0% found this document useful (0 votes)
256 views

Digital Fluency Complete Notes All 3 Modules

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
256 views

Digital Fluency Complete Notes All 3 Modules

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 26

RAMAIAH INSTITUTE OF BUSINESS STUDIES

Module 1 : EMERGING TECHNOLOGIES

1. ARTIFICIAL INTELLIGENCE, MACHINE LEARNING, DEEP LEARNING

What is AI?

AI is techniques that help machines and computers mimic human behaviour. Or in simple
words, AI is intelligence demonstrated by machines, as opposed to the natural intelligence
displayed by humans or animals. At the highest level, AI is a device being smart, machine
acting like a human. It is the simulation of human intelligence processes by machines,
especially computer systems.

Artificial Intelligence is when software or a particular model developed can perform complex
tasks on its own without requiring any assistance from humans.

What is Machine Learning (ML)?

ML is the general techniques or variety of techniques that make the device smart. It is a
branch of artificial intelligence based on the idea that systems can learn from data, identify
patterns and make decisions with minimal human intervention.

Machine learning is a way of “training” an algorithm so that it can learn how. “Training”
involves feeding huge amounts of data to the algorithm and allowing the algorithm to adjust
itself and improve.

What is Deep Learning (DL)?

Deep learning is a subset of machine learning, which is essentially a neural network with
three or more layers. These neural networks attempt to simulate the behaviour of the
human brain, allowing it to “learn” from large amounts of data.

Deep learning was inspired by the structure and function of the brain, namely the
interconnecting of many neurons. Artificial Neural Networks (ANNs) are algorithms that
mimic the biological structure of the brain.

Explain applications of AI

1. Typing using software: While typing reports using any word-processor, wrong spellings
or incorrect grammar is highlighted. Auto-complete options of previously used words, or
auto-suggest of commonly used words while typing are given.

2. Shopping online/ Watching online: Depending on the user profile, the system shows ads,
products or suggests programs to watch.

3. Chatbots : Chatbots are used universally today on many websites to interact with the
human users that arrive on the specific sites.
RAMAIAH INSTITUTE OF BUSINESS STUDIES

4. Robotics: Today, most of the industrial world is using robots to automate repetitive tasks.
We see robots used to assemble cars, pack food items, paint vehicles and to even serve as
your personal assistants/servants in homes.

5. Real Time Translation: Most of us use Google translate to get text translated from one
language to another. It is a boon in a country like India, where we have a number of local
languages.

6. Digital Assistants (Virtual Companions) like Alexa and Siri are being used in homes to
converse and perform simple tasks. In certain countries, virtual pets and companions are
becoming popular

7. Autonomous vehicles, autonomous robots, autonomous warehouse and factory systems


and autonomous drones are some examples of autonomous systems.

8. Gaming and Simulation is fast changing the ways in which we have been traditionally
doing things. Especially in the fields of training, marketing and entertainment, Augmented
Reality (AR) and Virtual Reality (VR) are two technologies that are forging a revolution.

What is AR & VR?

Augmented reality (AR) is an interactive experience of a real-world environment where the


objects that reside in the real world are enhanced by computer-generated information.

Virtual reality (VR) is a simulated experience that can be similar to or completely different
from the real world. Both AR and VR use multiple senses including visual (sight, eyes),
auditory (hearing, ears), haptic (touch), somatosensory (touch, position and movement) and
olfactory(smell, nose).

What are the two categories of AI?


AI has two categories, general and narrow.
1. General AI would have all of the characteristics of human intelligence, including the
capacities mentioned above.

2. Narrow AI exhibits some facet(s) of human intelligence, and can do that facet extremely
well, but is lacking in other areas. A machine that’s great at recognizing images, but nothing
else, would be an example of narrow AI.

What are neural networks?

Neural Networks is the old name for Deep Learning. Neural networks are a means of doing
machine learning, in which a computer learns to perform some task by analyzing training
examples. Usually, the examples have been hand-labeled in advance. An object recognition
system, for instance, might be fed thousands of labeled images of cars, houses, coffee cups,
and so on, and it would find visual patterns in the images that consistently correlate with
particular labels.
RAMAIAH INSTITUTE OF BUSINESS STUDIES

Modelled loosely on the human brain, a neural net consists of thousands of simple processing
nodes that are densely interconnected. Most of today’s neural nets are organized into layers
of nodes, and they’re “feed-forward,” meaning that data moves through them in only one
direction. An individual node might be connected to several nodes in the layer beneath it,
from which it receives data, and several nodes in the layer above it, to which it sends data.

Explain types of Machine Learning or Machine Learning Methods:

Supervised Learning:
Supervised learning is commonly used in applications where historical data predicts likely
future events. For example, it can anticipate when credit card transactions are likely to be
fraudulent or which insurance customer is likely to file a claim.

The most common fields of use for supervised learning are price prediction and trend
forecasting in sales, retail commerce, and stock trading. In both cases, an algorithm uses
incoming data to assess the possibility and calculate possible outcomes.

Unsupervised Learning:
Unsupervised learning works well on transactional data. For example, it can identify
segments of customers with similar attributes who can then be treated similarly in marketing
campaigns. Or it can find the main attributes that separate customer segments from each
other.

Semi-supervised Learning:
Semi-supervised learning is useful when the cost is too high to allow for a fully supervised
process. Examples of this include identifying a person's face on a web cam. Legal and
Healthcare industries, among others, manage web content classification, image, and speech
analysis with the help of semi-supervised learning.

