Information and Communication Technology
Primary and Secondary sources of information.
Copyright and Plagiarism
What is Fair Use?
Quality of life for disabled people
Special software and hardware for disabled people
Hacking and installing viruses
Computer Misuse Act
Environmental concerns of ICT
Internet security is a branch of computer security specifically involving browser security but also network security on a more general level.
Contents:
Intro...
Need..
Security Related Threats
-Hijacked web servers
-Denial-of-Service Attacks
-Cross Site Scripting
-Trap Doors
-Email Spoofing
Conclusions...
This presentation includes 60+ slides that mainly deals with three Computer Security aspects i.e
1. Security Attacks and Threats
2. Security Services
3. Security Mechanisms
Along with that we've also includes Security Awareness and Security Policies
Being aware of online and malware threats is the first step to computer security. In this presentation, we help you understand:
a. Importance of computer security
b. Consequences of ignoring computer security
c. Types of threats that can harm your computer
d. Measures to take to keep your computer safe
e. How can Quick Heal help
Information and Communication Technology
Primary and Secondary sources of information.
Copyright and Plagiarism
What is Fair Use?
Quality of life for disabled people
Special software and hardware for disabled people
Hacking and installing viruses
Computer Misuse Act
Environmental concerns of ICT
Internet security is a branch of computer security specifically involving browser security but also network security on a more general level.
Contents:
Intro...
Need..
Security Related Threats
-Hijacked web servers
-Denial-of-Service Attacks
-Cross Site Scripting
-Trap Doors
-Email Spoofing
Conclusions...
This presentation includes 60+ slides that mainly deals with three Computer Security aspects i.e
1. Security Attacks and Threats
2. Security Services
3. Security Mechanisms
Along with that we've also includes Security Awareness and Security Policies
Being aware of online and malware threats is the first step to computer security. In this presentation, we help you understand:
a. Importance of computer security
b. Consequences of ignoring computer security
c. Types of threats that can harm your computer
d. Measures to take to keep your computer safe
e. How can Quick Heal help
Computer Software and Operating SystemRupan Sharma
In this presentation we have described basic concept ofcomputer Software and operating system featurs, how they related to each other. Also we have described various types of computer software and operating system with examples and also their use. Some other aspects of computer software such as open source, copyright, licence and agreements are also described inthis slides.
Basic Computer Operations. Input: Information and programs are entered into the computer through Input devices such as the keyboard, disks, or through other computers via network connections or modems connected to the Internet.
A complete intoduction to Computer Software and Different types of Computer Software.
The Best ppt to any beginner to learn computer software.
thank you
This presentation is not mine so all credits go to Zubair Junjunia. I am sharing as this as it covers the whole content of paper 6 - Alternative to practical for CIE IGCSE Chemistry
but can be useful for paper 5 or other boards.
Computer Software and Operating SystemRupan Sharma
In this presentation we have described basic concept ofcomputer Software and operating system featurs, how they related to each other. Also we have described various types of computer software and operating system with examples and also their use. Some other aspects of computer software such as open source, copyright, licence and agreements are also described inthis slides.
Basic Computer Operations. Input: Information and programs are entered into the computer through Input devices such as the keyboard, disks, or through other computers via network connections or modems connected to the Internet.
A complete intoduction to Computer Software and Different types of Computer Software.
The Best ppt to any beginner to learn computer software.
thank you
This presentation is not mine so all credits go to Zubair Junjunia. I am sharing as this as it covers the whole content of paper 6 - Alternative to practical for CIE IGCSE Chemistry
but can be useful for paper 5 or other boards.
A Level Biology - Energy for Biological Processesmrexham
This is a free sample of a presentation that covers the whole of the topic energy for biological processes which includes respiration and photosynthesis.
It is written for the Edexcel Biology B specification but it will be suitable for most A Level courses.
This is a sheet designed to help you keep track of what you need to revise. Each student has strong and weak areas and this allows you to note down your errors when you make mistakes in tests or practice papers. Then when you come to revise again you know which areas to focus on.
ICT for Education, atau e-learning. Aspek sosio-technical dibahas. Kamu harus, harus, harus bicara pada mereka
dengan bahasa yang mereka tahu
- Anak semua bangsa, Pramoedya Ananta
Recent trends in 2014-15 in the IT field. Big shots from the major companies, including rumours of shift in focus to car manufacturing. Seamless integration between devices etc.
Theory & techniques for easily finding information online. A short course taken for people not familiar with advanced internet usage. If followed properly can make the most of technology and the Internet.
Discussed about computer malware and its types like virus, trojan horse, worms etc. and also discussed about antivirus and how an antivirus works. We have also discussed about types of viruses and some latest viruses like ransomware.
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
The Indian economy is classified into different sectors to simplify the analysis and understanding of economic activities. For Class 10, it's essential to grasp the sectors of the Indian economy, understand their characteristics, and recognize their importance. This guide will provide detailed notes on the Sectors of the Indian Economy Class 10, using specific long-tail keywords to enhance comprehension.
For more information, visit-www.vavaclasses.com
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxEduSkills OECD
Andreas Schleicher presents at the OECD webinar ‘Digital devices in schools: detrimental distraction or secret to success?’ on 27 May 2024. The presentation was based on findings from PISA 2022 results and the webinar helped launch the PISA in Focus ‘Managing screen time: How to protect and equip students against distraction’ https://www.oecd-ilibrary.org/education/managing-screen-time_7c225af4-en and the OECD Education Policy Perspective ‘Students, digital devices and success’ can be found here - https://oe.cd/il/5yV
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
This is a presentation by Dada Robert in a Your Skill Boost masterclass organised by the Excellence Foundation for South Sudan (EFSS) on Saturday, the 25th and Sunday, the 26th of May 2024.
He discussed the concept of quality improvement, emphasizing its applicability to various aspects of life, including personal, project, and program improvements. He defined quality as doing the right thing at the right time in the right way to achieve the best possible results and discussed the concept of the "gap" between what we know and what we do, and how this gap represents the areas we need to improve. He explained the scientific approach to quality improvement, which involves systematic performance analysis, testing and learning, and implementing change ideas. He also highlighted the importance of client focus and a team approach to quality improvement.
We all have good and bad thoughts from time to time and situation to situation. We are bombarded daily with spiraling thoughts(both negative and positive) creating all-consuming feel , making us difficult to manage with associated suffering. Good thoughts are like our Mob Signal (Positive thought) amidst noise(negative thought) in the atmosphere. Negative thoughts like noise outweigh positive thoughts. These thoughts often create unwanted confusion, trouble, stress and frustration in our mind as well as chaos in our physical world. Negative thoughts are also known as “distorted thinking”.
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
The Art Pastor's Guide to Sabbath | Steve ThomasonSteve Thomason
What is the purpose of the Sabbath Law in the Torah. It is interesting to compare how the context of the law shifts from Exodus to Deuteronomy. Who gets to rest, and why?
2. What is Software Copyright?
When someone creates an original piece of
software, that person then holds something called
the copyright for that software. (This is also true
when people create books, films and songs.)
Holding the copyright for software means that you
have the protection of the law if anyone tries to
steal your software.
3. Under copyright law, people must not:
Copy the software for other people
Lend the software to other people
Rent the software to other people
Install the software on a network where other users
can access it (unless it is a special ‘network’ version)
If someone breaks the copyright, they can be
punished by fines or even by imprisonment.
The reason for this is that creating software can
involve the work of many people and may take
thousands of hours. It is only fair that all of this
effort is protected
4. Software Piracy can be carried out…..
• When the software is being installed, the user will be
asked to key in a unique reference number which is
supplied with the original copy of the software.
• The user will be asked to click on OK/I Agree to the
license agreement before the software continues to
install.
• The original software comes with a sticker/hologram
stating that it is a genuine copy.
• Some software run only if the CD/DVD drive is attached
to the system.
• Some software run only if dongle(a type of storage
media) is plugged into one of the USB ports.
5. Introduction
• Computer virus have become today’s headline
news
• With the increasing use of the Internet, it has
become easier for virus to spread
• Virus show us loopholes in software
• Most virus are targeted at the MS Windows OS
6. Definition
Virus : A true virus is capable of self replication
on a machine. It may spread between files or
disks, but the defining character is that it can
recreate itself on it’s own with out traveling to a
new host.
• Is a piece of malicious program that can copy
itself and infect a computer without the
permission or knowledge of the user
7. Symptoms of Virus Attack
• Computer runs slower then usual
• Computer no longer boots up
• Screen sometimes flicker
• PC speaker beeps periodically
• System crashes for no reason
• Files/directories sometimes disappear
• Denial of Service (DoS)
8. • A virus runs first when a legitimate program is
executed.
