0% found this document useful (0 votes)
16 views11 pages

Lesson Notes Spocial Impact

Uploaded by

tansuhbless
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
16 views11 pages

Lesson Notes Spocial Impact

Uploaded by

tansuhbless
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 11

The interrelationship among key Web technology concepts

File transfer protocol (FTP)


This is a set of rules for communicating over the Internet. An FTP program enables you to find an electronic file
stored on a computer somewhere and download it (take a file from one computer on the Internet and copy it
to a storage device on your computer). It also allows you to upload files (send files to other computers on
the Internet). Some FTP sites are private and require you to pay to retrieve or store information on them.

Electronic mail (e-mail)


This is the most popular and widely used service on the Internet. It enables users worldwide to send electronic
messages (text, sound, video and graphics) to one individual or group of individuals, and receive messages from
others.

World Wide Web (WWW)


The WWW also called W3 is part of the Internet. It consists of hypertext and hypermedia documents called web
pages.

Web page
This is a collection of text and multimedia documents.

Web server
A computer that stores and makes available hypertext and hypermedia documents.

Hyperlink
This is an element in a document (text or graphics) that allows you to move easily from one document to the
next or to another position in the document.

Hypertext mark-up language (HTML)


This is a programming language used to create hypertext and hypermedia documents. HTML specifies how a
web page is structured and how it looks when it is displayed in the browser. HTML is used to create the
hyperlinks.

Hypertext transfer protocol


Hypertext transfer protocol (HTTP) is a set of rules that controls how data travels between the web server and
client.

Uniform Resource Locator (URL)


This is the address of a website. It is usually in the format:

Protocol://www.Server/Path/Filename

e.g. http://www.limewire.com/home/aboutUs.html

Protocol Path
Upload and download
Server Filename
1
Uploading is the transferring of data and information from your personal computer to the world wide web
(internet).

Downloading is the transferring of data and information from the world wide web to your personal computer.

SOCIAL AND ECONOMIC IMPACT OF INFORMATION AND COMMUNICATIONS


TECHNOLOGY

Computer Security
Computer security, which is also known as cybersecurity or information technology security, describes the
techniques employed for protecting computers, networks, programs, information systems and data from
unauthorised access or attacks, theft, or damage to the hardware, the software and the information stored on
them.
Companies or organisations will ensure that computer security is implemented to minimise the risk of the
following elements: vulnerability, threat, attack and countermeasure.

COMPUTER MISUSE
Computers make it so easy for you to collect, store and share information; likewise, it is also easy for the misuse
of information or the committing of computer crimes.
Information may be misused in the following ways:
■ By collecting information about people without their permission.
■ By revengeful employees or employers who want to spread propaganda on suspecting persons.
■ By using information for purposes other than those for which it was intended.

Misuse can occur in the following ways:


1. CYBERBULLYING
This is the use of cell phones, emails and social network sites to bully a person, typically by sending messages
of an intimidating or threatening nature.

2. COPYRIGHT INFRINGEMENT
A copyright infringement is a violation of an individual or organisation’s copyright. It describes the
unauthorised use of copyrighted material, such as text, photos, videos, music, software and other original
content.

3. DATA THEFT
This is the act of stealing computer-based information from an unknowing target with the intention of
compromising privacy or obtaining confidential information.
4. DENIAL-OF-SERVICE ATTACK
A denial-of-service attack is a security event that occurs when an attacker prevents legitimate users from
accessing specific computer systems, devices, services or other IT resources.

5. MALWARES AND COMPUTER VIRUSES


Malware is an abbreviated term meaning ‘malicious software’. This is software that is specifically designed to
gain access to or damage a computer without the knowledge of the owner.
A virus is a type of malicious software program that, when executed, replicates by reproducing itself (copying
its own source code) or infecting other computer programs by modifying them.

6. IDENTITY THEFT
This is the crime of obtaining the personal (name, identifying number, etc) or financial information, such as a
credit card number, of another person for the main purpose of assuming the person’s name or identity to make
transactions or purchases, without their permission, to commit fraud or other crimes.