Reinforcement Learning: This is often used for robotics, gaming and navigation. With
reinforcement learning, the system discovers through trial and error which actions yield the
greatest rewards. Modern NPCs (non-playing characters) and other video games use this type
of machine learning model a lot. For example, the collision detection feature uses this type of
ML algorithm for the moving vehicles and people in the Grand Theft Auto series

What are the applications of Machine Learning? Or Explain the areas where ML is
used or Who Uses Machine Learning ?
1. Financial Services: Banks and other businesses in the financial industry use machine
learning technology for two key purposes: to identify important insights in data, and prevent
fraud.
RAMAIAH INSTITUTE OF BUSINESS STUDIES

2. Government Agencies: Government agencies such as public safety and utilities have a
particular need for machine learning since they have multiple sources of data that can be
mined for insights. Analyzing sensor data, for example, identifies ways to increase efficiency
and save money. Machine learning can also help detect fraud and minimize identity theft.
3. Healthcare: Machine learning is a fast-growing trend in the health care industry, thanks to
the advent of wearable devices and sensors that can use data to assess a patient's health in real
time. The technology can also help medical experts analyze data to identify trends or red
flags that may lead to improved diagnoses and treatment.
4. Oil and Gas: Finding new energy sources. Analyzing minerals in the ground. Predicting
refinery sensor failure. Streamlining oil distribution to make it more efficient and cost-
effective.
5. Transportation and Logistics: Analyzing data to identify patterns and trends is key to the
transportation industry, which relies on making routes more efficient and predicting potential
problems to increase profitability.

What are the advantages of AI?


 Massive job opportunities created by AI
 Simplifies completion of looping or repetitive tasks that humans need to perform
without making errors.
 Artificial Intelligence, cannot tire and hence has the capacity to work all day long on a
particular task until the desired results are accomplished.
 They have the ability to perform faster computations compared to human speed on a
wide range of problems with precise results.

What are the disadvantages of AI?

 The construction of Artificial Intelligence models from scratch can sometimes be


timeconsuming and resourcefully exhaustive.
 Building AI models may not be possible on a regular PC and hence requires high end
systems which are expensive
 Maintenance costs in case of malfunctioning of the AI models in peculiar cases can be
annoying to deal with and solve.
 AI cannot be used to accomplish more superior and intellectual tasks, as of today.

What do you understand by the term robotics?

Robotics is a combined branch of engineering and science which deals with the study of
development, operation, and control of intelligent robots. Robotics is a part of Artificial
intelligence. Robotics technology is used for the development of machines which can
perform a complex human task in a very efficient way.

What are various types of sensors used in the robotics?

Various types of sensors used in robots include light sensors, sound sensors, temperature
sensors, proximity sensors, and acceleration and navigation sensors.
RAMAIAH INSTITUTE OF BUSINESS STUDIES

What can a digital assistant do?

A digital assistant pulls data from multiple sources and puts it into context. Advanced natural
language processing gives it the ability to process what you are saying or typing. Advanced
natural language understanding (NLU) gives it the ability to parse what you say or type and
then generate accurate answers

Is a chatbot a digital assistant?

Data-driven and predictive (Conversational AI) chatbots are also called a Virtual Assistant or
Digital Assistant. Apple's Siri and Amazon's Alexa are examples of consumer-oriented,
datadriven, predictive AI chatbots

What is autonomous software?

An autonomous system is one that can achieve a given set of goals in a changing environment
– gathering information about the environment and working for an extended period of time
without human control or intervention.

What technologies are needed for autonomous vehicles?

There are several critical technologies behind safe and efficient autonomous-vehicle
operation—AI, safety and security, cameras, network infrastructure, and the sensor
technologies radar and lidar, or laser-light radar.

Why are autonomous things important?

Autonomous things are fundamentally important because they represent the first real
disconnection of machines from explicit human guidance. Humans are used to programming
things, but are not used to them acting in autonomous ways. Self-driving vehicles are still
making their way onto the roads.
RAMAIAH INSTITUTE OF BUSINESS STUDIES

2. DATABASE MANAGEMENT FOR DATA SCIENCE, BIG DATA ANALYTICS


What is Data?
Data are individual facts, statistics, or items of information, often numeric, that are collected
through observation. In a more technical sense, data are a set of values of qualitative or
quantitative variables about one or more persons or objects, while a datum is a single value of
a single variable.

What are the different sources of Data ?

What is Database ?
Database A database is defined as a structured set of data held in a computer’s memory or on
the cloud that is accessible in various ways.

What is DBMS ?
Database Management Systems (DBMS) refer to the technology solution used to optimize
and manage the storage and retrieval of data from databases.

Explain Types of Databases


Relational database:
It is the most efficient way to access structured information. The data is organized into a set
of tables that has columns and rows.

Object-oriented database:
Here, the data is represented in the form of objects, as in object-oriented programming.

Distributed database:
It has two or more files located in different places. The database may be in the same physical
location on multiple computers or scattered over different networks.

NoSQL database:
NoSQL is a nonrelational database that contains unstructured and semistructured data. It rose
in popularity as web applications came to be commonly used and became more complex.
RAMAIAH INSTITUTE OF BUSINESS STUDIES

What are the advantages of Database ?

 Advantages of Databases
 Minimum data redundancy
 Improved data security
 Increased consistency
 Lower updating errors
 Reduced costs of data entry, data storage, and data retrieval
 Improved data access using host and query languages.
 Higher data integrity from application programs

What is data science?


Data science is an interdisciplinary field that uses scientific methods, processes, algorithms
and systems to extract knowledge and insights from noisy, structured and unstructured data,
and apply knowledge and actionable insights from data across a broad range of application
domains.

What is the need for Data Science?


The reason why we need data science is the ability to process and interpret data. This enables
companies to make informed decisions around growth, optimization, and performance.
Demand for skilled data scientists is on the rise now and in the next decade.

What is Data Science useful for?


Data science is a process that empowers better business decision-making through
interpreting, modeling, and deployment. This helps in visualizing data that is understandable
for business stakeholders to build future roadmaps and trajectories. Implementing Data
Science for businesses is now a mandate for any business looking to grow.

How Facebook Uses Data Analytics To Understand Your Posts And Recognize Your
Face?
Facial recognition - Facebook uses a DL application called DeepFace to teach it to recognize
people in photos. It says that its most advanced image recognition tool is more successful
than humans in recognizing whether two different images are of the same person or not –
with DeepFace scoring a 97% success rate compared to humans with 96%.

\
RAMAIAH INSTITUTE OF BUSINESS STUDIES

3. Internet of Things (IoT) and Industrial Internet of Things (IIoT)

What is IoT?
IoT is an evolution of mobile, home and embedded applications interconnected to each other.
Using the internet and data analytics, billions of devices connected to each other create an
intelligent system of systems. When these connected devices use cloud computing, analyse
huge amounts of data and provide services, they can change the way in which we live our
lives and conduct our businesses.
The Internet of Things (IoT) describes physical objects (or groups of such objects), that are
embedded with sensors, processing ability, software, and other technologies, and that connect
and exchange data with other devices and systems over the Internet or other communications
networks.

