Page 430 - computer science (868) class 11
P. 430
• Handheld AR: Mobile devices like smartphones or tablets with the AR app installed also use AR technology.
• Holographic display: It uses the light diffraction concept to generate 3D objects in the real world.
Applications of Augmented Reality
Some of the applications of augmented reality are as follows:
• AR apps like DecorateAR and Dulux Visualizer, are used for planning home decoration ideas by virtually trying
different wall colours and textures for furniture, painting, etc.
• Medical imaging uses AR which helps surgeons, neurologists, or chemotherapists in their diagnosis.
• The AR-based mobile app, Ruler App is an on-screen ruler tool for measuring the dimensions of real-time entities
like sofas, beds, tables, chairs, etc.
• Travel apps like World Around Me, Smartify use AR in helping travellers plan their location, accommodation options,
etc. according to their budget.
• A popular AR app, Google Earth, provides search capabilities to tourists for getting a three-dimensional view of their
surroundings. It can be zoomed and rotated for better viewing of any particular location.
• AR is also helpful for teachers while explaining complex topics clearly and at a much lesser expense.
Difference between AR and VR
Some of the differences between AR and VR are as follows:
Augmented Reality Virtual Reality
AR technology places virtual 3D objects in the real world. The real world is replaced with a 3D virtual world.
The AR content is overlaid on the detected user location. The detection of user location is not required.
A higher bandwidth upward of 100 Mbps is required. A lower bandwidth of at least 50 Mbps is required.
It can be achieved using a smartphone. A VR headset is needed.
14.2 CYBER SECURITY
Cyber refers to the technology that includes computer systems, networks, programs, and data. We are very much
dependent on the Internet for our daily activities. The use of the internet is not more restricted to searching for
information, using e-mails, social networking or entertainment but has also started to include business transactions,
banking, shopping, online jobs and many more. Ensuing the pandemic lockdown, even the education field was very
much dependant on the Internet for conducting classes and exams online. However, the extensive use of the Internet
has also led to new crimes committed online, which are called Cyber Crimes.
Cyber Security thus refers to the activity of protecting the computer system, the applications, and the data from this
possible threat.
It also encompasses the set of principles and practices designed to protect our computing resources and online
information against cyber threats.
14.2.1 Types of Cyber Security Threats
A cyber security threat involves malicious activities like corrupting or stealing sensitive data or disrupting online
activities by gaining unauthorised access to the network or by the use of malicious codes called computer viruses.
Some of the most common cyber security threats are listed below:
1. Malware: It is a common term used to represent malicious software used by cyber criminals. Some of the most
common malware which we may have encountered are the virus, worms, Trojan horse, adware and spyware which
are discussed below:
• Virus: A computer virus is malware coded with the purpose of disrupting systems. A virus-infected system
generally becomes very slow and its applications take time to open or it gets corrupted. Computer viruses attach
428428 Touchpad Computer Science-XI

