0% found this document useful (0 votes)
14 views34 pages

First Chapter Lesson5678910

The document discusses Artificial Intelligence (AI) and Robotics, explaining AI as man-made thinking power that simulates human intelligence in machines. It categorizes AI into weak and strong forms, detailing applications such as expert systems and robotics, and outlines the components and capabilities of expert systems. Additionally, it covers cryosurgery, space exploration, and the defense industry's reliance on information and communication technology.

Uploaded by

Ratri Saha
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
14 views34 pages

First Chapter Lesson5678910

The document discusses Artificial Intelligence (AI) and Robotics, explaining AI as man-made thinking power that simulates human intelligence in machines. It categorizes AI into weak and strong forms, detailing applications such as expert systems and robotics, and outlines the components and capabilities of expert systems. Additionally, it covers cryosurgery, space exploration, and the defense industry's reliance on information and communication technology.

Uploaded by

Ratri Saha
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

First Chapter Lesson-5: Artificial Intelligence & Robotics.

Artificial Intelligence:
Artificial Intelligence is composed of two words Artificial and Intelligence, where
Artificial defines “man-made,” and intelligence defines “thinking power”, hence AI
means “a man-made thinking power.”
Artificial intelligence (AI) refers to the simulation of human intelligence in machines
that are programmed to think like humans and mimic their actions.
In other words, Artificial intelligence is the ability of a computer-controlled system to
perform tasks like a human can perform tasks.
The father of Artificial Intelligence, John McCarthy
Introduction to AI
Artificial Intelligence is not just a part of computer science even it‟s so vast and
requires lots of other factors which can contribute to it. To create the AI first we
should know that how intelligence is composed, so the Intelligence is an intangible
part of our brain which is a combination of Reasoning, learning, problem-solving
perception, language understanding, etc.
To achieve the above factors for a machine or software Artificial Intelligence requires
the following discipline:
 Mathematics
 Biology
 Psychology
 Sociology
 Computer Science
 Neurons Study
 Statistics
The goals of artificial intelligence include learning, reasoning, and perception. The
ideal characteristic of artificial intelligence is its ability to rationalize and take actions
that have the best chance of achieving a specific goal.
Examples of machines with artificial intelligence include computers that play chess
and self-driving cars. Each of these machines must weigh the consequences of any
action they take, as each action will impact the end result. In chess, the end result is
winning the game. For self-driving cars, the computer system must account for all
external data and compute it to act in a way that prevents a collision.
Artificial intelligence is applied in Expert System, Robotics, Neural Networks, Fuzzy
Logic, Natural Language Processing etc.
Research Areas of Intelligence
Several programming languages like LISP, CLISP, PROLOG, C/C++, JAVA are
used in implementing Artificial intelligence in Expert System, Robotics, Neural
Networks, Fuzzy Logic, Natural Language Processing etc.
Categorization of Artificial Intelligence:
Artificial intelligence can be divided into two different categories: weak and strong.
Weak artificial intelligence:
Weak artificial intelligence embodies a system designed to carry out one particular
job. Weak AI systems include video games such as the chess example from above and
personal assistants such as Amazon‟s Alexa and Apple‟s Siri. You ask the assistant a
question, it answers it for you.
Strong artificial intelligence:
Strong artificial intelligence systems are systems that carry on the tasks considered to
be human-like. These tend to be more complex and complicated systems. They are
programmed to handle situations in which they may be required to problem solve
without having a person intervene. These kinds of systems can be found in
applications like self-driving cars or in hospital operating rooms.
Expert System:
The expert systems are the computer applications developed to solve complex
problems in a particular domain, at the level of extra-ordinary human intelligence and
expertise.
Characteristics of Expert Systems:
 High performance
 Understandable
 Reliable
 Highly responsive
 Components of Expert Systems:
The components of ES include −
 Knowledge Base
 Inference Engine
 User Interface
Knowledge Base:
 It contains domain-specific and high-quality knowledge. Knowledge is required
to exhibit intelligence. The success of any ES majorly depends upon the
collection of highly accurate and precise knowledge.
Inference Engine:
 Use of efficient procedures and rules by the Inference Engine is essential in
deducting a correct, flawless solution. In case of knowledge-based ES, the
Inference Engine acquires and manipulates the knowledge from the knowledge
base to arrive at a particular solution.
User Interface:
 User interface provides interaction between user of the ES and the ES itself. It is
generally Natural Language Processing so as to be used by the user who is well-
versed in the task domain. The user of the ES need not be necessarily an expert
in Artificial Intelligence.
Capabilities of Expert Systems:
The expert systems are capable of −
 Advising
 Instructing and assisting human in decision making
 Demonstrating
 Deriving a solution
 Diagnosing
 Explaining
 Interpreting input
 Predicting results
 Justifying the conclusion
 Suggesting alternative options to a problem
Several expert systems and their functions:
 Deep blue: Judge of chess
 Internist: Medical officer
 Mycin and Cadulus: Medical officer
 Mycsyma: Solve mathematical problem
 Dendral: Teach programming
 Prospector: Search mineral and mining
 Benefits of Expert Systems:
 Availability − They are easily available due to mass production of software.
 Less Production Cost − Production cost is reasonable. This makes them
affordable.
 Speed − They offer great speed. They reduce the amount of work an individual
puts in.
 Less Error Rate − Error rate is low as compared to human errors.
 Reducing Risk − They can work in the environment dangerous to humans.
 Steady response − They work steadily without getting motional, tensed or
fatigued.
Robotics:
Robotics is the branch of technology that deals with the design, construction,
operation, and application of robots.
Robot:
Robot is one kind of computer-controlled electro-mechanical machine designed to
execute one or more tasks automatically with speed and precision. It is designed based
on artificial Intelligence that can perform tasks like human and controlled by computer
program.
Components of a Robot: Robots are constructed with the following −
 Power Supply − The robots are powered by batteries, solar power, hydraulic, or
pneumatic power sources.
 Actuators − They convert energy into movement.
 Electric motors (AC/DC) − They are required for rotational movement.
 Pneumatic Air Muscles − They contract almost 40% when air is sucked in them.
 Muscle Wires − They contract by 5% when electric current is passed through
them.
 Piezo Motors and Ultrasonic Motors − Best for industrial robots.
 Sensors − They provide knowledge of real time information on the task
environment. Robots are equipped with vision sensors to be to compute the
depth in the environment. A tactile sensor imitates the mechanical properties of
touch receptors of human fingertips.
Characteristics of robot:
 A robot is a machine that gathers information about its environment and uses
that information to follow instructions to do work.
 A robot has to be artificial which means it is made by a human.
 They also have to be controlled by a computer and it has to sense its surrounding
environment.
 The robot has to be able to perform actions and movements.
 Robots were made to the jobs that were too dangerous, dirty, or too delicate for
humans to handle alone.
 Some robots were made to do the jobs that people were just too lazy to do, or
just too boring.
 The robot can work tirelessly.
Applications of Robots:
The robots has been instrumental in the various domains such as −
 Industries − Robots are used for handling material, cutting, welding, color
coating, drilling, polishing, etc.
 Military − Autonomous robots can reach inaccessible and hazardous zones
during war. A robot named Daksh, developed by Defense Research and
Development Organization (DRDO), is in function to destroy life-threatening
objects safely.
 Medicine − The robots are capable of carrying out hundreds of clinical tests
simultaneously, rehabilitating permanently disabled people, and performing
complex surgeries such as brain tumors.
 Exploration − The robot rock climbers used for space exploration, underwater
drones used for ocean exploration are to name a few.
 Entertainment − Disney‟s engineers have created hundreds of robots for movie
making.
Knowledge Based Questions:
 What is artificial intelligence?
 What is expert system?
 What is robotics?
 What is robot?
Comprehension Based Questions:
 b. “Machine can work automatically”- Explain.
 b. Explain the technology used in risky task.
 b. “It is convenient to use machine in risky task”-Explain.
 b. Explain the role of artificial intelligence in robot.
 b. “Artificial Intelligence is an important branch of Computer Science”-Explain.
 b. How Artificial Intelligence is related to medical service? –Explain.
 b. “Robot is a program controlled machine”-Explain.
 b. How robot makes humans work easier? -Explain.
Read the stem and answer the question:
A world-class industrial factory is planned to be established in the near of the capital
of Bangladesh, where the actuator will help the country to become better and
economically self-sufficient by producing the necessary computer equipment
efficiently. The skilled programmers of the institute will set up a simulated
environment and arrange for the visitors to visit various sights of the city at home.
 c) Identify and explain the technology used in the industrial factory.
Read the stem and answer the question:
An electric short circuit in a slum of the capital caught fire. Fire service personnel
arrived shortly , but the fire was so heavy and they could not enter. As a result, they
used a special device to control the fire.
 c) Explain the device mentioned to the stem.
 d) Analyze the impact of the device mentioned in the stem.
Multiple Choice Questions:
1. What is the technology to convey human thoughts through machines?
a) Biometrics b) Bioinformatics c) Artificial intelligence d) Virtual reality
2. The artificial intelligence has been added to which generation of computers?
a) third b) fourth c) fifth d) sixth
3. Who first introduced the word „Artificial intelligence‟?
a) Jack Williamson b) Marshall Mcluhan c) John McCarthy g) Karel Capek
4. In which case is the actuator used?
a) Biometrics b) Bioinformatics c) Robotics d) Virtual Reality
5. How many degrees of rotation can the robot for work?
a) 90 b) 180 c) 270 d) 360
6. Features of Robots –
i. It is perfectly operational ii. It can work tirelessly iii. It is slow
Which one is correct? a) i & ii b) i & iii c) ii & iii d) i, ii & iii
7. Robots are used
i. In housework ii. In planning iii. In the inner workings of mining
Which one is correct? a) i & ii b) i & iii c) ii & iii d) i, ii & iii
Read the stem and answer questions no. 8 & 9:
During the inauguration of the digital fair, the Prime Minister had a lively
conversation with the Humanoid called Sofia.
8. What is the point indicated by the stem?
a) Biometrics b) Nanotechnology c) Robotics d) Virtual Reality
9. As a result of the technology used in the stem-
a) Children‟s intelligence will develop b) Human activity will increase
c) Human values will increase d) Lower the factory cost

