Charisse Anne F. Tabarno BSN 2-I 1. What is artificial intelligence? Artificial intelligence (AI) is the intelligence of machines and the branch of computer science which aims to create it. Major AI textbooks define the field as "the study and design of intelligent agents,” where an intelligent agent is a system that perceives its environment and takes actions which maximize its chances of success, John McCarthy, who coined the term in 1956, defines it as "the science and engineering of making intelligent machines”. |
2. What is genetic engineering? |
Genetic engineering, recombinant DNA technology, genetic modification/manipulation (GM) and gene splicing are terms that apply to the direct manipulation of an organism's genes. Genetic engineering is different from
traditional breeding, where the organism's genes are manipulated indirectly. Genetic engineering uses the techniques of molecular cloning and transformation to alter the structure and characteristics of genes directly. Genetic engineering techniques have found some successes in numerous applications. Some examples are in improving crop technology, the manufacture of synthetic human insulin through the use of modified bacteria, the manufacture of erythropoietin in hamster ovary cells, and the production of new types of experimental mice such as the oncomouse (cancer mouse) for research. |
3. What is Virtual Reality? |
Virtual Reality is a computer simulation of a real or imaginary system that enables a user to perform operations on the simulated system and shows the effects in real time.It is also, a form of human-computer interaction in which a real or imaginary environment is simulated and users interact with and manipulate that world.
Users travel within the simulated world by moving toward where they want to be, and interact with things in that world by grasping and manipulating simulated objects. In the most successful virtual environments, users feel that they are truly present in the simulated world and that their experience in the virtual world matches what they would experience in the environment being simulated. This sensation is referred to as engagement, immersion, or presence, and it is this quality that distinguishes virtual reality from other forms of human-computer interaction. When a user interacts with a virtual environment, the computer-generated graphics display must be updated with each turn of the head or movement of the hand. The virtual environment must be able to generate and display realistic-looking views of the simulated world quickly enough that the interaction feels responsive and natural. |
4. What is Electronic commerce? |
Electronic commerce,
commonly known as e-commerce or eCommerce, consists of the buying and selling of products or services over electronic systems such as the Internet and other computer networks. The amount of trade conducted electronically has grown extraordinarily with wide-spread Internet usage. A wide variety of commerce is conducted in this way, spurring and drawing on innovations in electronic funds transfer, supply chain management, Internet marketing, online transaction processing, electronic data interchange (EDI), inventory management systems, and automated data collection systems. Modern electronic commerce typically uses the World Wide Web and it can encompass a wider range of technologies such as e-mail as well. |
FINALS LAB PERFORMANCE: TECHNOLOGICAL ISSUES 1. What is the difference between plagiarism and copyright? |
Plagiarism is the use or close imitation of the language and ideas of another author and representation of them as one's own
original work. On the other hand, Copyright is a form of intellectual property which gives the creator of an original work exclusive rights for a certain time period in relation to that work, including its publication, distribution and adaptation; after which time the work is said to enter the public domain. Copyright applies to any expressible form of an idea or information that is substantive and discrete. Some jurisdictions also recognize "moral rights" of the creator of a work, such as the right to be credited for the work. |
2. What is a computer crime? |
Computer crime, cybercrime, e-crime, hi-tech crime or electronic crime generally refers to criminal activity where a computer or network is the source, tool, target, or place of a crime. Additionally, although the terms computer crime and cybercrime are more properly restricted to describing criminal activity in which the computer or network is a necessary part of the crime, these terms
are also sometimes used to include traditional crimes, such as fraud, theft, blackmail, forgery, and embezzlement, in which computers or networks are used. As the use of computers has grown, computer crime has become more important.
