Emerging technologies in computer science

ShrinivasPatil1 4,615 views 52 slides Jan 07, 2021
Slide 1
Slide 1 of 52
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15
Slide 16
16
Slide 17
17
Slide 18
18
Slide 19
19
Slide 20
20
Slide 21
21
Slide 22
22
Slide 23
23
Slide 24
24
Slide 25
25
Slide 26
26
Slide 27
27
Slide 28
28
Slide 29
29
Slide 30
30
Slide 31
31
Slide 32
32
Slide 33
33
Slide 34
34
Slide 35
35
Slide 36
36
Slide 37
37
Slide 38
38
Slide 39
39
Slide 40
40
Slide 41
41
Slide 42
42
Slide 43
43
Slide 44
44
Slide 45
45
Slide 46
46
Slide 47
47
Slide 48
48
Slide 49
49
Slide 50
50
Slide 51
51
Slide 52
52

About This Presentation

This PPT provides you the essential information about the emerging technologies in the field of computer science.
Data Mining,Cloud Computing, Artificial Intelligence,Internet of Things and many more.


Slide Content

Emerging
Technologies in Computer
Science
Presented by
Dr.SrinivasNarasegouda,
Assistant Professor,
JyotiNivas College Autonomous,
Bangalore -95

Table of Content
Overview
Data Mining
Geographic Information Systems
Cloud Computing
Artificial Intelligence
Internet of Things
Computer virus
Free and Open-source software
2

Data Mining
Data Mining : Introduction
What is data? Where it is getting generated? And how much?
3

Data Mining
Data Mining : Introduction
Why data is important? What can be done with it?
4

Data Mining
Data Mining : Introduction
What data mining? What are the steps in data mining?
5

Data Mining
Data Mining (DM) : Introduction
What is data mining?
What are the steps in data mining?
6

Data Mining
Data Mining : Introduction
What data mining? What are the steps in data mining?
7

Data Mining
Data Mining : Introduction
Whatarethestepsindatamining?
1.Datacleaning:Inthisstepnoiseandinconsistentdataareremoved.
2.Dataintegration:Inthisstepmultipledatasourcesmaybecombined.
3.Dataselection:Inthissteprelevantdatatotheanalysistaskareretrievedfromthe
database.
4.Datatransformation:Inthisstepdataaretransformedorconsolidatedintoforms
appropriateforminingbyperformingsummaryoraggregationoperations.
5.Datamining:Inthisstepintelligentmethodsareappliedinordertoextractdata
patterns.
6.Patternevaluation:Inthisstepinterestingpatternsareidentifiedbasedonsome
interestingnessmeasures.
7.Knowledgepresentation:Inthisstepvisualizationandknowledgerepresentation
techniquessuchasgraphs,reportsetc.,areusedtopresenttheminedknowledgetothe
user.
8

Data Mining
Data Mining: Evolution
 The term data mining was introduced in 1990s.
 Data mining touched its current state after going through numerous stages of study
and research.
 This growth began when data started to get stored on computers.
 The process sustained with increase in computer capability including data storage,
processing power, software etc.
 In today's world of technology, all are trying to make the optimal use of their data
to make best decisions.
 Gathering and storing data on computers, tapes and disks started in 1960s. With the
use of relational databases and structured query languages in 1980, helped users to do
analysis about the data stored in relational databases using structured query language.
Therefore, data became accessible at record level dynamically.
9

Data Mining
Data Mining: Evolution
In 1990 data warehousing was introduced. Multidimensional databases and online
analytic processing contributed to the growth of data warehousing.
To make key business decisions, managers need real time information. That information
is provided by data mining techniques.
During 1960s data was not considered as asset but the situation is now completely
changed.
Data has been changed to information which is sufficient to answer many questions and
even top redirect the future of business.
Evolution of data and databases is happening at very fast which demand methods to
deliver useful information from these large quantities of data.
Data mining expertise have been going through growth process for many years and four
different areas contributed to the growth of data mining in its current form.
10

