Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 4

Debre Berhan University

Department of pharmacy

Emerging technology Individual assignment

Submission date:
Submitted to:
Eskel Eskinder DBU1401205
Emerging technology Individual assignment

1. Digital privacy is the transmission of messages, information, files etc...


without interception from another user. It can be divided into three
categories, which are:
 Individual privacy
 Communication privacy
 Information privacy
The importance of digital privacy is it gives you the power to control and
deal with your data without others interfering. Without digital privacy
anyone could access your files and use them as they see fit.

2. Biotechnology is a technology that utilizes the use of biology to make


important products. It has many applications in different sectors for
example:
 In agricultural biotechnology, professionals work to make more easy
and efficient ways for agriculture
 In Drugs and pharmaceuticals, they make use of technological
equipment to research on genes and develop a drug to diseases
 In biofuels, they use biological methods to create fuels instead of
geological methods

3. Blockchain technology is a database mechanism that allows information


sharing within a business network. Blockchain technology is used in
cryptocurrencies, supply chain, and logistics, intellectual property
management, food safety, healthcare data management, fundraising etc...
4. Cloud computing is a software that allows access to shared storage,
networks, servers, and applications. One application of cloud computing
can be Online Data Storage.
Quantum computing is a type of computation which uses the features of
quantum mechanics. One example can be Artificial intelligence.
Autonomic computing is a type of computing that adapts to changes while
hiding the actual process of the task. One of the applications of autonomic
computing can be for example software update.
5. Computer vision is a field of artificial intellegence that trains the computer
to understand the visual world. Applications of computer vision can be Face
recognition, self-driving cars, drone-based crop monitoring etc...

6. An embedded system is a combination of computer processors, memory


and other combination of hardware and software designed for specific
purpose. The advantage of an embedded system can be:
 Easy for mass production
 Exceptionally reliable
 Fast operation
 Low power operation
 Small in size etc...
The disadvantages of an embedded system are:
 Hard for maintenance (are only used once)
 Hard to make backup embedded files etc...

7. Cybersecurity is the protection of the computer system from malicious


attacks that might damage or make it inaccessible.
Some of the types of cybersecurity treats include:
 Malware
 Ransomware
 DDOS attacks
 Spam and phishing
 Corporate Account Takeover etc...

Benefits of cyber security include Protecting networks and data from


unauthorized access, improving information security and business
continuity management, Securing confidential information for example
credentials etc...

8. The difference between 3d printing and additive manufacture is that 3d


printing is the creation of materials by building layers of materials. On the
other hand, additive manufacturing is the creation of materials with or
without layers.

You might also like