Servosystem Theory / Cybernetic Theory by Petrovic
Impacts of ICT on social effects
1. Effects of using ICT
Software Copyright
When someone creats an original piece of software that
person can hold copyrights for the software
Ex:Songs cd's,Games Cd's
2. Why we need copyrights
● Holding copyright for the software is to have
protection of law ,If any one steals your software
Ilegally copying software is often referred to as
software piracy.
3. Under copyright law, people must not
✔ Copy the software for other people
✔ Lend the software to other people
✔ Rent the software to the other people
✔ Install the software on a network where other users
to access it( Unless it's a spcecial network version)
4. Introduction
●
Computer virus have become today’s headline
news
●
With the increasing use of the Internet, it has
become easier for virus to spread
●
Virus show us loopholes in software
●
Most virus are targeted at the MS Windows OS
5. Breaking the laws of copyrights
● Major Fines
● Imprisonment
The reason for this is that creating
software can involve the work of many
people and may take thousands of
hours. It is only fair that all of this
effort is protected
6. Virus Definition
Virus : Is a piece of malicious program that can
copy itself and infect a computer without the
permission or knowledge of the user
7. Symptoms of Virus Attack
●
Computer runs slower then usual
●
Computer no longer boots up
●
Screen sometimes flicker
●
PC speaker beeps periodically
●
System crashes for no reason
●
Files/directories sometimes disappear
●
Denial of Service (DoS)
8. ●
A virus runs first when a legitimate program is
executed.
●
The virus loads itself into memory and looks to see
if it can find any other programs on the disk.
●
If it can find one, it modifies it to add the virus's
code to the new program.
●
Then the virus launches the "real program“.
Computer Virus – How they work?
9. ●
The user has no way to know that the virus ever ran.
●
Unfortunately, the virus has now reproduced itself, so two programs
are infected.
●
The next time either of those programs gets executed, they infect
other programs, and the cycle continues.
●
When the infected program
– is distributed by
●
floppy disk
●
uploaded to a bulletin board
●
zipped and delivered as an executable.
10. ●
Install an updated Anti-Virus software.
●
Stick with commercial software purchased on CDs.
●
Check the Computer for Virus frequently – Fix a
schedule for scanning your computer.
●
Avoid programs from unknown sources (like the
Internet).
●
Use firewalls to protect against virus
Protection and Prevention
12. What is Software Copyright?
When someone creates an original piece of
software, that person then holds something called
the copyright for that software. (This is also true
when people create books, films and songs.)
Holding the copyright for software means that you
have the protection of the law if anyone tries to
steal your software.
13. Under copyright law, people must not:
Copy the software for other people
Lend the software to other people
Rent the software to other people
Install the software on a network where other users
can access it (unless it is a special ‘network’ version)
If someone breaks the copyright, they can be
punished by fines or even by imprisonment.
The reason for this is that creating software can
involve the work of many people and may take
thousands of hours. It is only fair that all of this
effort is protected
14. Software Piracy can be carried out…..
●
When the software is being installed, the user will be asked
to key in a unique reference number which is supplied with
the original copy of the software.
●
The user will be asked to click on OK/I Agree to the license
agreement before the software continues to install.
●
The original software comes with a sticker/hologram stating
that it is a genuine copy.
●
Some software run only if the CD/DVD drive is attached to
the system.
●
Some software run only if dongle(a type of storage media) is
plugged into one of the USB ports.
15. What is Hacking?
●
The word 'hacking' has several meanings, but in
the context of ICT, it is normally taken to as
breaking in to a computer system without legal
authorisation.
16. Why Do Hackers Hack?
A hacker may break into a system –
●
Out of curiosity
●
For Challenge - can they get through the system’s defences?
●
Because the data has value.
For example, What Happens if a hacker enters your computer
and steals financial information such as your credit card
number, or the password to your bank account ?
●
They might apply for new credit cards, take out bank loans,
buy cars, etc. all in your name.
This is known as identity theft.
17. How to pevent hacking
There are various methods to protect computer from
hacking
1 Firewall's
2. User-ID's and Robust Passwords
3. Data Encryption
18. Firewall's
✔Firewall's provide a 'shield' between your computer
and the Internet.
✔Firewall's can block unwanted data (including
hackers) from reaching your computer. They can
also stop your computer from connecting to
unwanted websites.
19. Social Effects of ICT
• The personal computer (PC) was developed in the early 1980s.
Before this date, computers were huge, expensive machines that
only a few, large businesses owned. Now PCs are found on almost
every desk in every office, all over the world.
Because companies now have access to so much cheap, reliable
computing power, they have changed the way they are organized
and the way they operate. As a result, many people’s jobs have
changed...
21. Effects of using ICT
● Effects of ICT on Unemployment
✔ Automation in factories (robots doing the work of
people)
✔ Increased 'teleworking' (working from home)
✔ Increased need for highly trained ICT specialists
✔ Decreased need for 'labor intensive' workers
(like filing,printers etc)
✔ Need for workers to be trained more frequently
(to keep upwith the changes in ICT)
✔ Fewer 'face-to-face' meetings as video conferences
✔ can beheld over the Internet (reduced travel time and
cost)
22. Positive Impact:Employment
1.Network Managers / Technicians
2.Web Design
3.SystemsAnalyst
4.Programmers
5.Computer Engineers :Engineers are needed to
build the high-tech computers that we use today.
23. Loss of Jobs
1. Manual Repeatative works: Robots Work
2. Online shopping
3. Bank Cashiers:ATM's reduce the need for bank cashiers
4. Office Work:Traditional office work such as typists and filers
have been replaced by computers.
5. Telephone Exchange :Telephone operators have been
replaced by computer systems
6. Library Work :With the launch of e-books (electronic books)
the future of traditional libraries could be at risk.
24. Microprocessor
● A microprocessor is a tiny cpu un single chip
● Microprocessor are put into eletronic devices to
control them.
● Effects Mp at home
● Alarm system
● Washing machines
● Microwave oven
● Computer systems
.
.
M
25. Cont....
● Microprocessors on leisure times
Working on mobile phones.
Social networking sites
Emails
Playing games
going to Gym's
26. Not to leave home
● Online shopping
● Teleworking
● Entertainment
● Online banking
● Research