ICT Grade 11 Information and Communication Technology and Society 2019.9.16


ICT in entertainment
i) 3D – three Dimensional  - With the use of advanced technologies producers can now make life looknreal on film using three dimensional technology
-       User needs to use 3D spectacles for the purpose
ii) Holographic Image processing Technology
A scene from a set shot in some place is recorded on camera and  this shots is used to display this image elsewhere.
This technology is mostly used with scenes depicting horror.
iii) Cartoon Films are popular due to the 3D feature
iv) Digital audio materials
-       Recording of songs , Creating rhythm and mixing freely can do using modern software
-        Songs recorded can easily be stored in compact discs (CDs).
-        It is also possible to listen to or view them using home theatre systems.
v) Digital games
            -           can easily be played on computers or cell phones
vi) Simulation games
-       These are based on an everyday activity in a natural setting created artificially
-       mostly used with training for sports activities, investigations, planning, military training, mercantile activities, and miming

Problems associated with the use of ICT
01     Legal issues           
i) Data thefts –
Personally Identifiable Information (PII) is stolen from a computer or other device considered as data theft
E.g      .Stealing  flash drives, digital camera, mobile phones that contain personal names, telephone numbers, photoes etc. without  permission or legal rights.
ii) Unauthorized access into computer systems
An organization's data can steal by accessing computer systems unlawfully with the theft of or manipulating user name and password of a computer.
iii) Intellectual property rights
-       Intellectual property relate to an innovation or a completely new  product from a person or an organization currently not in use.
-       These  are the property of the first person or organization
-       They claim ownership to the innovation.
-        Presenting such products in the names of others or using such products for other developments or sale of such products without the knowledge of the first person or organization is illegal
-         Such belongs to the category of stolen intellectual property.
·         . It is possible to obtain patent rights for protection of intellectual property.
A patent is a license issued by the state for innovations. To receive a  patent license the innovator must apply to the national office governing the product
iv) Fraud
-       Copying or impersonating with personal documents (bank account numbers,
signatures) contained in a CD, or over the Internet
-       copying literary works or use them for personal benefit
-       cheating people with likely business transaction or credit card fraud.

01     Issues related to values
i) Plagiarism
             is the act of stealing another’s creative work and displaying it as one’s own.
Ex       Stealing of data and other related information from the Internet.

It is possible to use data and other information collected from the Internet in better accepted ways.
1. Citing - mention the rightful owner and his information.
2. Quoting - the use of inverted commas (“…”) to identify a selected/ borrowed section.
3. Referencing - the listing of resources from which the information was collected.This is usually
     done at the end of an essay or article.

Physical issues
·         Sudden power failures may lead to damaged computing devices
·         Computer thieves.
·          Complete network breakdown with malware coming through the Internet
·          Environmental factors such as dirt, dust, moisture

logical issues
-       Computer hacking

Physical Security
i) Uninterrupted Power Supply (UPS)
In case of an electricity breakdown, UPS alternatively arrange power using battery to the  
computer
so that the network and the documents face no harm.
ii) Hardware Firewalls
-       This bought as a separate unit
-       Now been built into broadband routers
-       This act as a filter of exchanging information in internet
-       This protect network from unauthorized access
iii)  Controlled access through locked doors of computer laboratory
iii) CCTV is used to monitor movement from outside
iv) Surge protector
This is used to control  the power supply voltage in the  computers and other accessories inside a laboratory
v) Environmental factors
            it is important to maintain a laboratory free from dirt, dust, moisture

Logical Security
i) Passwords
            - Passwords protect unauthorized entry or use of a computer           
            - Mix letters, symbols and numbers  make the password stronger.
ii) Software Firewalls
-       This protect a network system from unauthorized access when using internet
-        This is part of the operating system and has to be active at all times
-        This checks all incoming data for authenticity and prevents suspicious data
-       This is protect the network from harmful software
iii) Backups
            -This is essential towards securing protection of data and information.
-  A backup can be maintained in an external hard disk, CD, DVD, a flash drive or a memory chip.
Malicious software / Malware
          Effects of Malware
-       Affect the efficiency of the computer (improper function, unnecessary attempts or re-start again and again)
-       Destruction or mal-function of software
-       Inability to install other software
-       Weaken computer hardware
-       Sabotage of computer networks
-       Data theft and destruction
-       Reduction of the storage capacity of the hard disk by the storing unnecessary documents and files

