Units Even 2
Transcript of Units Even 2
-
7/28/2019 Units Even 2
1/49
UNIT SEVEN
Information and CommunicationTechnology(ICT) and Society
End Show
-
7/28/2019 Units Even 2
2/49
Developing Team S.K.N.Suriyaarachchi
(PICTEC-Western Province) N.Nobel Ravi(ZICTEC-Nuwara Eliya)
A.M.Vazeer (CRC- Kahagolla)
D.M.D.Kumarihamy(ZEO-Welimada)
L.K.Rathnayake(ZICTEC-Passara)
End Show
-
7/28/2019 Units Even 2
3/49
Information and Communication
Technology(ICT) and Society
ICT for National Development
Issues in the use of ICT
End Show
-
7/28/2019 Units Even 2
4/49
7.1 - ICT for National Development
Information and Communication Technology hasbecome a vital player in the national development
of modern society. Methods of gathering, processing and
dissemination of information has dramatically
changed in the modern era with the advent ofICT.
End Show
-
7/28/2019 Units Even 2
5/49
ICT has an impact on the
Social
Cultural Economic
Administrativeaspects of society
End Show
-
7/28/2019 Units Even 2
6/49
Health
Education Agriculture
Industries and almost all other
sectors in Sri Lanka
ICT has contributed to increase
productivity of goods and services
relevant to
End Show
-
7/28/2019 Units Even 2
7/49
ICT in the health sector
End Show
-
7/28/2019 Units Even 2
8/49
ICT in the Health Sector
E-channeling
Research and
Innovation Medical testing &
reporting
Surgery
Maintenance ofMedical HistoryRecords
In house management
Remote surgery
End Show
http://www.geneva.ch/ImageG/WG1_HC.jpghttp://www.uwf.edu/cas/aasr/labs/labPics/MedTech01%20(Custom).jpghttp://www.uwf.edu/cas/aasr/labs/labPics/MedTech01%20(Custom).jpg -
7/28/2019 Units Even 2
9/49
ICT in Education
End Show
http://www.hum.titech.ac.jp/img/photo6.pnghttp://www.hum.titech.ac.jp/img/photo6.png -
7/28/2019 Units Even 2
10/49
ICT is used in education under
Learning
Teaching
Management
End Show
-
7/28/2019 Units Even 2
11/49
ICT for learning
Online courses/exams
Huge collection of subject related electronicmaterials and methodologies(Lessons,
Tutorials, simulations etc.) Learning Management System(LMS)
Educational fora, video conferencing,
CAL(Computer Assisted Learning) School net
End Show
-
7/28/2019 Units Even 2
12/49
ICT for teaching
Hypermedia tools
Simulation, animation, modeling,audio and video
Huge Collection of Subject RelatedMaterials (Lessons, Tutorials etc.)
Modern Learning / TeachingMethodologies
End Show
-
7/28/2019 Units Even 2
13/49
I CT for teachingcont
School Management Systems
Web sites related to Education
Management
End Show
-
7/28/2019 Units Even 2
14/49
ICT in Agriculture
Introduces modern machinery and
equipment Provides information on seeds that
maximize harvest and preservation ofproducts
Provides awareness in the field of modernAgriculture
Fertilizers
Pesticides
Provides information on moderntechniques in horticulture and in agrotechnology
Research on farming, animal husbandry
Virtual/competitive markets foragricultural products
End Show
-
7/28/2019 Units Even 2
15/49
ICT in Industry
Provides information on modern tools, equipment,machinery
Provides software on designing and modeling
Provides know how on the use of new techniques invarious industries including self employment
E.g. hair dressing, beauty culture and apparel
Provides facilities for advertising and marketing
End Show
-
7/28/2019 Units Even 2
16/49
Facilitates office automated systems
Electronic processing saves energy and time
Increases productivity, efficiency and accuracy Minimizes paper work
Provides on-line jobs
Facilitates tele-commuting
Provides infrastructure facilities for call centers
ICT in Industry contd.
