SlideShare a Scribd company logo
1 of 28
Effects of using ICT
Software Copyright
When someone creats an original piece of software that
person can hold copyrights for the software
Ex:Songs cd's,Games Cd's
Why we need copyrights
● Holding copyright for the software is to have
protection of law ,If any one steals your software
Ilegally copying software is often referred to as
software piracy.
Under copyright law, people must not
✔ Copy the software for other people
✔ Lend the software to other people
✔ Rent the software to the other people
✔ Install the software on a network where other users
to access it( Unless it's a spcecial network version)
Introduction
●
Computer virus have become today’s headline
news
●
With the increasing use of the Internet, it has
become easier for virus to spread
●
Virus show us loopholes in software
●
Most virus are targeted at the MS Windows OS
Breaking the laws of copyrights
● Major Fines
● Imprisonment
The reason for this is that creating
software can involve the work of many
people and may take thousands of
hours. It is only fair that all of this
effort is protected
Virus Definition
Virus : Is a piece of malicious program that can
copy itself and infect a computer without the
permission or knowledge of the user
Symptoms of Virus Attack
●
Computer runs slower then usual
●
Computer no longer boots up
●
Screen sometimes flicker
●
PC speaker beeps periodically
●
System crashes for no reason
●
Files/directories sometimes disappear
●
Denial of Service (DoS)
●
A virus runs first when a legitimate program is
executed.
●
The virus loads itself into memory and looks to see
if it can find any other programs on the disk.
●
If it can find one, it modifies it to add the virus's
code to the new program.
●
Then the virus launches the "real program“.
Computer Virus – How they work?
●
The user has no way to know that the virus ever ran.
●
Unfortunately, the virus has now reproduced itself, so two programs
are infected.
●
The next time either of those programs gets executed, they infect
other programs, and the cycle continues.
●
When the infected program
– is distributed by
●
floppy disk
●
uploaded to a bulletin board
●
zipped and delivered as an executable.
●
Install an updated Anti-Virus software.
●
Stick with commercial software purchased on CDs.
●
Check the Computer for Virus frequently – Fix a
schedule for scanning your computer.
●
Avoid programs from unknown sources (like the
Internet).
●
Use firewalls to protect against virus
Protection and Prevention
Effects of ICT on Society
What is Software Copyright?
When someone creates an original piece of
software, that person then holds something called
the copyright for that software. (This is also true
when people create books, films and songs.)
Holding the copyright for software means that you
have the protection of the law if anyone tries to
steal your software.
Under copyright law, people must not:
Copy the software for other people
Lend the software to other people
Rent the software to other people
Install the software on a network where other users
can access it (unless it is a special ‘network’ version)
If someone breaks the copyright, they can be
punished by fines or even by imprisonment.
The reason for this is that creating software can
involve the work of many people and may take
thousands of hours. It is only fair that all of this
effort is protected
Software Piracy can be carried out…..
●
When the software is being installed, the user will be asked
to key in a unique reference number which is supplied with
the original copy of the software.
●
The user will be asked to click on OK/I Agree to the license
agreement before the software continues to install.
●
The original software comes with a sticker/hologram stating
that it is a genuine copy.
●
Some software run only if the CD/DVD drive is attached to
the system.
●
Some software run only if dongle(a type of storage media) is
plugged into one of the USB ports.
What is Hacking?
●
The word 'hacking' has several meanings, but in
the context of ICT, it is normally taken to as
breaking in to a computer system without legal
authorisation.
Why Do Hackers Hack?
A hacker may break into a system –
●
Out of curiosity
●
For Challenge - can they get through the system’s defences?
●
Because the data has value.
For example, What Happens if a hacker enters your computer
and steals financial information such as your credit card
number, or the password to your bank account ?
●
They might apply for new credit cards, take out bank loans,
buy cars, etc. all in your name.
This is known as identity theft.
How to pevent hacking
There are various methods to protect computer from
hacking
1 Firewall's
2. User-ID's and Robust Passwords
3. Data Encryption
Firewall's
✔Firewall's provide a 'shield' between your computer
and the Internet.
✔Firewall's can block unwanted data (including
hackers) from reaching your computer. They can
also stop your computer from connecting to
unwanted websites.
Social Effects of ICT
• The personal computer (PC) was developed in the early 1980s.
Before this date, computers were huge, expensive machines that
only a few, large businesses owned. Now PCs are found on almost
every desk in every office, all over the world.
Because companies now have access to so much cheap, reliable
computing power, they have changed the way they are organized
and the way they operate. As a result, many people’s jobs have
changed...
Rapid Development in ICT
COMPUTERS
PAST
PRESENT / NOW
FUTURE
??
Effects of using ICT
● Effects of ICT on Unemployment
✔ Automation in factories (robots doing the work of
people)
✔ Increased 'teleworking' (working from home)
✔ Increased need for highly trained ICT specialists
✔ Decreased need for 'labor intensive' workers
(like filing,printers etc)
✔ Need for workers to be trained more frequently
(to keep upwith the changes in ICT)
✔ Fewer 'face-to-face' meetings as video conferences
✔ can beheld over the Internet (reduced travel time and
cost)
Positive Impact:Employment
1.Network Managers / Technicians
2.Web Design
3.SystemsAnalyst
4.Programmers
5.Computer Engineers :Engineers are needed to
build the high-tech computers that we use today.
Loss of Jobs
1. Manual Repeatative works: Robots Work
2. Online shopping
3. Bank Cashiers:ATM's reduce the need for bank cashiers
4. Office Work:Traditional office work such as typists and filers
have been replaced by computers.
5. Telephone Exchange :Telephone operators have been
replaced by computer systems
6. Library Work :With the launch of e-books (electronic books)
the future of traditional libraries could be at risk.
Microprocessor
● A microprocessor is a tiny cpu un single chip
● Microprocessor are put into eletronic devices to
control them.
● Effects Mp at home
● Alarm system
● Washing machines
● Microwave oven
● Computer systems
.
.
M
Cont....
● Microprocessors on leisure times
Working on mobile phones.
Social networking sites
Emails
Playing games
going to Gym's
Not to leave home
● Online shopping
● Teleworking
● Entertainment
● Online banking
● Research
Cababilities of ICT
1.Speed
2.Accuracy
3.Multi-Tasking
4.RepetitiveTasks
5.Networking
6. Huge amounts of Data Storage
7.Fast Searches
8.Security
LIMITATIONS
● Baterry Life
● Weight
● Screen board size of Cellphones &radiations
● Bandwith

