Copy of Digital _fluency_fullnotesP
Copy of Digital _fluency_fullnotesP
Table of Contents
Module 1: Emerging Technologies: Artificial Intelligence, Machine Learning and Deep Learning.........3
Artificial Intelligence............................................................................................................................3
Examples of Artificial intelligence...................................................................................................3
Artificial Intelligence application areas (Technological Landscape)...............................................4
Artificial Intelligence in Healthcare.................................................................................................4
Artificial Intelligence in Business Management...............................................................................4
Artificial Intelligence in E-commerce..............................................................................................5
Artificial Intelligence in Marketing..................................................................................................5
Machine Learning..................................................................................................................................5
Machine Learning Methods..............................................................................................................6
Deep Learning.......................................................................................................................................6
Deep-learning architectures..............................................................................................................6
Deep-learning application.................................................................................................................7
Neural Networks....................................................................................................................................7
Advantages of Artificial Intelligence................................................................................................8
Disadvantages of Artificial Intelligence...........................................................................................8
Module 2: Application of Emerging Technologies: Artificial Intelligence, Big Data Analytics, Internet
of Things, Cloud Computing and Cyber Security......................................................................................9
Big Data Analytics.................................................................................................................................9
Data...................................................................................................................................................9
Information.......................................................................................................................................9
Data management tasks....................................................................................................................9
Database..........................................................................................................................................10
Key terms to be known in database system...............................................................................10
Database Management System.......................................................................................................10
Data life Cycle................................................................................................................................10
Data life cycle framework..........................................................................................................10
Big Data Analytics..........................................................................................................................11
Data Analytics Process...............................................................................................................11
Sources of Big Data...................................................................................................................11
Advantages of DBMS.....................................................................................................................11
Disadvantages of DBMS................................................................................................................12
Data Science...................................................................................................................................12
Internet of Things (IOT)......................................................................................................................13
Industrial Internet of Things (IIoT)................................................................................................13
IoT Architecture..............................................................................................................................13
Parts of IoT.....................................................................................................................................13
Difference between IoT and IioT....................................................................................................14
Benefits of IIoT..............................................................................................................................15
Artificial Intelligence
Artificial intelligence (AI) is a wide-ranging branch of computer science concerned with building smart
machines capable of performing tasks that typically require human intelligence.
Artificial intelligence are computer programs that are capable of:
1) Thinking and learning
2) Solve problems
3) Communicate
4) Interact with its surroundings.
2. Text Editor
3. Social media
4. Chatbots
5. Recommendation algorithms in youtube
6. Search algorithms in Google, Bing etc.
7. Digital assistant like Apple’s siri, Google Assistant, Microsoft Cortana etc.
Machine Learning
Machine learning (ML) is the study of computer algorithms that can improve automatically through
experience and by the use of data. It is seen as a part of artificial intelligence. Machine learning
algorithms build a model based on sample data, known as training data, in order to make predictions or
decisions without being explicitly programmed to do so.
Deep Learning
Deep learning is a machine learning technique that teaches computers to do what comes naturally to
humans: learn by example. Deep learning is a key technology behind driverless cars, enabling them to
recognize a stop sign, or to distinguish a pedestrian from a lamppost. Learning can be supervised,
semi-supervised or unsupervised.
Deep-learning architectures
1. Deep neural networks
2. Deep belief networks
3. Deep reinforcement learning
4. Recurrent neural networks
5. Convolutional neural networks
Neural Networks
A neural network is a series of algorithms that endeavors to recognize underlying relationships in a set
of data through a process that mimics the way the human brain operates.
Modelled loosely on the human brain, a neural net consists of thousands of simple processing nodes
that are densely interconnected. Most of today’s neural nets are organized into layers of nodes, and
they’re “feed-forward,” meaning that data moves through them in only one direction. An individual
node might be connected to several nodes in the layer beneath it, from which it receives data, and
several nodes in the layer above it, to which it sends data.
Information
• Processed data is called information
• The purpose of data processing is to generate the information required for carrying out
the business activities.
