Download presentation
Presentation is loading. Please wait.
1
Information Technology
2
Safety and Health
3
Right methods to deal with the computer
1) The screen: Position your head on an vertical angle with the screen on an arm distance. Use screen filter. Use eyes keeping glasses. Adjust the screen lights brightness settings to be comfortable for your eyes. 2) The keyboard should be in front of you under your hand in the same level.
4
Right methods to deal with the computer
3) You should put the mouse over a pad to save it from dust. 4) The chair and the table should be adjustable and in good height. 5) You should handle the disks carefully and keep them in boxes because they are sensitive. 6) Avoid dust, foods, drinks and sun shine by using covers. 7) Use cleaning tools to clean up the computer. 8) Use original ink and good paper for printing.
5
Right methods to deal with the computer
6
Health Problems which caused by the wrong use of computers:
Eyes problems because of the wrong distance from the computer screen like tears landing, vision problems and eye inflammation. Neck, back and leg pains because of the use of cheep chairs and tables. Poisoning because of the using of the ink with hands without gloves.
7
Advices when connecting your computer
Be careful from connecting your computer with wrong power supply(110, 220 volt). Catch the cable from the head to connect your computer with a plug. Make sure that power points are not overloaded. Don’t put radiation sources (magnet, TV, mobile) near the computer. Don’t turn on the computer when the power is low or irregular.
8
Information technology protection
9
Information Security It is a science which focuses on how to provide protection to the information and to compact exploitation activities.
10
How to provide protection for information system
Put password to log in for information. Download anti-viruses program. Ensure of sources. Protect e-commerce websites. Adopt fingerprint eye print or voice print. Create a copy of your work outside the system.
11
Risks faced by any information system
Data fraud. Password capture. Receive s from unknown sources. Download software from sites that may contain viruses or spy files.
12
Privacy The privacy includes:
Individuals rights to determine to what extent their information are available to the others. The privacy includes: Any information (passport, traffic and civil cases) Personal computer and laptops. Mobiles and number of telephones. Companies and institution which store a large amount of customer data.
13
Data Protection Ways of data protection:
It is part of privacy or information security which attempt to stop attacks that threaten personal information. Ways of data protection: Using user IDs and passwords. Using the encryption techniques. If you viewed your in Internet café do not leave the café before signing out your . Don’t leave your computer open and use screen saver with password. Don’t leave your devices with any person.
14
Viruses They are software programs which are written with the intention of causing damage in a computer system.
15
Viruses Spreading ways
Computer networks. Unoriginal programs copying and distribution.
16
Types of viruses Trojan horse. Logical bombs. Time bombs. Trap door.
Worms. Boot-Sector Virus. Macro Virus.
17
Viruses Protection ways
Don’t use floppies from unreliable sources. Use only registered software. Never open an attachments from unreliable source. Install an anti-virus program and keep it up-to-date.
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.