Data Mining
Data Mining: Evolution
These areas are artificial intelligence, machine learning, statistics and databases.
Statistics has been contributing significantly to business intelligence from the inception.
The concepts of statistics deal with data and relations among them. These concepts are
the building blocks of sophisticated data mining techniques.
Artificial intelligence is the concept which is used to generate human thinking process or
human intellect in statistical problems.
Machine learning gives computers the capability to learn without being explicitly
programmed.
Database is the basic requirement for organized data mining. It is defined as collection of
related data.
11

Data Mining
Data Mining: Application of Data Mining
Data mining has attracted a great deal of attention in the information industry and in
society as a whole in recent years, due to the wide availability of huge amounts of data and
the imminent need for turning such data into useful information and knowledge. The
information and knowledge gained can be used for applications ranging from market
analysis, fraud detection, and customer retention, to production control and science
exploration.
12

Data Mining
Data Mining: Advantages of Data Mining
1.The data mining helps financial institutions and banks to identify probable
defaulters and hence will help them whether to issue credit card, loan etc. or not.
2.It helps advertisers push right advertisements to the internetsurfer on web pages
based on machine learning algorithms.
3.The retail malls and grocery stores arrange and keep most sellable items in the most
attentive positions.
4.It helps in obtaining desired search results of queries posed to e-commerce websites.
5.The data mining based methods are cost effective and efficientcompare to other
statistical data applications.
6.Applications: bio-informatics, medicine, genetics, education, agricultural, law
enforcement, e-marketing, electrical power engineering etc.
7.It helps in identifying criminal suspectsby law enforcement agencies.
13

Data Mining
Data Mining Videos:
https://www.youtube.com/watch?v=grRwJ5jZBog
https://www.youtube.com/watch?v=jYEhQ9Zr08o
https://www.youtube.com/watch?v=ykZ-
_UGcYWg&list=PLLspfyoOYoQcI6Nno3gPkq0h5YSe81hsc
14

Geographic Information Systems (GIS)
GIS is an acronym that stands for Geographic Information Systems.
Thefirstknownuseoftheterm"geographicinformationsystem"wasbyRoger
Tomlinsonintheyear1968inhispaper"AGeographicInformationSystemfor
RegionalPlanning".
Tomlinsonisalsoacknowledgedasthe"fatherofGIS".
GIS-GeographicInformationSystems(orScience)-isapieceofsoftwarethat
capturesgeographicdataforthepurposeofmanipulation,viewingandanalysisin
whichevercontextandparameterstheuserdesiresorneeds.
Itcanbeusedtoanalysespatialdataorgeographicinformationforanygivenand
possiblepurpose.
15

Geographic Information Systems (GIS)
Geographic Information Systems : Components of GIS
GIS integrates five key components:
Hardware
Software
Data
People
Methods
16

Geographic Information Systems (GIS)
Geographic Information Systems : Components of GIS
GIS integrates five key components:
Hardware
Software
Data
People
Methods
17

Geographic Information Systems (GIS)
Geographic Information Systems : Components of GIS
1.Hardware:HardwareisComputeronwhichGISsoftwareruns.Nowadays
thereareadifferentrangeofcomputer,itmightbeDesktoporserverbased.
2.Software:NextcomponentisGISsoftwarewhichprovidetoolstorunandedit
spatialinformation.Ithelpstoquery,edit,runanddisplayGISdata.
3.Data:ThemostimportantandexpensivecomponentoftheGeographic
InformationSystemisDatawhichisgenerallyknownasfuelforGIS.GIS
dataiscombinationofgraphicandtabulardata.
4.People:PeopleareuserofGeographicInformationSystem.TheyruntheGIS
software.
5.Methods:ForsuccessfulGISoperationawell-designedplanandbusiness
operationrulesareimportant.Methodscanvarywithdifferentorganizations.
18