8. PHISHING ATTACKS
This is the fraudulent use of electronic communications to deceive and take advantage of users, often to steal
the user’s data, including login credentials and credit card numbers. It occurs when an attacker poses as a
trusted entity and deceives a victim into opening an email, instant message or text message.

9. SOFTWARE AND MUSIC PIRACY


Software piracy is the act of illegally using, copying or distributing programs (software) without the consent of
the owner. The majority of software today is purchased as a single-user licence, meaning that only one
computer may have that software installed on it at one time. Copying that software to multiple computers or
sharing without multiple licences is considered software piracy, which is illegal.
Music piracy is the copying and distributing of copies of a piece of music for which the composer, recording
artiste, or copyright-holding record company did not give consent.

10. FINANCIAL ABUSES


2
This may be defined as where a current or former partner controls someone’s ability to acquire, use or maintain
financial resources by preventing victims from earning or accessing their own money.
11. VIOLATION OF PRIVACY
This is the intrusion into the personal life of another, without just cause, which can give the person whose
privacy has been invaded a right to bring a lawsuit for damages against the person or entity that intruded. It
encompasses workplace monitoring, Internet privacy, data collection, and other means of disseminating private
information.

12. PROPAGANDA
The use of computer systems to distribute information for spreading both beneficial and harmful material. The
widespread use of the Internet by computer users has created a readily accessible means of transmitting such
material.

13. INDUSTRIAL ESPIONAGE


Industrial espionage is when secret information is obtained by spying on competitors or opponents. For example
organisations take on this practice to ascertain pertinent information about their competitors such as their
marketing strategies, research and future plans to gain a profit or marketing edge.

Electronic Eavesdropping
Electronic eavesdropping is the tapping into a communication channel to retrieve information. This is the act of
secretly listening to the private conversation of others without their consent. It can be accomplished on phones,
instant messages, VoIP, video conferences and fax transmissions.

Entities Impacted
The entities that such misuse acts would impact include individuals, organisations and government.

Counter Measures to secure data and maintain data integrity.


Computer crimes such as hacking, Internet Fraud, Industrial espionage and software piracy have increased the
need for data security.
Data Security
This refers to the physical, hardware and software methods used to protect data from unauthorized access and
corruption. Data security ensures that data integrity is maintained.
Data Security Methods
Data security methods may be classified into two types: Physical access restrictions and Software restrictions.
Physical methods include:
1. Locks
2. Security guards
3. Burglar alarms
4. Monitoring systems using surveillance cameras
5. Biometric scans e.g. retina and fingerprints
6. Burglar roofing and the reinforcement of doorways
7. Fireproof or waterproof safes and cabinets
8. Recovery procedures and backups stored at a remote (faraway) location
9. Distribution of work among more than one employee so that no one has sole control over the data.
10. Archiving: files no longer in use are backed-up for later use, if needed.

Backup and recovery procedures


A backup file is a copy of a file that can be used if the original file is damaged or not available. It must not be
stored on the same storage medium as the original and it should be stored somewhere safe. Backups can be done
for a single system or an entire network. There are two main types of backup:
3
1. Full backup: The computer or network can be set up so that it automatically makes a backup of
everything on a regular basis. Most organizations backup the data on their networks every night, when
users will not be trying to access it.
2. Incremental backup: Only the files that have been changed since the last backup is copied. Incremental
backups are much quicker than full backups and can be done during normal work.

Backup files should be stored on a medium that:


 Makes fast copies
 Can be stored in a secure place away from the original
Common backup storage media are hard disks, CDs, USB drives or tapes. Digital tapes are a popular choice to
store full backups, as data can be copied to tape very quickly.
Biometric identification systems
Biometrics refers to the science of identifying an individual through their body characteristics, such as face
geometry, hand geometry e.g. fingerprints, iris or retinal scans, veins and voice patterns. All these forms of
identification can be input into a computer system set up for security purposes. Two of the most commonly used
methods are:
 Fingerprints obtained from a crime scene can be matched against a database of known criminals’
fingerprints to identify a suspect. The patterns are stored and analyzed by computer.
 Computer-assisted facial image identification systems use computers to identify a person from an image
captured through a surveillance camera or photograph.
Computer Surveillance
This involves accessing the storage mechanism of an individual’s computer, or monitoring an individual’s
operation of a computer, without their knowledge. It can be done using both hardware and software methods.
Hardware Key logging or keystroke logging
This is a hardware method of computer surveillance. A key logger is a device that plugs in between your
keyboard and computer and stores all data entered using the keyboard in its memory.

