Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
0% found this document useful (0 votes)
5 views

Emerging _Technology_Assignment

The document is a group assignment from Trinity Lutheran College's Faculty of Business and Economics, focusing on emerging technology. It discusses the link between ethics and technology, challenges in developing emerging technologies, and provides insights into nanotechnology, biotechnology, blockchain technology, and comparisons of cloud, quantum, and autonomic computing. Additionally, it explains computer vision and its applications across various fields.

Uploaded by

Paulino211
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
5 views

Emerging _Technology_Assignment

The document is a group assignment from Trinity Lutheran College's Faculty of Business and Economics, focusing on emerging technology. It discusses the link between ethics and technology, challenges in developing emerging technologies, and provides insights into nanotechnology, biotechnology, blockchain technology, and comparisons of cloud, quantum, and autonomic computing. Additionally, it explains computer vision and its applications across various fields.

Uploaded by

Paulino211
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 19

TRINITY LUTHERAN COLLEGE

FACULTY OF BUSINESS AND ECONOMICS


STREAM OF SOCIAL SCIENCE
COURSE TITLE: EMERGING TECHNOLOGY
GROUP ASSIGNMENT – PREPARED BY GROUP “4”

1ST YEAR 2ND SEMESTER

ENROLMENT: REGULAR (DEGREE PROGRAM)

S/N. STUDENT’S NAME ID NO.


1. DUOP KUAJIEN THARJIATH 014
2. GATWECH TUT YAK 025
3. GATWECH CHUOL THOAT
4. GATWECH LAM WAAT
5. TONGYIK TUT PUOCH
6. TUT YUOL DENG 078
7. BOL LUL CHUOL
8. KOANG BUOK CHANG
9. LAM WUOL DUOTH
10. ZAN THAYIT CHUOL
11. PAL GATLUAK GATKUOTH 067
12. NYAJUOK LUL RUT
13. NYATHIJIN MALUTH CHOL
14. NYEDUOTH JANGUAN ROAM
15. CHANGKUOTH NHIAL LEER
16. RANG LUL THEM
17. THOK KHAN THOK 027
18. DUOTH KIEL TUT
19. CHUOL BIEL MALEK

SUBMITTED TO INSTRUCTOR: MR. KIM BOTH (BSC)

SUBMISSION DATE: 22 APRIL, 2025 G.C

GAMBELLA, ETHIOPIA

I
1. Distinguish the link between ethics and technology with given an example.

Link between Ethics and Technology:

Ethics and technology are closely interconnected because the development and use of technology
can raise moral and ethical questions. As technology advances, it impacts society, individual
rights, privacy, and the environment—making it essential to consider ethical implications in its
design, deployment, and usage.

Example:

Consider Artificial Intelligence (AI) in facial recognition technology. While it can be used for
security and convenience (e.g., unlocking smartphones or locating criminals), it also raises
ethical concerns about privacy, surveillance, and bias. For instance, if AI systems misidentify
individuals—especially from minority groups—due to biased training data, it can lead to
wrongful accusations or discrimination. This shows how ethics must guide the development and
application of such technology to ensure fairness, accountability, and respect for human rights.

2. Identify the threats and challenges we face in developing utilizing emerging


technologies.

Developing and utilizing emerging technologies present significant threats and challenges,
including cybersecurity vulnerabilities, ethical concerns, data scarcity, and the potential for job
displacement, requiring careful consideration and proactive measures.

Threats and Challenges:

1) Cybersecurity:

 Emerging technologies, especially those involving interconnected systems and data


storage, are vulnerable to cyberattacks, data breaches, and privacy violations.

2) Ethical Concerns:

 The development and deployment of technologies like AI and autonomous systems raise
ethical questions about bias, fairness, accountability, and potential misuse.

II
3) Data Scarcity and Quality:

 Many emerging technologies rely on large datasets for training and operation, but data
scarcity, poor data quality, and the need for robust data management can hinder their
effectiveness.

4) Job Displacement:

 Automation and AI-powered systems could lead to job displacement in various sectors,
requiring workforce retraining and adaptation strategies.

5) Technological Accidents and Failures:

 Complex technological systems are prone to accidents and failures, potentially causing
significant harm or disruption.

6) Regulatory and Legal Challenges:

 The rapid pace of technological development often outstrips the ability of regulatory
frameworks to keep up, creating uncertainty and potential legal issues.