Geographic Information Systems (GIS)
Geographic Information Systems : GIS and Related Technology
GISinMapping:Peoplefromdifferentprofessionsusemaptocommunicate.Itisnot
necessarytobeaskilledcartographertocreatemaps.Googlemap,Bingmap,Yahoomap
arethebestexampleforwebbasedGISmappingsolution.
DetectionofCoalMineFires:GIStechnologyisappliedintheareaofsafeproductionof
coalmine.Firehappensfrequentlyincoalmines.Soitcanassessedspontaneous
combustionriskusingGIStools.
AgriculturalApplications:GIScanbeusedtocreatemoreeffectiveandefficientfarming
techniques.Itcanalsoanalysesoildataandtodetermine:whatarethebestcroptoplant?,
wheretheyshouldgo?howtomaintainnutritionlevelstobestbenefitcroptoplant?
19

Geographic Information Systems (GIS)
Geographic Information Systems : GIS and Related Technology
NaturalResourcesManagement:BythehelpofGIStechnologytheagricultural,water
andforestresourcescanbewellmaintainandmanage.Foresterscaneasilymonitor
forestcondition.GISisusedtoanalyzegeographicdistributionofwaterresources.
GISSolutionsinBankingSector:Thesuccessofbankingsectorlargelydependsonthe
abilityofabanktoprovidecustomerandmarketdrivenservices.GISplaysanimportant
roleprovidingplanning,organizinganddecisionmaking.
GISApplicationsinGeology:GeologistsuseGISinavariousapplications.TheGISis
usedtostudygeologicfeatures,analysesoils.Itisusedtoanalyserockinformation
characteristicsandidentifyingthebestdamsitelocation.
20

Geographic Information Systems (GIS)
Geographic Information Systems : GIS and Related Technology
AccidentAnalysisandHotSpotAnalysis:GIScanbeusedasakeytooltominimize
accidenthazardonroads.Byidentifyingtheaccidentlocations,remedialmeasurescanbe
plannedbythedistrictadministrationstominimizetheaccidentsindifferentpartsoftheworld.
ReroutingdesignisalsoveryconvenientusingGIS.
GISinDairyIndustry:GeographicInformationSystemisusedinavariousapplicationinthe
dairyindustry,suchasdistributionofproducts,productionrate,locationofshopsandtheir
sellingrate.ThesecanbemonitoredbyusingGISsystem.
Deforestation:Nowadaysforestareaisdecreasingeveryyear,duetodifferentactivities.GIS
isusedtoindicatethedegreeofdeforestationandvitalcausesforthedeforestationprocess.
GISisusedtomonitordeforestation.
21

UNIT V Overview of Emerging Technology: Geographic
Information Systems
Related Videos
https://www.youtube.com/watch?v=-ZFmAAHBfOU
https://www.youtube.com/watch?v=vJAQHA5XQWI
22

Cloud Computing
Cloud Computing : Introduction
CloudComputingistheuseofhardwareandsoftwaretodeliveraserviceoveranetwork
(typicallytheInternet).Withcloudcomputing,userscanaccessfilesanduseapplications
fromanydevicethatcanaccesstheInternet.
UnliketraditionalcomputingwheredataisstoredonourPC'slocalharddrive,thedatain
thecloudisstoredonmanyphysicaland/orvirtualserversthatarehostedbyathird-party
serviceprovider.
AnexampleofaCloudComputingproviderisGoogle'sGmail.Gmailuserscanaccessfiles
andapplicationshostedbyGoogleviatheinternetfromanydevice.
23

Cloud Computing
Cloud Computing : Introduction
The three major Cloud Computing Offerings are;
SoftwareasaService(SaaS):Itisadistributionmodelinwhichapplicationsarehostedby
avendororserviceproviderandmadeavailabletocustomersoveranetwork(internet).
SaaSisbecominganincreasinglyprevalentdeliverymodelasunderlyingtechnologiesthat
supportsServiceOrientedArchitecture(SOA)orWebServices.Throughinternetthis
serviceisavailabletousersanywhereintheworld.
PlatformasaService(PaaS):Itprovidesaplatformandenvironmenttoallowdevelopers
tobuildapplicationsandservices.Thisserviceishostedinthecloudandaccessedbythe
usersviainternet.
Tounderstandinasimpleterms,letcomparethiswithpaintingapicture,whereyouare
providedwithpaintcolors,differentpaintbrushesandpaperandyoujusthavetodrawa
beautifulpictureusingthosetools.
24