More Related Content

What's hot

Impact Of Ict In Society
Impact Of Ict In SocietyImpact Of Ict In Society
Impact Of Ict In Societykerjait
 
information technology
information technologyinformation technology
information technologykrithikha2001
 
Information communication technology
Information communication technologyInformation communication technology
Information communication technologyBeing Aabis
 
Social Impact of Information Technology
Social Impact of Information TechnologySocial Impact of Information Technology
Social Impact of Information TechnologySanjeev Gupta
 
Impact Of IT on Society.
Impact Of IT on Society.Impact Of IT on Society.
Impact Of IT on Society.Monica Khatri
 
Advantages of Information Technology – Wikki Verma
Advantages of Information Technology – Wikki VermaAdvantages of Information Technology – Wikki Verma
Advantages of Information Technology – Wikki VermaWikki Verma
 
Chapter 1-introduction to ict
Chapter 1-introduction to ictChapter 1-introduction to ict
Chapter 1-introduction to ictAten Kecik
 
Impact of it boon or bane
Impact of it  boon or baneImpact of it  boon or bane
Impact of it boon or baneRemya Menon
 
Information technology and its impact on society
Information technology and its impact on societyInformation technology and its impact on society
Information technology and its impact on societyArijeet Dutta
 
Societal impacts of it
Societal impacts of itSocietal impacts of it
Societal impacts of itSamrat Sikri
 
Question chapter 1
Question chapter 1Question chapter 1
Question chapter 1Aten Kecik
 
Presentation on Information technology
Presentation on Information technologyPresentation on Information technology
Presentation on Information technologyZarifasifkhan
 
computer and society impact of Computer in society
computer and society  impact of Computer in society computer and society  impact of Computer in society
computer and society impact of Computer in society Sumama Shakir
 
Information Technology revolution
Information Technology revolutionInformation Technology revolution
Information Technology revolutionUSERAAPKA
 

What's hot (20)

Impact Of Ict In Society
Impact Of Ict In SocietyImpact Of Ict In Society
Impact Of Ict In Society
 
information technology
information technologyinformation technology
information technology
 
Hritik Singh
Hritik SinghHritik Singh
Hritik Singh
 
Information communication technology
Information communication technologyInformation communication technology
Information communication technology
 
Social Impact of Information Technology
Social Impact of Information TechnologySocial Impact of Information Technology
Social Impact of Information Technology
 
Impact Of IT on Society.
Impact Of IT on Society.Impact Of IT on Society.
Impact Of IT on Society.
 
Advantages of Information Technology – Wikki Verma
Advantages of Information Technology – Wikki VermaAdvantages of Information Technology – Wikki Verma
Advantages of Information Technology – Wikki Verma
 
Chapter 1-introduction to ict
Chapter 1-introduction to ictChapter 1-introduction to ict
Chapter 1-introduction to ict
 
Impact of it boon or bane
Impact of it  boon or baneImpact of it  boon or bane
Impact of it boon or bane
 
Information technology and its impact on society
Information technology and its impact on societyInformation technology and its impact on society
Information technology and its impact on society
 
Societal impacts of it
Societal impacts of itSocietal impacts of it
Societal impacts of it
 
Ict
IctIct
Ict
 
What is ICT?
What is ICT?What is ICT?
What is ICT?
 
Social impact of computer ages
Social impact of computer agesSocial impact of computer ages
Social impact of computer ages
 
Question chapter 1
Question chapter 1Question chapter 1
Question chapter 1
 
Presentation on Information technology
Presentation on Information technologyPresentation on Information technology
Presentation on Information technology
 
Usage Of Ict In Every Day Life
Usage Of Ict In Every Day LifeUsage Of Ict In Every Day Life
Usage Of Ict In Every Day Life
 
computer and society impact of Computer in society
computer and society  impact of Computer in society computer and society  impact of Computer in society
computer and society impact of Computer in society
 
What is ICT?
What is ICT?What is ICT?
What is ICT?
 
