SlideShare a Scribd company logo
1 of 48
Unit 6 – Effects of using ICT

          Mr Spavin
Google's Schmidt set to testify in
             smartphone trial
• (Reuters) - Google's former chief
  executive, Eric Schmidt, is slated to
  testify on Tuesday as Oracle's final
  witness in the first part of a high
  stakes trial over smartphone
  technology, attorneys said in court.
   – Oracle sued Google in August
     2010, saying Google's Android mobile
     operating system infringes its copyrights
     and patents for the Java programming
     language. Google countered that it does
     not violate Oracle's patents and that
     Oracle cannot copyright certain parts of
     Java, an "open-source," or publicly
     available, software language.
Effects of using ICT
•   Intro
•   Software copyright
•   Viruses & Hacking
•   Effects of ICT on Society
•   Impact on Employment
•   Impact of using ICT for Online Shopping & banking
•   Should the internet be Policed?
•   Information from the internet
•   Internet Developments
•   Health & Safety issues
Intro
• The use of ICT has massively effected our
  everyday life in many ways…
  – Society in general
  – Employment
  – Services
• However, in addition to providing new
  opportunities, ICT has introduced it’s own
  problem, such as issues…
  – Copyright
  – Security (companies and individuals)
  – Health and safety
Software Copyright
• Software is protected by
  copyright laws in much the same
  way as music CD’s, film DVD’s
  and articles from magazines and
  books are protected.
• When software is supplied on CD
  or DVD there are certain rules
  that must be obeyed.
  – What are they?
Rules
• If you have bought a game on a CD in a shop
  and it is ok for you to make one copy to give to
  your friend.
Rules
                      Rules
• If you have bought a game in a shop and have
  the CD it is ok for you to make one copy to sell
  to your friend.
Rules
                      Rules
• It is not legal to make a software copy and
  then sell it or give it away to a friend.
Rules
• Software can be used on a network or used in
  multiple computers if you are able to
  download it from a web site.
Rules
• Software cannot be used on a network or
  used in multiple computers unless a licence
  has been acquired to allow this to happen.
Rules
• Software can be used on a network or used in
  multiple computers when a single licence has
  been acquired to allow this to happen.
Rules
• It is not legal to use coding from the copyright
  software in your own software and then pass
  this software on or sell it as your own without
  the permission of the copyright holders.
Rules
• It is legal to use just the coding from a web
  site in your own software.
Rules
• Renting out a purchased software package.
Rules
• Renting out a purchased software package
  without permission to do so is illegal.
Rules
• It is ok to use the name of another software
  package on your package as long as you don’t
  charge more than the original package.
Rules
• It is illegal to use the name of a copyrighted
  software on other software without
  agreement to do so.
In what ways can we protect the
          software from piracy?
• When the software is installed, the user will be asked
  to key in a unique reference number (a string of letters
  & numbers) which was supplied with the original copy
• User will be advised to click OK or I Agree to the licence
  agreement
• Original software comes with ta sticker informing the
  purchaser
• Some software will only run if the original CD/DVD is in
  the drive
• Some software will only run if a dongle is plugged in to
  one of the USB ports
In what ways can we protect the
          software from piracy?
• When the software is installed, the user
  will be asked to key in a unique
  reference number (a string of letters &
  numbers) which was supplied with the
  original copy
• User will be advised to click OK or I
  Agree to the licence agreement
• Original software comes with ta sticker
  informing the purchaser
• Some software will only run if the
  original CD/DVD is in the drive
• Some software will only run if a dongle
  is plugged in to one of the USB ports
In what ways can we protect the
         software from piracy?
• Using the internet please find two
  recent examples of software piracy.
• Using the internet please find
  examples of piracy prevention.
  – Use these examples to explain the
    following:
     • Software is protected by copyright laws
     • When software is supplied on CD or DVD
       there are certain rules that must be obeyed.
     • In what ways can we protect the software
       from piracy?
Why do People Create Computer
               Viruses?
There are hundreds of thousands of viruses out
there (if not millions) and they often designed
for different objectives. Most of them fall under
the following categories:
• To take control of a computer and use it for
   specific tasks
• To generate money
• To steal sensitive information (credit card
   numbers, passwords, personal details, data
   etc.)
• To prove a point, to prove it can be done, to
   prove ones skill or for revenge purposes
• To cripple a computer or network
Viruses & Hacking
• What is a Virus?
  – A virus is a program that replicates (copies) itself
    and is designed to cause harm to a computer
    system. It often causes damage by attaching itself
    to files, leading to on or more of the following
    effects:
     • Causing the computer to crash
     • Loss of Files
     • Corruption of the data stored on files
What is a Virus?
• A computer virus is a computer program that can
  replicate itself and spread from one computer to
  another.
  – The term "virus" is also commonly, but erroneously
    used, to refer to other types of malware, including but
    not limited to adware and spyware programs that do
    not have a reproductive ability.
  – Viruses can increase their chances of spreading to
    other computers by infecting files on a network file
    system or a file system that is accessed by other
    computers.[
90 day global Threat…




