SlideShare a Scribd company logo
1 of 17
I.C.T

EFFECTS OF USING I.C.T

ABUBAKAR MUSA

1
INTRODUCTION
In this presentation I am going to talk about:

Social Effects of ICT
Health Effects of ICT
Safety Issues with ICT
Hacking
Viruses
Software Copyright
Internet Developments
Internet Use Issues
ABUBAKAR MUSA

2
SOFTWARE COPYRIGHT
Software is protected by copyright laws in much the same way as music
CDs, film DVDs and articles from magazines and books are protected.
 It is not legal to make a software copy and then sell it or give to
someone else.
 Software cannot be used on a network or used in multiple computers
unless a licence has been acquired to allow this to happen.
 Renting out a software package without permission to do so is illegal.
 It is illegal to use the name of copyrighted software on other software
without agreement to do so
 It is illegal to use coding from copyright software in your own software
and then pass this software on or sell it as your own without permission
of copyright holders.

ABUBAKAR MUSA

3
VIRUSES
A virus is a program that replicates (copies) itself and is design to
cause harm to a system.
• They can cause a computer to crash
• The can cause system files to be lost which leads to computer
malfunctioning.
• They can corrupt the data in stored files.
WHAT CAN YOU DO TO PREVENT VIRUSES
• You can purchase up-to-date anti-virus software.
• Do not download illegal software on your computer from an
unknown source.
• Only download software and files from the internet if the site is
a reputable site.
• Use firewalls on networks to protect against viruses.

ABUBAKAR MUSA

4
HACKING
This is the act of gaining access to a computer system or network without
legal authorisation. Although some hackers do this as a form of intellectual
challenge, many do it with the sole intention of causing harm (e.g.
editing/deleting files, installing harmful software committing fraud).

ABUBAKAR MUSA

5
EFFECTS OF I.C.T ON SOCIETY
Now that companies now have access to cheap, reliable computing
power, they have changed the way they are organised and the way they
operate. This has changed...
 The impact on employment.
 The developmental of online shopping and banking.
 Policing of the Internet.
 The use of microprocessors in household appliances.
 Manufacturing
 Secretarial Work
 Accounting Clerks
 Newspaper Printing
However it has increased employment of some people with special skill like:
 IT Technicians
 Computer Programmers
 Web Designers
 Help-Desk Staff
ABUBAKAR MUSA

6
SAFETY ISSUES
You wouldn't imagine that using computers could be dangerous, but there
are a few situations that can result in accidents...
 Trailing Cables - Computer equipment is often connected to lots of
cables: power, network, etc. If these cables are laying on the floor,
they can cause people to trip over them.
 Drinks or Food - If any liquids are spilt on electrical equipment, such a s
a computer, it can result in damage to the equipment, or an electric
shock to the user.
 Overloaded Power Sockets - Plugging too many power cables into a
socket can result in the socket being overloaded, overheating, and a
fire starting.
 Heavy Objects Falling - Many items of computer equipment are very
heavy: CRT monitors, laser printers, etc. Heavy items can cause serious
injury if they fall on people.

ABUBAKAR MUSA

7
IMPACT ON EMPLOYMENT
The introduction of ICT has led to unemployment in many areas such as:
 Manufacturing, where robots have taken over many tasks.
 Computer-controlled warehouses, which are automatic and require no
personnel to be present
 Labour-intensive work
Companies have also gained from the introduction of I.C.T systems, e.g.:
 There is no need to employ as many people to do tasks, thus reducing
labour cost.
 Robots do not take holidays, get sick or take coffee breaks, resulting
to higher productivity.
 Whilst the quality is not necessarily better, there is greater
consistency in the products made.

ABUBAKAR MUSA

8
EFFECTS ON COMPANIES DUE TO
ONLINE SHOPPING AND BANKING
•

•
•

•
•

Companies can now save of costs since fewer staff are required and
they do not need as many shops and banks to deal with potential
customers.
Because the Internet is global, the potential customer base is
increased.
There will be some new costs, however, because of the need to retain
staff and the need to employ more staff in despatch departments.
They also costs due to setting up and maintaining websites to enable
online shopping and banking .
Since there is little or no customer-employee interaction, this could
lead to a drop in customer loyalty, which could result in loss of
customers.

