Deep Learning
Aleyna Işıkdağlılar 152120171057 Sina Kuşoğlu 152120171039 Mislina Çetiner 152120171005
What is AI?
Artificial intelligence can be considered the all- encompassing umbrella. It refers to computer
1
AI-Machine Learning-Deep
Learning
In the Google Trends graph above, you can see that AI was the more popular search term until machine learning passed it for good around September 2015. Machine learning has become one of – if not the – main applications of artificial intelligence.
Deep Learning
The expression “deep learning”
was first used when talking about Artificial Neural Networks (ANNs) by Igor Aizenberg and colleagues in or around 2000.
In a nutshell, deep learning is a way to achieve machine learning. As ANNs became more powerful and complex – and literally deeper with many layers and neurons – the ability for deep learning to facilitate robust machine learning and produce AI increased.
3
4
What Are The Areas For Using Of Deep Learning?
Face recognition
Voice recognition 5
What Do Famous People Think About AI?
7
8
https://experiments.withgoogle.com/collection/ai 9
References
https://www.import.io/post/history-of-deep-learning/
https://www.habertekno.com/
Nvidia
https://experiments.withgoogle.com/
*Aslı Çalışkan 152120161030
*Doğukan Kahveci 152120131102
*Alperen Çetin 152120161023
Introduction to Computer Engineering
11
12
Subtitles
● Classical Logic
● Fuzzy Logic
● Diffrences Between Classical and Fuzzy Logic
● Questions About Topic
● References
13
Some mammals are carnivores; all mammals are animals; therefore, some animals are carnivores.
15
16
17
Diffrences Between
19
20
Question 1
● The truth values of traditional set theory is ____________ and that of fuzzy set is __________
● a) Either 0 or 1, between 0 & 1 b) Between 0 & 1, either 0 or 1 21
Answer 1
● A
● Explanation: Refer the definition of Fuzzy set and Crisp set.
Question 2
● The room temperature is hot. Here the hot (use of linguistic variable is used) can be represented by _______
● a) Fuzzy Set
● b) Crisp Set
● c) Fuzzy & Crisp Set
● d) None of the mentioned 23
24
Answer 2
● A
● Explanation: Fuzzy logic deals with linguistic variables.
Question 3
● Fuzzy logic is usually represented as
● a) IF-THEN-ELSE rules b) IF-THEN rules 25
Answer 3
● B
● Explanation: Fuzzy set theory defines fuzzy operators on fuzzy sets. The problem in applying this is that the appropriate fuzzy operator may not be known. For this reason, fuzzy logic usually uses IF-THEN rules, or constructs that are equivalent, such as fuzzy associative matrices.
● Rules are usually expressed in the form:
● IF variable IS property THEN action
References
● https://www.dersimiz.com
● https://www.sanfoundry.com
● Brighterion.com
● Mathworks.com
● Slideshare.net
● https://www.doc.ic.ac.uk 27
28
ONUR AKKEPENEK 152120171023 ECE MELİS BOZDAĞ
152120171055 BERKAY HÜSEYİNOĞLU
152120171032
INTRODUCTION TO COMPUTER ENGINEERING
CONTENTS
• Definition of artificial intelligence
• The main artificial intelligence methods
• Artificial intelligence applications in medicine
• The Articles Published
29
Artificial intelligence applications and methods in medicine
“The science and engineering of making intelligent machines”.
31
32
The main artificial intelligence methods :
✓Expert systems
✓Fuzzy logic
✓Genetic algorithm
✓ Artificial neural networks
• Expert systems are computer systems which are capable of modeling reasoning and
decision-making that can be done by a person skilled in the art.
33
• Genetic algorithms are searches and optimization
methods that works in a way which is similar to the
evolutionary process observed in nature.
• These systems are acting on the principle of survival
of the best.
Unclear medical conditions can be defined by fuzzy sets.
• Fuzzy logic proposes methods of generating solutions with approximate results.
• Each entity in the fuzzy set has a membership degree. According to these values, it takes the one tone of gray.
35
36
• ANN simulates the operation of a simple biological nervous system.
• ANN is capable of
learning, memorizing and
37
• In order to show the desired behavior, it must be adjusted accordingly , in other words , it must be educated.
• ANN is one of the most important tools used in modeling and decision making.
39
40
Artificial intelligence applications in medicine
Evaluation of results.
Survival rates Classification
of diseases
Artificial neural networks-Fuzzy logic Analysis
Modeling Be understandable
41
• Heart diseases
• Determination of growth and development period
• Liver diseases
• Detection of nodules in lung tomography images and characterization of
nodules by artificial intelligence
43
44
The Articles Published
• Artificial Intelligence in Medicine
• Computers in Biology and Medicine
• Computer Methods and Programs in Biomedicine
• Medical & Biological Engineering & Computing
REFERENCES
• Turkiye Klinikleri J Med Sci 2009;29(2):314-20
• http://www.yogunbakimdergisi.org/managete/fu_folder/2010- 01/html/2010-9-1-031-041.htm)
• https://fikirjeneratoru.com/cesitli-yapay-zeka-tekniklerinin- 45
Question 1
Who talked about artificial intelligence for the first time?
