0% found this document useful (0 votes)
91 views17 pages

Impact of Industrial Revolution On: 1.: Answer

The document discusses several applications of nanotechnology including in medicine, electronics, food, fuel cells, solar cells, batteries, space, fuels, air quality, water quality, and chemical sensors. Specifically, it notes that nanotechnology allows for targeted drug delivery, more efficient electronics, novel food packaging and safety, improved fuel cells and solar cells, novel battery designs, lightweight spacecraft, alternative fuels, improved catalysts, water purification, and highly sensitive chemical sensors. Overall, the document outlines how nanotechnology is being used across many industries to develop new materials and devices with applications in health, energy, transportation, environment and more.

Uploaded by

Tame PcAddict
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
91 views17 pages

Impact of Industrial Revolution On: 1.: Answer

The document discusses several applications of nanotechnology including in medicine, electronics, food, fuel cells, solar cells, batteries, space, fuels, air quality, water quality, and chemical sensors. Specifically, it notes that nanotechnology allows for targeted drug delivery, more efficient electronics, novel food packaging and safety, improved fuel cells and solar cells, novel battery designs, lightweight spacecraft, alternative fuels, improved catalysts, water purification, and highly sensitive chemical sensors. Overall, the document outlines how nanotechnology is being used across many industries to develop new materials and devices with applications in health, energy, transportation, environment and more.

Uploaded by

Tame PcAddict
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 17

Answer

Q1. impact of industrial revolution on:

1. Social
Industrialization increased material wealth, restructured society, and created important
new schools of philosophy. The social impact of industrialization was profound. For the
first time since the Neolithic Revolution, people worked outside of the local environment
of their homes. They arose every morning and traveled to their place of employment. This
was most often in a workplace known as a factory. The new machinery of the Industrial
Revolution was very large and sometimes required acres of floor space to hold the
number of machines needed to keep up with consumer demand.
2. Economic
The Industrial Revolution transformed economies that had been based on agriculture and
handicrafts into economies based on large-scale industry, mechanized manufacturing, and
the factory system. New machines, new power sources, and new ways of organizing work
made existing industries more productive and efficient.
3. Environmental
The Industrial Revolution impacted the environment. The world saw a major increase in
population, which, along with an increase in living standards, led to the depletion of
natural resources. The use of chemicals and fuel in factories resulted in increased air and
water pollution and an increased use of fossil fuels. Some of the drawbacks included air
and water pollution and soil contamination that resulted in a significant deterioration of
quality of life and life expectancy. Industrialization also exacerbated the separation of
labor and capital.

Q2.

I. Data and big data shaping Business man and Business

It doesn’t matter what field you operate in or the size of your business; as data collection,
analysis, and interpretation become more readily accessible, they will have an impact on every
business in several important ways.
1. Data will become an asset to every business.

Even the smallest businesses generate data these days.  If the business has a website, a social
media presence, accepts credit cards etc., even a one-person shop has data it can collect on its
customers, its user experience, web traffic, and more. This means companies of all sizes need a
strategy for big data and a plan of how to collect, use, and protect it. This also means that savvy
businesses will start to offer data services to even very small companies.

2. Big data will enable companies to collect better market and customer intelligence.

Like it or not, the companies you do business with know a lot about you — and the quantity and
diversity of what they know about you is increasing every year. Every company (from car
manufactures who will monitor our driving to tennis racket manufacturers that know how often
and how well we play) will get much better insights into what customers want, what they will
use, what channels they use to buy, and so on.

3. It will improve internal efficiency and operations

From using sensors to track machine performance, to optimizing delivery routes, to better
tracking employee performance and even recruiting top talent, big data has the potential to
improve internal efficiency and operations for almost any type of business and in many different
departments.

4. And data will allow companies to improve the customer experience and build big data
into their product offering.

In the best of all possible worlds, companies will use the data they collect to improve their
products and the customer experience.