Advantages of DBMS
Due to its centralized nature, the database system can overcome the disadvantages of the file system-
based system
Disadvantages of DBMS
1. Higher data processing cost
2. Increasing hardware and software costs
3. Insufficient database expertise
Data Science
Data science is an interdisciplinary field that uses scientific methods, processes, algorithms and
systems to extract knowledge and insights from noisy, structured and unstructured data, and apply
knowledge and actionable insights from data across a broad range of application domains.
IoT Architecture
1. Sensing Layer – Sensors, actuators, devices are present in this Sensing layer. These Sensors or
Actuators accepts data(physical/environmental parameters), processes data and emits data over
network.
2. Network Layer – Internet/Network gateways, Data Acquisition System (DAS) are present in
this layer. DAS performs data aggregation and conversion function (Collecting data and
aggregating data then converting analog data of sensors to digital data etc). Advanced gateways
which mainly opens up connection between Sensor networks and Internet also performs many
basic gateway functionalities like malware protection, and filtering also some times decision
making based on inputted data and data management services, etc.
3. Data processing Layer – This is processing unit of IoT ecosystem. Here data is analyzed and
pre-processed before sending it to data center from where data is accessed by software
applications often termed as business applications where data is monitored and managed and
further actions are also prepared. So here Edge IT or edge analytics comes into picture.
4. Application Layer (Data Center and Cloud)– This is last layer of 4 stages of IoT architecture.
Data centers or cloud is management stage of data where data is managed and is used by end-
user applications like agriculture, health care, aerospace, farming, defense, etc.
Parts of IoT
1. Sensors
2. Network connectivity
3. Data Storage
Benefits of IIoT
1. Improvement of Operational Performance
2. Ensuring Safety and Compliance
3. Increasing Flexibility and Agility
Digitization
Digitization is the process of converting information into a digital (i.e. computer-readable) format.
IoT Programming
IoT programming involves working with data to produce outcomes. Besides using programming
languages, well-known data analysis frameworks used in data science have a major role to play.
1. Cloud security. Security is often considered the greatest challenge facing cloud computing.
When relying on the cloud, organizations risk data breaches, hacking of APIs and interfaces,
compromised credentials and authentication issues. Furthermore, there is a lack of transparency
regarding how and where sensitive information entrusted to the cloud provider is handled.
Security demands careful attention to cloud configurations and business policy and practice.
2. Cost unpredictability. Pay-as-you-go subscription plans for cloud use, along with scaling
resources to accommodate fluctuating workload demands, can make it tough to define and
predict final costs. Cloud costs are also frequently interdependent, with one cloud service often
utilizing one or more other cloud services -- all of which appear in the recurring monthly bill.
This can create additional unplanned cloud costs.
3. Lack of capability and expertise. With cloud-supporting technologies rapidly advancing,
organizations are struggling to keep up with the growing demand for tools and employees with
the proper skill sets and knowledge needed to architect, deploy, and manage workloads and data
in a cloud.
4. IT governance. The emphasis on do-it-yourself capability in cloud computing can make IT
governance difficult, as there is no control over provisioning, deprovisioning and management
of infrastructure operations. This can make it challenging to properly manage risks and security,
IT compliance and data quality.
5. Compliance with industry laws. When transferring data from on-premises local storage into
cloud storage, it can be difficult to manage compliance with industry regulations through a third
party. It's important to know where data and workloads are actually hosted in order to maintain
regulatory compliance and proper business governance.
6. Management of multiple clouds. Every cloud is different, so multi-cloud deployments can
disjoint efforts to address more general cloud computing challenges.
7. Cloud performance. Performance -- such as latency -- is largely beyond the control of the
organization contracting cloud services with a provider. Network and provider outages can
interfere with productivity and disrupt business processes if organizations are not prepared with
contingency plans.
8. Building a private cloud. Architecting, building and managing private clouds -- whether for its
own purpose or for a hybrid cloud goal -- can be a daunting task for IT departments and staff.
9. Cloud migration. The process of moving applications and other data to a cloud infrastructure
often causes complications. Migration projects frequently take longer than anticipated and go
The front end consists of the client’s computer or computer network. Also the application essential to
access the cloud system. It is not necessary that all cloud computing systems have the same user
interface. On the back end of the cloud technology system, there are various computers, servers and
data storage systems that make up the cloud. A cloud computing system could potentially include any
computer program, from data processing to video games. Generally, each application will have its own
dedicated server.
