Page 531 - ComputerScience_Class_11
P. 531

•  The AR-based mobile app, Ruler App is an on-screen ruler tool for measuring the dimensions of real-time entities
                   like sofas, beds, tables, chairs, etc.
                 •  Travel apps like World Around Me and Smartify use AR to help travellers plan their location, accommodation options,
                   etc. according to their budget.
                 •  A popular AR app, Google Earth, provides search capabilities to tourists for getting a three-dimensional view of their
                   surroundings. It can be zoomed and rotated for better viewing of any particular location.

                 •  AR is also helpful for teachers while explaining complex topics clearly and at a much lesser expense.
                 Difference between AR and VR
                 Some of the differences between AR and VR are as follows:

                                        Augmented Reality                              Virtual Reality

                        AR technology places virtual 3D objects in the real world.  The real world is replaced with a 3D virtual world.
                        The AR content is overlaid on the detected user location.  The detection of user location is not required.
                        AR requires moderate bandwidth.                  VR requires higher bandwidth and very low latency.
                        It can be achieved using a smartphone.           A VR headset is needed.


                     13.2 CYBER SECURITY
                 Cyber refers to the technology that includes computer systems, networks, programs and data. We are very much
                 dependent on the Internet for our daily activities. The use of the Internet is no longer restricted to searching for
                 information, using emails, social networking or entertainment but has also started to include business transactions,
                 banking, shopping, online jobs and many more. During the pandemic lockdown, even the education field was very
                 much dependant on the Internet for conducting classes and exams online. However, the extensive use of the Internet
                 has also led to new crimes committed online, which are called Cyber Crimes.
                 Cyber Security thus refers to the activity of protecting the computer system, the applications and the data from this
                 possible threat.
                 It also encompasses the set of principles  and practices  designed to protect  our computing  resources  and online
                 information against cyber threats.

                 13.2.1 Types of Cyber Security Threats
                 A cyber security threat involves malicious  activities  like corrupting or stealing  sensitive  data or disrupting online
                 activities by gaining unauthorised access to the network or by the use of malicious codes called computer viruses.
                 Some of the most common cyber security threats are listed below:


                 Malware
                 It is a common term used to represent malicious software used by cyber criminals. Some of the most common malware
                 which we may have encountered are the virus, worms, Trojan horse, adware and spyware which are discussed below:
                 •   Virus: A computer virus is malware coded with the purpose of disrupting systems. A virus-infected system generally
                   becomes very slow and its applications take time to open or it gets corrupted.
                   Computer viruses attach themselves to executable host files and then the code spreads to other documents via
                   networks, drives, file-sharing programs or infected email attachments.
                   The most common signs of a virus attack are:
                   ♦ ♦Slowing down of the computer system
                   ♦ ♦Unwanted pop-up windows appearing on computers
                   ♦ ♦Unexpected shut down of the computer or the system hangs
                   ♦ ♦Unusual error messages are displayed on the monitor




                                                                                 Trends in Computing and Ethical Issues   529
   526   527   528   529   530   531   532   533   534   535   536