Examples of IoT in Banking


For organizations in retail banking, faster payments, improved operability (to support the
move to open banking) and more responsive mobile services are the main points of focus for
innovation. IoT offers retail banks an opportunity to gather more information on customers,
offer more personalized experiences and improve efficiencies. Here, we look at some novel
examples of IoT in retail banking.

Wearables: Many banks now provide applications for popular wearables like Apple Watch
and FitPay, which is already working with the Bank of America. Some banks have even
launched their own devices, with Barclays unveiling bPay wearable contactless payment
solutions and other wearable bands.

Connected Cars: Connected cars not only have the potential to improve customer
relationships, but also boost revenues. But smarter vehicles represent an opportunity for
banks, too: for example, Idea Bank runs a fleet of cars, each customized with an integrated
security deposit box and an ATM, which can visit the customer, rather than vice versa.

Banking at home: With IoT, it is now possible to pay their bills through Amazon’s Alexa,
Google Home, integrating its API with the smart speaker to enable users to carry out balance
queries and payments through voice commands.

What is Industrial Internet of Things (IIoT)?


Industrial IoT, or the Industrial Internet of Things (IIoT), is a vital element of Industry 4.0.
IIoT harnesses the power of smart machines and real-time analysis to make better use of the
data that industrial machines have been churning out for years. The principal driver of IIoT is
smart machines, for two reasons. The first is that smart machines capture and analyze data in
real-time, which humans cannot. The second is that smart machines communicate their
findings in a manner that is simple and fast, enabling faster and more accurate business
decisions.

Some examples of IIoT can be


1. As simple as a connected rat trap which relays information about catching a rat to a mobile
phone,
2. Slightly complex like a soil sensor which relays data about humidity and nutrient content
to a system,
3. Complex system like smart parking and traffic management
RAMAIAH INSTITUTE OF BUSINESS STUDIES

4. A very complex set-up like a fully automated automobile assembly line relaying data in
realtime to human supervisors.

Explain Difference between IOT and IIOT

What are the benefits of IIOT?


Benefits of IIoT Top benefits include
1. Improvement of Operational Performance : through increased productivity, improved
plant efficiency, asset uptime and quality, reduced operational risks, overhead costs and
changeover times.
2. Ensuring Safety and Compliance : through creating a naturally safer environment and
abiding by health, safety and environment laws; complying with regulatory frameworks like
energy, food and drug laws, labour laws etc.
3. Increasing Flexibility and Agility : through updating and easy reprogramming of
machines and robots to adhere to shifting and increasingly customized customer
requirements.

What are security concerns related to IoT?


Data security and privacy are major concerns related to IoT. These devices are vulnerable to
hacking and cloud endpoints could be used by hackers to attack servers. Software developers
and device designers have to ensure adequate security and privacy measures.

What are examples of IoT used in devices?


Examples include a robotic manufacturing machine, a physical environment sensor (like
temperature, humidity, and light), or a remote-control light switch.
Another example involves measuring the health of each physical system on a car (engine,
brakes, transmission, satellite navigation, etc.) and determining if maintenance can be
delayed (saving money) or brought forward (avoiding breakdown or failure). By doing this, a
positive experience of the car can be maintained.
RAMAIAH INSTITUTE OF BUSINESS STUDIES

4. CLOUD COMPUTING AND ITS SERVICE MODELS

What is Cloud Computing?

The term cloud refers to a network or the internet. It is a technology that uses remote servers
on the internet to store, manage, and access data online rather than local drives. The data can
be anything such as files, images, documents, audio, video, and more.

There are the following operations that we can do using cloud computing:
• Developing new applications and services
• Storage, back up, and recovery of data
• Hosting blogs and websites
• Delivery of software on demand
• Analysis of data
• Streaming videos and audios

What are the Advantages of Cloud Computing?


Cloud computing is a trending technology. Almost every company has switched their
services on cloud to raise the company growth.
Following are some important advantages of Cloud Computing:

1. Back-up and restore data -Once the data is stored in cloud, it is easier to get back-up and
restore that data using the cloud.
2. Improved collaboration- Cloud applications improve collaboration by allowing groups of
people to quickly and easily share information in the cloud via shared storage.
3. Excellent accessibility- Cloud allows us to quickly and easily store and access information
anytime, anywhere in the whole world, using an internet connection.
4. Low maintenance cost- Cloud computing reduces both hardware and software
maintenance costs for organizations.
5. Mobility- Cloud computing allows us to easily access all cloud data via any device.
6. Services in the pay-per-use model -Cloud computing offers Application Programming
Interfaces (APIs) to the users for access services on the cloud and pay the charges as per the
usage of service.
7. Unlimited storage capacity- Cloud offers a huge amount of storing capacity for storing
important data such as documents, images, audio, video, etc. in one place.
8. Data security- Cloud offers many advanced features related to security and ensures that
data is securely stored and handled.

How does cloud computing work?


Cloud Computing works by providing permission to the user to upload and download the
information which stores. We can access the data from anywhere. A user will get the initial
amount of storage at a very low price.

Cloud Computing can be divided into two systems. One is front-end and the other is back-
end. The two ends connect to each other with the help of an internet connection. The backend
RAMAIAH INSTITUTE OF BUSINESS STUDIES

of the cloud is the system and the front end is a computer user or client. The front end of the
system has the application, which is used to access the cloud system. Moreover, the backend
has various computers, hardware, servers, and data storage systems that make the cloud. All
these features and functions managed by the central server. The central server ensures that
everything runs smoothly and in a perfect manner. It is done with the help of software named
Middleware, which also permits the network computer to communicate with each other.