Information Technology revolution
Information Technology revolutionInformation Technology revolution
Information Technology revolution
 

Viewers also liked

The use of ict in education for improving engineering education and training
The use of ict in education for improving engineering education and trainingThe use of ict in education for improving engineering education and training
The use of ict in education for improving engineering education and trainingGambari Isiaka
 
Better Financial Protections for Today's Seniors in Vermont
Better Financial Protections for Today's Seniors in VermontBetter Financial Protections for Today's Seniors in Vermont
Better Financial Protections for Today's Seniors in VermontStephen Unsworth
 
DOMA, Medicaid, and Asset Transfers
DOMA, Medicaid, and Asset TransfersDOMA, Medicaid, and Asset Transfers
DOMA, Medicaid, and Asset TransfersStephen Unsworth
 
Zavia by ashfaq ahmed part 1 novelhub.blogspot.com
Zavia by ashfaq ahmed part 1 novelhub.blogspot.comZavia by ashfaq ahmed part 1 novelhub.blogspot.com
Zavia by ashfaq ahmed part 1 novelhub.blogspot.comDr.Muhammad Awais
 
Avoid These Estate Planning Mistakes
Avoid These Estate Planning MistakesAvoid These Estate Planning Mistakes
Avoid These Estate Planning MistakesStephen Unsworth
 
Notas musicales higiene
Notas musicales higieneNotas musicales higiene
Notas musicales higienekarolinacarni
 
Why Would You Want to Avoid Vermont Probate: A Guide for Burlington Residents
Why Would You Want to Avoid Vermont Probate: A Guide for Burlington ResidentsWhy Would You Want to Avoid Vermont Probate: A Guide for Burlington Residents
Why Would You Want to Avoid Vermont Probate: A Guide for Burlington ResidentsStephen Unsworth
 
Time to kill the death penalty
Time to kill the death penaltyTime to kill the death penalty
Time to kill the death penaltyBrandi21180
 
PRODUCTOS DE LA HIGIENE PERSONAL MEDIANTE LA IDENTIFICACION DE NOTAS MUSICALES
PRODUCTOS DE LA HIGIENE PERSONAL MEDIANTE LA IDENTIFICACION  DE NOTAS MUSICALESPRODUCTOS DE LA HIGIENE PERSONAL MEDIANTE LA IDENTIFICACION  DE NOTAS MUSICALES
PRODUCTOS DE LA HIGIENE PERSONAL MEDIANTE LA IDENTIFICACION DE NOTAS MUSICALESkarolinacarni
 
Matt Carpenter Visual Resume
Matt Carpenter Visual ResumeMatt Carpenter Visual Resume
Matt Carpenter Visual Resumematty_carps
 
математика1
математика1математика1
математика1DaryaF17
 
Vermont Living Trusts and Avoiding Probate
Vermont Living Trusts and Avoiding ProbateVermont Living Trusts and Avoiding Probate
Vermont Living Trusts and Avoiding ProbateStephen Unsworth
 
قانون الباب الرابع
قانون الباب الرابعقانون الباب الرابع
قانون الباب الرابعAbd Elazym
 
雲端應用發展趨勢
雲端應用發展趨勢雲端應用發展趨勢
雲端應用發展趨勢佳芸 江
 
When does a lease start
When does a lease startWhen does a lease start
When does a lease startGeorge Azih
 

Viewers also liked (20)

The use of ict in education for improving engineering education and training
The use of ict in education for improving engineering education and trainingThe use of ict in education for improving engineering education and training
The use of ict in education for improving engineering education and training
 
Ict maria h
Ict maria hIct maria h
Ict maria h
 
Better Financial Protections for Today's Seniors in Vermont
Better Financial Protections for Today's Seniors in VermontBetter Financial Protections for Today's Seniors in Vermont
Better Financial Protections for Today's Seniors in Vermont
 
Names 2
Names 2Names 2
Names 2
 
DOMA, Medicaid, and Asset Transfers
DOMA, Medicaid, and Asset TransfersDOMA, Medicaid, and Asset Transfers
DOMA, Medicaid, and Asset Transfers
 
Zavia by ashfaq ahmed part 1 novelhub.blogspot.com
Zavia by ashfaq ahmed part 1 novelhub.blogspot.comZavia by ashfaq ahmed part 1 novelhub.blogspot.com
Zavia by ashfaq ahmed part 1 novelhub.blogspot.com
 
Avoid These Estate Planning Mistakes
Avoid These Estate Planning MistakesAvoid These Estate Planning Mistakes
Avoid These Estate Planning Mistakes
 
Jurnal cathrine0806083206
Jurnal cathrine0806083206Jurnal cathrine0806083206
Jurnal cathrine0806083206
 
Notas musicales higiene
Notas musicales higieneNotas musicales higiene
Notas musicales higiene
 
Why Would You Want to Avoid Vermont Probate: A Guide for Burlington Residents
Why Would You Want to Avoid Vermont Probate: A Guide for Burlington ResidentsWhy Would You Want to Avoid Vermont Probate: A Guide for Burlington Residents
Why Would You Want to Avoid Vermont Probate: A Guide for Burlington Residents
 
Time to kill the death penalty
Time to kill the death penaltyTime to kill the death penalty
Time to kill the death penalty
 