First Chapter Lesson-6: Cryosurgery, Space Exploration & Defense.


Cryosurgery:
The Greek word cryo means “ice cold“ and Surgery means “hand work”.
Cryosurgery is a type of surgery that involves the use of extreme cold to freeze and
destroy diseased tissue, including cancer cells.
Cryosurgery, also called Cryotherapy, cryoablation, percutaneous cryotherapy or
targeted cryoablation therapy.
Although cryotherapy and cryoablation can be used interchangeably, the term
“cryosurgery” is best reserved for cryotherapy performed using an open, surgical
approach.
During Cryosurgery, liquid nitrogen or high pressure argon gas flows into a needle-
like applicator (a cryoprobe) creating intense cold that is placed in contact with
diseased tissue. Physicians use image-guidance techniques such as ultrasound,
computed tomography (CT) or magnetic resonance (MR) to help guide the cryoprobes
to treatment sites located inside the body.
In this method the following cryogenic agents or gases are used to freeze diseased
parts –
 Liquid nitrogen
 Carbon dioxide
 Liquid Argon
 Di-Methyl-Ethyl-Propane etc
The way how a Cryosurgery is performed:
This method first identifies diseased cells or tissues using Ultra Sound or MRI
instruments. Then, with cryoprobe or imaging device, various cryogenic agents such
as liquid argon gas is applied to the diseased cells. As a result, the temperature of the
cell drops to -120 to -165 o C within 5-12 seconds. Due to the temperature drop, the
cell becomes frozen. Blocking the blood and oxygen supply to the iceberg causes
tissue damage. Again with the help of a imaging device, helium gas is applied inside
the cell or tissue and the temperature is raised from 20 to 40 o C . Then the ice of the
solid cell or tissue melts and the cell or tissue is destroyed.
Application of Cryosurgery:
 Warts, moles, skin tags, solar keratoses, molluscum, Morton‟s neuroma and
small skin cancers are candidates for cryosurgical treatment.
 Several internal disorders are also treated with cryosurgery, including liver
cancer, prostate cancer, lung cancer, oral cancers, cervical disorders and, more
commonly in the past, hemorrhoids.
 Soft tissue conditions such as plantar fasciitis (jogger‟s heel) and fibroma
(benign excrescence of connective tissue) can be treated with cryosurgery.
Advantages of Cryosurgery:
 It is less invasive than surgery, involving only a small incision or insertion of the
cryoprobe through the skin.
 Consequently, pain, bleeding, and other complications of surgery are minimized.
 Cryosurgery is less expensive than other treatments and requires shorter
recovery time and a shorter hospital stay, or no hospital stay at all.
 Physicians can focus cryosurgical treatment on a limited area, they can avoid the
destruction of nearby healthy tissue.
Disadvantages of Cryosurgery:
 In this way, when detecting diseased cells or tissues, the location of the healthy
cells can be damaged if the location is not properly identified and cryosurgery is
used.
 There are some side effects, but hopefully the side effects are temporary.
 In the treatment of skin cancer, cryosurgery causes the skin to swell, damage the
nerve, decrease sensitivity.
 Side effects occur only in those who have prostate gland problems.
Space Exploration:
Space exploration is the observation of aerospace flying above the earth‟s atmosphere
and observing the environment and physical phenomena of that place.
In other words, Space exploration is the ongoing discovery and exploration of celestial
structures in outer space by means of continuously evolving and growing space
technology.
Various information and communication technologies are used for the operation of the
spacecraft, the operation of the spacecraft, the observation of the spacecraft, the
analysis of various databases, the creation of the spacecraft, the communication of the
earth, etc.
The physical exploration of space is conducted both by unmanned robotic space
probes and human spaceflight. The first successful orbital launch was of the Soviet
unmanned Sputnik-1 mission on 4 October 1957.
The first successful human spaceflight was Vostok-1 carrying 27-year-old Russian
cosmonaut Yuri Gagarin on 12 April 1961.
Driverless rovers took pictures from Mars and other planets and sent them to scientists
where human beings are impossible to move.
At present, speeding computers are used in space centers. Each computer completes
simple and complex tasks by communicating with different parts. Some computers are
needed to perform complex tasks, and a computer is kept in addition to solving
hardware issues.
NASA is thinking about sensor web systems. As a result, smaller satellites will be
created and transmitted instead of large-scale satellites with specific targets. They will
be able to change positions and cover specific areas if needed.
Aims and Objectives of Space Exploration:
 To identify the features and prepare a list of the organic carbon compounds.
 To identify the characteristics that can represent the impact of organic process.
 To explore the minerals and the isotopic and chemical elements of the planet.
 To explain the formation and the change of soil and rock.
 To evaluate the process of the atmospheric evolution.
 To divide and identify the present state of the water circle and the carbon-di-
oxide circle.
In this way, space expenditure will be greatly reduced. Aerospace operations will
bring development across the globe by solving all the problems with information and
communication technology.
Defense:
The defense industry, like many other industries, is heavily influenced by information
and communication technology. There is a deep connection between the ICT and the
defense industry. There is a direct or positive relationship between the two. ICT plays
a vital role in the development of the defense industry.
Information and communications technology has taught the defense industry to make
smart bombs where dumb bombs were used / manufactured. Earlier the war was
people-centered and now it is network-centric. Where previously the results of the war
were reviewed, now the war is reviewed in real time. Where before there was invasion
from land and sea. Now, there is a software-based warfare, rather than a sky-and-
space-centric, hardware-based battle.
Computers were used for military operations, firearms control, missile systems, tank
management, radar systems, fighter jets and warships.
Information and communication technology is always used to protect communications
between the land force, navy, air force.
Currently, information and communication technology is used in almost all areas of
the military, including unmanned drone aircraft, commando operations, various
military trials.
After the incorporation of ICT into the defense industry, real time warfare monitoring,
network-based warfare progressed. News of all incidents on the battlefield