ABUBAKAR MUSA

9
HEALTH ISSUES
•

Health and safety regulations advise that all computer systems have a
minimum of tillable and anti-glare screens, adjustable chairs and foot
supports, suitable lighting, uncluttered work stations, and recommend
frequent breaks and eye tests.
HEALTH RISKS

•
•
•
•
•

Back and neck strain
Damage to fingers and wrists
Eyestrain
Headaches
Ozone irritation

ABUBAKAR MUSA

10
INFORMATION FROM THE
INTERNET
There are four main aspects to consider about the Internet:

Reliability of information
Security issues
Other Internet issues.

ABUBAKAR MUSA

11
RELIABILTY OF INFORMATION
 Information is more likely to be up to date than books, since websites
can be updated very quickly.
 It is much easier to get information from websites, as search engines
quickly link key words together.
 There is a vast amount of information on the internet, which is easier
to locate than using the indices in several books.
 However, information on the internet may be incorrect, inaccurate or
even biased since it does not go through any checking process.
 There is a risk of information overload even if search engines are used
properly.

ABUBAKAR MUSA

12
SECURITY ISSUES
1. Phishing – This is a fraudulent operation involving the use of emails. The
creators sends out a legitimate-looking email, hoping to gather personal
and financial information from the recipient of the email.
2. Pharming – This is a scam in which malicious code is installed on a
computer hard disk or a server. This code has the ability to misdirect
users to fraudulent websites, usually without their knowledge or
consent.
3. Spam – Is an electronic junk mail and is a type of advertising from a
company sent out to a target mailing list. It is usually harmless, but it
cam slow down networks or filling up a user’s mail box.
4. Spyware – Is a software that gathers user information through their
network connections without them being aware that this is happening.
Spyware monitors all key presses and transmits the info back to the
spyware sender.

ABUBAKAR MUSA

13
COOKIES
Cookies are small files sent to user's computer via their web
browser, when they visit certain websites. They store information about
the users and this data is accessed each time they visit the website.
 They remember who the user is and send messages such as ‘Welcome
Richard’ each time they log on the website.
 They recognise a user’s buying preferences: e.g. if the user bought a
game console, pop ups related to their buying habits will appear on the
user's screen.
Without cookies , the web server would have no way of knowing that
the user had visited the website before.

ABUBAKAR MUSA

14
INTERNET DEVELOPMENT
 Blogs are person internet journals where the writer will type in their
observations on some topic or even provide links to certain relevant
websites.
 Wikis are software allowing users to easily create and edit web pages
using any web browser. A wiki will support hyperlinks and has very
simple syntax (language rules) for creating pages.
 Digital media sharing websites allow users to upload clips and other
media internet website.
 Social networking sites focus on building online communities of users
who share the same interests and activities. They enable young people,
in particular to share photos of themselves, show people their favourite
videos and music.
 Folksonomies are closely related to tagging and literally mean
‘Management of people’. Tagging is a type of social bookmarking where a
user can tag any web page with words that describe its contents.

ABUBAKAR MUSA

15
CREDITS
•
•
•
•
•
•
•
•

E D I T O R : A B U B A K A R MU S A
A N I MA T O R : A B U B A K A R MU S A
P R O D U C E R : A B U B A K A R MU S A
D I R E C T O R : A B U B A K A R MU S A
E D I T O R : A B U B A K A R MU S A
A NY HE L P F ROM A NY ONE ? : NO
P L A GA R I S M: Y E S
RE F E RE NCE S : I GCS E
I N F O R MA T O N C O MMU N I C A T I O N
T E C H N O L O G Y , B Y G R A H A M B R O WN
A N D D A V I D WA T S O N A N D
H T T P ://WWW .I G C S E I C T .I N F O /

ABUBAKAR MUSA

16
THANK YOU

ABUBAKAR MUSA

17

More Related Content

What's hot

Advantages and disadvantages of technology
Advantages and disadvantages of technologyAdvantages and disadvantages of technology
Advantages and disadvantages of technologyJenn Leira Araneta
 
Top Internet & Technology Trends for 2014
Top Internet & Technology Trends for 2014Top Internet & Technology Trends for 2014
Top Internet & Technology Trends for 2014QNET Ltd
 