Cloud Computing
Cloud Computing : Introduction
The three major Cloud Computing Offerings are;
InfrastructureasaService(IaaS):IaaSisoneofthefundamentalservicemodelofcloud
computingalongsidePaaS(PlatformasaService).Itprovidesaccesstocomputing
resourcesinavirtualizedenvironment“thecloud”oninternet.Itprovidescomputing
infrastructurelikevirtualserverspace,networkconnections,bandwidth,loadbalancersand
IPaddresses.Thepoolofhardwareresourceisextractedfrommultipleserversand
networksusuallydistributedacrossnumerousdatacenters.
25

Cloud Computing
CloudComputing:ApplicationsofCloudComputing
ScalableUsage:Cloudcomputingoffersscalableresourcesthroughvarioussubscription
models.Thismeansthatyouwillonlyneedtopayforthecomputingresourcesyouuse.This
helpsinmanagingspikesindemandswithouttheneedtopermanentlyinvestincomputer
hardware.
Chatbots:Theexpandedcomputingpowerandcapacityofthecloudenablesustostore
informationaboutuserpreferences.Thiscanbeusedtoprovidecustomizedsolutions,
messagesandproductsbasedonthebehaviourandpreferencesofusers.Siri,Alexaand
GoogleAssistant-allarecloud-basednatural-languageintelligentbots.Thesechatbots
leveragethecomputingcapabilitiesofthecloudtoprovidepersonalizedcontext-relevant
customerexperiences.
26

Cloud Computing
CloudComputing:ApplicationsofCloudComputing
Communication:Thecloudallowsuserstoenjoynetwork-basedaccesstocommunication
toolslikeemailsandcalendars.MostofthemessagingandcallingappslikeSkypeand
WhatsApparealsobasedoncloudinfrastructure.Allourmessagesandinformationarestored
ontheserviceprovider’shardwareratherthanonourpersonaldevice.
Productivity:OfficetoolslikeMicrosoftOffice365andGoogleDocsusecloudcomputing,
allowingustouseourmost-productivetoolsovertheinternet.Wecanworkonourdocuments,
presentationsandspreadsheets-fromanywhere,atanytime.Withourdatastoredinthecloud,
wedon’tneedtobotheraboutdatalossincaseourdeviceisstolen,lostordamaged.
27

Cloud Computing
Cloud Computing : Applications of Cloud Computing
Social Networking: Social Media is the most popular and often overlooked application of
cloud computing. Facebook, LinkedIn, MySpace, Twitter, and many other social networking
sites use cloud computing. Social networking sites are designed to find people you already
know or would like to know.
Business Process: Many business management applications like customer relationship
management (CRM) and enterprise resource planning (ERP) are also based on a cloud service
provider. Software as a Service (SAAS) has become a popular method for deploying enterprise
level software.
Big data analytics: Cloud computing enables data scientists to tap into any organizational data
to analyse it for patterns and insights, find correlations make predictions, forecast future crisis
and help in data backed decision making.
28

Cloud Computing
Cloud computing is famous for the following:
DAAS –Data As A Service
PAAS –Platform As A Service
SAAS –Software As A Service
What is DAAS, PAAS and SAAS?
Watch out this
https://www.youtube.com/watch?v=MhdGrZHKJ3o
https://www.youtube.com/watch?v=M988_fsOSWo
https://www.youtube.com/watch?v=usYySG1nbfI
29

Artificial Intelligence
ArtificialIntelligence
AbranchofComputerSciencenamedArtificialIntelligencepursuescreatingthe
computersormachinesasintelligentashumanbeings.
AccordingtothefatherofArtificialIntelligence,JohnMcCarthy,itis“Thescience
andengineeringofmakingintelligentmachines,especiallyintelligentcomputer
programs”.
ArtificialIntelligenceisawayofmakingacomputer,acomputer-controlledrobot,or
asoftwarethinkintelligently,inthesimilarmannertheintelligenthumansthink.
30

