0% found this document useful (0 votes)
26 views13 pages

E Tech Reviewer

The document discusses various topics related to online safety and cybersecurity including common online platforms, cybercriminal motives through history, modern hackers, malware types, security threats, and cyberbullying. It also defines cybersecurity laws and threats such as hacking, identity theft and plagiarism.

Uploaded by

amamlizardo
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
26 views13 pages

E Tech Reviewer

The document discusses various topics related to online safety and cybersecurity including common online platforms, cybercriminal motives through history, modern hackers, malware types, security threats, and cyberbullying. It also defines cybersecurity laws and threats such as hacking, identity theft and plagiarism.

Uploaded by

amamlizardo
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 13

- EMPOWERMENT TECHNOLOGY -

Online Safety is the knowledge of CYBERSECURITY THREATS,


maximizing the user’s personal safety and VULNERABILITIES, AND
security risk to private information, and the
self-protection from computer crime in ATTACKS ------------------
general.

CYBERCRIMINAL MOTIVES
Two types of Identity -----------
1960 Phone freaking (or
1. Online Identity phreaking) which
★ Who you are in cyberspace. refers to using
★ How you present yourself to various audio
others online. frequencies to
manipulate phone
★ User’s relationship to social
systems.
group
2. Offline Identity 1980 Criminals used
★ The person who your friends computer dial-up
and family interact with on a modems to connect
daily basis at home, at computers to
networks and used
school, or work.
password-cracking
programs to gain
COMMON ONLINE access to data.
PLATFORMS--------------
2000 Criminals are going
beyond just
A. Social Media Platforms stealing
- It is a web-based technology that information.
Criminals can now
allows the development,
use malware and
deployment, and management of viruses as
social media solutions and services. high-tech weapons
B. E-Commerce Platforms
- Collection of software technologies
that allow merchants to create a Malware is a term used to describe
storefront on the internet. software designed to disrupt computer
C. Online Learning Platforms operations or gain access to computer
- Tools and resources to support and systems, without the user's knowledge or
enhance the delivery and permission.
management of education through
the Internet. ★ Viruses are malicious executable
D. Online Video Platforms code attached to another executable
file
- Service providing end-to-end tools
used to create, customize, publish, ★ Worms are malicious code that
and manage videos online. replicates by independently
exploiting vulnerabilities in
networks.
★ Trojan horses are malware that
carries out malicious operations
under the guise of a desired
operation such as playing an online
game.
- EMPOWERMENT TECHNOLOGY -

Spyware is a software that enables a MODERN HACKERS -----------


criminal to obtain information about a user’s
computer activities.
1. Cyber Criminals are black hat hackers
who are either self-employed or working for
Adware typically displays annoying large cybercrime organizations.
pop-ups to generate revenue for its authors. ➔ White hat hackers break into
networks or computer systems to
Scareware persuades the user to take a discover weaknesses in order to
improve the security of these
specific action based on fear. It forges
systems.
pop-up windows that resemble operating
➔ Black hat hackers take advantage of
system dialogue windows.
any vulnerability for illegal personal,
financial or political gain.
Logic Bombs is a malicious program ➔ Gray hat hackers may find a
that uses a trigger to awaken the malicious vulnerability and report it to the
code that can sabotage database records, owners of the system if that action
erase files, and attack operating systems or coincides with their agenda.
applications.
❖ Script Kiddies Teenagers or
Spam is also known as junk mail, is inexperienced hackers running
unsolicited email. Spam is a method of existing scripts, tools, and exploits
advertising. However, spam can send that could cause harm. It was
harmful links, malware, or deceptive typically not done for profit.
content. The end goal is to obtain ❖ Vulnerability Broker are usually
sensitive information. gray hat hackers who attempt to
discover exploits and report them to
Common Indicators of Spam: vendors, sometimes for prizes and
★ An email has no subject line. rewards.
★ An email is requesting an update to ❖ Hacktivists are gray hat hackers
an account. who rally and protest against
★ The email text has misspelled words different political and social ideas.
or strange punctuation. Publicly protest against organization
★ Links within the email are long or governments by posting articles,
and/or cryptic. videos, leaking sensitive
★ An email looks like correspondence information.
from a legitimate business.
★ The email requests that the user 2. State-sponsored are either white or
open an attachment. black hat hackers who steal government
secrets, gather intelligence, and sabotage
networks. Their targets are foreign
governments, terrorist groups and
corporations
- EMPOWERMENT TECHNOLOGY -

