Text Iii Ingles 2022
Text Iii Ingles 2022
Text Iii Ingles 2022
E-mail: [email protected]
GESTION 2022
Cochabamba - Bolivia
UNVERSIDAD MAYOR DE SAN SIMON FACULTAD DE CIENCIAS Y
TECNOLOGIA INFORMATICA _ SISTEMAS
TECNOLOGÍA
En el área de la Ingeniería informática se debe tomar en cuenta que la mayor parte de bibliografía
actualizada y confiable está en inglés. Por otra parte, se debe tener en cuenta que la mayoría de
los lenguajes de programación y material relacionados con tecnología de punta están en inglés,
por lo que se hace más necesario su comprensión, uso y la familiarización con los términos en el
idioma extranjero para posibilitar una mejor comprensión de textos y material relacionado.
UNVERSIDAD MAYOR DE SAN SIMON FACULTAD DE CIENCIAS Y
TECNOLOGIA INFORMATICA _ SISTEMAS
Hoy en día existen blogs de información tecnológica en español pero también hay mucho
por trabajar y explorar la diversidad de material existente pero no todos responden a las
necesidades y requerimientos como carrera de informática –sistemas.
Para concluir debemos mencionar que la materia de inglés III influye positivamente en la
formación del ingeniero del área de Ingeniería Informática y Sistemas ya que es una
herramienta necesaria que le permite avanzar y desarrollar su trabajo de manera más
eficiente, satisfaciendo las demandas del entorno social y laboral del mundo globalizado en
el que probablemente se presente la oportunidad de trabajar en convenios o cualquier otro
tipo de acuerdos con profesionales de otros países de habla inglesa o acceder a becas de
capacitación.
III. PROPÓSITOS
Integrar los objetivos específicos de la materia con los generales de la carrera a fin
de lograr un dominio integral de la lengua inglesa.
Desarrollar estrategias de comprensión lectora para que los futuros profesionales
puedan abordar textos de su área de especialidad en forma autónoma.
CONTENIDOS PROCEDIMENTALES
CONTENIDOS ACTITUDINALES
PLAN ANALÍTICO
DURACIÓN: 1.5 semanas
2. NETWORK PROTOCOL
2.1. Definition of Networks
2.2. Network Devices
2.3. Modem
2.3.1. Types of Modem
2.4. Network Topologies
2.4.1. Bus Topology
2.4.1.1. Advantages of Bus Topology
2.4.1.2. Disadvantages of Bus Topology
2.5. Ring Topology
2.5.1. Advantages of Ring Topology
2.5.2. Disadvantages of Ring Topology
2.6. Star Topology
2.6.1. Advantages of Star Topology
2.6.2. Disadvantages of Star Topology
2.7. Tree Topology
2.7.1. Advantages of Tree Topology
2.7.2. Disadvantages of Tree Topology
2.8. Types of Networks
2.8.1. PAN = personal area network
2.8.2. LAN- local area network
2.8.3. MAN- metropolitan area network
2.8.4. WAN- wide area network
2.8.5. WAN- wide area network
UNVERSIDAD MAYOR DE SAN SIMON FACULTAD DE CIENCIAS Y
TECNOLOGIA INFORMATICA _ SISTEMAS
3. PROGRAMMING LANGUAGE
3.1. Computer Programming Languages
3.2. Types OF Programming Languages
3.2.1. HIGH-LEVEL LANGUAGE (MOST COMMON)
3.2.2. LOW-LEVEL LANGUAGE
3.3. THE MOST COMMON PROGRAMMING LANGUAGES
3.3.1. PYTHON
3.3.2. JAVA
3.3.3. HTML = HYPERTEXT MARKUP LANGUAGE
3.3.4. PHP= acronym for "PHP: Hypertext Preprocessor"
3.3.5. C#
4. ARTIFICIAL INTELLIGENCE
4.1. What is artificial Intelligence (ai)?
4.2. How Artificial Intelligence (ai) Works?
4.3. Types of Artificial Intelligence
4.4. Applications of Artificial Intelligence
4.5. Use of Artificial Intelligence on a Practical Level
5. ROBOTICS
5.1. What is Robotics?
5.2. What is the Function of Robotics?
5.3. what is a Robot in Robotics?
5.4. Are Robotics and Artificial Intelligence the Same Thing?
5.5. Robotics Engineering
5.6. What is Difference Between Robotics and Robotic Engineering?
5.7. Is Robotics Part of AI? Is AI Part of robotics? what is the difference
between the two terms
5.8. Aspects of Robots
5.9. Components of a Robot
5.10. Parts of a Robot
5.11. Types of Robots
V. METODOLOGIA
La metodología con que se va a trabajar en este semestre será en base a exposiciones
magistrales ya que los estudiantes construirán los nuevos aprendizajes a partir del análisis y
confrontación de sus conocimientos previos con los conocimientos. nuevos
El elemento de reflexión meta cognitiva será de importancia debido a que los aprendizajes
serán evaluados de forma individual o grupal.
La evaluación será formativa ya que se evaluará durante el desarrollo de los temas donde se
podrá observar la capacidad asimilación de conceptos fundamentales en cada unidad por parte
del estudiante. La evaluación se realizará acorde al sistema de Evaluación de la Facultad de
Ciencias y Tecnología.
❖ Dos evaluaciones Parciales y una Final tienen un valor de 100 puntos.
❖ Las notas de Primer y Segundo parcial tienen un ponderado de 100 puntos. Y el estudiante
que obtenga 51 puntos o más ya habrá aprobado la materia.
❖ Si el estudiante no obtiene un puntaje de 51 puntos deberá presentarse al Examen Final.
❖ El estudiante puede aprobar la asignatura presentándose solo al Examen Final y obtener
una nota de 51.
El estudiante puede aprobar en SEGUNDA INSTANCIA obteniendo una nota de 51.
❖ El estudiante tiene la obligación de presentarse a los exámenes en las fechas y horas
establecidas.
❖ El requisito para ingresar al examen de SEGUNDA INSTANCIA es una nota ponderada en
los dos parciales mayor o igual a 26 puntos y la presentación de la Boleta de Segunda
Instancia.
❖ Los exámenes no serán reprogramados solo en caso de enfermedad donde la certificación
esté emitida por el Seguro Social Universitario (SSU).
❖ Las fechas de los exámenes serán programadas de acuerdo al Calendario Vigente.
VIII. BIBLIOGRAFÍA
Texto base:
HOEPFNER, Roberto. ENGLISH ONE -FIRST GRAMMAR TEXT
Universidad Mayor de San Simón. 2011.
TEXTO DE LECTURA http://www.gcflearnfree.org/computerbasics (with minor style changes)
• REDMAN Stuart. ENGLISH VOCABULARY IN USE. Pre-reading & intermediate. 1997
• Information technology Glennding
• https://www.tutorialspoint.com/computer_fundamentals/computer_hardware.htm
• https://chortle.ccsu.edu/java5/notes/chap01/ch01_5.html HARDWARE MAIN
MEMORY AND SECO NDARY MEMORIY
• https://www.altexsoft.com/blog/engineering/the-good-and-the-bad-of-swift-
programming-language/
• https://www.tutorialspoint.com/computer_fundamentals/computer_operating_system.ht m
• https://www.webopedia.com/TERM/O/operating_system.html
• https://www.britannica.com/technology/protocol-computer-science
• https://www.javatpoint.com/computer-network-mcq
• https://www.techopedia.com/definition/190/artificial-intelligence-ai
• https://corporate.livingactor.com/en/glossary-artificial-intelligence-vocabulary/
• https://www.telusinternational.com/articles/50-beginner-ai-terms-you-should-know
• https://spanish.yourdictionary.com/spanish-language/learning-spanish/technology-
terms-in-spanish.html
10
NIT 0
GENERAL REVIEW
INTRODUCTIONLEVEL TEST
TASK 1 : In an extra paper or at the back of this page write your biography .
Introduce yourself. Writing about yourself can be tough, because there is so much
you can say. You have a lifetime of experiences, talents, and skills to
summarize in a paragraph, or two. Whatever kind of writing you are planning on
doing, whatever your purpose, just think about it like you are introducing yourself to
a stranger. What do they need to know? Answer questions like:
Digital media is changing how young people engage in civic issues, and educators
say we need to give all students opportunities to become engaged citizens using the
tools of the digital age.
During a refresh of the ISTE Standards for Students, a new definition of digital
citizenship emerged. Feedback from educators revealed a shift in perspective that
"spoke to students' use of technology to make the world a better place," says
Carolyn Sykora, senior directorof the ISTE Standards department.
11
"Educators recognized students were doing many good deeds using digital tools like
crowdfunding to raise money or using social media to mobilize action for causes
theycared about."
Rather than just warning young people about online risks or trying to curtail their
activities, educators are realizing the importance of helping students leverage the
power of digital media to work toward social justice and equity.
For today's students, the internet removes many of the barriers that have contributed
to a decades-long decline in civic engagement. Traditional modes of social action,
such as joining community groups or volunteering, can seem time-consuming and
burdensome to students who are already overwhelmed by their busy lives.
Digital media, on the other hand, can offer a "path of least resistance" for young
people, says Harvard researcher Lindsay Pettingill.
"While online, young people can come and go from sites as they please, and they
can make the best use of their time by multitasking — talking to friends, writing
emails and checking the sports scores — all while a video they are contributing to is
uploading," she says. "They don't have to leave the house, and they don't have to put
down the things they are tethered to.
Rather than see these 'social facts' as debilitating to democracy, they should be
leveraged to get the most out of young people's desire to be active and feel a part of
something beyond themselves."
For students who have grown up holding the digital world in the palm of their hands,
the internet is the most natural place to take action. It's where they already are,
socializing withtheir peers and exploring their identities.
For many, working toward social equality and change is simply an organic extension
of their online behavior. Rather than taking place in a silo disconnected from
students' regular activities, civic participation can now become interwoven into the
fabric of their digital lives.
"The internet offers a new model of civic participation, one measured by one's level of
engagement as opposed to one's time commitment," says researcher Margaret
12
Weigel. "One can sign online petitions, vote in online elections and contribute $5 to a
cause of choice, all from a computer screen."
Students today are empowered with a whole new box of tools with which to act.
Online spaces can amplify students' voices while breaking down barriers to civic
participation. Social media serves as a potent means for coordinating and mobilizing
people who are geographically dispersed. But will students capitalize on these
opportunities?
For many, this participation comes in the form of posting an impassioned plea on
social media to inform or inspire peers to action.
But there's a big difference between posting something on Instagram and following a
project through to its end. When posts go viral, events can quickly spiral out of
control,
leaving young instigators reeling from the impact of their digital participation — even
when the outcome is overwhelmingly positive. Today's digital citizens need to be
prepared forthe possibility of massive success.
That's why parents, educators and leaders need to support students in putting digital
citizenship into action while also helping them understand:
In one study, nearly half of the students surveyed failed to include social media as
part of a strategy to effect change. Why? Possibly because they still haven't grasped
13
how digital tools can expand the scale and scope of their actions, says researcher
Amelia Peterson. Students need to consider scale when engaging online, asking
questions such as, "How big could I go? How big do I want to go?"
