Vous êtes sur la page 1sur 67

The Effects of Using ICT

Software Copyright Theft


Definition:
"Downloading, copying or
borrowing software (for free)
without the permission of the
owner "

Overview of software copyright


theft:
Software is often developed at massive costs (both
financially and in terms of time) by companies and
individuals.

Because software is digital, it is very easy to either

download illegally from the internet or to make copies


of it without the permission of the owner. (i.e. copying
a CD or downloading from pirate bay). This is often
called 'Software Piracy
Laws exist to help prevent the developers of software

from having their work downloaded or copied by others


for free.

What do these laws cover?


Software should not be copied, sold or given
away to other people
Software should not be used on a network of
more users than you have paid for (e.g. 20 users
instead of 10)
Renting out software without permission is illegal
Stealing code from software and then using it in
your own software product is illegal
Using the name of copyright software on your
product is illegal (Passing off your product as
Microsoft Word for example)

Software Piracy
Prevention
Software can be protected against
piracy in a number of ways including:
1. Serial Numbers
2. Holograms
3. Licence agreements

Serial Numbers
When software is being installed,
users are often asked to enter a
unique number which proves the
software is original.
Serial numbers are supplied with the
original copy of the software.

Holograms
Holograms are often used on the
packaging of software and they
indicate that the copy is genuine.
Software without a hologram on the
packaging is usually an illegal copy.

Licence Agreements
Licence agreements are part of the
software installation process and they
inform the user exactly how they are
legally allowed to use the product.

Users are required to 'agree to terms


of use' before they can complete the
installation.

Computer Viruses
Definition:

"A self-copying program that has


been created with the purpose of
damaging a computer system

Overview of computer viruses:


The first computer virus sent over the Internet was created in
1988 by Robert Morris.
Computer viruses can cause huge problems if they are allowed
to infect a computer.
Viruses are programs that automatically make replicates
(copies) of themselves and then attach to other files within the
computer.
Any files which have viruses attached to them are said to have
been 'infected'.

What problems can viruses


cause?
Viruses can be designed to carry out
different malicious (harmful) functions.
Some include:
Annoying pop-up messages on the screen
Causing the computer to slow down or even
crash (stop responding)
Deleting important files or programs
Trying to access your personal files like
passwords, bank details or credit card
numbers etc

How do viruses infect


computers?
There are many ways that viruses
can infect a computer. The most
common include:
Downloading infected files from the
internet
Email attachments that contain
infected files
Plugging a flash memory stick that
containing infected files into your
computer

Preventing Software Virus


Infections
New computer viruses are being
created all the time and this means
that you should take steps to reduce
the chance that you computer and
data become infected. The best
methods are outlined in the table
below:

1. Use up-to-date anti-virus software.


2. Use genuine copies of software.
3. Only open email attachments from
people you trust.
4. Scan flash memory with anti-virus
software before you attach it to your
computer.
5. Only download software from
legitimate websites.

Hacking
Definition:
"The process of accessing a
computer system without
permission"

Overview of hacking:
Hacking is where people 'break' into
computer systems without
permission. These people are known
as 'hackers'.
Hackers often use the Internet to
break into the system.

Why do people try to hack into computer systems?


Hackers try to break into computers for the
following reasons:
To cause damage to files and data by deleting or
changing them
To commit fraud by stealing data (bank numbers
etc)
To access sensitive information
Simply to see if they are clever enough to beat the
system's security.

Preventing Hacking and


Hackers
There are various methods you can
use to help stop hackers from
accessing your computer files and
data. These include:
1. Firewall's
2. User-ID's and Robust Passwords
3. Data Encryption

Firewall's
Firewall's provide a 'shield' between
your computer and the Internet.
Firewall's can block unwanted data
(including hackers) from reaching
your computer. They can also stop
your computer from connecting to
unwanted websites.

User-ID's and Robust


Passwords
User-ID's
A user-ID is usually a word or a number that
identifies particular users as they log onto the
computer system.
User-ID's give people access to certain areas or files
within the computer.
Robust Passwords (hard to guess)
A good password should be hard to guess. It should
be made up of a combination of letter and numbers
and changed regularly.

Data Encryption
Encryption makes the files on you
system unreadable if the user does
not know the password to un-encrypt
them.
If someone try's to read an encrypted
file they will just see random junk
instead of the real data

Impacts on Patterns of
Employment
Why do businesses use ICT?
Computer usage in businesses and
companies has increased massively
within the last 30 years. The benefits
that computers bring to business is
just too hard for the owners to
ignore. For example:

1.Speed
Data can bestored,processedandsearchedextremely fast
2.Volume
Vast quantities of data can be stored in small amounts of space
3.Less Paper Work
Computersremove the needfor huge quantities ofpaper-work.
4.Less Workers
Computers can do thework of many peoplewhichsaves
expenses in wages
5.Connectivity
The Internetmeans that companies canshare dataor
evenhold meetingsin different countrieswithout actually
leaving the office

Areas where jobs have been


created
1. Network Managers / Technicians
These jobs have been created due to the need for big computer networks
within companies. Network managers make sure that computers on the
network run smoothlyand aresecure.
2. Web Design
The Internet has seen a huge demand for both commercial (business) and
personal web sites.Web designers create these sites and keep them up to
date.
3. Systems Analyst
These workers are responsible for designingnew ICT systems.
4. Programmers
Programmers create all thesoftware that can be used on a computer. This
is a huge industry and produces things likeoperating
systems,applications(word, excel etc) andcomputer games.
5.Computer Engineers
Engineers are needed tobuild the high-tech computersthat we use today.

Microprocessor Controlled
Devices
What is a microprocessor?
A microprocessor is really just atiny
cpu built onto a single chip.
Microprocessors are put
intoelectronic devicestocontrol
how they function.

Effects of microprocessors in the


home
Any electronic device in your house
thatneeds to be controlled in some
way is likely to contain a
microprocessor. Examples of these
are listed below:

Computer System
Your desktop PC or laptop will contain
a microprocessor called
aCPU(powerful machines will
contain more than one).
The CPUcontrols all the
processingthat go's on within the
computer.

Washing Machines
Washing machines contain
microprocessors to control things
like:
Water temperature
Valves to let water in
Pumps to let water out

Alarm Systems
The microprocessor inside a burglar
alarm is used todetect
intrudersand they also set the
alarm off.
Some even contact the police for you
automatically.

Heating Systems
Heating systems use
microprocessors to control things
like:
Time when the heating is
switched on / off
Keeping a constant temperature
Some can even make the
temperature different from room
to room

Intelligent Ovens / Microwaves /Fridges


The microprocessor inside intelligent ovens canread
the barcodes on packaging and then
automaticallyset the temperatureandcooking
timeto the perfect levels.
Intelligent microwaves work in much the same way.
Intelligent fridges can read the barcodes on food and
determine the'use by'dates. Food that is due to good
bad is thenautomatically moved to the front of
the fridgeso that you use it first.

Positive effects of microprocessors on social interaction


Easy to makenew friendsin chat-rooms.
Easy to find people with thesame interests or hobbiesas you
in specialist chat-rooms.
Cheap Internet phone callscan be made using VoIP.
Easy tospread the news of social eventsusing social
networking.
Old or disabled peoplecanstill interactwithout having to leave
their homes.

Negative effects of microprocessors


on social interaction
You don't actually meet people face to face
as much. This is known as'social-isolation'.

Interacting through a computerdoes not


require much physical activityand can
lead to health problems likeobesity

Effects of microprocessors on
the need to leave the home
ICT has progressed to a point where it
would be possible to never have to leave
your home.

Manyeveryday taskscan be carried out at


home using microprocessor-controlled
devices.
Examples of how microprocessors can
affect the need to leave the house:

Online Shopping (E-Commerce)


Goods (of any kind) can beordered over the
Internetanddelivered to your door.
Any device that allows you to connect to the
Internet can be used to shop online.
Retailers that offer customers the ability to buy
items online include:
Supermarkets
Entertainment businesses (DVD, Music,
Games)
Clothing.

Tele working (working from home)


Many peoplework from homeand use ICT
toperform tasks and contact clients and
colleagues.

Tele working requires the following equipment:


Computer or Laptop
Internet connection
Email facility
Videoconferencing software (meetings
help over the Internet)

Entertainment
We can entertain ourselves very easily
using microprocessor devices and the
Internet. For example:
YouTube (videos, music etc)
Gaming
Social networking to chat to friends
Downloading mp3's to the computer
Downloading and watching DVD's
Chat-rooms.

Online Banking
Banking can now becarried out online.
We can perform all sorts of tasks without
actually visiting the bank. These tasks
include:
Transferring money
Viewing statements to track your
spending
Paying bills
Setting up new accounts
Applying for loans.

Positive effects of not having to leave the


house
Elderly or disabledpeople can still carry out dayto-day tasks such asshoppingandpaying bills.
You can find entertainment even if you cannot go
outside due tobad weather.
You can carry outday-to-day tasksevenif you
are sick.

Negative effects of not having to


leave the house
You don't actually meet people face
to face as much. This is known
as'social-isolation'.
Not leaving the house is bad for you
-lack of exerciseetc

Capabilities of ICT
devices
What things do ICT devices do
well?
ICT devices and systems are capable
of performing lots of tasks very well.
Some of these are listed below:

1. Speed
Computers perform tasks very fast. Somecpu'scan execute
literally'billions' of instructions per second.
2.Accuracy
If programmed properly, computers are capable of performing
the sametasks 100% accurately every time.
For example, a robot that is programmed to bolt a wheel to a
car will get it exactly right each time.
3.Multi-Tasking
Computers are able to performmany tasks at the same
time.
4.RepetitiveTasks
Computers will carry outboring and repetitive tasks
accurately. Humans tend to get bored and make mistakes.
For example, machines that count bank notes will do that job
all day long without making a mistake.

5.Networking
Computers can bejoined together(either as a LAN or a WAN) and
allows them to easilyshare resourcessuch as printersanddata.
6.Huge amounts of Data Storage
Computer databases can storeenormous amounts of data.
All types of data be stored including text, numbers, images and
video.
7.Fast Searches Computers cansearch for stored data extremely
fast.
For example, the police can match fingerprints in a database in
minutes rather than spending weeks searching through printed
copies.
8.Security
Data can besecuredwithpasswordsorencryption.

What things do ICT devices not


do well?
Computers, and other devices, are
not without their problems.
Limitations of ICT devices are listed
below:

1. Battery Life
Portable device such as laptops,PDAsandmobile phones
arelimited by their battery life. These devices only remain
charged for so long before they need to be plugged into the mains.
2.Weight
Some portable devices areheavy(especially laptops). This does not
make them ideal for carrying around.
3.Screen and Keyboard Size
Smaller devices such asmobile phonesandPDAshave very small
screensandkeyboardswhich can cause problems for some people.
4.Bandwidth
Bandwidth is thespeed that data can be transported over the
Internet.
Low bandwidth means that large files will take a long time to transfer.

Internet Developments
and Issues
Uses of Blog's, wikis, digital
media websites and social
networks

Blog's (weblogs)
A blog is a kind ofonline journalora
logwhere'bloggers'write abouttopics
that are important to them.
Blog's can be about anything that the
blogger wants to share with other Internet
users and interesting Blog's can
attractmillions of visitors.

Wikis
Wikis areinteractive web pagesthat can beviewed
and edited by users.
Anyone with a web browser can visit a wiki and
makechanges to the content. This has both
advantages and disadvantages as shown below:
Advantage
Information is quickly added as many people collaborate
their knowledge.
Disadvantage
One of the problems with letting everyone add to the wiki
is that sometimes incorrect information is posted.

Digital media sharing websites


These websites allow users toupload video and
imageswhich can then beviewed by other
people.
Video sharing websites, in particular, are helping
tochange the way in which we can learn on
the Internet.
For example, YouTube has a huge amount of'how
to'and 'tutorial'videos for all sorts of topics.