Becoming a nation
Becoming a nationBecoming a nation
Becoming a nation
 
PRODUCTOS DE LA HIGIENE PERSONAL MEDIANTE LA IDENTIFICACION DE NOTAS MUSICALES
PRODUCTOS DE LA HIGIENE PERSONAL MEDIANTE LA IDENTIFICACION  DE NOTAS MUSICALESPRODUCTOS DE LA HIGIENE PERSONAL MEDIANTE LA IDENTIFICACION  DE NOTAS MUSICALES
PRODUCTOS DE LA HIGIENE PERSONAL MEDIANTE LA IDENTIFICACION DE NOTAS MUSICALES
 
Matt Carpenter Visual Resume
Matt Carpenter Visual ResumeMatt Carpenter Visual Resume
Matt Carpenter Visual Resume
 
математика1
математика1математика1
математика1
 
Vermont Living Trusts and Avoiding Probate
Vermont Living Trusts and Avoiding ProbateVermont Living Trusts and Avoiding Probate
Vermont Living Trusts and Avoiding Probate
 
قانون الباب الرابع
قانون الباب الرابعقانون الباب الرابع
قانون الباب الرابع
 
Becoming a nation
Becoming a nationBecoming a nation
Becoming a nation
 
雲端應用發展趨勢
雲端應用發展趨勢雲端應用發展趨勢
雲端應用發展趨勢
 
When does a lease start
When does a lease startWhen does a lease start
When does a lease start
 

Similar to Impacts of ICT on social effects

Chapter 6 effects of ict on society
Chapter 6   effects of ict on societyChapter 6   effects of ict on society
Chapter 6 effects of ict on societyPratik Gupta
 
iGCSE Theory Unit 6 – Effects of Using ICT
iGCSE Theory Unit 6 – Effects of Using ICTiGCSE Theory Unit 6 – Effects of Using ICT
iGCSE Theory Unit 6 – Effects of Using ICTjonspav
 
Cyber Security and GDPR Made Easy
Cyber Security and GDPR Made EasyCyber Security and GDPR Made Easy
Cyber Security and GDPR Made EasyChristoanSmit
 
Uses , misuses and risk of software
Uses , misuses and risk of softwareUses , misuses and risk of software
Uses , misuses and risk of softwareAbdulJabbar459
 
Uses misuses and risk of software
Uses misuses and risk of softwareUses misuses and risk of software
Uses misuses and risk of softwareBurhan Ahmed
 
SOTWARE INFRINGEMENT
SOTWARE INFRINGEMENTSOTWARE INFRINGEMENT
SOTWARE INFRINGEMENTHunny Jummani
 
2014CyberSecurityProject
2014CyberSecurityProject2014CyberSecurityProject
2014CyberSecurityProjectKaley Hair
 
13.02 Network Security
13.02   Network Security13.02   Network Security
13.02 Network SecurityAnjan Mahanta
 
Software Piracy
Software PiracySoftware Piracy
Software PiracyByerdavi
 
امتحان المديول الأول ICT من كورس ICDL v5
امتحان المديول الأول ICT من كورس ICDL v5امتحان المديول الأول ICT من كورس ICDL v5
امتحان المديول الأول ICT من كورس ICDL v5um_adeveloper
 
Webinar Security: Apps of Steel transcription
Webinar Security:  Apps of Steel transcriptionWebinar Security:  Apps of Steel transcription
Webinar Security: Apps of Steel transcriptionService2Media
 
Chapter 7 Copy Rights And Intellectual Property
Chapter 7 Copy Rights And Intellectual PropertyChapter 7 Copy Rights And Intellectual Property
Chapter 7 Copy Rights And Intellectual Propertymanagement 2
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & preventionPriSim
 
Ryan Wilson - ryanwilson.com - IoT Security
Ryan Wilson - ryanwilson.com -  IoT SecurityRyan Wilson - ryanwilson.com -  IoT Security
Ryan Wilson - ryanwilson.com - IoT SecurityRyan Wilson
 
amrapali builders @@hacking printers.pdf
amrapali builders @@hacking printers.pdfamrapali builders @@hacking printers.pdf
amrapali builders @@hacking printers.pdfamrapalibuildersreviews
 
APPLICATIONS AND DEVICES-DRIVERS REVIEW NOTES.pdf
APPLICATIONS AND DEVICES-DRIVERS REVIEW NOTES.pdfAPPLICATIONS AND DEVICES-DRIVERS REVIEW NOTES.pdf
APPLICATIONS AND DEVICES-DRIVERS REVIEW NOTES.pdfAirrahArishaPialaAlc
 
INSECURE Magazine - 35
INSECURE Magazine - 35INSECURE Magazine - 35
INSECURE Magazine - 35Felipe Prado
 
Presentation1.presentation presentation presenstat
Presentation1.presentation presentation presenstatPresentation1.presentation presentation presenstat
Presentation1.presentation presentation presenstatLeaMayMuozGaurino
 
Protecting legitimate software users’ interest in designing a piracy preventi...
Protecting legitimate software users’ interest in designing a piracy preventi...Protecting legitimate software users’ interest in designing a piracy preventi...
Protecting legitimate software users’ interest in designing a piracy preventi...Alexander Decker
 

Similar to Impacts of ICT on social effects (20)