SECURITY THREATS ---------- 2. Cyberbullying is the use of electronic


communication to bully a person, typically
A. INTERNAL THREATS by sending messages of an intimidating or
Attacks can originate from within an threatening nature.
organization or from outside of the
organization: 3. Hacking is an attempt to exploit a
● Mishandle confidential data computer system or a private network inside
● Threaten the operations of internal a computer. Simply put, it is the
servers or network infrastructure unauthorized access to or control over
devices computer network security systems for some
● Facilitate outside attacks by illicit purpose
connecting infected USB media into
the corporate computer system 4. Identity Theft occurs when someone
● Accidentally invite malware onto the gains unauthorized access to
network through malicious email or your personally identifying information –
websites such as your name, Social Security Number
(SSN), or bank account information – and
B. EXTERNAL THREATS uses it to commit fraud or other crimes.
Attacks can originate from within an
organization or from outside of the 5. Plagiarism is the practice of taking
organization: someone else's work or ideas and passing
★ External threats from amateurs or them off as one's own.
skilled attackers can exploit
vulnerabilities in networked devices,
Cybersecurity Law:
or can use social engineering, such
as trickery, to gain access. The Cybercrime Prevention Act
★ External attacks exploit weaknesses of 2012 (CPA)
or vulnerabilities to gain access to
internal resources. - Officially recorded as Republic Act No.
10175, is a law in the Philippines that was
approved on September 12, 2012.
Sources of threats - It aims to address legal issues concerning
★ Visiting sites that contain drive-by online interactions and the Internet in the
attack codes Philippines.
★ Downloading malicious software - Offences against the confidentiality,
disguised as keygens, cracks, and integrity, and availability of computer data
patches and systems, computer-related offenses and
★ Downloading files via peer-to-peer content-related offenses.
networks.
★ Downloading attachments from Computer Ethics and
emails sent especially from unknown
sources
Etiquette --------------------

Computer Ethics is the set of moral


COMMON ISSUES AND principles that regulate the use of computers
CRIMES ON THE INTERNET and how to properly communicate and
browse the web.
----------------------------
1. Phishing is a form of fraud. Netiquette ("Internet etiquette") is the
Cybercriminals use email, instant code of good behavior on the Internet.
messaging, or other social media to try to
gather information such as login credentials
or account information by masquerading as
a reputable entity or person.
- EMPOWERMENT TECHNOLOGY -

Core Rules of Etiquette ------ 6. Share expert knowledge. The


Internet offers its users many
benefits; one is the ease with which
1. Remember the Human. information can be shared or
When communicating electronically, accessed and in fact, this
whether through email, instant "information sharing" capability is
message, discussion post, text, or one of the reasons the Internet was
some other method, practice the founded. So in the spirit of the
Golden Rule: Do Unto Other as You Internet's "founding fathers," share
Would Have Them Do Unto You what you know.