   http://www.symantec.com/security_response/
How do they infect computers?
• Viruses infect computers through email
  attachments and through illegal software or
  downloading files from the internet that are
  infected.
• Ways of protecting systems against Viruses:
  – Use up-to-date anti-virus software
  – Do not allow illegal software to be loaded onto a
    computer and do not use from an unknown source
  – Only download software/files from a reputable source
  – Use firewalls
Hacking!!!!!
• What methods could we use to minimise the
  risk of being hacked?
• What is encryption?
Encryption…
• http://www.youtube.com/watch?v=3QnD2c4X
  ovk&feature

• http://infoencrypt.com/
encryption
• is the process of transforming information
  (referred to as plaintext) using an algorithm
  (called a cipher) to make it unreadable to anyone
  except those possessing special
  knowledge, usually referred to as a key. The result
  of the process is encrypted information (in
  cryptography, referred to as ciphertext). The
  reverse process, i.e., to make the encrypted
  information readable again, is referred to as
  decryption (i.e., to make it unencrypted).[citation
  needed]
Effects of ICT on Society
• The impact on employment.
  – Their introduction has led to unemployment in
    many areas such as:
     • Manufacturing
     • Computer controlled warehouses
     • Labour-intensive work
Impact on Employment
• The introduction of ICT has led to
  unemployment in many areas such as:
   – Manufacturing, where robots have taken over
     many tasks (e.g. paint spraying in a car factory)
        • Example V
   – Computer controlled ware houses, which are
     automatic and require no personnel to be present.
   – Labour-intensive work (e.g. in the printing
     industry, checking football pools, filing, etc.).

http://news.bbc.co.uk/local/tees/hi/people_and_places/newsid_9199000/9199115.stm
http://news.bbc.co.uk/1/hi/uk/3753854.stm
http://www.dailymail.co.uk/sciencetech/article-1025689/Welcome-Thanet-
Earth-The-biggest-greenhouse-Britain-unveiled.html
Back to the future…
Back to the future…
Re-skilling the workers
Impact of using ICT for online shopping
             and banking
• Advantages
  – No longer the need to travel into the town centre
  – Users now have access to a worldwide market
Security Issues
• Other security risks other than viruses and
  Hacking
  – Phishing
  – Pharming
  – Spam
  – Spyware
Phishing
• Phishing is a way of attempting
  to acquire information (and
  sometimes, indirectly, money)
  such as
  usernames, passwords, and
  credit card details by
  masquerading as a trustworthy
  entity in an electronic
  communication.
Pharming

• Pharming[p] is a hacker's attack intended to redirect a
  website's traffic to another, bogus site. Pharming can
  be conducted either by changing the hosts file on a
  victim's computer or by exploitation of a vulnerability
  in DNS server software. DNS servers are computers
  responsible for resolving Internet names into their real
  IP addresses. Compromised DNS servers are sometimes
  referred to as "poisoned". Pharming requires
  unprotected access to target a computer, such as
  altering a customer's home computer, rather than a
  corporate business server.
Spam
• Spam (its name a portmanteau of
  the words "Spiced" and "Ham")[1]
  is a canned precooked meat
  product made by the Hormel
  Foods Corporation, first
  introduced in 1937. The labelled
  ingredients in the classic variety
  of Spam are chopped pork
  shoulder meat, with ham meat
  added, salt, water, modified
  potato starch as a binder, and
  sodium nitrite as a preservative.
Spyware
• Spyware is a type of malware (malicious
  software) installed on computers that
  collects information about users without
  their knowledge. The presence of
  spyware is typically hidden from the
  user and can be difficult to detect.
  Spyware is often secretly installed on a
  user's personal computer without their
  knowledge. However, some spyware
  such as keyloggers may be installed by
  the owner of a shared, corporate, or
  public computer on purpose in order to
  intentionally monitor users.
   – Source: Wikipidia
• http://www.symantec.com/podcasts/detail.js
  p?podid=b-
  may_state_of_spam_phishing_2011
What are cookies?
• Cookies are small files sent to a user’s
  computer via the web browser when
  they visit certain websites. They store
  information about the users and this
  data is accessed each time they visit
  the website.
   – They remember who the user is and
     send messages such as ‘Welcome Jon’
     each time they log on to the website.
   – They recognise a user’s buying habits will
     appear on the users screen each time
     they visit the website.
    http://webdesign.about.com/od/cookies/a/aa083198.htm
    http://www.w3schools.com/js/tryit.asp?filename=tryjs_cookie_username
Internet developments
• Blogs
   – Personal internet journalists
• Wikis
   – Software allowing users to easily create and edit web pages.
• Digital media sharing websites
   – Allow uses to upload video clips and other media
• Social networking sites
   – Building on-line communities of users that share the same
     interests
• Folksonomies (http://delicious.com/)
   – Social bookmarking where a user can tag any webpage with
     words that describe it’s contents.
Health & Safety