II. Artificial intelligent(AI) shaping Business man and Business

we can use AI to increase customer retention, NPS, sales close rate and pre-qualify leads. It's
hard to know where AI will be in a decade or two. But, it's already playing a big role in many
business' daily operations. It can play a big, beneficial role in your business as well, now and
well into the future. Here are four ways.

1. Emotional analysis

Emotion AI, also known as affective computing, is an iteration of AI capable of detecting human
emotions and responding to those emotions accordingly. And while it's not perfect yet, the
technology is staggering.

2. Customer support

Efficiency is perhaps nowhere more important than in customer support -- the place where
people want answers and they want them right away. And while pleasing those needy customers
might seem like a business revenue afterthought, it isn't.

3. Sales and lead generation

AI is making big splashes in business-to-business sales and lead generation. Harvard Business
Review reports, for instance, that businesses which use AI can reduce call time by up to 70
percent and increase number of leads by 50 percent. Additionally, one source believes that 85
percent of sales-related tasks could be outsourced to the robots by 2020 (without a loss -- and
likely an improvement -- in close rate).

4. Talent intelligence

Recruiting the right talent for your company can be a frustrating experience. Massive online
search engines for jobs like Indeed or Monster can help source candidates, but many times,
parsing the thousands of potential applicants is an exceptionally time-consuming task.

III. IoT shaping Business man and Business

Internet of Things technologies will lead to a slew of innovations that will have a significant
effect on businesses of all sizes and industries, including: 
 Greater efficiency for business operations: Connected devices will enable companies
to harness data to improve their efficiency and effectiveness. 
 New business models and revenue streams: New processes will speed up time to
market and respond faster to customer needs. 
 Global visibility: Large enterprises will be better able to track effectiveness across
multiple locations, and across the entire supply chain. 
 Tighter cybersecurity: More data means a greater potential for cybercriminals to steal
sensitive business information.

IV. Virtual, Augmented and mixed reality

Q3.

Q4. Nanotechnology is science, engineering, and technology conducted at the nanoscale, which


is about 1 to 100 nanometers. Nanotechnology is the creation of materials and devices by
controlling of matter at the levels of atoms, molecules, and supramolecular (nanoscale)
structures. It is the use of very small particles of materials to create new large scale materials

Nanotechnology Applications in:

Medicine

Researchers are developing customized nanoparticles the size of molecules that can deliver drugs
directly to diseased cells in your body.  When it's perfected, this method should greatly reduce
the damage treatment such as chemotherapy does to a patient's healthy cells.

Electronics

Nanotechnology holds some answers for how we might increase the capabilities of electronics
devices while we reduce their weight and power consumption.

Food
Nanotechnology is having an impact on several aspects of food science, from how food is grown
to how it is packaged. Companies are developing nanomaterials that will make a difference not
only in the taste of food, but also in food safety, and the health benefits that food delivers.

Fuel Cells

Nanotechnology is being used to reduce the cost of catalysts used in fuel cells to produce
hydrogen ions from fuel such as methanol and to improve the efficiency of membranes used in
fuel cells to separate hydrogen ions from other gases such as oxygen.

Solar Cells

Companies have developed nanotech solar cells that can be manufactured at significantly lower
cost than conventional solar cells.

Batteries

Companies are currently developing batteries using nanomaterials. One such battery will be a
good as new after sitting on the shelf for decades. Another battery can be recharged significantly
faster than conventional batteries.

Space

Nanotechnology may hold the key to making space-flight more practical. Advancements in
nanomaterials make lightweight spacecraft and a cable for the space elevator possible. By
significantly reducing the amount of rocket fuel required, these advances could lower the cost of
reaching orbit and traveling in space.

Fuels

Nanotechnology can address the shortage of fossil fuels such as diesel and gasoline by making
the production of fuels from low grade raw materials economical, increasing the mileage of
engines, and making the production of fuels from normal raw materials more efficient.

