Professional Documents
Culture Documents
905 Trends in Computing
905 Trends in Computing
905 Trends in Computing
INFORMATION TECHNOLOGY
06/18/23 1
O level Computer Studies Topic Twelve: Trends in Computing
Computer security
24-Feb-11 2
O level Computer Studies Topic Twelve: Trends in Computing
Data Alteration: Is the illegal amendment of data or information
with the intension of gaining money or misinforming users.
Computer Fraud: Refers to the use of a computer to impersonate
others with an aim of benefiting unfairly.
Eg. Online identity theft and using it to get Credit or
withdraw money from the victim’s account
Computer security refers to the protection and maintenance of
hardware, software and data against Unauthorized access and
modification. Or the denial of data and information to unauthorized
users
06/18/23
O level Computer Studies Topic Twelve: Trends in Computing 3
Computer Viruses
24-Feb-11 4
O level Computer Studies Topic Twelve: Trends in Computing
Description of computer viruses
A Boot Sector Virus: This is a virus that executes when a computer
starts up because it resides in the boot sector of a floppy disk or the
master boot record of a hard disk.
A File Virus: This is a virus that attaches itself to program file and is
loaded into memory when the affected program is run.
A macro Virus: This is a virus that uses the macro languages of an
application like a word processor to hide the virus code.
NB. Zombies: This is a dormant program that lies inactive on a
computer activated remotely to aid a collaborative attack on another
computer.
24-Feb-11
O level Computer Studies Topic Twelve: Trends in Computing 5
A rootkit: is a stealthy type of Causes Of Data/Program
software, often malicious Corruption In A Computer
designed to hide the existence of Power failure (Unsaved work).
a certain process or program from Computer viruses( change,
normal methods of detection and deletion of data, blockage of
enable continued privileged access to data)
access to computer. Un authorizes access (crackers
NB. activities)
Data control: Defines the measures Crashing of the hard disk
and policies put in place to ensure Vandalism (stealing of Hardware
the security of data and programs parts like Storage media)
Natural disasters (floads, rain)
24-Feb-11 6
O level Computer Studies Topic Twelve: Trends in Computing
Measures Organizations can
employee to prevent Illegal
data Alteration. Like Banks
Limit the level of access to data. FUNCTIONS OF AN
Use of Audit trails ANTVIRUS SOFTWARE
Set up Log files in the system Provide a real time protection
Authenticate all employees any against viruses
time they log into the system Identify viruses
A Spyware is an intelligent Provide a tool for eliminating
program that is able to secretly viruses
track and correct information Quarantines Files with Viruses
about users and their computers that can not be removed
Alerts users when a program
behave like a virus
24-Feb-11 7
O level Computer Studies Topic Twelve: Trends in Computing
Computer viruses
Cont
A logic bomb: This is a virus that activates when it detects a
certain condition.
Time bomb: This is a kind of logic bomb that activates on a
particular date.
A Worm: This is a virus that copies itself repeatedly in memory or
on a disk drive until no memory or disk space remains which may
result into the computer stoppage.
NB. Virus Hoax: This is a false warning of a non-existent computer
virus. They cause Network traffic jam as people forward the alerts.
24-Feb-11
O level Computer Studies Topic Twelve: Trends in Computing 8
Trojan Horse: This a program that hides with in looks like a
legitimate program but executes when certain condition or action
is triggered.
Or
Trajan Horse is a malicious software that appear to be performing
useful function but instead performs harmful functions in the
background
A Polymorphic Virus: This is a virus that modifies its code each
time it attached itself to another program or file so that even an
Antivirus Utility has difficulty in detecting it.
24-Feb-11
O level Computer Studies Topic Twelve: Trends in Computing 9
RISKS POSED BY VIRUSES
The range of threats posed by viruses and primary impact of a
virus can be broadly classified as:
Destructive Viruses
Non Destructive Viruses
Types of Destruction
i. Massive Destruction
ii. Partial Destruction
Massive Destruction: This attacks the formats of the disk.
Where by any program or damage will be unrecoverable.