2. Adhere to the same 7. Help keep flame wars under


standards of behavior online control. Flaming is what people do
that you follow in real life. when they express a strongly held
You should do your best to act within opinion without holding back any
the laws and ethical manners of emotion. Don't feed the flames;
society whenever you inhabit extinguish them by guiding the
"cyberspace.” discussion back to a more productive
direction.
3. Know where you are in
cyberspace. Depending on where 8. Respect other people's
you are in the virtual world, the same privacy. Just as you expect others
written communication can be to respect your privacy, so should
acceptable in one area, where it you respect the privacy of others.
might be considered inappropriate in
another. 9. Don't abuse your power.
Knowing more than others do or
4. Respect other people's time having more power than others may
have does not give you the right to
and bandwidth. As a virtual
take advantage of anyone.
world communicator, it is your
responsibility to make sure that the
time spent reading your words isn't
10. Be forgiving of other
wasted. people's mistakes.
Not everyone has the same amount
5. Make yourself look good of experience working in the virtual
world. And not everyone knows the
online. One of the best things
rules of netiquette. When this
about the virtual world is the lack of
happens, practice kindness and
judgment associated with your
forgiveness as you would hope
physical appearance, the sound of
someone would do if you had
your voice, or the clothes you wear.
committed the same offense. If it's a
You will, however, be judged by the
minor "offense," you might want to
quality of your writing, so keep the
let it slide. If you feel compelled to
following tips in mind:
respond to a mistake, do so in a
● Always check for spelling
private email rather than a public
and grammar errors
forum
● Know what you're talking
about and state it clearly
● Be pleasant and polite
- EMPOWERMENT TECHNOLOGY -

Word Processors ------------- Disadvantages of Using Typewriter:

1.) Unchangeable
Productivity software is a type of 2.) Sometimes results in untidy documents
application programs that help users produce 3.) Single font for formatting
outputs such as documents, databases, 4.) No spell checkers
graphs, worksheets, and presentations. 5.) Keys get stuck
6.) Needs photocopier
Productivity Tools are used in schools
for research and assignments:
➔ Word Processors BASIC FEATURES OF STANDARD WORD
➔ Database Management Systems PROCESSORS:
(DBMS) • Insert text • Undo and redo
➔ Graphics Software • Delete text • Page size
➔ Spreadsheet Applications • Cut and paste • Margins
• Copy • Search and Replace
Office Suites: A software suite, also • Print • Word wrap
called an application suite or productivity
suite, is two or more software applications ADVANCED FEATURES OF STANDARD
bundled and sold together. WORD PROCESSORS:
➔ Benefit: the compatibility,
integration, and reduced cost. • File management • Macros
➔ Microsoft Office is a standard suite • Font specifications • Merges
of office automation software • Footnotes and • Spell-checker
applications. cross-references • Tables of contents
◆ Microsoft Word, Outlook, • Graphics and indexes
Excel, Access, OneNote and • Headers, footers, and • Thesaurus
PowerPoint. page numbering • Windows
➔ Other examples than Microsoft: • Layout • WYSIWYG (what you
◆ Adobe Creative Suite or see is what you get)
Cloud
◆ Apache OpenOffice ESSENTIAL WORD PROCESSING
◆ iWork FEATURES:
◆ Google Docs
01.) Text Input:
Word Processors: A word processor is a ● Scanning printed documents
software application that involves ● Using optical character recognition
composition, modification, and printing of (OCR) to convert into text characters.
documents. ● Using voice-recognition software to
❖ Typical features: convert spoken words into text
➢ Font application, characters.
➢ Spell checking
➢ Grammar checking 02.) Text Manipulation: refers to the
➢ Built-in thesaurus, "processing" part of word processing.
➢ Automatic Text Correction ● Deleting, inserting, copying, and
➢ Web integration moving individual characters, words,
➢ HTML exporting phrases, and paragraphs.
- EMPOWERMENT TECHNOLOGY -