Chapter 6 effects of ict on society
Chapter 6   effects of ict on societyChapter 6   effects of ict on society
Chapter 6 effects of ict on society
 
iGCSE Theory Unit 6 – Effects of Using ICT
iGCSE Theory Unit 6 – Effects of Using ICTiGCSE Theory Unit 6 – Effects of Using ICT
iGCSE Theory Unit 6 – Effects of Using ICT
 
Cyber Security and GDPR Made Easy
Cyber Security and GDPR Made EasyCyber Security and GDPR Made Easy
Cyber Security and GDPR Made Easy
 
Uses , misuses and risk of software
Uses , misuses and risk of softwareUses , misuses and risk of software
Uses , misuses and risk of software
 
Uses misuses and risk of software
Uses misuses and risk of softwareUses misuses and risk of software
Uses misuses and risk of software
 
SOTWARE INFRINGEMENT
SOTWARE INFRINGEMENTSOTWARE INFRINGEMENT
SOTWARE INFRINGEMENT
 
2014CyberSecurityProject
2014CyberSecurityProject2014CyberSecurityProject
2014CyberSecurityProject
 
13.02 Network Security
13.02   Network Security13.02   Network Security
13.02 Network Security
 
Software Piracy
Software PiracySoftware Piracy
Software Piracy
 
امتحان المديول الأول ICT من كورس ICDL v5
امتحان المديول الأول ICT من كورس ICDL v5امتحان المديول الأول ICT من كورس ICDL v5
امتحان المديول الأول ICT من كورس ICDL v5
 
Webinar Security: Apps of Steel transcription
Webinar Security:  Apps of Steel transcriptionWebinar Security:  Apps of Steel transcription
Webinar Security: Apps of Steel transcription
 
Chapter 7 Copy Rights And Intellectual Property
Chapter 7 Copy Rights And Intellectual PropertyChapter 7 Copy Rights And Intellectual Property
Chapter 7 Copy Rights And Intellectual Property
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
 
Ryan Wilson - ryanwilson.com - IoT Security
Ryan Wilson - ryanwilson.com -  IoT SecurityRyan Wilson - ryanwilson.com -  IoT Security
Ryan Wilson - ryanwilson.com - IoT Security
 
amrapali builders @@hacking printers.pdf
amrapali builders @@hacking printers.pdfamrapali builders @@hacking printers.pdf
amrapali builders @@hacking printers.pdf
 
APPLICATIONS AND DEVICES-DRIVERS REVIEW NOTES.pdf
APPLICATIONS AND DEVICES-DRIVERS REVIEW NOTES.pdfAPPLICATIONS AND DEVICES-DRIVERS REVIEW NOTES.pdf
APPLICATIONS AND DEVICES-DRIVERS REVIEW NOTES.pdf
 
INSECURE Magazine - 35
INSECURE Magazine - 35INSECURE Magazine - 35
INSECURE Magazine - 35
 
Network monitoring white paper
Network monitoring white paperNetwork monitoring white paper
Network monitoring white paper
 
Presentation1.presentation presentation presenstat
Presentation1.presentation presentation presenstatPresentation1.presentation presentation presenstat
Presentation1.presentation presentation presenstat
 
Protecting legitimate software users’ interest in designing a piracy preventi...
Protecting legitimate software users’ interest in designing a piracy preventi...Protecting legitimate software users’ interest in designing a piracy preventi...
Protecting legitimate software users’ interest in designing a piracy preventi...
 

Recently uploaded

PROJECTILE MOTION-Horizontal and Vertical
PROJECTILE MOTION-Horizontal and VerticalPROJECTILE MOTION-Horizontal and Vertical
PROJECTILE MOTION-Horizontal and VerticalMAESTRELLAMesa2
 
Call Girls in Majnu Ka Tilla Delhi 🔝9711014705🔝 Genuine
Call Girls in Majnu Ka Tilla Delhi 🔝9711014705🔝 GenuineCall Girls in Majnu Ka Tilla Delhi 🔝9711014705🔝 Genuine
Call Girls in Majnu Ka Tilla Delhi 🔝9711014705🔝 Genuinethapagita
 
GENERAL PHYSICS 2 REFRACTION OF LIGHT SENIOR HIGH SCHOOL GENPHYS2.pptx
GENERAL PHYSICS 2 REFRACTION OF LIGHT SENIOR HIGH SCHOOL GENPHYS2.pptxGENERAL PHYSICS 2 REFRACTION OF LIGHT SENIOR HIGH SCHOOL GENPHYS2.pptx
GENERAL PHYSICS 2 REFRACTION OF LIGHT SENIOR HIGH SCHOOL GENPHYS2.pptxRitchAndruAgustin
 
basic entomology with insect anatomy and taxonomy
basic entomology with insect anatomy and taxonomybasic entomology with insect anatomy and taxonomy
basic entomology with insect anatomy and taxonomyDrAnita Sharma
 
Microphone- characteristics,carbon microphone, dynamic microphone.pptx
Microphone- characteristics,carbon microphone, dynamic microphone.pptxMicrophone- characteristics,carbon microphone, dynamic microphone.pptx
Microphone- characteristics,carbon microphone, dynamic microphone.pptxpriyankatabhane
 
The dark energy paradox leads to a new structure of spacetime.pptx
The dark energy paradox leads to a new structure of spacetime.pptxThe dark energy paradox leads to a new structure of spacetime.pptx
The dark energy paradox leads to a new structure of spacetime.pptxEran Akiva Sinbar
 
OECD bibliometric indicators: Selected highlights, April 2024
OECD bibliometric indicators: Selected highlights, April 2024OECD bibliometric indicators: Selected highlights, April 2024
OECD bibliometric indicators: Selected highlights, April 2024innovationoecd
 
Fertilization: Sperm and the egg—collectively called the gametes—fuse togethe...
Fertilization: Sperm and the egg—collectively called the gametes—fuse togethe...Fertilization: Sperm and the egg—collectively called the gametes—fuse togethe...
Fertilization: Sperm and the egg—collectively called the gametes—fuse togethe...D. B. S. College Kanpur
 
Davis plaque method.pptx recombinant DNA technology
Davis plaque method.pptx recombinant DNA technologyDavis plaque method.pptx recombinant DNA technology
Davis plaque method.pptx recombinant DNA technologycaarthichand2003
 
GenBio2 - Lesson 1 - Introduction to Genetics.pptx
GenBio2 - Lesson 1 - Introduction to Genetics.pptxGenBio2 - Lesson 1 - Introduction to Genetics.pptx
GenBio2 - Lesson 1 - Introduction to Genetics.pptxBerniceCayabyab1
 
Observational constraints on mergers creating magnetism in massive stars
Observational constraints on mergers creating magnetism in massive starsObservational constraints on mergers creating magnetism in massive stars
Observational constraints on mergers creating magnetism in massive starsSérgio Sacani
 
trihybrid cross , test cross chi squares
trihybrid cross , test cross chi squarestrihybrid cross , test cross chi squares
trihybrid cross , test cross chi squaresusmanzain586
 
Pests of safflower_Binomics_Identification_Dr.UPR.pdf
Pests of safflower_Binomics_Identification_Dr.UPR.pdfPests of safflower_Binomics_Identification_Dr.UPR.pdf
Pests of safflower_Binomics_Identification_Dr.UPR.pdfPirithiRaju
 
Pests of Bengal gram_Identification_Dr.UPR.pdf
Pests of Bengal gram_Identification_Dr.UPR.pdfPests of Bengal gram_Identification_Dr.UPR.pdf
Pests of Bengal gram_Identification_Dr.UPR.pdfPirithiRaju
 
Best Call Girls In Sector 29 Gurgaon❤️8860477959 EscorTs Service In 24/7 Delh...
Best Call Girls In Sector 29 Gurgaon❤️8860477959 EscorTs Service In 24/7 Delh...Best Call Girls In Sector 29 Gurgaon❤️8860477959 EscorTs Service In 24/7 Delh...
Best Call Girls In Sector 29 Gurgaon❤️8860477959 EscorTs Service In 24/7 Delh...lizamodels9
 
Citronella presentation SlideShare mani upadhyay
Citronella presentation SlideShare mani upadhyayCitronella presentation SlideShare mani upadhyay
Citronella presentation SlideShare mani upadhyayupadhyaymani499
 
User Guide: Orion™ Weather Station (Columbia Weather Systems)
User Guide: Orion™ Weather Station (Columbia Weather Systems)User Guide: Orion™ Weather Station (Columbia Weather Systems)
User Guide: Orion™ Weather Station (Columbia Weather Systems)Columbia Weather Systems
 
Radiation physics in Dental Radiology...
Radiation physics in Dental Radiology...Radiation physics in Dental Radiology...
Radiation physics in Dental Radiology...navyadasi1992
 
Servosystem Theory / Cybernetic Theory by Petrovic
Servosystem Theory / Cybernetic Theory by PetrovicServosystem Theory / Cybernetic Theory by Petrovic
Servosystem Theory / Cybernetic Theory by PetrovicAditi Jain
 

Recently uploaded (20)

PROJECTILE MOTION-Horizontal and Vertical
PROJECTILE MOTION-Horizontal and VerticalPROJECTILE MOTION-Horizontal and Vertical
PROJECTILE MOTION-Horizontal and Vertical
 
Call Girls in Majnu Ka Tilla Delhi 🔝9711014705🔝 Genuine
Call Girls in Majnu Ka Tilla Delhi 🔝9711014705🔝 GenuineCall Girls in Majnu Ka Tilla Delhi 🔝9711014705🔝 Genuine
Call Girls in Majnu Ka Tilla Delhi 🔝9711014705🔝 Genuine
 
GENERAL PHYSICS 2 REFRACTION OF LIGHT SENIOR HIGH SCHOOL GENPHYS2.pptx
GENERAL PHYSICS 2 REFRACTION OF LIGHT SENIOR HIGH SCHOOL GENPHYS2.pptxGENERAL PHYSICS 2 REFRACTION OF LIGHT SENIOR HIGH SCHOOL GENPHYS2.pptx
GENERAL PHYSICS 2 REFRACTION OF LIGHT SENIOR HIGH SCHOOL GENPHYS2.pptx
 
basic entomology with insect anatomy and taxonomy
basic entomology with insect anatomy and taxonomybasic entomology with insect anatomy and taxonomy
basic entomology with insect anatomy and taxonomy
 
Microphone- characteristics,carbon microphone, dynamic microphone.pptx
Microphone- characteristics,carbon microphone, dynamic microphone.pptxMicrophone- characteristics,carbon microphone, dynamic microphone.pptx
Microphone- characteristics,carbon microphone, dynamic microphone.pptx
 