The odds of a social media post going viral are low, but it's always a possibility.
Students can prepare for this contingency by thinking beyond a project's
immediate goal and considering the what ifs. For example, "Who can I turn to for
help if this gets bigger than I expected?"
The nature of civic engagement is changing, says researcher Amelia Johns. Today's
students are "the standard bearers of what the digital world is going to look like in the
future, and, therefore, the shapers of what citizenship online will entail."
3. safe a. in dange
b. protected from danger
UNIT 1
WHAT IS AN OPERATING SYSTEM?
GLOSSARY
WORD CONCEPT
Compression
A method of packing data in order to save disk storage space or
download time Zip and mp3 are examples of two common file
compression algorithms.
Device driver
Software which converts the data from a component or peripheral
into data that an operating system can use
GUI (graphical An icon based link between a computer and its operator
user interface)
Most users prefer an icon-based GUI over a command line option.
Kernel
The fundamental part of an operating system responsible resource
management and file access The system administrator needed to
upgrade the kernel in order to provide native support for Serial ATA
drives.
An Operating System (OS) is the most important program that is first loaded on a computer
when you switch on the system. Operating System is system software. The communication
between a user and a system takes place with the help of operating systems.
Windows, Linux, and Android are examples of operating systems that enable the user to use
programs like MS Office, Notepad, and games on the computer or mobile phone. It is necessary
to have at least one operating system installed in the computer in order to run basic programs
like browsers.
There are plenty of Operating Systems available in the market which include paid and unpaid
(Open Source). Following are the examples of the few most popular Operating Systems:
17
• Windows: This is one of the most popular and commercial operating systems
developed and marketed by Microsoft. It has different versions in the market like
Windows 8, Windows 10 etc and most of them are paid.
• Linux This is a Unix based and the most loved operating system first released on
September 17, 1991 by Linus Torvalds. Today, it has 30+ variants available like Fedora,
OpenSUSE, CentOS, UBuntu etc. Most of them are available free of charges though you
can have their enterprise versions by paying a nominal license fee.
• MacOS This is again a kind of Unix operating system developed and marketed by Apple
Inc. since 2001.
• iOS This is a mobile operating system created and developed by Apple Inc. exclusively
for its mobile devices like iPhone and iPad etc.
• Android This is a mobile Operating System based on a modified version of the Linux
kernel and other open source software, designed primarily for touchscreen mobile
devices such as smartphones and tablets.
2.3. Device Management: There are various input and output devices. An OS controls
the working of these input-output devices. It receives the requests from these
devices, performs a specific task, and communicates back to the requesting process.
2.4. File Management: An operating system keeps track of information regarding the
creation, deletion, transfer, copy, and storage of files in an organized way. It also
maintains the integrity of the data stored in these files, including the file directory
structure, by protecting against unauthorized access.
2.5. Security: The operating system provides various techniques which assure the
integrity and confidentiality of user data. Following security measures are used to
protect user data:
2.6. Error Detection: From time to time, the operating system checks the system for
any external threat or malicious software activity. It also checks the hardware for
any type of damage. This process displays several alerts to the user so that the
appropriate action can be taken against any damage caused to the system.
2.7. Job Scheduling: In a multitasking OS where multiple programs run simultaneously,
the operating system determines which applications should run in which order and
how time should be allocated to each application.
3. FEATURES OF OPERATING SYSTEMS
19
• Shell
• Kernel
The kernel is the core component of an operating system which acts as an interface
between applications, and the data is processed at the hardware level.
When an OS is loaded into memory, the kernel is loaded first and remains in memory until
the OS is shut down. After that, the kernel provides and manages the computer resources
and allows other programs to run and use these resources. The kernel also sets up the
memory address space for applications, loads the files with application code into memory,
and sets up the execution stack for programs.
• Input-Output management
• Memory Management
• Process Management for application execution.
21
• Device Management
• System calls control
4.2.2 .1. Monolithic Kernel : A monolithic kernel is a single large program that
contains all operating system components. The entire kernel executes in the processor’s
privileged mode and provides full access to the system’s hardware. Monolithic kernels are
faster than microkernels because they don’t have the overhead of message passing. This
type of kernel is generally used in embedded systems and real-time operating systems.
4.2.2.3. Hybrid Kernel : A hybrid kernel is a kernel that combines the best features of
both monolithic kernels and microkernels. It contains a small microkernel that provides the
essential components for the basic functioning of the OS.
4.2.2.4. Exokernel An exokernel is a kernel that provides the bare minimum components
required for the basic functioning of the operating system. All other components are removed
from the kernel and implemented as user-space processes.
5.2. DISTRIBUTED OS
A distributed OS is a recent advancement in the field of computer technology and is utilized all
over the world that too with great pace. In a distributed OS, various computers are connected
through a single communication channel. These independent computers have their memory unit
and CPU and are known as loosely coupled systems. The system processes can be of different
sizes and can perform different functions. The major benefit of such a type of operating system
is that a user can access files that are not present on his system but in another connected
system. In addition, remote access is available to the systems connected to this network.
5.3. MULTITASKING OS
The multitasking OS is also known as the time-sharing operating system as each task is given
some time so that all the tasks work efficiently. This system provides access to a large number
of users, and each user gets the time of CPU as they get in a single system. The tasks
performed are given by a single user or by different users. The time allotted to execute one task
is called a quantum, and as soon as the time to execute one task is completed, the system
switches over to another task.
5.4. NETWORK OS
Network operating systems are the systems that run on a server and manage all the networking
functions. They allow sharing of various files, applications, printers, security, and other
networking functions over a small network of computers like LAN or any other private network.
In the network OS, all the users are aware of the configurations of every other user within the
network, which is why network operating systems are also known as tightly coupled systems.
5.5. REAL-TIME OS
Real-Time operating systems serve real-time systems. These operating systems are useful
when many events occur in a short time or within certain deadlines, such as real-time
simulations.
23
UNIT 1 PRACTICE
An operating system is a generic term for the multitasking software layer that lets you perform a wide
array of 'lower level tasks' with your computer. By low-level tasks we mean:
A computer would be fairly useless without an OS, so today almost all computers come with an OS pre-
installed. Before 1960, every computer model would normally have it's own OS custom programmed for
the specific architecture of the machine's components. Now it is common for an OS to run on many
different hardware configurations.
the heart of an OS is the kernel, which is the lowest level, or core, of the operating system. The kernel is
responsible for all the most basic tasks of an OS such as controlling the file systems and device drivers.
The only lower-level software than the kernel would be the BIOS, which isn't really a part of the operating
system. We discuss the BIOS in more detail in another unit.
The most popular OS today is Microsoft Windows, which has about 85% of the market share for PCs and
about 30% of the market share for servers. But there are different types of Windows OSs as well. Some
common ones still in use are Windows 98, Windows 2000, Windows XP, Windows Vista, and Windows
Server. Each Windows OS is optimized for different users, hardware configurations, and tasks. For
instance Windows 98 would still run on a brand new PC you might buy today, but it's unlikely Vista would
run on PC hardware originally designed to run Windows 98.
There are many more operating systems out there besides the various versions of Windows, and each
one is optimized to perform some tasks better than others. Free BSD, Solaris, Linux and Mac OS X are
some good examples of non-Windows operating systems.
Geeks often install and run more than one OS an a single computer. This is possible with dual-booting or
24
by using a virtual machine. Why? The reasons for this are varied and may include preferring one OS for
programming, and another OS for music production, gaming, or accounting work.
An OS must have at least one kind of user interface. Today there are two major kinds of user interfaces in
use, the command line interface (CLI) and the graphical user interface (GUI). Right now you are most
likely using a GUI interface, but your system probably also contains a command line interface as well.
Typically speaking, GUIs are intended for general use and CLIs are intended for use by computer
engineers and system administrators. Although some engineers only use GUIs and some diehard
geeks still use a CLI even to type an email or a letter.
Examples of popular operating systems with GUI interfaces include Windows and Mac OS
X. Unix systems have two popular GUIs as well, known as KDE and Gnome, which run on top of X-
Windows. All three of the above-mentioned operating systems also have built-in CLI interfaces as well for
power users and software engineers. The CLI in Windows is known as MS-DOS. Today there are two
major kinds of user interfaces in use, the command line interface (CLI) and the graphical user
interface (GUI).There are many CLIs for Unix and Linux operating systems, but the most popular one is
called Bash.
In recent years, more and more features are being included in the basic GUI OS install, including
notepads, sound recorders, and even web browsers and games. This is another example of the concept
of 'convergence' which we like to mention.
A great example of an up and coming OS is Ubuntu. Ubuntu is a Linux operating system which is totally
free, and ships with nearly every application you will ever need already installed. Even a professional
quality office suite is included by default. What's more, thousands of free, ready-to-use applications can
be downloaded and installed with a few clicks of the mouse. This is a revolutionary feature in an OS and
can save lots of time, not to mention hundreds or even thousands of dollars on a single PC. Not
surprisingly, Ubuntu's OS market share is growing very quickly around the world.
As an IT professional, you will probably have to learn and master several, if not all, the popular operating
systems. If you think this sort of thing is fun and interesting, then you have definitely chosen the right
career ;)
We have learned a little about operating systems in this introduction and you are ready to do more
research on your own. The operating system is the lowest software layer that a typical user will deal with
every day. That is what makes it special and worth studying in detail.
25
TRUE OR FALSE?
-----------------------------------------------------------------------------------------------------------------
2. Which layer ensures that the message is transmitted in a language that the receiving
computer can interpret?
---------------------------------------------------------------------------------------------------------------------
---------------------------------------------------------------------------------------------------------------------
---------------------------------------------------------------------------------------------------------------------
BIBLIOGRAPHY
https://afteracademy.com/blog/what-is-kernel-in-operating-system-and-what-are-the-various-types-of-kernel
https://www.mygreatlearning.com/blog/what-is-operating-system/#functions-of-operating-systems
https://www.youtube.com/watch?v=8kujH0nlgv
26
UNIT 2
NETWORK PROTOCOL
GLOSSARY
https://bjc.edc.org/bjc-r/cur/programming/summaries/vocab4.html?topic=nyc_bjc%2F4-
internet.topic
WORD CONCEPT
Channel Physical medium like cables over which information is exchanged is
called channel. Transmission channel may be analog or digital.
This data channel may be a tangible medium like copper wire cables or
broadcast medium like radio waves.
Data Transfer Rate The speed of data transferred or received over transmission channel,
measured per unit time, is called data transfer rate. The smallest unit of
measurement is bits per second (bps). 1 bps means 1 bit (0 or 1) of
data is transferred in 1 second.
• 1 Bps = 1 Byte per second = 8 bits per second
• 1 kbps = 1 kilobit per second = 1024 bits per second
• 1 Mbps = 1 Megabit per second = 1024 Kbps
• 1 Gbps = 1 Gigabit per second = 1024 Mbps
Bandwidth Data transfer rates that can be supported by a network is called its
bandwidth. It is measured in bits per second (bps). Modern day
networks provide bandwidth in Kbps, Mbps and Gbps.
A bridge It is a hardware and software combination used to connect the
same type of networks.