Social networking websites


These websites create'communities'
of peoplewho can share information
about
theirlives,interestsandhobbieswith
each other.
They also make it easy for people
tomake new friendsand tokeep in
touch with each otherno matter
where they are in the world.

Issues with information on the Internet

Unreliable information
Undesirable information

Unreliable information
Just because something is written on
the Internet does not necessarily
make ittrueor correct.Anyone
can make a websiteand a lot of
the information held on these
websites isnever checked or
verified.

Undesirable information
Undesirable
websites
are
those
that
includecontent that is offensive to individuals
or even races. Undesirable content can include:

Pornography
Violent videos or images
Content promoting hatred
Racial content

Wecannot fullycensor (block)this type of


content from the Internet as many of the sites are
based inCountries that do not have laws
against it.

Security of information on the


Internet
As soon as we log onto the Internet
our sensitive information is at risk
of'hackers'and'fraudsters'fromtryi
ng to steal it. Common methods
include:
Phishing
Pharming
Spam

Phishing

'Phishing'is used to describe methods


thatthieves use to 'fish' for our data.
This is where fraudsters try andtrick us into
giving up our bank details,credit card
details,usernamesandpasswords.
Phishing is usually carried out over emails
pretending
to
be
from
legitimate
organisationslike
banks
and
building
societies.

Pharming
The intention of pharming is the same as phishing..... to
obtain personal information such
asusernames,passwordsandbank
detailsetc.
Pharming usually targets users of online banking or
shopping websites.
The
way
this
is
done
however
is
slightly
different.'Pharmers'infectlegitimate websites with
malicious codethat will're-direct'you to theirbogus
version
of
the
website.
The bogus website will look very similar, or even
identical, as the legitimate website. This makes pharming
very dangerous and difficult to detect.

Spam
Spam is'junk email'that issent
automaticallytothousands,
or
even
millions,
of
email
inboxes.Spam over-runs your inbox
very quickly and it is a pain to have
to delete all of these unwanted
emails
every
day.

Health and Safety


There are a number ofsafety
hazardslinked with using computers
and ICT devices.

Health problems
There are a number of health
problems that you can suffer if you
useICT devices incorrectlyor
fortoo long. The main ones are:
Repetitive Strain Injury (RSI)
Back and Neck Strain
Eye Strain and Headaches

Repetitive Strain Injury


(RSI)
RSI causespainful swelling of the
wrist and fingers. Sufferers with
really bad RSI are unable to use their
hands at all.
RSI is caused bydoing the same
small movements over and over
againacross a long period of
time.For example, clicking a mouse
button repeatedly.

Back and Neck Problems


Back ache and neck ache can
causegreat painand really affect
the quality of your life.
Both back and neck ache can be
caused bysitting incorrectlyand
usingpoor quality chairs without
back rests. This is calledpoor
posture

Eye Strain and


Headaches
Staring at a computer screen for too
long canstrain your eyes and cause
headaches.
Eye strain can cause yourvision to
blur.
Common causes of eye strain are
screen flickerand havingdirect
lightcausing screen glare.

Safety Issues
Electrocution
use of a residual circuit breaker (RCB)
check insulation on wires regularly
do not allow drinks near computers
check equipment regularly

Trailing wires
use cable ducts to make the wires
safe
cover wires and/or have them neatly
tucked away (under desks, etc.)
try and use wireless connections
wherever possible, thus eliminating
cables altogether

Heavy equipment falling


use strong desk and tables to
support heavy Hardware
use large desks and tables so that
hardware isnt too close to the edge
where it can fall off

Fire risk

dont cover equipment vents, which can cause


equipment to overheat
make sure hardware is fully maintained
ensure good ventilation in the room, again to
stop overheating of hardware
do not overload sockets with too many items
change to low voltage hardware wherever
possible
(e.g. replace CRT monitors with LCD monitors)

Vous aimerez peut-être aussi