Explain the different Cloud Service Models/ OR What are the various cloud models?
There are three types of cloud service models. They are as follows: -
• Infrastructure as a Service (IaaS)
• Platform as a Service (PaaS)
• Software as a Service (SaaS)

IaaS (Infrastructure as a service) is also known as Hardware as a Service (HaaS). It is a computing


infrastructure managed over the internet. The main advantage of using IaaS is that it helps users to
avoid the cost and complexity of purchasing and managing the physical servers.
PaaS (Platform as a Service) cloud computing platform is created for the programmer to develop,
test, run, and manage the applications.
SaaS (Software as a Service) is also known as “on-demand software”. It is software in which the
applications are hosted by a cloud service provider. Users can access these applications with the help
of an internet connection and a web browser.
RAMAIAH INSTITUTE OF BUSINESS STUDIES

What are the different Types of Cloud?

1. Public Cloud: Public cloud is open to all to store and access information via the Internet using the
pay-per-usage method. In public cloud, computing resources are managed and operated by the Cloud
Service Provider (CSP). Example: Amazon elastic compute cloud (EC2), IBM Smart Cloud
Enterprise, Microsoft, Google App Engine, Windows Azure Services Platform.
2. Private Cloud: Private Cloud is also known as an internal cloud or corporate cloud. It is used by
organizations to build and manage their own data centers internally or by the third party. It can be
deployed using Open source tools such as Open stack and Eucalyptus.
3. Hybrid Cloud: Hybrid Cloud is a combination of the public cloud and the private cloud. We can
say: Hybrid Cloud = Public Cloud + Private Cloud. Hybrid cloud is partially secure because the
services which are running on the public cloud can be accessed by anyone, while the services which
are running on a private cloud can be accessed only by the organization's users. Example: Google
Application Suite (Gmail, Google Apps, and Google Drive), Office 365 (MS Office on the Web and
One Drive), Amazon Web Services.
4. Community Cloud: Community cloud allows systems and services to be accessible by a group of
several organizations to share the information between the organization and a specific community. It
is owned, managed, and operated by one or more organizations in the community, a third party, or a
combination of them. Example: Health Care community cloud.
RAMAIAH INSTITUTE OF BUSINESS STUDIES

5. CYBER SECURITY AND TYPES OF CYBER ATTACK

What is Cyber security?

Cyber security is the application of technologies, processes and controls to protect systems,
networks, programs, devices and data from cyber attacks. It aims to reduce the risk of cyber
attacks and protect against the unauthorised exploitation of systems, networks and
technologies.

Cyber security refers to the specialization of computer network security that consists of
technologies, policies, and procedures that protect networked computer systems from
unauthorized use or harm.

Why do we need Cyber Security?

The increasing reliance of our information-age economies and governments on cyber


(computer-based) infrastructure makes them progressively more vulnerable to cyber attacks
on our computer systems, networks, and data. In their most disruptive form, cyber attacks
target the enterprise, government, military, or other infrastructural assets of a nation or its
citizens. Both the volume and sophistication of cyber threats (cyber warfare, cyber terrorism,
cyber espionage and malicious hacking) are increasing, and pose potent threats to our
enterprise, government, military, or other infrastructural assets.

What is a Cyber Attack?

An offensive action by a malicious actor that is intended to undermine the functions of


networked computers and their related resources, including unauthorized access, unapproved
changes, and malicious destruction. Examples of cyber attacks include Distributed Denial of
Service (DDoS) and Manin-the-Middle (MITM) attacks.

What are the differences among the terms cyber attack, cyber threat & cyber risk?

The terms cyber attack, cyber threat, and cyber risk are interrelated as follows. A cyber attack
is an offensive action, whereas a cyber threat is the possibility that a particular attack may
occur, and the cyber risk associated with the subject threat estimates the probability of
potential losses that may result.

What is malware?

Malware is an umbrella term derived from "malicious software", and refers to any software
that is intrusive (unauthorized access), disruptive, or destructive to computer systems and
networks. Malware may take many forms (executable code, data files) and includes, but is
not limited to, computer viruses, worms, trojan horses (trojans), bots (botnets), spyware
(system monitors, adware, tracking cookies), rogueware (scareware, ransomware), and other
malicious programs. The majority of active malware threats are usually worms or trojans
rather than viruses

What is cyber hygiene?


RAMAIAH INSTITUTE OF BUSINESS STUDIES

Cyber is a colloquial term that refers to best practices and other activities that computer
system administrators and users can undertake to improve their cyber security while engaging
in common online activities, such as web browsing, emailing, texting, etc

What is cyberspace?

Cyberspace is the virtual environment that consists of computer systems and networks,
where all computers communicate via networks and all networks are connected. The term
originated in science fiction during the 1980s and became popular during the 1990s. More
recently computer vendors are attempting to brand cyberspace as the "Internet of Things"
(IoT).

What is a firewall?

A firewall is a network security system that monitors incoming and outgoing network
message traffic and prevents the transmission of malicious messages based on an updatable
rule set. In effect, a firewall establishes a barrier between a trusted,secure internal network
and external networks(e.g., the Internet) that are assumed to be untrustworthy and non-secure.
Firewalls can be implemented assoftware that runs on general-purpose hardware (e.g., an
open source firewall on a Windows PC or Mac OS X computer) or a dedicated hardware
device (appliance). How does a firewall work? Firewalls function as a filter between a
trusted, secure internal network and external networks (e.g., the Internet) that are assumed to
be untrustworthy and non-secure. The firewall filter may be flexibly programmed to control
what information packets are allowed and blocked.

What is anti-virus software?

Anti-virus software, also known as, anti-malware software, is computer software used to scan
files to identify and eliminate malicious software (malware). Although anti-virus software
was originally developed to detect and remove computer viruses (hence its name), it has been
broadened in scope to detect other malware, such as worms, Trojan horses, adware, spyware,
ransom-ware, etc.

What are Types of Cyber Attacks

A cyber attack is when an individual or an organization deliberately and maliciously attempts


to breach the information system of another individual or organization.