Software methods includes:


1. Data Encryption: The scrambling of data during storage or transmission so it cannot be understood by
someone who does not have the encryption key or software to convert it back to the original form.
2. Firewall: A program, hardware or a combination of both that filters information entering your network,
from the Internet.
3. Anti-virus software and Malware Detection: Software used to remove or deactivate viruses on storage
devices such as diskettes, hard disks and memory sticks.
4. Authentication- The process of verifying or identifying a user of a device, usually based on a username
and password.
5. Passwords – A password is a basic security mechanism that consists of a secret pass phrase created
using different characters. A good password consist of:
 Characters
 Numbers
 alphanumeric and symbolic characters
 combination must contain 8 to 16 characteristic
 Upper Case letters
 Lower case letters

4
For example: entering of Facebook passwords, emails or logging into the school’s computer.
Prevention of and protection against viruses
 Install an anti-virus software package on your computer system.

 Do not use storage media (floppy disk, tape, CD, memory stick) from other computers in your computer.
If you have to use them, make sure you run a virus scan first to remove any viruses.

 Do not open any e-mail attachments that contain an executable file: these are files with extensions such
as .exe, .com and .vbs.

Impact on Job Skills and Security


Automation refers to removing the manual execution of various IT related tasks by IT professionals and
replacing those processes with sophisticated software tools and suites that can perform the tasks automatically.

Outline how Automation impact job security?

Roles of various Personnel in Computer Related Professions


describe the roles of various personnel in computer-related professions
 Network Engineer
 Computer Programmer
 Computer Support Specialist
 Computer Systems Analyst
 Administrators (Network, Systems and Database)
 Software Developer
 Web Developer
 Social Media Specialist.
The impact of information and communications technology on select fields.
Computer in Banking
In banking computers are used to:
 Process customer transactions (withdrawals, deposits, loans and bill payments)
 Process cheques
 Transfer funds (electronic fund transfer) from one account to another.

Automated Teller Machine (ATM)


This machine, together with an ATM card (debit card) allows you to perform a number of banking transactions
(deposit and withdraw money, obtain balances, transfer funds and pay bills), 24 hours a day.

Home and Internet Banking


This form of banking gives you the convenience of doing transactions anytime and from home or anywhere
there is Internet access. You can check your accounts, order cheque books, pay bills, transfer funds and apply
for loans via the Internet.

Computers in Business
In business, computers are used create bills (invoices), monitor inventory (stock control), in point–of-sale
systems (store checkouts), in accounting (profit and loss accounts), in marketing (promotion of merchandise), e-
commerce and telecommuting.

5
 E-commerce
Electronic commerce consists of buying, selling, marketing and servicing of products and services over
computer networks. It also includes the transfer of funds in the buying process. There are two types of e-
commerce:
 B2C or Business to Customer (where businesses retail their supply goods and services over the Internet
to individual private consumers).
 B2B or Business to Business (where businesses supply other businesses with products and services that
are required in the operations of that business).

 Telecommuting
This is also called teleworking. It is working from home and communicating with colleagues and customers
using computer facilities – modem, telephony, e-mail, teleconferencing and faxing. Telecommuting can be part-
time or full-time.

Computers in Education
 Computer-Assisted Assessment (CAA)
This is the use of computers to assist in the marking of examination scripts, such as multiple choice papers.

 Computer –Assisted Learning (CAL) and Computer – Aided Instruction (CAI)


This is the use of computers and appropriate computer software to allow students to learn at their own pace,
and/or create a more interesting learning environment in which teaching material is presented.

 Computer Managed learning (CML) or Computer Managed Instruction (CMI)


CML or CMI are administrative tools used in education to organize students’ data and timetables and in
libraries to manage indexes.