• Health aspects
• Safety aspects
Health
• Back & Neck problems/strain
• Repetitive strain injury (RSI) –
  damage to fingers and wrists
• Eyestrain (caused by staring at
  a computer screen for too
  long or bad lighting in the
  room)
• Headaches
• Zone irritation
Safety

•   Electrocution
•   Trailing wires
•   Heavy equipment
•   Fire Risk

More Related Content

What's hot

Windows operating system
Windows operating systemWindows operating system
Windows operating systemLeah Gonzales
 
IGCSE ICT (0417) P3 Presentation Authoring
IGCSE ICT (0417) P3 Presentation AuthoringIGCSE ICT (0417) P3 Presentation Authoring
IGCSE ICT (0417) P3 Presentation AuthoringShamir George
 
User account (Windows)
User account (Windows)User account (Windows)
User account (Windows)Dev Dorse
 
The effects of using ict
The effects of using ictThe effects of using ict
The effects of using ictodalyfer
 
How to install windows 10
How to install windows 10How to install windows 10
How to install windows 10Annu Ahmed
 
Computer virus
Computer virusComputer virus
Computer virusHemn Amin
 
Bios ( Basic Input Output System )
Bios ( Basic Input Output System )Bios ( Basic Input Output System )
Bios ( Basic Input Output System )Jesthine Nesshal
 
What is Application Software?
What is Application Software?What is Application Software?
What is Application Software?DaisyJeffenYRios
 
INSTALL APLLICATION SOFTWARE.pptx
INSTALL APLLICATION SOFTWARE.pptxINSTALL APLLICATION SOFTWARE.pptx
INSTALL APLLICATION SOFTWARE.pptxkarmaYonten5
 
Chapter 1 Introduction To Computers
Chapter 1 Introduction To ComputersChapter 1 Introduction To Computers
Chapter 1 Introduction To Computersnorzaini
 
Introduction to computer
Introduction to computerIntroduction to computer
Introduction to computerlina hajjar
 
BIOS basic input output system
BIOS basic input output systemBIOS basic input output system
BIOS basic input output systemVipul Buchade
 
Introduction, Installation Operating System and Application
Introduction, Installation Operating System and ApplicationIntroduction, Installation Operating System and Application
Introduction, Installation Operating System and ApplicationVichhaiy Serey
 
0417 IGCSE ICT Chapter 1 Exercises
0417 IGCSE ICT Chapter 1 Exercises0417 IGCSE ICT Chapter 1 Exercises
0417 IGCSE ICT Chapter 1 ExercisesAnthi Aristotelous
 
Virus vs anti virus
Virus vs anti virusVirus vs anti virus
Virus vs anti virusXʎz ʞsɥ
 

What's hot (20)

Windows operating system
Windows operating systemWindows operating system
Windows operating system
 
IGCSE ICT (0417) P3 Presentation Authoring
IGCSE ICT (0417) P3 Presentation AuthoringIGCSE ICT (0417) P3 Presentation Authoring
IGCSE ICT (0417) P3 Presentation Authoring
 
User account (Windows)
User account (Windows)User account (Windows)
User account (Windows)
 
The effects of using ict
The effects of using ictThe effects of using ict
The effects of using ict
 
Application software
Application softwareApplication software
Application software
 
How to install windows 10
How to install windows 10How to install windows 10
How to install windows 10
 
Computer virus
Computer virusComputer virus
Computer virus
 
Bios ( Basic Input Output System )
Bios ( Basic Input Output System )Bios ( Basic Input Output System )
Bios ( Basic Input Output System )
 
Computer maintenance
Computer maintenanceComputer maintenance
Computer maintenance
 
What is Application Software?
What is Application Software?What is Application Software?
What is Application Software?
 
INSTALL APLLICATION SOFTWARE.pptx
INSTALL APLLICATION SOFTWARE.pptxINSTALL APLLICATION SOFTWARE.pptx
INSTALL APLLICATION SOFTWARE.pptx
 
Operating System PPT
Operating System PPTOperating System PPT
Operating System PPT
 
Presentation on computer viruses
Presentation on computer virusesPresentation on computer viruses
Presentation on computer viruses
 
Chapter 1 Introduction To Computers
Chapter 1 Introduction To ComputersChapter 1 Introduction To Computers
Chapter 1 Introduction To Computers
 
Introduction to computer
Introduction to computerIntroduction to computer
Introduction to computer
 
BIOS basic input output system
BIOS basic input output systemBIOS basic input output system
BIOS basic input output system
 
Basic Server PPT (THDC)
Basic Server PPT (THDC)Basic Server PPT (THDC)
Basic Server PPT (THDC)
 
Introduction, Installation Operating System and Application
Introduction, Installation Operating System and ApplicationIntroduction, Installation Operating System and Application
Introduction, Installation Operating System and Application
 
0417 IGCSE ICT Chapter 1 Exercises
0417 IGCSE ICT Chapter 1 Exercises0417 IGCSE ICT Chapter 1 Exercises
0417 IGCSE ICT Chapter 1 Exercises
 
Virus vs anti virus
Virus vs anti virusVirus vs anti virus
Virus vs anti virus
 

Viewers also liked

IGCSE ICT (0417) P2 data manipulation using Access
IGCSE ICT (0417) P2 data manipulation using AccessIGCSE ICT (0417) P2 data manipulation using Access
IGCSE ICT (0417) P2 data manipulation using AccessShamir George
 
Cambridge IGCSE ICT Revision Notes
Cambridge IGCSE ICT Revision Notes Cambridge IGCSE ICT Revision Notes
Cambridge IGCSE ICT Revision Notes Yash Bhatt
 
IGCSE ICT 0417 P2 Document Production
IGCSE ICT 0417 P2 Document ProductionIGCSE ICT 0417 P2 Document Production
IGCSE ICT 0417 P2 Document ProductionShamir George
 
Chapter 4 computer networks
Chapter 4   computer networksChapter 4   computer networks
Chapter 4 computer networksPratik Gupta
 
Health issues of ICT
Health issues of ICTHealth issues of ICT
Health issues of ICTCJ900
 
Chapter 8 system analysis and design
Chapter 8   system analysis and designChapter 8   system analysis and design
Chapter 8 system analysis and designPratik Gupta
 
Chapter 7 the ways-in_which_is_ict_is_used[1]
Chapter 7   the ways-in_which_is_ict_is_used[1]Chapter 7   the ways-in_which_is_ict_is_used[1]
Chapter 7 the ways-in_which_is_ict_is_used[1]Pratik Gupta
 
0620_w08_qp_03
0620_w08_qp_030620_w08_qp_03
0620_w08_qp_03King Ali
 
The ways in which ict is used
The ways in which ict is usedThe ways in which ict is used
The ways in which ict is usedgracepm28
 
Health And Safety
Health And SafetyHealth And Safety
Health And SafetySaimaRafiq
 
IGCSE board offered by The Shri Ram School
IGCSE board offered by The Shri Ram SchoolIGCSE board offered by The Shri Ram School
IGCSE board offered by The Shri Ram SchoolThe Shri Ram School
 
Uses of ict in society
Uses of ict in societyUses of ict in society
Uses of ict in societyAnne Perera
 
Ch 01-types-and-components-of-computers
Ch 01-types-and-components-of-computersCh 01-types-and-components-of-computers
Ch 01-types-and-components-of-computersmmoussa83
 
Computer health & safety issues
Computer health & safety issuesComputer health & safety issues
Computer health & safety issuesBuxoo Abdullah
 

Viewers also liked (20)

IGCSE ICT
IGCSE ICTIGCSE ICT
IGCSE ICT
 
IGCSE ICT (0417) P2 data manipulation using Access
IGCSE ICT (0417) P2 data manipulation using AccessIGCSE ICT (0417) P2 data manipulation using Access
IGCSE ICT (0417) P2 data manipulation using Access
 
Cambridge IGCSE ICT Revision Notes
Cambridge IGCSE ICT Revision Notes Cambridge IGCSE ICT Revision Notes
Cambridge IGCSE ICT Revision Notes
 
IGCSE ICT 0417 P2 Document Production
IGCSE ICT 0417 P2 Document ProductionIGCSE ICT 0417 P2 Document Production
IGCSE ICT 0417 P2 Document Production
 
Chapter 4 computer networks
Chapter 4   computer networksChapter 4   computer networks
Chapter 4 computer networks
 
How can computers affect our health
How can computers affect our healthHow can computers affect our health
How can computers affect our health
 
Health issues of ICT
Health issues of ICTHealth issues of ICT
Health issues of ICT
 
iGCSE networks
iGCSE networksiGCSE networks
iGCSE networks
 
Chapter 8 system analysis and design
Chapter 8   system analysis and designChapter 8   system analysis and design
Chapter 8 system analysis and design
 
Igcse networks
Igcse networksIgcse networks
Igcse networks
 
ashish kumar cv
ashish kumar cvashish kumar cv
ashish kumar cv
 
Chapter 7 the ways-in_which_is_ict_is_used[1]
Chapter 7   the ways-in_which_is_ict_is_used[1]Chapter 7   the ways-in_which_is_ict_is_used[1]
Chapter 7 the ways-in_which_is_ict_is_used[1]
 
0620_w08_qp_03
0620_w08_qp_030620_w08_qp_03
0620_w08_qp_03
 
The ways in which ict is used
The ways in which ict is usedThe ways in which ict is used
The ways in which ict is used
 
Health And Safety
Health And SafetyHealth And Safety
Health And Safety
 
IGCSE board offered by The Shri Ram School
IGCSE board offered by The Shri Ram SchoolIGCSE board offered by The Shri Ram School
IGCSE board offered by The Shri Ram School
 
Uses of ict in society
Uses of ict in societyUses of ict in society
Uses of ict in society
 
Ch 01-types-and-components-of-computers
Ch 01-types-and-components-of-computersCh 01-types-and-components-of-computers
Ch 01-types-and-components-of-computers
 
Importance of computers in Military
Importance of computers in MilitaryImportance of computers in Military
Importance of computers in Military
 
Computer health & safety issues
Computer health & safety issuesComputer health & safety issues
Computer health & safety issues
 

Similar to iGCSE Theory Unit 6 – Effects of Using ICT

Ethics in IT and System Usage
Ethics in IT and System UsageEthics in IT and System Usage
Ethics in IT and System Usagetushki92
 
Cyber security awareness for end users
Cyber security awareness for end usersCyber security awareness for end users
Cyber security awareness for end usersNetWatcher
 
Cyber Security and GDPR Made Easy
Cyber Security and GDPR Made EasyCyber Security and GDPR Made Easy
Cyber Security and GDPR Made EasyChristoanSmit
 
Ce hv6 module 50 software piracy and warez
Ce hv6 module 50 software piracy and warezCe hv6 module 50 software piracy and warez
Ce hv6 module 50 software piracy and warezVi Tính Hoàng Nam
 
InformationSecurity.ppt
InformationSecurity.pptInformationSecurity.ppt
InformationSecurity.pptAnshikaGoel42
 
Law Firm Cybersecurity: Practical Tips for Protecting Your Data
Law Firm Cybersecurity: Practical Tips for Protecting Your DataLaw Firm Cybersecurity: Practical Tips for Protecting Your Data
Law Firm Cybersecurity: Practical Tips for Protecting Your DataAccellis Technology Group
 
Lect 9 - Intellectual Property Rights.ppt
Lect 9  - Intellectual Property Rights.pptLect 9  - Intellectual Property Rights.ppt
Lect 9 - Intellectual Property Rights.pptKISHOYIANKISH
 
Ch15 power point
Ch15 power pointCh15 power point
Ch15 power pointbodo-con
 
Computer Ethics_Satyajit Patil.pptx
Computer Ethics_Satyajit Patil.pptxComputer Ethics_Satyajit Patil.pptx
Computer Ethics_Satyajit Patil.pptxSATYAJIT58
 
Chapter 5 - Digital Security, Ethics, Privacy.pptx
Chapter 5 - Digital Security, Ethics, Privacy.pptxChapter 5 - Digital Security, Ethics, Privacy.pptx
Chapter 5 - Digital Security, Ethics, Privacy.pptxFannyKwok1
 
Cyber Security Awareness Month 2017-Nugget 6
Cyber Security Awareness Month 2017-Nugget 6Cyber Security Awareness Month 2017-Nugget 6
Cyber Security Awareness Month 2017-Nugget 6Chinatu Uzuegbu
 
Security and privacy
Security and privacySecurity and privacy
Security and privacyMohammed Adam
 
BAIT1003 Chapter 11
BAIT1003 Chapter 11BAIT1003 Chapter 11
BAIT1003 Chapter 11limsh
 

Similar to iGCSE Theory Unit 6 – Effects of Using ICT (20)

Ethics in IT and System Usage
Ethics in IT and System UsageEthics in IT and System Usage
Ethics in IT and System Usage
 
Cyber security awareness for end users
Cyber security awareness for end usersCyber security awareness for end users
Cyber security awareness for end users
 
Cyber Security and GDPR Made Easy
Cyber Security and GDPR Made EasyCyber Security and GDPR Made Easy
Cyber Security and GDPR Made Easy
 
Ce hv6 module 50 software piracy and warez
Ce hv6 module 50 software piracy and warezCe hv6 module 50 software piracy and warez
Ce hv6 module 50 software piracy and warez
 
Soft piracy
Soft piracySoft piracy
Soft piracy
 
Impacts of ICT on social effects
Impacts of ICT on social effectsImpacts of ICT on social effects
Impacts of ICT on social effects
 
InformationSecurity.ppt
InformationSecurity.pptInformationSecurity.ppt
InformationSecurity.ppt
 
Law Firm Cybersecurity: Practical Tips for Protecting Your Data
Law Firm Cybersecurity: Practical Tips for Protecting Your DataLaw Firm Cybersecurity: Practical Tips for Protecting Your Data
Law Firm Cybersecurity: Practical Tips for Protecting Your Data
 
Lect 9 - Intellectual Property Rights.ppt
Lect 9  - Intellectual Property Rights.pptLect 9  - Intellectual Property Rights.ppt
Lect 9 - Intellectual Property Rights.ppt
 
Ch15 power point
Ch15 power pointCh15 power point
Ch15 power point
 
Digital Self Defense (RRLC version)
Digital Self Defense (RRLC version)Digital Self Defense (RRLC version)
Digital Self Defense (RRLC version)
 
Computer Ethics_Satyajit Patil.pptx
Computer Ethics_Satyajit Patil.pptxComputer Ethics_Satyajit Patil.pptx
Computer Ethics_Satyajit Patil.pptx
 
Chapter 5 - Digital Security, Ethics, Privacy.pptx
Chapter 5 - Digital Security, Ethics, Privacy.pptxChapter 5 - Digital Security, Ethics, Privacy.pptx
Chapter 5 - Digital Security, Ethics, Privacy.pptx
 
Chap11
Chap11Chap11
Chap11
 
Security and privacy
Security and privacySecurity and privacy
Security and privacy
 
Chap11
Chap11Chap11
Chap11
 
Cyber Security Awareness Month 2017-Nugget 6
Cyber Security Awareness Month 2017-Nugget 6Cyber Security Awareness Month 2017-Nugget 6
Cyber Security Awareness Month 2017-Nugget 6
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Security and privacy
Security and privacySecurity and privacy
Security and privacy
 
BAIT1003 Chapter 11
BAIT1003 Chapter 11BAIT1003 Chapter 11
BAIT1003 Chapter 11
 

Recently uploaded

Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxDr. Sarita Anand
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Jisc
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxDr. Ravikiran H M Gowda
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibitjbellavia9
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptxMaritesTamaniVerdade
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsKarakKing
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxJisc
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17Celine George
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxPooja Bhuva
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...pradhanghanshyam7136
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the ClassroomPooky Knightsmith
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSCeline George
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxAmanpreet Kaur
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxCeline George
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxEsquimalt MFRC
 

Recently uploaded (20)

Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 

iGCSE Theory Unit 6 – Effects of Using ICT

  • 1. Unit 6 – Effects of using ICT Mr Spavin
  • 2. Google's Schmidt set to testify in smartphone trial • (Reuters) - Google's former chief executive, Eric Schmidt, is slated to testify on Tuesday as Oracle's final witness in the first part of a high stakes trial over smartphone technology, attorneys said in court. – Oracle sued Google in August 2010, saying Google's Android mobile operating system infringes its copyrights and patents for the Java programming language. Google countered that it does not violate Oracle's patents and that Oracle cannot copyright certain parts of Java, an "open-source," or publicly available, software language.
  • 3. Effects of using ICT • Intro • Software copyright • Viruses & Hacking • Effects of ICT on Society • Impact on Employment • Impact of using ICT for Online Shopping & banking • Should the internet be Policed? • Information from the internet • Internet Developments • Health & Safety issues
  • 4. Intro • The use of ICT has massively effected our everyday life in many ways… – Society in general – Employment – Services • However, in addition to providing new opportunities, ICT has introduced it’s own problem, such as issues… – Copyright – Security (companies and individuals) – Health and safety
  • 5. Software Copyright • Software is protected by copyright laws in much the same way as music CD’s, film DVD’s and articles from magazines and books are protected. • When software is supplied on CD or DVD there are certain rules that must be obeyed. – What are they?
  • 6. Rules • If you have bought a game on a CD in a shop and it is ok for you to make one copy to give to your friend.
  • 7. Rules Rules • If you have bought a game in a shop and have the CD it is ok for you to make one copy to sell to your friend.
  • 8. Rules Rules • It is not legal to make a software copy and then sell it or give it away to a friend.
  • 9. Rules • Software can be used on a network or used in multiple computers if you are able to download it from a web site.
  • 10. Rules • Software cannot be used on a network or used in multiple computers unless a licence has been acquired to allow this to happen.
  • 11. Rules • Software can be used on a network or used in multiple computers when a single licence has been acquired to allow this to happen.
  • 12. Rules • It is not legal to use coding from the copyright software in your own software and then pass this software on or sell it as your own without the permission of the copyright holders.
  • 13. Rules • It is legal to use just the coding from a web site in your own software.
  • 14. Rules • Renting out a purchased software package.
  • 15. Rules • Renting out a purchased software package without permission to do so is illegal.
  • 16. Rules • It is ok to use the name of another software package on your package as long as you don’t charge more than the original package.
  • 17. Rules • It is illegal to use the name of a copyrighted software on other software without agreement to do so.
  • 18. In what ways can we protect the software from piracy? • When the software is installed, the user will be asked to key in a unique reference number (a string of letters & numbers) which was supplied with the original copy • User will be advised to click OK or I Agree to the licence agreement • Original software comes with ta sticker informing the purchaser • Some software will only run if the original CD/DVD is in the drive • Some software will only run if a dongle is plugged in to one of the USB ports
  • 19. In what ways can we protect the software from piracy? • When the software is installed, the user will be asked to key in a unique reference number (a string of letters & numbers) which was supplied with the original copy • User will be advised to click OK or I Agree to the licence agreement • Original software comes with ta sticker informing the purchaser • Some software will only run if the original CD/DVD is in the drive • Some software will only run if a dongle is plugged in to one of the USB ports
  • 20. In what ways can we protect the software from piracy? • Using the internet please find two recent examples of software piracy. • Using the internet please find examples of piracy prevention. – Use these examples to explain the following: • Software is protected by copyright laws • When software is supplied on CD or DVD there are certain rules that must be obeyed. • In what ways can we protect the software from piracy?
  • 21. Why do People Create Computer Viruses? There are hundreds of thousands of viruses out there (if not millions) and they often designed for different objectives. Most of them fall under the following categories: • To take control of a computer and use it for specific tasks • To generate money • To steal sensitive information (credit card numbers, passwords, personal details, data etc.) • To prove a point, to prove it can be done, to prove ones skill or for revenge purposes • To cripple a computer or network
  • 22. Viruses & Hacking • What is a Virus? – A virus is a program that replicates (copies) itself and is designed to cause harm to a computer system. It often causes damage by attaching itself to files, leading to on or more of the following effects: • Causing the computer to crash • Loss of Files • Corruption of the data stored on files
  • 23. What is a Virus? • A computer virus is a computer program that can replicate itself and spread from one computer to another. – The term "virus" is also commonly, but erroneously used, to refer to other types of malware, including but not limited to adware and spyware programs that do not have a reproductive ability. – Viruses can increase their chances of spreading to other computers by infecting files on a network file system or a file system that is accessed by other computers.[
  • 24. 90 day global Threat… http://www.symantec.com/security_response/
  • 25. How do they infect computers? • Viruses infect computers through email attachments and through illegal software or downloading files from the internet that are infected. • Ways of protecting systems against Viruses: – Use up-to-date anti-virus software – Do not allow illegal software to be loaded onto a computer and do not use from an unknown source – Only download software/files from a reputable source – Use firewalls
  • 26. Hacking!!!!! • What methods could we use to minimise the risk of being hacked? • What is encryption?
  • 27. Encryption… • http://www.youtube.com/watch?v=3QnD2c4X ovk&feature • http://infoencrypt.com/
  • 28. encryption • is the process of transforming information (referred to as plaintext) using an algorithm (called a cipher) to make it unreadable to anyone except those possessing special knowledge, usually referred to as a key. The result of the process is encrypted information (in cryptography, referred to as ciphertext). The reverse process, i.e., to make the encrypted information readable again, is referred to as decryption (i.e., to make it unencrypted).[citation needed]
  • 29. Effects of ICT on Society • The impact on employment. – Their introduction has led to unemployment in many areas such as: • Manufacturing • Computer controlled warehouses • Labour-intensive work
  • 30. Impact on Employment • The introduction of ICT has led to unemployment in many areas such as: – Manufacturing, where robots have taken over many tasks (e.g. paint spraying in a car factory) • Example V – Computer controlled ware houses, which are automatic and require no personnel to be present. – Labour-intensive work (e.g. in the printing industry, checking football pools, filing, etc.). http://news.bbc.co.uk/local/tees/hi/people_and_places/newsid_9199000/9199115.stm
  • 32.
  • 34. Back to the future…
  • 35. Back to the future…
  • 37. Impact of using ICT for online shopping and banking • Advantages – No longer the need to travel into the town centre – Users now have access to a worldwide market
  • 38. Security Issues • Other security risks other than viruses and Hacking – Phishing – Pharming – Spam – Spyware
  • 39. Phishing • Phishing is a way of attempting to acquire information (and sometimes, indirectly, money) such as usernames, passwords, and credit card details by masquerading as a trustworthy entity in an electronic communication.
  • 40. Pharming • Pharming[p] is a hacker's attack intended to redirect a website's traffic to another, bogus site. Pharming can be conducted either by changing the hosts file on a victim's computer or by exploitation of a vulnerability in DNS server software. DNS servers are computers responsible for resolving Internet names into their real IP addresses. Compromised DNS servers are sometimes referred to as "poisoned". Pharming requires unprotected access to target a computer, such as altering a customer's home computer, rather than a corporate business server.
  • 41. Spam • Spam (its name a portmanteau of the words "Spiced" and "Ham")[1] is a canned precooked meat product made by the Hormel Foods Corporation, first introduced in 1937. The labelled ingredients in the classic variety of Spam are chopped pork shoulder meat, with ham meat added, salt, water, modified potato starch as a binder, and sodium nitrite as a preservative.
  • 42. Spyware • Spyware is a type of malware (malicious software) installed on computers that collects information about users without their knowledge. The presence of spyware is typically hidden from the user and can be difficult to detect. Spyware is often secretly installed on a user's personal computer without their knowledge. However, some spyware such as keyloggers may be installed by the owner of a shared, corporate, or public computer on purpose in order to intentionally monitor users. – Source: Wikipidia
  • 43. • http://www.symantec.com/podcasts/detail.js p?podid=b- may_state_of_spam_phishing_2011
  • 44. What are cookies? • Cookies are small files sent to a user’s computer via the web browser when they visit certain websites. They store information about the users and this data is accessed each time they visit the website. – They remember who the user is and send messages such as ‘Welcome Jon’ each time they log on to the website. – They recognise a user’s buying habits will appear on the users screen each time they visit the website. http://webdesign.about.com/od/cookies/a/aa083198.htm http://www.w3schools.com/js/tryit.asp?filename=tryjs_cookie_username
  • 45. Internet developments • Blogs – Personal internet journalists • Wikis – Software allowing users to easily create and edit web pages. • Digital media sharing websites – Allow uses to upload video clips and other media • Social networking sites – Building on-line communities of users that share the same interests • Folksonomies (http://delicious.com/) – Social bookmarking where a user can tag any webpage with words that describe it’s contents.
  • 46. Health & Safety • Health aspects • Safety aspects
  • 47. Health • Back & Neck problems/strain • Repetitive strain injury (RSI) – damage to fingers and wrists • Eyestrain (caused by staring at a computer screen for too long or bad lighting in the room) • Headaches • Zone irritation
  • 48. Safety • Electrocution • Trailing wires • Heavy equipment • Fire Risk