ICT Grade 11 Information and Communication Technology and Society 2019.9.16
ICT
in entertainment
i) 3D – three Dimensional - With the use of advanced technologies producers can now make life looknreal on film using three dimensional
technology
- User needs to use 3D spectacles for the purpose
ii) Holographic Image processing Technology
A scene from a set shot in
some place is recorded on camera and
this shots is used to display this image elsewhere.
This technology is mostly used with scenes
depicting horror.
iii) Cartoon Films are popular due to the 3D feature
iv) Digital audio materials
- Recording of songs , Creating rhythm and mixing
freely can do using modern software
- Songs
recorded can easily be stored in compact discs (CDs).
- It is
also possible to listen to or view them using home theatre systems.
v) Digital games
- can easily be played on computers or cell phones
vi) Simulation games
- These are based on an everyday activity in a
natural setting created artificially
- mostly used with training for sports activities,
investigations, planning, military training, mercantile activities, and miming
Problems associated with the use of ICT
01 Legal issues
i) Data thefts –
Personally Identifiable Information (PII) is stolen from a computer or other device considered
as data theft
E.g .Stealing flash drives, digital camera, mobile phones that contain personal names,
telephone numbers, photoes etc. without permission
or legal rights.
ii) Unauthorized access into computer systems –
An organization's data can
steal by accessing computer systems unlawfully with the theft of or
manipulating user name and password of a computer.
iii) Intellectual property rights –
- Intellectual property relate to an innovation or
a completely new product from a person
or an organization currently not in use.
- These are
the property of the first person or organization
- They claim ownership to the innovation.
-
Presenting such products in the names of
others or using such products for other developments or sale of such products
without the knowledge of the first person or organization is illegal
-
Such belongs to the category of stolen
intellectual property.
·
. It is possible to obtain
patent rights for protection of intellectual property.
A patent is a license
issued by the state for innovations. To receive a patent license the innovator
must apply to the national office governing the product
iv) Fraud
- Copying or impersonating with personal documents
(bank account numbers,
signatures) contained in a CD, or over the Internet
-
copying literary works or use
them for personal benefit
-
cheating people with likely
business transaction or credit card fraud.
01 Issues
related to values
i) Plagiarism
is the
act of stealing another’s creative work and displaying it as one’s own.
Ex Stealing
of data and other related information from the Internet.
It is possible to use data
and other information collected from the Internet in better accepted ways.
1. Citing - mention the rightful owner and his
information.
2. Quoting - the use of inverted commas (“…”) to identify
a selected/ borrowed section.
3. Referencing - the listing of resources from which the
information was collected.This is usually
done at the
end of an essay or article.
Physical issues
·
Sudden power failures may
lead to damaged computing devices
·
Computer thieves.
·
Complete network breakdown with malware coming
through the Internet
·
Environmental factors such as dirt, dust, moisture
logical issues
- Computer hacking
Physical Security
i) Uninterrupted Power
Supply (UPS)
In case of an electricity breakdown,
UPS alternatively arrange power using battery to the
computer
so that the network and the
documents face no harm.
ii) Hardware Firewalls
-
This bought as a separate unit
-
Now been built into broadband routers
-
This act as a filter of exchanging information in
internet
- This protect network from unauthorized access
iii) Controlled
access through locked doors of computer
laboratory
iii) CCTV is used to monitor movement from outside
iv) Surge protector
This is used to control
the power supply voltage in the computers and other accessories inside a laboratory
v) Environmental factors
it is important to maintain a laboratory free
from dirt, dust, moisture
Logical Security
i) Passwords
-
Passwords protect unauthorized entry or use of a computer
- Mix
letters, symbols and numbers make the
password stronger.
ii) Software Firewalls
- This protect a network system from unauthorized access when using
internet
- This is
part of the operating system and has to be active at all times
- This
checks all incoming data for authenticity and prevents suspicious data
- This is protect the network from harmful
software
iii) Backups
-This is
essential towards securing
protection of data and information.
- A backup can be maintained in an external hard disk, CD, DVD, a flash drive or a memory chip.
Malicious software / Malware
Effects of Malware
- Affect the efficiency of the computer (improper
function, unnecessary attempts
or re-start again and again)
- Destruction or mal-function of software
- Inability to install other software
- Weaken computer hardware
- Sabotage of computer networks
- Data theft and destruction
- Reduction of the storage capacity of the hard
disk by the storing unnecessary documents and files
Harmful software and resultant damage
Computer Virus
·
Enter into the computer
through networks, USB Flash drive and external devices like memory chip or through
email by hiding inside the computer program
·
Spread rapidly within the
computer causing enough harm.