A)John McCarthy B)Alex De Souza C)Tom Hardy D)Aristo
Question 2
• Which is not the main artificial intelligence method?
A) Expert systems B)Fuzzy logic
C)Genetic algorithm D) Fibonacci array
47
48
ONUR AKKEPENEK 152120171023 ECE MELİS BOZDAĞ
152120171055 BERKAY HÜSEYİNOĞLU
152120171032
INTRODUCTION TO COMPUTER ENGINEERING
CONTENTS
• Definition of artificial intelligence
• The main artificial intelligence methods
• Artificial intelligence applications in medicine
• The Articles Published
49
Artificial intelligence applications and methods in medicine
“The science and engineering of making intelligent machines”.
51
52
The main artificial intelligence methods :
✓Expert systems
✓Fuzzy logic
✓Genetic algorithm
✓ Artificial neural networks
• Expert systems are computer systems which are capable of modeling reasoning and
decision-making that can be done by a person skilled in the art.
53
• Genetic algorithms are searches and optimization
methods that works in a way which is similar to the
evolutionary process observed in nature.
• These systems are acting on the principle of survival
of the best.
Unclear medical conditions can be defined by fuzzy sets.
• Fuzzy logic proposes methods of generating solutions with approximate results.
• Each entity in the fuzzy set has a membership degree. According to these values, it takes the one tone of gray.
55
56
• ANN simulates the operation of a simple biological nervous system.
• ANN is capable of
learning, memorizing and
57
• In order to show the desired behavior, it must be adjusted accordingly , in other words , it must be educated.
• ANN is one of the most important tools used in modeling and decision making.
59
60
Artificial intelligence applications in medicine
Evaluation of results.
Survival rates Classification
of diseases
Artificial neural networks-Fuzzy logic Analysis
Modeling Be understandable
61
• Heart diseases
• Determination of growth and development period
• Liver diseases
• Detection of nodules in lung tomography images and characterization of
nodules by artificial intelligence
63
64
The Articles Published
• Artificial Intelligence in Medicine
• Computers in Biology and Medicine
• Computer Methods and Programs in Biomedicine
• Medical & Biological Engineering & Computing
REFERENCES
• Turkiye Klinikleri J Med Sci 2009;29(2):314-20
• http://www.yogunbakimdergisi.org/managete/fu_folder/2010- 01/html/2010-9-1-031-041.htm)
• https://fikirjeneratoru.com/cesitli-yapay-zeka-tekniklerinin- 65
Question 1
Who talked about artificial intelligence for the first time?
A)John McCarthy B)Alex De Souza C)Tom Hardy D)Aristo
Question 2
• Which is not the main artificial intelligence method?
A) Expert systems B)Fuzzy logic
C)Genetic algorithm D) Fibonacci array
67
68
Cloud Computing
Ahmad Zaidan Kumbukani Kamanga
Boburshoh Abdulov
What is Cloud Computing
• Cloud computing is simply accessing all computer services like storage, processing and security on different digital platforms from any remote location using the internet
• The word cloud is used because of the analogy between the property of rain clouds and the way the cloud computing is designed
69
History of Cloud Computing
• The idea originally came after the DARPA (the Defense Advanced Research Projects Agency), presented MIT with $2 million for Project MAC.
The MAC project was one that allowed multiple users to use the same computer simultaneously
• Then the concept of virtualization began to get popular which led to the development of modern cloud computing.
• In the late 1990s it gained a lot of popularity since people started getting better understanding of what cloud computing is.
71
72
How Does Cloud Computing Work?
A lot of us actually use cloud computing in our daily lives. If you have used the email then you have used cloud computing. What you are loading on your machine is only an application, you only log into a web service and all the data and applications needed to run this service are on a device in a different location.
By adopting the cloud, companies are relying on an automated decision making system t o reduce the number of the staff they need to perform complex calculations, analysis, a nd to actually maintain the system.
73
• Cost effective
• Easy to implement
• Secure and reliable
• You can access it anytime and anywhere
• Flexible and scalable
Risks of Using Cloud Computing
• Loss or theft of data stored on the cloud
• Loss of control over end user actions
• Spreading of malware through the cloud that do planned attacks
• Loss of customer trust due to data breaches
75
76
What is the Cloud Made of?
• The cloud can be divided broadly into two layers – the front end and back end.
• On the front end of the cloud there is the things that can be seen by the user.
• On the back end of the cloud there are the things that run the system.
Types of Cloud
Based on a Deploymen t Model
Based on Service
Public Cloud
IaaSPrivate Cloud
PaaS77
Based on a Deployment Model
• Public Cloud:
1. The whole computing infrastructure is not located in the same location as the customer 2. Excel in performance but vulnerable to attacks
3. Customer has no control on the physical infrastructure
• Private Cloud:
1. Provides same benefits just with dedicated private hardware 2. It’s not shared with anyone making it more secure
3. Can be on premises of the company or remotely located
• Hybrid Cloud:
Uses both private and public clouds depending on the purpose
• Community Cloud:
Implies an infrastructure that is shared between organizations for the reason of shared information between them.
Based on Service
79
80
Challenges Facing Cloud Computing
• Lack of Resources and Expertise
• Security
• Segmented usage and adoption
• Performance Dependency
Companies that Implemented Cloud Computing
• Netflix
• Xerox
81
Cloud Computing is the Future!
