Lesson 17 Technology, the Workplace, and Society Unit 3—Computers and Society
Objectives Describe the impact of technology on education. Describe the impact of technology on science and medicine. Describe the impact of technology on work and play. Identify types of computer crimes.
Objectives (cont.) Identify computer viruses. Identify various security measures. Identify computer-related laws. Identify the “work” of hackers. Describe how privacy is invaded with computer use.
The Internet and Education WebQuests Use the Internet for investigation and problem solving Online learning Computer-based learning Simulations
Online Learning
Technological Innovations Artificial intelligence Computer software that processes information on its own without human intervention Genetic engineering Involves changing the DNA in a living organism
Genetic Engineering
Technological Innovations (cont.) Virtual reality An artificial environment that feels like a real environment Computing trends Nanotechnology Optical computing Quantum computing
Work and Play Global economy Knowledge is the greatest asset. Electronic commerce Changing the way the world does business
Work and Play (cont.) The workplace Information management has changed. Groupware makes business communication and collaboration easier. Telecommuting provides advantages to both employer and employee.
Our Personal Lives Technology is present in nearly every phase of our daily lives. ATMs and other financial activities Transportation Education Shopping Communication Medical treatment
Technological Issues Misuse of information Copyright violations Plagiarism Computer crimes Computer fraud Computer hacking Computer viruses Data diddling
Computer Security
Using Computer Hardware and Software Damage caused by improper use by employees Damage caused by improper configurations Damage caused by natural causes Illegal copying or use of software
Health Issues Ergonomics-related concerns Prolonged keyboard use can result in carpal tunnel syndrome. Poor lighting can cause eye strain. Improper furniture can cause muscle disorders. Prolonged use of computers can cause fatigue, headaches, and backaches.
Privacy Personal information is available online. Many companies sell or trade information. Information is gathered from online data regarding school, banking, hospitals, insurance companies, and so on. This information typically is used for marketing purposes.
Privacy (cont.) Using credit cards to purchase merchandise on the Internet can be risky. Some sites are advertised as being secure. If sites are not secure, your credit card number can be released and sold.
Security Security is necessary to keep hardware, software, and data safe. Control access to data with passwords or biometric security measures. Make security a priority. Use firewalls. Use antivirus software. Back up data regularly.
Protection for Technology Injuries The Copyright Act of 1976 protects the developers of software. The Electronic Communication Privacy Act of 1986 prohibits the interception of data communications. Computer Fraud and Abuse Act of 1986 Software Piracy and Counterfeiting Amendment of 1983
Summary Technology is having a tremendous impact on education. Many people predict that technology will change the entire structure of education. The Internet and the World Wide Web are the biggest factors affecting education today.
Summary (cont.) Some people predict an antitechnology backlash. Electronic commerce is the buying and selling of goods and services using the Internet. Digital cash allows someone to pay online by transmitting a number from one computer to another.
Summary (cont.) New jobs and new job categories are being developed because of the Internet and electronic commerce. Some technological advances are voice recognition, nonlethal weapons, space travel, flying cars, smart shoes and smart seats, clothes that fight odors, and electronic shopping.
Summary (cont.) Computer crime has become a major problem, costing companies billions of dollars annually. Computer fraud is conduct that involves the manipulation of a computer or computer data for dishonest profit.
Summary (cont.) Computer hacking involves invading someone else’s computer. Sometimes it is done for financial gain and sometimes just as a prank. A computer virus is a program that has been written to cause corruption of data on a computer.
Summary (cont.) To protect against viruses, install and keep an antivirus program running on your computer. Be sure to update regularly. Computer security is necessary in order to keep hardware, software, and data safe from harm or destruction.
Summary (cont.) The most common way to control access to data is to use passwords. Illegally copying and using software is called software piracy. It has cost companies millions of dollars in lost sales. Laws have been passed in an effort to assist those who have been injured by computer crimes and offenses.
Summary (cont.) Many computer crimes are difficult to prove and prosecute.

Ppt lesson 17

  • 1.
    Lesson 17 Technology,the Workplace, and Society Unit 3—Computers and Society
  • 2.
    Objectives Describe theimpact of technology on education. Describe the impact of technology on science and medicine. Describe the impact of technology on work and play. Identify types of computer crimes.
  • 3.
    Objectives (cont.) Identifycomputer viruses. Identify various security measures. Identify computer-related laws. Identify the “work” of hackers. Describe how privacy is invaded with computer use.
  • 4.
    The Internet andEducation WebQuests Use the Internet for investigation and problem solving Online learning Computer-based learning Simulations
  • 5.
  • 6.
    Technological Innovations Artificialintelligence Computer software that processes information on its own without human intervention Genetic engineering Involves changing the DNA in a living organism
  • 7.
  • 8.
    Technological Innovations (cont.)Virtual reality An artificial environment that feels like a real environment Computing trends Nanotechnology Optical computing Quantum computing
  • 9.
    Work and PlayGlobal economy Knowledge is the greatest asset. Electronic commerce Changing the way the world does business
  • 10.
    Work and Play(cont.) The workplace Information management has changed. Groupware makes business communication and collaboration easier. Telecommuting provides advantages to both employer and employee.
  • 11.
    Our Personal LivesTechnology is present in nearly every phase of our daily lives. ATMs and other financial activities Transportation Education Shopping Communication Medical treatment
  • 12.
    Technological Issues Misuseof information Copyright violations Plagiarism Computer crimes Computer fraud Computer hacking Computer viruses Data diddling
  • 13.
  • 14.
    Using Computer Hardwareand Software Damage caused by improper use by employees Damage caused by improper configurations Damage caused by natural causes Illegal copying or use of software
  • 15.
    Health Issues Ergonomics-relatedconcerns Prolonged keyboard use can result in carpal tunnel syndrome. Poor lighting can cause eye strain. Improper furniture can cause muscle disorders. Prolonged use of computers can cause fatigue, headaches, and backaches.
  • 16.
    Privacy Personal informationis available online. Many companies sell or trade information. Information is gathered from online data regarding school, banking, hospitals, insurance companies, and so on. This information typically is used for marketing purposes.
  • 17.
    Privacy (cont.) Usingcredit cards to purchase merchandise on the Internet can be risky. Some sites are advertised as being secure. If sites are not secure, your credit card number can be released and sold.
  • 18.
    Security Security isnecessary to keep hardware, software, and data safe. Control access to data with passwords or biometric security measures. Make security a priority. Use firewalls. Use antivirus software. Back up data regularly.
  • 19.
    Protection for TechnologyInjuries The Copyright Act of 1976 protects the developers of software. The Electronic Communication Privacy Act of 1986 prohibits the interception of data communications. Computer Fraud and Abuse Act of 1986 Software Piracy and Counterfeiting Amendment of 1983
  • 20.
    Summary Technology ishaving a tremendous impact on education. Many people predict that technology will change the entire structure of education. The Internet and the World Wide Web are the biggest factors affecting education today.
  • 21.
    Summary (cont.) Somepeople predict an antitechnology backlash. Electronic commerce is the buying and selling of goods and services using the Internet. Digital cash allows someone to pay online by transmitting a number from one computer to another.
  • 22.
    Summary (cont.) Newjobs and new job categories are being developed because of the Internet and electronic commerce. Some technological advances are voice recognition, nonlethal weapons, space travel, flying cars, smart shoes and smart seats, clothes that fight odors, and electronic shopping.
  • 23.
    Summary (cont.) Computercrime has become a major problem, costing companies billions of dollars annually. Computer fraud is conduct that involves the manipulation of a computer or computer data for dishonest profit.
  • 24.
    Summary (cont.) Computerhacking involves invading someone else’s computer. Sometimes it is done for financial gain and sometimes just as a prank. A computer virus is a program that has been written to cause corruption of data on a computer.
  • 25.
    Summary (cont.) Toprotect against viruses, install and keep an antivirus program running on your computer. Be sure to update regularly. Computer security is necessary in order to keep hardware, software, and data safe from harm or destruction.
  • 26.
    Summary (cont.) Themost common way to control access to data is to use passwords. Illegally copying and using software is called software piracy. It has cost companies millions of dollars in lost sales. Laws have been passed in an effort to assist those who have been injured by computer crimes and offenses.
  • 27.
    Summary (cont.) Manycomputer crimes are difficult to prove and prosecute.

Editor's Notes

  • #7 Artificial Intelligent applications are being developed and used include: Games playing: an area where the most advances have been made Natural languages: offers the greatest potential rewards by allowing people to interact easily with computers by talking to them. Expert systems: computer programs that help us make decisions. Robotics: Robots can be used to perform repeated routine acts, possible dangerous acts. Genetic Engineering has the following benefits: increasing resistance to diseases, enabling a plant or animal to do something it would not typically do, enabling a fruit to ripen without getting squashy. Virtual reality uses include education, training, and medicine.