1. Malware - The term “malware” encompasses various types of attacks including spyware,
viruses, and worms. Malware uses a vulnerability to breach a network when a user clicks a
“planted” dangerous link or email attachment, which is used to install malicious software
inside the system. Malware and malicious files inside a computer system can:

• Deny access to the critical components of the network


• Obtain information by retrieving data from the hard drive
• Disrupt the system or even rendering it inoperable Malware is so common that there is a
large variety of modus operandi.
RAMAIAH INSTITUTE OF BUSINESS STUDIES

The most common types being:


• Viruses—these infect applications attaching themselves to the initialization sequence. The
virus replicates itself, infecting other code in the computer system. Viruses can also attach
themselves to executable code or associate themselves with a file by creating a virus file with
the same name but with an .exe extension, thus creating a decoy which carries the virus.

• Trojans—a program hiding inside a useful program with malicious purposes. Unlike
viruses, a trojan doesn’t replicate itself and it is commonly used to establish a backdoor to be
exploited by attackers.

• Worms—unlike viruses, they don’t attack the host, being self-contained programs that
propagate across networks and computers. Worms are often installed through email
attachments, sending a copy of them to every contact in the infected computer email list.
They are commonly used to overload an email server and achieve a denial-of-service attack.

• Ransomware—a type of malware that denies access to the victim data, threatening to
publish or delete it unless a ransom is paid.

• Spyware—a type of program installed to collect information about users, their systems or
browsing habits, sending the data to a remote user. The attacker can then use the information
for blackmailing purposes or download and install other malicious programs from the web.

2. Phishing - Phishing attacks are extremely common and involve sending mass amounts of
fraudulent emails to unsuspecting users, disguised as coming from a reliable source. The
fraudulent emails often have the appearance of being legit, but link the recipient to a
malicious file or script designed to grant attackers access to your device to control it or gather
recon, install malicious scripts/files, or to extract data such as user information, financial info,
and more.

3. Man-in-the-Middle (MitM) Attacks Occurs when an attacker intercepts a two-party


transaction, inserting themselves in the middle. From there, cyber attackers can steal and
manipulate data by interrupting traffic.

4. Denial-of-Service (DOS) Attack DOS attacks work by flooding systems, servers, and/or
networks with traffic to overload resources and bandwidth. This result is rendering the system
unable to process and fulfill legitimate requests.

5. Zero-day Exploit- A Zero-day Exploit refers to exploiting network vulnerability when it is


new and recently announced — before a patch is released and/or implemented. Zero-day
attackers jump at the disclosed vulnerability in the small window of time where no
solution/preventative measures exist. Thus, preventing zero-day attacks requires constant
monitoring, proactive detection, and agile threat management practices.

6. Password Attack- Password attackers use a myriad of methods to identify an individual


password, including using social engineering, gaining access to a password database, testing
the network connection to obtain unencrypted passwords, or simply by guessing.
RAMAIAH INSTITUTE OF BUSINESS STUDIES

7. Internet of Things (IoT) Attacks- While internet connectivity across almost every
imaginable device creates convenience and ease for individuals, it also presents a growing—
almost unlimited—number of access points for attackers to exploit and wreak havoc. The
interconnectedness of things makes it possible for attackers to breach an entry point and use it
as a gate to exploit other devices in the network.

What are measures which can be taken to avoid Cyber attack ?

1. Train employees in cyber security principles


2. Install, use and regularly update antivirus and anti-spyware software on every computer
3. Use a firewall for Internet connection
4. Download and install software for operating systems and applications as they become
available
5. Make backup copies of important business data and information
6. Control physical access to your computers and network components
7. Secure the Wi-Fi network
8. Require individual user accounts for each employee
9. Limit employee access to data and information, and limit authority to install software
10. Regularly change passwords
RAMAIAH INSTITUTE OF BUSINESS STUDIES

MODULE 2: APPLICATIONS OF EMERGING TECHNOLOGIES

1. APPLICATIONS OF EMERGING TECHNOLOGIES: ARTIFICIAL


INTELLIGENCE

1. Artificial Intelligence in Healthcare


It helps to respond to the questions that are asked for. It enables workflow assistants who
screen the patients, getting preliminary information. This in turn helps the doctors to free up
their schedules and also reduce the time and cost by streamlining processes. AIpowered
technology helps pathologists in analyzing samples of tissue and help in accurate diagnosis.

2. Artificial Intelligence in Business


A business relies on real-time reporting, accuracy, and processing of large volumes of
quantitative data to make crucial decisions. The adaptive intelligence, chatbots and
automation helps to smoothen out the business process.Robotic process automation reduces
the repetitive tasks that are normally performed by humans. The algorithms are integrated
into analytics and CRM (Customer relationship management) platforms, which uncover
information on how to better serve the customers.

3. Artificial Intelligence in Education

It must be very tedious for a teacher to evaluate homework and tests for large lecture
courses. A significant amount of time is consumed to interact with students, to prepare for
class, or work on professional development. But, with AI in education, this will not be the
case anymore. Though it can never replace human work, it is pretty close to it. So, with the
automated grading system checking multiple-choice questions, fill-in-the-blank testing,
grading of students can be done in no time.

4. Artificial Intelligence in Autonomous Vehicles

Long-range radar, cameras, and LIDAR, a lot of advancement has been made in the
autonomous vehicle segment.
Some of its usage in autonomous vehicles is:
• Directing the car to the fuel station or recharge station when it is running low on fuel.
• Adjust the trip’s directions based on known traffic conditions to find the quickest route.
• Incorporate speech recognition for advanced communication with passengers.
• Natural language interfaces and virtual assistance technologies.

5. Artificial Intelligence in Social Media


Instagram, Snapchat, Facebook, Twitter, the world today is changing and everyone is using
these social media apps to stay connected with the virtual world.

6. Artificial Intelligence in Tourism


Competition in the travel and tourism industry is very high. You must have seen that prices
keep on fluctuating and change often. You might have also booked a flight ticket in advance
or have waited just before the departure date to find cheaper tickets. Everyone does that, but
the struggle is minimized with AI. With predictive analytics driven by artificial intelligence,
the price can be predicted. The application is able to predict price patterns and alert travellers
RAMAIAH INSTITUTE OF BUSINESS STUDIES

when to buy the tickets. So, the cheapest rate can be known before you book the flights to
your destination. The price trend is analyzed on the basis of the recorded data on each route.
So, you get notifications of when to book your flight. Book it at the right time and at the right
price and say thanks to artificial intelligence.

