SlideShare a Scribd company logo
1 of 13
TANIA RAZA KHAN
2K16/MEd MS/37
COMPUTING ISSUES
THAT AFFECT THE
SOCIETY
Social Impact Characteristics of
Computer Technology
It is not difficult to get computer
professionals to agree that computers
have a significant impact on society. It
is rather more difficult to get them to
agree on why they impact as they do
Traditionally, courses that
deal with computers and
society issues focus
primarily on enumerating
the various ways in which
computers impact society.
This is done by listing
categories of topics such as
privacy, computers in
medicine, military uses of
computers, etc.
Classic cases of computer
abuse or errant systems are
typically described in detail,
as a way of simply making
students more aware of how
computers affect society.
These examples are meant
to serve as warnings to
future professionals, in the
hopes that they will
practice their profession
with greater care.
The following are in no particular order. Also,
some devices or examples are likely to fit
into more than one of the categories below:
 Ubiquity –It is perhaps stating the obvious that
computers appear to be everywhere today. Such
as digital watches, microwave ovens etc.
 Magnification- Computers tend toward
magnification in several different ways.
First, the explosion of the availability of
information is due in large part to the
computer's ability to generate, collect, and
store an ever increasing amount of raw data.
UBIQUITY:-
 Accessibility - To begin with, the vast
quantities of information available on-line
(through, for instance, the Internet) the
promises of the "information superhighway"
to open up new lanes of access, including
text, voice, graphics, and video increases
the types of information to which we have
access to include all media.
 cybercrime :- is crime that involves
a computer and a network.[1] The computer
may have been used in the commission of a
crime, or it may be the target.
 Computer fraud is any dishonest
misrepresentation of fact intended to let
another to do or refrain from doing
something which causes loss
 Awareness :- As technology advances and more
people rely on the internet to store sensitive
information such as banking or credit card
information, criminals are going to attempt to
steal that information. Cyber-crime is not only
becoming more of a threat to people in The U.S.
but also people across the world. Raising
awareness about how your information is being
protected and the tactics criminals use to steal
that information is important in today’s world
CONCLUSIONS :-
 Though computer is playing very important role
in this modern society but have uncertainty too.
In the end computing issues are too much in
today’s world that they are spread all over the
world a single person can reduce it and also
can’t live without it.
foedumed: Computing issues that affect the society, 37-16

More Related Content

What's hot

Social and legal issues in i
Social and legal issues in   iSocial and legal issues in   i
Social and legal issues in iHassan Nasir
 
advantage and disadvantage of technology
advantage and disadvantage of technology advantage and disadvantage of technology
advantage and disadvantage of technology Ziyad Siso
 
Information and Communication Technologies (ICTs)
Information and Communication Technologies (ICTs) Information and Communication Technologies (ICTs)
Information and Communication Technologies (ICTs) Khaleel Al Bataineh
 
Group 4 ancillaries_draft_3
Group 4 ancillaries_draft_3Group 4 ancillaries_draft_3
Group 4 ancillaries_draft_3Jayde-Marie
 
Digital Divide Powerpoint
Digital Divide PowerpointDigital Divide Powerpoint
Digital Divide Powerpointrhadley08
 
Social Interaction Within 10 years
Social Interaction Within 10 yearsSocial Interaction Within 10 years
Social Interaction Within 10 yearssilvia garzon
 
disadvantages of modern technology
disadvantages of modern technologydisadvantages of modern technology
disadvantages of modern technologyDatta Vinay
 
1.1 information technology
1.1 information technology1.1 information technology
1.1 information technologyTuffster
 
Advantages and disadvantages of technology
Advantages and disadvantages of technologyAdvantages and disadvantages of technology
Advantages and disadvantages of technologyregine isabedra
 
Problems of Well-Being - Technology disadvantages and advantages in our society
Problems of Well-Being - Technology disadvantages and advantages in our societyProblems of Well-Being - Technology disadvantages and advantages in our society
Problems of Well-Being - Technology disadvantages and advantages in our societyKole Turpin
 