7) Rapid Technological Evolution:

 The constant evolution of technology makes it difficult to stay ahead of the curve and
adapt to new threats and challenges.

8) Infrastructure and Capacity Limitations:

 Many emerging technologies require robust infrastructure and computing power, which
may not be available in all regions or for all applications.

9) Bias in Algorithms:

 AI algorithms can reflect biases present in the data they are trained on, leading to
discriminatory outcomes.

III
10) 5G Networks and Cybersecurity:

 The widespread adoption of 5G networks creates new attack vectors and cybersecurity
challenges, requiring robust security protocols and measures.

3. Explain the examples of nanotechnology and its application.

Nanotechnology and its applications:

What is Nanotechnology?

 Nanotechnology involves designing, creating, and using structures, devices, and systems
by manipulating atoms and molecules at the nanoscale (1-100 nanometers).

 It focuses on the unique properties of materials at this scale, which can differ
significantly from their bulk counterparts.

 Nanotechnology manipulates matter at the atomic and molecular level to create materials
and devices with enhanced properties, finding applications in diverse fields like
medicine, electronics, and materials science. Examples include targeted drug delivery,
more efficient solar panels, and durable, lightweight materials.

Examples and Applications of Nanotechnology:

Medicine:

 Targeted Drug Delivery: Nanoparticles can be engineered to deliver drugs directly to


specific cells or tissues, reducing side effects and improving treatment efficacy.

 Cancer Treatment: Nanotechnology is used in developing nanoparticles that can detect


and destroy cancer cells, as well as in creating more effective cancer therapies.

 Wound Healing: Nanofibers are used in wound dressings and implants, promoting faster
healing and reducing infection risk.

 Nanobiotechnology: Nanoparticles can serve as probes, sensors, or vehicles for


biomolecule delivery in cellular systems.

IV
Electronics:

 Faster Microprocessors: Nanotechnology enables the creation of smaller, faster, and more
energy-efficient microprocessors.

 Quantum Dot LEDs (QLEDs): These LEDs use quantum dots, nanoscale semiconductors,
to produce brighter and more efficient light.

 Nanoscale Transistors: Nanomaterials are used to create smaller and more efficient
transistors, which are crucial components in electronic devices.

Materials Science:

 Durable and Lightweight Materials: Nanotechnology can create materials that are
stronger, lighter, and more durable, with applications in aerospace, automotive, and
construction industries.

 Self-Cleaning Surfaces: Nanocoatings can be applied to surfaces to make them self-


cleaning, stain-resistant, and water-repellent.

 Nanocomposites: Combining nanomaterials with conventional materials can enhance


their properties, such as strength, conductivity, and thermal stability.

Energy:

 Solar Panels: Nanomaterials can improve the efficiency and reduce the cost of solar
panels.

 Fuel Cells: Nanotechnology is used to develop more efficient fuel cells, which can
produce electricity from hydrogen.

 Batteries: Nanomaterials can improve the performance and lifespan of batteries, such as
in mobile devices and electric vehicles.

Food Industry:

 Food Packaging: Nanotechnology can improve the barrier properties of food packaging,
extending shelf life and reducing spoilage.

V
 Food Safety: Nanomaterials can be used to detect food contaminants and pathogens,
ensuring food safety.

Other Applications:

 Sunscreens: Nanoparticles like titanium dioxide and zinc oxide are used in sunscreens to
effectively block UV radiation.

 Sports Equipment: Nanomaterials can enhance the performance of sports equipment,


such as tennis rackets and golf clubs.

 Water Purification: Nanofilters and other nanomaterials can be used to remove


contaminants from water. crop yields and resource efficiency through nano-fertilizers,
pesticides, and sensors.

4. Explain biotechnology and its application.

What is Biotechnology?

 Biotechnology involves using living organisms or their products to develop new


technologies or improve existing ones.

 It encompasses a wide range of techniques, including genetic engineering, cell and tissue
culture, and fermentation.

 While traditional biotechnology has roots in practices like brewing and baking bread,
modern biotechnology has expanded significantly with advancements in molecular
biology and genetic engineering.

 Biotechnology, the use of biological organisms or their products for specific purposes,
has applications ranging from medicine and agriculture to industry and environmental
science, with examples including the development of vaccines and genetically modified
crops.

 The term "biotechnology" was first coined in 1919 by Karl Erkey.