03.) Text Formatting: includes "wizards" or


"help" features to provide automated
Examples of Word Processing
formatting of common business documents.
● Type size, type style, and typeface.
Software:
● Size is measured in points, a unit of
measure in which 72 points make up 1. Microsoft Word: used as an
an inch. abbreviation for Microsoft WordPad.
➔ Its native file formats are denoted
04.) Text Output: printing a document on either by a .doc or .docx filename
paper (most common method) extension.
● Sending a document by email and
converting it to different electronic 2. Google Docs: online word processor
formats for online viewing or printing capable of almost everything a typical word
from other applications. processor like Microsoft Word.
➔ Supported file types: .doc, .docx,
ADVANCED WORD PROCESSING .docm .dot, .dotx, .dotm, .html, .txt,
FEATURES: Some of the more common .rtf, .odt
advanced features:
3. Open Office Writer: Under Apache
1.) Styles: user-created formatting OpenOffice that is simple for a quick memo,
commands that allow great control over yet capable of creating complete books with
repetitive formatting structures within a contents, diagrams, indexes. Etc.
document. ➔ Standard format is .odt and can be
accessed from any OpenDocument
compliant software.
2.) Headers and footers: typically used
in multiple-page documents to display
4. LibreOffice Writer: word processor
descriptive information. Contains the ff:
❖ Document name and publishing tool similar to Microsoft
❖ Date and/or time you created or Office Word and Corel WordPerfect
revised the document ➔ Easily reads Microsoft Word
❖ Author name documents (.docx, .doc), and you can
❖ Graphic also save your work in Microsoft
❖ Draft or revision number Word format.

3.) Endnote / Footnote: 5.) Corel WordPerfect: owned by Corel


- Footnote: describe additional with a long history on multiple personal
information found at the bottom of a computer platforms.
page ➔ The program was originally
- Endnote: additional information or developed under contract at Brigham
credits given at the end of the Young University for use on a Data
document instead of at the bottom of General minicomputer in 1979.
each page.

4.) Table of Contents: Contains a list of Integrating Images and External


headings and subheadings for an entire Materials
document, including their page locations, on
a single page. Embedding image: A file stored on a
computer can be opened in an image
5.) Desktop-Publishing Capabilities: handling tool to be copied or directly
Professional-looking documents such as inserted into a processor.
newsletters, advertisements, annual reports,
brochures, and business cards.
➔ Letters, Certificates, Resumes
- EMPOWERMENT TECHNOLOGY -

HOW SPREADSHEETS WORK?


★ Each spreadsheet contains one or
more worksheets.
★ Each worksheet appears as a grid.
★ Each row of the grid is labeled with a
number and each column is labeled
with a letter in alphabetical order
from left to right.
★ Cells: spaces that hold items of data.
○ Rows and columns are
labeled to give each cell a
cell address or reference

Formulas: formed by telling the


spreadsheet program what cells to use when
calculating the equation; math equations
★ Equal sign (=): used to start up an
Modification of an Image: equation.
★ Arithmetic Operations: in order of
1.) Crop: used to remove a portion precedence (PEMDAS implemented)
2.) Resize: changing the height/length
3.) Rotate: changing its orientation in a
clockwise or counter-clockwise.
4.) Flip: Mirroring the image by flipping
5.) Text wrapping: positioning of the
picture relative to the page and text.

★ Relational operators: compare two


numbers or two strings
Spreadsheets -----------------
Application designed for managing and
organizing the data in tabular format.
Function: Standard operation used to
- Use formulas to process data and perform common tasks. It involves using
perform integrated calculations. formulas with reserved words.
- Primarily used in business for ➔ Numbers, Cell and range references.
financial statements Text strings. Dates and times,
- Breakdown analyses and graphs. Logical values (TRUE, FALSE), and
Error values.
Features of Spreadsheets
➔ SUM(): Gets the sum of the
arguments.
1.) Visual Design: Allow you to lay figures
➔ VLOOKUP(): Search for a piece of
out on a grid, calculating and manipulating
information in a large table of data
them visually.
and pull in any field from that table
2.) Automatic Calculations: Ability to enter
into your new table.
mathematical formulas ranging from simple
➔ MAX() and MIN(): Returns the largest
arithmetic to complex statistics.
and smallest value, respectively,
3.) Dynamic Updates: Can create a cell with
from a series of numbers.
a value generated dynamically based on
➔ ROUND(): Round it off to the
other cells.
preferred number of decimals.
4.) Data Analysis: Analyze data from grids
➔ NOW(): Returns the current date and
and lines.
time
➔ SQRT(): Gets the square root of the
parameter.
- EMPOWERMENT TECHNOLOGY -