Disadvantages of Technology in Communication
Disadvantages of Technology in CommunicationDisadvantages of Technology in Communication
Disadvantages of Technology in CommunicationAnant Lodha
 
How do you imagine social interaction within 10 years, taking into considerat...
How do you imagine social interaction within 10 years, taking into considerat...How do you imagine social interaction within 10 years, taking into considerat...
How do you imagine social interaction within 10 years, taking into considerat...Mathias Vazquez Rodriguez
 

What's hot (15)

Social and legal issues in i
Social and legal issues in   iSocial and legal issues in   i
Social and legal issues in i
 
advantage and disadvantage of technology
advantage and disadvantage of technology advantage and disadvantage of technology
advantage and disadvantage of technology
 
i
ii
i
 
Information and Communication Technologies (ICTs)
Information and Communication Technologies (ICTs) Information and Communication Technologies (ICTs)
Information and Communication Technologies (ICTs)
 
Group 4 ancillaries_draft_3
Group 4 ancillaries_draft_3Group 4 ancillaries_draft_3
Group 4 ancillaries_draft_3
 
Digital Divide Powerpoint
Digital Divide PowerpointDigital Divide Powerpoint
Digital Divide Powerpoint
 
Lecture 14
Lecture 14Lecture 14
Lecture 14
 
Social Interaction Within 10 years
Social Interaction Within 10 yearsSocial Interaction Within 10 years
Social Interaction Within 10 years
 
disadvantages of modern technology
disadvantages of modern technologydisadvantages of modern technology
disadvantages of modern technology
 
1.1 information technology
1.1 information technology1.1 information technology
1.1 information technology
 
Advantages and disadvantages of technology
Advantages and disadvantages of technologyAdvantages and disadvantages of technology
Advantages and disadvantages of technology
 
Problems of Well-Being - Technology disadvantages and advantages in our society
Problems of Well-Being - Technology disadvantages and advantages in our societyProblems of Well-Being - Technology disadvantages and advantages in our society
Problems of Well-Being - Technology disadvantages and advantages in our society
 
Role of technology
Role of technologyRole of technology
Role of technology
 
Disadvantages of Technology in Communication
Disadvantages of Technology in CommunicationDisadvantages of Technology in Communication
Disadvantages of Technology in Communication
 
How do you imagine social interaction within 10 years, taking into considerat...
How do you imagine social interaction within 10 years, taking into considerat...How do you imagine social interaction within 10 years, taking into considerat...
How do you imagine social interaction within 10 years, taking into considerat...
 

Similar to foedumed: Computing issues that affect the society, 37-16

Input on threat images against information society
Input on threat images against information societyInput on threat images against information society
Input on threat images against information societySomerco Research
 
IMPACT OF COMPUTING ON HUMANITY (IN EVERY ASPECT: DOMESTIC, SOCIAL AND PROFES...
IMPACT OF COMPUTING ON HUMANITY (IN EVERY ASPECT: DOMESTIC, SOCIAL AND PROFES...IMPACT OF COMPUTING ON HUMANITY (IN EVERY ASPECT: DOMESTIC, SOCIAL AND PROFES...
IMPACT OF COMPUTING ON HUMANITY (IN EVERY ASPECT: DOMESTIC, SOCIAL AND PROFES...Rauf Khalid
 
COMPUTER_ETHICS presentation for Engineer
COMPUTER_ETHICS presentation for EngineerCOMPUTER_ETHICS presentation for Engineer
COMPUTER_ETHICS presentation for Engineeriqamin1122
 
Networked Presence Analysis
Networked Presence AnalysisNetworked Presence Analysis
Networked Presence AnalysisAshley Thomas
 
An introduction to digital crimes
An introduction to digital crimesAn introduction to digital crimes
An introduction to digital crimesijfcstjournal
 
