SlideShare a Scribd company logo
 5G Network
 Augmented Reality& VirtualReality
Non-VolatileMemory
 Data Science
5th generation mobile networks or 5th generation wireless systems,
abbreviated 5G, are the proposed next telecommunications standards
beyond the current 4G/IMT-Advanced standards.
5G planning aims at higher capacity than current 4G, allowing a higher
density of mobile broadband users, and supporting device-to-device,
more reliable, and massive machine communications. 5G research and
development also aims at lower latency than 4G equipment and lower
battery consumption, for better implementation of the Internet of
things. There is currently no standard for 5G deployments.
5G Logo
Augmented reality (AR) is a live direct or indirect view of a physical,
real-world environment whose elements are "augmented" by computer-
generated or extracted real-world sensory input such
as sound, video, graphics, hap tics or GPS data.
Virtual reality (VR) is a computer technology that uses virtual reality
headsets or multi-projected environments, sometimes in combination with
physical environments or props, to generate realistic images, sounds and
other sensations that simulate a user's physical presence in a virtual or
imaginary environment.
Augmented Reality and Virtual
Reality
Non-volatile memory
Non-volatile memory, nonvolatile memory, NVM or non-volatile
storage is a type of computer memory that can retrieve stored
information even after having been power cycled (turned off and
back on). The opposite of non-volatile memory is volatile memory
which needs constant power in order to prevent data from being
erased. Examples of non-volatile memory include read-only
memory, flash punch memory, ferroelectric RAM, most types of
magnetic computer storage devices (e.g. hard disk drives, solid
state drives, floppy disks, and magnetic tape), optical discs, and
early computer storage methods such as paper tape and punched
cards.
Data science, also known as data-driven science, is an
interdisciplinary field about scientific methods, processes, and
systems to extract knowledge or insights from data in various forms,
either structured or unstructured, similar to data mining.
Data science is a "concept to unify statistics, data analysis and their
related methods" in order to "understand and analyze actual
phenomena" with data. It employs techniques and theories drawn
from many fields within the broad areas
of mathematics, statistics, information science, and computer
science, in particular from the subdomains of machine
learning, classification, cluster analysis, data mining, databases,
and visualization.
Advanced technology of computers
Advanced technology of computers

More Related Content

What's hot

PERICLES workshop (London 15 October 2015) - Semantic Web & Ontologies
PERICLES workshop (London 15 October 2015) - Semantic Web & OntologiesPERICLES workshop (London 15 October 2015) - Semantic Web & Ontologies
PERICLES workshop (London 15 October 2015) - Semantic Web & Ontologies
PERICLES_FP7
 
A Knowledge-based Approach for Real-Time IoT Stream Annotation and Processing
A Knowledge-based Approach for Real-Time IoT Stream Annotation and ProcessingA Knowledge-based Approach for Real-Time IoT Stream Annotation and Processing
A Knowledge-based Approach for Real-Time IoT Stream Annotation and Processing
PayamBarnaghi
 
Callforpapersinternationaljournalofcomputerijc volume11issue1-april2013
Callforpapersinternationaljournalofcomputerijc volume11issue1-april2013Callforpapersinternationaljournalofcomputerijc volume11issue1-april2013
Callforpapersinternationaljournalofcomputerijc volume11issue1-april2013Mohammad Nassar
 
Strategic Decision Support Systems Design: Integration Approach Between Exper...
Strategic Decision Support Systems Design: Integration Approach Between Exper...Strategic Decision Support Systems Design: Integration Approach Between Exper...
Strategic Decision Support Systems Design: Integration Approach Between Exper...Ghomari Réda
 
How to make data more usable on the Internet of Things
How to make data more usable on the Internet of ThingsHow to make data more usable on the Internet of Things
How to make data more usable on the Internet of ThingsPayamBarnaghi
 

What's hot (7)