A backbone It is the main transmission path, handling the major data Traffic,
connecting different LANs together.
A router It is a special computer that directs communicating messages when
several networks are connected together?
A LAN is a network contained within a small area, for example a Company
department.
A gateway A gateway is an interface that enables dissimilar networks to
communicate, such as two LANs based on different topologies or
network operating systems
Computer network Two or more computers linked together to facilitate the sharing of
information
Network topology The physical layout of a network.
Network protocol A set of rules for transferring information over a network.
Ethernet protocol Used to facilitate communication within LANs
Scalability It is the ability of the internet to keep working as it grows.
A firewall It is a security system that controls the kinds of connections that can be
made between a computer network and the outside world.
Encryption It is the process of encoding data to prevent unauthorized access
Decryption It is the process of decoding data.
27
A network protocol is a set of established rules that dictate how to format, transmit and receive
data so that computer network devices -- from servers and routers to endpoints -- can
communicate, regardless of the differences in their underlying infrastructures, designs or
standards.
Without computing protocols, computers and other devices would not know how to engage with
each other. As a result, except for specialty networks built around a specific architecture, few
networks would be able to function, and the internet as we know it wouldn't exist. Virtually
all network end users rely on network protocols for connectivity.
28
A set of cooperating network protocols is called a protocol suite. The Transmission Control
Protocol/Internet Protocol (TCP/IP) suite, which is typically used in client-server models,
includes numerous protocols across layers -- such as the data, network, transport and
application layers -- working together to enable internet connectivity. These include the
following:
TCP, which uses a set of rules to exchange messages with other internet points at the
information packet level;User Datagram Protocol, or UDP, which acts as an alternative
communication protocol to TCP and is used to establish low-latency and loss-tolerating
connections between applications and the internet;
IP, uses a set of rules to send and receive messages at the level of IP addresses; and
additional network protocols, including Hypertext Transfer Protocol (HTTP) and File Transfer
Protocol (FTP), each of which has defined sets of rules to exchange and display information.
Every packet transmitted and received over a network contains binary data. Most computing
protocols will add a header at the beginning of each packet in order to store information about
the sender and the message's intended destination. Some protocols may also include a footer
at the end with additional information. Network protocols process these headers and footers as
part of the data moving among devices in order to identify messages of their own kind.
Falling into these three broad categories are thousands of network protocols that uniformly
handle an extensive variety of defined tasks, including authentication, automation, correction,
compression, error handling, file retrieval, file transfer, link aggregation, routing, semantics,
29
PAN is the acronym for Personal Area Network. PAN is the interconnection between devices
within the range of a person’s private space, typically within a range of 10 metres. If you have
transferred images or songs from your laptop to mobile or from mobile to your friend’s mobile
using Bluetooth, you have set up and used a personal area network.
A person can connect her laptop, smart phone, personal digital assistant and portable printer in
a network at home. This network could be fully Wi-Fi or a combination of wired and wireless.
LAN or Local Area Network is a wired network spread over a single site like an office, building or
manufacturing unit. LAN is set up to when team members need to share software and hardware
resources with each other but not with the outside world. Typical software resources include
official documents, user manuals, employee handbook, etc. Hardware resources that can be
easily shared over the network include printer, fax machines, modems, memory space, etc. This
decreases infrastructure costs for the organization drastically.
A LAN may be set up using wired or wireless connections. A LAN that is completely wireless is
30
MAN is the acronym for Metropolitan Area Network. It is a network spread over a city, college
campus or a small region. MAN is larger than a LAN and typically spread over several
kilometres. Objective of MAN is to share hardware and software resources, thereby decreasing
infrastructure costs. MAN can be built by connecting several LANs.
WAN or Wide Area Network is spread over a country or many countries. WAN is typically a
network of many LANs, MANs and WANs. Network is set up using wired or wireless
connections, depending on availability and reliability.
31
Network protocols must be coded to work within software -- either as part of the computer's
operating system (OS) or as an application -- or implemented within the computer's hardware.
Most modern OSes possess built-in software services that are prepared to implement some
network protocols. Other applications, such as web browsers, are designed with software
libraries that support the protocols necessary for the application to function. In addition, TCP/IP
and routing protocol support is implemented in direct hardware for enhanced performance.
Whenever a new protocol is implemented, it is added to the protocol suite. The organization of
protocol suites is considered to be monolithic since all protocols are stored in the same address
and build on top of one another.
Network protocols are what make the modern internet possible since they enable computers to
communicate across networks without users having to see or know what background operations
are occurring. Some specific examples of network protocols and their uses include the following:
• Post Office Protocol 3, or POP3, is the most recent version of a standard protocol that
is used for receiving incoming emails.
• SMTP (Simple Mail Transfer Protocol) is used to send and distribute outgoing emails.
• FTP (File Transfer Protocol) is used to transfer files from one machine to another. It
refers to a group of rules that govern how computers transfer files from one system to another
over the internet.
32
• Telnet :Teletype Network is a collection of rules used to connect one system to another
via a remote login. The local computer sends the request for connection, and the remote
computer accepts the connection.
7. NETWORK DEVICES
They are used for communication between different hardware’s used in the computer network
are known as network devices. These devices are also known as physical devices, networking
hardware, and network equipment otherwise computer networking devices. In a computer
network, each network device plays a key role based on their functionality, and also works for
different purposes at different segments.
8. NETWORK TOPOLOGY
Network topology is the schematic description of the arrangement of the physical and logical
elements of a communication network.
Network topology refers to the manner in which the links and nodes of a network are arranged
to relate to each other. Topologies are categorized as either physical network topology, which is
the physical signal transmission medium, or logical network topology, which refers to the
33
manner in which data travels through the network between devices, independent of physical
connection of the devices. Logical network topology examples include twisted pair Ethernet,
which is categorized as a logical bus topology, and token ring, which is categorized as a logical
ring topology.
Physical network topology examples include star, mesh, tree, ring, point-to-point, circular,
hybrid, and bus topology networks, each consisting of different configurations of nodes and
links. The ideal network topology depends on each business’s size, scale, goals, and budget.
There are different logical and physical network topologies from which administrators can
choose to build a secure, robust, and easily maintainable topology. The most popular
configurations include:
It is also known as backbone network topology; this configuration connects all devices to a
main cable via drop lines. the advantages of bus network topology lie in its simplicity, as there
is less cable required than in alternative topologies, which makes for easy installation
The data travels in both the directions along the bus. When the destination terminal sees the
data, it copies it to the local disk. the advantages of using bus topology are−
In ring topology each terminal is connected to exactly two nodes, giving the network a
circular shape. Data travels in only one pre-determined direction.
34
When a terminal has to send data, it transmits it to the neighboring node which transmits it to
the next one. Before further transmission data may be amplified. In this way, data raverses the
network and reaches the destination node, which removes it from the network. If the data
reaches the sender, it removes the data and resends it later.
In star topology, server is connected to each node individually. Server is also called the central
node. Any exchange of data between two nodes must take place through the server. It is the
most popular topology for information and voice networks as central node can process data
received from source node before sending it to the destination node.
Tree topology has a group of star networks connected to a linear bus backbone cable. It
incorporates features of both star and bus topologies. Tree topology is also called hierarchical
topology.
35
APPLICATION
APPLICATION
LAYER(HTTP)
LAYER(HTTP)
APPLICATION APPLICATION
LAYER (TCP) LAYER(TCP)
APPLICATION APPLICATION
LAYER (IP) LAYER (IP)
DATA LINK
DATA LINK
LAYER
MEDIA FOR DATA TRANSFER LAYER
36
TCP/IP is widely used in many communication networks other than the Internet.
• Application layer − Application layer protocols like HTTP and FTP are used.
• Network layer − Network layer connection is established using Internet Protocol (IP) at
the network layer. Every machine connected to the Internet is assigned an address
called IP address by the protocol to easily identify source and destination machines.
• Data link layer − Actual data transmission in bits occurs at the data link layer using the
destination address provided by network layer.
Every time you use the internet, you leverage network protocols. Though you may not know
how network protocols work or how frequently you encounter them, they are necessary for
using the internet or digital communications in any capacity.
In order for network protocols to work, they must be coded within software, either a part of the
computer's operating system (OS) or as an application, or implemented within the computer's
hardware. Most modern operating systems possess built-in software services that are
prepared to implement some network protocols. Other applications, such as web browsers,
are designed with software libraries that support whatever protocols are necessary for the
application to function. Furthermore, TCP/IP and routing protocol support is implemented in
direct hardware forenhanced performance.
Whenever a new protocol is implemented, it is added to the protocol suite. The organization
of protocol suites is considered to be monolithic since all protocols are stored in the same
address and build on top of one another.
37
One major vulnerability found in network protocols is that they are not designed for
security. Their lack of protection can sometimes allow malicious
attacks, such as eavesdropping and cache poisoning, to affect the system. The most
common attack on network protocols is the advertisement of false routes, causing traffic to go
through compromised hosts instead of the appropriate ones.
Network protocol analyzers have been designed and installed in response to these
vulnerabilities. Network protocol analyzers protect systems against malicious activity by
supplementing firewalls, anti-virus programs and anti-spyware software.
BIBLIOGRAPHY
https://www.techtarget.com/searchnetworking/definition/protocol
https://www.computerhope.com/jargon/n/network.htm
https://www.heavy.ai/technical-glossary/network-topology
https://www.elprocus.com/what-are-network-devices-and-their-types/
https://www.techtarget.com/searchnetworking/definition/network-topology
https://www.geeksforgeeks.org/types-of-network-topology/
PRACTICE
https://www.youtube.com/watch?v=znIjk-7ZuqI
https://www.youtube.com/watch?v=614QGgw_FA4
2. An internet is a
a) Collection of WANS b) Network of networks c) Collection of LANS
d)Collection of identical LANS and WANS
4. Network layer at source is responsible for creating a packet from data coming from
another
38
NETWORK COMMUNICATIONS
1. The application layer is the only part of а communications process that а user sees, and even then,
the user doesn't see most of the work that the application does to prepare а message for sending over
а network. The layer converts а message's data from human-readable form into bits and attaches а
header identifying the sending and receiving computers.
2. The presentation layer ensures that the message is transmitted in а language that the receiving
computer can interpret (often ASCII). This layer translates the language, if necessary, and then
compresses and perhaps encrypts the data. It adds another header specifying the language as well as
the compression and encryption schemes.
3. The session layer opens communications and has the job of keeping straight the communications
among аll nodes on the network. It sets boundaries (called bracketing) for the beginning and end of the
message, and establishes whether the messages will be sent half-duplex, with each computer taking
turns sending and receiving, or full-duplex, with both computers sending and receiving at the same
time. The details of these decisions are placed into а session header.
4. The transport layer protects the data being sent. It subdivides the data into segments, creates
checksum tests - mathematical sums based on the contents of data - that can be used later to
determine if the data was scrambled. It can also make backup copies of the data. The transport header
identifies each segment's checksum and its position in the message.
5. The network layer selects а route for the message. It forms data into packets, counts them, and
adds а header containing the sequence of packets and the address of the receiving computer.