AN INTRODUCTION TO DIGITAL CRIMES
AN INTRODUCTION TO DIGITAL CRIMESAN INTRODUCTION TO DIGITAL CRIMES
AN INTRODUCTION TO DIGITAL CRIMESijfcstjournal
 
document on cyber terrorism
document on cyber terrorismdocument on cyber terrorism
document on cyber terrorismKirti Temani
 
Computer Research Papers
Computer Research PapersComputer Research Papers
Computer Research PapersMonica Rivera
 
Mpact of information and communication technology (ict) on the society
Mpact of information and communication technology (ict) on the societyMpact of information and communication technology (ict) on the society
Mpact of information and communication technology (ict) on the societyKAZEMBETVOnline
 
Sumaya Yeasmin ENGL 21002 Professor Robert Birdwell .docx
Sumaya Yeasmin ENGL 21002 Professor Robert Birdwell .docxSumaya Yeasmin ENGL 21002 Professor Robert Birdwell .docx
Sumaya Yeasmin ENGL 21002 Professor Robert Birdwell .docxdeanmtaylor1545
 
Security techniques for intelligent spam sensing and anomaly detection in onl...
Security techniques for intelligent spam sensing and anomaly detection in onl...Security techniques for intelligent spam sensing and anomaly detection in onl...
Security techniques for intelligent spam sensing and anomaly detection in onl...IJECEIAES
 
Coming Of Calm Technology
Coming Of Calm TechnologyComing Of Calm Technology
Coming Of Calm TechnologyChuka Okoye
 
Lesson 1. Online Technology and Other Trends in ICT.pptx
Lesson 1. Online Technology and Other Trends in ICT.pptxLesson 1. Online Technology and Other Trends in ICT.pptx
Lesson 1. Online Technology and Other Trends in ICT.pptxCherryLim21
 

Similar to foedumed: Computing issues that affect the society, 37-16 (20)

Input on threat images against information society
Input on threat images against information societyInput on threat images against information society
Input on threat images against information society
 
IMPACT OF COMPUTING ON HUMANITY (IN EVERY ASPECT: DOMESTIC, SOCIAL AND PROFES...
IMPACT OF COMPUTING ON HUMANITY (IN EVERY ASPECT: DOMESTIC, SOCIAL AND PROFES...IMPACT OF COMPUTING ON HUMANITY (IN EVERY ASPECT: DOMESTIC, SOCIAL AND PROFES...
IMPACT OF COMPUTING ON HUMANITY (IN EVERY ASPECT: DOMESTIC, SOCIAL AND PROFES...
 
COMPUTER_ETHICS presentation for Engineer
COMPUTER_ETHICS presentation for EngineerCOMPUTER_ETHICS presentation for Engineer
COMPUTER_ETHICS presentation for Engineer
 
Networked Presence Analysis
Networked Presence AnalysisNetworked Presence Analysis
Networked Presence Analysis
 
An introduction to digital crimes
An introduction to digital crimesAn introduction to digital crimes
An introduction to digital crimes
 
AN INTRODUCTION TO DIGITAL CRIMES
AN INTRODUCTION TO DIGITAL CRIMESAN INTRODUCTION TO DIGITAL CRIMES
AN INTRODUCTION TO DIGITAL CRIMES
 
The Digital Dilemma - Igor Verhoeven, Bindung
The Digital Dilemma - Igor Verhoeven, BindungThe Digital Dilemma - Igor Verhoeven, Bindung
The Digital Dilemma - Igor Verhoeven, Bindung
 
document on cyber terrorism
document on cyber terrorismdocument on cyber terrorism
document on cyber terrorism
 
Computers
ComputersComputers
Computers
 
MIS.pptx
MIS.pptxMIS.pptx
MIS.pptx
 
Computer Research Papers
Computer Research PapersComputer Research Papers
Computer Research Papers
 
Mpact of information and communication technology (ict) on the society
Mpact of information and communication technology (ict) on the societyMpact of information and communication technology (ict) on the society
Mpact of information and communication technology (ict) on the society
 
Sumaya Yeasmin ENGL 21002 Professor Robert Birdwell .docx
Sumaya Yeasmin ENGL 21002 Professor Robert Birdwell .docxSumaya Yeasmin ENGL 21002 Professor Robert Birdwell .docx
Sumaya Yeasmin ENGL 21002 Professor Robert Birdwell .docx
 
Security techniques for intelligent spam sensing and anomaly detection in onl...
Security techniques for intelligent spam sensing and anomaly detection in onl...Security techniques for intelligent spam sensing and anomaly detection in onl...
Security techniques for intelligent spam sensing and anomaly detection in onl...
 