• Artificial Intelligence
• Internet of Everything
• Blockchain
• Autonomous Vehicles
Exam Questions
Which of the following is NOT a benefit of cloud computing?
a) You can access it anytime anywhere b) Loss or theft of data stored on the cloud c) Cost effective
d) Secure and reliable
83
84
Exam Questions
Which of the following is a type of cloud?
a) Mushroom cloud b) Cirrus cloud
c) Cumulonimbus cloud d) Private cloud
Resources
• http://insights.motherg.com/blog/blog/why-is-it-called-cloud-computing
• https://www.ibm.com/cloud/learn/what-is-cloud-computing
• https://www.smartdatacollective.com/7-well-known-companies-have-moved-cloud/
85
Thank You!
Introduction & History of Computers
Computer Engineering Department Introduction to Computer Engineering
Prepared by: Aysegul Kadem(152120171044) Hager Hamza(152120171075)
Belal Rahimi(152120171077)
07.12.2018 87
88
Contents
* What is a Computer?
* Data and Information
* Information Technology (IT)
* History of Computers
* Generations
* Two questions
* Summary
* References
What is a Computer?
Definition: A computer is a calculating machine that can perform arithmetic operation at a very high speed.
Or you can say computers are electronic devices that accept data(input), process them into information, produce outputand storethem.
89
Data and Information
Data: A collection of raw facts and figures is called data which may consist of numbers , characters, symbols etc.
Information: processed, organized and meaningful data is called information.
Information Technology
Information technology is the use of systems (especially computers and telecommunications) for storing and sending information.
Computeris a very important component of information technology. 91
92
History of Computers
First of all before computers people were doing the job.
Ancient Counting Machines: the Abacus(3000 BCE)
Oughtred’s(1621) and Schickard’s(1623) slide rule
93
Blaise Pascal’s Pascaline(1645)
Charles Babbage(1791-1871) The father of computers
Difference Engine Analytical Engine
95
96
ENIAC(Electronic Numerator Integrator Analyzer And Computer)
This huge machine was accepted as the first computer(1946)
Turing machine was used to crack German secret codes in second world war.
EDVAC(Electronic Discrete Variable Automatic Computer)
It was 10 times smaller and working 100 times faster than ENIAC.
97
IBM 700 series & UNIVAC
People started using computers with vacuum tubes after 1950 which IBM and UNIVAC are from this type of computers.
Intel 4004 Microprcessor
Words first microprocessor with 2300 transistors after 1970.
99
100
Apple (1977)
This pc was introduced by two university students which didn’t have keyboard and monitor. They were using it in a house garage.
The first Apple personal computer is Apple Macintosh.
IBM PC
The fist personal computer which was introduced in 1981 and it was running the Microsoft Disk Operating System(MS-DOS).
101
Generations
First generation-Vacuum Tubes:
1. From 1946-195
It can perform 2,000 to 16,000 additions per second
2.Used Vacuum tubes 3.Very large machines
Special rooms and special trained technicians
Second Generation - Transistors
1. From 1959 to around 1965
2.Smaller,faster,and more reliable Used transistors
6,000 to 3,00,000 operations
3. one-tenth the price of a 1st Generation
4.become common in larger businesses and universities 103
104
Third Generation – Integrated Circuits
1.Form 1965 to around 1972
2.Used integrated circuits- many transistors on one piece of silicon
3.Smaller,faster,more reliable,and lower in price
4.These Computers become very common in medium to large businesses
Fourth Generation - Microprocessors
1.From 1972 until now
2.Used large scale to very large scale integrated circuits
3.smaller,faster,more reliable, and lower in price
105
Two questions
1. Who was named the father of Computers?
A) Leo Messi B) Michael Jackson C) Bill gates D) Charles Babbage
2. Which computers were the biggest?
A) Second generation B) third generation C) first generation D) fourth generation
Summary
Computer definition
Data and information
The ancient machines
How computers found
The first PC
Dates and founder of computers
Generations of computers 107
108
References
Books:
Websites: Bilgisayar ve bilgisayarin tarihcesi.Retrieved October 5,2011,from https://atabilgisayardonanim.wordpress.com/2011/10/bilgisayar-ve- bilgisayarin-tarihcesi2.pdf
Bernard John Poole,A Brief history of computers,from www.pitt.edu/~super7/44011-45001/44911.ppt
109
ENES SOLAK ORHAN İNAÇ İBRAHİM ERTAN YILMAZ 111
Industrial Revolution
ENES SOLAK ORHAN İNAÇ İBRAHİM ERTAN YILMAZ 112
111
112
ENES SOLAK ORHAN İNAÇ İBRAHİM ERTAN YILMAZ 113
What is Industry 4.0 ¿
Industry 4.0 in general terms; Robotic production is taken over completely, development of artificial intelligence, production of three-dimensional printers from factories to homes, huge amounts of information by analyzing the data collected by data analysis and many other innovations can be examined.
