Published on March 9, 2014
I.C.T EFFECTS OF USING I.C.T ABUBAKAR MUSA 1
INTRODUCTION In this presentation I am going to talk about: Social Effects of ICT Health Effects of ICT Safety Issues with ICT Hacking Viruses Software Copyright Internet Developments Internet Use Issues ABUBAKAR MUSA 2
SOFTWARE COPYRIGHT Software is protected by copyright laws in much the same way as music CDs, film DVDs and articles from magazines and books are protected. It is not legal to make a software copy and then sell it or give to someone else. Software cannot be used on a network or used in multiple computers unless a licence has been acquired to allow this to happen. Renting out a software package without permission to do so is illegal. It is illegal to use the name of copyrighted software on other software without agreement to do so It is illegal to use coding from copyright software in your own software and then pass this software on or sell it as your own without permission of copyright holders. ABUBAKAR MUSA 3
VIRUSES A virus is a program that replicates (copies) itself and is design to cause harm to a system. • They can cause a computer to crash • The can cause system files to be lost which leads to computer malfunctioning. • They can corrupt the data in stored files. WHAT CAN YOU DO TO PREVENT VIRUSES • You can purchase up-to-date anti-virus software. • Do not download illegal software on your computer from an unknown source. • Only download software and files from the internet if the site is a reputable site. • Use firewalls on networks to protect against viruses. ABUBAKAR MUSA 4
HACKING This is the act of gaining access to a computer system or network without legal authorisation. Although some hackers do this as a form of intellectual challenge, many do it with the sole intention of causing harm (e.g. editing/deleting files, installing harmful software committing fraud). ABUBAKAR MUSA 5
EFFECTS OF I.C.T ON SOCIETY Now that companies now have access to cheap, reliable computing power, they have changed the way they are organised and the way they operate. This has changed... The impact on employment. The developmental of online shopping and banking. Policing of the Internet. The use of microprocessors in household appliances. Manufacturing Secretarial Work Accounting Clerks Newspaper Printing However it has increased employment of some people with special skill like: IT Technicians Computer Programmers Web Designers Help-Desk Staff ABUBAKAR MUSA 6
SAFETY ISSUES You wouldn't imagine that using computers could be dangerous, but there are a few situations that can result in accidents... Trailing Cables - Computer equipment is often connected to lots of cables: power, network, etc. If these cables are laying on the floor, they can cause people to trip over them. Drinks or Food - If any liquids are spilt on electrical equipment, such a s a computer, it can result in damage to the equipment, or an electric shock to the user. Overloaded Power Sockets - Plugging too many power cables into a socket can result in the socket being overloaded, overheating, and a fire starting. Heavy Objects Falling - Many items of computer equipment are very heavy: CRT monitors, laser printers, etc. Heavy items can cause serious injury if they fall on people. ABUBAKAR MUSA 7
IMPACT ON EMPLOYMENT The introduction of ICT has led to unemployment in many areas such as: Manufacturing, where robots have taken over many tasks. Computer-controlled warehouses, which are automatic and require no personnel to be present Labour-intensive work Companies have also gained from the introduction of I.C.T systems, e.g.: There is no need to employ as many people to do tasks, thus reducing labour cost. Robots do not take holidays, get sick or take coffee breaks, resulting to higher productivity. Whilst the quality is not necessarily better, there is greater consistency in the products made. ABUBAKAR MUSA 8
EFFECTS ON COMPANIES DUE TO ONLINE SHOPPING AND BANKING • • • • • Companies can now save of costs since fewer staff are required and they do not need as many shops and banks to deal with potential customers. Because the Internet is global, the potential customer base is increased. There will be some new costs, however, because of the need to retain staff and the need to employ more staff in despatch departments. They also costs due to setting up and maintaining websites to enable online shopping and banking . Since there is little or no customer-employee interaction, this could lead to a drop in customer loyalty, which could result in loss of customers. ABUBAKAR MUSA 9
HEALTH ISSUES • Health and safety regulations advise that all computer systems have a minimum of tillable and anti-glare screens, adjustable chairs and foot supports, suitable lighting, uncluttered work stations, and recommend frequent breaks and eye tests. HEALTH RISKS • • • • • Back and neck strain Damage to fingers and wrists Eyestrain Headaches Ozone irritation ABUBAKAR MUSA 10