6. The data-link layer supervises the transmission. It confirms the checksum, then addresses and
duplicates the packets. This layer keeps а сору of each packet until it receives confirmation from the
next point along the route that the packet has arrived undamaged.
39
7. The physical layer encodes the packets into medium that will carry them – such as analogue signal,
if the message is going across telephone line – and sends the packets along that medium.
8. An intermediate node calculates and verifies checksum for each packet. It may also reroute
message to avoid congestion on the network.
9. At the receiving node, the layered process sent the message on its way is reversed. The physical
layer reconverts the message into the data-link layer recalculates the checksum, confirms arrival, and
logs in the packets. The network layer recounts incoming packets for security and billing purposes. The
sport layer recalculates the checksum and reassembles the message segments. The session layer
holds the parts of the message until the message is complete and sends it to the next layer. The
presentation layer expands and decrypts the message. The application layer converts the bits into
readable characters, and directs the data to the correct application.
A. Fill in the missing words in the following sentences then put the sentences in the
correct order:
a) The checksum is recalculated by the _______________ layer which also reassembles the
message _______________.
d) The session layer then sends the message to the next _______________ .
е) The application layer converts the bits into _______________ characters, and directs the
data to the correct .... .
f) The incoming _______________ are recounted by the network layer for _______________
and billing purposes.
g) The______________ layer confirms the arrival of the packets, ____________them in, and
calculates the ______________ for each packet.
h) The parts of the message are _______________ by the _______________ layer until the
message is _______________.
TABLE A TABLE B
1.Transmission mode in which each computer takes turns
A. Bracketing
sending and receiving.
B. Half - duplex
2. Mathematical calculations based on the contents of data.
C. full-duplex
3. Set boundaries for the beginning and end of a message.
D. Checksum
4.Transmission mode in which both computers send and
receive at the same time.
40
1. Most of the work that an application does to prepare a message for sending over a network
is not seen by the user. TRUE FALSE
2. SCII is always used to transmit data. TRUE FALSE
3.The encryption layer compresses the message.TRUE FALS
4.The network layer keeps track of how many packets are in each message. TRUE FAL SE
5. The network layer keeps a copy of each packet until it arrives at the next node undamaged.
TRUE FALSE
6.Analogue signals are used on ordinary telephone lines. TRUE FALSE
7.When a message arrives at its destination, it passes through the same seven network
communications layers as when it was sent but in reverse order. TRUE FALSE
41
UNIT 3
PROGRAMMING LANGUAGE
GLOSSARY
WORD DEFINITION
Low level language this code is written to specific hardware, and will only operate on the hardware it
was written for and has almost no abstraction from the hardware; reads machine
code and assembly language
Application A program which makes the computer a useful tool
ASCII Short for American Standard Code for Information Interexchange, ASCII is a
standard that assigns letters, numbers, and other characters
HTML First developed by Tim Berners-Lee in 1990, HTML is short for Hypertext
Markup Language. HTML is used to create electronic documents (called pages)
that are displayed on the World Wide Web. Each page contains several
connections to other pages called hyperlinks.
Although many languages share similarities, each has its own syntax. Once a programmer
learns the languages rules, syntax, and structure, they write the source code in a text
editor or IDE. Then, the programmer often compiles the code into machine language that can be
understood by the computer. Scripting languages, which do not require a compiler, use
an interpreter to execute the script.
There are low-level and high-level programming languages which, although simple compared to
human languages, are more complex than machine languages.
High-level languages, on the other hand, are designed to be easy to read and understand,
allowing programmers to write source code naturally, using logical words and symbols.
Low-level languages are useful because programs written in them can be crafted to run very
fast and with a very minimal memory footprint. However, they are considered harder to utilize
becausethey require a deeper knowledge of machine language.
3. MAIN FEATURES OF PROGRAMMING LANGUAGES
According to Chakray organization, the features that a programming language must have to
stand out are the following:
• Simplicity: the language must offer clear and simple concepts that facilitate learning
and application, in a way that is simple to understand and maintain. Simplicity is a
difficult balance to strike without compromise the overall capability.
44
• Naturalness: this means that its application in the area for which it was designed must
be done naturally, providing operators, structures and syntax for operators to work
efficiently.
• Abstraction: it is the ability to define and use complicated structures or operations while
ignoring certain low-level details.
• Efficiency: Programming languages must be translated and executed efficiently so as
not to consume too much memory or require too much time.
• Structuring: the language allows programmers to write their code according to
structured programming concepts, to avoid creating errors.
• Compactness: with this characteristic, it is possible to express operations concisely,
without having to write too many details.
• Locality: refers to the code concentrating on the part of the program with which you are
working at a given time.
JavaScript is one of the world’s most popular programming languages on the web. As per the
survey, more than 97 percent of the websites use JavaScript on the client-side of the
webpage.
• It has a well-organized codebase that provides enhanced productivity and readability.
• Easy to learn and is highly in demand.
• Platform independence and greater control of the browser.
• Provide user input validation features.
• The top companies using JavaScript are Microsoft, Uber, PayPal, Google, Walmart, etc.
45
4.2. PYTHON
Python can be regarded as the future of programming languages. As per the latest
statistics, Python is the main coding language for around 80% of developers. The
presence of extensive libraries in Python facilitates artificial intelligence, data science, and
machine learning processes. Currently, Python is trending and can be regarded as the king of
programming languages.
It is one of the most lucrative languages that offers amazing features like:
4.3. JAVA
46
Java is one of the most powerful programming languages that is currently used in more
than 3 billion devices. Java is currently one of the most trending technology. It is used in
desktop applications, mobile applications, web development, Artificial intelligence, cloud
applications, and many more.
Some of the prominent features of Java are:
• Platform independence and Object-oriented programming
• Enhanced productivity, performance, and security
• It is the most secure language
WHAT IS JAVA USED FOR?
4.4. JAVASCRIPT
1. JavaScript is one of the world’s most popular programming languages on the web. It has a
well-organized codebase that provides enhanced productivity and readability. It is an object-
oriented computer programming language commonly used to create interactive effects within web
browsers.
JavaScript is the Programming Language for the Web. JavaScript can update and change
both HTML and CSS. JavaScript can calculate, manipulate and validate data.
47
4.5. C#
What is C# used for? Like other general-purpose programming languages, C# can be used
to create a number of different programs and applications: mobile apps, desktop apps,
cloud-based services, websites, enterprise software and games.
Like other general-purpose programming languages, C# can be used to create a number of
different programs and applications: mobile apps, desktop apps, cloud-based services,
websites, enterprise software and games. Lots and lots of games. While C# is remarkably
versatile, there are three areas in which it is most commonly used.
C# is :
• Simple to learn and understand.
• It is fully integrated with .NET libraries.
• The top companies working on C# are Microsoft, Stack Overflow, Accenture, and Alibaba
Travels.
4.6. KOTLIN
48
Kotlin is a general purpose, free, open source, statically typed “pragmatic” programming
language initially designed for the JVM (Java Virtual Machine) and Android that combines
object-oriented and functional programming features. It is focused on interoperability, safety,
clarity, and tooling support.
PHP can be used in a large number of applications, given that it’s an open source programming
language. PHP is a server side scripting language that is embedded in HTML. It is used to
manage dynamic content, databases, session tracking, even build entire e-commerce
sites.
PHP is one of the general-purpose scripting languages that will continue to hold its
importance in the upcoming years. It is among the first server-side language that can be
embedded with HTML to add functionality to web pages. Due to the increasing online
trend, PHP developers are in high demand. Some of the astonishing features are:
49
PRACTICE
READING COMPREHENSION PRACTICE
COMPUTER LANGUAGES
Unfortunately for us, computers can't understand spoken English or any other natural language. The only
language they can understand directly is machine code, which consists of 1s and 0s (binary code).
Machine code is too difficult to write. For this reason, we use symbolic languages to communicate
instructions to the computer. For example, assembly languages use abbreviations such as ADD, SUB,
MPY to represent instructions. The program is then translated into machine code by a piece of software
called an assembler. Machine code and assembly languages are called low-level languages because
they are closer to the hardware. They are quite complex and restricted to particular machines. To make
the programs easier to write, and to overcome the problem of intercommunication between different
types of computer, software developers designed high-level languages, which are closer to the English
language. Here are some examples:
FORTRAN was developed by IBM in 1954 and is still used for scientific and engineeringapplications.
COBOL (Common Business Oriented Language) was developed in 1959 and is mainly used forbusiness
applications.
BASIC was developed in the 1960s and was widely used in microcomputer programming because it was
easy to earn. Visual BASIC is a modern version of the old BASIC language, used to build graphical
elements such as buttons and windows in Windows programs.
50
PASCAL was created in 1971. It is used in universities to teach the fundamentals ofprogramming.
C was developed in the 1980s at AT&T. It is used to write system software, graphics and commercial
applications. C++ is a version of C which incorporates object-oriented programming the programmer
concentrates on particular things (a piece of text, a graphic or a table, etc.) and gives each object
functions which can be altered without changing the entire program. For example, to add a new graphics
format, the programmer needs to rework just the graphics object. This makes programs easier to modify.
Java was designed by Sun in 1995 to run on the Web. Java applets provide animation and interactive
features a web pages.
Programs written in high-level languages must be translated into machine code by a compiler or an
interpreter. A compiler translates the source code into object code - that is, it converts the entire
program into machine code in one go. On the other hand, an interpreter translates the source code line by
line as the program is running.
It is important not to confuse programming languages with markup languages, used to create web
documents. Markup languages use instructions, known as markup tags, to format and link text files.
Some examples include:
XML, which stands for Extensible Markup Language. While HTML uses pre-defined tags, XML enables us
to define our own tags; it is not limited by a fixed set of tags.
VoiceXML, which makes Web content accessible via voice and phone. VoiceXML is used to create voice
applications that run on the phone, whereas HTML is used to create visual applications (for example, web
pages).
<xml>
< name> Andrea Finch </name>
1. allows us to create our own tags to describe our data better. We aren't
constrainer by a pre-defined set of tags the way we are with HTML.
2. IBM developed in the l 950s. It was the first high-level language in data
processing.
3. applets are small programs that run automatically on web pages and let
you watch animated characters, play games, etc.
4. is the HTML of the voice web? Instead of using a web browser and a
keyboard, interact with a voice browser by listening to pre-recorded audio
output and sending,audio input through a telephone.
5. This language is widely used in the business community. For example, the
statement ADDVAT NET-PRICE could be used in a program.
BIBLIOGRAPHY
https://www.youtube.com/watch?v=FhrJAi-eHwI
https://www.geeksforgeeks.org/top-10-programming-languages-to-learn-in-2022/
https://www.snhu.edu/about-us/newsroom/stem/what-is-computer-programming
https://www.computerhope.com/jargon/p/programming-language.htm#types
https://hackr.io/blog/best-programming-languages-to-learn
https://www.chakray.com/programming-languages-types-and-features/
52
https://www.pluralsight.com/blog/software-development/everything-you-need-to-know-about-c-
UNIT 4
ARTIFICIAL INTELLIGENCE
GLOSSARY
WORD CONCEPT
CHATBOT / BOT It is also known as a conversational agent or virtual assistant, is a system
capable of carrying on a dialogue with users based on conversations that
have been scripted upstream. Its role is to respond with maximum relevance to
questions that are frequently asked by internet users, clients or personnel.