·
viruses always remain
active within the computer( as executable files).
Computer Worms
·
This also act similar to
computer viruses,
·
These are capable of
acting and spreading alone using social engineering strategies such as e-mail attachments, false websites and
instant messages.
·
Worms are produced using social engineering
strategies
Spyware – Trojan Horse
·
This presents itself as harmless
and enters the system without the knowledge of the user
·
This makes the user uncomfortable by
unnecessary opening up windows, producing different desktops, deleting
documents and stealing data.
·
it allows other harmful software
to gain entry to the computer system
·
This enters
computer with e mail attachments.
·
This
does not spread by itself
Spyware – Adware
·
The adware is displaying
unnecessary notices on the computer screen.
·
Using these
advertisements, adware collects commercial information.
·
Adware is not harmful as other computer
viruses but disturbs the user mentally
Bots
·
Bots are derived from the
word ‘robots’.
·
This harmful software that
functions on its own communicating with other networks.
·
Bots are used to collect
personal information through Internet messages and conversations.
Hijacker/Browser
Hijacker
·
This is
misdirecting a user to a different website through
the Internet, to collect information regarding trade, commerce and
advertisements
·
This is similar to
adware
Phishing
·
Phishing is the art of
deceiving users to collect information about bank accounts or electronic
accounts.
·
E-mail is used for the purpose.
·
Such mail is sent through a
popular organization or a friend together with a link for access.
·
With the click on the link or by filling forms valuable information and cash deposits related
to the unsuspecting user get stolen
Spam
·
Spam is unauthorized
e-mail. Most often, spam relates to advertisements about products or a mail
from an unknown person .
·
The mail box can get filled with such mail and make the user uncomfortable.
·
Also, Spam may collect
e-mail addresses that can be used unlawfully for frauds.
Safeguarding computer and a computer network from harmful
software
1.
Install a virus guard into the computer. Update the virus guard as is
necessary. Keep Guard/Shield/Auto Scan/Update always active.
2.
Be careful with the use of a USB memory. Check USBs for possible viruses
using antivirus software.
3.
Always install authorized software
4.
Instead of an administrator account, maintain a user account
If the computer is connected to the Internet,
·
Access Secure websites.
Check URL for verification
·
Select only secure websites for the download of software or other material.
·
Before a download, check with a virus guard
·
Be careful with opening up
e-mail. Where necessary use a virus guard before a downloading and attachment.
Do not click on suspicious links in e-mail. Avoid opening suspicious e mails.
·
Avoid suspicious
advertisements or messages.
·
Do not enter personal
information without checking on security.
·
Use firewall, virus
guards, email filters to avoid the risk
Some secure, popular virus guards to be installed on a
computer are as follows.
·
Avira Antivirus Avast Antivirus AVG Antivirus
·
K7 Antivirus Digital Defender Antivirus
·
Norman Antivirus Kaspersky Antivirus
·
Panda Cloud Antivirus (B) Microsoft Security Essentials
·
Norton Antivirus BitDefender Antivirus
·
McAfee Antivirus
Cyber Security.
Protect internet base activities from unauthorized access
into social networks, financial website are called as ‘Cyber Security’.
Cyber security is not limited to e-mail, Internet
solutions, or social networks. They are useful for personal networks and
operating systems (OS).
organizations responsible for cyber security are as
follows.
·
Institution for
Information Security of Sri Lanka
Information and
Communication Technology Agency (ICTA) is responsible for the establishment of
this institution in Sri Lanka. It provides facilities to various groups
Citizens
establishments
State institutions.
·
ICTA, Sri Lanka Standards
Bureau and the Sri Lanka Emergency Computer services have together organized to
certify Information Security Management Systems (ISMS) to ensure security of
information.
Health issues related to use of Information Communication
Technology
Ergonomics and health issues
A job must be created to the comfort of the worker and the worker must not be forced to adjust to the work. If not,
the worker will subject to various tensions and illnesses
Health Issues arise as a result of the continuous use of
a computer for over four hours at a stretch.
Eg
i) Musculoskeletal Problems
- Non-stop use of a
computer can bring about pain in different muscles and bones of the human
system.
- The main reason for this
is the wrong posture taken with the use of the computer
ii) RSI – Repetitive Stress Injury
- Pain from the shoulder to the fingers of the body
- The affected areas can show
swelling and hardness that brings out the pain
- The difficulty to move the mouse is a result of
this pain.
- The cause of the pain is incorrect posture
iii) CTS – Carpel Tunnel Syndrome
- Carpel tunnel syndrome is the feeling of a numbness and pain in the fingers
- The pain arises due to the pressure exerted on
the wrist.