What are the applications of artificial intelligence?


Some of the areas in which artificial intelligence is used are
• Artificial general intelligence.
• Planning.
• Computer vision.
• General game playing.
• Knowledge reasoning.
• Machine learning.
• Natural language processing.
• Robotics.

What examples of AI do we use in daily life?


• Maps and Navigation. AI has drastically improved travelling.
• Facial Detection and Recognition.
• Text Editors or Autocorrect.
• Search and Recommendation Algorithms.
• Chatbots.
• Digital Assistants.
• Social Media.
• E-Payments.

2. APPLICATIONS OF EMERGING TECHNOLOGIES: BIG DATA ANALYTICS

What is the data life cycle?


The data life cycle, also called the information life cycle, refers to the entire period of time
that data exists in your system. This life cycle encompasses all the stages that your data goes
through, from first capture onward.
1. Data creation, ingestion, or capture- Whether you generate data from data entry, acquire
existing data from other sources, or receive signals from devices, you get information
somehow. This stage describes when data values enter the firewalls of your system.
2. Data Processing- Data preparation typically includes integrating data from multiple
sources, validating data, and applying the transformation.
3. Data Analysis -However you analyze and interpret your data, this is where the magic
happens. Exploring and interpreting your data may require a variety of analyses. This could
mean statistical analysis and visualization.
4. Data sharing or publication -This stage is where forecasts and insights turn into decisions
and direction.
5. Archiving - Once data has been collected, processed, analyzed, and shared, it is typically
stored for future reference.

What is Big Data Analytics?


Big data analytics is the use of advanced analytic techniques against very large, diverse data
sets that include structured, semi-structured and unstructured data, from different sources, and
in different sizes from terabytes to zettabytes.
RAMAIAH INSTITUTE OF BUSINESS STUDIES

1. Data Collection - The Internet provides almost unlimited sources of data for a variety of
topics. The importance of this area depends on the type of business, but traditional industries
can acquire a diverse source of external data and combine those with their transactional data.
For example, let’s assume we would like to build a system that recommends restaurants. The
first step would be to gather data, in this case, reviews of restaurants from different websites
and store them in a database.
2. Data Cleansing - Data cleaning is the process of fixing or removing incorrect, corrupted,
incorrectly formatted, duplicate, or incomplete data within a dataset. When combining
multiple data sources, there are many opportunities for data to be duplicated or mislabeled.
3. Data Exploration - Data exploration is the first step of data analysis used to explore and
visualize data to uncover insights from the start or identify areas or patterns to dig into more.
4. Data Visualization - Big data visualization is the process of displaying data in charts,
graphs, maps, and other visual forms. It is used to help people easily understand and interpret
their data at a glance, and to clearly show trends and patterns that arise from this data.

What are Big Data Tools and Software?


a. Hadoop.
b. Quoble.
c. Cassandra.
d. MongoDB.
e. Apache Storm.
f. CouchDB.
g. Statwing

Applications of Big Data:


1. Healthcare: Big data analytics have improved healthcare by providing personalized
medicine and prescriptive analytics. Researchers are mining the data to see what treatments
are more effective for particular conditions, identify patterns related to drug side effects, and
gain other important information that can help patients and reduce costs. It’s possible to
predict disease that will escalate in specific areas. Based on predictions, it’s easier to
strategize diagnostics and plan for stocking serums and vaccines.
2. Media & Entertainment: Various companies in the media and entertainment industry are
facing new business models, for the way they – create, market and distribute their content.
Big Data applications benefits media and entertainment industry by:
• Predicting what the audience wants
• Scheduling optimization
• Increasing acquisition and retention
• Ad targeting
• Content monetization and new product development
3. Traffic Optimization: Big Data helps in aggregating real-time traffic data gathered from
road sensors, GPS devices and video cameras. The potential traffic problems in dense areas
can be prevented by adjusting public transportation routes in real time.
4. Real-time Analytics to Optimize Flight Route: With each unsold seat of the aircraft,
there is a loss of revenue. Route analysis is done to determine aircraft occupancy and route
profitability. By analyzing customers’ travel behavior, airlines can optimize flight routes to
provide services to maximum customers.
5. E-commerce Recommendation: By tracking customer spending habit, shopping behavior,
Big retails store provide a recommendation to the customer. E-commerce site like Amazon,
Walmart, Flipkart does product recommendation.
RAMAIAH INSTITUTE OF BUSINESS STUDIES

What is public health analytics?


Public health analytics is the process of obtaining, reviewing, and managing health-related
data of entire populations, typically carried out by public health organizations in an effort to
maintain population health. Public health data may include mortality reports, demographic
data, socioeconomic data, procedural and diagnostic data, and medical claims data, among
others. Public health organizations may use analytics to monitor disease trends and determine
patterns in certain populations, guide the implementation of disease control.

How Big Data is changing the Way People Live Their Lives?
The changes in how big data is collected have occurred so rapidly that big data is more
prevalent in daily life than you might think. Companies and organizations are collecting
information about their targeted audiences. They know what you’re watching, what you’re
reading, and what you’re buying. This access to key, personalized data then affects your daily
experience in some of the most important and common areas of life. Consider these ways big
data is used in your everyday life: a. Music, Shows, and Movies b. Healthcare and medical
services c. Shopping and Marketing d. Travel and Transportation e. News and Information f.
Education and Employment.

3. APPLICATIONS OF EMERGING TECHNOLOGIES: IOT

IoT Applications in 2020

1. IoT Applications in Agriculture


For indoor planting, IoT makes monitoring and management of micro-climate conditions a
reality, which in turn increases production. For outside planting, devices using IoT
technology can sense soil moisture and nutrients, in conjunction with weather data, better
control smart irrigation and fertilizer systems. If the sprinkler systems dispense water only
when needed, for example, this prevents wasting a precious resource. A greenhouse with
embedded devices not only makes it easier to be monitored but also, enables us to control the
climate inside it. Sensors measure different parameters according to the plant requirement
and send it to the cloud. It processes the data and applies a control action.