VI
Applications of Biotechnology:

1) Medicine:

 Development of vaccines, antibiotics, and other pharmaceuticals.

 Genetic therapies and gene editing techniques.

 Diagnostic tests for diseases.

 Production of therapeutic proteins like insulin and growth hormone.

2) Agriculture:

 Development of genetically modified (GM) crops with enhanced traits like pest
resistance and increased yields.

 Production of biofuels.

 Development of disease-resistant plants.

3) Industry:

 Production of chemicals, enzymes, and other industrial products using microorganisms.

 Waste treatment and bioremediation.

 Development of biodegradable plastics and other sustainable materials.

4) Environmental Science:

 Bioremediation of contaminated sites.

 Waste management and recycling.

 Development of biofuels and other sustainable energy sources.

VII
5. Explain blockchain technology and its application.

What it is:

 Blockchain technology is a distributed database or ledger that is shared across a network


of computers. It's known for its role in cryptocurrency systems, but its applications
extend beyond that.

 Blockchain is a decentralized, distributed, and public digital ledger that records


transactions across many computers, making it difficult to alter or hack. It has
applications beyond cryptocurrencies, including supply chain management, healthcare,
and finance.

How it works:

1) Decentralized: No single entity controls the blockchain; instead, all users collectively
retain control.

2) Distributed: The ledger is replicated across multiple computers, making it resistant to


tampering or censorship.

3) Immutable: Once a transaction is recorded in a block and added to the chain, it cannot be
altered.

4) Cryptographic Security: Transactions are secured using cryptography, ensuring their


authenticity and integrity.

5) Blocks and Chains: Data is stored in blocks, which are linked together chronologically to
form a chain.

Key Features:

 Transparency: All transactions are publicly visible, promoting trust and accountability.

 Security: The distributed and cryptographic nature of blockchain makes it highly secure
and resistant to hacking.

VIII
 Efficiency: Blockchain can streamline processes and reduce the need for intermediaries,
leading to faster and more efficient transactions.

Applications:

 Cryptocurrencies: Bitcoin and other cryptocurrencies rely on blockchain technology for


secure and decentralized transactions.

 Supply Chain Management: Blockchain can be used to track products from origin to
consumer, improving transparency and reducing fraud.

 Healthcare: Blockchain can facilitate secure and efficient sharing of patient data,
improving interoperability and data privacy.

 Financial Services: Blockchain can be used for faster and more secure payments, asset
management, and other financial transactions.

 Voting Systems: Blockchain can be used to create secure and transparent voting systems.

 Identity Management: Blockchain can be used to create secure and verifiable digital
identities.

Benefits:

 Increased Trust: The decentralized and transparent nature of blockchain fosters trust
among participants.

 Reduced Costs: By streamlining processes and reducing the need for intermediaries,
blockchain can lower costs.

 Enhanced Security: The cryptographic security of blockchain protects data from


unauthorized access and manipulation.

 Improved Efficiency: Blockchain can automate processes and reduce errors, leading to
greater efficiency.

IX
6. Compare and contrast the difference between cloud, quantum and autonomic
computing and their applications.

Cloud computing delivers computing resources over the internet, quantum computing uses
quantum mechanics for processing, and autonomic computing focuses on self-managing systems.
Cloud computing offers scalability and accessibility, quantum computing promises
breakthroughs in complex problems, and autonomic computing aims for efficient, self-
optimizing systems.

Here's a more detailed comparison:

1) Cloud Computing:

Definition:

Cloud computing delivers computing resources like servers, storage, databases, and networking
over the internet, allowing users to access them on demand.

Key Features:

 Scalability: Easily scale resources up or down based on demand.

 Flexibility: Resources are readily available and accessible from anywhere with an
internet connection.

 Cost-Effectiveness: Pay-as-you-go pricing model reduces upfront costs and operational


expenses.

 Applications:

 Data Storage and Backup: Store and retrieve data securely and efficiently.

 Software as a Service (SaaS): Access software applications over the web.

 Infrastructure as a Service (IaaS): Provide virtualized infrastructure resources.

 Platform as a Service (PaaS): Offer a platform for developing and deploying applications.

 Big Data Analysis: Process and analyze large datasets.

X
2) Quantum Computing:

Definition:

Quantum computing leverages the principles of quantum mechanics, such as superposition and
entanglement, to perform computations.

Key Features:

 Qubits: Quantum computers use qubits, which can exist in multiple states simultaneously,
unlike classical bits.

