SlideShare a Scribd company logo
Effects of ICT on Society
What is Software Copyright?
When someone creates an original piece of
software, that person then holds something called
the copyright for that software. (This is also true
when people create books, films and songs.)
Holding the copyright for software means that you
have the protection of the law if anyone tries to
steal your software.
Under copyright law, people must not:
Copy the software for other people
Lend the software to other people
Rent the software to other people
Install the software on a network where other users
can access it (unless it is a special ‘network’ version)
If someone breaks the copyright, they can be
punished by fines or even by imprisonment.
The reason for this is that creating software can
involve the work of many people and may take
thousands of hours. It is only fair that all of this
effort is protected
Software Piracy can be carried out…..
• When the software is being installed, the user will be
asked to key in a unique reference number which is
supplied with the original copy of the software.
• The user will be asked to click on OK/I Agree to the
license agreement before the software continues to
install.
• The original software comes with a sticker/hologram
stating that it is a genuine copy.
• Some software run only if the CD/DVD drive is attached
to the system.
• Some software run only if dongle(a type of storage
media) is plugged into one of the USB ports.
Introduction
• Computer virus have become today’s headline
news
• With the increasing use of the Internet, it has
become easier for virus to spread
• Virus show us loopholes in software
• Most virus are targeted at the MS Windows OS
Definition
Virus : A true virus is capable of self replication
on a machine. It may spread between files or
disks, but the defining character is that it can
recreate itself on it’s own with out traveling to a
new host.
• Is a piece of malicious program that can copy
itself and infect a computer without the
permission or knowledge of the user
Symptoms of Virus Attack
• Computer runs slower then usual
• Computer no longer boots up
• Screen sometimes flicker
• PC speaker beeps periodically
• System crashes for no reason
• Files/directories sometimes disappear
• Denial of Service (DoS)
• A virus runs first when a legitimate program is
executed.
• The virus loads itself into memory and looks to
see if it can find any other programs on the disk.
• If it can find one, it modifies it to add the virus's
code to the new program.
• Then the virus launches the "real program“.
Computer Virus – How they work?
• The user has no way to know that the virus ever ran.
• Unfortunately, the virus has now reproduced itself, so
two programs are infected.
• The next time either of those programs gets executed,
they infect other programs, and the cycle continues.
• When the infected program
▫ is distributed by
 floppy disk
 uploaded to a bulletin board
 zipped and delivered as an executable.
• Install an updated Anti-Virus software.
• Stick with commercial software purchased on
CDs.
• Check the Computer for Virus frequently – Fix a
schedule for scanning your computer.
• Avoid programs from unknown sources (like the
Internet).
• Use firewalls to protect against virus
Protection and Prevention
What is Hacking?
• The word 'hacking' has several meanings, but in the
context of ICT, it is normally taken to as breaking in
to a computer system without legal authorisation.
Why Do Hackers Hack?
A hacker may break into a system –
• Out of curiosity
• For Challenge - can they get through the system’s defences?
• Because the data has value.
For example, if a hacker enters your computer and steals financial
information such as your credit card number, or the password to your
bank account, they could use that information to make purchases. If a lot
of information about you is stolen, a hacker could use this to impersonate
you on-line.
• They might apply for new credit cards, take out bank loans, buy cars, etc.
all in your name.
This is known as identity theft.
You should:
• Use strong passwords to protect your user login
account
• Never reveal your login password to anyone else
• Place a firewall between your computer and any
network
• Disconnect from networks when you are not using
them
• Encrypt any sensitive information (just in case they
get in)
Social Effects of ICT
• The personal computer (PC) was developed in the early
1980s. Before this date, computers were huge, expensive
machines that only a few, large businesses owned. Now PCs
are found on almost every desk in every office, all over the
world.
Because companies now have access to so much cheap,
reliable computing power, they have changed the way they
are organized and the way they operate. As a result, many
people’s jobs have changed...
Areas of Increased Unemployment
• Some jobs have been lost as a result of computers
being used to do the same work that people used to
do.
Some examples of areas have suffered job losses:
Manufacturing
• Many factories now have fully automated production
lines. Instead of using people to build things, computer-
controlled robots are used.
Robots can run day and night, never needing a break,
and don’t need to be paid! (Although the robots cost a
lot to purchase, in the long-term the factory saves
money.)
Secretarial Work
• Offices used to employee many secretaries to produce
the documents required for the business to run.
Now people have personal computers, they tend to type
and print their own documents.
Accounting Clerks
• Companies once had large departments full of
people whose job it was to do calculations (e.g.
profit, loss, billing, etc.)
A personal computer running a spreadsheet can now
do the same work.
Newspaper Printing
• It used to take a team of highly skilled printers to
typeset (layout) a newspaper page and to then print
thousands of newspapers.
The same task can now be performed far more
quickly using computers with DTP software and
computer-controlled printing presses.
Areas of Increased Employment
• Although many employment areas have suffered job
losses, other areas have grown and jobs have been
created.
Sometimes people who have lost their old job have
been able to re-train and get a new job in one of
these growth areas.
IT Technicians
• All of the computers in a business need to be
maintained: hardware fixed, software installed, etc.
IT technicians do this work.
Computer Programmers
• All of the software that is now used by businesses
has to be created by computer programmers.
Hundreds of thousands of people are now employed
in the 'software industry'
Web Designers
• Much of modern business is conducted on-line, and
company websites are very important.
Company websites need to be designed and built
which is the role of web designers.
Help-Desk Staff
• People often need help using computers, and
software applications.
Computer and software company have help-desks
staffed by trained operators who can give advice.
Microprocessor controlled Devices
used at homes
• Many common household devices are now fitted
with microprocessors to control large number of
their functions.
• They can be Labour saving devices – like
Washing Machines, Ovens and Dishwashers or
Other devices like Televisions, Fridge, Freezers
and Central Heating systems.
Advantages
• They lead to more leisure time
since the devices can be
programmed to do the tasks
• People get more time to
socialise.
• People have become
sophisticated and make use of
embedded web technology
• Energy gets saved as it gets
switched of automatically
• Easier to operate than work
manually
Disadvantages
• Can lead to unhealthy diets
• Leads to more waste as
devices are thrown away as
they are not economic for
repair.
• Does not help people who
are not tech savvy
• Leads to waste of resources
Security Issues
Phishing
• Phishing – is a fraudulent operation involving
the use of Emails.
• The sender sends a legitimate-looking email,
hoping to gather personal and financial
information from the recipient of the email.
• As soon as the user clicks on the link they are
sent to a spoof website and asked for credit card
details, PIN’s etc.
• Phishing could lead to identity theft.
Pharming
• Pharming is a scam in which malicious code is
installed on a computer hard disk or server.
• This code has the ability to direct the user to
fraudulent sites without their knowledge or
consent.
• Pharming targets a much larger group of people
more easily.
Spam
• Spam is an electronic junk mail.
• It is a type of advertising from a computer sent
out to a target mailing list.
• It is usually harmless but can clog up the
networks slowing them down or fill up the user’s
mailbox
Spyware
• Spyware is a software that gathers user
information through network connections
without their knowledge.
• Once spyware is installed it monitors all the key
presses and transmits the information to the
spyware sender.
• This software also has the ability to install other
spyware software's.
What is Web 2.0?
• The original World-Wide Web ('The Web', WWW, or 'Web
1.0') was a collection of mostly static websites that published
information. You could visit the sites, read the web pages,
look at the pictures, but you couldn't really interact with the
site: you couldn't login, leave comments, tag images, discuss
things, etc. The original Web was a mostly one-way
experience where information was delivered to you.
'Web 2.0' (pronounced "web two-point-oh") name given to
the recent development of interactive websites that are quite
different to the old, static websites.
INTERNET DEVELOPMENTS
• Many websites on the Web today allow users to:
share information (e.g. notes and photos on Facebook)
• interact (add comments, chat, etc.)
• collaborate on content (e.g. creating pages on
Wikipedia)
• create their own content (e.g. videos on YouTube)
• Web 2.0 is often called the 'Social Web' because of the
way that users can interact and share. It's also been
called the 'Read-Write Web' because much of the
content is now written by users
Blogs and Blogging
• A blog is a website where someone (usually a normal person - not a
professional writer) writes about a topic.
Blogs can be personal (someone writing about their own life, or
their personal views), based on an interest (e.g. football), or some
businesses also use blogs to write about new products, etc.
• A blog allows someone to be a writer and publisher on the Web
with very little effort or cost. A blog can be setup with just a few
clicks, whereas a few years ago you'd need a lot of technical
knowledge to create your own website.
• Each entry on a blog is called a post.
• One form of blogging, where people publish very short posts,
is known as 'Micro-blogging'.
The most well-known micro-blog is Twitter.
Wikis
• A wiki is a website that allows users to collaborate (work
together) to create the content. The pages of a wiki can be
edited by everyone (or those who have the password) so that
different people can add to the page, edit things, fix errors,
etc.
• Wikis often automatically create automatic links between
pages. E.g. if a wiki page exists called 'Camels' and you write
the word 'camel', the word will become a link to the Camel
page. This feature means that wikis are very useful for
creating sites containing lots of connected information
•Wikis are used for websites such as:
Encyclopaedia (e.g. Wikipedia)
Help sites
Media Uploading Sites
• There are many websites that allow users to create,
upload and share their own media such as photos,
music or video. Usually other users can rate or
comment on the media that is uploaded leading to
these sites often being referred to as 'Social Media'
sites.
All media upload sites have rules about the type of
media that you can upload - you have to either own
the copyright to the image / music / video yourself,
or have permission from the copyright owner
Social Networks
• A social network website is a site that allows user to
connect with other users who are friends / relatives,
or who share similar interests.
Connected users can then share information /
pictures / files with each other, send messages, chat,
etc.
Folksomonies
• Folksomonies are closely related to tagging and
literally means ‘management of people’.
• Tagging is a type of social bookmarking where a
user can tag any webpage with words that
highlight the content of the page.
• All users can view and benefit from it.
• Example - Flickr
Internet Use Issues
• The Internet and World Wide Web are a fantastic
resource for finding and sharing information. The
Web contains literally billions of web pages
containing information about every topic imaginable.
However we need to take care when using the
Internet to look for information, or to send
information...
Reliability of Information
• The Internet and Web are not regulated - there is no
organisation that controls who can create web pages or what
those pages can contain. Anyone can create web pages and
say anything they want to.
• In many ways this is a good thing. It means that corrupt
organisations or governments, who have always been able to hide
details of their activities, are no longer able to do so. When bad
things happen, people write about it on the Web and the world
gets to know, and hopefully do something about it.
• But it’s also a bad thing. It means that people or organisations can
easily spread lies and hatred. There are thousands of websites
containing bigoted viewpoints, and thousands more that are full of
information that is biased, inaccurate, or just plain wrong
• So... how do you know which web pages to believe,
which information to trust?
Check several sources of information (go to lots of
different websites). If they all say them same thing, it
is likely to be true
• Stick to websites that belong to trusted
organisations. If the website address ends in .gov.uk
(the UK government site) it is more likely to be
reliable
• Look at the spelling and grammar used. Reliable
websites are usually checked for errors. Too many
spelling errors mean it’s probably not to be trusted.
Undesirable Information
• In addition to the Web being full of websites with inaccurate
information, there are also a huge number of websites that
contain highly offensive, or illegal material
• Avoiding this type of material can be tricky. Many
organisations such as schools, some governments (e.g. for
religious reasons), and also many parents, make use of web
page filtering software. This software attempts to prevent
offensive and illegal material being accessed.
Security of Data Transferred Using the
Internet
• As has been discussed already, you should always
consider encrypting any sensitive or personal data that
is sent or accessed over a public network such as The
Internet.
• Many websites, especially online shopping or online
banking sites, require you to enter personal information,
such as credit card numbers, social security IDs, etc. To
make sure your data is safe, these websites use
encryption - they are called secure websites.
Safety Issues with ICT
• You wouldn't imagine that using computers could be
dangerous, but there are a few situations that can result
in accidents...
Trailing Cables
• Computer equipment is often connected to lots of
cables: power, network, etc.
If these cables are laying on the floor, they can cause
people to trip over them
Solution: Place cables inside cable ducts, or under the
carpet / flooring
Spilt Drinks or Food
• If any liquids are spilt on electrical equipment, such
a s a computer, it can result in damage to the
equipment, or an electric shock to the user.
Solution: Keep drinks and food away from computers
Overloaded Power Sockets
• Plugging too many power cables into a socket can
result in the socket being overloaded, overheating,
and a fire starting.
Solution: Never plug too many cables into a socket.
Always make sure there are fire extinguishers nearby
Heavy Objects Falling
• Many items of computer equipment are very heavy:
CRT monitors, laser printers etc. Heavy items can
cause serious injury if they fall on people.
Solution: Make sure equipment is placed on strong
tables / shelves
Health Effects of ICT
If we use a computer for many hours (as people often do at
work), there are some health issues that might affect
us...
Eye-Strain
• One health issue that can occur after using computers
for a long time is eye-strain (tiredness of the eyes).
This is caused by looking at a monitor which is a
constant distance away. The muscles that focus your
eyes do not move, and so get tired and painful. Eye-
strain can also cause headaches
• This problem can be solved:
Look away from the monitor at regular intervals –
re-focus on distant or close objects to exercise the
muscles in the eye.
• Take regular breaks.
• Use an anti-glare filter in front of the monitor to cut
down on screen reflections that can also tire the
eyes.
Back and Neck Ache
• Many people suffer from back and neck pain after
working at a computer for a long time. This is usually
due to them having a bad sitting posture.
• This problem can be solved:
Use an adjustable, ergonomic chair, and take the
time to set it up properly.
• The computer keyboard and monitor should be at
the correct height for the seated person (keyboard
lower than the elbow, top of monitor at eye level).
• Take regular breaks: get up, walk around, stretch
Repetitive Strain Injury (RSI) in Wrists
• Any repetitive movement (same movement over and
over again) can result in a health problem called
repetitive strain injury (RSI).
In particular typing and using a mouse for long
periods are common causes of RSI in the wrist
• This problem can be solved:
Use a wrist-rest to support the wrists while typing
and when using the mouse.
• Take regular breaks from typing or using the mouse.

More Related Content

What's hot

Computer Software and Operating System
Computer Software and Operating SystemComputer Software and Operating System
Computer Software and Operating System
Rupan Sharma
 
Computer networking
Computer networking Computer networking
Computer networking
Sukrant Chandna
 
iGCSE Theory Unit 6 – Effects of Using ICT
iGCSE Theory Unit 6 – Effects of Using ICTiGCSE Theory Unit 6 – Effects of Using ICT
iGCSE Theory Unit 6 – Effects of Using ICT
jonspav
 
Introduction to computer Powerpoint Presentation
Introduction to computer Powerpoint PresentationIntroduction to computer Powerpoint Presentation
Introduction to computer Powerpoint Presentation
Jibin Sr. Plamoottukada
 
Basic operation of computer
Basic operation of computerBasic operation of computer
Computer hardware component. ppt
Computer hardware component. pptComputer hardware component. ppt
Computer hardware component. pptNaveen Sihag
 
Processing Devices
Processing DevicesProcessing Devices
Processing Devices
itsvineeth209
 
COMPUTER MEMORY : TYPES & FUNCTIONS
COMPUTER MEMORY : TYPES & FUNCTIONSCOMPUTER MEMORY : TYPES & FUNCTIONS
COMPUTER MEMORY : TYPES & FUNCTIONS
Angel Mary George
 
Computer Software & It's types.
Computer Software &  It's types.Computer Software &  It's types.
Computer Software & It's types.
Mohit Dhankher
 
Basics of Networks ,Advantages and Disadvantages
Basics of  Networks ,Advantages and DisadvantagesBasics of  Networks ,Advantages and Disadvantages
Basics of Networks ,Advantages and Disadvantages
sabari Giri
 
Networking Fundamentals
Networking  FundamentalsNetworking  Fundamentals
Networking Fundamentals
Manjit Chavda
 
SECURITY PROTOCOLS.ppt
SECURITY PROTOCOLS.pptSECURITY PROTOCOLS.ppt
SECURITY PROTOCOLS.ppt
DimpyJindal4
 
Impact of computers on society
Impact of computers on societyImpact of computers on society
Impact of computers on society
Middle East International School
 
computer and society impact of Computer in society
computer and society  impact of Computer in society computer and society  impact of Computer in society
computer and society impact of Computer in society
Sumama Shakir
 
Powerpoint presentation on internet and its uses
Powerpoint presentation on internet and its usesPowerpoint presentation on internet and its uses
Powerpoint presentation on internet and its usessumitsc
 
Introduction to network
Introduction to networkIntroduction to network
Introduction to network
Dhani Ahmad
 
How to install windows 10
How to install windows 10How to install windows 10
How to install windows 10
Annu Ahmed
 
Access and use internet
Access and use internetAccess and use internet
Access and use internet
Gera Paulos
 

What's hot (20)

Computer Software and Operating System
Computer Software and Operating SystemComputer Software and Operating System
Computer Software and Operating System
 
Computer networking
Computer networking Computer networking
Computer networking
 
iGCSE Theory Unit 6 – Effects of Using ICT
iGCSE Theory Unit 6 – Effects of Using ICTiGCSE Theory Unit 6 – Effects of Using ICT
iGCSE Theory Unit 6 – Effects of Using ICT
 
Introduction to computer Powerpoint Presentation
Introduction to computer Powerpoint PresentationIntroduction to computer Powerpoint Presentation
Introduction to computer Powerpoint Presentation
 
Network security
Network securityNetwork security
Network security
 
Basic operation of computer
Basic operation of computerBasic operation of computer
Basic operation of computer
 
Computer hardware component. ppt
Computer hardware component. pptComputer hardware component. ppt
Computer hardware component. ppt
 
Processing Devices
Processing DevicesProcessing Devices
Processing Devices
 
COMPUTER MEMORY : TYPES & FUNCTIONS
COMPUTER MEMORY : TYPES & FUNCTIONSCOMPUTER MEMORY : TYPES & FUNCTIONS
COMPUTER MEMORY : TYPES & FUNCTIONS
 
Computer Software & It's types.
Computer Software &  It's types.Computer Software &  It's types.
Computer Software & It's types.
 
Basics of Networks ,Advantages and Disadvantages
Basics of  Networks ,Advantages and DisadvantagesBasics of  Networks ,Advantages and Disadvantages
Basics of Networks ,Advantages and Disadvantages
 
Networking Fundamentals
Networking  FundamentalsNetworking  Fundamentals
Networking Fundamentals
 
SECURITY PROTOCOLS.ppt
SECURITY PROTOCOLS.pptSECURITY PROTOCOLS.ppt
SECURITY PROTOCOLS.ppt
 
Impact of computers on society
Impact of computers on societyImpact of computers on society
Impact of computers on society
 
computer and society impact of Computer in society
computer and society  impact of Computer in society computer and society  impact of Computer in society
computer and society impact of Computer in society
 
5 pc maintenance
5 pc maintenance5 pc maintenance
5 pc maintenance
 
Powerpoint presentation on internet and its uses
Powerpoint presentation on internet and its usesPowerpoint presentation on internet and its uses
Powerpoint presentation on internet and its uses
 
Introduction to network
Introduction to networkIntroduction to network
Introduction to network
 
How to install windows 10
How to install windows 10How to install windows 10
How to install windows 10
 
Access and use internet
Access and use internetAccess and use internet
Access and use internet
 

Viewers also liked

CIE IGCSE Chemistry - Paper 6 flashcards
CIE IGCSE Chemistry - Paper 6 flashcardsCIE IGCSE Chemistry - Paper 6 flashcards
CIE IGCSE Chemistry - Paper 6 flashcards
Samiya
 
IGCSE Biology Revision Quiz - Organisms and Life Processes
IGCSE Biology Revision Quiz - Organisms and Life ProcessesIGCSE Biology Revision Quiz - Organisms and Life Processes
IGCSE Biology Revision Quiz - Organisms and Life Processesmrexham
 
Guide to Cambridge Pre-U Biology
Guide to Cambridge Pre-U BiologyGuide to Cambridge Pre-U Biology
Guide to Cambridge Pre-U Biology
mrexham
 
A Level Biology - Energy for Biological Processes
A Level Biology - Energy for Biological ProcessesA Level Biology - Energy for Biological Processes
A Level Biology - Energy for Biological Processes
mrexham
 
Chapter 7 the ways-in_which_is_ict_is_used[1]
Chapter 7   the ways-in_which_is_ict_is_used[1]Chapter 7   the ways-in_which_is_ict_is_used[1]
Chapter 7 the ways-in_which_is_ict_is_used[1]Pratik Gupta
 
Mr Exham - Revision Tracker Sheet
Mr Exham - Revision Tracker SheetMr Exham - Revision Tracker Sheet
Mr Exham - Revision Tracker Sheet
mrexham
 
Impact of ICT
Impact of ICTImpact of ICT
Impact of ICT
akshayniraj
 
Chapter 4 computer networks
Chapter 4   computer networksChapter 4   computer networks
Chapter 4 computer networksPratik Gupta
 
Chapter 8 system analysis and design
Chapter 8   system analysis and designChapter 8   system analysis and design
Chapter 8 system analysis and designPratik Gupta
 
Impact Of Ict In Society
Impact Of Ict In SocietyImpact Of Ict In Society
Impact Of Ict In Society
kerjait
 
ICT for Education
ICT for EducationICT for Education
ICT for Education
Widy Widyawan
 
Safety issues with ict
Safety issues with ictSafety issues with ict
Safety issues with ictcomputers 11
 
Social impact of ICT innovations
Social impact of ICT innovationsSocial impact of ICT innovations
Social impact of ICT innovations
CA
 
0625 s09 qp_3
0625 s09 qp_30625 s09 qp_3
0625 s09 qp_3King Ali
 
Spn year 7 notes
Spn year 7 notesSpn year 7 notes
Spn year 7 noteslatifah2001
 
Cartoon
CartoonCartoon
Cartoon
Waney Jelihi
 
13. comics, cartoons and animation
13. comics, cartoons and animation13. comics, cartoons and animation
13. comics, cartoons and animation
kamila_fraser
 
IGCSE ICT 0417 P2 Document Production
IGCSE ICT 0417 P2 Document ProductionIGCSE ICT 0417 P2 Document Production
IGCSE ICT 0417 P2 Document Production
Shamir George
 

Viewers also liked (20)

CIE IGCSE Chemistry - Paper 6 flashcards
CIE IGCSE Chemistry - Paper 6 flashcardsCIE IGCSE Chemistry - Paper 6 flashcards
CIE IGCSE Chemistry - Paper 6 flashcards
 
IGCSE Biology Revision Quiz - Organisms and Life Processes
IGCSE Biology Revision Quiz - Organisms and Life ProcessesIGCSE Biology Revision Quiz - Organisms and Life Processes
IGCSE Biology Revision Quiz - Organisms and Life Processes
 
Guide to Cambridge Pre-U Biology
Guide to Cambridge Pre-U BiologyGuide to Cambridge Pre-U Biology
Guide to Cambridge Pre-U Biology
 
A Level Biology - Energy for Biological Processes
A Level Biology - Energy for Biological ProcessesA Level Biology - Energy for Biological Processes
A Level Biology - Energy for Biological Processes
 
GCSE AQA BIOLOGY UNIT 2
GCSE AQA BIOLOGY UNIT 2GCSE AQA BIOLOGY UNIT 2
GCSE AQA BIOLOGY UNIT 2
 
Chapter 7 the ways-in_which_is_ict_is_used[1]
Chapter 7   the ways-in_which_is_ict_is_used[1]Chapter 7   the ways-in_which_is_ict_is_used[1]
Chapter 7 the ways-in_which_is_ict_is_used[1]
 
Mr Exham - Revision Tracker Sheet
Mr Exham - Revision Tracker SheetMr Exham - Revision Tracker Sheet
Mr Exham - Revision Tracker Sheet
 
Impact of ICT
Impact of ICTImpact of ICT
Impact of ICT
 
Chapter 4 computer networks
Chapter 4   computer networksChapter 4   computer networks
Chapter 4 computer networks
 
Chapter 8 system analysis and design
Chapter 8   system analysis and designChapter 8   system analysis and design
Chapter 8 system analysis and design
 
Impact Of Ict In Society
Impact Of Ict In SocietyImpact Of Ict In Society
Impact Of Ict In Society
 
ICT for Education
ICT for EducationICT for Education
ICT for Education
 
Safety issues with ict
Safety issues with ictSafety issues with ict
Safety issues with ict
 
Social impact of ICT innovations
Social impact of ICT innovationsSocial impact of ICT innovations
Social impact of ICT innovations
 
0625 s09 qp_3
0625 s09 qp_30625 s09 qp_3
0625 s09 qp_3
 
Spn year 7 notes
Spn year 7 notesSpn year 7 notes
Spn year 7 notes
 
Cartoon
CartoonCartoon
Cartoon
 
13. comics, cartoons and animation
13. comics, cartoons and animation13. comics, cartoons and animation
13. comics, cartoons and animation
 
IGCSE ICT 0417 P2 Document Production
IGCSE ICT 0417 P2 Document ProductionIGCSE ICT 0417 P2 Document Production
IGCSE ICT 0417 P2 Document Production
 
Igcse biology notes gooood
Igcse biology notes  goooodIgcse biology notes  gooood
Igcse biology notes gooood
 

Similar to Chapter 6 effects of ict on society

Cybersecurity Training
Cybersecurity TrainingCybersecurity Training
Cybersecurity Training
WindstoneHealth
 
Computer virus
Computer virusComputer virus
Computer virusrana_babar
 
Computer virus
Computer virusComputer virus
Computer virusrana_babar
 
Impacts of ICT on social effects
Impacts of ICT on social effectsImpacts of ICT on social effects
Impacts of ICT on social effects
Nandhini Sathiyanarayanan
 
2014CyberSecurityProject
2014CyberSecurityProject2014CyberSecurityProject
2014CyberSecurityProjectKaley Hair
 
Internet security
Internet securityInternet security
Internet security
Antony Mathew
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Salma Zafar
 
The World of Information
The World of InformationThe World of Information
The World of Information
Badal Dixit
 
Ethics in IT and System Usage
Ethics in IT and System UsageEthics in IT and System Usage
Ethics in IT and System Usage
tushki92
 
Computer Security
Computer SecurityComputer Security
Malware ppt final.pptx
Malware ppt final.pptxMalware ppt final.pptx
Malware ppt final.pptx
LakshayNRReddy
 
Computer Malware and its types
Computer Malware and its typesComputer Malware and its types
Computer Malware and its types
Jatin Kumar
 
Introduction To Computer Security
Introduction To Computer SecurityIntroduction To Computer Security
Introduction To Computer Security
Vibrant Event
 
Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security
Vibrant Event
 
Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer SecurityEthical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security
Vibrant Technologies & Computers
 
Computing and ethics
Computing and ethicsComputing and ethics
Computing and ethics
Nikki Shree
 
Computer Security and Ethics
Computer Security and EthicsComputer Security and Ethics
Computer Security and Ethics
Mohsin Riaz
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
Benjamin Sangalang
 

Similar to Chapter 6 effects of ict on society (20)