Cyber Terrorism Essay
Cyber Terrorism EssayCyber Terrorism Essay
Cyber Terrorism Essay
 
Essay Topic Internet
Essay Topic InternetEssay Topic Internet
Essay Topic Internet
 
Cyberterrorism
CyberterrorismCyberterrorism
Cyberterrorism
 
Cyber-Terrorism Essay
Cyber-Terrorism EssayCyber-Terrorism Essay
Cyber-Terrorism Essay
 
Coming Of Calm Technology
Coming Of Calm TechnologyComing Of Calm Technology
Coming Of Calm Technology
 
Lesson 1. Online Technology and Other Trends in ICT.pptx
Lesson 1. Online Technology and Other Trends in ICT.pptxLesson 1. Online Technology and Other Trends in ICT.pptx
Lesson 1. Online Technology and Other Trends in ICT.pptx
 

More from Maliha Ghazal

foedumed: The goal of technology literacy, 19-16
foedumed: The goal of technology literacy, 19-16foedumed: The goal of technology literacy, 19-16
foedumed: The goal of technology literacy, 19-16Maliha Ghazal
 
Foedumed: World Wide Web (WWW), 43-16
Foedumed: World Wide Web (WWW), 43-16Foedumed: World Wide Web (WWW), 43-16
Foedumed: World Wide Web (WWW), 43-16Maliha Ghazal
 
Foedumed: Teaching and learning with technology, 32-16
Foedumed: Teaching and learning with technology, 32-16Foedumed: Teaching and learning with technology, 32-16
Foedumed: Teaching and learning with technology, 32-16Maliha Ghazal
 
Foedumed: Teaching and learning with technology
Foedumed: Teaching and learning with technologyFoedumed: Teaching and learning with technology
Foedumed: Teaching and learning with technologyMaliha Ghazal
 
foedumed: Working practices, 38-16
foedumed: Working practices, 38-16foedumed: Working practices, 38-16
foedumed: Working practices, 38-16Maliha Ghazal
 
foedumed: Working practices, 38-16
foedumed: Working practices, 38-16foedumed: Working practices, 38-16
foedumed: Working practices, 38-16Maliha Ghazal
 
foedumed: Educational informatics, 39-16
foedumed: Educational informatics, 39-16foedumed: Educational informatics, 39-16
foedumed: Educational informatics, 39-16Maliha Ghazal
 
foedumed: Working practices, 38-16
foedumed: Working practices, 38-16foedumed: Working practices, 38-16
foedumed: Working practices, 38-16Maliha Ghazal
 
foedumed: Computing issues that affect the society
foedumed: Computing issues that affect the societyfoedumed: Computing issues that affect the society
foedumed: Computing issues that affect the societyMaliha Ghazal
 
foedumed: Graphics and World Wide Web (WWW), 28-16
foedumed: Graphics and World Wide Web (WWW), 28-16foedumed: Graphics and World Wide Web (WWW), 28-16
foedumed: Graphics and World Wide Web (WWW), 28-16Maliha Ghazal
 
foedumed: Applications of computer, 05-16
foedumed: Applications of computer, 05-16foedumed: Applications of computer, 05-16
foedumed: Applications of computer, 05-16Maliha Ghazal
 

More from Maliha Ghazal (11)

foedumed: The goal of technology literacy, 19-16
foedumed: The goal of technology literacy, 19-16foedumed: The goal of technology literacy, 19-16
foedumed: The goal of technology literacy, 19-16
 