113
INDUSTRY 4.0 DESIGN PRINCIPLES
The design principles allow manufacturers to investigate a potential transformation to Industry 4.0 technologies. These are the design principles:
➢Interoperability
➢Virtualization
➢Decentralization
➢Real-Time Capability
➢Service-Orientation
➢Modularity
ENES SOLAK ORHAN İNAÇ İBRAHİM ERTAN YILMAZ 115
Advantages of Industry 4.0
1. Efficiency
With fewer people and more automation, companies can make decisions more rapidly and keep efficiency high. Automation also tends to keep quality high, and that’s an area that further boosts
efficiency.
ENES SOLAK ORHAN İNAÇ İBRAHİM ERTAN YILMAZ 116
115
116
2. Agility
With a focus on high mix, small lots, and even one-off manufacturing, Industrie 4.0 brings agility to the next level. When products know their own specifications, it accelerates processes throughout production processes.
ENES SOLAK ORHAN İNAÇ İBRAHİM ERTAN YILMAZ 117
3. Innovation
Since Industrie 4.0 production lines are made to accommodate high mix and low volumes, they are ideally suited to new product introduction and experimentation in design.
4. Customer experience
The responsiveness and deep information availability available with Industry 4.0 mean manufacturers can give customers better service. In some cases, self-service views into the 117
5. Costs
While Industrie 4.0 will require initial investments, once the intelligence is built into products and processes, the costs will plummet. Fewer quality problems lead to less material waste, lower personnel and operating costs. The speed and ability to handle such a high mix seamlessly will also lower costs.
ENES SOLAK ORHAN İNAÇ İBRAHİM ERTAN YILMAZ 119
6. Revenues
With better quality, lower costs, higher mix, and the ability to serve customers well, Industrie 4.0 puts manufacturers on a path to be a preferred supplier to current customers. It also opens up ways to serve larger markets, offer
customized and thus higher-margin products, and with intelligent products and operations to offer services to accompany the products.
ENES SOLAK ORHAN İNAÇ İBRAHİM ERTAN YILMAZ 120
119
120
ENES SOLAK ORHAN İNAÇ İBRAHİM ERTAN YILMAZ 121
BIG DATA AND ANALYTICS
In an Industry 4.0 context, the collection and comprehensive evaluation of data from many different sources—production equipment and systems as well as enterprise- and customer-management systems—will become standard to support real-time decision making.
AUTONOMOUS ROBOTS
Robots will eventually interact with one another and work safely side by side with humans and learn from them. These robots will cost less and have a greater range of capabilities than those used in manufacturing today.
121
SIMULATION
Simulations will be used more extensively in plant operations to leverage real-time data and mirror the physical world in a virtual model, which can include machines, products, and humans.
THE INDUSTRIAL INTERNET OF THINGS
This will allow field devices to communicate and interact both with one another and with more centralized controllers, as necessary. It will also decentralize analytics and decision making, enabling real-time responses.
ENES SOLAK ORHAN İNAÇ İBRAHİM ERTAN YILMAZ 123
CYBERSECURITY
With the increased connectivity and use of standard
communications protocols that come with Industry 4.0, the need to protect critical industrial systems and manufacturing lines from cybersecurity threats increases dramatically. As a result, secure, reliable communications as well as sophisticated identity and access management of machines and users are essential.
ENES SOLAK ORHAN İNAÇ İBRAHİM ERTAN YILMAZ 124
123
124
ADDITIVE MANUFACTURING Companies have just begun to
adopt additive manufacturing, such as 3- D printing, which they use mostly to prototype and produce individual components. With Industry 4.0, these additive-manufacturing methods will be widely used to produce small batches of customized products that offer
construction advantages, such as complex, lightweight designs.
ENES SOLAK ORHAN İNAÇ İBRAHİM ERTAN YILMAZ 125
AUGMENTED REALITY Augmented-reality-based systems support a variety of services, such as selecting parts in a warehouse and sending repair instructions over mobile devices. These systems are currently in their infancy, but in the future, companies will make much broader use of 125
REFERENCES
https://www.endustri40.com/katmanli-uretimde-otonom-orumcek-robotlar/
https://www.endustri40.com/endustri-tarihine-kisa-bir-yolculuk/
https://www.bcg.com/capabilities/operations/embracing-industry-4.0-rediscovering- growth.aspx
https://youtu.be/c3kP-jjgx1E
ENES SOLAK ORHAN İNAÇ İBRAHİM ERTAN YILMAZ 127
iPhone/iPad Operating System (iOS)
Berkay Gönenç GÖKSAL 152120171016
Alihan DEMİRCİ 152120161004 127
128
Overview
• What is an Operating Sytsem?
• What is iOS?
• History of iOS
• iOS Jailbreaking
• Features
What is an Operating System?
A set of programs that Examples of the widely
129
What is iOS?
• Originally known as the iPhone OS, the name was changed with the introduction of the iPad.
• iOS is a mobile operating system for Apple-manufactured devices. iOS runs on the iPhone, iPad, iPod Touch and Apple TV.
Original iOS logo, used until 2013 (left) and logo used 2013–18 (right)
History of iOS
• The operating system was unveiled with the iPhone at the Macworld Conference &
Expo on January 9, 2007, and released in June of that year.
• At the time of its unveiling in January, Steve Jobs claimed: "iPhone runs OS X" and runs
"desktop applications", but at the time of the iPhone's release, the operating system was renamed "iPhone OS".
