Ppt lesson 17

2,587 views

Published on

Published in: Technology, Business
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
2,587
On SlideShare
0
From Embeds
0
Number of Embeds
259
Actions
Shares
0
Downloads
28
Comments
0
Likes
1
Embeds 0
No embeds

No notes for slide
  • Artificial Intelligent applications are being developed and used include: Games playing: an area where the most advances have been made Natural languages: offers the greatest potential rewards by allowing people to interact easily with computers by talking to them. Expert systems: computer programs that help us make decisions. Robotics: Robots can be used to perform repeated routine acts, possible dangerous acts. Genetic Engineering has the following benefits: increasing resistance to diseases, enabling a plant or animal to do something it would not typically do, enabling a fruit to ripen without getting squashy. Virtual reality uses include education, training, and medicine.
  • Ppt lesson 17

    1. 1. Lesson 17 Technology, the Workplace, and Society Unit 3—Computers and Society
    2. 2. Objectives <ul><li>Describe the impact of technology on education. </li></ul><ul><li>Describe the impact of technology on science and medicine. </li></ul><ul><li>Describe the impact of technology on work and play. </li></ul><ul><li>Identify types of computer crimes. </li></ul>
    3. 3. Objectives (cont.) <ul><li>Identify computer viruses. </li></ul><ul><li>Identify various security measures. </li></ul><ul><li>Identify computer-related laws. </li></ul><ul><li>Identify the “work” of hackers. </li></ul><ul><li>Describe how privacy is invaded with computer use. </li></ul>
    4. 4. The Internet and Education <ul><li>WebQuests </li></ul><ul><ul><li>Use the Internet for investigation and problem solving </li></ul></ul><ul><li>Online learning </li></ul><ul><li>Computer-based learning </li></ul><ul><li>Simulations </li></ul>
    5. 5. Online Learning
    6. 6. Technological Innovations <ul><li>Artificial intelligence </li></ul><ul><ul><li>Computer software that processes information on its own without human intervention </li></ul></ul><ul><li>Genetic engineering </li></ul><ul><ul><li>Involves changing the DNA in a living organism </li></ul></ul>
    7. 7. Genetic Engineering
    8. 8. Technological Innovations (cont.) <ul><li>Virtual reality </li></ul><ul><ul><li>An artificial environment that feels like a real environment </li></ul></ul><ul><li>Computing trends </li></ul><ul><ul><li>Nanotechnology </li></ul></ul><ul><ul><li>Optical computing </li></ul></ul><ul><ul><li>Quantum computing </li></ul></ul>
    9. 9. Work and Play <ul><li>Global economy </li></ul><ul><ul><li>Knowledge is the greatest asset. </li></ul></ul><ul><li>Electronic commerce </li></ul><ul><ul><li>Changing the way the world does business </li></ul></ul>
    10. 10. Work and Play (cont.) <ul><li>The workplace </li></ul><ul><ul><li>Information management has changed. </li></ul></ul><ul><ul><li>Groupware makes business communication and collaboration easier. </li></ul></ul><ul><ul><li>Telecommuting provides advantages to both employer and employee. </li></ul></ul>
    11. 11. Our Personal Lives <ul><li>Technology is present in nearly every phase of our daily lives. </li></ul><ul><ul><li>ATMs and other financial activities </li></ul></ul><ul><ul><li>Transportation </li></ul></ul><ul><ul><li>Education </li></ul></ul><ul><ul><li>Shopping </li></ul></ul><ul><ul><li>Communication </li></ul></ul><ul><ul><li>Medical treatment </li></ul></ul>
    12. 12. Technological Issues <ul><li>Misuse of information </li></ul><ul><ul><li>Copyright violations </li></ul></ul><ul><ul><li>Plagiarism </li></ul></ul><ul><li>Computer crimes </li></ul><ul><ul><li>Computer fraud </li></ul></ul><ul><ul><li>Computer hacking </li></ul></ul><ul><ul><li>Computer viruses </li></ul></ul><ul><ul><li>Data diddling </li></ul></ul>
    13. 13. Computer Security
    14. 14. Using Computer Hardware and Software <ul><li>Damage caused by improper use by employees </li></ul><ul><li>Damage caused by improper configurations </li></ul><ul><li>Damage caused by natural causes </li></ul><ul><li>Illegal copying or use of software </li></ul>