- Incorrect use of the key board and the mouse
or placing them in the incorrect positions are reasons for the syndrome.
iv) CVS - Computer Vision Syndrome
- Sticking to the computer continuously for 6 to
7 hours can cause irritation of the eyes
- Dry eyes, redness in the eyes, tearing, blurred
vision, or pain in the head, neck or back are symptoms of the discomfort.
v) Headache
- Pressure on the muscles of the
neck and tiredness around the eyes cause this
vi) Stress
- Increase of activities in the working environment cause stress
- Sleeplessness, tiredness, lack of appetite are result of this
To avoid these
health problem
Correct posture
in the use of a computer is important
1. Keeping the computer on a suitable table at eye level or a little lower
2. The distance between the computer screen and the eye to be 18 – 28
inches(45-70 cm)
3. Keeping the user’s back straight against the back of the chair and keeping
shoulders relaxed
4. Keeping legs vertical to the ground with the soles flat on the surface
5. Keeping the mouse near the computer, keying in words lightly, moving wrist
as is necessary while keeping the keyboard straight at elbow level or lower
To adhere to these movements
·
Adjust light on the
computer to make the eyes comfortable
·
Blink and take the eyes
off screen on and off
·
Take a break in between
work, walk short distance
·
Fix playtime sessions for
children and direct them to other activities
·
People using computer at
work for 7 to 8 hours need to refrain from using computer at home and maintain
a relaxed mind
E- waste – Harmful element and effects on
environment
Electronic
product such as computers, television, mobile phone, printers work using
electricity or powered by batteries have become non working after reaching the
end of their useful life are known as a e-waste
ex personal electronic devices Mouse keyboard
CFL
bulbs (contain mercury ) Mobile
phone
Audio/
Video equipment
Health effects of Mercury
·
Damage to brain cells
·
Disruption of the nervous
system
·
Allergies on the skin
·
Once inhaled, Mercury can
harm kidney, liver and central nervous system
·
Damage to DNA
Other cause
- Swelling and irritation on the body - nausea
- Stress - Issues in blood veins
- Cancers
Other harmful element
- Arsenic - Barium -
Beryllium - Cadmium
- Chromium - Dioxins - Lead
Proper Disposal of e waste
1.
Reduce – Reduce
unnecessary purchase
2.
Reuse – Sell or donate old
working electronic devices
3.
Recycle –
Social Issues Related with ICT
1)
Digital Divide - Economic
social inequality due to the difference in access to, ability to
or use of information Communication Technology
Reason for Digital Divide
- Education/ Lack of Education
- Ability to use technology/ Inability to use technology
- Affluence / Poverty
- Industrial development / Under Industrial development
2)
Digital Bridge - is
forming connection among people avoiding the digital divide.
How to form a Digital Bridge
·
Digital Literacy – Establishing places such as Vidatha
Centers, Nenasala, Computer Resource to
provide free use of computer
·
Supply of Computers
3)
De Skilling - Machinery or Automation has taken
over skilled labour in places of
work, driving people away towards unemployment
Ex - Machinery has taken over the industry
replacing the talents of people
- Libraries have been made close down due to
electronic books
- Online learning limited teacher resources
Technology
related employment opportunities
·
Computer Programmer
·
Information System Analyst
·
Data Communication Analyst
·
Database Programming and Analyst
·
Desktop/Applications Support Specialist
Misuse of ICT to
harm Society
1) Social Media - Social Media could be introduces as a fertile breeding
ground towards connecting people globally, cultivating associations and
grouping like-minded people towards exchanging personal information and
opinions on related topic of interest
Services of Social Media
·
Promote one’s products profitably
·
Blogs - Blogs
are shortened form for Web logs and refer to routing personal diaries or
magazines.
- People can present their daily experiences or about happenings that could
cause harm to society
·
Forum -Forms
are routing discussion panels.
- This provide a good opportunity for people to openly express common opinion.
2) Cyber Crime - Irresponsible use of
social media called cyber crime
Ex
·
Uploading others images without permission
·
Releasing unsuitable photos or videos of women or young
girls to the internet and making use of such to frighten, threaten or blackmail
·
Misleading people with wrong information and images
·
Using unfair to gain access to others’ personal accounts
and stealing personal information
How can protect from these
§ Be careful in selecting social media over the internet
§ Be careful I presenting personal information to social media
§ Avoid accessing suspicious e-mails
§ Ignore anonymous e-mails
§ Do not click on suspicious links that come through e-mail
§ Do not use personal e-mail to access social media
Comments
Post a Comment