Page 478 - Cs_withBlue_J_C11_Flipbook
P. 478

•  Handheld AR: Mobile devices like smartphones or tablets with the AR app installed also use AR technology.
              •  Holographic display: It uses the light diffraction concept to generate 3D objects in the real world.

              Applications of Augmented Reality
              Some of the applications of augmented reality are as follows:
              •  AR apps like DecorateAR and Dulux Visualizer, are used for planning home decoration ideas by virtually trying
                 different wall colours and textures for furniture, painting, etc.
              •  Medical imaging uses AR which helps surgeons, neurologists, or chemotherapists in their diagnosis.
              •  The AR-based mobile app, Ruler App is an on-screen ruler tool for measuring the dimensions of real-time entities
                 like sofas, beds, tables, chairs, etc.
              •  Travel apps like World Around Me, Smartify use AR in helping travellers plan their location, accommodation options,
                 etc. according to their budget.
              •  A popular AR app, Google Earth, provides search capabilities to tourists for getting a three-dimensional view of their
                 surroundings. It can be zoomed and rotated for better viewing of any particular location.

              •  AR is also helpful for teachers while explaining complex topics clearly and at a much lesser expense.
              Difference between AR and VR
              Some of the differences between AR and VR are as follows:

                                     Augmented Reality                               Virtual Reality

                      AR technology places virtual 3D objects in the real world.  The real world is replaced with a 3D virtual world.
                      The AR content is overlaid on the detected user location.  The detection of user location is not required.
                      A higher bandwidth upward of 100 Mbps is required.  A lower bandwidth of at least 50 Mbps is required.
                      It can be achieved using a smartphone.          A VR headset is needed.


                   16.2 CYBER SECURITY
              Cyber refers to the technology that includes computer systems, networks, programs, and data. We are very much
              dependent on the Internet for our daily activities. The use of the internet is not more restricted to searching for
              information, using e-mails, social networking or entertainment but has also started to include business transactions,
              banking, shopping, online jobs and many more. Ensuing the pandemic lockdown, even the education field was very
              much dependant on the Internet for conducting classes and exams online. However, the extensive use of the Internet
              has also led to new crimes committed online, which are called Cyber Crimes.
              Cyber Security thus refers to the activity of protecting the computer system, the applications, and the data from this
              possible threat.
              It also encompasses the set of principles  and practices  designed to protect  our computing  resources  and online
              information against cyber threats.


              16.2.1  Types of Cyber Security Threats
              A cyber security threat involves malicious  activities  like corrupting or stealing  sensitive  data or disrupting online
              activities by gaining unauthorised access to the network or by the use of malicious codes called computer viruses.

              Some of the most common cyber security threats are listed below:
              1.  Malware: It is a common term used to represent malicious software used by cyber criminals. Some of the most
                 common malware which we may have encountered are the virus, worms, Trojan horse, adware and spyware which
                 are discussed below:
                 •   Virus:  A  computer  virus  is  malware  coded  with  the  purpose  of  disrupting  systems.  A  virus-infected  system
                   generally becomes very slow and its applications take time to open or it gets corrupted.


                476476  Touchpad Computer Science-XI
   473   474   475   476   477   478   479   480   481   482   483