Units Even 2

download Units Even 2

of 49

Transcript of Units Even 2

  • 7/28/2019 Units Even 2

    1/49

    UNIT SEVEN

    Information and CommunicationTechnology(ICT) and Society

    End Show

  • 7/28/2019 Units Even 2

    2/49

    Developing Team S.K.N.Suriyaarachchi

    (PICTEC-Western Province) N.Nobel Ravi(ZICTEC-Nuwara Eliya)

    A.M.Vazeer (CRC- Kahagolla)

    D.M.D.Kumarihamy(ZEO-Welimada)

    L.K.Rathnayake(ZICTEC-Passara)

    End Show

  • 7/28/2019 Units Even 2

    3/49

    Information and Communication

    Technology(ICT) and Society

    ICT for National Development

    Issues in the use of ICT

    End Show

  • 7/28/2019 Units Even 2

    4/49

    7.1 - ICT for National Development

    Information and Communication Technology hasbecome a vital player in the national development

    of modern society. Methods of gathering, processing and

    dissemination of information has dramatically

    changed in the modern era with the advent ofICT.

    End Show

  • 7/28/2019 Units Even 2

    5/49

    ICT has an impact on the

    Social

    Cultural Economic

    Administrativeaspects of society

    End Show

  • 7/28/2019 Units Even 2

    6/49

    Health

    Education Agriculture

    Industries and almost all other

    sectors in Sri Lanka

    ICT has contributed to increase

    productivity of goods and services

    relevant to

    End Show

  • 7/28/2019 Units Even 2

    7/49

    ICT in the health sector

    End Show

  • 7/28/2019 Units Even 2

    8/49

    ICT in the Health Sector

    E-channeling

    Research and

    Innovation Medical testing &

    reporting

    Surgery

    Maintenance ofMedical HistoryRecords

    In house management

    Remote surgery

    End Show

    http://www.geneva.ch/ImageG/WG1_HC.jpghttp://www.uwf.edu/cas/aasr/labs/labPics/MedTech01%20(Custom).jpghttp://www.uwf.edu/cas/aasr/labs/labPics/MedTech01%20(Custom).jpg
  • 7/28/2019 Units Even 2

    9/49

    ICT in Education

    End Show

    http://www.hum.titech.ac.jp/img/photo6.pnghttp://www.hum.titech.ac.jp/img/photo6.png
  • 7/28/2019 Units Even 2

    10/49

    ICT is used in education under

    Learning

    Teaching

    Management

    End Show

  • 7/28/2019 Units Even 2

    11/49

    ICT for learning

    Online courses/exams

    Huge collection of subject related electronicmaterials and methodologies(Lessons,

    Tutorials, simulations etc.) Learning Management System(LMS)

    Educational fora, video conferencing,

    CAL(Computer Assisted Learning) School net

    End Show

  • 7/28/2019 Units Even 2

    12/49

    ICT for teaching

    Hypermedia tools

    Simulation, animation, modeling,audio and video

    Huge Collection of Subject RelatedMaterials (Lessons, Tutorials etc.)

    Modern Learning / TeachingMethodologies

    End Show

  • 7/28/2019 Units Even 2

    13/49

    I CT for teachingcont

    School Management Systems

    Web sites related to Education

    Management

    End Show

  • 7/28/2019 Units Even 2

    14/49

    ICT in Agriculture

    Introduces modern machinery and

    equipment Provides information on seeds that

    maximize harvest and preservation ofproducts

    Provides awareness in the field of modernAgriculture

    Fertilizers

    Pesticides

    Provides information on moderntechniques in horticulture and in agrotechnology

    Research on farming, animal husbandry

    Virtual/competitive markets foragricultural products

    End Show

  • 7/28/2019 Units Even 2

    15/49

    ICT in Industry

    Provides information on modern tools, equipment,machinery

    Provides software on designing and modeling

    Provides know how on the use of new techniques invarious industries including self employment

    E.g. hair dressing, beauty culture and apparel

    Provides facilities for advertising and marketing

    End Show

  • 7/28/2019 Units Even 2

    16/49

    Facilitates office automated systems

    Electronic processing saves energy and time

    Increases productivity, efficiency and accuracy Minimizes paper work

    Provides on-line jobs

    Facilitates tele-commuting

    Provides infrastructure facilities for call centers

    ICT in Industry contd.