Better Air Quality


Nanotechnology can improve the performance of catalysts used to transform vapors escaping
from cars or industrial plants into harmless gasses. That's because catalysts made from
nanoparticles have a greater surface area to interact with the reacting chemicals than catalysts
made from larger particles. The larger surface area allows more chemicals to interact with the
catalyst simultaneously, which makes the catalyst more effective.

Better Water Quality

Nanotechnology is being used to develop solutions to three very different problems in water
quality. One challenge is the removal of industrial wastes, such as a cleaning solvent called TCE,
from groundwater. Nanoparticles can be used to convert the contaminating chemical through a
chemical reaction to make it harmless. Studies have shown that this method can be used
successfully to reach contaminates dispersed in underground ponds and at much lower cost than
methods which require pumping the water out of the ground for treatment.

Chemical Sensors

Nanotechnology can enable sensors to detect very small amounts of chemical vapors. Various
types of detecting elements, such as carbon nanotubes, zinc oxide nanowires or palladium
nanoparticles can be used in nanotechnology-based sensors. Because of the small size of
nanotubes, nanowires, or nanoparticles, a few gas molecules are sufficient to change the
electrical properties of the sensing elements. This allows the detection of a very low
concentration of chemical vapors.

Sporting Goods

If you're a tennis or golf fan, you'll be glad to hear that even sporting goods has wandered into
the Nano realm. Current nanotechnology applications in the sports arena include increasing the
strength of tennis racquets, filling any imperfections in club shaft materials and reducing the rate
at which air leaks from tennis balls.

Fabric
Making composite fabric with Nano-sized particles or fibers allows improvement of fabric
properties without a significant increase in weight, thickness, or stiffness as might have been the
case with previously-used techniques.

Q5. Biotechnology is technology that utilizes biological systems, living organisms or parts of
this to develop or create different products. It is the use of biological systems found in organisms
or the use of the living organisms themselves to make technological advances and adapt those
technologies to various fields. And it will play a crucial role in the society of the future in
preventing and containing potential pathogens.

Applications in:

Medicine
The development of insulin, the growth hormone, molecular identity and diagnostics, gene
therapies and vaccines such as hepatitis B are some of the milestones of biotechnology and its
alliance with genetic engineering.
Industry
The revolution of the new smart materials hand-in-hand with biotechnology has only just begun.
Soon we could have self-healing concrete, plants that change colour when they detect an
explosive, clothing and footwear made with synthetic spider web, etc.
Food
In addition to the genetically modified foods mentioned above, thanks to biotechnology products
such as WEMA have been created, a type of crop resistant to droughts and certain insects that
may prove essential in fighting hunger in Africa.
Environment
Through bioremediation processes, very useful for ecological recovery, the catabolic properties
of microorganisms, fungi, plants and enzymes are used to restore contaminated ecosystems.

Q6. Block-chain technology is a structure that stores transactional records, also known as the
block, of the public in several databases, known as the “chain,” in a network connected through
peer-to-peer nodes. Typically, this storage is referred to as a ‘digital ledger.’
Every transaction in this ledger is authorized by the digital signature of the owner, which
authenticates the transaction and safeguards it from tampering. Hence, the information the digital
ledger contains is highly secure.

Applications:

1. Smart Contracts

The term ‘smart contract’ was first coined in 1993, but it’s recently become a buzzworthy term
thanks to the 2013 release of the Ethereum Project. The Project “is a decentralized platform that
runs smart contracts: applications that run exactly as programmed without any possibility of
downtime, censorship, fraud or third party interference.”

2. Cloud Storage

Cloud storage will be another application that businesses can take advantage of. Storj, which at
the time of this article is still in beta-testing, is one such company that’s offering secure cloud
storage while decreasing dependency

3. Supply-Chain Communications & Proof-of-Provenance

Most of the things we buy aren’t made by a single entity, but by a chain of suppliers who sell
their components (e.g., graphite for pencils) to a company that assembles and markets the final
product. The problem with this system is that if one of these components fails 'the brand takes
the brunt of the backlash.'” Using blockchain technology would “proactively provide digitally
permanent, audit-able records that show stakeholders the state of the product at each value-added
step.