Examples:
1. Drug trafficking Drug traffickers are increasingly taking advantage of the Internet to sell their illegal substances through encrypted e-mail and other Internet Technology. Some drug traffickers arrange deals at internet cafes, use courier Web sites to track illegal packages of pills, and swap recipes for amphetamines in restricted-access chat rooms. The rise in Internet drug trades could also be attributed to the lack of face-to-face communication. These virtual exchanges allow more intimidated individuals to more comfortably purchase illegal drugs. The sketchy effects that are often associated with drug trades are severely minimized and the filtering process that comes with physical interaction fades away. Furthermore, traditional drug recipes were carefully kept secrets. But with modern computer technology, this information is now being made available to anyone with computer access. 2. Cyberterrorism Government officials and IT security specialists have documented a significant increase in Internet probes and server scans since early 2001. There is a growing concern among federal officials that such intrusions are part of an organized effort by cyberterrorists, foreign intelligence services, or other groups to map potential security holes in critical systems. A cyberterrorist is someone who intimidates or coerces a government or organization to advance his or her political or social objectives by launching computer-based attack against computers, network, and the information stored on them.Cyberterrorism in general, can be defined as an act of terrorism committed through the use of cyberspace or computer resources. As such, a simple propaganda in the Internet, that there will be bomb attacks during the holidays can be considered cyberterrorism. At worst, cyberterrorists may use the Internet or computer resources to carry out an actual attack.As well there are also hacking activities directed towards individuals, families, organized by groups within networks, tending to cause fear among people, demonstrate power, collecting information relevant for ruining peoples' lives, robberies, blackmailing etc. |
3. What is a computer virus? |
A computer virus is a computer program that can copy itself and infect a computer without the permission or knowledge of the user. The term "virus" is also commonly but erroneously used to refer to other types of malware, adware and spyware programs that do not have the reproductive ability. A true virus can only spread from one computer to another (in some form of executable code) when its host is taken to the target computer; for instance because a user sent it over a network or the Internet, or carried it on a removable medium such as a floppy disk, CD, DVD, or USB drive. Viruses can increase their chances of spreading to
other computers by infecting files on a network file system or a file system that is accessed by another computer.
1.The “I Love You” virus The "I Love You" menace clogged up Web servers, manipulated personal files and caused IT System Managers to shut e-mail systems off the network. (The author was one of these IT Managers - we saw the email proliferating and as fast as we shut subsystems down, the faster the menace came flooding inwards. In the end, we had to completely shut the network off from the outside world. We examined the code of "I Love You" on a PC that was isolated for the purpose of examining viruses, and found 15 pages of Visual basic (.VBS) code!) If you look at the VBS code you will see that it corrupts MP3 and JPEG files on users' hard drives, as well as mIRC, a version of Internet Relay Chat. It also appears to reset the default start page for Internet Explorer. The thing which really piqued me was the first two lines of code: "I hate go to school..." 2.Melissa It comes via an e-mail with an attached Microsoft Word document. When this message is opened, the virus is activated and infects the file Normal.dot, then every document created by this text editor is infected and automatically send a infected e-mail to the first 50 contacts from the catalog of Outlook Express. 3.Codered It attacks the Microsoft IIS 4.0 and 5.0 modifies the main page with the message "Welcome to http:// www.worm.com ! Hacked By Chinese!" and also programs the infected computer to make a denial-of-service attack to the White House website (www.whitehouse.gov). |
4. Is working with computers for a long period of time can cause various types of health problems? Why? give EXAMPLES |
As computer usage has increased, so have related vision problems. One reason is because your eyes need to work harder to focus on the computer screen for a prolonged period. Computers are more visually demanding than printed material because the image on a monitor is not stable like printed text in a book. It is composed of pixels of light that are continually being refreshed. Therefore, your eye muscles must constantly adjust to keep the flickering screen in focus. Because of this intense focusing demand, even low
amounts of uncorrected astigmatism or farsightedness make your eye muscles work harder. Studies have shown that prescription glasses, designed specifically for computer use, will decrease eyestrain and physical fatigue, and improve productivity.Muscles that control eye movement and eye coordination, also get a workout at the computer as you scan the screen or surf the web for hours. Inefficient eye tracking can make it difficult for you to analyze spreadsheets and keep your eyes on the lines of text. Poor eye coordination can slow you down while reading the screen. Eyes that tend to drift apart create symptoms such as eyestrain, intermittent double images and headaches.Another cause of computer-related eyestrain is dry eyes. We tend to blink less frequently while concentrating which diminishes eye lubrication. Dry eye symptoms include burning, itching, intermittent blur, or a "heavy eyes" sensation. This can usually be improved by using artificial
tears, a humidifier , or nutritional supplements to increase tear production.Working with computers for a long period of time can cause various types of health problems like headache,eyestrain, irritated eyes, blurred vision, slow to refocus on objects around the room after prolonged exposure to computer, difficulty seeing clearly at distance after prolonged computer use, vision goes in and out of focus, words appear to move on the screen, frequent loss of place when looking between copy and screen, double vision at any time, neck ache or blurry vision with current prescription, frequent visual mistakes i.e. inverting letters or numbers, or while proofreading. |
The field was founded on the claim that a central property of human beings, intelligence—the sapience of Homo sapiens—can be so precisely described that it can be simulated by a machine. Artificial intelligence has been the subject of breathtaking optimism, has suffered stunning setbacks and, today, has become an essential part of the technology industry, providing the heavy lifting for many of the most difficult problems in computer science
.