24-Feb-11
O level Computer Studies Topic Twelve: Trends in Computing 10
Partial Destruction: This erases and modifies a specific portion of
the disk affecting any files stored in that location.
Selective Destruction: This erases and modifies specific files of file
groups.
Random Havoc: This randomly changes data on a disk or in
memory during normal program execution or changing key stroke
values or data from other input/output.
Network Saturation: This systematically used up all memory or
space to impede……………..performance or cause system to
crash.
24-Feb-11
O level Computer Studies Topic Twelve: Trends in Computing 11
Non Destruction Viruses: These viruses do not cause any
destruction but they are annoying. They values display
massages, change display colors, change key stroke values. For
example: They can change the effects of the shift/unshift key and
delete characters displayed on visual display.
24-Feb-11
O level Computer Studies Topic Twelve: Trends in Computing 12
Symptoms of computer
viruses
The presence of a virus can be Less memory available than
indicated if one or more of the usual
following symptoms appear on Access lights turning on for
your computer: non referred devices
Unfamiliar graphics or quizzed Disk access tune seeming
massages appearing on excessive for simple task.
screens. N.B: The spread of computer
Programs taking longer than viruses is accelerated by the
usual to load. increased use of networks,
Un usual error massages internet and E-mail.
occurring more frequently.
24-Feb-11 13
O level Computer Studies Topic Twelve: Trends in Computing
Features of computer viruses
24-Feb-11 15
O level Computer Studies Topic Twelve: Trends in Computing
Precautions to present virus
infections. conts
Never start up a computer with Avoid using pirated software.
a floppy disk in a floppy drive. Educate all computer users on
Scan all disks and files for the dangers of viruses
possible virus infection before Scan all secondary storage
opening them. media before use
Right protect the recovery disk Scan all files and programs for
before using it. viruses before downloading
Back up important files them
regularly. Install a firewall
06/18/23 16
O level Computer Studies Topic Twelve: Trends in Computing
Unauthorized Access and used of
the computer system
Un Authorized Access: This is the use of a computer or network
without permission.
What is the difference between A Hacker And A Cracker?
A hacker breaks codes and password in a computer system through
intelligent guessing or using certain software without any ill intensions
other than proving his or her computer wizardly
A cracker breaks into a computer system for an illegal purpose through
use of codes or a password.
A firewall a combination of Hardware and software designed to block
unauthorized access while permitting authorized traffic.
Log file these are system files installed in a computer system to maintain
a record of how the system is being used.
06/18/23
O level Computer Studies Topic Twelve: Trends in Computing 17
FORMS OF UNAUTHORISED
ACCESS
Eavesdropping Tapping: The use of intelligent
Industrial espionage programs known as spywares
Cracking to gain access to information
Phishing or data that is on it way from
Surveillance the host computer to the
Hacking destination computer.
Eavesdropping: This is a form Difference between Tapping
of tapping that involves and Eavesdropping is:
acquiring data by listening to a
communication channel.
24-Feb-11 18
O level Computer Studies Topic Twelve: Trends in Computing
Eavesdropping involves acquiring data by listening to a
communication channel While
Tapping involves acquiring data by redirection of a communication
Phishing: This is the practice whereby fraudster acting as
legitimate organizations seed misleading E-mail requesting
personal and financial details from unsuspecting recipients.
Eg Banks and online payment
Industrial espionage: the use of a person with extensive computer
and network skills to break into a computer or a computer network
to steal, delete data or information.
06/18/23
O level Computer Studies Topic Twelve: Trends in Computing 19
CYBER CRIME
24-Feb-11 20
O level Computer Studies Topic Twelve: Trends in Computing
COMPUTER CRIMES
06/18/23 23
O level Computer Studies Topic Twelve: Trends in Computing
Eplaination of terms related to
protection against computer
crime
Security patch: this is a piece Goals of Computer Security
of code that is added to a Integrity: This is to guarantee
software so as to improve its that data is what we expect
security feature. Confidentiality: the information
Audit trials: This is a thorough must just be accessible to only
study done on an information authorized people.
system by experts to identify Authentication:
any loophole that can be used
to illegally access a system.
06/18/23 24
O level Computer Studies Topic Twelve: Trends in Computing
Software Theft
Software theft is when some one A single user License
steals software media, intentionally agreement typically Contains
erases programs, illegally copies
the following conditions
and registers and activates a
program.
Install software on one
Software Piracy is the computer
Unauthorized and illegal duplication Make one copy of the s/w
of a copyrighted software. Un install the s/w from your
In general, you do not have the computer before giving it to
right to Copy, Rent, or in any way
a second party
distribute the software unless
otherwise specified in the License.
06/18/23 25
O level Computer Studies Topic Twelve: Trends in Computing
Not permitted to Software site License: Gives
Install the software on a the buyer the right to install
network the software on multiple
Share copy with a friend computer at a single site (e.g
Rent a copy to a second A school computer Lab)
party
NB. Network site License
allows network users to
share a single copy of the
software, which resides on
the network server
06/18/23 26
O level Computer Studies Topic Twelve: Trends in Computing
Consequences of pirated INFORMATION THEFT:
software This is the stealing of
No upgrade of software personal or confidential
No technical support, information from others
manuals or Documentation
Serious legal exposure
06/18/23 27
O level Computer Studies Topic Twelve: Trends in Computing
COMPUTERS AND HEALTH RISKS
06/18/23 28
O level Computer Studies Topic Twelve: Trends in Computing
Health risks of computer use
include the following
Eye strain stress due to noise from fans,
- Repetitive Strain Injury (RSI) Printers, power inputs
Carpal Tunnel Syndrome Addiction from use
headache
Back pain due to poor sitting ear problems for use of ear
posture phones especially with
Neck pain embedded systems
Electromagnetic radiation Wrist pain to do non -
especially with CRT monitors ergonometric
06/18/23 29
O level Computer Studies Topic Twelve: Trends in Computing
Health risks of computer use
cont’s
Repetitive Strain Injury (RSI) This is cause due to the following:
Users are carrying out repetitive tasks
Have positioned the keyboard so that they are at awkward angle.
Are squeezing a mouse too tightly.
TUC data shows that 78% of young workers have jobs that
involve repetition and more that 2 million workers are forced to work in
awkward positions
Symptoms include
Stiffness and swelling in the wrists and other joints
24-Feb-11
O level Computer Studies Topic Twelve: Trends in Computing 30
Health risks of computer use
cont’s
HOW TO REDUCE RSI
Using a wrist guard whilst typing.
Ensuring users vary their work so they are not always in the same
position
Using specially designed “ergonomic” keyboards
24-Feb-11
O level Computer Studies Topic Twelve: Trends in Computing 31
Health risks of computer use
cont’s
Back problems: Prevention
This is caused by Having an ergonomically,
Users use pcs for a long period adjustable swivel chair that
of time supports the lower back.
Adopt a bad posture Adjusting the chair to the correct
Have their seat at an incorrect height.
height Adjusting the VDU to the correct
Symptoms position
Back pain or stiffness, possibly Using a footrest
in the neck and shoulders Taking regular breaks (5
minutes every hour)
24-Feb-11 32
O level Computer Studies Topic Twelve: Trends in Computing
Health risks of computer use
cont’s
Eye strain:
Staring at anything for a long
Looking at a computer for a long
period of time will cause
period of time.
blurred vision
Causes
Loss of negative ions in the
Bad monitor resolution, flickering,
atmosphere due to
or glare at the monitor
electrostatic charges on the
Poor lighting conditions in the
face of the CRT.
computer room
Symptoms
Electromagnetic radiation
Impaired vision, double vision
emitted by the VDT (UVA)
and blurred vision
Difficulty looking at one point
for a period of time
06/18/23 33
O level Computer Studies Topic Twelve: Trends in Computing
Health risks of computer use
cont’s
Itchy dry eyes and discomfort Having regular eye tests to
while looking at the VDT ensure vision is corrected
Headaches Use your knowledge of
Eye fatigue that can have ergonomics
serious impact later in life Take breaks when you feel
Prevention strained
Having suitable lighting fixing Use your laptop when
screens so they don`t flicker possible because the monitor
Having appropriate blinds on emits less radiation
windows to prevent glare Adjust the brightness of your
screen
Wear protective eye glasses
06/18/23 34
O level Computer Studies Topic Twelve: Trends in Computing
Health risks of computer use
cont’s
Epilepsy: Stress:
Causes out of 10 users say they are
Flickering screens can regularly by a computer related
contribute to the frequency of issue
Issues include:
attacks
Prevention Slow performance
System crashes
The use of low emission
Viruses
monitors and screen filters is
Pop-up ads
likely to reduce the risk of
Noise from fan, printer power
triggering an attack
input etc.
06/18/23 35
O level Computer Studies Topic Twelve: Trends in Computing
Health risks of computer use
cont’s
Prevention Carpal Tunnel Syndrome:
Install correct hardware that is This is a Repetitive Stress
capable of meeting tasks Injury (RSI) caused when the
Having a reliable support team median is pushed by the flexor
Providing users with adequate tendons insides the tunnel made
support and training up of the wrist bones, or carpals.
Going for a short walk to get
fresh air
06/18/23 36
O level Computer Studies Topic Twelve: Trends in Computing
Health risks of computer use
cont’s
The forearm flexor tendons Symptoms
Pain that may run up the hand
and a few nerves pass
into the wrist and arm
through a small tunnel formed Numbness and coldness in the
by the wrist bones. Or carpals, hands
into the hand. As you move Loss of strength and/or joint
your hands and fingers, the movement
flexor tendons rub against the Discomfort and stiffness in the
sides of the tunnel, sometimes hands
them to swell and push the The need to massage your hands,
median nerve. When the wrists and arms
median nerve is pushed by the Swelling and coldness in the hand
tendon, we feel pain.
06/18/23 37
O level Computer Studies Topic Twelve: Trends in Computing
Health risks of computer use
cont’s
Reasons for CTS injury the flexor tendons that one
Stress will increase muscle receives and the tunnel’s
tension causing pain geometry.
Long hours in the keyboard, Other health problems like
especially those that type more diabetes and rheumatoid
than four hours arthritis
Lack of circulation. In the Poor posture including the
muscles that prevents that sitting, placement of hands on
nutrients and oxygen to reach the the keyboard and proper and
tissues proper height of the key –
Inadequate rest and breaks board.
Genetic predisposition to the Poor diet (lack of vitamins)
amount of lubrication of
06/18/23 38
O level Computer Studies Topic Twelve: Trends in Computing
CTS TREATMENT Surgery should be your last
Rest, rest and more rest retreat if everything else fails.
Use of a wrist brace or splint Internet addiction
Take medication like ibuprofen Use Internet every day without
Cut back on sugar, caffeine, days off
alcohol and take vitamins Loosing track of time while
Keep hands warm, take breaks, surfing the Net
exercise your hands and arms Staying home more loosing
Correct your typing use you social contacts
knowledge of ergonomics Denial of high usage
51% of internet addicts suffer
severe job
06/18/23 39
O level Computer Studies Topic Twelve: Trends in Computing
impairment
58% get addicted within the first
12 months of Internet usage
NB. ergonomic “The science of
work”, the field of technology
that considers human
capabilities and limitations in the
design of machines and objects
that people use, the work
processes that they must follow,
and the environment in which
they operate.
06/18/23 40
O level Computer Studies Topic Twelve: Trends in Computing
COMPUTERS AND SOCIETY
06/18/23 41
O level Computer Studies Topic Twelve: Trends in Computing
POSITIVE EFFECTS OF USING
COMPUTERS TO SOCIETY
Created and widened employment opportunities e.g.; software
engineers, computer teachers, technicians, etc.
Improved education and research by simplifying teaching and
learning. E.g. abstract content can be made real through cyber
science technology – others are computer aided teaching and
computer aided learning, presentations software, etc.
Improved entertainment and leisure through computer games, music,
etc for people to refresh and make-up.
Improved communication and collaboration through computer
networks.
06/18/23
O level Computer Studies Topic Twelve: Trends in Computing 42
POSITIVE EFFECTS OF USING COMPUTERS TO
SOCIETY con’t
24-Feb-11
O level Computer Studies Topic Twelve: Trends in Computing 43
NEGATIVE EFFECTS OF USING
COMPUTERS TO SOCIETY
24-Feb-11
O level Computer Studies Topic Twelve: Trends in Computing 44
NEGATIVE EFFECTS OF USING
COMPUTERS TO SOCIETY con’t
Loss of employment as they take over job assignments for semi
and less skilled job functions.
Deaths and accidents due to computer malfunctioning or explosion
Virus threats which has made data storage and safety very
vulnerable
Erosion of human integrity and creativity as even the smallest
calculation is assigned to the computer. Other cases are GMFs,
test tube children, etc.
Loss of man-hours as some workers go for unproductive computer
based leisure at the expense of their work.
Cyber terrorism
24-Feb-11
O level Computer Studies Topic Twelve: Trends in Computing 45
24-Feb-11 46
O level Computer Studies Topic Twelve: Trends in Computing
SYSTEMS ANALYSIS
What is systems analysis? is the study of an organization's
problem or situation and the specification of business
requirements for an improved system.
Systems design is the detailed specification of a computer based
solution to the business requirements.
What is systems analysis and design? Systems Analysis and
Design covers the entire systems development process from:
Planning to implementation, maintenance, and evoluation. It
includes all activities performed to produce an automated IS.
24-Feb-11
O level Computer Studies Topic Twelve: Trends in Computing 47
Phases of System Analysis
Systems Planning Phase: Begins with a formal request to the IT
department, called a Systems request. The purpose of this phase
is to perform a preliminary investigation to evaluate an IT-related
business opportunity or problem. Feasibility study key at this
phase and a course of action based on operational, technical,
economic, and time factors is recommend after the study.
Outputs
Preliminary Investigation Report
Feasibility Study
Recommendations
24-Feb-11
O level Computer Studies Topic Twelve: Trends in Computing 48
Systems Analysis Phase: The purpose of the systems analysis
phase is to build a logical model of the new system. To understand
the system, fact-finding techniques such as
interviews, are used to collect facts necessary to build the model.
Requirements modeling help to get the systems requirements of
the system.
Outputs Systems Requirements Document
System Design Phase: The purpose of this phase is to create a
physical model that will satisfy all documented requirements for the
system. At this stage, you design the user interface and identify
necessary outputs, inputs, and processes, plus the internal and
external controls
-Feb-11
O level Computer Studies Topic Twelve: Trends in Computing 49
Systems Implementation Phase: During the systems
implementation phase, the new system is constructed - programs
are written, tested, and documented, and the system is installed.
This phase also includes an assessment, called a systems
evaluation, to determine whether the system operates properly
and if costs and benefits are within expectations.
Systems Maintenance Phase: In this phase IT staff maintain,
enhance, and protect the system. Maintenance changes correct
errors and adapt to changes in the environment, such as new tax
rates. Enhancements provide new features and benefits. Security
controls safeguard the system from both external and internal
threats.
24-Feb-11
O level Computer Studies Topic Twelve: Trends in Computing 50
A scalable design can expand to meet new business requirements
and volumes.
24-Feb-11
O level Computer Studies Topic Twelve: Trends in Computing 51
COMPUTER PROFESSIONS
A. WEBMASTER: Webmasters develop and maintain Web sites
and web resources. The job may include backup of the company
Web site, updating resources, or developing of new resources.
Webmasters are involved in the design and development of
website. Part of their job may also include monitoring and
updating the interface design. Some webmasters monitor traffic on
site.
B. COMPUTER TRAINERS: Computer trainers instruct new user
on the latest software or hardware. They are usually expected to
prepare new materials for instruction and may be asked to write
and maintain course manual.
24-Feb-11
O level Computer Studies Topic Twelve: Trends in Computing 52
COMPUTER PROFESSIONS
C. DESKTOP PUBLISHER: material. They may create books,
magazines newsletter, and newspapers on computers using
special applications software’s large part of the job is designing
page layout, importing text, and manipulating graphics. Most
desktop publishers work for companies that handle commercial
printing accounts.
D.COMPUTER SUPPORT SPECIALISTS PROVIDE: Technical
support to customers and other users. They may also be called
technical support specialist or help desk technicians. They manage
the everyday problems faced by computer users. They resolve
common networking problems and may use troubleshooting
programs to diagnose problems.
24-Feb-11
O level Computer Studies Topic Twelve: Trends in Computing 53
COMPUTER PROFESSIONS
E. COMPUTER TECHNICIAN Experienced computer
Computer technicians may technicians may work with
repair and install computer computer engineers to
components and systems. They diagnose problems and run
may work on everything from routine maintenance on
personal computers to complex systems.
mainframe servers or printers F.DATA ENTRANTS
Some Computer technicians Data entry workers input
are responsible for setting up customer information, lists, and
and maintaining computer other type of data. Input
networks. devices are typically limited to
keyboards, mice, and
scanners.
24-Feb-11 54
O level Computer Studies Topic Twelve: Trends in Computing
COMPUTER PROFESSIONS
Because the accuracy of programming, but focus on the
recorded data is so important, design and development of
data entry workers are often programs using the principles of
required to verify the accuracy of mathematics and engineering.
data they and others have They rarely write codes
entered. themselves.
G. SOFTWARE ENGINEERS. H. Network administrator
Most Software engineers analyse manages a company’s LAN and
user need and create application WAN networks. They may be
software. Software engineers responsible for the design,
usually have experience in implementation and maintenance
of networks. Responsibilities
usually
06/18/23 55
O level Computer Studies Topic Twelve: Trends in Computing
COMPUTER PROFESSIONS
include the maintenance of both writers work for software firms,
hardware and software relating government agencies, and
to a company’s intranet and research institutions.
internet networks. Some are J. Cryptography is the science
responsible for planning and of disguising and revealing
implementing the security encrypted information. In ICT
measures as well. Cryptography means keeping
I. Technical writers prepare any intercepted information
instructional manuals, technical private. For example information
reports, and other scientific or like financial data, banking and
technical documents. Most credit card information used
Technical
06/18/23 56
O level Computer Studies Topic Twelve: Trends in Computing
COMPUTER PROFESSIONS
in online shopping or private e- These professionals consult with
mail and correspondence. management, staff and
Cryptographers design systems, customers to
break systems, and do research L. Database administrators use
on encryption. database management software
K. Information system managers to determine the most efficient
oversee the work of programmers, ways to organize and access a
computer specialists, system company’s data. They are
analysts, and other computer responsible for maintaining
professionals. They create and database security and backing
implement corporate computer up systems.
policy and systems.
06/18/23 57
O level Computer Studies Topic Twelve: Trends in Computing
COMPUTER PROFESSIONS
M. Systems analyst follows the N. COMPUTER
steps described in the systems PROGRAMMERS
development life cycle. Analysts Computer programmers create,
plan and design new systems or test, and troubleshoot programs
reorganize a company’s used by computers.
computer resources to best Programmers may also update
utilize them. and repair existing programs.
06/18/23 58
O level Computer Studies Topic Twelve: Trends in Computing
EMERGING TECHNOLOGIES
06/18/23 59
O level Computer Studies Topic Twelve: Trends in Computing
EMERGING TECHNOLOGIES cont….
24-Feb-11
O level Computer Studies Topic Twelve: Trends in Computing 60
Artificial intelligence refers to collective attributes of a computer,
robot, or other device capable of performing function such as
learning, decision making, or other intelligent human behaviors. Or
it is the science and engineering of making intelligent machines,
especially intelligent computer programs.
It is related to the similar task of using computers to understand
human intelligence, but AI does not have to confine itself to
methods that are biologically observable.