4. Paying Employees

Since the blockchain has its roots in cryptocurrency, it only makes sense that it could be used as
an application to compensate employees.

5. Electronic Voting
Q7. Cloud Computing refers to manipulating, configuring, and accessing the applications
online. It offers online data storage, infrastructure and application. It is the delivery of hosting
services that are provided to a client over the Internet.

Cloud computing is considered the evolution of a variety of technologies that have come together
to change an organization ‘approach for building their IT infrastructure. Actually, there is
nothing new in any of the technologies that are used in the cloud computing where most of these
technologies have been known for ages. It is all about making them all accessible to the masses
under the name of cloud computing.

Quantum computing is the field that investigates the computational power and other proper-ties
of computers based on quantum-mechanical principles. Quantum Computing is a new and
exciting field at the intersection of mathematics, computer science and physics.

Autonomic computing is inspired by the human autonomic nervous system that handles
complexity and uncertainties, and aims at realizing computing systems and applications capable
of managing themselves with minimum human intervention. Autonomic systems are
characterized by their self-properties including self-configuration, self-healing, self-optimization,
and self-protection. Meeting the grand challenges of autonomic computing requires scientific and
technological advances in a wide variety of fields, as well as new programming paradigms and
software and system architectures that support the effective integration of the constituent
technologies.
Their difference
Their Application
Q8.

Computer vision is the field of computer science that focuses on creating digital systems that can
process, analyze, and make sense of visual data (images or videos) in the same way that humans
do. The concept of computer vision is based on teaching computers to process an image at a
pixel level and understand it. Technically, machines attempt to retrieve visual information,
handle it, and interpret results through special software algorithms.

How Does Computer Vision Work?


The artificial intelligence development service based researchers working on the CV or AI
should have a sound knowledge of multiple domains. Below are the different technologies that
researchers use in the implementation of CV.

The first step is feature engineering as part of which, the computer converts the image or a video
into an array of pixels and then identifies the features such as a blob, corner, and an edge of an
object. It is a time-consuming and costly process. But, with the help of deep learning, the process
of feature engineering can be automated.

It is necessary to train the computer so that the CV system can be applied. As a part of training
the machine, a large number of images are fed to the system, so that system can learn the
difference between different objects and differentiate them.

The images that are processed to the machine for training purposes vary according to the domain.
As an example, in ophthalmology, the computer needs to diagnose the retina. Therefore, the
machine is fed with different images of the retina, including the healthy, damaged, and diseased.

Once the machine analyzes the pixels, Computer Vision uses a neural network to predict the
content of the image. With each prediction, the computer is fed through the different layers of the
neural network many times so that the machine comes with a correct prediction. With multiple
processing, the machine comes up with correct predictions in the form of probability. In this
way, the artificial intelligence development company is working a lot in the field of computer
vision.

Applications of Computer Vision

1. Computer Vision for Defect detection

This is, perhaps, the most common application of computer vision. Until now the detection of
defects is carried out by trained people in selected batches, and total production control is usually
not possible. With computer vision we can detect defects such as cracks in metals, paint defects,
bad prints etc. in sizes smaller than 0.05mm. Much better than the human eye! These vision
cameras need an algorithm that is the “intelligent brain” which is able to differentiate what is a
defect and what is not. This algorithm is designed and trained specifically for each particular
application through images with defect and without defect.

2. Computer Vision for Metrology

It is another of the most important applications. What has been done so far with complex laser
metrology equipment or probes, now it can be measured using computer vision. The key on this
topic, is to make a good adjustment of the reference to be able to measure with the necessary
precision, and above all, use the appropriate lighting for each type of material and work
environment.