 Distance Learning
This involves classes being conducted via the Internet, an extranet or intranet, satellite broadcasting, interactive
television and CD-ROM.
Computers in Industry (engineering and manufacturing)
In engineering and manufacturing computers are used to:
 Direct assembly line operations
 Perform simulations
 Design, draw and manipulate engineering, architectural, product, graphic and textile designs.

 Computer Aided Design (CAD) and Computer Aided Design and Drafting (CADD)
This includes the hardware and software used to draw, manipulate and design engineering and architectural
designs, electronic products and even clothing designs.
 Computer Aided Manufacturing (CAM)
These systems are used to control manufacturing plant equipment and production equipment e.g. in a car
manufacturing plant or a factory that makes microprocessors for computers.

 Computer Aided Engineering (CAE)

6
These systems analyses engineering designs, simulating varying conditions to determine in advance whether the
design is likely to work. For example, an aeroplane manufacturer might be able to simulate the forces of a
hurricane wind on a plane wing using a CAE computer, or an engineer might be able to simulate the stresses
applied to a bridge.
Computers in Artificial Intelligence (AI)
In AI computers are used to:
 Control robots
 Produce expert systems

 Robotics
Robotics is the use of computer-controlled machines in place of humans to perform repetitive and dangerous
tasks.
 Expert Systems
These systems provide a vast knowledge database of information in specific fields such as medicine,
mathematics, engineering, geology, computer science, business, law, defense and education. Expert systems or
knowledge-based systems make decisions based on the results of questions put to the user; the program
analyses input data and provides answers at the level of an expert in the particular field.
Computers in law enforcement
Computers are used in law enforcement to:
 Maintain criminal databases
 Examine forensic evidence
 Communicate with other departments and agencies
 Provide electronic surveillance
 Control traffic systems
 Provide assistance to officers through easy access to information
 Computerize many of the traditional office tasks
 Prepare reports
 Equipment inventory
 Tracking parolees
 Transmitting, exchanging and obtaining information from other police officers

 Security cameras
These can act as a visible deterrent to a criminal. Sometimes they are hidden in order to catch criminals in
action. They can capture video footage of a crime in progress and the images can be used to identify the
criminals. Most cameras today are linked to computer systems which can store and process the raw data.
 Electronic surveillance
Wire-taps, email and online communication interception, location information ( e.g. determining where you are
from calls going to your cell phone) and communication analysis (e.g. monitoring when and where credit cards
are used) are all forms of electronic surveillance. Such surveillance can help police track criminals’ movements
and activities.

Computers in medicine
Computers are used in medicine to:
 Monitor patients’ vital signs

7
 Maintain databases of patients, diseases and drugs
 Aid in detecting and diagnosing diseases
 Assist in generating case-sensitive advice through the use of expert systems
 Helps doctors to collaborate with colleagues and administer treatment over the Internet.
 Perform research
Patient Monitoring Systems
These help doctors monitor and treat patients – either at home or in hospital intensive care – by providing 24
hour service. These are computerized systems that monitor a person’s vital signs, such as blood pressure,
temperature and heart rate, using sensors attached to the patient. The system records the information at specific
intervals and may sound an alert in the event of a dangerous abnormality in the readings.

Computers in Entertainment
Computers are used to:
 Record, synthesize, edit and distribute music
 Create and play computer games
 Create animations and special effects in movies

 Teleconferencing
A teleconference is a meeting or conference held via a telephone or network connection between participants in
remote cities or work sites. Many types of teleconferences exist, with the simplest form involving the use of a
speaker phone at each location to conduct an audio conference. More sophisticated teleconference meetings
involve the exchange of audio, video, and data. The term teleconference can also refer to a live event that is
transmitted via satellite to various locations simultaneously.