immediately reached the Order / Instruction Center.
Soldiers now take advantage of many modern electronics with warships – allowing
them to easily make the right decisions. Understand the enemy‟s target and position
itself, calculating the amount of time it takes to move from one place to another.
Destroy enemy bases, can take command of commander immediately when they are
exposed to a dangerous battle.
Knowledge Based Questions:
 What is cryosurgery?
 What is cryotherapy?
 What is space exploration?
Comprehension Based Questions:
 b. “It is possible to do operation without bleeding”– Explain.
 b. Explain the treatment method in low temperature.
 b. “It is possible to give treatment in cold temperature ”- Explain.
 b. “It is possible to give treatment in cooling process”- Explain.
Read the stem and answer the question:
Mamun had a tumor in his hand that‟s why he went to Dr Ripon. According to his
suggestion, Mamun appeared at the Operation Theater on a certain date. In a short
time Dr. Ripon completed the operation of the tumor at a very low temperature in a
special way.
 c) Which technology has the doctor used to treat Mamun? Explain
Read the stem and answer the question:
Liza went to the doctor for a skin problem. The doctor performed the tests and treated
him with a low temperature.
 c) Explain the method of treatment of Liza as mentioned in the stem.
Multiple Choice Questions:
1. Which one expresses the meaning of the word „Cryo‟?
a) very hot b) medical c) sickness d) cold as ice
2. What does the word „surgery‟ mean?
a) hand work b) treating c) cutting off d) perfect work
3. What is the technique for destroying abnormal or diseased tissue by applying too
cold temperatures?
a) chromosurgery b) cryosurgery c) homosurgery d) biosurgery
4. Cryosurgery is used to treat which of the following diseases?
a) skin disease b) brain disease c) stomach disease d) dentistry
5. Cryosurgery is used to treat in which type of cancer?
i. Breast ii. Prostate iii. Liver
Which one is correct? a) i & ii b) i & iii c) ii & iii d) i, ii & iii

First Chapter Lesson-7: Biometrics.


Biometrics:
Bio means „Life‟ and Metric means „measure‟. Biometrics technology measures and
analyses biological data. Biometrics is such a technology that is used to identify
individuals uniquely based on physiological and behavioral characteristics.
In other words, biometric system is a technology which takes an individual‟s
physiological, behavioral, or both traits as input, analyzes it, and identifies the
individual as a genuine or malicious user.
 Biometrics is used for authenticating and authorizing a person. Though these
terms are often coupled; they mean different.
Each human being is unique in terms of characteristics, which make him or her
different from all others. These characteristics make a person stand separate from the
rest.
Biological data or attributes used in biometrics are two types:
Physiological :
 Face
 Finger Print
 Hand Geometry
 Iris & Retina
 DNA
Behavioral:
 Voice/ tone and accent of speech
 Signature
 Typing Keystroke
Basic Components of a Biometric System:
In general, a biometric system can be divided into four basic components. Let us see
them briefly −
Biometric Basic Components
Input Interface (Sensors)
 It is the sensing component of a biometrics system that converts human
biological data into digital form.
For example, A Metal Oxide Semiconductor (CMOS) imager or a Charge Coupled
Device (CCD) in the case of face recognition, handprint recognition, or iris/retinal
recognition systems.
 An optical sensor in case of fingerprint systems.
 A microphone in case of voice recognition systems.
Processing Unit
 The processing component is a microprocessor, Digital Signal Processor (DSP),
or computer that processes the data captured from the sensors.
Database Store
 The database stores the enrolled sample, which is recalled to perform a match at
the time of authentication.
Output Interface
 The output interface communicates the decision of the biometric system to
enable the access to the user. It could also be TCP/IP protocol, Radio Frequency
Identification (RFID), Bluetooth, or one of the many cellular protocols.
General Working Process of a Biometric System:
There are four general steps a biometric system takes to perform identification and
verification −
 Acquire live sample from candidate. (using sensors)
 Extract prominent features from sample. (using processing unit)
 Compare live sample with samples stored in database. (using algorithms)
 Present the decision. (Accept or reject the candidate.)
Identification and Verification
The biometric sample is acquired from candidate user. The prominent features are
extracted from the sample and it is then compared with all the samples stored in the
database. When the input sample matches with one of the samples in the database, the
biometric system allows the person to access the resources; otherwise prohibits.
Types of Biometric System depending on human trait:
 Physiological System:
 Fingerprint Recognition system
 Hand Geometry Recognition system
 Facial Recognition System
 Iris Recognition System
 Retinal Scanning System
 DNA Recognition System
 Behavioral System:
 Voice/ tone and accent of speech Recognition System
 Signature Verification System
 Typing Keystroke Recognition System
Finger Print Recognition System:
It is the most known and used biometrics solution to authenticate people on biometric
systems. The reasons for it being so popular are there are ten available sources of
biometric and ease of acquisition. Fingerprint is one of oldest and most popular
recognition technique
Every person has a unique fingerprint which is composed of ridges, grooves, and
direction of the lines. There are three basic patterns of ridges namely, arch, loop, and
whorl. The uniqueness of fingerprint is determined by these features as well as
minutiae features such as bifurcation and spots (ridge endings).
Finger print reader uses a light-sensitive microchip to produce a digital image. The
computer analyzes the image automatically, selecting just the fingerprint, and then
uses sophisticated pattern-matching software to match.
Fingerprint Recognition System
Finger print reader is a biometric device that take an image as input and compare with
the image stored in database before.
Advantages:
 It is the most contemporary method.
 It is most economical method.
 It is highly reliable and secure.
 It works on a small template size, which speeds up the verifying process.
 It consumes less memory space.
Disadvantages:
 Scars, cuts or absence of finger can hinder the recognition process.
 The systems can be fooled by using artificial finger made of wax.
 It involves physical contact with the system.
 They leave the pattern of finger behind at the time of entering sample.
Uses:
 Used as user name and password for a computer system and website.
 Access control
 In Banking Payment system.
 To identify DNA