The dark energy paradox leads to a new structure of spacetime.pptx
The dark energy paradox leads to a new structure of spacetime.pptxThe dark energy paradox leads to a new structure of spacetime.pptx
The dark energy paradox leads to a new structure of spacetime.pptx
 
OECD bibliometric indicators: Selected highlights, April 2024
OECD bibliometric indicators: Selected highlights, April 2024OECD bibliometric indicators: Selected highlights, April 2024
OECD bibliometric indicators: Selected highlights, April 2024
 
Fertilization: Sperm and the egg—collectively called the gametes—fuse togethe...
Fertilization: Sperm and the egg—collectively called the gametes—fuse togethe...Fertilization: Sperm and the egg—collectively called the gametes—fuse togethe...
Fertilization: Sperm and the egg—collectively called the gametes—fuse togethe...
 
Davis plaque method.pptx recombinant DNA technology
Davis plaque method.pptx recombinant DNA technologyDavis plaque method.pptx recombinant DNA technology
Davis plaque method.pptx recombinant DNA technology
 
GenBio2 - Lesson 1 - Introduction to Genetics.pptx
GenBio2 - Lesson 1 - Introduction to Genetics.pptxGenBio2 - Lesson 1 - Introduction to Genetics.pptx
GenBio2 - Lesson 1 - Introduction to Genetics.pptx
 
Let’s Say Someone Did Drop the Bomb. Then What?
Let’s Say Someone Did Drop the Bomb. Then What?Let’s Say Someone Did Drop the Bomb. Then What?
Let’s Say Someone Did Drop the Bomb. Then What?
 
Observational constraints on mergers creating magnetism in massive stars
Observational constraints on mergers creating magnetism in massive starsObservational constraints on mergers creating magnetism in massive stars
Observational constraints on mergers creating magnetism in massive stars
 
trihybrid cross , test cross chi squares
trihybrid cross , test cross chi squarestrihybrid cross , test cross chi squares
trihybrid cross , test cross chi squares
 
Pests of safflower_Binomics_Identification_Dr.UPR.pdf
Pests of safflower_Binomics_Identification_Dr.UPR.pdfPests of safflower_Binomics_Identification_Dr.UPR.pdf
Pests of safflower_Binomics_Identification_Dr.UPR.pdf
 
Pests of Bengal gram_Identification_Dr.UPR.pdf
Pests of Bengal gram_Identification_Dr.UPR.pdfPests of Bengal gram_Identification_Dr.UPR.pdf
Pests of Bengal gram_Identification_Dr.UPR.pdf
 
Best Call Girls In Sector 29 Gurgaon❤️8860477959 EscorTs Service In 24/7 Delh...
Best Call Girls In Sector 29 Gurgaon❤️8860477959 EscorTs Service In 24/7 Delh...Best Call Girls In Sector 29 Gurgaon❤️8860477959 EscorTs Service In 24/7 Delh...
Best Call Girls In Sector 29 Gurgaon❤️8860477959 EscorTs Service In 24/7 Delh...
 
Citronella presentation SlideShare mani upadhyay
Citronella presentation SlideShare mani upadhyayCitronella presentation SlideShare mani upadhyay
Citronella presentation SlideShare mani upadhyay
 
User Guide: Orion™ Weather Station (Columbia Weather Systems)
User Guide: Orion™ Weather Station (Columbia Weather Systems)User Guide: Orion™ Weather Station (Columbia Weather Systems)
User Guide: Orion™ Weather Station (Columbia Weather Systems)
 
Radiation physics in Dental Radiology...
Radiation physics in Dental Radiology...Radiation physics in Dental Radiology...
Radiation physics in Dental Radiology...
 
Servosystem Theory / Cybernetic Theory by Petrovic
Servosystem Theory / Cybernetic Theory by PetrovicServosystem Theory / Cybernetic Theory by Petrovic
Servosystem Theory / Cybernetic Theory by Petrovic
 

Impacts of ICT on social effects

  • 1. Effects of using ICT Software Copyright When someone creats an original piece of software that person can hold copyrights for the software Ex:Songs cd's,Games Cd's
  • 2. Why we need copyrights ● Holding copyright for the software is to have protection of law ,If any one steals your software Ilegally copying software is often referred to as software piracy.
  • 3. Under copyright law, people must not ✔ Copy the software for other people ✔ Lend the software to other people ✔ Rent the software to the other people ✔ Install the software on a network where other users to access it( Unless it's a spcecial network version)
  • 4. Introduction ● Computer virus have become today’s headline news ● With the increasing use of the Internet, it has become easier for virus to spread ● Virus show us loopholes in software ● Most virus are targeted at the MS Windows OS
  • 5. Breaking the laws of copyrights ● Major Fines ● Imprisonment The reason for this is that creating software can involve the work of many people and may take thousands of hours. It is only fair that all of this effort is protected
  • 6. Virus Definition Virus : Is a piece of malicious program that can copy itself and infect a computer without the permission or knowledge of the user
  • 7. Symptoms of Virus Attack ● Computer runs slower then usual ● Computer no longer boots up ● Screen sometimes flicker ● PC speaker beeps periodically ● System crashes for no reason ● Files/directories sometimes disappear ● Denial of Service (DoS)
  • 8. ● A virus runs first when a legitimate program is executed. ● The virus loads itself into memory and looks to see if it can find any other programs on the disk. ● If it can find one, it modifies it to add the virus's code to the new program. ● Then the virus launches the "real program“. Computer Virus – How they work?
  • 9. ● The user has no way to know that the virus ever ran. ● Unfortunately, the virus has now reproduced itself, so two programs are infected. ● The next time either of those programs gets executed, they infect other programs, and the cycle continues. ● When the infected program – is distributed by ● floppy disk ● uploaded to a bulletin board ● zipped and delivered as an executable.
  • 10. ● Install an updated Anti-Virus software. ● Stick with commercial software purchased on CDs. ● Check the Computer for Virus frequently – Fix a schedule for scanning your computer. ● Avoid programs from unknown sources (like the Internet). ● Use firewalls to protect against virus Protection and Prevention
  • 11. Effects of ICT on Society
  • 12. What is Software Copyright? When someone creates an original piece of software, that person then holds something called the copyright for that software. (This is also true when people create books, films and songs.) Holding the copyright for software means that you have the protection of the law if anyone tries to steal your software.
  • 13. Under copyright law, people must not: Copy the software for other people Lend the software to other people Rent the software to other people Install the software on a network where other users can access it (unless it is a special ‘network’ version) If someone breaks the copyright, they can be punished by fines or even by imprisonment. The reason for this is that creating software can involve the work of many people and may take thousands of hours. It is only fair that all of this effort is protected
  • 14. Software Piracy can be carried out….. ● When the software is being installed, the user will be asked to key in a unique reference number which is supplied with the original copy of the software. ● The user will be asked to click on OK/I Agree to the license agreement before the software continues to install. ● The original software comes with a sticker/hologram stating that it is a genuine copy. ● Some software run only if the CD/DVD drive is attached to the system. ● Some software run only if dongle(a type of storage media) is plugged into one of the USB ports.
  • 15. What is Hacking? ● The word 'hacking' has several meanings, but in the context of ICT, it is normally taken to as breaking in to a computer system without legal authorisation.
  • 16. Why Do Hackers Hack? A hacker may break into a system – ● Out of curiosity ● For Challenge - can they get through the system’s defences? ● Because the data has value. For example, What Happens if a hacker enters your computer and steals financial information such as your credit card number, or the password to your bank account ? ● They might apply for new credit cards, take out bank loans, buy cars, etc. all in your name. This is known as identity theft.
  • 17. How to pevent hacking There are various methods to protect computer from hacking 1 Firewall's 2. User-ID's and Robust Passwords 3. Data Encryption
  • 18. Firewall's ✔Firewall's provide a 'shield' between your computer and the Internet. ✔Firewall's can block unwanted data (including hackers) from reaching your computer. They can also stop your computer from connecting to unwanted websites.
  • 19. Social Effects of ICT • The personal computer (PC) was developed in the early 1980s. Before this date, computers were huge, expensive machines that only a few, large businesses owned. Now PCs are found on almost every desk in every office, all over the world. Because companies now have access to so much cheap, reliable computing power, they have changed the way they are organized and the way they operate. As a result, many people’s jobs have changed...
  • 20. Rapid Development in ICT COMPUTERS PAST PRESENT / NOW FUTURE ??
  • 21. Effects of using ICT ● Effects of ICT on Unemployment ✔ Automation in factories (robots doing the work of people) ✔ Increased 'teleworking' (working from home) ✔ Increased need for highly trained ICT specialists ✔ Decreased need for 'labor intensive' workers (like filing,printers etc) ✔ Need for workers to be trained more frequently (to keep upwith the changes in ICT) ✔ Fewer 'face-to-face' meetings as video conferences ✔ can beheld over the Internet (reduced travel time and cost)
  • 22. Positive Impact:Employment 1.Network Managers / Technicians 2.Web Design 3.SystemsAnalyst 4.Programmers 5.Computer Engineers :Engineers are needed to build the high-tech computers that we use today.
  • 23. Loss of Jobs 1. Manual Repeatative works: Robots Work 2. Online shopping 3. Bank Cashiers:ATM's reduce the need for bank cashiers 4. Office Work:Traditional office work such as typists and filers have been replaced by computers. 5. Telephone Exchange :Telephone operators have been replaced by computer systems 6. Library Work :With the launch of e-books (electronic books) the future of traditional libraries could be at risk.
  • 24. Microprocessor ● A microprocessor is a tiny cpu un single chip ● Microprocessor are put into eletronic devices to control them. ● Effects Mp at home ● Alarm system ● Washing machines ● Microwave oven ● Computer systems . . M
  • 25. Cont.... ● Microprocessors on leisure times Working on mobile phones. Social networking sites Emails Playing games going to Gym's
  • 26. Not to leave home ● Online shopping ● Teleworking ● Entertainment ● Online banking ● Research
  • 27. Cababilities of ICT 1.Speed 2.Accuracy 3.Multi-Tasking 4.RepetitiveTasks 5.Networking 6. Huge amounts of Data Storage 7.Fast Searches 8.Security
  • 28. LIMITATIONS ● Baterry Life ● Weight ● Screen board size of Cellphones &radiations ● Bandwith