UNIT V Overview of Emerging Technology: Artificial
Intelligence
ArtificialIntelligence
31

Artificial Intelligence
ArtificialIntelligence:ApplicationsofArtificialIntelligence
Gaming−AIplayscrucialroleinstrategicgamessuchaschess,poker,tic-tac-toe,
etc.,wheremachinecanthinkoflargenumberofpossiblepositionsbasedonheuristic
knowledge.
NaturalLanguageProcessing−Itispossibletointeractwiththecomputerthat
understandsnaturallanguagespokenbyhumans.
ExpertSystems−Therearesomeapplicationswhichintegratemachine,software,
andspecialinformationtoimpartreasoningandadvising.Theyprovideexplanation
andadvicetotheusers.
32

Artificial Intelligence
ArtificialIntelligence:ApplicationsofArtificialIntelligence
VisionSystems−Thesesystemsunderstand,interpret,andcomprehendvisualinput
onthecomputer.Forexample,
Aspyingaeroplanetakesphotographs,whichareusedtofigureoutspatialinformationor
mapoftheareas.
Doctorsuseclinicalexpertsystemtodiagnosethepatient.
Policeusecomputersoftwarethatcanrecognizethefaceofcriminalwiththestoredportrait
madebyforensicartist.
SpeechRecognition−Someintelligentsystemsarecapableofhearingand
comprehendingthelanguageintermsofsentencesandtheirmeaningswhileahuman
talkstoit.Itcanhandledifferentaccents,slangwords,noiseinthebackground,
changeinhuman’snoiseduetocold,etc.
33

Artificial Intelligence
ArtificialIntelligence:ApplicationsofArtificialIntelligence
HandwritingRecognition−Thehandwritingrecognitionsoftwarereadsthetext
writtenonpaperbyapenoronscreenbyastylus.Itcanrecognizetheshapesofthe
lettersandconvertitintoeditabletext.
IntelligentRobots−Robotsareabletoperformthetasksgivenbyahuman.They
havesensorstodetectphysicaldatafromtherealworldsuchaslight,heat,
temperature,movement,sound,bump,andpressure.Theyhaveefficientprocessors,
multiplesensorsandhugememory,toexhibitintelligence.Inaddition,theyare
capableoflearningfromtheirmistakesandtheycanadapttothenewenvironment.
34

Artificial Intelligence
ArtificialIntelligence
https://www.youtube.com/watch?v=Lu56xVlZ40M
https://www.youtube.com/watch?v=2ePf9rue1Ao
https://www.youtube.com/watch?v=XCPZBD9lbVo&list=PLbMVogVj5nJQu5
qwm-HmJgjmeGhsErvXD
35

Internet of Things (IoT)
InternetofThings:Introduction
InternetofThings(IoT)isanecosystemofconnectedphysicalobjectsthatareaccessible
throughtheinternet.The‘thing’inIoTcouldbeapersonwithaheartmonitororan
automobilewithbuilt-in-sensors,i.e.objectsthathavebeenassignedanIPaddressandhave
theabilitytocollectandtransferdataoveranetworkwithoutmanualassistanceor
intervention.Theembeddedtechnologyintheobjectshelpsthemtointeractwithinternal
statesortheexternalenvironment,whichinturnaffectsthedecisionstaken.
36

Internet of Things (IoT)
InternetofThings:ApplicationsofIoT
SmartHome:WheneverwethinkofIoTsystems,themostimportantandefficient
applicationthatstandsouteverytimeisSmartHomerankingashighestIOTapplicationon
allchannels.Morecompaniesarenowactivelybeinginvolvedinsmarthomesthansimilar
otherapplicationsinthefieldofIoT.TheestimatedamountoffundingforSmartHome
startupsexceeds$2.5bnandisevergrowing.Asmarthomegivesownerthecapabilityto
customizeandcontrolhomeenvironmentforincreasedsecurityandefficientenergy
management.TherearehundredsofIoTtechnologiesavailableformonitoringandbuilding
smarthomes.
Wearables:WearablesareoneofthehottesttrendsinIoTcurrently.WearableIoTtechisa
verylargedomainandconsistsofanarrayofdevices.Thesedevicesbroadlycoverthefitness,
healthandentertainmentrequirements.Theprerequisitefrominternetofthingstechnologyfor
wearableapplicationsistobehighlyenergyefficientorultra-lowpowerandsmallsized.
37

