Page 154 - Robotics and AI class 10
P. 154

Cyber Sabotage is caused through computer virus, with the primary objective of Data Control or Data Loss or Data
        Leak, or for disrupting operations. Ransomware and cyber attack are some of the examples. Computer viruses
        normally are attached to executable host files, which executes their viral code when opened. Subsequently, once
        in the system, the code then spreads via emails, file-sharing programs, networks, drives, till it is in control of the
        information that it needs to sabotage, and acts accordingly.


        Responsibility for the Reliability of Output
        The ability of computers to malfunction or to be abused and manipulated, has put a question mark on the
        reliability of the outputs given by computers.

        Making False Claims for Computers

        Making  misleading  claims  about  the  computers,  that  they  can  do  specific  jobs,  which  it  actually  cannot,  is
        something everyone needs to be careful about. The computers cannot act or decide as wisely as humans in a
        given situation, as they can only go by the facts, but human’s can understand the emotions behind a situation
        and can take a more appropriate decision.

        The Degradation of Work

        The computers are rendering skilled work done by people useless or less useful over time. The threat is that over
        the period of time a lot of specialised work done by humans would be taken over by computers, and the value
        of a skilled workforce would reduce.






                  At a Glance


              • Machine intelligence has long been a fascination and pursuit of scientists, researchers, and technologists seeking
              to create artificial beings capable of exhibiting intelligent behaviour.
              • Humans can quickly adapt to new situations and learn from different domains, whereas machines need instructions
              or retraining to handle new tasks.
              • The Turing Test got its name from Alan Turing’s name who was a computer scientist, mathematician, cryptanalyst
              and theoretical biologist.
              • Humans can come up with new ideas and be imaginative, while machines rely on predefined rules and patterns and
              don't have their own creative abilities.
              • CAPTCHA is one type of Turing Test to find out that the website which is required to be accessed is by a human or
              a computer.
              • Hacking is an act to break the security code and enter a computer system or network in an attempt to exploit the
              information available for the illicit purpose.
              • Cybersecurity is a combination of technologies, practices and processes designed to protect data from getting
              damaged or someone getting unauthorized access to.
              • Cyberspace is an unreal, non physical, virtual complex environment on the Internet, where software, hardware and
              people interact by means of technology through devices and network connections on it.
              • Malware, which are files or programs designed to harm a computer, such as Virus, Worms, Trojan horses, Spyware,
              etc.
              • Virus is a type of malicious software or malware which spreads between computers or networks, and causes damage
              to software code and data.





              152     Touchpad Robotics & Artificial Intelligence-X
   149   150   151   152   153   154   155   156   157   158   159