    End Show

  • 7/28/2019 Units Even 2

    17/49

    ICT in Banking Sector

    ATM

    Credit Cards

    Inter Bank Money Transfer

    On-Line banking (e-banking)

    Image Processing Cheque Clearing Systems Money grams

    Etc.End Show

  • 7/28/2019 Units Even 2

    18/49

    ICT in Insurance Sector

    On the Spot Claims Medical coverage using electronic

    cards

    End Show

  • 7/28/2019 Units Even 2

    19/49

    ICT in Share Market

    Provides information on current

    foreign exchanges

    Provides facility to deal with the

    share market

    End Show

  • 7/28/2019 Units Even 2

    20/49

    Issues in the use of ICT

    Social

    Ethical Legal

    Security Health & safety

    End Show

  • 7/28/2019 Units Even 2

    21/49

    Social Issues

    Digital Divide

    Digital divide is the division of

    people according to the accessibilityto ICT Resources. There is a gapbetween those who can access ICT

    resources easily and those who cannot access.End Show

  • 7/28/2019 Units Even 2

    22/49

    Ethical Issues

    Piracy

    Cracking Hacking

    Unauthorized accessetc.

    End Show

  • 7/28/2019 Units Even 2

    23/49

    Legal Issues

    Violation of Intellectual Property

    RightsCopyright

    Patent

    End Show

  • 7/28/2019 Units Even 2

    24/49

    Security Issues

    Hardware Protection

    Computer must be protected from

    outside threats

    Software Protection

    Programs must be protected fromvarious threats

    End Show

  • 7/28/2019 Units Even 2

    25/49

    Hardware protection

    Your computer should be equipped with

    A UPS(Uninterrupted Power Supplier)to avoid risk of sudden power failureand fluctuations.

    Surge protection safeguard against

    lightening and thunder.

    Stabilizer to control voltage.

    End Show

  • 7/28/2019 Units Even 2

    26/49

    Environmental factors to protect your

    computer

    Your computer should be kept in a

    dust free, Dry (moisture free),

    Smoke freeenvironment.

    End Show

  • 7/28/2019 Units Even 2

    27/49

    Logical Security

    The software and the data in your

    computer can be protected by Passwords

    Backups

    End Show

  • 7/28/2019 Units Even 2

    28/49

    Malicious codes

    Virus

    Worm

    Trojan Horsefalls

    The expression "malicious code"has been used by analysts to describe

    the category to which

    End Show

  • 7/28/2019 Units Even 2

    29/49

    Computer Viruses

    A program or piece of code that is

    loaded onto your computer without

    your knowledge and runs against your

    wishes. All computer viruses are manmade. A

    computer virus attaches itself to a

    program or file so that it can spread

    from one computer to another, leavinginfections as it travels. Much like

    human viruses, computer viruses can

    range in severity. End Show

  • 7/28/2019 Units Even 2

    30/49

    Types of computer viruses

    Boot Sector Virus

    File Virus

    Macro Virus

    Multipartite Virus

    Polymorphic Virus

    Stealth Virus

    End Show

  • 7/28/2019 Units Even 2

    31/49

    replaces or implants itself in theboot sector---an area of the hard

    drive (or any other disk) accessedwhen you first turn on yourcomputer. This kind of virus can

    prevent you from being able toboot your hard disk.

    Boot Sector Virus

    End Show

  • 7/28/2019 Units Even 2

    32/49

    infects applications. These

    executables then spread the virusby infecting associated documents

    and other applications whenever

    they're opened or run.

    File Virus

    End Show

  • 7/28/2019 Units Even 2

    33/49

    Written using a simplified macro

    programming language, these viruses

    affect Microsoft Office applications A document infected with a macro virus

    generally modifies a pre-existing,

    commonly used command (such as Save)

    to trigger its payload upon execution of

    that command.

    Macro Virus

    End Show

  • 7/28/2019 Units Even 2

    34/49

    infects both files and the boot

    sector--a double shot that can re-

    infect your system dozens of times

    before it's caught.

    Multipartite Virus

    End Show

  • 7/28/2019 Units Even 2

    35/49

    changes code whenever it passes toanother machine;

    in theory these viruses should bemore difficult for antivirus

    scanners to detect, but in practicethey're usually not that wellwritten.

    Polymorphic Virus

    End Show

  • 7/28/2019 Units Even 2

    36/49

    hides its presence by making an

    infected file not appear infected,

    but doesn't usually stand up to

    antivirus software.

    Stealth Virus

    End Show

  • 7/28/2019 Units Even 2

    37/49

    Worms spread fromcomputer to computer, A

    worm takes advantage of

    file or informationtransport features on your

    system, which allows it to

    travel unaided. The biggestdanger with a worm is its

    capability to replicate itself

    on your system

    Worm

    End Show

  • 7/28/2019 Units Even 2

    38/49

    It will appear to be useful software but will actuallydo damage once installed or run on your

    computer. When a Trojan is activated the results can

    vary. Some Trojans are designed to be more annoying

    than malicious (like changing your desktop, adding

    silly active desktop icons) they can cause serious damage by deleting files and

    destroying information on your system.

    A Trojan Horse

    End Show

    Precautions to Protect the computer

  • 7/28/2019 Units Even 2

    39/49

    Precautions to Protect the computersystems

    Avoid infected disks and flash drives.

    Avoid downloading infected

    executable file.

    Be careful when opening e-mails withunfamiliar addresses.

    Use the latest version of an anti virusprogram and run it regularly.

    End Show

  • 7/28/2019 Units Even 2

    40/49

    Anti virus program

    A utility that searches storage devices for viruses andremoves any that are found. Scanning software looks for avirus in one of two ways

    If it's a known virus it is removed from

    your system.

    In the case of new viruses it

    quarantines (isolates) the

    questionable program. End Show

    Some popular anti virus

  • 7/28/2019 Units Even 2

    41/49

    Norton

    Mcafee

    Symantec

    PC cillin

    AVG

    Norman

    Dr.Solomon's

    Some popular anti virus

    software

    End Show

  • 7/28/2019 Units Even 2

    42/49

    Firewall software

    A firewall is a systemthat prevents

    unauthorized use and

    access to yourcomputer. A firewall

    can be either hardware

    or software.The mostpopular firewall choice

    is a software firewall.End Show

  • 7/28/2019 Units Even 2

    43/49

    Spyware

    A general term for a program that secretlymonitors your actions. While they are

    sometimes evil, like a remote control

    program used by a hacker, softwarecompanies have been known to use spy

    ware to gather data about customers.

    End Show

  • 7/28/2019 Units Even 2

    44/49

    Health and Safety Issues

    Ergonomics & health

    issues

    Repetitive Stress InjuriesEye Strains

    Electro-Magnetic Field(EMF) exposure

    End Show

  • 7/28/2019 Units Even 2

    45/49

    To avoid Repetitive Stress Injuries

    The keyboard should be at elbowheight, and at a distance andangle that allow you to keepyour wrists straight.

    If your chair doesn't have arms,use a pillow to support yourarms.

    Adjust your chair so that your

    feet areflat on the ground andyour hips are slightly higher thanyour knees

    End Show

    To avoid Repetitive Stress Injuries

  • 7/28/2019 Units Even 2

    46/49

    To avoid Repetitive Stress Injuriescontd

    Keep your feet flat on the floor. Don't slouch(bend).

    Keep your head in a "neutral" position

    Relieve neck strain by looking back over your shoulderwhile sitting up straight. Hold for 10 seconds, then slowly

    turn and look the other way.

    Relax shoulders by rolling them backwards and forwards.

    Reduce muscle tension in your hands by spreading your

    fingers wide apart. Hold, and then make a tight fist

    End Show

  • 7/28/2019 Units Even 2

    47/49

    To avoid Eye Strains

    Your head should be about 18 - 30 inches from themonitor.

    Blink frequently so your eyes don't get dry. Clean the screen every once in a while to remove

    dust that has become one with your screen due tostatic electricity.

    Refocus your eyes every ten minutes or so bylooking away from the computer and brieflyfocusing on an object at least 20 feet away.

    End Show

  • 7/28/2019 Units Even 2

    48/49

    Electro-Magnetic Field (EMF)

    exposure Take frequent breaks away from

    the computer

    Sit at arms length from the System

    and the Monitor

    Use a flat panel display

    End Show

  • 7/28/2019 Units Even 2

    49/49

    The End