Emerging trends in technology are shaping the future of web applications, making them faster, smarter, and more user-friendly. In Class 12 Web Application Emerging Trends Notes, we explore the latest advancements like cloud computing, artificial intelligence, IoT etc.
Class 12 Web Application Emerging Trends Notes
Internet of Things (IoT)
There are a lot of devices which we use every day, like home appliances, smartwatches or even cars. These devices are connected to the internet, sensors, and the network. The device which has built-in electronics, software, sensors and network access is known as IoT. These devices can share data without human intervention.
Definition: The Internet of Things (IoT) refers to the network of physical objects that are connected to the internet using software, sensors and other technologies.
Role of Cloud Computing in IoT.
Cloud computing makes IoT more powerful by providing storage, offering services to analyse the data and making it easy to access these services from anywhere using the internet.
Growth of Internet of Things (IoT)
The IoT is growing rapidly. Nowadays you will find a lot of devices where this IoT is used, like home appliances, smart TVs, smart watches, Amazon Echo, Tesla Car Model 3, GPS pet trackers, and Arlo Wi-Fi security cameras, which are connected to the internet. This device collects a huge amount of data every day.
History of IoT devices
- 1982- Vending machine
- 1990-Toaster
- 1999-IOT (Kevin Ashton)
- 2000-LG Smart Fridge
- 2004-Smart Watch
- 2007-Smart iPhone
- 2009-Car Testing
- 2011-Smart TV
- 2013-Google Lens
- 2014-Amazon Echo
- 2015-Tesla autopilot
Advantages of IoT
- Improved efficiency and automation of tasks.
- Increased convenience and accessibility of information.
- Greater ability to gather and analyze data.
- Improved decision-making.
- Cost savings.
Disadvantages of IoT
- Security concerns and potential for hacking or data breaches.
- Privacy issues related to the collection and use of personal data.
- Dependence on technology and potential for system failures.
- Limited battery life on some devices.
- Concerns about job displacement due to automation.
Some of the examples of IoT devices:
- Autonomous Vehicles
- Fingerprint Time Clocks
- Glucose Monitors
- Smart Glasses
- Smart Lighting
- Smart Locks
- Smartphones
- Smart Refrigerators
- Robots
- Smart Speakers
- Smart TVs
- Wearables
Industrial Internet of Things (IIoT)
When the IoT is used in industries, factories, manufacturing plants or any other industrial settings, it is known as IIoT. It helps to connect machines, sensors and software to the internet so they can collect the data.
The perpos of IIoT in Industrieal are
- Smart Sensors: To track performance, temperature, pressure, etc.
- Real-time Monitoring: To monitor the machines.
- Data Analytics: Collect data for improving production and reducing waste.
- Automation: The machine can work based on data, which will reduce human effort.
Benefits of IIoT:
- Better product quality
- Lower production costs
- Faster decision-making
- Safer working conditions
- Efficient logistics and inventory management
Difference between IoT and IIoT:
IoT | IIoT |
---|---|
Focused on consumer applications like smart homes, cars, refrigerators | Focused on industrial sectors like manufacturing, energy and logistics. |
Enhance convenience, automation and lifestyle. | Improve productivity, safety, etc. |
Some applications of IIoT:
- Smart Manufacturing and Factory
- Energy and Utilities
- Transportation and Logistics
- Healthcare
Types of Operating Systems
An operating system (OS) is important software that acts between a user and a computer system. It is software which performs all the basic tasks like file management, memory management, process management, handling input and output, and controlling peripheral devices such as disc drives and printers.
Definition: An Operating System (OS) is an interface between a user and a computer system.
Examples of Operating Systems
- Windows (GUI-based, PC)
- GNU/Linux (Personal, Workstations)
- MacOS (Macintosh), used for Apple’s personal computers and workstations (MacBook, iMac).
- Android (Google’s Operating System for smartphones/tablets/smartwatches)
- iOS (Apple’s OS for iPhone, iPad, and iPod Touch)
Important functions of an Operating System
1. Memory Management
Memory management is an important function of the operating system which handles the computer’s primary memory (RAM) and ensures that the memory utilisation is used in an efficient manner. Memory management helps to allocate or deallocate files, track which part of memory is in use and protect from accessing another process’s memory.
2. Process Management
Every software that runs on a computer is a process. The process management role is to handle the process and its execution. It ensures that the CPU utilises the process and execution efficiently. Process management helps to run a program and control the process, deciding which process uses the CPU and for how long, which is known as CPU scheduling, and running multiple processes at once, which is known as multitasking.
3. Device Management
The operating system manages input/output devices such as printers, keyboards, mice, and displays. It provides the necessary drivers and interfaces to enable communication between the devices and the computer.
4. File Management
The operating system is responsible for organising and managing the file system, including the creation, deletion, and manipulation of files and directories.