Internet of Things (IoT)
InternetofThings:ApplicationsofIoT
SmartCity:Smartsurveillance,saferandautomatedtransportation,smarterenergy
managementsystemsandenvironmentalmonitoringallareexamplesofinternetofthings
applicationsforsmartcities.Smartcitiesaretherealsubstantialsolutionsforthetroubles
peopleusuallyfaceduetopopulationoutburst,pollution,poorinfrastructureandshortageof
energysupplies.
Agriculture:Agriculturesectorneedsveryinstitutiveaswellashighlyscalabletechnology
solutions.Internetofthingsapplicationssuchasfieldmonitoring,precisionagriculture,
weatherforecasting,diseasesidentificationetccandeliverexactlythesametofarmers.
IndustrialAutomation:Industrialautomationisoneofthemostprofoundapplicationsof
IoT.Withhelpofinternetofthingsinfrastructurebackedwithadvancedsensornetworks,
wirelessconnectivity,innovativehardwareandmachine-to-machinecommunication,
conventionalautomationprocessofindustrieswilltransformcompletely.
38

Internet of Things (IoT)
InternetofThingsVideos
https://www.youtube.com/watch?v=PpAFzzS4zSc
https://www.youtube.com/watch?v=N_z4OaSuoAA
https://www.youtube.com/watch?v=ctYGH5tbw4o
https://www.youtube.com/watch?v=WUYAjxnwjU4&list=PLaxu2gn-
9WXMf_ln5pMvxjf043jzof4-i
39

Computer virus
Computervirus:Introduction
Acomputervirusisatypeofmalicioussoftwarethat,whenexecuted,replicatesitselfby
modifyingothercomputerprogramsandinsertingitsowncode.Whenthisreplication
succeeds,theaffectedareasarethensaidtobe"infected"withacomputervirus.
Theterm"virus"isalsocommonly,buterroneously,usedtorefertoothertypesofmalware.
"Malware"encompassescomputervirusesalongwithmanyotherformsofmalicious
software,suchascomputer"worms",ransomware,spyware,adware,Trojanhorses,key
loggers,rootkits,bootkitsandothermalicioussoftware.Themajorityofactivemalware
threatsareactuallyTrojanhorseprogramsorcomputerwormsratherthancomputerviruses.
40

Computer virus
Computervirus:Differenttypesofviruses
Bootsectorviruses:Abootsectorvirusinfectsthebootsectoroffloppydisksorharddrives.
Theseblockscontainasmallcomputerprogramthatparticipatesinstartingthecomputer.A
viruscaninfectthesystembyreplacingorattachingitselftotheseblocks.
Worms:Awormisbydefinitionsimilartoavirusbutmoreindependent.Thefirstwaveof
wormswasseenwhenInternetmailbecameastandardwaytocommunicate.Anemailclient,
andespeciallyaddressbooksandmailinglists,provideapowerfulwaytoreachalarge
numberofrecipientsworldwidewithverylittleeffort.Modern,advancedemailprogramsalso
providethisfunctionalitythroughAPIsthatmakeitpossibleforcomputerprogramsto
automaticallysendmessages.Allthistogetherprovidesanenvironmentthatenablesmail
wormstospreadmuchfasterthanviruses.
41

Computer virus
Computervirus:Differenttypesofviruses
Trojanhorses:ThenameTrojanhorseisborrowedfromGreekmythology.Inthecomputer
worldthetermreferstoaprogramthatcontainshiddenmaliciousfunctions.Theprogrammay
looklikesomethingfunnyorusefulsuchasagameorutility,butharmsthesystemwhen
executed.ManyTrojanscontainactivationcriteriathatenabletheTrojantoworkforawhile.
Theuserisconvincedthattheprogramissafeanduseful,andforwardsittootherusersbefore
themaliciouscodestrikes.Trojanslackareplicationroutineandthusarenotvirusesby
definition.ATrojanisspreadtoothercomputersonlythroughdeliberatetransferbytheusers.
Spyware:Thisisasoftwarethataimstogatherinformationaboutapersonororganization,
sometimeswithouttheirknowledge,thatmaysendsuchinformationtoanotherentitywithout
theconsumer'sconsent,thatassertscontroloveradevicewithouttheconsumer'sknowledge,
oritmaysendsuchinformationtoanotherentitywiththeconsumer'sconsent,through
cookies.
42