Online Safety, Security, Ethics, and Etiquette (Part 2)
Online Safety, Security, Ethics, and Etiquette (Part 2)Online Safety, Security, Ethics, and Etiquette (Part 2)
Online Safety, Security, Ethics, and Etiquette (Part 2)Maria Eloisa Blanza
 
Updated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools TacticsUpdated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools TacticsBen Graybar
 
Advantages and disadvantages of computer system
Advantages and disadvantages of computer systemAdvantages and disadvantages of computer system
Advantages and disadvantages of computer systemparag dhok
 
Internet Presentation - Muhammad Tahir Habib
Internet Presentation - Muhammad Tahir HabibInternet Presentation - Muhammad Tahir Habib
Internet Presentation - Muhammad Tahir HabibMuhammad Tahir Habib
 
Postive & Nagetive impacts & Applications of computer
Postive & Nagetive impacts & Applications of computerPostive & Nagetive impacts & Applications of computer
Postive & Nagetive impacts & Applications of computermanju rani
 
Computer crime and internet crime privacy
Computer crime and internet crime privacyComputer crime and internet crime privacy
Computer crime and internet crime privacyGouthamXander
 
Parent GuideBook Internet Safety (1)
Parent GuideBook Internet Safety (1)Parent GuideBook Internet Safety (1)
Parent GuideBook Internet Safety (1)Matt Forney
 
Misuse of social media
Misuse of social mediaMisuse of social media
Misuse of social mediaAM Oh
 
Disadvantages of using computers
Disadvantages of using computersDisadvantages of using computers
Disadvantages of using computersJake Mauleon
 
advantages and disadvantages of technology
advantages and disadvantages of technologyadvantages and disadvantages of technology
advantages and disadvantages of technologypearlreanettedalisay
 
Cybersecurity for the non-technical
Cybersecurity for the non-technicalCybersecurity for the non-technical
Cybersecurity for the non-technicalStephen Cobb
 
Pros and Cons of Technology
Pros and Cons of TechnologyPros and Cons of Technology
Pros and Cons of Technologyclaraanderson
 

What's hot (20)

Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Computers and society
Computers and societyComputers and society
Computers and society
 
Advantages and disadvantages of technology
Advantages and disadvantages of technologyAdvantages and disadvantages of technology
Advantages and disadvantages of technology
 
Judy Taylour's Digital Privacy Day 2014 Presentation
Judy Taylour's Digital Privacy Day 2014 PresentationJudy Taylour's Digital Privacy Day 2014 Presentation
Judy Taylour's Digital Privacy Day 2014 Presentation
 
Web tools
Web toolsWeb tools
Web tools
 
Top Internet & Technology Trends for 2014
Top Internet & Technology Trends for 2014Top Internet & Technology Trends for 2014
Top Internet & Technology Trends for 2014
 
Online Safety, Security, Ethics, and Etiquette (Part 2)
Online Safety, Security, Ethics, and Etiquette (Part 2)Online Safety, Security, Ethics, and Etiquette (Part 2)
Online Safety, Security, Ethics, and Etiquette (Part 2)
 
Updated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools TacticsUpdated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools Tactics
 
Advantages and disadvantages of computer system
Advantages and disadvantages of computer systemAdvantages and disadvantages of computer system
Advantages and disadvantages of computer system
 
Internet Presentation - Muhammad Tahir Habib
Internet Presentation - Muhammad Tahir HabibInternet Presentation - Muhammad Tahir Habib
Internet Presentation - Muhammad Tahir Habib
 
Postive & Nagetive impacts & Applications of computer
Postive & Nagetive impacts & Applications of computerPostive & Nagetive impacts & Applications of computer
Postive & Nagetive impacts & Applications of computer
 
Debate
DebateDebate
Debate
 
3. advantages and disadvantages of using computers
3. advantages and disadvantages of using computers3. advantages and disadvantages of using computers
3. advantages and disadvantages of using computers
 
Computer crime and internet crime privacy
Computer crime and internet crime privacyComputer crime and internet crime privacy
Computer crime and internet crime privacy
 
Parent GuideBook Internet Safety (1)
Parent GuideBook Internet Safety (1)Parent GuideBook Internet Safety (1)
Parent GuideBook Internet Safety (1)
 
Misuse of social media
Misuse of social mediaMisuse of social media
Misuse of social media
 
Disadvantages of using computers
Disadvantages of using computersDisadvantages of using computers
Disadvantages of using computers
 
advantages and disadvantages of technology
advantages and disadvantages of technologyadvantages and disadvantages of technology
advantages and disadvantages of technology
 
Cybersecurity for the non-technical
Cybersecurity for the non-technicalCybersecurity for the non-technical
Cybersecurity for the non-technical
 
Pros and Cons of Technology
Pros and Cons of TechnologyPros and Cons of Technology
Pros and Cons of Technology
 

Similar to Effects of using I.C.T.

Christos_Beretas_Internet_Privacy_and_Myths_TE
Christos_Beretas_Internet_Privacy_and_Myths_TEChristos_Beretas_Internet_Privacy_and_Myths_TE
Christos_Beretas_Internet_Privacy_and_Myths_TEChristos Beretas
 
Securing, Buying, and buying computers 4-H
Securing, Buying, and buying computers 4-HSecuring, Buying, and buying computers 4-H
Securing, Buying, and buying computers 4-Hjmoore55
 
Basic computer courses in Ambla Cantt! Batra Computer Centre
Basic  computer  courses in Ambla Cantt! Batra Computer CentreBasic  computer  courses in Ambla Cantt! Batra Computer Centre
Basic computer courses in Ambla Cantt! Batra Computer CentreSimran Grover
 
TheInternetDigitalSecurityfddreeere.pptx
TheInternetDigitalSecurityfddreeere.pptxTheInternetDigitalSecurityfddreeere.pptx
TheInternetDigitalSecurityfddreeere.pptxHAYDEECAYDA
 
Caloosa Tech Times October 2009
Caloosa Tech Times October 2009Caloosa Tech Times October 2009
Caloosa Tech Times October 2009ITbyTheSea
 
Internet privacy presentation
Internet privacy presentationInternet privacy presentation
Internet privacy presentationMatthew Momney
 
Chapter 6 effects of ict on society
Chapter 6   effects of ict on societyChapter 6   effects of ict on society
Chapter 6 effects of ict on societyPratik Gupta
 
20 things I learned about Browsers and the Web
20 things I learned about Browsers and the Web20 things I learned about Browsers and the Web
20 things I learned about Browsers and the WebGovind Sridharan
 
Who's that knocking on my firewall door?
Who's that knocking on my firewall door?Who's that knocking on my firewall door?
Who's that knocking on my firewall door?Bruce Wolfe
 
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2JeffUrgelles
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxRheamaeLiwan
 
REVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docxREVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docxJakeTorio1
 

Similar to Effects of using I.C.T. (20)

I.T Security Threats
I.T Security ThreatsI.T Security Threats
I.T Security Threats
 
Christos_Beretas_Internet_Privacy_and_Myths_TE
Christos_Beretas_Internet_Privacy_and_Myths_TEChristos_Beretas_Internet_Privacy_and_Myths_TE
Christos_Beretas_Internet_Privacy_and_Myths_TE
 
Securing, Buying, and buying computers 4-H
Securing, Buying, and buying computers 4-HSecuring, Buying, and buying computers 4-H
Securing, Buying, and buying computers 4-H
 
Online spying tools
Online spying toolsOnline spying tools
Online spying tools
 
Online spying tools
Online spying toolsOnline spying tools
Online spying tools
 
Basic computer courses in Ambla Cantt! Batra Computer Centre
Basic  computer  courses in Ambla Cantt! Batra Computer CentreBasic  computer  courses in Ambla Cantt! Batra Computer Centre
Basic computer courses in Ambla Cantt! Batra Computer Centre
 
TheInternetDigitalSecurityfddreeere.pptx
TheInternetDigitalSecurityfddreeere.pptxTheInternetDigitalSecurityfddreeere.pptx
TheInternetDigitalSecurityfddreeere.pptx
 
Caloosa Tech Times October 2009
Caloosa Tech Times October 2009Caloosa Tech Times October 2009
Caloosa Tech Times October 2009
 
Internet Security Essay
Internet Security EssayInternet Security Essay
Internet Security Essay
 
Internet privacy presentation
Internet privacy presentationInternet privacy presentation
Internet privacy presentation
 
Chapter 6 effects of ict on society
Chapter 6   effects of ict on societyChapter 6   effects of ict on society
Chapter 6 effects of ict on society
 
Hamza
HamzaHamza
Hamza
 
Internet(2)
Internet(2)Internet(2)
Internet(2)
 
20 things I learned about Browsers and the Web
20 things I learned about Browsers and the Web20 things I learned about Browsers and the Web
20 things I learned about Browsers and the Web
 
Who's that knocking on my firewall door?
Who's that knocking on my firewall door?Who's that knocking on my firewall door?
Who's that knocking on my firewall door?
 
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docx
 
REVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docxREVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docx
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docx
 
REVIEWER ETECH
REVIEWER ETECHREVIEWER ETECH
REVIEWER ETECH
 

Recently uploaded

Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 

Recently uploaded (20)

Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 

Effects of using I.C.T.

  • 1. I.C.T EFFECTS OF USING I.C.T ABUBAKAR MUSA 1
  • 2. INTRODUCTION In this presentation I am going to talk about: Social Effects of ICT Health Effects of ICT Safety Issues with ICT Hacking Viruses Software Copyright Internet Developments Internet Use Issues ABUBAKAR MUSA 2
  • 3. SOFTWARE COPYRIGHT Software is protected by copyright laws in much the same way as music CDs, film DVDs and articles from magazines and books are protected.  It is not legal to make a software copy and then sell it or give to someone else.  Software cannot be used on a network or used in multiple computers unless a licence has been acquired to allow this to happen.  Renting out a software package without permission to do so is illegal.  It is illegal to use the name of copyrighted software on other software without agreement to do so  It is illegal to use coding from copyright software in your own software and then pass this software on or sell it as your own without permission of copyright holders. ABUBAKAR MUSA 3
  • 4. VIRUSES A virus is a program that replicates (copies) itself and is design to cause harm to a system. • They can cause a computer to crash • The can cause system files to be lost which leads to computer malfunctioning. • They can corrupt the data in stored files. WHAT CAN YOU DO TO PREVENT VIRUSES • You can purchase up-to-date anti-virus software. • Do not download illegal software on your computer from an unknown source. • Only download software and files from the internet if the site is a reputable site. • Use firewalls on networks to protect against viruses. ABUBAKAR MUSA 4
  • 5. HACKING This is the act of gaining access to a computer system or network without legal authorisation. Although some hackers do this as a form of intellectual challenge, many do it with the sole intention of causing harm (e.g. editing/deleting files, installing harmful software committing fraud). ABUBAKAR MUSA 5
  • 6. EFFECTS OF I.C.T ON SOCIETY Now that companies now have access to cheap, reliable computing power, they have changed the way they are organised and the way they operate. This has changed...  The impact on employment.  The developmental of online shopping and banking.  Policing of the Internet.  The use of microprocessors in household appliances.  Manufacturing  Secretarial Work  Accounting Clerks  Newspaper Printing However it has increased employment of some people with special skill like:  IT Technicians  Computer Programmers  Web Designers  Help-Desk Staff ABUBAKAR MUSA 6
  • 7. SAFETY ISSUES You wouldn't imagine that using computers could be dangerous, but there are a few situations that can result in accidents...  Trailing Cables - Computer equipment is often connected to lots of cables: power, network, etc. If these cables are laying on the floor, they can cause people to trip over them.  Drinks or Food - If any liquids are spilt on electrical equipment, such a s a computer, it can result in damage to the equipment, or an electric shock to the user.  Overloaded Power Sockets - Plugging too many power cables into a socket can result in the socket being overloaded, overheating, and a fire starting.  Heavy Objects Falling - Many items of computer equipment are very heavy: CRT monitors, laser printers, etc. Heavy items can cause serious injury if they fall on people. ABUBAKAR MUSA 7
  • 8. IMPACT ON EMPLOYMENT The introduction of ICT has led to unemployment in many areas such as:  Manufacturing, where robots have taken over many tasks.  Computer-controlled warehouses, which are automatic and require no personnel to be present  Labour-intensive work Companies have also gained from the introduction of I.C.T systems, e.g.:  There is no need to employ as many people to do tasks, thus reducing labour cost.  Robots do not take holidays, get sick or take coffee breaks, resulting to higher productivity.  Whilst the quality is not necessarily better, there is greater consistency in the products made. ABUBAKAR MUSA 8
