Trends and Issues & Special Interest Topics in ICT

Cards (28)

  • Cloud Computing
    • It is the delivery of computing services including servers, storages, databases, networking, software, analytics, and intelligence - over the internet to offer faster innovation, flexible resources, and economies of scale.
    • Benefits of Cloud Computing: Cost, Speed, Global Scale, Productivity, Performance, Reliability, Security
    • Types of Cloud Computing: Public, Private, Hybrid
    • Types of Cloud Services: IaaS (Infrastructure as a Service), PaaS (Platform as a Service), Serverless, SaaS (Software as a Service)
  • Internet of Things (IoT)
    • Refers to the billions of physical devices that are now connected to the internet, all connecting and sharing data.
    • It integrates the connection of human culture – our ‘things’ – with the interconnection of our digital information system – ‘the internet’
    • The collective network of connected devices and the technology that facilitates communication between devices and the cloud, as well as between the devices themselves.
  • Mobile Application
    • It is a type of application software designed to run on a mobile device such as smartphone or tablet computer, that serves to provide users with similar services to those accessed on PC’s.
    • Several types of mobile application: gaming apps, productivity apps, lifestyle and entertainment apps.
  • Human Computer Interaction (HCI)
    • Is the study of how people interact with computers and to what extent computers are or are not developed for successful interaction with human beings.
    • Ex. Typing in a keyboard, virtual reality
  • Artificial Intelligence (AI)
    • It is a branch of science which deals with helping machines find solutions to complex problems in a more human-like fashion.
    • It is concerned with guiding computers to tasks that require human intelligence.
  • AI Techniques
    • Knowledge representation 
    • Search
    • Fuzzy Logic
    • Intelligent Computer Aided Instruction (ICAI)
    • Computer Vision
    • Machine Learning
    • Handwriting Recognizers
  • Knowledge Representation
    • Equips AI agents with the capabilities to solve the most complex tasks based on what they have learned from the knowledge given to them.
  • Search
    • Can analyze vast amounts of voice search data and identify patterns in user behavior and search queries. By using natural language processing, AI can identify the intent behind specific types of queries and recommend the most relevant keywords and phrases to target in content.
  • Fuzzy Logic
    • Is an approach to computing based on "degrees of truth" rather than the usual "true or false" (1 or 0) Boolean logic on which the modern computer is based.
  • Intelligent Computer Aided Instruction (ICAI)
    • refers to the work of machines that can tutor humans.
  • Computer Vision / Vision Systems
    • It permits computers to capture, store, and manipulate visual images and pictures.
  • Machine Learning
    • Refers to a set of methods that attempt to teach computers to solve a problem.
  • Handwriting Recognizers
    • Touchscreen / Stylus
  • Expert System
    • Is a software-based system that attempts to capture human knowledge or expertise in a limited domain area.
  • Neural Networks
    • A computer system that can stimulate the functioning of the human brain.
  • Natural Languages Processing (NLP)
    • Branch of AI which is concerned with understanding natural languages.
    • Examples: Speech recognition / Speech synthesis
  • Robotics
    • It attempts to develop physical machines that can perform useful work normally done by humans.
    • Advanced Step in Innovative Mobility (ASIMO)
  • Data Analytics
    • Is the process of analyzing raw data to find trends and answer questions.
    • Intersection of information technology, statistics, and business
  • Types of data analytics: descriptive (what happened), diagnostic (why it happened), predictive (what will happen), prescriptive (what should be done).
  • Data Security
    • Refers to protecting data against unauthorized access or use that could result in exposure, deletion, or corruption of data.
  • Data Privacy
    • Refers to concerns regarding how data is handled - regulatory concerns, notification, and consent of use.
    • Examples of data privacy is gaining consent to collect data from website visitors by using cookies.
  • Cybersecurity
    • Is the practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
    • Types of cyber threats: cybercrime, cyber-attack, cyberterrorism.
  • Malware
    • Malicious software
    • It is a software that cybercriminals or hackers create to disrupt or damage a legitimate user’s computer.
    • Types: virus, trojans, spyware, ransomware, adware, botnets, phishing, man-in-the-middle attack, denial-of-service attack.
  • Cyber Safety Tips
    • Update your software and operating systems
    • Use anti-virus software
    • Use strong passwords
    • Do not open email attachments from unknown senders
    • Do not click on links in emails from unfamiliar senders or websites
    • Avoid using unsecured WiFi networks in public places.