Hand Geometry Recognition System:
It includes measuring length and width of palm, surface area, length and position of
fingers, and overall bone structure of the hand. A person‟s hand is unique and can be
used to identify a person from others.
Hand geometry readers measure a user‟s hand along many dimensions and compare
those measurements to measurements stored in a file.
 Geometry Recognition System
Advantages:
 It is sturdy and user friendly.
 The changes in skin moisture or texture do not affect the result.
 Need less memory.
Disadvantages:
 Since the hand geometry is not unique, it is not very reliable.
 It is effective in case of adults and not for the growing children.
 If candidate‟s hand is with jewelry, plaster, or arthritis, it is likely to introduce a
problem.
Uses:
 Airport in/out control.
 To record attendance of the employees of a company.
 Nuclear power plants and military use Hand Geometry Recognition for access
control.
 Face Recognition System:
 Facial recognition is based on determining shape and size of jaw, chin, shape
and location of the eyes, eyebrows, nose, lips, and cheekbones.
 2D facial scanners start reading face geometry and recording it on the grid. The
facial geometry is transferred to the database in terms of points. The comparison
algorithms perform face matching and come up with the results.
Facial Recognition System
Advantages:
 Easy to use.
 Accuracy is good.
 It offers easy storage of templates in database.
 It reduces the statistic complexities to recognize face image.
 It involves no physical contact with the system.
Disadvantages:
 Facial traits change over time.
 Uniqueness is not guaranteed, for example, in case of identical twins.
 If a candidate face shows different expressions such as light smile, then it can
affect the result.
 It requires adequate lighting to get correct input.
Uses:
 General Identity Verification.
 Verification for access control.
 Human-Computer Interaction.
 Criminal Identification.
 Surveillance.
Iris Recognition System:
Iris recognition works on the basis of iris pattern in human eye. The iris is the
pigmented elastic tissue that has adjustable circular opening in center. It controls the
diameter of pupil. In adult humans, the texture of iris is stable throughout their lives.
The iris patterns of left and right eyes are different. The iris patterns and colors change
from person to person.
It involves taking the picture of iris with a capable camera, storing it, and comparing
the same with the candidate eyes using mathematical algorithms.
Advantages:
 It is highly accurate as the chance of matching two irises is 1 in 10 billion
people.
 It is highly scalable as the iris pattern remains same throughout a person‟s
lifetime.
 The candidate need not remove glasses or contact lenses; they do not hamper the
accuracy of the system.
 It involves no physical contact with the system.
 It provides instant verification (2 to 5 seconds) because of its small template
size.
Disadvantages:
 Iris scanners are expensive.
 High quality images can fool the scanner.
 A person is required to keep his/her head very still for accurate scanning.
 Needs lot of memory.
Uses:
 This system offers to go foreign country without passport.
 Used in government company, military and different financial company for
identifying purpose.
 Google uses iris recognition for accessing their data centers.
Retinal Scanning System:
Retina is the lining layer at the back of the eyeball that covers 65% of the eyeball‟s
inner surface. It contains photosensitive cells. Each person‟s retina is unique due to the
complex network of blood vessels that supply blood.
In retinal scanning process, a person is asked to remove lenses or eyeglasses. A low-
intensity infrared light beam is casted into a person‟s eye for 10 to 15 seconds. This
infrared light is absorbed by the blood vessels forming a pattern of blood vessels
during the scan. This pattern is then digitized and stored in the database.
It is a reliable biometric as the retina pattern remains unchanged throughout the
person‟s life, barring the patterns of persons having diabetes, glaucoma, or some
degenerative disorders.
Advantages:
 It cannot be forged.
 It is highly reliable as the error rate is 1 out of a crore samples (which is almost
0%).
Disadvantages:
 It is not very user friendly as the user needs to maintain steadiness that can cause
discomfort.
 It tends to reveal some poor health conditions such as hypertension or diabetes,
which causes privacy issues.
 Accuracy of the results is prone to diseases such as cataracts, glaucoma,
diabetes, etc.
Uses:
 It is practiced by some government bodies such as CID, FBI, etc.
 Apart from security applications, it is also used for ophthalmological
diagnostics.
DNA Recognition System:
Deoxyribo Neuclic Acid (DNA) is the genetic material found in humans. Every human
barring identical twins, is uniquely identifiable by the traits found in their DNA, which
is located in the nucleus of the cell.
DNA can be collected from any number of sources: blood, hair, finger nails, mouth
swabs, blood stains, saliva, straws, and any number of other sources that has been
attached to the body at some time.
Within cells, DNA is organized in long double helix structure called chromosomes.
There are 23 pairs of chromosomes in humans. Out of the 46 total chromosomes, the
offspring inherits 23 chromosomes from each biological parent. 99.7% of an
offspring‟s DNA is shared with their parents. The remaining 0.3% DNA contains
repetitive coding unique to an individual.
The fundamental steps of DNA profiling are −
 Separating the DNA from sample acquired from either of blood, saliva, hair,
semen, or tissue.
 Separating the DNA sample into shorter segments.
 Organizing the DNA segments according to size.
 Comparing the DNA segments from various samples.
The more detailed the sample is, the more precise the comparison and in turn the
identification of the individual is.
DNA Biometrics differs from all others in the following ways −
 It needs a tangible physical sample instead of image.
 DNA matching is done on physical samples. There is no feature extraction or
template saving.
Advantages:
 It provides the highest accuracy.
Disadvantages:
 Length of procedure from sample acquisition to result is large.
 Being more informative, it brings privacy issues.
 It needs more storage space.
 Sampling contamination or degradation of sample may affect the result.
Uses:
 DNA matching has become a popular use in criminal trials, especially in
proving rape cases.
 It is mainly used to prove guilt or innocence.
 It is used in physical and network security.
Voice Recognition System:
Voice and speech recognition are two separate biometric modalities that, because they
are dependent on the human voice, see a considerable amount of synergy.
Both are contactless, software based technologies, and as such are counted among the
most convenient biometrics in regular use.