INFORMATION FROM THE INTERNET There are four main aspects to consider about the Internet: Reliability of information Security issues Other Internet issues. ABUBAKAR MUSA 11
RELIABILTY OF INFORMATION Information is more likely to be up to date than books, since websites can be updated very quickly. It is much easier to get information from websites, as search engines quickly link key words together. There is a vast amount of information on the internet, which is easier to locate than using the indices in several books. However, information on the internet may be incorrect, inaccurate or even biased since it does not go through any checking process. There is a risk of information overload even if search engines are used properly. ABUBAKAR MUSA 12
SECURITY ISSUES 1. Phishing – This is a fraudulent operation involving the use of emails. The creators sends out a legitimate-looking email, hoping to gather personal and financial information from the recipient of the email. 2. Pharming – This is a scam in which malicious code is installed on a computer hard disk or a server. This code has the ability to misdirect users to fraudulent websites, usually without their knowledge or consent. 3. Spam – Is an electronic junk mail and is a type of advertising from a company sent out to a target mailing list. It is usually harmless, but it cam slow down networks or filling up a user’s mail box. 4. Spyware – Is a software that gathers user information through their network connections without them being aware that this is happening. Spyware monitors all key presses and transmits the info back to the spyware sender. ABUBAKAR MUSA 13
COOKIES Cookies are small files sent to user's computer via their web browser, when they visit certain websites. They store information about the users and this data is accessed each time they visit the website. They remember who the user is and send messages such as ‘Welcome Richard’ each time they log on the website. They recognise a user’s buying preferences: e.g. if the user bought a game console, pop ups related to their buying habits will appear on the user's screen. Without cookies , the web server would have no way of knowing that the user had visited the website before. ABUBAKAR MUSA 14
INTERNET DEVELOPMENT Blogs are person internet journals where the writer will type in their observations on some topic or even provide links to certain relevant websites. Wikis are software allowing users to easily create and edit web pages using any web browser. A wiki will support hyperlinks and has very simple syntax (language rules) for creating pages. Digital media sharing websites allow users to upload clips and other media internet website. Social networking sites focus on building online communities of users who share the same interests and activities. They enable young people, in particular to share photos of themselves, show people their favourite videos and music. Folksonomies are closely related to tagging and literally mean ‘Management of people’. Tagging is a type of social bookmarking where a user can tag any web page with words that describe its contents. ABUBAKAR MUSA 15
CREDITS • • • • • • • • E D I T O R : A B U B A K A R MU S A A N I MA T O R : A B U B A K A R MU S A P R O D U C E R : A B U B A K A R MU S A D I R E C T O R : A B U B A K A R MU S A E D I T O R : A B U B A K A R MU S A A NY HE L P F ROM A NY ONE ? : NO P L A GA R I S M: Y E S RE F E RE NCE S : I GCS E I N F O R MA T O N C O MMU N I C A T I O N T E C H N O L O G Y , B Y G R A H A M B R O WN A N D D A V I D WA T S O N A N D H T T P ://WWW .I G C S E I C T .I N F O / ABUBAKAR MUSA 16
THANK YOU ABUBAKAR MUSA 17
Notes White Hat Black Hat Grey Hat Effects of using I.C.T. What is a Virus? Viruses are software programs that are made to transmit from one computer to ...
Describe the effects of information and communication technology on patterns of employment, including areas of work where there is increased unemployment
The effects of using I.C.T By: Enrique Sampayo 11c 5 ways to protect against hacking and viruses Trojan horse Memory resident viruses what is a virus ?
The Effects of ICT on Society : ... The Effects of Using ICT. Section 7: The Ways in which ICT is used. Section 7: Part 2. Section 8: Systems Analysis and ...
Effects of ICT: Do we know what we ... between various types of ICT implementation and the effects of other factors such as ... using portable ...
2. INTRODUCTION In this presentation I am going to talk about:Social Effects of ICT Health Effects of ICT Safety Issues with ICT ...
ICT tools are needed in everyday life but over use of them may have negative effect on the user and the economy as a whole. These effects are ...
eStudent - ICT Notes for JHS: HEALTH AND SAFETY USING ICT ...
dict.cc: Wörterbuch für Englisch-Deutsch und andere Sprachen dict.cc möchte es seinen Benutzern ermöglichen, ihr Wissen mit anderen zu teilen.