3. Computer Vision for Intruder Detection

Through hyperspectral cameras it is possible to differentiate between a fruit and a stone, which
allows, especially in food, safer products for the consumer. Hyperspectral cameras are able to
differentiate the type of material through the measurement they make of the wavelength. In this
way, it is possible to differentiate a stone from a fruit, a plastic from a metal or other
combinations while the material is different.

4. Computer Vision for Assembly verification

Every day more and more complex assemblies are made, with more parts or connections.
Computer vision allows us to verify, step by step, that each piece is in its place, or at the end of
the process, that the final assembly is correct. This application is very useful for the assembly of
machinery, equipment, electronic boards or pre-assemblies with a lot of complexity. These
systems significantly reduce cycle times of very complex operations and reoperation times.

5. Computer Vision for Screen reader

Sometimes it is not possible to extract data from a display screen either because it is a closed
supplier system or because that system is incompatible with the one installed. A solution to this
problem is to install a computer vision camera to read the screen and extract the data that appears
on it . To do this, we look for the interest regions in which the information is located, we use a
character recognition algorithm (OCR) to extract it, and everything perfect!
6. Computer Vision for Code and character reader (OCR)

Let’s be honest, the designers are very nice people, but they tend to change typography to more
complex letters (and pretty!) frequently. We go back to the character recognition algorithms to
have a computer vision recognition system trained, so even you have a complex typography, the
OCR will be able to read them. It is a system so robust capable of reading even handwritten
letters.

7. Computer Vision + robotics for bin picking

And finally one of the applications that we are most requested, combining collaborative robotics
with computer vision to be able to perform bin picking of pieces placed disorderly. The pieces
are messy and therefore we need to optimize the trajectories and detect the grip coordinates. The
robot needs help (the computer vision) telling him what a piece is and where it is, so it can
decide what is the best way to pick up the piece.

Q9.

Embedded System is a combination of computer software and hardware which is either fixed in
capability or programmable. An embedded system can be either an independent system, or it can
be a part of a large system. It is mostly designed for a specific function or functions within a
larger system. For example, a fire alarm is a common example of an embedded system which can
sense only smoke.

Prons of embedded systems

 The embedded system is easy for mass production.


 The embedded system is highly reliable.
 It has very few interconnections.
 The embedded system is small in size.
 The embedded system has less expensive.
 It has fast operation.
 It has improved product quality.
 It optimizes use of system resources.
 It has low power operation.

Cons of embedded systems


The embedded systems are hard for maintenance as it is use and throw device.

 It has no technological improvement.


 Less power supply durability if it is battery operated.
 It has hard to take backup of embedded files.

Q10. Cyber security is the application of technologies, processes and controls to protect
systems, networks, programs, devices and data from cyber-attacks.

Types of Cyber Security Threats

Cyber security professionals should have an in-depth understanding of the following types of
cyber security threats.

1. Malware

Malware is malicious software such as spyware, ransomware, viruses and worms. Malware is
activated when a user clicks on a malicious link or attachment, which leads to installing
dangerous software. Cisco reports that malware, once activated, can:

 Block access to key network components (ransomware)


 Install additional harmful software
 Covertly obtain information by transmitting data from the hard drive (spyware)
 Disrupt individual parts, making the system inoperable
2. Emotet

The Cybersecurity and Infrastructure Security Agency (CISA) describes Emotet as “an
advanced, modular banking Trojan that primarily functions as a downloader or dropper of other
banking Trojans. Emotet continues to be among the costly and destructive malware.”

3. Denial of Service

A denial of service (DoS) is a type of cyber-attack that floods a computer or network so it can’t
respond to requests. A distributed DoS (DDoS) does the same thing, but the attack originates
from a computer network. Cyber attackers often use a flood attack to disrupt the “handshake”
process and carry out a DoS. Several other techniques may be used, and some cyber attackers use
the time that a network is disabled to launch other attacks.

4. Man in the Middle

A man-in-the-middle (MITM) attack occurs when hackers insert themselves into a two-party
transaction. After interrupting the traffic, they can filter and steal data, according to Cisco.
MITM attacks often occur when a visitor uses an unsecured public Wi-Fi network. Attackers
insert themselves between the visitor and the network, and then use malware to install software
and use data maliciously.

