Page 531 - ComputerScience_Class_11
P. 531
• The AR-based mobile app, Ruler App is an on-screen ruler tool for measuring the dimensions of real-time entities
like sofas, beds, tables, chairs, etc.
• Travel apps like World Around Me and Smartify use AR to help travellers plan their location, accommodation options,
etc. according to their budget.
• A popular AR app, Google Earth, provides search capabilities to tourists for getting a three-dimensional view of their
surroundings. It can be zoomed and rotated for better viewing of any particular location.
• AR is also helpful for teachers while explaining complex topics clearly and at a much lesser expense.
Difference between AR and VR
Some of the differences between AR and VR are as follows:
Augmented Reality Virtual Reality
AR technology places virtual 3D objects in the real world. The real world is replaced with a 3D virtual world.
The AR content is overlaid on the detected user location. The detection of user location is not required.
AR requires moderate bandwidth. VR requires higher bandwidth and very low latency.
It can be achieved using a smartphone. A VR headset is needed.
13.2 CYBER SECURITY
Cyber refers to the technology that includes computer systems, networks, programs and data. We are very much
dependent on the Internet for our daily activities. The use of the Internet is no longer restricted to searching for
information, using emails, social networking or entertainment but has also started to include business transactions,
banking, shopping, online jobs and many more. During the pandemic lockdown, even the education field was very
much dependant on the Internet for conducting classes and exams online. However, the extensive use of the Internet
has also led to new crimes committed online, which are called Cyber Crimes.
Cyber Security thus refers to the activity of protecting the computer system, the applications and the data from this
possible threat.
It also encompasses the set of principles and practices designed to protect our computing resources and online
information against cyber threats.
13.2.1 Types of Cyber Security Threats
A cyber security threat involves malicious activities like corrupting or stealing sensitive data or disrupting online
activities by gaining unauthorised access to the network or by the use of malicious codes called computer viruses.
Some of the most common cyber security threats are listed below:
Malware
It is a common term used to represent malicious software used by cyber criminals. Some of the most common malware
which we may have encountered are the virus, worms, Trojan horse, adware and spyware which are discussed below:
• Virus: A computer virus is malware coded with the purpose of disrupting systems. A virus-infected system generally
becomes very slow and its applications take time to open or it gets corrupted.
Computer viruses attach themselves to executable host files and then the code spreads to other documents via
networks, drives, file-sharing programs or infected email attachments.
The most common signs of a virus attack are:
♦ ♦Slowing down of the computer system
♦ ♦Unwanted pop-up windows appearing on computers
♦ ♦Unexpected shut down of the computer or the system hangs
♦ ♦Unusual error messages are displayed on the monitor
Trends in Computing and Ethical Issues 529