DATA CRUNCHING Data crunching is the automated analysis of vast amounts of data originating
from Big Data.
MACHINE LEARNING Machine learning is one of the building blocks of artificial intelligence. The
53
Artificial intelligence (AI) is an area of computer science that involves building smart machines
that are able to perform tasks which usually require human intelligence. Advances in deep
learning and machine learning have allowed AI systems to enter almost every sector in the tech
industries.
Artificial intelligence (AI) refers to the simulation of human intelligence in machines that are
programmed to think like humans and mimic their actions. The term may also be applied to any
machine that exhibits traits associated with a human mind such as learning and problem-
solving.
The ideal characteristic of artificial intelligence is its ability to rationalize and take actions that
have the best chance of achieving a specific goal. A subset of artificial intelligence is machine
learning (ML), which refers to the concept that computer programs can automatically learn from
and adapt to new data without being assisted by humans. Deep learning techniques enable
this automatic learning through the absorption of huge amounts of unstructured data such as
text, images, or video.
54
Artificial intelligence allows machines to replicate the capabilities of the human mind. From the
development of self-driving cars to the proliferation of smart assistants like Siri and Alexa, AI is
a growing part of everyday life. As a result, many tech companies across various industries are i
Artificial intelligence (AI), also known as machine intelligence, is a branch of computer science
that focuses on building and managing technology that can learn to autonomously make
decisions and carry out actions on behalf of a human being.
AI is not a single technology. It is an umbrella term that includes any type of software or
hardware component that supports machine learning, computer vision, natural language
understanding (NLU) and natural language processing (NLP).
Today’s AI uses conventional CMOS hardware and the same basic algorithmic functions that
drive traditional software. Future generations of AI are expected to inspire new types of brain-
inspired circuits and architectures that can make data-driven decisions faster and more
accurately than a human being .
AI initiatives are often talked about in terms of their belonging to one of four categories:
In general, AI systems work by ingesting large amounts of labeled training data, analyzing the
data for correlations and patterns, and using these patterns to make predictions about future
states. In this way, a chatbot that is fed examples of text chats can learn to produce lifelike
exchanges with people, or an image recognition tool can learn to identify and describe objects in
images by reviewing millions of examples.
Artificial intelligence uses machine learning to mimic human intelligence. The computer has to
learn how to respond to certain actions, so it uses algorithms and historical data to create
something called a propensity model.
55
AI can do much more than this, but those are common uses and functionality for marketing. And
while it might seem like the machines are ready to rise up and take over, humans are still
needed to do much of the work.
Mainly, we use AI to save us time — adding people to email automation and allowing AI to do
much of the work while we work on other tasks.
AI is important because it can give enterprises insights into their operations that they may not
have been aware of previously and because, in some cases, AI can perform tasks better than
humans. Particularly when it comes to repetitive, detail-oriented tasks like analyzing large
numbers of legal documents to ensure relevant fields are filled in properly, AI tools often
complete jobs quickly and with relatively few errors.
Artificial neural networks and deep learning artificial intelligence technologies are quickly
evolving, primarily because AI processes large amounts of data much faster and makes
predictions more accurately than humanly possible.
While the huge volume of data being created on a daily basis would bury a human researcher,
AI applications that use machine learning can take that data and quickly turn it into actionable
information. As of this writing, the primary disadvantage of using AI is that it is expensive to
process the large amounts of data that AI programming requires.
ADVANTAGES DISADVANTAGES
AI is incorporated into a variety of different types of technology. Here are six examples:
57
• Automation. When paired with AI technologies, automation tools can expand the volume
and types of tasks performed. An example is robotic process automation (RPA), a type of
software that automates repetitive, rules-based data processing tasks traditionally done by
humans. When combined with machine learning and emerging AI tools, RPA can automate
bigger portions of enterprise jobs, enabling RPA's tactical bots to pass along intelligence
from AI and respond to process changes.
• Machine learning. This is the science of getting a computer to act without programming.
Deep learning is a subset of machine learning that, in very simple terms, can be thought of
as the automation of predictive analytics. There are three types of machine learning
algorithms:
o Supervised learning. Data sets are labeled so that patterns can be detected and used
to label new data sets.
o Unsupervised learning. Data sets aren't labeled and are sorted according to
similarities or differences.
o Reinforcement learning. Data sets aren't labeled but, after performing an action
Artificial intelligence has made its way into a wide variety of markets. Here are SOME examples.
6.1. AI in healthcare. The biggest bets are on improving patient outcomes and reducing costs.
Companies are applying machine learning to make better and faster diagnoses than humans.
One of the best-known healthcare technologies is IBM Watson. It understands natural language
and can respond to questions asked of it.
AI in business. Machine learning algorithms are being integrated into analytics and customer
relationship management (CRM) platforms to uncover information on how to better serve
customers. Chatbots have been incorporated into websites to provide immediate service to
customers. Automation of job positions has also become a talking point among academics and
IT analysts.
AI in education. AI can automate grading, giving educators more time. It can assess students
and adapt to their needs, helping them work at their own pace. AI tutors can provide additional
58
support to students, ensuring they stay on track. And it could change where and how students
learn, perhaps even replacing some teachers.
AI is currently being applied to a range of functions both in the lab and in commercial/consumer
settings, including the following technologies:
• Speech Recognition allows an intelligent system to convert human speech into text or
code.
• Natural Language Processing enables conversational interaction between humans
and computers.
• Computer Vision allows a machine to scan an image and use comparative analysis to
identify objects in the image.
• Machine learning focuses on building algorithmic models that can identify patterns and
relationships in data.
• Expert systems gain knowledge about a specific subject and can solve problems as
accurately as a human expert on this subject.
PRACTICE
A After years in the wilderness, the term 'artificial intelligence' (AI) seems poised to make a
comeback. AI was big in the 1980s but vanished in the 1990s. It re-entered public consciousness
with the release of Al, a movie about a robot boy. This has ignited a publicdebate about AI, but the
term is also being used once more within the computer industry. Researchers, executives and
marketing people are now using the expression without irony or inverted commas. And it is not
always hype. The term is being applied, with some justification, to products that depend on
59
technology that was originally developed by AI researchers. Admittedly, the rehabilitation of the term
has a long way to go, and some firms still prefer to avoid using it. But the fact that others are starting
to use it again suggests that AI has moved on from being seen as an over-ambitious and under-
achieving field of research.
B The field was launched, and the term 'artificial intelligence' coined, at a conference in 1956 by
a group of researchers that included Marvin Minsky, John McCarthy, Herbert Simon and Alan
Newell, all of whom went on to become leading figures in the field. The expression provided an
attractive but informative name for a research programme that encompassed such previously
disparate fields as operations research, cybernetics, logic and computer science. The goal they
shared was an attempt to capture or mimic human abilities using machines. That said, different
groups of researchers attacked different problems, from speech recognition to chess playing, in
different ways; AI unified the field in name only. But it was a term that captured the public
imagination.
C Most researchers agree that AI peaked around 1985. A public reared on science-fiction
movies and excited by the growing power of computers had high expectations. For years, AI
researchers had implied that a breakthrough was just around the corner. Marvin Minsky said in 1967
that within a generation the problem of creating' artificial intelligence' would be substantially solved.
Prototypes of medical-diagnosis programs and speech recognition software appeared to be making
progress. It proved to be a false dawn. Thinking computers and household robots failed to
materialize, and a backlash ensued. `There was undue optimism in the early 1980s; says David
Leaky, a researcher at Indiana University. 'Then when people realized these were hard problems,
there was retrenchment. By the late 1980s, the term AI was being avoided by many researchers,
who opted instead to align themselves with specific sub-disciplines such as neural networks, agent
technology, case-based reasoning, and so on.
D Ironically, in some ways AI was a victim of its own success. Whenever an apparently
mundane problem was solved, such as building a system that could land an aircraft unattended, the
problem was deemed not to have been AI in the first plate. 'If it works, it can't be AI; as Dr Leaky
characterizes it. The effect of repeatedly moving the goal-posts in this way was that AI came to refer
to 'blue-sky' research that was still years away from commercialization. Researchers joked that AI
stood for `almost implemented'. Meanwhile, the technologies that made it onto the market, such as
speech recognition, language translation and decision-support software, were no longer regarded as
AI. Yet all three once fell well within the umbrella of AI research.
E But the tide may now be turning, according to Dr Leake. HNC Software of San Diego, backed
by a government agency, reckon that their new approach to artificial intelligence is the most
powerful and promising approach ever discovered. HNC claim that their system, based on a cluster
60
G The 1969 film, 2001: A Space Odyssey, featured an intelligent computer called HAL 9000. As
well as understanding and speaking English, HAL could play chess and even learned to lip- read.
HAL thus encapsulated the optimism of the 1960s that intelligent computers would be widespread
by 2001. But 2001 has been and gone, and there is still no sign of a HAL-like computer. Individual
systems can play chess or transcribe speech, but a general theory of machine intelligence still
remains elusive. It may be, however, that the comparison with HAL no longer seems quite so
important, and AI can now be judged by what it can do, rather than byhow well it matches up to a
30-year-old science-fiction film. 'People are beginning to realize that there are impressive things that
these systems can do; says Dr Leake hopefully.
TASK 2: DO THE FOLLOWING STATEMENTS AGREE WITH THE INFORM ATION GIVEN IN THE
READING? WRITE: TRUE/ FALSE / NOT GIVEN ( If there is no information on this)
1. The researchers who launched the field of AI had worked together on other projects
in thepast. …………..
3. Research into agent technology was more costly than research into neural networks. ……..
5. The problems waiting to be solved by AI have not changed since 1967. ……….
a. changing perceptions.
b. premature implementation.
c. poorly planned projects.
d. commercial pressures.
This set of Artificial Intelligence Multiple Choice Questions) focuses on “Robotics –”.
1. What is the name for information sent from robot sensors to robot controllers?
a) temperature b) pressur c) feedback d) signal
2. Which of the following terms refers to the rotational motion of a robot arm?
a) swivel b) axle c) retrograde d) roll
3. Which of the following terms IS NOT one of the five basic parts of a robot?
a) peripheral tools b) end effectors c) controller d) drive
4. Decision support programs are designed to help managers make:
a) budget projections b) visual presentations
c) business decisions d) vacation schedules
5. PROLOG is an AI programming language which solves problems with a form of
symbolic logic known as predicate calculus. It was developed in 1972 at the University of
Marseilles by a team of specialists. Can you name the person who headed this team?
a) Alain Colmerauer b) Nicklaus Wirth
c) Seymour Papert d) John McCarthy
6. The number of moveable joints in the base, the arm, and the end effectors of therobot
determines
a) degrees of freedom b) payload capacity c) operational limits d) flexibility
7.Which of the following places would be LEAST likely to include operational robots?
a) warehouse b) factor c) hospitals d) private homes
8.For a robot unit to be considered a functional industrial robot, typically, howmany
degrees of freedom would the robot have?
a) three b) four c) six d) eight
Which of the basic parts of a robot unit would include the computer circuitry thatcould be
programmed to determine what the robot would do?
a) sensor b) controller c) arm d) end effector
63
BIBLIOGRAPHY
https://www.techopedia.com/definition/32836/robotics
https://www.futurelearn.com/info/courses/begin-robotics/0/steps/2840
https://www.techtarget.com/searchenterpriseai/definition/AI-Artificial-Intelligence
64
UNIT 5
ROBOTICS
GLOSSARY
WORD CONCEPT
ACCELEROMETER A device for measuring acceleration or force. These are related by
Newton’s second law: force = mass * acceleration
ACCURACY he precision with which a computed or calculated robot position can be
attained.