1. Public Cloud: Public cloud is open to all to store and access information via the Internet using
the pay-per-usage method. In public cloud, computing resources are managed and operated by
the Cloud Service Provider (CSP). Example: Amazon elastic compute cloud (EC2), IBM
SmartCloud Enterprise, Microsoft, Google App Engine, Windows Azure Services Platform.
2. Private Cloud: Private cloud is also known as an internal cloud or corporate cloud. It is used by
organizations to build and manage their own data centers internally or by the third party. It can
be deployed using Opensource tools such as Openstack and Eucalyptus.
3. Hybrid Cloud: Hybrid Cloud is a combination of the public cloud and the private cloud. We
can say: Hybrid Cloud = Public Cloud + Private Cloud. Hybrid cloud is partially secure because
4. Community Cloud: Community cloud allows systems and services to be accessible by a group
of several organizations to share the information between the organization and a specific
community. It is owned, managed, and operated by one or more organizations in the
community, a third party, or a combination of them. Example: Health Care community cloud.
Information Security
Information security is the practice of protecting information and information systems from
unauthorized disclosure, modification, and destruction. It encompasses the security of all IT resources,
including both University information and the IT devices that access, process, store, or transmit it
Backup
A backup is a copy of the data stored on a device. It's useful for restoring data if your device crashes or
continuing work if your device is lost or stolen.
Cryptography
Cryptography is the science,practice and study of techniques for secure communication in the presence
of third parties.
Firewalls
Firewall is a network security system that controls the incoming and outgoing network traffic based on
an applied rule set. A firewall establishes a barrier between a trusted, secure internal network and
another network (e.g., the Internet) that is assumed not to be secure and trusted. Firewalls exist both as
software to run on general purpose hardware and as a hardware appliance.
E-commerce threats
1. Tricking the Shopper: These attacks involve surveillance of the shopper's behavior, gathering
information to use against the shopper.A common scenario is that the attacker calls the shopper,
pretending to be a representative from a site visited, and extracts information.
2. Snooping the Shopper's Computer: A popular technique for gaining entry into the shopper's
system is to use a tool, such as SATAN, to perform port scans on a computer that detect entry
Internet of Things
Exercises to assess understanding of the concepts
1. You go to a shopping mall and purchase some provisions. You are a regular customer of the
mall. Where do you think IoT can be used in this scenario? List out the possibilities.
2. In what ways can you use IoT in your home to make tasks easier? Find out a few available IoT
products that can be used in homes?
Cyber Security
Exercises to assess understanding of the concepts
1. You have CCTV cameras installed in your home. You are able to remotely monitor the CCTV
footage on your mobile from anywhere. Do you think your CCTV footage can be intercepted
and viewed by hackers?
2. You use your mobile to pay for services online through internet banking or using debit card.
You do not have any antivirus program installed on your mobile. Do you think it is possible for
hackers to get access to your password/CVV without you sharing the info?
Artificial Intelligence
Exercises to assess understanding of the concepts
1. When shopping online, observe the different ways in which AI is being used to influence your
purchasing decisions. What are the advantages and disadvantages of this?
2. Suggest different ways in which AI can be used to enhance your experience when you go to eat
out in a restaurant.
Practical Assignments
Refer to practical assignments of Module 1 – Artificial Intelligence for some background.
1. Find out which apps in your smartphones use AI and how?
2. Install Google lens on your smartphone and explore the different ways in which the app uses
AI.
3. Use the free version of the ELSA app on your android phone to improve your English.
Note: The trainer is instructed to encourage the students to work in groups of 02-03 and discuss
the above exercises before submitting the same
Internet of Things
Exercises to assess understanding of the concepts
1. In what ways can IoT technology be used to implement a smart building?
2. Do smartphones incorporate IoT? If yes, cite some examples.
Practical Assignments
Refer to practical assignments of Module 1 – Internet of Things for some background.
1. Using Whatsapp on your smartphone, share your location with a friend to set up a meeting. Try
using live location.
2. Using any fitness app on your smart phone, walk for 5 minutes and find out the number of steps
used and trace the path that you have walked.