131
132
• Since its initial release, iOS has been subject to a variety of different hacks centered around adding functionality not allowed by Apple. Prior to the 2008 debut of Apple's native iOS App Store, the primary motive for jailbreaking was to bypass Apple's purchase mechanism for installing the App Store's native applications.
• In 2010, the Electronic Frontier Foundation (EFF) successfully convinced the U.S. Copyright Office to allow an exemption to the general prohibition on circumvention of copyright protection systems under the Digital Millennium Copyright Act (DMCA). The exemption allows jailbreaking of iPhones for the sole purpose of allowing legally obtained applications to be added to the iPhone
Features
29 June 2007 iPhone OS 1; Third-party native applications were not supported.11 July 2008 17 June 2009
iPhone OS 3; It was the last version dropped the "iPhone OS" naming
convention.
133
Features
21 June 2010iOS 4; The operating system added a multitasking feature, letting apps dealing
with internet calling, location and audio playback function in the background.
12 October 2011
iOS 5; Revamped notifications, the operating sytem also added iCloud and
iMessage. For the first time, system software updates can be installed
wirelessly. Siri introduced.
19 September 2012 iOS 6; added a new Apple Maps app and
a Passbook app, for managing different types of tickets. FaceTime was updated to work over a cellular connection.
Features
10 June 2013iOS 7; The new look, featuring flatter icons, introduced AirDrop, CarPlay,
phone and car integration and automatic app updates in the App Store.
17 September 2014
iOS 8; updated keyboard with QuickType, app updates in the release
included the new Health app. Apple updated its Music app with a streaming
service called Apple Music. Siri has Turkish language option in 8.3 update.
16 September 2015 iOS 9; Apple added a Night Shift mode, brought new user experience functions, including Quick Actions, and Peek and
Pop, based on the touch-sensitive display technology in the iPhone 6S
135
136
Features
13 September 2016 iOS 10; Maps has a redesigned interface,Photos has algorithmic search and categorization of media known as
"Memories". Native apps could be removed.
19 September 2017
iOS 11; Siri was updated to translate between languages, camera had new settings for improved portrait-mode
photos, operating system also introduced the ability to record the
screen.
17 September 2018
137
Thanks For Listening to Us
REFERENCES
• www.apple.com
• en.wikipedia.org/wiki/IOS
• shiftdelete.net 139
140
For the first time, which version of İos has Turkish language option for Siri?
A) 7.0 B) 8.3 C) 8.1.1 D) 9.1 E) 7.3.2
What does iOS mean?
A) Inspiration Operate System B) iPod Operate Systems C) Icarus Operating System
D) iPhone/iPad Operating System
141
Smart E-Commerce Systems
İNTRODUCTION to COMPUTER ENGİNEERİNG
İZZET ÇAKAR
ÖZHAN NEDİM EYÜPREİSOĞLU
What İs E-Commerce Systems ?
E-compare systems are the sofware that allows you to shop online from the internet.
You need to have a website to trade.
After your site is opened,virtual pos systems need to be integrated,then you can add your products to your site and start your trade
143
144
Using
There is a panel designed to easily manage your site
With this panel you can add and delete products to your site, You can change to publish announcements or orders
Free and paid softwares
There are free and paid ecommerce softwares.
However,paid softwares has more advantages.
145
Business to Consumer (B2C)
Companies sell products to consumers on website.
The using of this software is expected to increase.
Business to Business (B2B)
It is called inter-agency trade.
Companies enter to the international market with this softwares.
147
148
Business to Goverment (B2G)
Companies give less price for institutions.
Comsumer to Goverment (C2G)
The state receives certain fees on the internet from citizen.
149
Consumer to Consumer (C2C)
it is called the trade between consumers on the Internet
How many are e-commerce software modules?
a)1 b)2 c)3 d)4 e)5 151
152
Which one is example for costumer to costumer(C2C)
a)www.gittigidiyor.com b)www.teknosa.com c)www.vatanbilgisayar.com d)www.hepsiburada.com e)www.amazon.com
vIruses In programs
■ INTRODUCTION TO COMPUTER ENGINEERING
153
What Is The Computer Virus?
➢ Computer viruses are small software programs.
➢ A computer virus is a malicious program that self-replicates by copying itself to another program. In other words, the computer virus spreads by itself into other executable code or documents.
➢ Viruses often perform some type of harmful activity on infected hosts.
Types of Computer Virus
Boot Virus
➢Boot viruses infects the boot records of hard disk and floppy disks. Generally these are considered more dangerous than program viruses.
File Virus
➢These viruses infect program files, which have extensions such as .COM,.EXE.,SYS.,DLL,.OVL, or .SCR
Macro Virus
➢A macro virus is a computer virus that replaces a macro, which is what enables a program to work and instigates a designated group of actions and commands.
When these actions and commands are replaced by a virus, this can cause significant harm to a computer.
155
156
How Does Computer Virus Spread?
➢ E-mail attachments
➢ Downloads
➢ Shared files
➢ Cracked Softwares
➢ Fake Websites
➢ Networks
➢ From Mobile Devices
What Does a Computer Virus Do?
➢ A virus tries to take control of computer system it has infected at the first opportunity availible.It makes copies of itself and also try to carry harmful task written in its program. This process can happen so quickly that the user is not even aware of the presence of a virus in his/her computer.