PERICLES workshop (London 15 October 2015) - Semantic Web & Ontologies
PERICLES workshop (London 15 October 2015) - Semantic Web & OntologiesPERICLES workshop (London 15 October 2015) - Semantic Web & Ontologies
PERICLES workshop (London 15 October 2015) - Semantic Web & Ontologies
 
A Knowledge-based Approach for Real-Time IoT Stream Annotation and Processing
A Knowledge-based Approach for Real-Time IoT Stream Annotation and ProcessingA Knowledge-based Approach for Real-Time IoT Stream Annotation and Processing
A Knowledge-based Approach for Real-Time IoT Stream Annotation and Processing
 
Callforpapersinternationaljournalofcomputerijc volume11issue1-april2013
Callforpapersinternationaljournalofcomputerijc volume11issue1-april2013Callforpapersinternationaljournalofcomputerijc volume11issue1-april2013
Callforpapersinternationaljournalofcomputerijc volume11issue1-april2013
 
Strategic Decision Support Systems Design: Integration Approach Between Exper...
Strategic Decision Support Systems Design: Integration Approach Between Exper...Strategic Decision Support Systems Design: Integration Approach Between Exper...
Strategic Decision Support Systems Design: Integration Approach Between Exper...
 
Hawaii Pacific GIS Conference 2012: Natural Resource Management - Coupling Cy...
Hawaii Pacific GIS Conference 2012: Natural Resource Management - Coupling Cy...Hawaii Pacific GIS Conference 2012: Natural Resource Management - Coupling Cy...
Hawaii Pacific GIS Conference 2012: Natural Resource Management - Coupling Cy...
 
How to make data more usable on the Internet of Things
How to make data more usable on the Internet of ThingsHow to make data more usable on the Internet of Things
How to make data more usable on the Internet of Things
 
Research Paper
Research PaperResearch Paper
Research Paper
 

Similar to Advanced technology of computers

The technologies of ai used in different corporate world
The technologies of ai used in different  corporate worldThe technologies of ai used in different  corporate world
The technologies of ai used in different corporate world
Er. rahul abhishek
 
The Computer
The ComputerThe Computer
The Computer
ANGELASERNA26
 
Raspberry Pi Augmentation: A Cost Effective Solution To Google Glass
Raspberry Pi Augmentation: A Cost Effective Solution To Google GlassRaspberry Pi Augmentation: A Cost Effective Solution To Google Glass
Raspberry Pi Augmentation: A Cost Effective Solution To Google Glass
IRJET Journal
 
From the Internet of Computers to the Internet of Things
From the Internet of Computers to the Internet of ThingsFrom the Internet of Computers to the Internet of Things
From the Internet of Computers to the Internet of ThingsThe Marketing Distillery
 
Latest advancement in computer
Latest advancement in computerLatest advancement in computer
Latest advancement in computer
Vivek Kumar
 
Internet of Things (IoT)
Internet of Things (IoT)Internet of Things (IoT)
Internet of Things (IoT)
Akanksha Prasad
 
Internet of Things: The story so far
Internet of Things: The story so farInternet of Things: The story so far
Internet of Things: The story so farPayamBarnaghi
 
Internet of Things: The story so far
Internet of Things: The story so farInternet of Things: The story so far
Internet of Things: The story so farCityPulse Project
 
Emerging Technologies
Emerging TechnologiesEmerging Technologies
Emerging Technologies
Naveed Ahmed Siddiqui
 
IoT implementation and Challenges
IoT implementation and ChallengesIoT implementation and Challenges
IoT implementation and Challenges
Ahmed Banafa
 
Emerging Technologies 3.0.pdf
Emerging Technologies 3.0.pdfEmerging Technologies 3.0.pdf
Emerging Technologies 3.0.pdf
Dr. Naveed Siddiqui
 
Emerging Technologies 33.0.pdf
Emerging Technologies 33.0.pdfEmerging Technologies 33.0.pdf
Emerging Technologies 33.0.pdf
Naveed Ahmed Siddiqui
 