  • 9. EFFECTS ON COMPANIES DUE TO ONLINE SHOPPING AND BANKING • • • • • Companies can now save of costs since fewer staff are required and they do not need as many shops and banks to deal with potential customers. Because the Internet is global, the potential customer base is increased. There will be some new costs, however, because of the need to retain staff and the need to employ more staff in despatch departments. They also costs due to setting up and maintaining websites to enable online shopping and banking . Since there is little or no customer-employee interaction, this could lead to a drop in customer loyalty, which could result in loss of customers. ABUBAKAR MUSA 9
  • 10. HEALTH ISSUES • Health and safety regulations advise that all computer systems have a minimum of tillable and anti-glare screens, adjustable chairs and foot supports, suitable lighting, uncluttered work stations, and recommend frequent breaks and eye tests. HEALTH RISKS • • • • • Back and neck strain Damage to fingers and wrists Eyestrain Headaches Ozone irritation ABUBAKAR MUSA 10
  • 11. INFORMATION FROM THE INTERNET There are four main aspects to consider about the Internet: Reliability of information Security issues Other Internet issues. ABUBAKAR MUSA 11
  • 12. RELIABILTY OF INFORMATION  Information is more likely to be up to date than books, since websites can be updated very quickly.  It is much easier to get information from websites, as search engines quickly link key words together.  There is a vast amount of information on the internet, which is easier to locate than using the indices in several books.  However, information on the internet may be incorrect, inaccurate or even biased since it does not go through any checking process.  There is a risk of information overload even if search engines are used properly. ABUBAKAR MUSA 12
  • 13. SECURITY ISSUES 1. Phishing – This is a fraudulent operation involving the use of emails. The creators sends out a legitimate-looking email, hoping to gather personal and financial information from the recipient of the email. 2. Pharming – This is a scam in which malicious code is installed on a computer hard disk or a server. This code has the ability to misdirect users to fraudulent websites, usually without their knowledge or consent. 3. Spam – Is an electronic junk mail and is a type of advertising from a company sent out to a target mailing list. It is usually harmless, but it cam slow down networks or filling up a user’s mail box. 4. Spyware – Is a software that gathers user information through their network connections without them being aware that this is happening. Spyware monitors all key presses and transmits the info back to the spyware sender. ABUBAKAR MUSA 13
  • 14. COOKIES Cookies are small files sent to user's computer via their web browser, when they visit certain websites. They store information about the users and this data is accessed each time they visit the website.  They remember who the user is and send messages such as ‘Welcome Richard’ each time they log on the website.  They recognise a user’s buying preferences: e.g. if the user bought a game console, pop ups related to their buying habits will appear on the user's screen. Without cookies , the web server would have no way of knowing that the user had visited the website before. ABUBAKAR MUSA 14
  • 15. INTERNET DEVELOPMENT  Blogs are person internet journals where the writer will type in their observations on some topic or even provide links to certain relevant websites.  Wikis are software allowing users to easily create and edit web pages using any web browser. A wiki will support hyperlinks and has very simple syntax (language rules) for creating pages.  Digital media sharing websites allow users to upload clips and other media internet website.  Social networking sites focus on building online communities of users who share the same interests and activities. They enable young people, in particular to share photos of themselves, show people their favourite videos and music.  Folksonomies are closely related to tagging and literally mean ‘Management of people’. Tagging is a type of social bookmarking where a user can tag any web page with words that describe its contents. ABUBAKAR MUSA 15
  • 16. CREDITS • • • • • • • • E D I T O R : A B U B A K A R MU S A A N I MA T O R : A B U B A K A R MU S A P R O D U C E R : A B U B A K A R MU S A D I R E C T O R : A B U B A K A R MU S A E D I T O R : A B U B A K A R MU S A A NY HE L P F ROM A NY ONE ? : NO P L A GA R I S M: Y E S RE F E RE NCE S : I GCS E I N F O R MA T O N C O MMU N I C A T I O N T E C H N O L O G Y , B Y G R A H A M B R O WN A N D D A V I D WA T S O N A N D H T T P ://WWW .I G C S E I C T .I N F O / ABUBAKAR MUSA 16