    15. 15. Health Issues <ul><li>Ergonomics-related concerns </li></ul><ul><ul><li>Prolonged keyboard use can result in carpal tunnel syndrome. </li></ul></ul><ul><ul><li>Poor lighting can cause eye strain. </li></ul></ul><ul><ul><li>Improper furniture can cause muscle disorders. </li></ul></ul><ul><ul><li>Prolonged use of computers can cause fatigue, headaches, and backaches. </li></ul></ul>
    16. 16. Privacy <ul><li>Personal information is available online. </li></ul><ul><ul><li>Many companies sell or trade information. </li></ul></ul><ul><ul><li>Information is gathered from online data regarding school, banking, hospitals, insurance companies, and so on. </li></ul></ul><ul><ul><li>This information typically is used for marketing purposes. </li></ul></ul>
    17. 17. Privacy (cont.) <ul><li>Using credit cards to purchase merchandise on the Internet can be risky. </li></ul><ul><ul><li>Some sites are advertised as being secure. </li></ul></ul><ul><ul><li>If sites are not secure, your credit card number can be released and sold. </li></ul></ul>
    18. 18. Security <ul><li>Security is necessary to keep hardware, software, and data safe. </li></ul><ul><ul><li>Control access to data with passwords or biometric security measures. </li></ul></ul><ul><ul><li>Make security a priority. </li></ul></ul><ul><ul><li>Use firewalls. </li></ul></ul><ul><ul><li>Use antivirus software. </li></ul></ul><ul><ul><li>Back up data regularly. </li></ul></ul>
    19. 19. Protection for Technology Injuries <ul><li>The Copyright Act of 1976 protects the developers of software. </li></ul><ul><li>The Electronic Communication Privacy Act of 1986 prohibits the interception of data communications. </li></ul><ul><li>Computer Fraud and Abuse Act of 1986 </li></ul><ul><li>Software Piracy and Counterfeiting Amendment of 1983 </li></ul>
    20. 20. Summary <ul><li>Technology is having a tremendous impact on education. </li></ul><ul><li>Many people predict that technology will change the entire structure of education. </li></ul><ul><li>The Internet and the World Wide Web are the biggest factors affecting education today. </li></ul>
    21. 21. Summary (cont.) <ul><li>Some people predict an antitechnology backlash. </li></ul><ul><li>Electronic commerce is the buying and selling of goods and services using the Internet. </li></ul><ul><li>Digital cash allows someone to pay online by transmitting a number from one computer to another. </li></ul>
    22. 22. Summary (cont.) <ul><li>New jobs and new job categories are being developed because of the Internet and electronic commerce. </li></ul><ul><li>Some technological advances are voice recognition, nonlethal weapons, space travel, flying cars, smart shoes and smart seats, clothes that fight odors, and electronic shopping. </li></ul>
    23. 23. Summary (cont.) <ul><li>Computer crime has become a major problem, costing companies billions of dollars annually. </li></ul><ul><li>Computer fraud is conduct that involves the manipulation of a computer or computer data for dishonest profit. </li></ul>
    24. 24. Summary (cont.) <ul><li>Computer hacking involves invading someone else’s computer. Sometimes it is done for financial gain and sometimes just as a prank. </li></ul><ul><li>A computer virus is a program that has been written to cause corruption of data on a computer. </li></ul>
    25. 25. Summary (cont.) <ul><li>To protect against viruses, install and keep an antivirus program running on your computer. </li></ul><ul><li>Be sure to update regularly. </li></ul><ul><li>Computer security is necessary in order to keep hardware, software, and data safe from harm or destruction. </li></ul>
    26. 26. Summary (cont.) <ul><li>The most common way to control access to data is to use passwords. </li></ul><ul><li>Illegally copying and using software is called software piracy. It has cost companies millions of dollars in lost sales. </li></ul><ul><li>Laws have been passed in an effort to assist those who have been injured by computer crimes and offenses. </li></ul>
    27. 27. Summary (cont.) <ul><li>Many computer crimes are difficult to prove and prosecute. </li></ul>

    ×