5. Phishing

Phishing attacks use fake communication, such as an email, to trick the receiver into opening it
and carrying out the instructions inside, such as providing a credit card number. “The goal is to
steal sensitive data like credit card and login information or to install malware on the victim’s
machine,” Cisco reports.

6. SQL Injection

A Structured Query Language (SQL) injection is a type of cyber-attack that results from
inserting malicious code into a server that uses SQL. When infected, the server releases
information. Submitting the malicious code can be as simple as entering it into a vulnerable
website search box.

7. Password Attacks

With the right password, a cyber-attacker has access to a wealth of information. Social
engineering is a type of password attack that Data Insider defines as “a strategy cyber attackers
use that relies heavily on human interaction and often involves tricking people into breaking
standard security practices.” Other types of password attacks include accessing a password
database or outright guessing.

The benefits of cyber security

 Protection for your business – cyber security solutions provide digital protection to
your business that will ensure your employees aren’t at risk from potential threats such as
Adware and Ransomware.
 Increased productivity – viruses can slow down computers to a crawl, and making work
practically impossible. Effective cyber security eliminates this possibility, maximizing
your business’ potential output.
 Inspires customer confidence – If you can prove that your business is effectively
protected against all kinds of cyber breaches, you can inspire trust in your customers that
their personal data will not be compromised.
 Protection for your customers – ensuring that your business is secure from cyber
threats will also help to protect your customers, who could be susceptible to a cyber-
breach by proxy.
 Stops your website from going down – if you are business that hosts your own website,
a potential cyber breach could be disastrous. If your system becomes infected, it’s
possible that your website could be forced to close meaning you will lose money as a
result from lost transactions.

Q11. Whether you want to call it 3D printing or additive manufacturing (AM), one thing we can
all be certain of is the process of building an item by joining layers of material from a CAD file
is dramatically changing the face of industry. Those in manufacturing and engineering are
resetting the boundaries of what is possible as new techniques and materials are being developed
with which to manufacture. So as we enter the fourth industrial revolution, and these methods
become more and more prevalent, so too do the conversations about them. But is it 3D Printing
or Additive Manufacturing? There is no right or wrong answer to this. In theory, they both
describe the same process. But in practice, there are various situations and settings where one
term is preferred to the other, and it all comes down to scale and precision.

3D Printing

This is the term preferred by those not in manufacturing or engineering; those into technology
but not specifically manufacturing technology or Industry 4.0. In most cases 3D printing
describes the fused deposition modelling (FDM) or fused filament fabrication (FFF) of smaller
“desktop” 3D printers. These are smaller and cheaper (< $1000) but less precise than the
techniques considered additive manufacturing. FDM and FFF both print by forcing molten
martial out of a nozzle controlled by a computer and deposited in structred layers. These printers
are the kind you would find in the home of an enthusiast but are predominately still used by
industry for rapid prototyping – building early stage concept models to mimic the results of
traditional manufacturing processes.

Additive Manufacturing

Additive manufacturing is 3D printing on an industrial scale and describe the more advanced
techniques such as Selective Laser Sintering (SLS). SLS is the process of a laser sintering
(forming a solid mass of material by heat before the point of liquefaction) powdered material at
points in space defined by computer using a 3D design. This provides a more professional
looking finished product, on which the building layers are much harder to see. AM provides
results on a larger scale, with greater precision and with a wider variety of materials than FDM
but is also much more expensive. Just like FDM, SLS can be used for rapid prototyping but at a
later stage of development where higher precision and quality is required. SLS can even be used
to 3D print discontinued or very difficult to find parts. A classic car enthusiast/restorer may be
missing a vital part that the manufacturer stopped producing years ago. As long as a digital
model exists, there’s a good chance an SLS machine can print it for you.

You might also like