The impact of Information Technology on job skills and careers;


The Effects of Computers on Employment
The effects of computers have been both good and bad – there has been job loss, job creation and changes in job
skills.
Employees in the computerized workplace should be able to:
Office Employees
 Prepare and edit documents using word-processor
 Calculate and analyse numerical data using a spreadsheet program
 Store, edit, receive and query records in a database
 Use computerized accounts for processing customer and company accounts
 Send and receive faxes
 Use web browsers and know how to send and read e-mail

Teachers
 Use word-processors to prepare exercises and notes
 Use presentation software to make demonstrations
 Use the Internet for research purposes and teach students how to do so
 Teach students how to use the multimedia, simulation or tutorial software designed to aid learning
 Use spreadsheets applications to record and calculate students’ marks
 Assemble the main parts of a computer and do simple troubleshooting

8
Engineers
 Use CAAD software, simulation software and in some cases graphics plotters
 Design computer-based process control systems
Medical personnel
 Use computer-controlled devices to monitor a patient’s condition
 Use expert systems for the diagnosis and treatment of illnesses
 Store, edit and retrieve a patient’s record using database management software
 Use specialized equipment for performing operations
Musicians
 Do sound sampling
 Record sounds
 Do music synthesizing
 Edit songs and add special effects
Movie Industry
 Use animation software
 Use graphics editors
 Use custom-written special effects software
 Operate robots to imitate dangerous animals etc.
Mass Media Personnel
 Use a word-processor to produce and edit articles
 Scan photos with a scanner
 Use desktop publishing to design advertisements
 Use the Internet for research and communication
 Take photographs with a digital camera
Law Enforcement Personnel
 Knowing how to use a scanner to scan photographs of criminals
 Knowing how to use computers for fingerprint matching and DNA analysis
 Knowing how to use database management software to store and retrieve data
 Knowing how to use statistical analysis software
Roles of various personnel in computer-related professionals;
Roles or duties of a Programmer
 Discuss program specifications with the systems analyst
 Write programs
 Test programs for correct operation and intended results
 Debug programs
 Document programs
 Update, repair, modify and expand existing programs

Roles or duties of a Systems Analyst


 Plan and conduct studies to determine if an existing system needs to be upgraded or if a new system has
to be put in place
 Hold discussions with managers and users of the system to determine their exact needs
 Gather facts about, and analyze the basic methods and procedures of, current information systems
 Design new systems, integrate existing procedures into new system specifications as required and assist
in the implementation of new designs
9
 Make recommendations for the acquisition and purchase of hardware and software, if necessary
 Test and debug the new system
 Create documentation for the system
 Assist in training employees to use the system
 Evaluate the performance of the system over a period of time to see if it is performing as expected
Roles or duties of an IT Manager
 Plan, co-ordinate, manage and staff the data processing department
 Communicate with, motivate and lead a number of highly skilled people
 Be aware of the latest developments in the IT field
 Read reports on the system’s performance and develop strategies to improve it
 Meet users and members of other departments to discuss problems encountered with the system or new
projects for computerization
 Prepare budget projections for the department
Roles or duties of a Database Administrator
 Interact with managers and users to ensure that the database is accomplishing what they need
 Meet with users to make modifications to the database whenever there are changes in the company’s
operation
 Ensure that the database is performing at its optimum at all times to meet the needs of its users
 Develop policies and procedures to ensure the security and integrity of the system
 Select and maintain database management software
 Co-ordinate database design
 Establish backup and recovery procedure in case of failure or loss of data
 Establish a data dictionary that records company-wide data definitions and standards
 Co-ordinate the data collection and storage needs of users
Roles or duties of a Network Administrator
 Plan and design the network
 Oversee the installation of the network’s hardware and software
 Test the network to ensure it is functioning properly
 Set up user accounts and arrangements for access
 Ensure that staff are trained to use the hardware and software that form part of the network
 Monitor the network’s performance to ensure it is working at its optimum
 Troubleshoot and solve problems on the network
 Set up systems to ensure compliance by users of the network
Roles or duties of a File Librarian
 Maintain and protect the company’s programs and data
 Catalogue and store magnetic tapes and disks
 Supply magnetic tapes and disks to authorized users
 Clean and inspect storage media
 Keep records of the disks and magnetic tapes stored
Roles or duties of a Computer Engineer
 Design, develop, test and supervise the manufacture of components and peripherals
 Assemble and test new designs for overall effectiveness, cost reliability and safety
 Maintain and repair computer hardware sold to clients
Roles or duties of a Computer technician

10
 Assemble and service computer equipment
 Find and fix computer problems
Roles or duties of a Software Trainer
 Train people to use computer hardware and software
 Develop training manuals
 Examine and mark examination scripts

11

You might also like