End Show
-
7/28/2019 Units Even 2
17/49
ICT in Banking Sector
ATM
Credit Cards
Inter Bank Money Transfer
On-Line banking (e-banking)
Image Processing Cheque Clearing Systems Money grams
Etc.End Show
-
7/28/2019 Units Even 2
18/49
ICT in Insurance Sector
On the Spot Claims Medical coverage using electronic
cards
End Show
-
7/28/2019 Units Even 2
19/49
ICT in Share Market
Provides information on current
foreign exchanges
Provides facility to deal with the
share market
End Show
-
7/28/2019 Units Even 2
20/49
Issues in the use of ICT
Social
Ethical Legal
Security Health & safety
End Show
-
7/28/2019 Units Even 2
21/49
Social Issues
Digital Divide
Digital divide is the division of
people according to the accessibilityto ICT Resources. There is a gapbetween those who can access ICT
resources easily and those who cannot access.End Show
-
7/28/2019 Units Even 2
22/49
Ethical Issues
Piracy
Cracking Hacking
Unauthorized accessetc.
End Show
-
7/28/2019 Units Even 2
23/49
Legal Issues
Violation of Intellectual Property
RightsCopyright
Patent
End Show
-
7/28/2019 Units Even 2
24/49
Security Issues
Hardware Protection
Computer must be protected from
outside threats
Software Protection
Programs must be protected fromvarious threats
End Show
-
7/28/2019 Units Even 2
25/49
Hardware protection
Your computer should be equipped with
A UPS(Uninterrupted Power Supplier)to avoid risk of sudden power failureand fluctuations.
Surge protection safeguard against
lightening and thunder.
Stabilizer to control voltage.
End Show
-
7/28/2019 Units Even 2
26/49
Environmental factors to protect your
computer
Your computer should be kept in a
dust free, Dry (moisture free),
Smoke freeenvironment.
End Show
-
7/28/2019 Units Even 2
27/49
Logical Security
The software and the data in your
computer can be protected by Passwords
Backups
End Show
-
7/28/2019 Units Even 2
28/49
Malicious codes
Virus
Worm
Trojan Horsefalls
The expression "malicious code"has been used by analysts to describe
the category to which
End Show
-
7/28/2019 Units Even 2
29/49
Computer Viruses
A program or piece of code that is
loaded onto your computer without
your knowledge and runs against your
wishes. All computer viruses are manmade. A
computer virus attaches itself to a
program or file so that it can spread
from one computer to another, leavinginfections as it travels. Much like
human viruses, computer viruses can
range in severity. End Show
-
7/28/2019 Units Even 2
30/49
Types of computer viruses
Boot Sector Virus
File Virus
Macro Virus
Multipartite Virus
Polymorphic Virus
Stealth Virus
End Show
-
7/28/2019 Units Even 2
31/49
replaces or implants itself in theboot sector---an area of the hard
drive (or any other disk) accessedwhen you first turn on yourcomputer. This kind of virus can
prevent you from being able toboot your hard disk.
Boot Sector Virus
End Show
-
7/28/2019 Units Even 2
32/49
infects applications. These
executables then spread the virusby infecting associated documents
and other applications whenever
they're opened or run.
File Virus
End Show
-
7/28/2019 Units Even 2
33/49
Written using a simplified macro
programming language, these viruses
affect Microsoft Office applications A document infected with a macro virus
generally modifies a pre-existing,
commonly used command (such as Save)
to trigger its payload upon execution of
that command.
Macro Virus
End Show
-
7/28/2019 Units Even 2
34/49
infects both files and the boot
sector--a double shot that can re-
infect your system dozens of times
before it's caught.
Multipartite Virus
End Show
-
7/28/2019 Units Even 2
35/49
changes code whenever it passes toanother machine;
in theory these viruses should bemore difficult for antivirus
scanners to detect, but in practicethey're usually not that wellwritten.