2.Genetic Engineering-the word gene comes from the Greek word Genea meaning "breed, kind, and genesis "descent, origin".Genetic engineering means direct intervention in the genetic make-up a living being, the replacement of genes or the addition of new genes to the genetic "code" or "blueprint" of an organism. In other words, Genetic Engineering involves the whole process of altering genes, the building blocks of life, in order to achieve either a radically, or a completely new, human being.
Genetic Engineerinf according to its advocates, is more human than the biological process, insofar as it is willed-planned and systematically organized. The biological process is left to chance, accident. and to the blind forces of nature; whereas genetic engineering is willed and scientifically designed by man for thereapeutic and eugenic reasons.
3.Virtual reality (VR) is a technology which allows a user to interact with a environment, whether that environment is a simulation of the real world or an imaginary world. Most current virtual reality environments are primarily visual experiences, displayed either on a computer-screen or through special ostereoscopic displays , but some simulations include additional sensory information, such as sound through speakers or headphones.
Virtual Reality is often used to describe a wide variety of applications, commonly associated with its immersive, highly visual, 3D environments. The development of CAD software, graphics hardware acceleration, head mounted displays, database gloves and miniaturization have helped popularize the notion. In the book The Metaphysics of Virtual Reality,Michael Heim identifies seven different concepts of Virtual Reality: simulation, interaction, artificiality, immersion, telepresence, full-body immersion, and network communication. The definition still has a certain futuristic romanticism attached.
4.Electronic commerce, commonly known as e-commerce or eCommerce, consists of the buying and selling of products or services over electronic systems such as the Internet and other computer networks. The amount of trade conducted electronically has grown extraordinarily with wide-spread Internet usage. Modern electronic commerce typically uses the World Wibe Web at least at some point in the transaction's lifecycle, although it can encompass a wider range of technologies such as e-mail as well.Electronic commerce that is conducted between businesses is referred to as business-to-business or B2B.
Electronic commerce is generally considered to be the sales aspect of e-business. It also consists of the exchange of data to facilitate the financing and payment aspects of the business transactions.
1.Plagiarism-is the act of taking someone else's words and/or ideas and passing them off as your own. For example, copying as little as part of a sentence can be plagiarism, particularly if the original author has used words or structure in unusual ways. Plagiarism can also extend to taking the overall structure or ideas of a work and claiming them as your own. The original source does not need to be published or copyrighted for plagiarism to occur, and plagiarism is not limited to words--data, charts, graphs, and images that other people have created are works that should not be passed off as your own. (These can be copyright violations as well.)
Copyright- is a legal right authors have over their works. Copyright is a legal and political concept, and changes due to international and commercial influences. Material under copyright can only be used under certain “fair use” exceptions or with the permission of the copyright holder. The MSU Extension Copyright Guideline has details on fair use. Even if a use falls under the “fair use” exceptions, you must provide appropriate references for the source, or it is plagiarism. (Most works copyrighted after 1922 or so are still protected, but works originating in the US prior to this date are now in the public domain and can be used, with proper credit, without limitation.)
2.Generally Computer crime encompass a broad range of potentially illegal activities. Generally, however, it may be divided into one of two types of categories: (1) crimes that target computer networks or devices directly; (2) crimes facilitated by computer networks or devices, the primary target of which is independent of the computer network or device.
Examples of computer crimes are:
Spam- or the unsolicited sending of bulk email for commercial purposes, is unlawful to varying degrees. As applied to email, specific anti-spam laws are relatively new, however limits on unsolicited electronic communications have existed in some forms for some time.