➢ A virus might corrupt or delete data on your computer, use your e-mail 157
How to Identify Computer Viruses?
➢ Computer speaks to me.
➢ Computer running extremely slow.
➢ Applications won’t start.
➢ Can’t connect internet or internet slows.
➢ System memory and disk space is reduced.
➢ Error messages on regular basis.
Prevention from Computer Viruses
➢ Install reliable Anti-virus program
➢ Avoid opening suspicious websites
➢ Never opening attachment without scanning
➢ Set-up automatic scanning
➢ Know what to look
➢ Install a firewall (Screening) 159
160
Best Antivirus Softwares
➢ Norton antivirus
➢ MacAfee virus scan
➢ Kaspersky antivirus
References:
➢ http://www.antivirusworld.com/articles/history.php
➢ http://www.articlesbase.com/information-technology- articles/antivirus-history- 277310.html
➢ https://en.wikipedia.org/wiki/Computer_virus 161
Which of the following is NOT a harmful software?
A) Worms B) SpyWare C) Trojan Horses D) FireWall E) Rootkits
Which of the following is NOT a way to protect your computer from a virus?
A) Disable autorun
B) Use an anti-virus program.
C) Clear Internet cache and browsing history.
D) Be cautious with emails links.
E) Don’t sneeze to computer.
163
164
HISTORY OF INTERNET
FATİH ARSLAN152120161003 HASAN DALKILIÇ152120171004
T
HE HISTORY OF THEI
NTERNET BEGINS WITH THE DEVELOPMENT OF ELECTRONIC COMPUTERS IN THE1950
S. I
NITIAL CONCEPTS OFW
IDE AREA NETWORKING ORIGINATED INSEVERAL COMPUTER SCIENCE LABORATORIES IN THE
U
NITEDS
TATES, U
NITEDK
INGDOM,
ANDF
RANCE.
A
RPANET WHICH FIRST USED NETWORK WAS DEVELOPED BY 165THE FIRST MESSAGE WAS SENT OVER THE ARPANET IN 1969 FROM COMPUTER SCIENCE
PROFESSOR LEONARD KLEINROCK'S LABORATORY AT UNIVERSITY OF CALIFORNIA.
• D
ONALD DAVIES FOUNDED PACKET SWITCHING SUCH ASARPANET, NPL
NETWORK, CYCLADES, M
ERITN
ETWORK, T
YMNET IN1967
AT THE NATINONAL PHYSICS LABORATORY IN THEUK.
167
168
• TCP/IP WAS DEVELOPED BYROBERT E.KHAN AND VINT CERF IN THE1970S AND BECAME THE STANDARD NETWORKING PROTOCOL ON THEARPANET.
•
THE NSF FUNDED THE ESTABLISHMENT FOR NATIONAL SUPERCOMPUTING CENTERS AT SEVERAL UNIVERSITIES,
AND PROVIDED INTERCONNECTIVITY IN1986
WITHTHE NSFNET
P
ROJECT.
• C
OMMERCIAL INTERNET SERVİCE PROVIDERS(ISP
S)
BEGAN TO EMERGE IN THE VERY LATE1980
S.
•
IN THE1980
S,
TIM BERNERS-
LEE RESULTED IN THEW
ORLD WIDE WEB(
WWW),
LINKING HYPERTEXT DOCUMENTS INTO AN INFORMATION SYSTEM,
ACCESSIBLE FROM ANY NODE ON THE NETWORK.
169
• 1990
S,
ARPANET AND NSFNET WERE ENDED. S
O,
THEI
NTERNET HAS HAD A REVOLUTIONARY IMPACT ON CULTURE,
COMMERCE,
AND TECHNOLOGY SUCH AS ELECTRONIC MAIL
,
INSTANT MESSAGING,
VOICE OVER INTERNET PROTOCOL(V
OIP)
TELEPHONE CALLS
,
TWO-
WAY INTERACTIVE VIDEO CALLS,
AND THEW
ORLD WIDE WEB WITH ITS DISCUSSIONFORUM
,
BLOGS,
SOCIAL NETWORKING,
AND ONLINE SHOPPING SITES.
• T
HE RESEARCH AND EDUCATION COMMUNITY CONTINUES TO DEVELOP AND USE ADVANCED NETWORKS SUCH ASJANET
IN THEU
NITEDK
INGDOM ANDI
NTERNET2
IN THEU
NITEDS
TATES. I
NCREASING AMOUNTS OF DATA ARE TRANSMITTED AT HIGHER ANDHIGHER SPEEDS OVER FIBER OPTIC NETWORKS OPERATING AT
1 G
BIT/
S, 10 G
BIT/
S,
OR MORE.
171
172
• T
HEI
NTERNET'
S TAKEOVER OF THE GLOBAL COMMUNICATION LANDSCAPE WAS ALMOST INSTANT IN HISTORICAL TERMS:
IT ONLY COMMUNICATED1%
OF THE INFORMATION FLOWING THROUGH TWO-
WAY TELECOMMUNICATIONS NETWORKS IN THE YEAR1993,
ALREADY51%
BY2000,
AND MORE THAN97%
OF THE TELECOMMUNICATED INFORMATION BY2007.