Mathematical Functions Conditional Functions: help you


highlight or manipulate select information
based on specified criteria.
ABS(x) Absolute value LOGIT(p) Logit function
★ “Value_if_true” and “value_if_false”
function
MOD(x,d) Modulo may be a static value or another
ALOGIT(l) Antilogarithmic function formula.
function ★ Up to 7 functions may be nested to
POWER(x,p) Power create some very elaborate tests.
CEIL(x) Rounds x up function ★ If, Countif, and Sumif perform the
logical test using single criteria.
E() Euler's number RAND(x) Random number
★ Countifs, and Sumifs perform the
function (Uniform
logical test on a range of cells that
EXP(x) Natural exponential distribution)
function meet multiple criteria.
RANDNORM(m,s) ★ IF function is straightforward.
FLOOR(x) Rounds x down Random number function
(Normal distribution) Array Formulas: A single array formula
INT(x) Integer value
can perform thousands of calculations and
function ROUND(x,n) Rounds the
replace hundreds of usual formulas.
number x to n digits
LN(x) Natural logarithm - Ex. =SUM((B2:B10>=A2:A10) *
function SIGN(x) Sign value (B2:B10>0))

LOG(x) Logarithm function TRUNC(x) Truncates the Statistical Functions:


number x by removing the
➔ Mean: the average of all the data
fractional part
➔ Median: to find the middle number.
➔ Mode: find the value that occurs
most number of times.
VLOOKUP FUNCTION
Charts and Graphs: allow users to view
1.) Lookup_value: The value to search in data in a manner easy to understand.
the first column of the table array.
Parts of the Graph:
2.) Table_array: Two or more columns of ➔ Title: Provides a brief description of
data; the values in the first column the graph.
of table_array are the values searched by ➔ Labels: telling what kind of data is
lookup_value. being shown; Horizontal, vertical.
➔ Scale: Number or any other data
3.) Col_index_num: The column number in representation that shows units used
table_array from which the matching value on the graphs
must be returned. ➔ Key/Legend: Indicates what the
color/image is representing; side of
the graph
4.) Range_lookup: A logical value that
specifies whether you want VLOOKUP to
Types of Graph:
find an exact match or an approximate
- Pie chart: Circular type of chart
match
represented by slices; Percentage.
- Bar chart: represented by either a
horizontal or vertical bar; Length
- Line graph: corresponding data is
represented by dots that are
interconnected by a line.
- Scatter charts: the dots are not
connected with each other;
Correlation of variables.
- EMPOWERMENT TECHNOLOGY -

Principles of Graphics and 10.) Unity: Culminating effect of all the


individual elements you’ve added to your
Layout ------------------ site.
The fundamentals of design are the ➔ Ensure that visitors will not get
foundation of every visual medium, from overwhelmed, confused, or turn
fine art to modern web design. away from your site.

1.) Balance: equal distribution of visual


Web Design ------------------
weight.
The art of planning and arranging content
a. Symmetrical designs: same or
on a website so that it can be shared and
similar on both sides of an axis.
accessed online with the world.
b. Asymmetrical designs: different but
the weight is still evenly distributed.
Web Design vs. Website Development

2.) Proximity: using visual space to show Web design: Website development:
relationships in your content; Related items
Refers to the visual Refers to the building and
are grouped together.
design and experiential maintenance of a website’s
aspects of a particular structure, and involves
3.) White Space: means negative space; website. intricate coding systems
the spaces between your content, between that ensure the website
lines, and even the outer margins. functions properly.