Polymorphic Virus
End Show
-
7/28/2019 Units Even 2
36/49
hides its presence by making an
infected file not appear infected,
but doesn't usually stand up to
antivirus software.
Stealth Virus
End Show
-
7/28/2019 Units Even 2
37/49
Worms spread fromcomputer to computer, A
worm takes advantage of
file or informationtransport features on your
system, which allows it to
travel unaided. The biggestdanger with a worm is its
capability to replicate itself
on your system
Worm
End Show
-
7/28/2019 Units Even 2
38/49
It will appear to be useful software but will actuallydo damage once installed or run on your
computer. When a Trojan is activated the results can
vary. Some Trojans are designed to be more annoying
than malicious (like changing your desktop, adding
silly active desktop icons) they can cause serious damage by deleting files and
destroying information on your system.
A Trojan Horse
End Show
Precautions to Protect the computer
-
7/28/2019 Units Even 2
39/49
Precautions to Protect the computersystems
Avoid infected disks and flash drives.
Avoid downloading infected
executable file.
Be careful when opening e-mails withunfamiliar addresses.
Use the latest version of an anti virusprogram and run it regularly.
End Show
-
7/28/2019 Units Even 2
40/49
Anti virus program
A utility that searches storage devices for viruses andremoves any that are found. Scanning software looks for avirus in one of two ways
If it's a known virus it is removed from
your system.
In the case of new viruses it
quarantines (isolates) the
questionable program. End Show
Some popular anti virus
-
7/28/2019 Units Even 2
41/49
Norton
Mcafee
Symantec
PC cillin
AVG
Norman
Dr.Solomon's
Some popular anti virus
software
End Show
-
7/28/2019 Units Even 2
42/49
Firewall software
A firewall is a systemthat prevents
unauthorized use and
access to yourcomputer. A firewall
can be either hardware
or software.The mostpopular firewall choice
is a software firewall.End Show
-
7/28/2019 Units Even 2
43/49
Spyware
A general term for a program that secretlymonitors your actions. While they are
sometimes evil, like a remote control
program used by a hacker, softwarecompanies have been known to use spy
ware to gather data about customers.
End Show
-
7/28/2019 Units Even 2
44/49
Health and Safety Issues
Ergonomics & health
issues
Repetitive Stress InjuriesEye Strains
Electro-Magnetic Field(EMF) exposure
End Show
-
7/28/2019 Units Even 2
45/49
To avoid Repetitive Stress Injuries
The keyboard should be at elbowheight, and at a distance andangle that allow you to keepyour wrists straight.
If your chair doesn't have arms,use a pillow to support yourarms.
Adjust your chair so that your
feet areflat on the ground andyour hips are slightly higher thanyour knees
End Show
To avoid Repetitive Stress Injuries
-
7/28/2019 Units Even 2
46/49
To avoid Repetitive Stress Injuriescontd
Keep your feet flat on the floor. Don't slouch(bend).
Keep your head in a "neutral" position
Relieve neck strain by looking back over your shoulderwhile sitting up straight. Hold for 10 seconds, then slowly
turn and look the other way.
Relax shoulders by rolling them backwards and forwards.
Reduce muscle tension in your hands by spreading your
fingers wide apart. Hold, and then make a tight fist
End Show
-
7/28/2019 Units Even 2
47/49
To avoid Eye Strains
Your head should be about 18 - 30 inches from themonitor.
Blink frequently so your eyes don't get dry. Clean the screen every once in a while to remove
dust that has become one with your screen due tostatic electricity.
Refocus your eyes every ten minutes or so bylooking away from the computer and brieflyfocusing on an object at least 20 feet away.
End Show
-
7/28/2019 Units Even 2
48/49
Electro-Magnetic Field (EMF)
exposure Take frequent breaks away from
the computer
Sit at arms length from the System
and the Monitor
Use a flat panel display
End Show
-
7/28/2019 Units Even 2
49/49
The End