Harmful software and resultant damage
Computer Virus
·         Enter into the computer through networks, USB Flash drive and external devices like memory chip or through email by hiding inside the computer program
·         Spread rapidly within the computer causing enough harm.
·         viruses always remain active within the computer( as executable files).
Computer Worms
·         This also act similar to computer viruses,
·         These are capable of acting and spreading alone using social engineering strategies such as  e-mail attachments, false websites and instant messages.
·          Worms are produced using social engineering strategies
Spyware – Trojan Horse
·         This presents itself as harmless and enters the system without the knowledge of the user
·          This makes the user uncomfortable by unnecessary opening up windows, producing different desktops, deleting documents and stealing data.
·          it allows other harmful software to gain entry to the computer system
·          This enters computer with e mail attachments.
·         This does not spread by itself
Spyware – Adware
·         The adware is displaying unnecessary notices on the computer screen.
·         Using these advertisements, adware collects commercial information.
·          Adware is not harmful as other computer viruses but disturbs the user mentally
Bots
·         Bots are derived from the word ‘robots’.
·         This harmful software that functions on its own communicating with other networks.
·         Bots are used to collect personal information through Internet messages and conversations.
Hijacker/Browser Hijacker
·          This is misdirecting a user to a different website through the Internet, to collect information regarding trade, commerce and advertisements
·          This is similar to adware
Phishing
·         Phishing is the art of deceiving users to collect information about bank accounts or electronic accounts.
·          E-mail is used for the purpose.
·         Such mail is sent through a popular organization or a friend together with a link for access.
·         With the click on the link or by filling forms valuable information and cash deposits related to the unsuspecting user get stolen
Spam
·         Spam is unauthorized e-mail. Most often, spam relates to advertisements about products or a mail from an unknown person .
·         The mail box can get filled with such mail and make the user uncomfortable.
·         Also, Spam may collect e-mail addresses that can be used unlawfully for frauds.

Safeguarding computer and a computer network from harmful software
1.      Install a virus guard into the computer. Update the virus guard as is necessary. Keep Guard/Shield/Auto Scan/Update always active.
2.     Be careful with the use of a USB memory. Check USBs for possible viruses using antivirus software.
3.     Always install authorized software
4.     Instead of an administrator account, maintain a user account

If the computer is connected to the Internet,
·         Access Secure websites. Check URL for verification
·          Select only secure websites for the download of software or other material.
·          Before a download, check with a virus guard
·         Be careful with opening up e-mail. Where necessary use a virus guard before a downloading and attachment. Do not click on suspicious links in e-mail. Avoid opening suspicious e mails.
·         Avoid suspicious advertisements or messages.
·         Do not enter personal information without checking on security.
·         Use firewall, virus guards, email filters to avoid the risk

Some secure, popular virus guards to be installed on a computer are as follows.
·         Avira Antivirus                                                           Avast Antivirus AVG Antivirus
·          K7 Antivirus                                                                          Digital Defender Antivirus
·          Norman Antivirus                                                     Kaspersky Antivirus
·          Panda Cloud Antivirus (B)                                                Microsoft Security Essentials
·          Norton Antivirus                                                       BitDefender Antivirus
·          McAfee Antivirus

Cyber Security.

Protect internet base activities from unauthorized access into social networks, financial website are called as ‘Cyber Security’.

Cyber security is not limited to e-mail, Internet solutions, or social networks. They are useful for personal networks and operating systems (OS).

organizations responsible for cyber security are as follows.
·         Institution for Information Security of Sri Lanka
Information and Communication Technology Agency (ICTA) is responsible for the establishment of this institution in Sri Lanka. It provides facilities to various groups
Citizens
establishments
State institutions.
·         ICTA, Sri Lanka Standards Bureau and the Sri Lanka Emergency Computer services have together organized to certify Information Security Management Systems (ISMS) to ensure security of information.

Health issues related to use of Information Communication Technology

Ergonomics and health issues
            A job must be created to the comfort of the worker and the worker must  not be forced to adjust to the work. If not, the worker will subject to various tensions and illnesses

Health Issues arise as a result of the continuous use of a computer for over four hours at a stretch.
Eg      
i) Musculoskeletal Problems
- Non-stop use of a computer can bring about pain in different muscles and bones of the human system.
- The main reason for this is the wrong posture taken with the use of the computer
ii) RSI – Repetitive Stress Injury
-       Pain from the shoulder to the fingers of the body
-       The affected areas can show swelling and hardness that brings out the pain
-       The difficulty to move the mouse is a result of this pain.
-       The cause of the pain is incorrect posture
iii) CTS – Carpel Tunnel Syndrome
-       Carpel tunnel syndrome is the feeling of a numbness and pain in the fingers
-       The pain arises due to the pressure exerted on the wrist.
-        Incorrect use of the key board and the mouse or placing them in the incorrect positions are reasons for the syndrome.
iv) CVS - Computer Vision Syndrome
-       Sticking to the computer continuously for 6 to 7 hours can cause irritation of the eyes
-       Dry eyes, redness in the eyes, tearing, blurred vision, or pain in the head, neck or back are symptoms of the discomfort.
v) Headache
            - Pressure on the muscles of the neck and tiredness around the eyes cause this
vi) Stress
-       Increase of activities in the working environment  cause stress
-       Sleeplessness, tiredness, lack of appetite are result of this

To avoid these health problem
Correct posture in the use of a computer is important
1.    Keeping the computer on a suitable table at eye level or a little lower
2.    The distance between the computer screen and the eye to be 18 – 28 inches(45-70 cm)
3.    Keeping the user’s back straight against the back of the chair and keeping shoulders relaxed
4.    Keeping legs vertical to the ground with the soles flat on the surface
5.    Keeping the mouse near the computer, keying in words lightly, moving wrist as is necessary while keeping the keyboard straight at elbow level or lower




To adhere to these movements

·         Adjust light on the computer to make the eyes comfortable
·         Blink and take the eyes off screen on and off
·         Take a break in between work, walk short distance
·         Fix playtime sessions for children and direct them to other activities
·         People using computer at work for 7 to 8 hours need to refrain from using computer at home and maintain a relaxed mind

E- waste – Harmful element and effects on environment
            Electronic product such as computers, television, mobile phone, printers work using electricity or powered by batteries have become non working after reaching the end of their useful life are known as a e-waste
            ex        personal electronic devices                                               Mouse keyboard
                        CFL bulbs (contain mercury )                                            Mobile phone
                        Audio/ Video equipment

Health effects of Mercury
·         Damage to brain cells                    
·         Disruption of the nervous system
·         Allergies on the skin
·         Once inhaled, Mercury can harm kidney, liver and central nervous system
·         Damage to DNA

Other cause
-       Swelling and irritation on the body                 -  nausea
-       Stress                                                                   -  Issues in blood veins
-       Cancers

Other harmful element
-      Arsenic                      -  Barium                    - Beryllium                 -  Cadmium
-      Chromium                 -  Dioxins                   -  Lead

Proper Disposal of e waste
1.    Reduce – Reduce unnecessary purchase
2.    Reuse – Sell or donate old working electronic devices
3.    Recycle –

Social Issues Related with ICT
1)    Digital Divide -          Economic social inequality due to the difference in access to, ability to
or use of information Communication Technology
            Reason for Digital Divide
-      Education/ Lack of Education
-      Ability to use technology/ Inability to use technology
-      Affluence / Poverty
-      Industrial development / Under Industrial development

2)    Digital Bridge -          is forming connection among people avoiding the digital divide.
How to form a Digital Bridge
·         Digital Literacy – Establishing places such as Vidatha Centers, Nenasala, Computer Resource  to provide free use of computer
·         Supply of Computers
3)    De Skilling    -           Machinery or Automation has taken over skilled labour in places of
work, driving people away towards unemployment
            Ex       -  Machinery has taken over the industry replacing the talents of people
                        -  Libraries have been made close down due to electronic books
                        -  Online learning limited teacher resources

Technology related employment opportunities
·         Computer Programmer
·         Information System Analyst
·         Data Communication Analyst
·         Database Programming and Analyst
·         Desktop/Applications Support Specialist

Misuse of ICT to harm Society
1)    Social Media -           Social Media could be introduces as a fertile breeding ground towards connecting people globally, cultivating associations and grouping like-minded people towards exchanging personal information and opinions on related topic of interest

Services of Social Media
·         Promote one’s products profitably
·         Blogs -      Blogs are shortened form for Web logs and refer to routing personal diaries or magazines.
-      People can present their daily experiences or about happenings that could cause harm to society
·         Forum      -Forms are routing discussion panels.
-      This provide a good opportunity for people to openly  express common opinion.
2)    Cyber Crime  - Irresponsible use of social media called cyber crime
Ex      
·         Uploading others images without permission
·         Releasing unsuitable photos or videos of women or young girls to the internet and making use of such to frighten, threaten or blackmail
·         Misleading people with wrong information and images
·         Using unfair to gain access to others’ personal accounts and stealing personal information

How can protect from these
§  Be careful in selecting social media over the internet
§  Be careful I presenting personal information to social media
§  Avoid accessing suspicious e-mails
§  Ignore anonymous e-mails
§  Do not click on suspicious links that come through e-mail
§  Do not use personal e-mail to access social media


Comments

Popular posts from this blog

ICT Grade 10 - Operating Systems english

Grade 10 Database (Lesson 09) ehglish