ACTUATOR a motor that reads programming signals and translates them into
mechanical movement.
ANDROID a humanoid robot designed to resemble an adult human male. The ‘andro’
prefix is in reference to the assigned masculine gender of the machine.
CONTROLLER SYSTEM a computer of some type that stores data, executes programs, and directs
the operations of the robot.
CYBORG shorthand for ‘cybernetic organism’, it is any being that possesses both
biological and artificial parts.
COBOTS robots that interface directly with humans.
END EFFECTOR An end effector is a device at the end of a robotic arm, designed to interact
with the environment, such as our patented suction picker.
CONTROLLER The main device that processes information and carries out instructions in a
robot. Also known as the processor.
CONTROL SYSTEM A method of directing the type of path a robot takes.
JOINT The location at which two or more parts of a robotic arm make contact.
Joints allow parts to move in different directions.
KINEMATICS In robotics, kinematics involves studying the mapping of coordinates in
motion.
PICK AND PLACE The process of picking up an object or part in one location and placing it in
another location
SIMULATOR A software application that creates a virtual world in which robots can be
tested.
ROBOTICS Science of designing, building and applying robots.
GRIPPER Gripper (usually with two fingers) grasping objects of different shape, mass
and material. It is actuated by either pneumatic, hydraulic or electrical
motors. It can be equipped with sensors of force or of proximity
AUTONOMOUS ROBOT Robot with ability to produce and execute its own plan and strategy of
movement.
PROLOG 1. a high-level computer programming language first devised for artificial
intelligence applications.
Active sensor 2. A sensor which instigates an action and then waits for a response –
65
1. WHAT IS ROBOTICS?
What are some ways technology can help us in our everyday lives?
How can doctors use technology to helppeople?
Did you ever see a robot? Where did you see it? What did it do?
Mechanical robots use sensors, actuators and data processing to interact with the physical
world. Someone who makes their living in robotics must have a strong background in
mechanical engineering, electrical engineering and computer programming.
In recent years, the field of robotics has begun to overlap with machine learning and artificial
intelligence. To help avoid confusion, the word bot is no longer being used to describe a
physical robot. Instead, it's used to describe a software robot that does not have a mechanical
body.The field of robotics has greatly advanced with several new general technological
achievements. One is the rise of big data, which offers more opportunity to build programming
capability into robotic systems. Another is the use of new kinds of sensors and connected
devices to monitor environmental aspects like temperature, air pressure, light, motion and more.
All of this serves robotics and the generation of more complex and sophisticated robots for
many uses, including manufacturing, health and safety, and human assistance.
Mechanical robots use sensors, actuators and data processing to interact with the physical
world. Someone who makes their living in robotics must have a strong background in
mechanical engineering, electrical engineering and computer programming.
The field of robotics has greatly advanced with several new general technological
achievements. One is the rise of big data, which offers more opportunity to build programming
capability into robotic systems. Another is the use of new kinds of sensors and connected
devices to monitor environmental aspects like temperature, air pressure, light, motion and more.
All of this serves robotics and the generation of more complex and sophisticated robots for
many uses, including manufacturing, health and safety, and human assistance.
engineering. Robotics involves design, construction, operation, and use of robots. The goal
of robotics is to design intelligent machines that can help and assist humans in their day-to-day
lives and keep everyone safe.
The word “Robot” come from the Czech word “robota” meaning “slavery or forced labour”. It was
first used by Czech writer, Karel Čapek, in his 1921 science-fiction play R.U.R. (Rossum’s
Universal Robots).
Robot is automatically operated machine that replaces human effort, though it may not
resemble human beings in appearance or perform functions in a humanlike manner. By
extension, robotics is the engineering discipline dealing with the design, construction, and
operation of robots.
Robots are programmable machines which are usually able to carry out a series of actions
autonomously, or semi-autonomously.
In my opinion, there are three important factors which constitute a robot:
1. Robots interact with the physical world via sensors and actuators.
2. Robots are programable.
3. Robots are usually autonomous or semi-autonomous.
5. ASPECTS OF ROBOTS
The robots have mechanical construction form, or shape designed to accomplish a
particular task
. They have electrical components which power and control the machinery.
They contain some level of computer program that determines what, when and
how a robot does something
68
A. COMPONENTS OF A ROBOT
7. PARTS OF A ROBOT
Robots can be made in surprisingly many ways, using all manner of materials. But most
robots share a great deal in common. Below you will find descriptions of the most common
70
The effectors are the parts of the robot that actually do the work. Effectors can be any sort
of tool that you can mount on your robot and control with the robot's computer. Most of the
time, the effectors are specific to the tasks that you want your robot to do. For example, in
addition to some of the very common effectors listed below, the Mars rovers have tools like
hammers, shovels, and a mass spectrometer to use in analyzing the soil of Mars.
Obviously, a mail- delivering robot would not need any of those.
Get the Flash Player to see this video.
End-Effectors are the tools at the end of robotic arms and other robotic appendixes that
directly interact with objects in the world. A "gripper" at the end of a robotic arm is a
common end- effector. Others include spikes, lights, hammers, and screw-drivers. Medical
robots have their own specialized effectors, such as tools for cutting in surgery and suturing
incisions.
71
Motors can be used for many of the moving parts Servo motor of a robot, from joints on
robotic limbs to wheels on robotic vehicles, to the flaps and propellers on a robotic airplane.
Pneumatics and hydraulics are another way of moving parts of the robot, particularly
where the robot needsa lot of strength to perform a particular task.
Speakers can allow certain robots to talk to us or generate other sounds. Speech is, after
all, a behavior intended to modify the environment, usually by conveying some sort of
information to the people around us.
8. CONTROL SYSTEMS (THE "BRAINS")
A robot's "control system" is that part of the robot that determines the robot's behavior.
A. Pre-Programmed Robots
The very simplest pre-programmed robot merely repeats the same operations over and
over. Such a robot is either insensitive to changes in its environment or it can detect on
very limited information about very limited parts of the environment. Such a robot will
require little in the way of "controls" but it will perform properly only if the environment
behaves in accord with the robot's pre-programmed actions.
9. TYPES OF ROBOTS
Mechanical bots come in all shapes and sizes to efficiently carry out the task for which they are
designed. All robots vary in design, functionality and degree of autonomy. From the 0.2
millimeter-long “RoboBee” to the 200 meter-long .
9.1. Pre-Programmed Robots
Pre-programmed robots operate in a controlled environment where they do simple, monotonous
tasks. An example of a pre-programmed robot would be a mechanical arm on an automotive
assembly line. The arm serves one function — to weld a door on, to insert a certain part into the
engine, etc. — and its job is to perform that task longer, faster and more efficiently than a
human.
Humanoid robots are robots that look like and/or mimic human behavior. These robots usually
perform human-like activities (like running, jumping and carrying objects), and are sometimes
72
designed to look like us, even having human faces and expressions. Two of the most prominent
examples of humanoid robots are Hanson Robotics’ Sophia
9.3. Autonomous Robots
Autonomous robots operate independently of human operators. These robots are usually
designed to carry out tasks in open environments that do not require human supervision. They
are quite unique because they use sensors to perceive the world around them, and then employ
decision-making structures (usually a computer) to take the optimal next step based on their
data and mission. An example of an autonomous robot would be the Roomba vacuum cleaner,
which uses sensors to roam freely throughout a home.
People sometimes confuse the two because of the overlap between them: Artificially
Intelligent Robots.
1.To understand how these three terms, relate to each other, let's look at each of them
individually. The term robotics was introduced by writer Isaac Asimov. In his science fiction
book, I, Robot, published in 1950, he presented three laws of robotics:
2. A robot may not injure a human being, or, through inaction, allow a human being to
come to harm.
3. A robot must obey the orders given it by human beings except where such orders
would conflict with the First Law.
4. A robot must protect its own existence as long as such protection does not conflict
73
5. ROBOTICS ENGINEERING
It deals with the design, construction, operation, and use of robots, as well as computer
systemsfor their control, sensory feedback, and information processing.
Robots used in various applications. There are many jobs which humans would rather leave
to robots. The job may be boring, such as domestic cleaning, or dangerous, such as exploring
inside a volcano.
Today's robots assist in high precision surgeries such as brain and heart surgery. They are
also used to test quality control in pharmaceuticals.
Robots are aimed at manipulating the objects by perceiving, picking, moving, modifying the
physical properties of object, destroying it, or to have an effect thereby freeing manpower from
doing repetitive functions without getting bored, distracted, or exhausted.
74
______________________________________________________________________
______________________________________________________________________
12. What is, “human-robot interaction”
_______________________________________________________________________
_______________________________________________________________________
13. How to send information from the robot sensors to the robot controllers?
______________________________________________________________________
______________________________________________________________________
14. What is the Pneumatic System in robotics?
Read the following passage carefully. Then complete the exercises that follow.
76
Read each question carefully. Circle the letter or the number of the correct answer.
1.ASIMO traveled to Edinburgh, Scotland, for the annual Edinburgh International ScienceFestival.
The festival takes place in February every year.
Annual means
a. scientific. b.international. c.every year.
2.ASIMO is designed to run, climb stairs, and kick a soccer ball. It can even conduct an
orchestra.
a. Designed means b. Conduct means
1. made. 1. play.
2. performed. 2. lead.
3. climbed. 3. perform.
3.Everyone at the concert was amazed not only by Yo Yo Ma, but also by ASIMO.
c. Amazed means
1. confused.
2. surprised.
3. interested.
d. Not only . . . but also means
1. however.
2. except.
3. and.
e. Why were the people amazed by ASIMO?
1. It’s a good conductor.
2. It can play the cello.
3. It’s a robot.
4.Scientists developed robots more than 60 years ago. For many years, robots have workedin
factories. They do uninteresting jobs such as packaging food or assembling cars.
a. Developed means
1. learned about.
2. thought about.
3. made.
77
b. Something uninteresting is
1. dangerous.
2. boring.
3. difficult.
c. Packaging food is
1. making food for a company.
2. carrying food to a truck.
3. putting food into boxes.
d. Assembling means
1. putting together.
2. driving.
3. checking.
2. Robots do many dangerous and boring jobs. Robots also do interesting jobs. For example,
ASIMO can conduct an orchestra. Will people be happy if robots do interesting jobs for them? Why or
why not?
3. What are some of the advantages of having robots work in factories and other places, uch as
hospitals and homes for senior citizens? What are some of the disadvantages?