Foedumed: World Wide Web (WWW), 43-16
Foedumed: World Wide Web (WWW), 43-16Foedumed: World Wide Web (WWW), 43-16
Foedumed: World Wide Web (WWW), 43-16
 
Foedumed: Teaching and learning with technology, 32-16
Foedumed: Teaching and learning with technology, 32-16Foedumed: Teaching and learning with technology, 32-16
Foedumed: Teaching and learning with technology, 32-16
 
Foedumed: Teaching and learning with technology
Foedumed: Teaching and learning with technologyFoedumed: Teaching and learning with technology
Foedumed: Teaching and learning with technology
 
foedumed: Working practices, 38-16
foedumed: Working practices, 38-16foedumed: Working practices, 38-16
foedumed: Working practices, 38-16
 
foedumed: Working practices, 38-16
foedumed: Working practices, 38-16foedumed: Working practices, 38-16
foedumed: Working practices, 38-16
 
foedumed: Educational informatics, 39-16
foedumed: Educational informatics, 39-16foedumed: Educational informatics, 39-16
foedumed: Educational informatics, 39-16
 
foedumed: Working practices, 38-16
foedumed: Working practices, 38-16foedumed: Working practices, 38-16
foedumed: Working practices, 38-16
 
foedumed: Computing issues that affect the society
foedumed: Computing issues that affect the societyfoedumed: Computing issues that affect the society
foedumed: Computing issues that affect the society
 
foedumed: Graphics and World Wide Web (WWW), 28-16
foedumed: Graphics and World Wide Web (WWW), 28-16foedumed: Graphics and World Wide Web (WWW), 28-16
foedumed: Graphics and World Wide Web (WWW), 28-16
 
foedumed: Applications of computer, 05-16
foedumed: Applications of computer, 05-16foedumed: Applications of computer, 05-16
foedumed: Applications of computer, 05-16
 

Recently uploaded

MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docxPoojaSen20
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 

Recently uploaded (20)

MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docx
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 

foedumed: Computing issues that affect the society, 37-16

  • 1.
  • 4. Social Impact Characteristics of Computer Technology It is not difficult to get computer professionals to agree that computers have a significant impact on society. It is rather more difficult to get them to agree on why they impact as they do
  • 5. Traditionally, courses that deal with computers and society issues focus primarily on enumerating the various ways in which computers impact society. This is done by listing categories of topics such as privacy, computers in medicine, military uses of computers, etc.
  • 6. Classic cases of computer abuse or errant systems are typically described in detail, as a way of simply making students more aware of how computers affect society. These examples are meant to serve as warnings to future professionals, in the hopes that they will practice their profession with greater care.
  • 7. The following are in no particular order. Also, some devices or examples are likely to fit into more than one of the categories below:  Ubiquity –It is perhaps stating the obvious that computers appear to be everywhere today. Such as digital watches, microwave ovens etc.  Magnification- Computers tend toward magnification in several different ways. First, the explosion of the availability of information is due in large part to the computer's ability to generate, collect, and store an ever increasing amount of raw data.
  • 9.  Accessibility - To begin with, the vast quantities of information available on-line (through, for instance, the Internet) the promises of the "information superhighway" to open up new lanes of access, including text, voice, graphics, and video increases the types of information to which we have access to include all media.
  • 10.  cybercrime :- is crime that involves a computer and a network.[1] The computer may have been used in the commission of a crime, or it may be the target.  Computer fraud is any dishonest misrepresentation of fact intended to let another to do or refrain from doing something which causes loss
  • 11.  Awareness :- As technology advances and more people rely on the internet to store sensitive information such as banking or credit card information, criminals are going to attempt to steal that information. Cyber-crime is not only becoming more of a threat to people in The U.S. but also people across the world. Raising awareness about how your information is being protected and the tactics criminals use to steal that information is important in today’s world
  • 12. CONCLUSIONS :-  Though computer is playing very important role in this modern society but have uncertainty too. In the end computing issues are too much in today’s world that they are spread all over the world a single person can reduce it and also can’t live without it.