Fraud-is any dishonest misrepresentation of fact intended to induce another to do or refrain from doing something which causes loss. In this context, the fraud will result in obtaining a benefit by:
3.A computer virus is a small software program that spreads from one computer to another computer and that interferes with computer operation. A computer virus may corrupt or delete data on a computer, use an e-mail program to spread the virus to other computers, or even delete everything on the hard disk.
Examples of viruses:
Resident Viruses
This type of virus is a permanent which dwells in the RAM memory. From there it can overcome and interrupt all of the operations executed by the system: corrupting files and programs that are opened, closed, copied, renamed etc.
Overwrite Viruses
Virus of this kind is characterized by the fact that it deletes the information contained in the files that it infects, rendering them partially or totally useless once they have been infected.
Boot Virus
This type of virus affects the boot sector of a floppy or hard disk. This is a crucial part of a disk, in which information on the disk itself is stored together with a program that makes it possible to boot (start) the computer from the disk.
4.Doctors seem to encounter more and more musculoskeletal affections caused by using the keyboard for too long. Here are some of the affections you might develop if you work a lot on your computer, by especially using the keyboard: synovitis, tendonitis, chronic arthritis and epicondylitis.
Even though these affections might not ring any bell to you, consider the fact that they might leave you incapable to work after developing them. Some studies say that in the US, such affections caused by the inadequate use of keyboards lead to a loss of 1.3% of the internal profit. The wrong body posture at the working place, the tension that accumulates in the joints and muscles when typing excessively, the stress that causes lesions in the blood vessels, muscles, ligaments and even bones can be considered triggering factors for the previously mentioned affections.
People who observe these changes in their hand’s joints should address the doctor as soon as possible. Do not postpone your visit to the doctor for months as this is not a solution. If you act fast the only treatment you might need would be a couple of physiotherapy sessions, and certain anti-inflammatory drugs; and of course the indication of replacing your keyboard with a medical one as soon as possible. In case you neglect the symptoms of a joint affection you might even get to surgery in order to recover your hand mobility as it was.
| Final exer 4.Scientific discovery |
1. What is artificial intelligence? |
| -- It is a software that can process information on its own without human interventions which means it is very advanced because it doesn't anymore need us to operate. |
2. What is genetic engineering? |
| -- Genetic
engineering is the insertion of foreign genes into microorganisms to
enable the microorganisms to produce specific gene products or to
enable them to be used for other purpose. For me, this is one of
technology's advantage which helps prolong human life as well as help
in farming and other endeavor. 3. What is virtual reality? -- Since virtual reality is an artificial environment that feels like a real environment it is a very good place where a person could practice a certain skill like that done by student pilots. They have this simulation room where they feel like they are flying a real plane in which they could check their capability before doing the real thing. 4. What is E-commerce? -- It is conducting business online which for me is very convenient and helps a lot those home-based, micro-businesses become known and enable it to expand its customer base. Thus it makes a business grow and earn more profit. Final Exer: Technological Issues 1. What is plagiarism & copyright? -- Plagiarism is presenting someone else's idea or work as your own, without authorization in short, its piracy while copyright is the exclusive right granted by law for a certain number of years, to make and dispose of literary, musical or artistic just like in the music industry where composers/singers has copyright of their songs and hackers do plagiarism that is why pirated dvds proliferate in the market. 2. What is computer crime? -- It is a criminal act committed through the use of a computer example are unauthorized use of a computer and copyright violations of software. 3. What is computer virus? -- It is a program written usually by a hacker to cause the corruption of data on a computer examples are trojan horse, time bomb and worm. 4. Is working with computers for a long period of time can cause various types of health problems? Why? give EXAMPLES? -- Yes, due to the fact that you stare at the monitor for so long, you can encounter any of the following ailments including Eye strain, Tingling, coldness, or numbness in the hands at anytime even after a period of using your keyboard,some loss of strength and coordination in the hands, Pain that wakes you up at night sometimes , Feeling the need to massage your hands after keying in data, wrists, and arms and Pain in the upper back, shoulders or neck, this will be most likely due to the repeated use of a computer or can acquire BLOOD CANCER or Leukemia caused by the radiation. |