4. Write in your journal. Imagine that you have a robot teacher. Write a letter to a friend, and describe
your robot teacher. Tell your friend about your class. Do you enjoy your robot teacher? Why or why not?
BIBLIOGRAPHY
https://robotical.io/blog/robot-terminology/
https://www.devopsschool.com/blog/what-is-robotics-and-what-are-the-advantages-and-
disadvantages-in-detail/
https://www.techopedia.com/definition/32836/robotics
https://robotical.io/blog/robot-terminology/
78
UNIT 6
Information systems have evolved at a rapid pace ever since their introduction in the
1950s. The Internet has made the entire world accessible to us, allowing us to
communicate and collaborate with each other like never before.
Technology today is evolving at a rapid pace, enabling faster change and progress,
causing an acceleration of the rate of change. However, it is not only technology
trends and emerging technologies that are evolving, a lot more has changed this
year due to the outbreak of COVID-19 making IT professionals realize that their role
will not stay the same in the contactless world tomorrow. And an IT professional in
2021-22 will constantly be learning, unlearning, and relearning (out of necessity if not
desire).
In this Unit we present the 9 emerging technology trends that we should watch for
and try at in 2022, and possibly secure one of the jobs that will be created by these
new technology trends, that includes:
79
3. Edge Computing
4. Quantum Computing
6. Blockchain
7. Internet of Things
8. 5G
9. Cybersecurity
Machine Learning is an application of Artificial Intelligence that enables systems to learn from
vast volumes of data and solve specific problems. It uses computer algorithms that improve
their efficiency automatically through experience.
80
Machine learning is a core sub-area of Artificial Intelligence (AI). ML applications learn from
experience (or to be accurate, data) like humans do without direct programming. When
exposed to new data, these applications learn, grow, change, and develop by themselves. In
other words, machine learning involves computers finding insightful information without being
told where to look. Instead, they do this by leveraging algorithms that learn from data in an
iterative process.
As you input more data into a machine, this helps the algorithms teach the computer, thus
improving the delivered results. When you ask Alexa to play your favorite music station on
Amazon Echo, she will go to the station you played most often. You can further improve and
refine your listening experience by telling Alexa to skip songs, adjust the volume, and many
more possible commands.
1. Supervised learning is a type of machine learning that uses labeled data to train
machine learning models. In labeled data, the output is already known. The model just
81
needs to map the inputs to the respective outputs. An example of supervised learning is to
train a system that identifies the image of an animal.
2. Unsupervised learning is a type of machine learning that uses unlabeled data to train
machines. Unlabeled data doesn’t have a fixed output variable. The model learns from
the data, discovers the patterns and features in the data, and returns the output. An
example of an unsupervised learning technique that uses the images of vehicles to
classify if it’s a bus or a truck.
3. Reinforcement Learning trains a machine to take suitable actions and maximize its
rewards in a particular situation. It uses an agent and an environment to produce
actions and rewards. The agent has a start and an end state. But, there might be
different paths for reaching the end state, like a maze. In this learning technique, there
is no predefined target variable. An example of reinforcement learning is to train a
machine that can identify the shape of an object, given a list of different objects. In the
example shown, the model tries to predict the shape of the object, which is a square in
this case.
Robotic Process Automation is the use of software with Artificial Intelligence (AI)
and machine learning (ML) capabilities to handle high-volume, repeatable tasks that
previously required humans to perform. Some of these tasks include:
82
• Addressing queries
• Making calculations
• Maintaining records
• Making transactions
• Rich analytical suite - RPA monitors and manages automated functions from a central
console. This console can be accessed from anywhere and offers basic metrics on robots,
servers, workflows, and more.
• Simple creation of bots - RPA tools enables the quick creation of bots by capturing
mouse clicks and keystrokes with built-in screen recorder components.
• Scriptless automation - RPA tools are code-free and can automate any application in any
department. Users with less programming skills can create bots through an intuitive GUI.
• Security - RPA tools enable the configuration and customization of encryption capabilities to
secure certain data types to defend against the interruption of network communication.
• Hosting and deployment - RPA systems can automatically deploy bots in groups of
hundreds. Hence, RPA bots can be installed on desktops and deployed on servers to access
data for repetitive tasks.
• Debugging - Some RPA tools need to stop running to rectify the errors while other tools
allow dynamic interaction while debugging. This is one of the most powerful features of RPA.
When you hear the term automation, you might think of a robot doing its job without any human
intervention. And yes, you’re partially right. However, you could have a few misconceptions,
such as:
• RPA bots do not possess logical thinking or decision-making skills, which is why they cannot
replicate human cognitive functions
83
3. EDGE COMPUTING
Edge Computing has transformed how data from multiple devices is handled,
processed, and delivered across the world. It is a distributed computing framework. It
ensures the proximity of enterprise applications to data sources
Edge computing is the computational processing of sensor data away from the
centralized nodes and close to the logical edge of the network, toward individual
sources of data. It may be referred to as a distributed IT network architecture that
enables mobile computing for data produced locally.
The process of edge computing differs from cloud computing because it takes time,
sometimes up to 2 seconds to relay the information to the centralized data center,
delaying the decision-making process. The signal latency can lead to the organization
incurring losses, hence organizations prefer edge computing to cloud computing.
The main difference between cloud and edge containers is the location. Edge containers are
located at the edge of a network, closer to the data source, while cloud containers
operate in a data center. Organizations that have already implemented containerized cloud
solutions can easily deploy them at the edge.
it’s important to understand that cloud and edge computing are different, non-
interchangeable technologies that cannot replace one another. Edge computing is used
84
to process time-sensitive data, while cloud computing is used to process data that is
not time-driven.
cloud computing has become mainstream, with major players AWS (Amazon Web
Services), Microsoft Azure and Google Cloud Platform dominating the market. The
adoption of cloud computing is still growing, as more and more businesses migrate to a
cloud solution.
4. QUANTUM COMPUTING
Quantum computers are incredibly powerful machines that take a new approach to processing
information.
Quantum computing is an area of computer science that uses the principles of quantum
theory. Quantum theory explains the behavior of energy and material on the atomic and
subatomic levels.
Quantum computing uses subatomic particles, such as electrons or photons. Quantum bits, or
qubits, allow these particles to exist in more than one state (i.e., 1 and 0) at the same time.
Quantum theory explains the nature and behavior of energy and matter on
the quantum (atomic and subatomic) level. Quantum computing uses a combination of bits to
perform specific computational tasks. All at a much higher efficiency than their classical
counterparts. Development of quantum computers mark a leap forward in computing
capability, with massive performance gains for specific use cases. For example quantum
85
Quantum computing has the capability to sift through huge numbers of possibilities and
extract potential solutions to complex problems and challenges. Where classical computers
store information as bits with either 0s or 1s, quantum computers use qubits. Qubits carry
information in a
Quantum computers are different from digital electronic computers based on transistors.
Quantum computation uses quantum bits called qubits.
Compared to traditional computing done by a classical computer, a quantum computer should
be able to store much more information and operate with more efficient algorithms. This
translates to solving extremely complex tasks faster.
• Elementary particles of energy and matter, depending on the conditions, may behave like
particles or waves.
• The simultaneous measurement of two complementary values -- such as the position and
momentum of a particle -- is flawed. The more precisely one value is measured, the more
flawed the measurement of the other value will be.
Quantum computers could be used to improve the secure sharing of information. Or to improve
radars and their ability to detect missiles and aircraft. Another area where quantum computing
is expected to help is the environment and keeping water clean with chemical sensors.
• Financial institutions may be able to use quantum computing to design more effective
and efficient investment portfolios for retail and institutional clients. They could focus on
creating better trading simulators and improve fraud detection.
86
• The healthcare industry could use quantum computing to develop new drugs and
genetically-targeted medical care. It could also power more advanced DNA research.
• For stronger online security, quantum computing can help design better data encryption
and ways to use light signals to detect intruders in the system.
• Quantum computing can be used to design more efficient, safer aircraft and traffic
planning systems.
Superposition and entanglement are two features of quantum physics on which quantum
computing is based. They empower quantum computers to handle operations at speeds
exponentially higher than conventional computers and with much less energy consumption.
Superposition
According to IBM, it's what a qubit can do rather than what it is that's remarkable. A qubit
places the quantum information that it contains into a state of superposition. This refers to a
combination of all possible configurations of the qubit. "Groups of qubits in superposition can
create complex, multidimensional computational spaces. Complex problems can be
represented in new ways in these spaces.
Entanglement
Entanglement is integral to quantum computing power. Pairs of qubits can be made to become
entangled. This means that the two qubits then exist in a single state. In such a state, changing
one qubit directly affects the other in a manner that's predictable.
87
Quantum algorithms are designed to take advantage of this relationship to solve complex
problems. While doubling the number of bits in a classical computer doubles its processing
power, adding qubits results in an exponential upswing in computing power and ability.
Quantum computing offers enormous potential for developments and problem-solving in many
industries. However, currently, it has its limitations.
Quantum computers have a more basic structure than classical computers. They have no
memory or processor. All a quantum computer uses is a set of superconducting qubits.
BIBLIOGRAPHY
https://www.investopedia.com/terms/q/quantum-computing.asp
88
The next exceptional technology trend - Virtual Reality (VR) and Augmented Reality (AR), and
Extended Reality (ER). VR immerses the user in an environment while AR enhances their
environment. Although this technology trend has primarily been used for gaming thus far, it has
also been used for training, as with Virtual Ship, a simulation software used to train U.S. Navy,
Army and Coast Guard ship captains.
In 2022, we can expect these forms of technologies being further integrated into our lives.
Usually working in tandem with some of the other emerging technologies we’ve mentioned in
this list, AR and VR have enormous potential in training, entertainment, education, marketing,
and even rehabilitation after an injury.
• Fully Immersive Virtual Reality: Right now, there are no completely immersive VR
technologies, but advances are so swift that they may be right around the corner. This type of VR
generates the most realistic simulation experience, from sight to sound to sometimes even
olfactory sensations. Car racing games are an example of immersive virtual reality that gives the
user the sensation of speed and driving skills. Developed for gaming and other entertainment
purposes, VR use in other sectors is increasing.
Virtual reality technology is very useful for people with disabilities because, disabled
people can feel that they can explore the real world without having to physically travel. Films
produced for virtual reality give the audience the possibility of seeing all the surroundings in
every scene; therefore, creating an interactive visual effect for users.
CONS
– High Cost
One of the main cons of virtual reality is that not everyone can afford it. It is very
expensive and people who cannot afford it are left out of this technological world.
– Communication through virtual reality should not replace direct communication.
Another disadvantage of virtual reality is that it cannot be used as a replacement for direct
communication between people. Additionally, this technology is susceptible to deception.
– Feeling of uselessness
Virtual reality users may feel useless as they may get the feeling that they are trying to escape
from the real world.
– Users addicted to the virtual world
90
Users can become addicted to the virtual world. This addiction can cause various health
related issues. Thus, like anything, it is important to monitor one’s activity.
– The technology is still experimental
Although virtual reality technology is used in various fields, it is still experimental and has not
been developed to its full potential.
– Training in virtual reality environments is not always realistic.