24-Feb-11
O level Computer Studies Topic Twelve: Trends in Computing 61
COMMON TERMS RELATED TO AI
Autonomous Agent: A hardware (or software) based system that
has the following properties:
Autonomy – able to operate without the direct intervention of humans or
others.
Social ability – able to interact with other agents and possibly humans.
Reactivity – able to perceive their environment and respond to changes
that occur in it.
Agency: A particular system composed of intelligent agents, such
as computers or robots that cooperate in order to solve a problem.
Behavior Engineering: A methodology used to develop behavior –
based autonomous agents.
24-Feb-11
O level Computer Studies Topic Twelve: Trends in Computing 62
ACADEMIC DISCIPLINES RELEVANT
TO AI
Philosophy: Logic, methods of reasoning, min as physical system,
foundations of learning, language, rationality.
Mathematics: Formal representation and proof, algorithms,
computation, (un) decidability, (in) tractability.
Probability/Statistics: modeling uncertainty, learning from data.
Economics: utility, decision theory, rational economic agents.
Neuroscience: neurons as information processing units.
Psychology: how do people behave, perceive, process cognitive.
Cognitive Science: information, represent knowledge.
24-Feb-11
O level Computer Studies Topic Twelve: Trends in Computing 63
Computer engineering: APPLICATION OF ARTIFICIAL
building fast computers. INTELLIGENCE:
Control theory: design Game playing: You can buy
systems that maximize an machines that can play master
objective function over time. level chess. There is some AI in
Linguistics: knowledge them, but they play well against
representation, grammars. people mainly through bully force
computation – looking at
hundreds of thousands of
positions.
24-Feb-11 64
O level Computer Studies Topic Twelve: Trends in Computing
Speech recognition: In the Understanding natural
1990s, computer speech language: Computers can be
recognition a reached practical trained to earn and take
for limited purposes. Thus instructions. Natural
United Airlines has replaced languages. This is possible in
its keyboard tree for flight some developed countries
information by a system using there robots understand this
speech recognition of fight process.
number and city names it is
suite convenient.
06/18/23 65
O level Computer Studies Topic Twelve: Trends in Computing
Expert systems: A “knowledge MYCIN in 1974, which
engineer” interviews experts in diagnosed bacterial infections
a certain field and tries to of the blood and suggested
represent their knowledge in a treatments. It did better than
computer program for carrying medical students or practicing
out some task. How well this doctors.
works depends on whether the
academic method required for
the task is within the present
state of AI. One of the first
expert system was
06/18/23 66
O level Computer Studies Topic Twelve: Trends in Computing
DIGITAL FORENSICS
Digital forensics (sometime timed known as digital forensics
science) is a branch of investigative science around material
found in digital devices, often in relation to computer crime for
example, hacking, cracking, spamming. etc.
The technical aspect of an investigation is divided into several
sub-branches, relating to the type of digital devices involved:
06/18/23
O level Computer Studies Topic Twelve: Trends in Computing 67
BRANCHES OF DIGITAL FORENSICS
i) Computer forensics: the goal of computer forensics is to explain
the current state of a digital object. Such as a computer system,
storage medium or electronic document.
ii) Mobile device forensics: Mobile device forensics is a sub –
branch of digital forensics relating to recovery of digital evidence
or data from a mobile device.
iii) Network forensics: Network forensics is concerned with the
monitoring and analysis of computer network traffic. Both local
and WAN /internet, for the purposes of information gathering,
evidence collection or crime detection. Traffic is usually stopped at
the packet level, and either stored for later analysis or filtered in
real-time.
24-Feb-11
O level Computer Studies Topic Twelve: Trends in Computing 68
iv) Database forensics: Database forensics is a branch of digital
forensics to the forensic study of databases and their metadata.
Investigations use database contents, log files and in – RAM data
to build a time relevant information.
GREEN COMPUNTNG:
Green computing is the environmentally responsible and eco-
friendly use of computers and their resources.
24-Feb-11
O level Computer Studies Topic Twelve: Trends in Computing 70
Recycle paper
Buy recycled paper
Recycle toner cartridges
24-Feb-11
O level Computer Studies Topic Twelve: Trends in Computing 71