TODAY THE INTERNET CONTINUES TO GROW, DRIVEN BY EVER GREATER AMOUNTS OF ONLINE INFORMATION, COMMERCE, ENTERTAINMENT, AND SOCIAL NETWORKING. HOWEVER, THE
FUTURE OF THE GLOBAL INTERNET MAY BE SHAPED BY REGIONAL DIFFERENCES IN THE WORLD.
173
QUESTIONS 1: WHAT IS THE ‘WWW’?
A)WORLD WIRELESS WEB B)WORLD WIDE WEB C)WORLD WARE WEB D)WORLD WEAK WEB
QUESTION 2: WHO DID SEND THE FIRST MESSAGE OVER THE INTERNET?
A)BILL GATES B)STEVE JOBS
C)DONALD DAVIES D)CHARLES BABBAGE E)LEONARD KLEINROCK
175
176
REFERENCES:
HTTPS://EN.WİKİPEDİA.ORG/WİKİ/HİSTORY_OF_THE_INTERNET HTTPS://TR.WİKİPEDİA.ORG/WİKİ/%C4%B0NTERNET%27İN_TARİHİ HTTPS://TEKNOKOLİKER.COM/2014/01/İNTERNET-TARİHİ-VE- GECMİSTEN-GUNUMUZE-İNTERNETİN-GELİSİMİ.HTML
HTTPS://WWW.YENİSAFAK.COM/BİLGİ/TURKİYEDE-İNTERNETİN-KİSA- TARİHİ-3404209
HTTPS://WWW.LİVESCİENCE.COM/20727-İNTERNET-HİSTORY.HTML HTTPS://İNTERNET-MAP.NET/
INTRODUCTION TO COMPUTER ENGINEERING
177
Cyber is an abstract and broad infrastructure that works in the information systems infrastructure.
179
180
• Cybercrime
• Cyber Terrorism
• State Supported Cyber Attacks
Through informatics
systems crimes committed.
181
Cyber terrorism is the action taken through computer systems to achieve a specific political goal.
183
184
The security of information and informatics systems is becoming part of national and
international security.
In the near future, inter-state fight will be concentrated in cyber space.
185
• Bacteria l
• Worm,
• Virus,
• Trojan horse,
• Logic bomb,
• Back door,
• Slave computers,
• Rootkit,
• Advanced Cyber
Threats,
• Attack kits.
187
188
• Authentication systems,
• The firewall,
• Antivirus,
• Data leakage prevention system,
• Network access control system,
• Content filter,
• Encryption Systems,
• Digital signature…
REFERENCES
● http://www.bilgesam.org/Images/Dokumanlar/0- 81-2014041721siberguvenlik.ppt
● http://www.istanbulsaglik.gov.tr/w/anasayfalinkler/
belge/siber_guvenlik_sunum.pdf
189
I.Worm II.Virus
III.Trojan horse
Which malicious software can be given as an example?
A) I-II B)I-III C)II-III D)I-II-III
191
192
LINUX
CONTENT PAGE
•
Free Software•
Linux’s History•
Features•
Windows vs Linux•
GNU/Linux Distributions•
193
Free Software
•
Free Software is a concept related to the freedom of users to run, copy, distribute, work, modify and develop software.•
Free software is a program used and distributed at no charge to the user.Yasemin Gerboğa-152120171056/Eda Çam-152120171037
Free Software
•
Freedom to run the software for any purpose.(Freedom # 0)•
Whatever you want it to learn how the program works and the freedom to change it.(Freedom #1)•
Freedom to distribute copies.(Freedom #2)•
Freedom to develop and publish the program so that the whole community can benefit.(Freedom #3)Yasemin Gerboğa-152120171056/Eda Çam-152120171037 195
196
Free Software Applications
•
Photo editing: GIMP•
Video player: VLC Media Player•
Streaming audio: Spotify•
Virtual machines: VirtualBox•
LibreOffice•
Firefox•
7zip•
FileZillaYasemin Gerboğa-152120171056/Eda Çam-152120171037
LINUX’S HISTORY
•
LINUX is a core of a Unix based operating system which is started to develop by a student (Linus Torvalds)of Computer at HelsinkiUniversity to try the architecture of protectedmode of Intel’s new processor 80386.
197
LINUX’S HISTORY
•
It’s a open source free software that has been developed rapidly by the contribution of many software developers from all over the world after the announcement made on the Internet and it is still developing with the same support.Yasemin Gerboğa-152120171056/Eda Çam-152120171037
FEATURES
•
Security vulnerabilities are less than other operating systems.•
You have a very fast computer without worrying about your system.•
Programs that are completely similar to an application that we purchase for a fee are free of charge.•
Continuous update and long-term product support.Yasemin Gerboğa-152120171056/Eda Çam-152120171037 199
200
FEATURES
•
From a crashed windows system, you can recover the data with linux.•
You can use it without leaving a trace with Life run feature.•
You can make changes with Linux. You can create panels and interfaces.Yasemin Gerboğa-152120171056/Eda Çam-152120171037
WINDOWS VS LINUX
WINDOWS LINUX
Attack / Security More than 11000 to date malicious software was discovered.
Nearly 800 malware attacks have occurred.
Control Control operating system
hand is.
User-managed system.
Price from $ 45- $ 450 from $ 0 - $ 350
201
GNU/LINUX DISTRIBUTIONS
•
Linux distribution is a collection of free softwafe projects that have become a complete operating system.Yasemin Gerboğa-152120171056/Eda Çam-152120171037
GNU/LINUX DISTRIBUTIONS
Yasemin Gerboğa-152120171056/Eda Çam-152120171037 203
204
GNU/LINUX DISTRIBUTIONS
•
Slackware Linux•
Redhat•
Fedora Core•
Mandriva•
SuSe(Software and System Development)•
Debian•
Ubuntu•
PardusYasemin Gerboğa-152120171056/Eda Çam-152120171037
PARDUS is an open source operating system based on Debian GNU/ Linux. It can be downloaded for free and easily installed over the Internet. In order to make Pardus a competitive and sustainable operating system
GNU/LINUX DISTRIBUTIONS
205
Why should I use linux?
•
To forget the virus word forever.•
Because it's free.•
Since you don't need to install more tools after installing the system.•
To avoid dealing with drivers.•
Update your software with a single click.Yasemin Gerboğa-152120171056/Eda Çam-152120171037 207
208
Where is GNU/Linux used?
•
GNU/Linux;It is used in automation systems, servers,digital sensors of cars,operating systems of televisions, the majority of mobile devices, defense industry, aircraft software, radars,ships,banks and so on.Yasemin Gerboğa-152120171056/Eda Çam-152120171037
Companies and Devices Running on GNU/Linux
209
Linux’s Commands
•
Pwd: If we want to know which file we're in, we write pwd.•
Ls:"Ls" command is used to know which files in the current directory.•
CD: " cd " is the command used to go to a directory.•
mkdir & rmdir: " mkdir "command is used when you create a folder or directory. " Rmdir" can be used to delete an empty directory.Yasemin Gerboğa-152120171056/Eda Çam-152120171037
Linux’s Commands
•
Man:The man command is used to learn more about and how to use a command.•
Nano: " nano " is the text editor currently installed on the Linux command line.•
gcc: GNU C compiler•
Whoami:Tells who you are.•
Sudo: " sudo " is a command commonly used in the Linux command line. Sudo comes from the word ”SuperUserDo Sud. We can use this command if we want to use root privileges in an operation or if an administrative structure is required.Yasemin Gerboğa-152120171056/Eda Çam-152120171037 211
212
•
1)Which of the following is not a Linux distribution?•
A)Ubuntu•
B)Mandriva•
C)Fedora•
D)Unix•
E) DebianYasemin Gerboğa-152120171056/Eda Çam-152120171037
2)What is the task of the mkdir command?
A) It is used to learn more about and how to use a command.
B) It is the text editor currently installed on the Linux command line.
C) It is used when you create a folder or directory.
213
RESOURCE
https://www.cloudeos.com/topluluk/hangi-isletim-sistemi-secmelisiniz https://linux.web.tr/blog/15/linux-dagitimi-secimi
https://xaphtrick.wordpress.com/2008/04/30/linux-uzerinde-gcc-kullanimi-c-kodlarini-derleme-ve- calistirma/
https://wiki.ubuntu-tr.net/index.php?title=Temel_Linux_komutları
https://aktif.net/tr/Aktif-Blog/Teknik-Makaleler/Yeni-Baslayanlar-icin-Basit-Linux-Komutlari https://fossbytes.com/windows-10-free-open-source-software-alternative/
https://www.pcgamer.com/the-best-free-pc-software/
https://www.gnu.org/philosophy/free-sw.tr.html
https://medium.com/türkiye/özgür-yazılım-ve-açık-kaynak-dünyası-1fe42df1591b https://www.profelis.com.tr/tr/blog/yazi/1808/linux-ve-windows-farki/
https://www.bilisimkonulari.com/windows-ile-linuxun-karsilastirilmasi.html https://www.technopat.net/sosyal/konu/linux-ve-windows-karsilastirilmasi.301904/
https://onedio.com/haber/ozgurluge-ve-ozgur-yazilima-destek-18-maddeyle-neden-windows-yerine- linux-kullanmaliyiz-717488
https://www.gnu.org/philosophy/categories.tr.html
https://bianet.org/bianet/kultur/13818-ozgur-yazilim-linux-windowsa-karsi https://www.pardus.org.tr
https://linux.org.tr/linux-nedir/
http://www.belgeler.org/lis/archive-tlkg-lis-1g.html
Yasemin Gerboğa-152120171056/Eda Çam-152120171037
Thanks for listening!
Eda Çam 152120171037
Yasemin Gerboğa 152120171056
215
216
217
A cryptocurrency is a digital or virtual currency that uses cryptography for security.
Cryptocurrencies are systems that allow for the secure payments of online transactions.
Cryptocurrencies are making it easier to transfer funds directly between two peers in a transaction, without the need for a trusted third party such as a bank or credit card company
219
220
❖Fast Transactions
❖Staying Anonymous While Transactions
❖No Third Party Expenses
❖Peer to Peer System
❖Blocks
❖Security Protoco
❖Mining and System Gifts
221
223
224
225
227
228