Computer virus
Computervirus:Differenttypesofviruses
Directoryviruses:Thisvirusaltersthepathsindicatingafile’slocation.Inthiscase,when
theinfectedprogramisexecuted,youwillberunningtheprogramunknowingly,sincethe
virushasmovedtheoriginalprogramandfiletoanotherlocation.Thisthereforemakesit
impossibletolocatethemovedfiles.
43

Computer virus
AntivirusSoftware:
Anti-virussoftwareisasoftwareutilitythatdetects,prevents,andremovesviruses,worms,
andothermalwarefromacomputer.Mostanti-virusprogramsincludeanauto-updatefeature
thatpermitstheprogramtodownloadprofilesfnewviruses,enablingthesystemtocheckfor
newthreats.Antivirusprogramsareessentialutilitiesforanycomputerbutthechoiceof
whichoneisveryimportant.OneAVprogrammightfindacertainvirusorwormwhile
anothercannot,orvice-versa.Anti-virussoftwareisalsoknownasananti-virusprogramora
vaccine.
44

VIRUS v/s ANITVIRUS
45

Computer virus
https://www.youtube.com/watch?v=0_yXhccbleY
Computervirusandantivirusvideos
https://www.youtube.com/watch?v=c34QwtYI40g
https://www.youtube.com/watch?v=Pv7RufjxoXQ
46

Free and Open-source software
Free and Open-source software
Open-sourcesoftware(OSS)isatypeofcomputersoftwareinwhichsourcecodeis
releasedunderalicenseinwhichthecopyrightholdergrantsuserstherightsto
study,change,anddistributethesoftwaretoanyoneandforanypurpose.Open-
sourcesoftwaremaybedevelopedinacollaborativepublicmanner.Open-source
softwareisaprominentexampleofopencollaboration.
47

Free and Open-source software
Free and Open-source software
Users should be treated as co-developers: The users are treated like co-developers
and so they should have access to the source code of the software. Furthermore, users
are encouraged to submit additions to the software, code fixes for the software, bug
reports, documentation etc. Having more co-developers increases the rate at which the
software evolves.
Early releases: The first version of the software should be released as early as possible
so as to increase one's chances of finding co-developers early.
48

Free and Open-source software
FreeandOpen-sourcesoftware
Frequentintegration:Codechangesshouldbeintegrated(mergedintoasharedcode
base)asoftenaspossiblesoastoavoidtheoverheadoffixingalargenumberofbugs
attheendoftheprojectlifecycle.Someopensourceprojectshavenightlybuilds
whereintegrationisdoneautomaticallyonadailybasis.
Severalversions:Thereshouldbeatleasttwoversionsofthesoftware.Thereshould
beabuggierversionwithmorefeaturesandamorestableversionwithfewerfeatures.
Thebuggyversion(alsocalledthedevelopmentversion)isforuserswhowantthe
immediateuseofthelatestfeatures,andarewillingtoaccepttheriskofusingcode
thatisnotyetthoroughlytested.Theuserscanthenactasco-developers,reporting
bugsandprovidingbugfixes.
49

Free and Open-source software
FreeandOpen-sourcesoftware
Dynamicdecision-makingstructure:Thereisaneedforadecision-makingstructure,
whetherformalorinformal,thatmakesstrategicdecisionsdependingonchanginguser
requirementsandotherfactors.
50

Free and Open-source software
Videos
https://www.youtube.com/watch?v=2q91vTvc7YE
https://www.youtube.com/watch?v=hFRS46PsDU0
51

52