Voice recognition, also commonly referred to a voiceprint, is the identification and
authentication arm of the vocal modalities.
By measuring the sounds a user makes while speaking, voice recognition software can
measure the unique biological factors that, combined, produce her voice.
Voiceprints can be measured passively as a user speaks naturally in conversation, or
actively, if she is made to speak a passphrase.
Voice recognition is strengthening other biometric login solutions. The USAA
banking app, for example, uses facial recognition and voice recognition to provide
easy and secure multi-factor biometric security, the voice component adding an extra
level of liveness detection to the process.
Signature Verification System:
The behavioral patterns include the changes in the timing of writing, pauses, pressure,
direction of strokes, and speed during the course of signing. It could be easy to
duplicate the graphical appearance of the signature but it is not easy to imitate the
signature with the same behavior the person shows while signing.
This technology consists of a pen and a specialized writing tablet, both connected to a
computer for template comparison and verification. A high quality tablet can capture
the behavioral traits such as speed, pressure, and timing while signing.
During enrollment phase, the candidate must sign on the writing tablet multiple times
for data acquisition. The signature recognition algorithms then extracts the unique
features such as timing, pressure, speed, direction of strokes, important points on the
path of signature, and the size of signature. The algorithm assigns different values of
weights to those points.
At the time of identification, the candidate enters the live sample of the signature,
which is compared with the signatures in the database.
Advantages:
 It is a non-invasive tool.
 We all use our signature in some sort of commerce, and thus there are virtually
no privacy rights issues involved.
 Even if the system is hacked and the template is stolen, it is easy to restore the
template.
Disadvantages:
 User need to get accustomed of using signing tablet. Error rate is high till it
happens.
Uses:
 Signature verification is a technique used by banks, intelligence agencies and
high-profile institutions to validate the identity of an individual.
 Signature verification is often used to compare signatures in bank offices and
other branch capture.
Keystroke Recognition System:
This biometric analyzes candidate‟s typing pattern, the rhythm, and the speed of
typing on a keyboard. The dwell time and flight time measurements are used in
keystroke recognition.
 Dwell time − It is the duration of time for which a key is pressed.
 Flight time − It is the time elapsed between releasing a key and pressing the
following key.
The candidates differ in the way they type on the keyboard as the time they take to
find the right key, the flight time, and the dwelling time. Their speed and rhythm of
typing also varies according to their level of comfort with the keyboard. Keystroke
recognition system monitors the keyboard inputs thousands of times per second in a
single attempt to identify users based on their habits of typing.
Advantages:
 It needs no special hardware to track this biometric.
 It is a quick and secure way of identification.
 A person typing does not have to worry about being watched.
 Users need no training for enrollment or entering their live samples.
Disadvantages:
 The candidate‟s typing rhythm can change between a number of days or within a
day itself because of tiredness, sickness, influence of medicines or alcohol,
change of keyboard, etc.
 There are no known features dedicated solely to carry out discriminating
information.
Uses:
 Keystroke Recognition is used for identification/verification. It is used with user
ID/password as a form of multifactor authentication.
 It is used for surveillance. Some software solutions track keystroke behavior for
each user account without end-user‟s knowledge. This tracking is used to
analyze if the account was being shared or used by anyone else than the genuine
account owner. It is used to verify if some software license is being shared.
Application Areas of Biometrics:
 Controlling the access to a room, sensitive information, digital system, software
etc.
 To record attendance of the teachers, students for an educational institute or
employees of a commercial company.
 Identity establishment of people for authentic citizenship and immigration
systems.
 Driving License
 Secured payment system or executing online e-commerce transactions.
 Identifying criminals by forensics.
 Fraud and theft reduction.
 Law enforcement.
Advantages of Biometrics System:
 No more forgotten or stolen passwords.
 Positive and accurate Identification
 Highest level of security
 Offers mobility
 Impossible to forge
 Serves as a Key that cannot be transferred.
 Safe & user friendly
Knowledge Based Questions:
 What is biometrics?
Comprehension Based Questions:
 b. Explain the technology used for identifying an individual.
 b. “Biometrics is a behavior‟s properties dependent technology”- Explain.
 b. What are the advantages and disadvantages of using biometrics technology?
 b. “Using biometrics system is convenient for office security”- Explain.
According to the stem answer the following Questions:
The identity of many garment workers who were killed in the destruction of Rana
Plaza in Savar was not initially identified. Later, with the intention of the government,
high technology made it possible to identify most bodies.
 c) Identify and explain the procedure adopted for the identification of the bodies
of the workers described in the stem.
According to the stem answer the following Questions:
Rafiq has brought his business company under the control of computer technology.
The main gate of his organization is opened when an employee place finger on a
machine. On the other hand, employees have to wait a bit in front of a machine when
they enter their rooms.
 c) Discuss the process of entering into the main gate of the company.
 d) Which one is more convenient between two techniques used in main gate and
employees own room? Analyze.
Multiple Choice Questions:
1. In Biometrics system Fingerprint is-
a) Unique Identity b) Finger Identity c) Input Data d) Biological Data
2. What is called the technology that identify an individual based on structural
characteristics?
a) Biometrics b) Bioinformatics c) Biotechnology d) Genetic Engineering
3. Which one is used in Biometrics?
a) Sensor b) Digital Meter c) Weight Meter d) Thermometer
4. The behavioral characteristics of Biometrics are-
i. Voice Recognition ii. DNA iii. Signature Verification
Which one is correct? a) i & ii b) i & iii c) ii & iii d) i, ii & iii
5. The structural characteristics of Biometrics are-
i. Face Recognition ii. DNA iii. Finger Print
Which one is correct? a) i & ii b) i & iii c) ii & iii d) i, ii & iii