 Superposition and Entanglement: These quantum phenomena enable quantum computers


to solve certain problems exponentially faster than classical computers.

 Potential for Breakthroughs: Quantum computing has the potential to revolutionize fields
like drug discovery, materials science, and artificial intelligence.

Applications:

 Drug Discovery: Simulate molecular interactions to accelerate drug development.

 Materials Science: Design and discover new materials with specific properties.

 Financial Modeling: Optimize complex financial models.

 Cryptography: Develop quantum-resistant encryption algorithms.

 Artificial Intelligence: Train and optimize AI models.

3) Autonomic Computing:

Definition:

 Autonomic computing focuses on creating systems that can self-manage, self-heal, and
self-optimize without constant human intervention.

 Key Features:

XI
 Self-Configuration: Automatically configure and reconfigure resources to adapt to
changing environments.

 Self-Healing: Detect and correct faults automatically.

 Self-Optimization: Continuously monitor and optimize performance.

Applications:

 Network Management: Automatically manage and optimize network resources.

 Data Center Management: Manage and optimize data center infrastructure.

 Self-Driving Cars: Enable autonomous navigation and decision-making.

 Self-Healing Systems: Create systems that can repair themselves.

7. Explain how computer vision works and its application.

Computer vision is a field of artificial intelligence that enables computers to "see" and interpret
images and videos, using techniques like pattern recognition and machine learning to identify
objects, faces, and scenes, much like humans. Its applications span diverse fields, from self-
driving cars to medical imaging and security systems.

How Computer Vision Works:

 Input:

Computer vision systems start by receiving visual data, such as images or video streams, from
cameras, sensors, or other sources.

 Preprocessing:

The raw data is then preprocessed to normalize formats, reduce noise, and enhance features,
making it easier for subsequent analysis.

XII
 Feature Extraction:

Algorithms identify and extract relevant features from the images, such as edges, shapes, colors,
and textures.

 Pattern Recognition:

Machine learning models, particularly deep learning neural networks, are trained to recognize
patterns and classify objects based on the extracted features.

 Interpretation and Action:

Once the system has identified objects and scenes, it can take actions based on the information,
such as triggering an alert, guiding a robot, or recommending a product.

Applications of Computer Vision:

 Self-Driving Cars:

Computer vision systems allow autonomous vehicles to "see" their surroundings, identify traffic
signals, and navigate roads.

 Medical Imaging:

Computer vision can assist in diagnosing diseases, detecting tumors, and analyzing medical
images like X-rays and MRIs.

 Security and Surveillance:

Computer vision systems can identify suspicious activities, detect intruders, and monitor traffic
flow, enhancing security in various environments.

 Retail and E-commerce:

Computer vision can be used for product recognition, inventory management, and personalized
shopping recommendations.

XIII
 Agriculture:

Computer vision can monitor crops, detect pests and diseases, and optimize irrigation and
fertilization.

 Robotics:

Computer vision enables robots to navigate complex environments, interact with objects, and
perform tasks autonomously.

 Entertainment:

Computer vision is used in augmented reality apps, facial recognition, and image editing
software.

 Manufacturing:

Computer vision can be used for quality control, defect detection, and automation.

8. Identify and explain embedded systems and their pros and cons.

Embedded systems are specialized computer systems designed to perform specific tasks within a
larger system or device, offering advantages like efficiency, reliability, and cost-effectiveness,
but also facing limitations such as limited flexibility and potential for complexity.

What are Embedded Systems?

 Embedded systems are small, dedicated computers integrated into other devices or machines
to control their functionality.

 They are designed to perform a specific task or a limited set of tasks, unlike general-purpose
computers that can handle a wide variety of applications.

 Examples include the software in a microwave, a car's engine control unit, or the controller in
a washing machine.

 They typically consist of a processor (like a microcontroller or microprocessor), memory,


and input/output (I/O) ports to interact with the external environment.

XIV
 They often run real-time operating systems (RTOS) to ensure timely execution of tasks.

Pros of Embedded Systems:

 Efficiency:

Optimized for specific tasks, leading to faster performance and lower power consumption.

 Cost-Effectiveness:

Simpler hardware and reduced component requirements result in lower manufacturing costs.

 Compact Size:

Small physical size allows for integration into various devices and environments.

 Dependability:

Designed for specific functions, leading to excellent dependability and stability.