About computer, uses, charateristics.pptx
About computer, uses, charateristics.pptxAbout computer, uses, charateristics.pptx
About computer, uses, charateristics.pptx
Doon Business School
 
Iot architecture
Iot architectureIot architecture
Iot architecture
Anam Iqbal
 
iotarchitecture-190506052723.pdf
iotarchitecture-190506052723.pdfiotarchitecture-190506052723.pdf
iotarchitecture-190506052723.pdf
rinabiswas456788oooo
 
AGI Part 4.pdf
AGI Part 4.pdfAGI Part 4.pdf
AGI Part 4.pdf
Bob Marcus
 
6G.ppt
6G.ppt6G.ppt
Information Engineering in the Age of the Internet of Things
Information Engineering in the Age of the Internet of Things Information Engineering in the Age of the Internet of Things
Information Engineering in the Age of the Internet of Things
PayamBarnaghi
 
Internet Of Things (IOT)
Internet Of Things (IOT)Internet Of Things (IOT)
Internet Of Things (IOT)
Mindfire Solutions
 

Similar to Advanced technology of computers (20)

The technologies of ai used in different corporate world
The technologies of ai used in different  corporate worldThe technologies of ai used in different  corporate world
The technologies of ai used in different corporate world
 
The Computer
The ComputerThe Computer
The Computer
 
IOTCYBER
IOTCYBERIOTCYBER
IOTCYBER
 
Raspberry Pi Augmentation: A Cost Effective Solution To Google Glass
Raspberry Pi Augmentation: A Cost Effective Solution To Google GlassRaspberry Pi Augmentation: A Cost Effective Solution To Google Glass
Raspberry Pi Augmentation: A Cost Effective Solution To Google Glass
 
From the Internet of Computers to the Internet of Things
From the Internet of Computers to the Internet of ThingsFrom the Internet of Computers to the Internet of Things
From the Internet of Computers to the Internet of Things
 
Latest advancement in computer
Latest advancement in computerLatest advancement in computer
Latest advancement in computer
 
Internet of Things (IoT)
Internet of Things (IoT)Internet of Things (IoT)
Internet of Things (IoT)
 
Internet of Things: The story so far
Internet of Things: The story so farInternet of Things: The story so far
Internet of Things: The story so far
 
Internet of Things: The story so far
Internet of Things: The story so farInternet of Things: The story so far
Internet of Things: The story so far
 
Emerging Technologies
Emerging TechnologiesEmerging Technologies
Emerging Technologies
 
IoT implementation and Challenges
IoT implementation and ChallengesIoT implementation and Challenges
IoT implementation and Challenges
 
Emerging Technologies 3.0.pdf
Emerging Technologies 3.0.pdfEmerging Technologies 3.0.pdf
Emerging Technologies 3.0.pdf
 
Emerging Technologies 33.0.pdf
Emerging Technologies 33.0.pdfEmerging Technologies 33.0.pdf
Emerging Technologies 33.0.pdf
 
About computer, uses, charateristics.pptx
About computer, uses, charateristics.pptxAbout computer, uses, charateristics.pptx
About computer, uses, charateristics.pptx
 
Iot architecture
Iot architectureIot architecture
Iot architecture
 
iotarchitecture-190506052723.pdf
iotarchitecture-190506052723.pdfiotarchitecture-190506052723.pdf
iotarchitecture-190506052723.pdf
 
AGI Part 4.pdf
AGI Part 4.pdfAGI Part 4.pdf
AGI Part 4.pdf
 
6G.ppt
6G.ppt6G.ppt
6G.ppt
 
Information Engineering in the Age of the Internet of Things
Information Engineering in the Age of the Internet of Things Information Engineering in the Age of the Internet of Things
Information Engineering in the Age of the Internet of Things
 
Internet Of Things (IOT)
Internet Of Things (IOT)Internet Of Things (IOT)
Internet Of Things (IOT)
 