First Chapter Lesson-8: Bioinformatics and Genetic Engineering


Bioinformatics:
Bioinformatics is an interdisciplinary field that develops methods and software tools
for understanding biological data, in particular when the data sets are large and
complex.
As an interdisciplinary field of science, bioinformatics combines computer science,
statistics, mathematics, and engineering to analyze and interpret biological data.
What is Bioinformatics?
 In other words, Bioinformatics is a science of solving biological problem using a
mathematical and computational approach.
Various biological analyses result in exponential amounts of biological data and it
becomes very hard to analyze them using manual means. This is where Computer
Science comes to the rescue. Various computational techniques are used to analyze
hunks of biological data more accurately and efficiently by means of automated
processes. Hence, bioinformatics can be considered as a field of data science for
solving problems in biology and medicine.
In bioinformatics, the data obtained through gene and DNA studies are stored in the
database. Subsequently, analyzing these data using computer science, statistics,
mathematics and engineering knowledge, various biological problems are solved and
new tools are created.
The biological data used in Bioinformatics are-
 DNA
 Gene
 Amino Acid
 Nucleic Acid etc.
Donald Knuth, a computer scientist at Stanford University, first came up with the idea
of bioinformatics.
Purpose of bioinformatics:
 To properly understand biological processes using pattern recognition, data
mining, visualization etc. That is, generating knowledge by searching for gene
information.
 Gain knowledge of the effects of genes as a cause of disease.
 To improve the quality of medicine and to invent new drugs.
Bioinformatics Tools perform three steps:
A bioinformatics tool has the following three main functions in analyzing any
biological data in bioinformatics –
 Determines protein sequence from DNA sequence
 Determines protein structure from protein sequence
 Determines protein function from protein structure
Uses of Bioinformatics:
 Microbial Genome
 Molecular Medicine
 Personalized Medicine
 Preventive Medicine
 Gene Therapy
 Comparative studies
 Climate Change studies
 Biotechnology
 Drug Development
 Veterinary Science
 Agriculture
 Bio-weapon development
Bioinformatics is used in the following research areas:
 Sequence alignment
 DNA Analysis
 Gene Finding
 Drug Design
 Drug Invention
 Protein Structure
Some Open-Source Softwares used in Bioinformatics:
 Bioconductor
 BioPerl
 BioJS
 Biopython
 BioJava
 BioRuby
 Biclipse
 EMBOSS
 Taverna Workbench
 UGENE
 T Bio
 Orange
Some add-on in Bioinformatics :
 Apache Taverna
 UGENE
 GenoCAD
Genetic Engineering:
Cells are the smallest unit of organism, animal or plant. The center of life of a cell is
called the nucleus. Inside the nucleus, there are certain objects called chromosomes.
The chromosomes again have a chain-like structure called DNA (Deoxyribo Nucleic
Acid). This DNA is divided into many parts. One specific part is called a gene. These
genes carry different properties of animals or plants. That is, how the animal or plant
develops, the shape of the shape is stored in the DNA sequence of the cell.
Genetic engineering, also called Genetic modification or Genetic manipulation, is the
direct manipulation of an organism‟s genes using biotechnology. It is a set of
technologies used to change the genetic makeup of cells, including the transfer of
genes within and across species boundaries to produce improved or novel organisms.
In other words, Genetic engineering is a process that alters the genetic structure of an
organism by either removing or introducing DNA. Genetic engineering takes the gene
directly from one organism and delivers it to the other. This is much faster, can be
used to insert any genes from any organism and prevents other undesirable genes
from also being added.
 An organism that is generated through genetic engineering is considered to be
genetically modified (GM) and the resulting entity is a genetically modified
organism (GMO).
Process of Genetic Engineering:
Creating a GMO is a multi-step process. They are-
 Genetic engineers must first choose what gene they wish to insert into the
organism.
 New DNA is obtained by either isolating and copying the genetic material of
interest using recombinant DNA methods or by artificially synthesizing the
DNA.
 A construct is usually created and used to insert this DNA into the host
organism. As well as inserting genes, the process can be used to remove, or
“knock out”, genes.
 The new DNA can be inserted randomly, or targeted to a specific part of the
genome.
 The first recombinant DNA molecule was made by Paul Berg in 1972 by
combining DNA from the monkey virus SV40 with the lambda virus.
How does genetic engineering work?
 To help explain the process of genetic engineering we have taken the example of
insulin, a protein that helps regulate the sugar levels in our blood.
 Normally insulin is produced in the pancreas, but in people with type 1 diabetes
there is a problem with insulin production.
 People with diabetes therefore have to inject insulin to control their blood sugar
levels.
 Genetic engineering has been used to produce a type of insulin, very similar to
our own, from yeast and bacteria like E. Coli.
 This genetically modified insulin, „Humulin‟ was licensed for human use in
1982.
Uses of Genetic Engineering:
 To produce insulin
 To produce human growth hormone
 To produce vaccines
 To produce genetically modified food
 To produce genetically modified livestock
 To develop Important tools for natural scientists
Knowledge Based Questions:
 What is bioinformatics?
 What is genetic engineering?
Comprehension Based Questions:
 b. Explain the technology used to produce advanced varieties of crops.
 b. “Diabetes Patients are being benefited by recent trends of Information
Technology” – Explain.
 b. Explain the data used in bioinformatics.
 b. “Database is used in bioinformatics” -explain.
Read the stem and answer the following questions:
Mr. Mokhles is a fish specialist by profession. He uses new technology to meet the
shortage of fish in the country and produces new species of fish.
 c) Describe the technology of fish production as mentioned in the stem.
Read the stem and answer the following questions:
Mr. Shafiq researched with litchi in his laboratory in order to keep the tradition of
Dinajpur and preserved its results. He has set up a machine at the entrance of the
laboratory where if the authorized person keep looking for a particular time can enter.
 d) Which technology did Mr. Shafiq use for his research work? Analyze it‟s
application areas.
Read the stem and answer the following questions:
Dr. Khalil is researching with a technology to discover more crop producing rice to
meet the country‟s food shortage. His assistant tries to get information about his
research from a computer without his permission.
 c) Explain the technology used by Dr. Khalil‟s research.
Multiple Choice Questions:
1. Which of the following is used in bioinformatics?
a) SQL b) LISP c) CLISP d) PROLOG
2. Which is the feature of bioinformatics?
a) Storing small data b) Combination of biological data
c) Use of nanotechnology d) Technology dependent security
3. The application of computer technology to the management of biological
information is-
a) Bioinformatics b) Genetic engineering c) Cryosurgery d) Biometrics
4. What is used for gene finding studies?
a) Bioinformatics b) Genetic engineering c) Cryosurgery d) Biometrics
5. Which technology is used to discover the causes of various complex diseases?
a) Bioinformatics b) Genetic engineering c) Cryosurgery d) Biometrics
6. The things related to Bioinformatics are-
i. Biology ii. Statistics iii. Computer Science
Which one is correct? a) i & ii b) i & iii c) ii & iii d) i, ii & iii
7. Application areas of Bioinformatics are-
i. Biotechnology ii. Creating germ-weapons iii. Aerospace Research
Which one is correct? a) i & ii b) i & iii c) ii & iii d) i, ii & iii
8. What is the technique of DNA manipulation of an animal?
a) Bioinformatics b) Genetic engineering c) Nanotechnology d) Biometrics
9. Through Genetic Engineering –
i. New genomes of organisms can be discovered
ii. Insulin can be made commercially
iii. Very easy to identify the person
Which one is correct? a) i & ii b) i & iii c) ii & iii d) i, ii & iii
10. The steps for recombinant DNA technology are-
i. DNA selection ii. Carrier selection of DNA iii. DNA fragmentation
Which one is correct?; a) i & ii b) i & iii c) ii & iii d) i, ii & iii
11. Which one is application area of genetic engineering?
a) Medical b) Security c) Sport d) Software
12. What is the technique of creating new types of chromosomes?
a) Bioinformatics b) Genetic engineering c) Cryosurgery d) Biometrics
13. Which technology is used in high yielding crop production?
a) Bioinformatics b) Genetic engineering c) Nanotechnology d) Biometrics
14. Who is the father of Genetic engineering?
a) Jack Williamson b) Paul berg c) Stanley Cohen d) Marshal McLuhan
15. Genetic engineering successfully applied in –
i. Industries ii. Medical field iii. the field of agriculture
Which one is correct? a) i & ii b) i & iii c) ii & iii d) i, ii & iii