 Real-Time Operation:

Capable of processing data in real-time, crucial for applications like medical devices and
automotive systems.

 Reliability:

Embedded systems are designed for specific tasks, which can lead to high reliability and
stability.

 Low Power Consumption:

Embedded systems are designed to be energy-efficient, which is important for battery-powered


devices.

 Ease of Use:

Embedded systems are often designed to be easy to use, with minimal user interaction required.

XV
Cons of Embedded Systems:

 Limited Flexibility:

Once designed and implemented, embedded systems can be difficult to modify or upgrade.

 Complexity:

Developing and debugging embedded systems can be complex, requiring specialized knowledge
and tools.

 Resource Constraints:

Embedded systems often have limited memory and processing power, which can restrict the
complexity of the software.

 Hardware Limitations:

The hardware used in embedded systems is often specialized and may not be as versatile as
general-purpose hardware.

 Troubleshooting:

Troubleshooting embedded systems can be difficult, as they are often integrated into larger
systems that are difficult to access.

 Security Vulnerabilities:

Embedded systems can be vulnerable to security attacks, especially if they are connected to a
network.

9. Describe Cybersecurity, types of treat and its benefits.

Cybersecurity involves protecting computer systems, networks, and data from unauthorized
access or attacks, crucial for maintaining confidentiality, integrity, and availability of
information. Common threats include malware, phishing, and ransomware, while benefits

XVI
include protecting data and networks, preventing unauthorized access, and ensuring business
continuity.

What is Cybersecurity?

 Cybersecurity is the practice of defending computer systems, networks, and data from
unauthorized access, damage, or theft.

 It encompasses various technologies, processes, and policies to protect against cyber threats
and maintain the confidentiality, integrity, and availability of information.

 Cybersecurity is essential for individuals, businesses, and governments alike, as it helps


mitigate the risks associated with increasingly interconnected digital environments.

Types of Cyber Threats

 Malware:

Malicious software designed to infiltrate and damage systems, including viruses, worms, and
Trojans.

 Phishing:

Deceptive attempts to obtain sensitive information, such as usernames, passwords, and credit
card details, by disguising as a legitimate entity.

 Ransomware:

A type of malware that encrypts a victim's data and demands a ransom payment for its release.

 Denial-of-Service (DoS) Attacks:

Overwhelming a system or network with traffic, making it unavailable to legitimate users.

 Social Engineering:

Manipulating individuals to reveal sensitive information or gain unauthorized access to systems.

XVII
 Man-in-the-Middle (MitM) Attacks:

Intercepting communication between two parties to steal data or impersonate one of them.

 SQL Injection:

Exploiting vulnerabilities in web applications to gain unauthorized access to databases.

 Insider Threats:

Malicious or negligent actions by individuals within an organization that compromise security.

Benefits of Cybersecurity

 Protection of Data and Networks:

Cybersecurity measures safeguard sensitive information from unauthorized access, theft, or


damage.

 Prevention of Unauthorized Access:

Strong security protocols and technologies prevent malicious actors from entering systems or
networks.

 Business Continuity:

Effective cybersecurity ensures that businesses can continue operations even in the face of
cyberattacks, minimizing disruptions.

 Regulatory Compliance:

Cybersecurity standards and regulations require organizations to implement security measures to


protect data and systems.

 Reputation and Trust:

Strong cybersecurity practices build trust with customers, partners, and stakeholders, enhancing
an organization's reputation.

XVIII
 Reduced Financial Losses:

Implementing cybersecurity measures can help prevent costly data breaches, ransomware
attacks, and other security incidents.

10. Distinguish the difference between additive manufacturing and 3D Printing.

While often used interchangeably, "3D printing" refers to a specific process of creating objects
layer-by-layer, whereas "additive manufacturing" encompasses a broader range of technologies
and applications, including 3D printing, and is more commonly associated with industrial and
commercial uses.

Here's a more detailed breakdown:

3D Printing:

 Definition: A specific type of additive manufacturing focused on creating objects by


depositing successive layers of material, typically using a 3D printer.

 Applications: Commonly used for small-scale production, prototyping, and hobbyist


applications.

 Materials: Primarily uses plastics and, in some cases, metals.

 Precision: While capable of intricate designs, it's more suited for less complex projects and
prototypes where ultra-high precision isn't critical.

 Examples: Fused Deposition Modeling (FDM) and Stereolithography (SLA).

XIX

You might also like