4.) Alignment: makes the composition Web Design Tools:


easier to navigate. Without consistent 1.) Website builders: Great since they
alignment = disorganized. don’t require code, and come
equipped with a range of
5.) Contrast: one item is different from ready-made templates suitable to
another; Creates emphasis. every industry.
➔ Closely tied to hierarchy 2.) Design software: Tools can be used
➔ Arranging juxtaposing elements in a to create wireframes, custom
way that highlights their differences features and design elements.
◆ Dark and light - Figma, Photoshop and
◆ Smooth and rough Sketch\
◆ Large and small
➔ To emphasize: Color, more than one Website layout: Setting its foundation, since
style of text, and objects of differing it will determine the arrangement and
sizes. sequence of visual elements on each page of
your website.
★ Factors:
6.) Repetition: Every project should have
○ Goals of the website,
a consistent look and feel.
○ Message you want to convey
to viewers
7.) Emphasis: Not all website elements are
○ What kind of content you’ll
equal; use of bright color, animation, or size include.

8.) Movement: Guides visitors from one ★ Two major directions:


element to the next. ○ Layouts to Accommodate
Your Content
9.) Rhythm: Repetition of elements in ○ Common Layouts
order to create consistency, cohesiveness, or
to amplify a certain message. Website Templates: Wide range of
categories to provide a solid infrastructure
for your site’s layout
- EMPOWERMENT TECHNOLOGY -

Functional Components of Web


Design:

A.) Navigation: lets visitors find the


webpages they need after they arrive at your
site by adding navigation menu.

01. Classic Navigation: Placed in the


website’s header, presented as a
horizontal list.
Adaptive Design vs. Responsive
e.)
02. Sticky Menu: Also known as a fixed
or floating menu, stays put as
Design:
visitors scroll down the site. ★ Adaptive design: creating different
versions of the same website, where
03. Hamburger Menu: Made up of three each can adapt to a different size
horizontal stripes that opens to a full screen, or browser width.
menu once it’s clicked
★ Responsive design: creating
04. Dropdown Menu: List of additional websites with a flexible grid.
items opens up once visitors click on
or hover over one of its items. Visual elements of Web Design:
01. Website header: refers to the very
05. Sidebar Menu: A list of menu items top section of a website page and is
located on the left or right side of a the first thing visitors see when they
webpage. arrive at a site.

B.) Speed: measures how quickly your site 02. Website footer: located on the
fully loads after a visitor enters it. bottom of the page and is fixated
every page of your site.

C.) Search Engine Optimization:


03. Color scheme: Set the tone for your
process of optimizing a website so that it
site.
ranks well on search engines.
➔ Common practices:
04. Typography: the visual aspects of
◆ Include headings in your
type, such as the choice of font and
content
arrangement of text.
◆ Add alt text to image
◆ Use meta descriptions on
05. Website Background: background is
relevant pages
what follows visitors consistently as
◆ Choose a domain name that
they scroll.
represents your brand or
business.
06. Imagery: strengthen the message
you send to visitors.
D.) UX Design: user experience; when
applied properly to web design, it can have a 07. Animation: the goals of web design
great impact on the user’s journey. is to set your site apart from others
★ Useful
★ Usable
★ Findable
★ Credible
★ Desirable
★ Accessible
★ Valuable
- EMPOWERMENT TECHNOLOGY -

Image Manipulation: An art that 4.) Emphasis on Detail: set one area as
involves transforming or altering an image the main focus.
using different methods and techniques to
achieve desired results.

Principles and Basic Techniques of Image


Manipulation:

1.) Proportion: Make the image more


realistic if the original design is extremely
far-fetched. Images that are supposed to be
far away have to be smaller than the closer
ones

5.) Combining Multiple Images:


Composition maintains its coherence

2.) Texture: Surface quality of the image.