More from Varun Bhandari

Globalization
GlobalizationGlobalization
Globalization
Varun Bhandari
 
The Indian Automotive Industry - Evolving Dynamics
The Indian Automotive Industry - Evolving DynamicsThe Indian Automotive Industry - Evolving Dynamics
The Indian Automotive Industry - Evolving Dynamics
Varun Bhandari
 
The Second World War
The Second World WarThe Second World War
The Second World War
Varun Bhandari
 
Popular Softwares
Popular SoftwaresPopular Softwares
Popular Softwares
Varun Bhandari
 
Education and economic growth
Education and economic growthEducation and economic growth
Education and economic growth
Varun Bhandari
 
Our environment
Our environmentOur environment
Our environment
Varun Bhandari
 
Social Networking Sites
Social Networking SitesSocial Networking Sites
Social Networking Sites
Varun Bhandari
 
Gst
GstGst

More from Varun Bhandari (8)

Globalization
GlobalizationGlobalization
Globalization
 
The Indian Automotive Industry - Evolving Dynamics
The Indian Automotive Industry - Evolving DynamicsThe Indian Automotive Industry - Evolving Dynamics
The Indian Automotive Industry - Evolving Dynamics
 
The Second World War
The Second World WarThe Second World War
The Second World War
 
Popular Softwares
Popular SoftwaresPopular Softwares
Popular Softwares
 
Education and economic growth
Education and economic growthEducation and economic growth
Education and economic growth
 
Our environment
Our environmentOur environment
Our environment
 
Social Networking Sites
Social Networking SitesSocial Networking Sites
Social Networking Sites
 
Gst
GstGst
Gst
 

Recently uploaded

To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 

Recently uploaded (20)

To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 

Advanced technology of computers

  • 1.
  • 2.  5G Network  Augmented Reality& VirtualReality Non-VolatileMemory  Data Science
  • 3. 5th generation mobile networks or 5th generation wireless systems, abbreviated 5G, are the proposed next telecommunications standards beyond the current 4G/IMT-Advanced standards. 5G planning aims at higher capacity than current 4G, allowing a higher density of mobile broadband users, and supporting device-to-device, more reliable, and massive machine communications. 5G research and development also aims at lower latency than 4G equipment and lower battery consumption, for better implementation of the Internet of things. There is currently no standard for 5G deployments.
  • 5. Augmented reality (AR) is a live direct or indirect view of a physical, real-world environment whose elements are "augmented" by computer- generated or extracted real-world sensory input such as sound, video, graphics, hap tics or GPS data. Virtual reality (VR) is a computer technology that uses virtual reality headsets or multi-projected environments, sometimes in combination with physical environments or props, to generate realistic images, sounds and other sensations that simulate a user's physical presence in a virtual or imaginary environment. Augmented Reality and Virtual Reality
  • 6.
  • 7. Non-volatile memory Non-volatile memory, nonvolatile memory, NVM or non-volatile storage is a type of computer memory that can retrieve stored information even after having been power cycled (turned off and back on). The opposite of non-volatile memory is volatile memory which needs constant power in order to prevent data from being erased. Examples of non-volatile memory include read-only memory, flash punch memory, ferroelectric RAM, most types of magnetic computer storage devices (e.g. hard disk drives, solid state drives, floppy disks, and magnetic tape), optical discs, and early computer storage methods such as paper tape and punched cards.
  • 8. Data science, also known as data-driven science, is an interdisciplinary field about scientific methods, processes, and systems to extract knowledge or insights from data in various forms, either structured or unstructured, similar to data mining. Data science is a "concept to unify statistics, data analysis and their related methods" in order to "understand and analyze actual phenomena" with data. It employs techniques and theories drawn from many fields within the broad areas of mathematics, statistics, information science, and computer science, in particular from the subdomains of machine learning, classification, cluster analysis, data mining, databases, and visualization.