• The virus loads itself into memory and looks to
see if it can find any other programs on the disk.
• If it can find one, it modifies it to add the virus's
code to the new program.
• Then the virus launches the "real program“.
Computer Virus – How they work?
9. • The user has no way to know that the virus ever ran.
• Unfortunately, the virus has now reproduced itself, so
two programs are infected.
• The next time either of those programs gets executed,
they infect other programs, and the cycle continues.
• When the infected program
▫ is distributed by
floppy disk
uploaded to a bulletin board
zipped and delivered as an executable.
10. • Install an updated Anti-Virus software.
• Stick with commercial software purchased on
CDs.
• Check the Computer for Virus frequently – Fix a
schedule for scanning your computer.
• Avoid programs from unknown sources (like the
Internet).
• Use firewalls to protect against virus
Protection and Prevention
11. What is Hacking?
• The word 'hacking' has several meanings, but in the
context of ICT, it is normally taken to as breaking in
to a computer system without legal authorisation.
12. Why Do Hackers Hack?
A hacker may break into a system –
• Out of curiosity
• For Challenge - can they get through the system’s defences?
• Because the data has value.
For example, if a hacker enters your computer and steals financial
information such as your credit card number, or the password to your
bank account, they could use that information to make purchases. If a lot
of information about you is stolen, a hacker could use this to impersonate
you on-line.
• They might apply for new credit cards, take out bank loans, buy cars, etc.
all in your name.
This is known as identity theft.
13. You should:
• Use strong passwords to protect your user login
account
• Never reveal your login password to anyone else
• Place a firewall between your computer and any
network
• Disconnect from networks when you are not using
them
• Encrypt any sensitive information (just in case they
get in)
14. Social Effects of ICT
• The personal computer (PC) was developed in the early
1980s. Before this date, computers were huge, expensive
machines that only a few, large businesses owned. Now PCs
are found on almost every desk in every office, all over the
world.
Because companies now have access to so much cheap,
reliable computing power, they have changed the way they
are organized and the way they operate. As a result, many
people’s jobs have changed...
15. Areas of Increased Unemployment
• Some jobs have been lost as a result of computers
being used to do the same work that people used to
do.
16. Some examples of areas have suffered job losses:
Manufacturing
• Many factories now have fully automated production
lines. Instead of using people to build things, computer-
controlled robots are used.
Robots can run day and night, never needing a break,
and don’t need to be paid! (Although the robots cost a
lot to purchase, in the long-term the factory saves
money.)
Secretarial Work
• Offices used to employee many secretaries to produce
the documents required for the business to run.
Now people have personal computers, they tend to type
and print their own documents.
17. Accounting Clerks
• Companies once had large departments full of
people whose job it was to do calculations (e.g.
profit, loss, billing, etc.)
A personal computer running a spreadsheet can now
do the same work.
Newspaper Printing
• It used to take a team of highly skilled printers to
typeset (layout) a newspaper page and to then print
thousands of newspapers.
The same task can now be performed far more
quickly using computers with DTP software and
computer-controlled printing presses.
18. Areas of Increased Employment
• Although many employment areas have suffered job
losses, other areas have grown and jobs have been
created.
Sometimes people who have lost their old job have
been able to re-train and get a new job in one of
these growth areas.
19. IT Technicians
• All of the computers in a business need to be
maintained: hardware fixed, software installed, etc.
IT technicians do this work.
Computer Programmers
• All of the software that is now used by businesses
has to be created by computer programmers.
Hundreds of thousands of people are now employed
in the 'software industry'
20. Web Designers
• Much of modern business is conducted on-line, and
company websites are very important.
Company websites need to be designed and built
which is the role of web designers.
Help-Desk Staff
• People often need help using computers, and
software applications.
Computer and software company have help-desks
staffed by trained operators who can give advice.
21. Microprocessor controlled Devices
used at homes
• Many common household devices are now fitted
with microprocessors to control large number of
their functions.
• They can be Labour saving devices – like
Washing Machines, Ovens and Dishwashers or
Other devices like Televisions, Fridge, Freezers
and Central Heating systems.
22. Advantages
• They lead to more leisure time
since the devices can be
programmed to do the tasks
• People get more time to
socialise.
• People have become
sophisticated and make use of
embedded web technology
• Energy gets saved as it gets
switched of automatically
• Easier to operate than work
manually
Disadvantages
• Can lead to unhealthy diets
• Leads to more waste as
devices are thrown away as
they are not economic for
repair.
• Does not help people who
are not tech savvy
• Leads to waste of resources
24. Phishing
• Phishing – is a fraudulent operation involving
the use of Emails.
• The sender sends a legitimate-looking email,
hoping to gather personal and financial
information from the recipient of the email.
• As soon as the user clicks on the link they are
sent to a spoof website and asked for credit card
details, PIN’s etc.
• Phishing could lead to identity theft.
25. Pharming
• Pharming is a scam in which malicious code is
installed on a computer hard disk or server.
• This code has the ability to direct the user to
fraudulent sites without their knowledge or
consent.
• Pharming targets a much larger group of people
more easily.
26. Spam
• Spam is an electronic junk mail.
• It is a type of advertising from a computer sent
out to a target mailing list.
• It is usually harmless but can clog up the
networks slowing them down or fill up the user’s
mailbox
27. Spyware
• Spyware is a software that gathers user
information through network connections
without their knowledge.
• Once spyware is installed it monitors all the key
presses and transmits the information to the
spyware sender.
• This software also has the ability to install other
spyware software's.
28. What is Web 2.0?
• The original World-Wide Web ('The Web', WWW, or 'Web
1.0') was a collection of mostly static websites that published
information. You could visit the sites, read the web pages,
look at the pictures, but you couldn't really interact with the
site: you couldn't login, leave comments, tag images, discuss
things, etc. The original Web was a mostly one-way
experience where information was delivered to you.
'Web 2.0' (pronounced "web two-point-oh") name given to
the recent development of interactive websites that are quite
different to the old, static websites.
INTERNET DEVELOPMENTS
29. • Many websites on the Web today allow users to:
share information (e.g. notes and photos on Facebook)
• interact (add comments, chat, etc.)
• collaborate on content (e.g. creating pages on
Wikipedia)
• create their own content (e.g. videos on YouTube)
• Web 2.0 is often called the 'Social Web' because of the
way that users can interact and share. It's also been
called the 'Read-Write Web' because much of the
content is now written by users
30. Blogs and Blogging
• A blog is a website where someone (usually a normal person - not a
professional writer) writes about a topic.
Blogs can be personal (someone writing about their own life, or
their personal views), based on an interest (e.g. football), or some
businesses also use blogs to write about new products, etc.
• A blog allows someone to be a writer and publisher on the Web
with very little effort or cost. A blog can be setup with just a few
clicks, whereas a few years ago you'd need a lot of technical
knowledge to create your own website.
• Each entry on a blog is called a post.
• One form of blogging, where people publish very short posts,
is known as 'Micro-blogging'.
The most well-known micro-blog is Twitter.
31. Wikis
• A wiki is a website that allows users to collaborate (work
together) to create the content. The pages of a wiki can be
edited by everyone (or those who have the password) so that
different people can add to the page, edit things, fix errors,
etc.
• Wikis often automatically create automatic links between
pages. E.g. if a wiki page exists called 'Camels' and you write
the word 'camel', the word will become a link to the Camel
page. This feature means that wikis are very useful for
creating sites containing lots of connected information
•Wikis are used for websites such as:
Encyclopaedia (e.g. Wikipedia)
Help sites
32. Media Uploading Sites
• There are many websites that allow users to create,
upload and share their own media such as photos,
music or video. Usually other users can rate or
comment on the media that is uploaded leading to
these sites often being referred to as 'Social Media'
sites.
All media upload sites have rules about the type of
media that you can upload - you have to either own
the copyright to the image / music / video yourself,
or have permission from the copyright owner
33. Social Networks
• A social network website is a site that allows user to
connect with other users who are friends / relatives,
or who share similar interests.
Connected users can then share information /
pictures / files with each other, send messages, chat,
etc.
34. Folksomonies
• Folksomonies are closely related to tagging and
literally means ‘management of people’.
• Tagging is a type of social bookmarking where a
user can tag any webpage with words that
highlight the content of the page.
• All users can view and benefit from it.
• Example - Flickr
35. Internet Use Issues
• The Internet and World Wide Web are a fantastic
resource for finding and sharing information. The
Web contains literally billions of web pages
containing information about every topic imaginable.
However we need to take care when using the
Internet to look for information, or to send
information...
36. Reliability of Information
• The Internet and Web are not regulated - there is no
organisation that controls who can create web pages or what
those pages can contain. Anyone can create web pages and
say anything they want to.
• In many ways this is a good thing. It means that corrupt
organisations or governments, who have always been able to hide
details of their activities, are no longer able to do so. When bad
things happen, people write about it on the Web and the world
gets to know, and hopefully do something about it.
• But it’s also a bad thing. It means that people or organisations can
easily spread lies and hatred. There are thousands of websites
containing bigoted viewpoints, and thousands more that are full of
information that is biased, inaccurate, or just plain wrong
37. • So... how do you know which web pages to believe,
which information to trust?
Check several sources of information (go to lots of
different websites). If they all say them same thing, it
is likely to be true
• Stick to websites that belong to trusted
organisations. If the website address ends in .gov.uk
(the UK government site) it is more likely to be
reliable
• Look at the spelling and grammar used. Reliable
websites are usually checked for errors. Too many
spelling errors mean it’s probably not to be trusted.
38. Undesirable Information
• In addition to the Web being full of websites with inaccurate
information, there are also a huge number of websites that
contain highly offensive, or illegal material
• Avoiding this type of material can be tricky. Many
organisations such as schools, some governments (e.g. for
religious reasons), and also many parents, make use of web
page filtering software. This software attempts to prevent
offensive and illegal material being accessed.
39. Security of Data Transferred Using the
Internet
• As has been discussed already, you should always
consider encrypting any sensitive or personal data that
is sent or accessed over a public network such as The
Internet.
• Many websites, especially online shopping or online
banking sites, require you to enter personal information,
such as credit card numbers, social security IDs, etc. To
make sure your data is safe, these websites use
encryption - they are called secure websites.
40. Safety Issues with ICT
• You wouldn't imagine that using computers could be
dangerous, but there are a few situations that can result
in accidents...
Trailing Cables
• Computer equipment is often connected to lots of
cables: power, network, etc.
If these cables are laying on the floor, they can cause
people to trip over them
Solution: Place cables inside cable ducts, or under the
carpet / flooring
41. Spilt Drinks or Food
• If any liquids are spilt on electrical equipment, such
a s a computer, it can result in damage to the
equipment, or an electric shock to the user.
Solution: Keep drinks and food away from computers
42. Overloaded Power Sockets
• Plugging too many power cables into a socket can
result in the socket being overloaded, overheating,
and a fire starting.
Solution: Never plug too many cables into a socket.
Always make sure there are fire extinguishers nearby
43. Heavy Objects Falling
• Many items of computer equipment are very heavy:
CRT monitors, laser printers etc. Heavy items can
cause serious injury if they fall on people.
Solution: Make sure equipment is placed on strong
tables / shelves
44. Health Effects of ICT
If we use a computer for many hours (as people often do at
work), there are some health issues that might affect
us...
Eye-Strain
• One health issue that can occur after using computers
for a long time is eye-strain (tiredness of the eyes).
This is caused by looking at a monitor which is a
constant distance away. The muscles that focus your
eyes do not move, and so get tired and painful. Eye-
strain can also cause headaches
45. • This problem can be solved:
Look away from the monitor at regular intervals –
re-focus on distant or close objects to exercise the
muscles in the eye.
• Take regular breaks.
• Use an anti-glare filter in front of the monitor to cut
down on screen reflections that can also tire the
eyes.
46. Back and Neck Ache
• Many people suffer from back and neck pain after
working at a computer for a long time. This is usually
due to them having a bad sitting posture.
47. • This problem can be solved:
Use an adjustable, ergonomic chair, and take the
time to set it up properly.
• The computer keyboard and monitor should be at
the correct height for the seated person (keyboard
lower than the elbow, top of monitor at eye level).
• Take regular breaks: get up, walk around, stretch
48. Repetitive Strain Injury (RSI) in Wrists
• Any repetitive movement (same movement over and
over again) can result in a health problem called
repetitive strain injury (RSI).
In particular typing and using a mouse for long
periods are common causes of RSI in the wrist
49. • This problem can be solved:
Use a wrist-rest to support the wrists while typing
and when using the mouse.
• Take regular breaks from typing or using the mouse.