5. Netwrok Management
Network management is also an important function of operating systems; network management helps to connect computers and share resources over a network. It helps the devices to communicate and work together efficiently.
6. Backup and Recovery
The operating system provides mechanisms for backing up data and recovering it in case of system failures or errors.
Advantages of Operating System
- User-Friendliness: Operating systems provide simple and friendly interfaces for users to interact with the computer.
- Resource Sharing: The operating system can share hardware resources like printers, speakers and memory.
- Data Protection: Theoperating system protects user data from unauthorised access.
- Multitasking: The operating system allows multiple programs to run at the same time.
Types of Operating Systems
1. Real-Time Operating System (RTOS)
This type of operating system is designed to respond within a fixed time limit; it is used in critical systems where delays can cause failure. For example, air traffic control systems, autonomous vehicles, industrial process control, etc.
2. Single-User Operating System
This operating system supports only one user at a time and is commonly used in personal computers. Examples of single-user operating systems are Microsoft Windows and Apple macOS.
3. Multiuser oerating System
A multi-user operating system allows multiple users to access the system simultaneously and is basically used in a server or in a large network system. For example, Linux and Unix.
4. Mobile Operating Syste
This operating system is basically designed for smartphones and tablets, which are low-power devices. For example, Android OS, iOS, Symbian OS, Blackberry OS and Windows Mobile OS.
Difference between Application Software and System Software:
System Software | Application Software |
---|---|
This acts as an interface between the system and the applications | This is designed directly from the user perspective |
These are responsible for the working of the system. | They have minimum involvement in the processing and functioning of the computer device |
It is the platform that allows the various application software to run on the system | These are independent applications which can be download and installed in the system |
The system software is installed at the time of installing the operating system. A computer device cannot work without its presence. | The application software can be installed as and when the user requires them |
Examples for System Software include Android, Mac Operating system, MS Windows, etc. | Examples of Application Software include Word Processor, games, media player, etc. |
Cloud Computing and Edge Computing
1. Cloud Computing
Cloud computing refers to online computer-based services like storage, servers, software and databases over the Internet. In cloud computing users do not need to manage or use local computers, and physical hardware is used. The term “cloud computing” was introduced in 2006 by Google CEO Eric Schmidt. Examples of cloud services are Google Drive, Microsoft Azure, Amazon Web Services and Dropbox.
Definition: Cloud computing is services provided over the Internet or the cloud in terms of servers, storage, databases, networking, software, analytics, intelligence and much more.
Cloud Smart Storage Providers
- Google Drive: Google Drive was launched on 24 April 2012 by Google; it can store, sync and share files across different devices.
- Dropbox: Dropbox was launched in 2007 by two MIT students; it can store files, and you can access the files from anywhere, sync, share and collaborate easily.
- OneDrive: OneDrive was launched in August 2007 by Microsoft. It can store files, sync across smartphones and laptops, and direct you to upload Microsoft Office documents.
- iCloud: iCloud was launched on 12 October 2012 by Apple Inc. It can store documents, photos, and music on remote servers, and it can sync with iOS, macOS, and Windows devices. Helps to manage Apple devices if lost or stolen.
Benefits of Cloud Computing
- Faster time to market: Cloud helps to build and test new apps quickly; there is no need to wait for hardware or setup.
- Scalability and flexibility: In this context, ‘flexible’ means wheneveryou require more storage or speed, you can customise and have no need to buy expensive machines.
- Cost savings: You can pay only that much money for what you use.
- Better collaboration: Cloud files are online, so you can access them from anywhere at any time.
- Advanced security: Cloud companies used advanced tools to keep your data safe.
Limitations of cloud computing
- Internet Connectivity: You need a stable internet connection to access your file.
- Vendor lock-in: If you want to switch from one cloud to another cloud, then it can be tricky.
- Security: Cloud companies use strong security protection of the data, but if their security fails, then hackers might steal sensitive information.
2. Edge Computing
Edge computing means processing data close to where it is created, like your smartwatch, a traffic camera or a drone. They do not send data to the cloud server; instead, they handle it right there in real time. The edge computing process is very fast, but cloud computing is good for large data sets.
Definition: Edge computing is the practice of capturing, storing, processing and analysing data near the client, where the data is generated, instead of in a centralised data-processing warehouse.
Artificial Intelligence (AI) and Machine Learning (ML)
1. Artificial Intelligence
Artificial intelligence is a machine which shows intelligence like learning, thinking or solving problems similar to how humans do. AI is different from human intelligence. Human intelligence includes emotions, creativity and consciousness, but AI doesn’t have them. AI can learn from data, solve the problem, make the decisions, understand speech, recognise the images, etc.