First Chapter Lesson-9: Nanotechnology and Its Application areas.


Nanotechnology:The concepts that seeded nanotechnology were first discussed in
1959 by renowned physicist Richard Feynman in his talk There‟s Plenty of Room at
the Bottom, in which he described the possibility of synthesis via direct manipulation
of atoms.
According to Online Dictionary,-
 “Nanotechnology is a branch of technology where manipulation of matter on an
atomic and molecular scale to create many new materials and devices.”
In other words, Nanotechnology is science, engineering, and technology conducted at
the nanoscale, which is about 1 to 100 nanometers.
 It‟s hard to imagine just how small nanotechnology is. One nanometer is a
billionth of a meter, or 10-9 of a meter. Here are a few illustrative examples:
 There are 25,400,000 nanometers in an inch
 A sheet of newspaper is about 100,000 nanometers thick
 On a comparative scale, if a marble were a nanometer, then one meter would be
the size of the Earth
Two main approaches are used in nanotechnology. In the “bottom-up” approach,
materials and devices are built from molecular components which assemble
themselves chemically by principles of molecular recognition. In the “top-down”
approach, nano-objects are constructed from larger entities without atomic-level
control.
Uses of Nanotechnology:
 Computer Hardware Manufacture: Nanotechnology is also related to
computers. The processor that is inside the computer is a circuit of numerous
small nanometer scale. And it is used in nanotechnology. In Intel processors, the
circuit is patterned on silicon and its current size is 100 nanometers. In the
future, its size will be 50 nanometers. The capacity to store data on a computer‟s
hard disk is increasing day by day due to the application of nanotechnology.
 Nano Robot: The study of the creation of tiny robots using nanotechnology is
under way, which will help the surgery of the human body.
 Electronic Devices: As a result of the use of nanotechnology, electronics
devices are small in size, light in weight and energy-efficient.
 Fuel Cell: Nanotechnology is being used to create low-cost fuels, and fuel cells
for various types of batteries.
 Packaging & plastering: Nanotechnology is being used in packaging and
plastering of various food products.
 Drug: Nanotechnology is being used in the pharmaceutical industry to make
smart drugs.
 Sports Tools: Nanotechnology is being used to increase the stability of tennis
balls, to keep the direction of the golf ball in the air, to increase the strength and
stability of the racket.
 Textile Industry: Nanotechnology is being used to adjust the weight and
density of fabrics in the textile industry.
 Artificial Limbs: With the help of nanotechnology, it is possible to create
various artificial Limbs.
 Titanium Dioxide: Nanotechnology is used in the production of titanium
dioxide which is used in sunscreen.
 Air Purification: With the help of nanotechnology through chemicals reaction,
air purification can be done by converting harmful smoke emitted from the
factory to non-harmful gas.
 Space Exploration: Nanotechnology is used to lighten the various objects used
in space operations.
Advantages of Nanotechnology:
 Longer lasting, small in size and light weight devices can be manufactured with
this technology.
 “Smart drug” is an implementation of nanotechnology that helps cure people
faster and without the side effects.
 Revolutionary development in electronics industry with the invention of Nano
transistor, Nano diode, plasma display etc.
 Batteries, fuel cells, and solar cells can be built smaller but can be made to be
more effective with this technology
Disadvantages of Nanotechnology:
 Atomic weapons can now be more accessible and made to be more powerful and
more destructive. These can also become more accessible with nanotechnology.
 Presently, nanotechnology is very expensive and developing it can cost you a lot
of money
 Nanoparticles are harmful to the human body.
Knowledge Based Questions:
 What is Nanotechnology?
Comprehension Based Questions:
 b. Explain the technology of molecular level research.
 b. “Nanotechnology can be harmful to health”-Explain.
Read the stem and answer the question:
Chips are very favourite to everyone. A special technology is used during Chips
packaging. To ensure the safety of the chips factory, a device has been set up to give
fingerprints at the entrance.
 d) Analyze your opinion with the advantages and disadvantages of the
technology used in the chipset.
Read the stem and answer the question:
Scientists at the research firm Alpha are trying to create a molecular level device for
applying drugs directly to diseased cells. They create a simulated environment to
monitor the internal structure and cells of the brain.
 d) Analyze how the technology of making device mentioned in the stem has an
impact on the food industry.
Read the stem and answer the question:
Mr. Shihab is an aviator. He purchased a 1-terabyte hard disk from a computer fair. He
was surprised to find it was quite small. Due to the advancement of technology, the
size of various devices is getting smaller. Now airplane training is provided in a
computer controlled environment without the use of real aircraft.
 c) Describe the technology that is being used to increase the capacity of small-
scale hard disk.
Multiple Choice Questions:
1. 1 Nano Equivalent is-
a) one hundred percent of a billion b) one percent of a million
c) one-tenth of a million d) one-tenth of a billion
2. One nanometer is equal to how many meters?
a) 10-6 m b) 10-7 m c) 10-8 m d) 10-9 m
3. At the molecular level, the science of changing and controlling substances is called
a) Genetic engineering b) Nuclear engineering c) Bioinformatics d)
Nanotechnology
4. What is the father of nanotechnology?
a) Johannes Mendes b) Louis Pastor c) Richard Fineman d) Marshall MacLuhan
5. How many nanometers are less than the dimensions of objects in which
nanotechnology is employed?
a) 1 b) 10 c) 100 d) 10000

First Chapter Lesson-10: Ethical Use of ICT & Impact of ICT on Social Life.