Implies a complete immersion Adds digital elements to a live Experience, which combines
experience that shuts out the view often by using the camera elements of both AR and VR,
physical world. Using VR devices on a smartphone. Examples of real-world and digital objects
such as HTC Vive, Oculus Rift or augmented reality experiences interact. Mixed reality technology
Google Cardboard, users can be include Snapchat lenses and the is just now starting to take off
transported into a number of game Pokemon Go. with Microsoft’s HoloLens one of
real-world and imagined the most notable early mixed
environments such as the middle reality apparatuses.
of a squawking penguin colony
or even the back of a dragon.
91
6. BLOCKCHAIN
Low costs for users. The decentralized nature of Blockchain, allows for the validation
of person-to-person transactions quickly and securely. Eliminating the need for an intermediary
92
High implementation costs. Just as this technology represents low costs for users,
unfortunately, it also implies high implementation costs for companies, which delays its mass
adoption and implementation.
93
7. INTERNET OF THINGS
IoT: The Internet of Things. When the Internet became commonplace, we were all
connected as an Internet of people. That has been life-changing. But it’s about to change
all over again. Soon it will be our devices (and cars and phones and appliances and more)
that are connected, not us, and this shift is going to turn our world upside down—in a very
good way, according to most experts. Some predict the changes will be so extreme, IoT
will lead to the next Industrial Revolution.
it’s “the interconnection via the Internet of computing devices embedded in everyday
objects, enabling them to send and receive data.” At a consumer level, these devices can
be placed in our cars, phones, appliances, medical equipment, wristbands, livestock and
more. At an industrial level, these devices can be in machinery, shipping equipment,
vehicles, robots, warehouses and more. But where the devices are located matters less
than what they do. And what they do is “talk” to each other, sharing data and getting
feedback based on that data and all the other data that is being generated, analyzed and
acted on.
The Internet of Things (IoT) describes the network of physical objects—“things”—that are
embedded with sensors, software, and other technologies for the purpose of connecting
and exchanging data with other devices and systems over the internet. These devices
range from ordinary household objects to sophisticated industrial tools. With more than 7
billion connected IoT devices today, experts are expecting this number to grow to 10
baby monitors—to the internet via embedded devices, seamless communication is possible
between people, processes, and things.
While the idea of IoT has been in existence for a long time, a collection of recent advances in a
number of different technologies has made it practical.
https://www.insiderintelligence.com/insights/internet-of-things-devices-examples/
95
8. 5G
5g will become even more widespread, and we will start to see operators launching 5g
stand-alone networks, delivering even more incredible speeds and quality of service to
consumers.
5G is next generation wireless network technology that’s expected to change the way
people live and work. It will be faster and able to handle more connected devices than the
existing 4G LTE network, improvements that will enable a wave of new kinds of tech
products.
5G is the 5th generation mobile network. It is a new global wireless standard after 1G,
2G, 3G, and 4G networks. 5G enables a new kind of network that is designed to connect
virtually everyone and everything together including machines, objects, and devices.
5G wireless technology is meant to deliver higher multi -Gbps peak data speeds, ultra-
low latency, more reliability, massive network capacity, increased availability, and a
more uniform user experience to more users. Higher performance and improved
efficiency empower new user experiences and connects new industries.
8.1.Why 5G?
Companies are racing to have the fastest or largest 5G networks. And countries are ompeting to
be the first to deploy fully functional, nationwide 5G. That’s because the benefits of the new
96
technology are expected to fuel transformative new technologies, not just for consumers but also
for businesses, infrastructure and defense applications.
5G can be significantly faster than 4G, delivering up to 20 Gigabits-per-second (Gbps) peak data
rates and 100+ Megabits-per-second (Mbps) average data rates. 5G has more capacity than 4G.
5G is designed to support a 100x increase in traffic capacity and network efficiency.
Much of the hype around 5G has to do with speed. But there are other perks, too. 5G will
have greater bandwidth, meaning it can handle many more connected devices than previous
networks. That means no more spotty service when you’re in a crowded area. And it will
enable even more connected devices like smart toothbrushes and self-driving cars.
8.4. How does it work?
With 5G, signals run over new radio frequencies, which requires updating radios and other
equipment on cell towers. There are three different methods for building a 5G network,
97
depending on the type of assets a wireless carrier has: low-band network (wide coverage
area but only about 20% faster than 4G), high-band network (superfast speeds but signals
don’t travel well and struggle to move through hard surfaces) and mid-band network
(balances speed and coverage).
8.5. ADVANTAGES AND DISADVANTAGES OF 5G TECHNOLOGY
8.5.1. Advantages of 5G technology
• Higher Download Speed. The 5G network will have the capacity to increase download speeds
by up to 20 times (from 200 Mbps (4G) to 10 Gbps (5G)) and decreasing latency (response time
between devices). These speeds will maximize the browsing experience by facilitating
processes that, although possible today, still present difficulties.
• Hyperconnectivity. The 5G network promises the possibility of having a hyper-interconnected
environment to reach the point of having the much desired “smart cities”. The correct
performance of these new dynamics will depend on the bandwidth of 5G and the Internet of
Things (IoT).
• Process optimization. It is also expected to revolutionize areas such as medicine (remote
operations, for example), and traffic management and autonomous vehicles, as well as its
implementation in the construction sector to optimize resources and reduce risks.
fact is that, in the management of all this information, both from companies and individuals and
even governments, not only issues such as Big Data techniques are involved in its study.
BIBLIOGRAPHY
https://www.techtarget.com/searchnetworking/definition/5G
https://www.verizon.com/about/our-company/5g/what-5g
https://www.gomultilink.com/blog/multilog/the-pros-cons-and-potentials-of-5g
https://whatsag.com/5g/5g-advantages_disadvantages.php
99
9. CYBERSECURITY
Cybersecurity is the protection of internet-connected systems such as hardware, software and
data from cyberthreats
Cybercrime is an increasingly serious problem, and to address it, strong cybersecurity is critical.
Everyone also benefits from the work of cyberthreat researchers, like the team of 250 threat
researchers at Talos, who investigate new and emerging threats and cyber attack strategies.
They reveal new vulnerabilities, educate the public on the importance of cybersecurity, and
strengthen open source tools. Their work makes the Internet safer for everyone.
9.2. Difference Between Cybersecurity and Information Security
Cybersecurity is the state or process of protecting and recovering computer systems, networks,
devices, and programs from any type of cyber attack. Cyber-attacks are an increasingly
sophisticated and evolving danger to your sensitive data, as attackers employ new methods
powered by social engineering and artificial intelligence (AI) to circumvent traditional data
security controls.
9.3. Advantages and Disadvantages of Cyber Security
9.3.1. Advantages:
1) Protects system against viruses, worms, spyware and other unwanted programs.
2) Protection against data from theft.
3) Protects the computer from being hacked.
4) Minimizes computer freezing and crashes.
5) Gives privacy to users
9.3.2. Disadvantages:
1) Firewalls can be difficult to configure correctly.
2) Incorrectly configured firewalls may block users from performing certain actions on the
Internet, until the firewall configured correctly.
3) Makes the system slower than before.
4) Need to keep updating the new software in order to keep security up to date.
5) Could be costly for average user.
9.4. TYPES OF CYBERSECURITY
Network Security
This type of security refers to the protection of your computer network from attacks inside and
outside of the network. It employs numerous different techniques to prevent malicious software
or other data breaches from occurring. Network security uses many different protocols to block
attacks but allows authorized user access to the secure network.
One of the most important layers to secure your network is a firewall, which acts as a protective
barrier between your network and external, untrusted network connections. A firewall can block
and allow traffic to a network based on security settings.
Since phishing attacks are the most common form of cyberattack, email security is the most
important factor in creating a secure network. Email security might consist of a program
designed to scan incoming and outgoing messages to monitor for potential phishing attacks.
101
Application Security
his is the process of protecting sensitive information at the app-level. Most of these security
measures should be implemented before the application is deployed. Application security might
involve tactics like requiring a strong password from the user.
Cloud Security
Most of our online life is stored in the cloud. To be honest, I haven’t saved anything to my
personal hard drive in quite some time. Most people use online systems such as Google Drive,
Microsoft OneDrive, and Apple iCloud for storage. It is important for these platforms to remain
secure at all times due to the massive amounts of data stored on them.
Operational Security
This term refers to the risk management process for all internal cybersecurity. This type of
management usually employs a number of risk management officers to ensure there is a
backup plan in place if a user’s data becomes compromised. Operational security includes
ensuring that employees are educated on the best practices for keeping personal and business
information secure
BBIBLIOGRAPHY
https://www.oracle.com/internet-of-things/what-is-iot/
https://www.cisco.com/c/en/us/products/security/what-is-cybersecurity.html
https://www.techtarget.com/searchsecurity/definition/cybersecurity
https://darktrace.com/blog/the-future-of-cyber-security-2022-predictions-from-darktrace
https://www.techtarget.com/searchsecurity/definition/cybersecurity
https://darktrace.com/blog/the-future-of-cyber-security-2022-predictions-from-darktrace
102
GENERAL BIBLIOGRAPHY
https://www.cisco.com/c/en/us/products/security/what-is-cybersecurity.html#~how-
cybersecurity-works
https://afteracademy.com/blog/what-is-kernel-in-operating-system-and-what-are-the-various-
types-of-kernel
https://www.mygreatlearning.com/blog/what-is-operating-system/#functions-of-operating-
systems
https://www.youtube.com/watch?v=8kujH0nlgv
https://www.techtarget.com/searchnetworking/definition/protocol
https://www.computerhope.com/jargon/n/network.htm
https://www.heavy.ai/technical-glossary/network-topology
https://www.elprocus.com/what-are-network-devices-and-their-types/
https://www.techtarget.com/searchnetworking/definition/network-topology
https://www.geeksforgeeks.org/types-of-network-topology/
https://www.youtube.com/watch?v=znIjk-7ZuqI
https://www.youtube.com/watch?v=614QGgw_FA4
https://www.youtube.com/watch?v=FhrJAi-eHwI
https://www.geeksforgeeks.org/top-10-programming-languages-to-learn-in-2022/
https://www.snhu.edu/about-us/newsroom/stem/what-is-computer-programming
https://www.computerhope.com/jargon/p/programming-language.htm#types
https://hackr.io/blog/best-programming-languages-to-learn
https://www.chakray.com/programming-languages-types-and-features/
https://www.pluralsight.com/blog/software-development/everything-you-need-to-know-about-c-
https://www.techopedia.cm/definition/32836/robotics
https://www.futurelearn.com/info/courses/begin-robotics/0/steps/2840
https://www.techtarget.com/searchenterpriseai/definition/AI-Artificial-Intelligence
https://www.techopedia.com/definition/32836/robotics
https://www.futurelearn.com/info/courses/begin-robotics/0/steps/2840
https://www.techtarget.com/searchenterpriseai/definition/AI-Artificial-Intelligence
https://www.techtarget.com/searchnetworking/definition/5G
https://www.verizon.com/about/our-company/5g/what-5g
https://www.gomultilink.com/blog/multilog/the-pros-cons-and-potentials-of-5g
https://whatsag.com/5g/5g-advantages_disadvantages.php