Cybersecurity Training
Cybersecurity TrainingCybersecurity Training
Cybersecurity Training
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Impacts of ICT on social effects
Impacts of ICT on social effectsImpacts of ICT on social effects
Impacts of ICT on social effects
 
2014CyberSecurityProject
2014CyberSecurityProject2014CyberSecurityProject
2014CyberSecurityProject
 
Internet security
Internet securityInternet security
Internet security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
The World of Information
The World of InformationThe World of Information
The World of Information
 
Ethics in IT and System Usage
Ethics in IT and System UsageEthics in IT and System Usage
Ethics in IT and System Usage
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Malware ppt final.pptx
Malware ppt final.pptxMalware ppt final.pptx
Malware ppt final.pptx
 
Computer Malware and its types
Computer Malware and its typesComputer Malware and its types
Computer Malware and its types
 
I.T Security Threats
I.T Security ThreatsI.T Security Threats
I.T Security Threats
 
Introduction To Computer Security
Introduction To Computer SecurityIntroduction To Computer Security
Introduction To Computer Security
 
Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security
 
Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer SecurityEthical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security
 
Computing and ethics
Computing and ethicsComputing and ethics
Computing and ethics
 
Computer Security and Ethics
Computer Security and EthicsComputer Security and Ethics
Computer Security and Ethics
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 

Recently uploaded

How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)
rosedainty
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
Sectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdfSectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdf
Vivekanand Anglo Vedic Academy
 
Fish and Chips - have they had their chips
Fish and Chips - have they had their chipsFish and Chips - have they had their chips
Fish and Chips - have they had their chips
GeoBlogs
 
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxStudents, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
EduSkills OECD
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
BhavyaRajput3
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
Introduction to Quality Improvement Essentials
Introduction to Quality Improvement EssentialsIntroduction to Quality Improvement Essentials
Introduction to Quality Improvement Essentials
Excellence Foundation for South Sudan
 
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
Nguyen Thanh Tu Collection
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
MIRIAMSALINAS13
 
How to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsHow to Break the cycle of negative Thoughts
How to Break the cycle of negative Thoughts
Col Mukteshwar Prasad
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
The Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve ThomasonThe Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve Thomason
Steve Thomason
 

Recently uploaded (20)

How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
Sectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdfSectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdf
 
Fish and Chips - have they had their chips
Fish and Chips - have they had their chipsFish and Chips - have they had their chips
Fish and Chips - have they had their chips
 
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxStudents, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
Introduction to Quality Improvement Essentials
Introduction to Quality Improvement EssentialsIntroduction to Quality Improvement Essentials
Introduction to Quality Improvement Essentials
 
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
How to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsHow to Break the cycle of negative Thoughts
How to Break the cycle of negative Thoughts
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
The Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve ThomasonThe Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve Thomason
 

Chapter 6 effects of ict on society

  • 1. Effects of ICT on Society
  • 2. What is Software Copyright? When someone creates an original piece of software, that person then holds something called the copyright for that software. (This is also true when people create books, films and songs.) Holding the copyright for software means that you have the protection of the law if anyone tries to steal your software.
  • 3. Under copyright law, people must not: Copy the software for other people Lend the software to other people Rent the software to other people Install the software on a network where other users can access it (unless it is a special ‘network’ version) If someone breaks the copyright, they can be punished by fines or even by imprisonment. The reason for this is that creating software can involve the work of many people and may take thousands of hours. It is only fair that all of this effort is protected
  • 4. Software Piracy can be carried out….. • When the software is being installed, the user will be asked to key in a unique reference number which is supplied with the original copy of the software. • The user will be asked to click on OK/I Agree to the license agreement before the software continues to install. • The original software comes with a sticker/hologram stating that it is a genuine copy. • Some software run only if the CD/DVD drive is attached to the system. • Some software run only if dongle(a type of storage media) is plugged into one of the USB ports.
  • 5. Introduction • Computer virus have become today’s headline news • With the increasing use of the Internet, it has become easier for virus to spread • Virus show us loopholes in software • Most virus are targeted at the MS Windows OS
  • 6. Definition Virus : A true virus is capable of self replication on a machine. It may spread between files or disks, but the defining character is that it can recreate itself on it’s own with out traveling to a new host. • Is a piece of malicious program that can copy itself and infect a computer without the permission or knowledge of the user
  • 7. Symptoms of Virus Attack • Computer runs slower then usual • Computer no longer boots up • Screen sometimes flicker • PC speaker beeps periodically • System crashes for no reason • Files/directories sometimes disappear • Denial of Service (DoS)
  • 8. • A virus runs first when a legitimate program is executed. • The virus loads itself into memory and looks to see if it can find any other programs on the disk. • If it can find one, it modifies it to add the virus's code to the new program. • Then the virus launches the "real program“. Computer Virus – How they work?
  • 9. • The user has no way to know that the virus ever ran. • Unfortunately, the virus has now reproduced itself, so two programs are infected. • The next time either of those programs gets executed, they infect other programs, and the cycle continues. • When the infected program ▫ is distributed by  floppy disk  uploaded to a bulletin board  zipped and delivered as an executable.
  • 10. • Install an updated Anti-Virus software. • Stick with commercial software purchased on CDs. • Check the Computer for Virus frequently – Fix a schedule for scanning your computer. • Avoid programs from unknown sources (like the Internet). • Use firewalls to protect against virus Protection and Prevention
  • 11. What is Hacking? • The word 'hacking' has several meanings, but in the context of ICT, it is normally taken to as breaking in to a computer system without legal authorisation.
  • 12. Why Do Hackers Hack? A hacker may break into a system – • Out of curiosity • For Challenge - can they get through the system’s defences? • Because the data has value. For example, if a hacker enters your computer and steals financial information such as your credit card number, or the password to your bank account, they could use that information to make purchases. If a lot of information about you is stolen, a hacker could use this to impersonate you on-line. • They might apply for new credit cards, take out bank loans, buy cars, etc. all in your name. This is known as identity theft.
  • 13. You should: • Use strong passwords to protect your user login account • Never reveal your login password to anyone else • Place a firewall between your computer and any network • Disconnect from networks when you are not using them • Encrypt any sensitive information (just in case they get in)
  • 14. Social Effects of ICT • The personal computer (PC) was developed in the early 1980s. Before this date, computers were huge, expensive machines that only a few, large businesses owned. Now PCs are found on almost every desk in every office, all over the world. Because companies now have access to so much cheap, reliable computing power, they have changed the way they are organized and the way they operate. As a result, many people’s jobs have changed...
  • 15. Areas of Increased Unemployment • Some jobs have been lost as a result of computers being used to do the same work that people used to do.
  • 16. Some examples of areas have suffered job losses: Manufacturing • Many factories now have fully automated production lines. Instead of using people to build things, computer- controlled robots are used. Robots can run day and night, never needing a break, and don’t need to be paid! (Although the robots cost a lot to purchase, in the long-term the factory saves money.) Secretarial Work • Offices used to employee many secretaries to produce the documents required for the business to run. Now people have personal computers, they tend to type and print their own documents.
  • 17. Accounting Clerks • Companies once had large departments full of people whose job it was to do calculations (e.g. profit, loss, billing, etc.) A personal computer running a spreadsheet can now do the same work. Newspaper Printing • It used to take a team of highly skilled printers to typeset (layout) a newspaper page and to then print thousands of newspapers. The same task can now be performed far more quickly using computers with DTP software and computer-controlled printing presses.
  • 18. Areas of Increased Employment • Although many employment areas have suffered job losses, other areas have grown and jobs have been created. Sometimes people who have lost their old job have been able to re-train and get a new job in one of these growth areas.
  • 19. IT Technicians • All of the computers in a business need to be maintained: hardware fixed, software installed, etc. IT technicians do this work. Computer Programmers • All of the software that is now used by businesses has to be created by computer programmers. Hundreds of thousands of people are now employed in the 'software industry'
  • 20. Web Designers • Much of modern business is conducted on-line, and company websites are very important. Company websites need to be designed and built which is the role of web designers. Help-Desk Staff • People often need help using computers, and software applications. Computer and software company have help-desks staffed by trained operators who can give advice.
  • 21. Microprocessor controlled Devices used at homes • Many common household devices are now fitted with microprocessors to control large number of their functions. • They can be Labour saving devices – like Washing Machines, Ovens and Dishwashers or Other devices like Televisions, Fridge, Freezers and Central Heating systems.
  • 22. Advantages • They lead to more leisure time since the devices can be programmed to do the tasks • People get more time to socialise. • People have become sophisticated and make use of embedded web technology • Energy gets saved as it gets switched of automatically • Easier to operate than work manually Disadvantages • Can lead to unhealthy diets • Leads to more waste as devices are thrown away as they are not economic for repair. • Does not help people who are not tech savvy • Leads to waste of resources
  • 24. Phishing • Phishing – is a fraudulent operation involving the use of Emails. • The sender sends a legitimate-looking email, hoping to gather personal and financial information from the recipient of the email. • As soon as the user clicks on the link they are sent to a spoof website and asked for credit card details, PIN’s etc. • Phishing could lead to identity theft.
  • 25. Pharming • Pharming is a scam in which malicious code is installed on a computer hard disk or server. • This code has the ability to direct the user to fraudulent sites without their knowledge or consent. • Pharming targets a much larger group of people more easily.
  • 26. Spam • Spam is an electronic junk mail. • It is a type of advertising from a computer sent out to a target mailing list. • It is usually harmless but can clog up the networks slowing them down or fill up the user’s mailbox
  • 27. Spyware • Spyware is a software that gathers user information through network connections without their knowledge. • Once spyware is installed it monitors all the key presses and transmits the information to the spyware sender. • This software also has the ability to install other spyware software's.
  • 28. What is Web 2.0? • The original World-Wide Web ('The Web', WWW, or 'Web 1.0') was a collection of mostly static websites that published information. You could visit the sites, read the web pages, look at the pictures, but you couldn't really interact with the site: you couldn't login, leave comments, tag images, discuss things, etc. The original Web was a mostly one-way experience where information was delivered to you. 'Web 2.0' (pronounced "web two-point-oh") name given to the recent development of interactive websites that are quite different to the old, static websites. INTERNET DEVELOPMENTS
  • 29. • Many websites on the Web today allow users to: share information (e.g. notes and photos on Facebook) • interact (add comments, chat, etc.) • collaborate on content (e.g. creating pages on Wikipedia) • create their own content (e.g. videos on YouTube) • Web 2.0 is often called the 'Social Web' because of the way that users can interact and share. It's also been called the 'Read-Write Web' because much of the content is now written by users
  • 30. Blogs and Blogging • A blog is a website where someone (usually a normal person - not a professional writer) writes about a topic. Blogs can be personal (someone writing about their own life, or their personal views), based on an interest (e.g. football), or some businesses also use blogs to write about new products, etc. • A blog allows someone to be a writer and publisher on the Web with very little effort or cost. A blog can be setup with just a few clicks, whereas a few years ago you'd need a lot of technical knowledge to create your own website. • Each entry on a blog is called a post. • One form of blogging, where people publish very short posts, is known as 'Micro-blogging'. The most well-known micro-blog is Twitter.
  • 31. Wikis • A wiki is a website that allows users to collaborate (work together) to create the content. The pages of a wiki can be edited by everyone (or those who have the password) so that different people can add to the page, edit things, fix errors, etc. • Wikis often automatically create automatic links between pages. E.g. if a wiki page exists called 'Camels' and you write the word 'camel', the word will become a link to the Camel page. This feature means that wikis are very useful for creating sites containing lots of connected information •Wikis are used for websites such as: Encyclopaedia (e.g. Wikipedia) Help sites
  • 32. Media Uploading Sites • There are many websites that allow users to create, upload and share their own media such as photos, music or video. Usually other users can rate or comment on the media that is uploaded leading to these sites often being referred to as 'Social Media' sites. All media upload sites have rules about the type of media that you can upload - you have to either own the copyright to the image / music / video yourself, or have permission from the copyright owner
  • 33. Social Networks • A social network website is a site that allows user to connect with other users who are friends / relatives, or who share similar interests. Connected users can then share information / pictures / files with each other, send messages, chat, etc.
  • 34. Folksomonies • Folksomonies are closely related to tagging and literally means ‘management of people’. • Tagging is a type of social bookmarking where a user can tag any webpage with words that highlight the content of the page. • All users can view and benefit from it. • Example - Flickr
  • 35. Internet Use Issues • The Internet and World Wide Web are a fantastic resource for finding and sharing information. The Web contains literally billions of web pages containing information about every topic imaginable. However we need to take care when using the Internet to look for information, or to send information...
  • 36. Reliability of Information • The Internet and Web are not regulated - there is no organisation that controls who can create web pages or what those pages can contain. Anyone can create web pages and say anything they want to. • In many ways this is a good thing. It means that corrupt organisations or governments, who have always been able to hide details of their activities, are no longer able to do so. When bad things happen, people write about it on the Web and the world gets to know, and hopefully do something about it. • But it’s also a bad thing. It means that people or organisations can easily spread lies and hatred. There are thousands of websites containing bigoted viewpoints, and thousands more that are full of information that is biased, inaccurate, or just plain wrong
  • 37. • So... how do you know which web pages to believe, which information to trust? Check several sources of information (go to lots of different websites). If they all say them same thing, it is likely to be true • Stick to websites that belong to trusted organisations. If the website address ends in .gov.uk (the UK government site) it is more likely to be reliable • Look at the spelling and grammar used. Reliable websites are usually checked for errors. Too many spelling errors mean it’s probably not to be trusted.
  • 38. Undesirable Information • In addition to the Web being full of websites with inaccurate information, there are also a huge number of websites that contain highly offensive, or illegal material • Avoiding this type of material can be tricky. Many organisations such as schools, some governments (e.g. for religious reasons), and also many parents, make use of web page filtering software. This software attempts to prevent offensive and illegal material being accessed.
  • 39. Security of Data Transferred Using the Internet • As has been discussed already, you should always consider encrypting any sensitive or personal data that is sent or accessed over a public network such as The Internet. • Many websites, especially online shopping or online banking sites, require you to enter personal information, such as credit card numbers, social security IDs, etc. To make sure your data is safe, these websites use encryption - they are called secure websites.
  • 40. Safety Issues with ICT • You wouldn't imagine that using computers could be dangerous, but there are a few situations that can result in accidents... Trailing Cables • Computer equipment is often connected to lots of cables: power, network, etc. If these cables are laying on the floor, they can cause people to trip over them Solution: Place cables inside cable ducts, or under the carpet / flooring
  • 41. Spilt Drinks or Food • If any liquids are spilt on electrical equipment, such a s a computer, it can result in damage to the equipment, or an electric shock to the user. Solution: Keep drinks and food away from computers
  • 42. Overloaded Power Sockets • Plugging too many power cables into a socket can result in the socket being overloaded, overheating, and a fire starting. Solution: Never plug too many cables into a socket. Always make sure there are fire extinguishers nearby
  • 43. Heavy Objects Falling • Many items of computer equipment are very heavy: CRT monitors, laser printers etc. Heavy items can cause serious injury if they fall on people. Solution: Make sure equipment is placed on strong tables / shelves
  • 44. Health Effects of ICT If we use a computer for many hours (as people often do at work), there are some health issues that might affect us... Eye-Strain • One health issue that can occur after using computers for a long time is eye-strain (tiredness of the eyes). This is caused by looking at a monitor which is a constant distance away. The muscles that focus your eyes do not move, and so get tired and painful. Eye- strain can also cause headaches
  • 45. • This problem can be solved: Look away from the monitor at regular intervals – re-focus on distant or close objects to exercise the muscles in the eye. • Take regular breaks. • Use an anti-glare filter in front of the monitor to cut down on screen reflections that can also tire the eyes.
  • 46. Back and Neck Ache • Many people suffer from back and neck pain after working at a computer for a long time. This is usually due to them having a bad sitting posture.
  • 47. • This problem can be solved: Use an adjustable, ergonomic chair, and take the time to set it up properly. • The computer keyboard and monitor should be at the correct height for the seated person (keyboard lower than the elbow, top of monitor at eye level). • Take regular breaks: get up, walk around, stretch
  • 48. Repetitive Strain Injury (RSI) in Wrists • Any repetitive movement (same movement over and over again) can result in a health problem called repetitive strain injury (RSI). In particular typing and using a mouse for long periods are common causes of RSI in the wrist
  • 49. • This problem can be solved: Use a wrist-rest to support the wrists while typing and when using the mouse. • Take regular breaks from typing or using the mouse.