Ethical Use of ICT:


Ethics is a set of moral principles that govern the behavior of a group or individual.
Therefore, computer ethics is set of moral principles that regulate the use of
computers. Some common issues of computer ethics include intellectual property
rights (such as copyrighted electronic content), privacy concerns, and how computers
affect society.
For example, while it is easy to duplicate copyrighted electronic content, computer
ethics would suggest that it is wrong to do so without the author‟s approval. And while
it may be possible to access someone‟s personal information on a computer system,
computer ethics would advise that such an action is unethical.
Cyber crime:
Cyber crime encompasses any criminal act dealing with computers and networks.
Additionally, cyber crime also includes traditional crimes conducted through the
Internet.
Type of Cybercrime:
 Computer Fraud: Intentional deception for personal gain via the use of computer
systems.
 Privacy violation: Exposing personal information such as email addresses,
phone number, account details, etc. on social media, websites, etc.
 Identity Theft: Stealing personal information from somebody and impersonating
that person.
 Sharing copyrighted files/information: This involves distributing copyright
protected files such as eBooks and computer programs etc.
 Electronic funds transfer: This involves gaining an un-authorized access to bank
computer networks and making illegal fund transfers.
 Electronic money laundering: This involves the use of the computer to launder
money.
 ATM Fraud: This involves intercepting ATM card details such as account
number and PIN numbers. These details are then used to withdraw funds from
the intercepted accounts.
 Denial of Service Attacks: This involves the use of computers in multiple
locations to attack servers with a view of shutting them down.
 Spam: Sending unauthorized emails. These emails usually contain
advertisements.
Cyber attack:
A cyber attack is an assault launched by cyber criminals using one or more computers
against a single or multiple computers or networks. A cyber attack can maliciously
disable computers, steal data, or use a breached computer as a launch point for other
attacks. Cyber criminals use a variety of methods, including malware, phishing,
ransomware, denial of service, among other methods.
Hacking:
Hacking generally refers to unauthorized access into a computer or a network.
Hacking can also refer to non-malicious activities, usually involving unusual or
improvised alterations to equipment or processes. Or Hacking is identifying and
exploiting weaknesses in computer systems and/or computer networks.
Ethical Hacking is about improving the security of computer systems and/or computer
networks.
 Ethical Hacking is legal.
 The person engaged in hacking activities is known as a hacker. Hackers are
usually skilled computer programmers with knowledge of computer security.
This hacker may alter system or security features to accomplish a goal that
differs from the original purpose of the system.
Hackers are classified according to the intent of their actions. The following list
classifies hackers according to their intent.
Ethical Hacker (White hat):
 A hacker who gains access to systems with a view to fix the identified
weaknesses. They may also perform penetration Testing and vulnerability
assessments.
Cracker (Black hat):
 A hacker who gains unauthorized access to computer systems for personal gain.
The intent is usually to steal corporate data, violate privacy rights, transfer
funds from bank accounts etc.What is Hacking ? An Introduction
Grey hat:
 A hacker who is in between ethical and black hat hackers. He/she breaks into
computer systems without authority with a view to identify weaknesses and
reveal them to the system owner.
Script kiddies:
 A non-skilled person who gains access to computer systems using already made
tools.
Hacktivist:
 A hacker who use hacking to send social, religious, and political, etc. messages.
This is usually done by hijacking websites and leaving the message on the
hijacked website.
Phreaker:
 A hacker who identifies and exploits weaknesses in telephones instead of
computers.
Spamming:
Spamming is the use of electronic messaging systems like e-mails and other digital
delivery systems and broadcast media to send unwanted bulk messages
indiscriminately.
 The term spamming is also applied to other media like in internet forums,
instant messaging, and mobile text messaging, social networking spam, junk fax
transmissions, television advertising and sharing network spam.
 Spamming (especially e-mail spam) is very common because of the economics.
Spam advertisers have little to no operating costs and so need only a minute
response rate to make a profit. Most spam are commercial advertising, but some
contain viruses, adware, or scams.
Spoofing:
A technique used to gain unauthorized access to computers, whereby the intruder
sends messages to a computer with an IP address indicating that the message is
coming from a trusted host. To engage in IP spoofing, a hacker must first use a variety
of techniques to find an IP address of a trusted host and then modify the packet
headers so that it appears that the packets are coming from that host.
Phishing:
Phishing is the act of sending an email to a user falsely claiming to be an established
legitimate enterprise in an attempt to scam the user into surrendering private
information that will be used for identity theft.
 Phishing email will typically direct the user to visit a website where they are
asked to update personal information, such as a password, credit card, social
security, or bank account numbers, that the legitimate organization already has.
The website, however, is bogus and will capture and steal any information the
user enters on the page (see “website spoofing”).
Plagiarism:
Plagiarism is the “wrongful appropriation” and “stealing and publication” of another
author‟s “language, thoughts, ideas, or expressions” and the representation of them as
one‟s own original work.
 Plagiarism is considered academic dishonesty and a breach of journalistic ethics.
Impact of ICT on Social Life:
There are many positive and Negative impacts:
Positive Impact of ICT on Social Life:
 ICT has brought the world together through social networking sites.
 ICT has made researching information easier, as information can be found by
looking over the internet.
 Through social networking people can speak to family and friends from across
the globe.
 ICT has created many jobs for the people who are able to communicate and
work away from an office which has made working from home a more popular
choice.
Negative Impact of ICT on Social Life:
 Children and Teenagers spend most of their free time using computers, which
affects their social development as they will lack the social skills to speak
confidently in school or work.
 ICT can also affect people‟s personal health, as they aren‟t getting enough
exercise as they are spending most of their free time indoors on computers
instead of going outside.
 Small local businesses are being affected by the effects of ICT as people would
rather shop online which is causing smaller businesses that aren‟t online to close
down as they are losing revenue and can‟t afford to stay open.
 Many older people are feeling pressured and overwhelmed with learning how to
use new technology and with many services such as Banking, Bill paying and
shopping rapidly becoming internet based, some older people are struggling
accessing these services.
ICT has caused many legal impacts. Many media forms such as Movies and Music
have become easily available across the internet, which has led to copyright material
to become easy to steal.
There are also ethical impacts to ICT. With personal information being stored on
computers, personal privacy has become an issue.
Knowledge Based Questions:
 What is software piracy?
 What is cyber crime?
 What is cyber attack?
 What is hacking?
 What is spamming?
 What is spoofing?
 What is fishing?
 What is plagiarism?
Comprehension Based Questions:
 b. Explain the relation of hacking with ethics.
 b. “Hacking is unethical activities”-explain.
 b. “Cyber Crime is one kind of threat to the technology”-explain.
 b. “Implementation of ICT has made social life easy and modern” -explain.

You might also like