Introduction to Computing 2
Introduction to Computing 2
TECHNOLOGY
EMERGING
TECHNOLOGY
Emerging technology are new inventions
or new uses for existing technologies that
are rapidly evolving and have the potential
to disrupt industries.
CONTENTS
INTRODUCTION TO AI AND 0
MACHINE LEARNING 1
BASICS OF BLOCKCHAIN,AR 02
AND VR
BIG DATA AND DATA
03
ANALYTICS
ROBOTICS, IOT
THREADS 04
01
INTRODUCTION TO AI
AND MACHINE
LEARNING
INTRODUCTION TO AI
(ARTIFICIAL INTELLIGENCE)
What is artificial intelligence?
Is the science of building machines that can perform
tasks that typically require human intelligence, such
as learning, reasoning, and problem-solving.
TYPES OF AI (ARTIFICIAL
INTELLIGENCE):
Narrow AI
Designed to perform a specific task, like image
recognition, language translation, or playing chess.
General AI
Aims to match human intelligence, with the ability to
reason, learn, and apply knowledge across various
domains.
TYPES OF AI
( ARTIFICIAL INTELLIGENCE )
AR overlays digital information onto the real world using devices like smartphones, tablets, or smart
glasses.
Digital object placed on the real environment. You bring digital world to real world.
VIRTUAL REALITY
(VR)
Is the use of computer technology to create a simulated environment. Implies a complete immersion experience that
shuts out the physical world. Need VR glasses to see Digital World . You have to go to 3D world from real World.
Immersive Experience
KEY
FEATURES 360-Degree
Interaction
Users can look and move around in all directions, interacting with objects and
elements as they would in the real world.
03
BIG DATA AND
DATA
ANALYTICS
BIG DATA
AND
DATA ANALYTICS
ROBOTICS
Is a field of engineering that deals with the design, construction,
operation, and application of robots. Robots are programmable machines
that are able to carry out tasks automatically or with human guidance.
Robotics has a wide range of applications, including manufacturing,
medicine, and space exploration.
IOT THREATS
The Internet of Things (loT) is a network of physical devices that are
connected to the internet. loT devices can collect and exchange data,
which can be used to improve efficiency and productivity. However, loT
devices are also vulnerable to cyberattacks.
COMMON IOT
THREADS
PHISHING
MAN-IN-THE-MIDDLE ATTACK
Phishing attacks are used to trick
people into revealing their personal Man-in-the-middle attacks are used to
information, such as passwords and intercept communication between loT
credit card numbers. devices and steal data.
PROTECTING AIGAINST IOT
THREATS
Protecting Internet of Things (IoT) devices is crucial because they often lack built-in
security and can be vulnerable to cyberattacks.
Use a firewall:
A firewall can help to protect your loT devices from attack.
THANKS