2. IoT Applications in Healthcare


First and foremost, wearable IoT devices let hospitals monitor their patients’ health at home,
thereby reducing hospital stays while still providing up to the minute real-time information that
could save lives. In hospitals, smart beds keep the staff informed as to the availability, thereby
cutting wait time for free space. Putting IoT sensors on critical equipment means fewer breakdowns
and increased reliability, which can mean the difference between life and death.

3. IoT Applications in Insurance


Insurance companies can offer their policyholders discounts for IoT wearables such as Fitbit. By
employing fitness tracking, the insurer can offer customized policies and encourage healthier habits.

4. IoT Applications in Manufacturing


The world of manufacturing and industrial automation uses IoT in a big way. RFID and GPS
technology can help a manufacturer track a product from its start on the factory floor to its
placement in the destination store, the whole supply chain from start to finish. Sensors attached to
factory equipment can help identify bottlenecks in the production line, thereby reducing lost time
and waste.
RAMAIAH INSTITUTE OF BUSINESS STUDIES

5. IoT Applications in Retail IoT technology has a lot to offer the world of retail. Online and in-store
shopping sales figures can control warehouse automation and robotics through information
gathered from IoT sensors. IoT helps retailers target customers based on past purchases. Equipped
with the information provided through IoT, a retailer could craft a personalized promotion for their
loyal customers. Much of these promotions can be conducted through the customers’ smartphones,
especially if they have an app for the appropriate store.

4. APPLICATIONS OF EMERGING TECHNOLOGIES: CLOUD COMPUTING

1. Art Applications- Cloud computing offers various art applications for quickly and easily design
attractive cards, booklets, and images.
Applications: Vistaprint, Moo, Adobe Creative Cloud

2. Business Applications- Business applications are based on cloud service providers. Today, every
organization requires the cloud business application to grow their business. It also ensures that
business applications are 24*7 available to users.
Applications: MailChimp, SalesForce, Chatter, QuickBooks

3. Data Storage and Backup Applications- Cloud computing allows us to store information (data,
files, images, audios, and videos) on the cloud and access this information using an internet
connection. As the cloud provider is responsible for providing security, so they offer various backup
recovery application for retrieving the lost data.
Applications: Google G Suite, Box.com, Adobe Scanner

4. Education Applications-Cloud computing in the education sector becomes very popular. It offers
various online distance learning platforms and student information portals to the students. The
advantage of using cloud in the field of education is that it offers strong virtual classroom
environments, Ease of accessibility, secure data storage, scalability, greater reach for the students,
and minimal hardware requirements for the applications.
Applications: Google Apps for Education, Chromebooks for Education

5. Entertainment Applications -Entertainment industries use a multi-cloud strategy to interact with


the target audience. Cloud computing offers various entertainment applications such as online
games and video conferencing.
Applications: Online games, Video conferencing apps

6.Social Applications- Social cloud applications allow a large number of usersto connect with each
other using social networking applications.
Applications: Facebook, Twitter, WhatsApp

5. APPLICATIONS OF EMERGING TECHNOLOGIES: CYBER SECURITY

Different Areas of Cyber Security


1. Critical Infrastructure Security- This type of cyber security ensures that the digital
infrastructure of our vital public systems remains preserved and protected from any form of
malignant misuse such as keeping cyberattacks away from our hospitals, traffic lights,
electricity grid, etc.
2. Application Security- Nowadays, when you have an app for nearly anything, it’s of vital
importance to keep the space secure. Application security does just that by building in all the
safety measures, such as encryption, firewalls, or anti-virus systems.
RAMAIAH INSTITUTE OF BUSINESS STUDIES

3. Network Security- Network security is an area of expertise primarily concerned with


keeping the network integrity preserved. In practice, this means performing due diligence to
ensure that the highest security standards and protocols protect networked data and systems.
4. Cloud Security Even though cloud computing is usually considered the least secured
space to store your data, experts suggest that clouds are safer than traditional IT
infrastructures. There are nearly half as many attacks in the on-premise environments than in
those serviced by a provider.
5. Internet of Things (IoT) Security -The Internet of Things security is concerned with
securing all the devices connected to the internet. From security cameras to the smallest home
appliances, everything’s networked. Consequently, nearly everything can and should be clear
of vulnerabilities and protected from potential cyber intrusions.

What is information security?


Information security is the practice of protecting information and information systems from
unauthorized disclosure, modification, and destruction. It encompasses the security of all IT
resources, including both University information and the IT devices that access, process,
store, or transmit it.

How do I secure my computer?


• Install and run anti-virus software on your computer to detect and remove malware.
• Back up your computer's data to protect yourself and the University from data loss or
corruption.
• Enable your computer's firewall to block potentially harmful traffic.
• Encrypt sensitive information to protect it from being read or misused if it's lost or stolen.
• Password-protect your computer to prevent others from logging in and using your system
and files.
• Regularly patch your computer's software and firmware to protect against the newest
vulnerabilities.
• Configure your computer to automatically lock after fifteen minutes of inactivity.

What is a backup?
A backup is a copy of the data stored on a device. It's useful for restoring data if your device
crashes or continuing work if your device is lost or stolen. When you back up your data, you
create a copy of some or all of the files on your device and store them in a separate location
(which is usually either on a flash drive, removable hard drive, or in the cloud). Some kinds
of backups even store your device configurations. Backup and recovery software can
automate the backup process by performing backups based on a set schedule.

What is encryption?
Encryption is a means of protecting files and devices. When you encrypt a file, you "lock" it
with an encryption key or password. The file itself is scrambled and becomes unreadable
without the appropriate key or password.
RAMAIAH INSTITUTE OF BUSINESS STUDIES

Module 3: Building Essential Skills beyond Technology

What is effective communication?

Effective communication is the process of exchanging ideas, thoughts, opinions, knowledge,


and data so that the message is received and understood with clarity and purpose. When we
communicate effectively, both the sender and receiver feel satisfied.

Communication occurs in many forms, including verbal and non-verbal, written, visual, and
listening. It can occur in person, on the internet (on forums, social media, and websites), over
the phone (through apps, calls, and video), or by mail.

For communication to be effective, it must be clear, correct, complete, concise, and


compassionate. We consider these to be the 5 C’s of communication, though they may vary
depending on who you’re asking.