It adds to the depth of the image and blends
all the images evenly. Blending

6.) Shadows: make the image more


realistic, because they emphasize the object
effectively.

3.) Color Blending: what a designer


should look for at first; colors readily blend.
- EMPOWERMENT TECHNOLOGY -

Online File Formats ---------- Robotics ---------------------


Technology dealing with the design,
01.) JPEG/JPG (Joint Photographic construction, and operation of robots.
Experts Group)
➔ Great for images when need to keep Robots: Device that automatically
the size small performs complicated, often repetitive
➔ Good option for photographs tasks.
➔ Bad for logos, line art, and wide areas
of flat clor. Roboticists: One who conceptualizes,
➔ They retain all color information, but designs, builds, programs, and experiments
compress file size by selectively with robots.
discarding data = loss of quality

GENERAL PARTS OF A ROBOT


02.) PNG (Portable Network Graphics)
➔ Support for sophisticated image
transparency 1.) CONTROL SYSTEM: a control system of
➔ Smaller file sizes, lossless a robot is its brain. it can be compared to the
➔ Can also hold a short text description motherboard of a computer.
➔ Capable of producing background
images without jagged edges. 2.) POWER SOURCE: most robots are
➔ Two types: composed of electronic and
◆ PNG-8 format: Similar to electromechanical device. Thus, they need
GIFs in the fact that they are electricity to function.
saved with 256 colors ★ Two types of power sources: DC & AC
maximum.
◆ PNG-24 format: display 3.) SENSORS: a robot needs input devices
millions of colors but also like sensors for it to work. Sensors are the
comes with a larger file size. data gatherer of the robots. These devices are
equivalent to the sense organs of a human
03.) GIF (Graphics Interchange Format) body.
➔ Support animation
➔ Not selective: if you make a color 4.) ACTUATORS: a robot needs output
transparent, that color will become devices for it to perform tasks in the real
transparent in the entire image. world.

04.) BMP (Bitmap) 5.) END-EFFECTORS: Does the work


➔ Commonly used raster graphic 6.) PROGRAM: the set of instructions that
format for saving image files. are loaded inside a robot.
➔ Stores color data for each pixel in the
image without any compression.
➔ Often used for printable images

05.) TIFF (Tagged Image File Format)


➔ Considered the highest-quality
format for commercial work.
➔ The most versatile, except that web
pages don't show TIF files.

06.) EPS (Encapsulated Postscript)


➔ Compatible with PostScript printers
➔ Often used for transferring files
- EMPOWERMENT TECHNOLOGY -

APPLICATION OF ROBOTICS

1.) Aerospace: includes all flying robots


like surveillance drones. This also includes all
robots for space exploration.

2.) Consumer: you can buy and use just for


fun or to help you with tasks and chores.​

3.) Disaster Response: perform


dangerous jobs like searching for survivors in
the aftermath of an emergency and respond
to calamities.

4.) Military: Used for surveillance like


drones, bomb diffusing robots, attacking
drones, and medic robots for military
activities.

5.) Security: Used in security purposes act


like a security guard. The advantage of this
kinds of robots is not endangering human
lives.

6.) Entertainment: used behind the sets in


movies and serials to manage the camera,
provide special effects, etc. robots can also do
stunts.

7.) Manufacturing: also known as


industrial robots; used for tasks that are
boring, repetitive, and dangerous to human.

8.) Agriculture: used for harvesting the


crops, weeding, seeding, and other activities.

9.) Healthcare: provides companionship


with the sick and elderly. some robots help
doctors do difficult surgeries and other tasks

10.) Underwater exploration: great option


for exploring places that humans cannot
reach easily; water pressure

11.) Customer Service: developed to look


exactly like humans for cosmetic purposes.
These robots are primarily used in the field of
customer service in high visibility areas to
promote robotics.

12.) Education: designed for classroom


settings to enhance the learning experience.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy