Download presentation
Presentation is loading. Please wait.
Published byDominick Hodges Modified over 9 years ago
1
Your Interactive Guide to the Digital World Discovering Computers 2012 Lecture -13
2
COMPUTERS IN DAILY LIFE Education Finance Government Health care Science Publishing Travel Manufacturing
3
EXAMPLE - MANUFACTURING Robots are used for painting, welding, and other repetitive assembly-line jobs Computers also help track inventory, time the delivery of parts. control the quality of the production. Engineers use CAD (computer-aided design) and CAM (computer-aided manufacturing) technologies to design new products and the machines that build those products
4
THE PAPERLESS OFFICE Experts have predicted the paperless office - Computer archives will replace reference books and file cabinets Electronic communication will replace letters and memos An intranet will coordinate resources
5
COMPUTERS AND JOBS Computers may cause unemployment Automation - part of a job A bank worker no longer needs to fill in a paper ledger Structural - a whole job disappears Type-setters are no longer used to arrange the lead blocks of type for newspapers; it now goes straight from computer to printing press
6
COMPUTERS CAN CREATE JOBS Many jobs available now didn’t exist before computers Web design Programmer Systems analyst
7
THE ENVIRONMENT A PC uses a lot of electricity (biggest single user in the average workplace) And often sits idle The system unit and CRT monitor contain heavy metals PCs are often replaced every 4 or so years, and just thrown out
8
THE GREEN PC Energy Star compliant PCs requiring little power when they are not in use. System unit Energy saving chip Sleep mode for chip Eliminate cooling fan Display Flat panel (less power, less chemicals) Sleep mode Manufacturing Fewer harmful chemicals
9
WHAT SHOULD YOU DO TO SAVE ENVIRONMENT? Use computers and devices that comply with Energy Star program Do not leave the computer running overnight Turn off the monitor, printer, and other devices when not in use. Use paperless method to communicate Recycle paper Buy recycled paper. Recycle toner cartridges Recycled old computers and printers.
10
ETHICS, SAFETY AND LIABILITY Ethics Good and bad, right and wrong; moral duty “Your good name” Safety Computer programs and systems must have the highest priority on safety Liability Who is to blame when things go wrong? Software engineering – engineering principles Fault tolerant systems
11
PRIVACY ON THE INTERNET AND WWW Internet has an illusion of anonymity Email may be monitored within the organization A copy of every email remains at every “hop” along it’s journey Your own PC records your browsing history Most sites you visit record information from your computer A cookie may be left on your hard disk
12
TAKING STEPS TO PROTECT INTERNET PRIVACY Use a web-based email address (e.g. Hotmail) as your public address Never give your real name and details Empty your History file Delete cookies (by hand or use “Cookie Cutter” programmes e.g. Window Washer) Use a software firewall e.g. BlackIce Defender, ZoneAlarm Be aware of the issues
13
COPYRIGHT Intellectual property is protected by copyright laws Copyright is the exclusive legal right that prohibits the copying of intellectual property without the permission of the copyright holder Unauthorized copying of computer programs (software piracy) is theft
14
PIRACY Software piracy - the illegal copying of software (one copy may be allowed for backup) Copying copyright software to sell is illegal Copying copyright software to give away is illegal Copying copyright software across a network (e.g. the Internet) is illegal This also applies to MP3s, videos, and movies
15
PROPRIETARY SOFTWARE Proprietary software is software that has a copyright applying Individual or business, usually the developer The ownership of this software is protected by copyright laws Buying software does not give you ownership; it gives you a license to use the software You “rent” the software The license describes how you may use the software
16
PENALTIES OF COPYRIGHT CRIME The laws in different countries vary Some countries pay little notice; others are very strict Punishment varies Larger companies tend to attract larger fines Large-scale copying for profit may lead to prison This issue is becoming more important, especially in the entertainment industry
17
PLAGIARISM Very easy to use IT to plagiarise; copy and paste More and more e-Journals, e-Books Software developed to detect plagiarism
18
YOUR RESPONSIBILITIES Purchase genuine software and use according to the license Do not trade in pirate software Managers/owners of a business are responsible for what happens in their business Helping someone to break the law can be as bad as doing it yourself Ethical behaviour - “Doing the right thing”
19
COMPUTER SECURITY RISKS A computer security risk is any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability A cybercrime is an online or Internet-based illegal act DISCOVERING COMPUTERS 2012: CHAPTER 11 19 Pages 556 - 557
20
COMPUTER SECURITY RISKS DISCOVERING COMPUTERS 2012: CHAPTER 11 20 Pages 556 – 557 Figure 11-1
21
INTERNET AND NETWORK ATTACKS TYPES OF MALICIOUS SOFTWARE Virus Affects a computer negatively by altering the way the computer works Worm Copies itself repeatedly, using up resources and possibly shutting down the computer or network Trojan Horse A malicious program that hides within or looks like a legitimate program Rootkit Program that hides in a computer and allows someone from a remote location to take full control DISCOVERING COMPUTERS 2012: CHAPTER 11 21 Page 558
22
INTERNET AND NETWORK ATTACKS An infected computer has one or more of the following symptoms: DISCOVERING COMPUTERS 2012: CHAPTER 11 22 Pages 558 - 559 Operating system runs much slower than usual Available memory is less than expected Files become corrupted Screen displays unusual message or image Music or unusual sound plays randomly Existing programs and files disappear Programs or files do not work properly Unknown programs or files mysteriously appear System properties change Operating system does not start up Operating system shuts down unexpectedly
23
INTERNET AND NETWORK ATTACKS DISCOVERING COMPUTERS 2012: CHAPTER 11 23 Page 560 – 561 Figure 11-7
24
INTERNET AND NETWORK ATTACKS A firewall is hardware and/or software that protects a network’s resources from intrusion DISCOVERING COMPUTERS 2012: CHAPTER 11 24 Pages 563 - 564 Figure 11-8
25
UNAUTHORIZED ACCESS AND USE Unauthorized access is the use of a computer or network without permission Unauthorized use is the use of a computer or its data for unapproved or possibly illegal activities DISCOVERING COMPUTERS 2012: CHAPTER 11 25 Page 564
26
UNAUTHORIZED ACCESS AND USE Access controls define who can access a computer, when they can access it, and what actions they can take Two-phase processes called identification and authentication Username Password DISCOVERING COMPUTERS 2012: CHAPTER 11 26 Pages 565 – 567 Figure 11-11
27
UNAUTHORIZED ACCESS AND USE A possessed object is any item that you must carry to gain access to a computer or computer facility Often are used in combination with a personal identification number (PIN) A biometric device authenticates a person’s identity by translating a personal characteristic into a digital code that is compared with a digital code in a computer DISCOVERING COMPUTERS 2012: CHAPTER 11 27 Page 568 Figure 11-14
28
HARDWARE THEFT AND VANDALISM Hardware theft is the act of stealing computer equipment Hardware vandalism is the act of defacing or destroying computer equipment DISCOVERING COMPUTERS 2012: CHAPTER 11 28 Page 570
29
HARDWARE THEFT AND VANDALISM To help reduce the of chances of theft, companies and schools use a variety of security measures DISCOVERING COMPUTERS 2012: CHAPTER 11 29 Page 570 Figure 11-15 Physical access controls Alarm systems Cables to lock equipment Real time location system Passwords, possessed objects, and biometrics
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.