What are the different forms of communication?


Communication can occur in multiple forms and the information can be communicated from
one person to another in various ways. The different forms of communication can be stated as
follows:
 Verbal communication
 Non-verbal communication
 Written communication
 Visual communication
These forms of communication can take place in person, over the phone, or through various
digital platforms.

What are the benefits of Effective Communication?


 It brings people together and helps build and maintain relationships.
 It encourages the development of building trust with each other.
 It helps to transform a group of people or a team into an effective unit.
 It gets your message across and helps to establish an understanding with your
listeners.
 It encourages people to become more innovative so that they can be productive.
 It helps to increase accountability in a person so that it can increase the workflow of a
particular process or unit.

What are the skills required for effective communication?


1. Active listening
Active listening means paying close attention to the person who is speaking to you. People
who are active listeners are well-regarded by their co-workers because of the attention and
respect they offer others.
2. Adapting your communication style to your audience
Different styles of communication are appropriate in different situations. To make the best
use of your communication skills, it’s important to consider your audience and the most
effective format to communicate with them.
RAMAIAH INSTITUTE OF BUSINESS STUDIES

3. Confidence
In the workplace, people are more likely to respond to ideas that are presented with
confidence. There are many ways to appear confident such as making eye contact when
you’re addressing someone, sitting up straight with your shoulders open and preparing ahead
of time so your thoughts are polished.

4. Giving and receiving feedback


Strong communicators can accept critical feedback and provide constructive input to others.
Feedback should answer questions, provide solutions or help strengthen the project or topic at
hand.

5. Volume and clarity


When you’re speaking, it’s important to be clear and audible. Adjusting your speaking voice
so you can be heard in a variety of settings is a skill and it’s critical to communicating
effectively.

6. Respect
A key aspect of respect is knowing when to initiate communication and respond. In a team or
group setting, allowing others to speak without interruption is seen as a necessary
communication skill. Respectfully communicating also means using your time with someone
else wisely—staying on topic, asking clear questions and responding fully to any questions
you’ve been asked.

7. Be calm and consistent


When there is a disagreement or conflict, it can be easy to bring emotion into your
communications. It is important to remain calm when communicating with others in the
workplace.

What is Creative Problem Solving?


Creative Problem Solving (CPS) involves breaking down a problem to understand it,
generating ideas to solve the problem and evaluating those ideas to find the most effective
solutions. It uses techniques to make the problem solving process engaging and collaborative.

What are the benefits of Creative Problem Solving ?


Creative problem-solving is less structured than other innovation processes and encourages
exploring open-ended solutions. It also focuses on developing new perspectives and fostering
creativity in the workplace. Its benefits include:
Finding creative solutions to complex problems: User research can insufficiently illustrate
a situation’s complexity. While other innovation processes rely on this information, creative
problem-solving can yield solutions without it.
Adapting to change: Business is constantly changing, and business leaders need to adapt.
Creative problem-solving helps overcome unforeseen challenges and find solutions to
unconventional problems.
RAMAIAH INSTITUTE OF BUSINESS STUDIES

Fueling innovation and growth: In addition to solutions, creative problem-solving can


spark innovative ideas that drive company growth. These ideas can lead to new product lines,
services, or a modified operations structure that improves efficiency.

What is Design Thinking?


Design thinking is a methodology which provides a solution-based approach to solving
problems. It’s extremely useful when used to tackle complex problems that are ill-defined or
unknown—because it serves to understand the human needs involved, reframe the problem in
human-centric ways, create numerous ideas in brainstorming sessions and adopt a hands-on
approach to prototyping and testing.

What are the Stages of the Design Thinking Process?


The four stages of design thinking are :

 Clarify: The clarification stage allows you to empathize with the user and identify
problems. Observations and insights are informed by thorough research. Findings are then
reframed as problem statements or questions.
 Ideate: Ideation is the process of coming up with innovative ideas. The divergence of
ideas involved with creative problem-solving is a major focus.
 Develop: In the development stage, ideas evolve into experiments and tests. Ideas
converge and are explored through prototyping and open critique.
 Implement: Implementation involves continuing to test and experiment to refine the
solution and encourage its adoption.

What is brainstorming?
Brainstorming is a tool that can be highly effective when guided by the iterative qualities of
the design thinking process. It involves openly discussing and debating ideas and topics in a
group setting. This facilitates idea generation and exploration as different team members
consider the same concept from multiple perspectives.

What is Critical Thinking?


Critical thinking is the ability to think clearly and rationally, understanding the logical
connection between ideas.
Critical thinking might be described as the ability to engage in reflective and independent
thinking.
RAMAIAH INSTITUTE OF BUSINESS STUDIES

In essence, critical thinking requires you to use your ability to reason. It is about being an
active learner rather than a passive recipient of information.
Critical thinkers rigorously question ideas and assumptions rather than accepting them at face
value. They will always seek to determine whether the ideas, arguments and findings
represent the entire picture and are open to finding that they do not.
Critical thinkers will identify, analyse and solve problems systematically rather than by
intuition or instinct.

What is Teamwork Skills?

Teamwork skills are the skills that enable you to work well with others. Candidates with
strong teamwork skills are sought out by employers for many reasons—they demonstrate
leadership, collaboration, and good communication.

Employers expect employees to be team players. Teamwork is required for almost every
industry, ranging from business solutions to information technology to food services.

List the skills required for efficient teamwork

 Working as part of a team to achieve company goals.


 Working well and developing effective relationships with diverse personalities.
 Developing and maintaining good relationships with co-workers and managers.
 Maintaining open lines of communication with others.
 Observing and coaching other employees.
 Assisting with training.
 Leading, Influencing, motivating, and persuading others to achieve goals.
 Looking for ways to help others and provide assistance.
 Showing interest in others and their concerns.
 Dealing with a wide range of people with flexibility and open-mindedness.
 Listening to and considering the viewpoint of others.

What is Collaboration?

Collaboration is the process of two or more people, entities or organizations working together
to complete a task or achieve a goal. Collaboration is similar to cooperation. Most
collaboration requires leadership, although the form of leadership can be social within a
decentralized and egalitarian group.

You might also like