://www.futurelearn.com/info/courses/begin-robotics/0/steps/2840
https://www.techtarget.com/searchenterpriseai/definition/AI-Artificial-Intelligence
https://www.techtarget.com/searchnetworking/definition/5G
https://www.verizon.com/about/our-company/5g/what-5g
https://www.gomultilink.com/blog/multilog/the-pros-cons-and-potentials-of-5g
https://whatsag.com/5g/5g-advantages_disadvantages.php

También podría gustarte