Some common applications of Artificial Intelligence are
- Google Maps
- Facial Detection and Recognition
- Autocorrection and text editors
- Recommendations based on search
2. Machine Learning
Machine learning is a type of artificial intelligence where computers learn from data to make decisions or predictions without being directly programmed for every task. Machine learning models can analyse bigger, more complex data and deliver faster, more accurate results – even on a very large scale.
Some Applications of Machine Learning:
- Self-driving cars,
- Practical speech recognition
- Effective web search
- Deep understanding of the human genome
The 7 basic steps in Machine Learning are:

- Step 1: Data Collection
- Step 2: Data Preparation
- Step 3: Choose a Model
- Step 4: Train a Model
- Step 5: Evaluate the Model
- Step 6: Parameter Tuning
- Step 7: Make Predictions
Difference between Artificial Intelligence and Machine Learning
Artificial Intelligence | Machine Learning |
---|---|
This technology enables a machine to simulate human behavior. | This is a branch of AI which allows a machine to automatically learn from past data without programming explicitly. |
AI is used to make a smart computer system like humans to solve complex problems. | ML helps machines to learn from data so that they can give accurate output. |
Creating an intelligent system that can perform various complex tasks is the goal | Creating machines that can perform only those specific tasks for which they are trained is the goal. |
Maximizing the chances of success is the focus | Accuracy and patterns are the focus |
Siri, customer support using chatbots, Online game playing, expert systems and intelligent humanoid robot are some applications of AI | Google search algorithms, online recommender system, Facebook tagging suggestions, etc. are some applications of ML |
Categories of AI -> Weak -> General -> Strong | Categories of learning in ML -> Supervised learning -> Unsupervised learning -> Reinforcement learning |
Reasoning, self-correction and learning | Self-correction and learning when introduced with new data. |
Deals with unstructured, semi-structured, and structured data. | Deals with semi-structured and structured data. |
Digital Marketing and its Career Opportunities
Digital marketing means using the digital channels to market products. It is also known as online marketing, and it promotes brands and connects them to potential customers via the internet. Digital marketing can be done in various forms, such as search engines, websites, social media, email, mobile apps, text messaging, web-based advertising, etc.
The benefits of digital marketing
- Helps to reach a larger customer: you can connect with customers on every side of the world.
- You can create social media accounts for free for promoting the product, but traditional marketing channels like TV, radio and print media have higher costs than digital channels.
- You can track how many people see your ads, click your links or buy your products.
- You can interact with customers at every step of their buying journey.
Some of the Career Opportunities that can be pursued in digital marketing are:
- Digital marketing intern
- Photographer
- Social media specialist
- Graphic Designer
- Copywriter
- Search Engine Optimization Specialist (SEO Specialist)
- Marketing Analyst
- Ecommerce Manager
Social Media Etiquettes
Social media ‘Etiquette’ means how you treat others on the internet; it is about being respectful, responsible, and thoughtful when posting, sharing, or commenting on the internet. Good social media etiquette takes care of intellectual property rights; they always treat others with respect, and they do not share another person’s information, image or videos without consent.
- Protect your Privacy: Never share your personal information online. It includes your password, phone number, home address and email address.
- Do Not Connect with Strangers: Never connect with people you do not know in real life. You should accept requests only from people whom you know.
- Respect People’s Privacy: Respect other people’s privacy the same way you would like them to handle your personal information. Ask for their permission before you share their photos or videos.
- Be Careful of What you Share About Yourself: Never share personal or confidential information online.
- Avoid Cyberbullying: Sometimes posts become harsher than face-to-face communication. Harassing or teasing others on social media is known as cyberbullying. Avoid cyberbullying as there are strict cyber laws against it.
- Avoid Spamming: Do not send repeated texts to your friends several times. Allow them some time to respond.
- To Post or Not to Post: Think carefully about your words and pictures before you share anything on social media. If you see there is something offensive or is considered inappropriate or rude, do not share it at all.
Spread of Rumors on Social Media
Social networking sites, or social media, are platforms open to all, and there is no regulation or self-checking mechanism there. In recent times, some people use social media to push political or social divisions; false news can create tension between communities. So, it is the responsibility of everyone to think before sharing, report harmful content and promote digital literacy.
Disclaimer: We have taken an effort to provide you with the accurate handout of “Class 12 Web Application Emerging Trends Notes “. If you feel that there is any error or mistake, please contact me at anuraganand2017@gmail.com. The above CBSE study material present on our websites is for education purpose, not our copyrights. All the above content and Screenshot are taken from Web Application Class 12 Subject Code 803 CBSE Textbook, Sample Paper, Old Sample Paper, Board Paper and Support Material which is present in CBSEACADEMIC website, This Textbook and Support Material are legally copyright by Central Board of Secondary Education. We are only providing a medium and helping the students to improve the performances in the examination.
Images and content shown above are the property of individual organizations and are used here for reference purposes only.
For more information, refer to the official CBSE textbooks available at cbseacademic.nic.in