SlideShare ist ein Scribd-Unternehmen logo
1 von 16
Downloaden Sie, um offline zu lesen
INFORMATION AND COMMUNICATION
TECHNOLOGY AND SOCIETY
 1.1.1.1 Define ICT.
ICT is the technology required for information
processing, in particular, the use of electronic computers,
communication devices and software applications to
convert, store, protect, process, transmit and retrieve
information from anywhere, anytime.
 INFORMATION
Information refers to the knowledge obtained from reading,
investigation, study or research. The tools to transmit information are the
telephone, television and radio. Information is knowledge and helps us to
fulfill our daily tasks.
 COMMUNICATION
Communication is an act of transmitting messages. It is a process
whereby information is exchanged between individuals using symbols, signs
or verbal interactions. Communication is important in order to gain
knowledge.
 TECHNOLOGY
Technology is the use of scientific knowledge, experience and
resources to create processes products that fulfill human needs.
Technology is vital in communication
 1.1.1.2 Evolution of computers.
COMPUTER GENERATIONS
 First Generation (1940-1956)
 SECOND GENERATION (1956-1963)
 THIRD GENERATION (1964-1971)
 FOURTH GENERATION (1971- PRESENT)

 FIFTH GENERATION (PRESENT & BEYOND)
 NEW ERA COMPUTER
 1.1.2.1 The usage of ICT in everyday life
◊ EDUCATION
In education, teachers, students, researchers and school administrators benefits from the usage of
ICT.
◊ BANKING
In the banking, customers, businessman & bank administrator benefits from the usage of ICT.
◊ INDUSTRY
Computers are used to facilitate production planning and control systems, to support chain
management and to help in product design in the industrial sector. In the industrial sector, workers, researchers
and administrator benefits from the usage of ICT.
◊ E-COMMERCE
E-commerce helps in boosting the economy. It makes buying and selling activities easier, more efficient
and faster. For this application, computers, Internet and shared software are needed. In the e-commerce sector,
customers, suppliers and employees benefits from the usage of ICT.
1.1.2.2 Differences between computerised and non-computerised
systems.
Computerised Non-Computerised
more interesting & interactive
experiences
depends on teachers & textbook
all transactions are done by
computers
banking was done manually
Computers and
telecommunications industry
became very popular and profitable
since production can be increased
through an all day operation.
Production was slow because
everything was done depended on
human labour.
E-commerce plays an important
role in the economic scene. It
includes distribution, buying,
selling and servicing products that
are done electronically
Trading was made using the barter
system and it was then later
developed into currency.
impact of
ICT on
society
FASTER
COMMUNICATION
SPEED
LOWER
COMMUNICATION
COST
RELIABLE MODE OF
COMMUNICATION
EFFECTIVE
SHARING OF
INFORMATION
PAPERLESS
ENVIRONMENT
BORDERLESS
COMMUNICATION
SOCIAL
PROBLEMS
COMPUTER ETHICS
Computer ethics is a system of moral standards or
values used as a guideline for computer users. It is
needed to stop the current technology products from
being exploited.
Ethics is a moral philosophy where a person makes a
specific moral choice and sticks to it. Code of ethics
in computing means moral guidelines to refer to when
using the computer and the Internet.
INTELLECTUAL PROPERTY
Intellectual property refers to any product of human intellect
that is unique and has value in the market place. This covers
ideas, inventions, unique name, computer program codes and
many more.
PRIVACY
Privacy in IT refers to data and information privacy. In general,
data include texts, numbers, sounds, images and video.
Information privacy is described as the rights of individuals
and companies to deny or restrict the collection and use of
information about them.
CYBER LAW
Cyber law refers to any laws relating to protecting the Internet
and other online communication technologies.
ETHICS LAW
 Guideline: As a guideline to
computer users.
 Moral Standards: Ethical behaviour
is judged by moral standards.
 No Punishments: No punishment for
anyone who violates ethics.
 Free To Follow: Computer users are
free to follow or ignore the code of
ethics.
 Immoral: Not honouring computer
ethics means ignoring the moral
elements (immoral).
 Universals: Universal, can be
applied anywhere, all over the world
 Produce Ethical Computer Users: To
produce ethical computer users
 Control: As a rule to control
computer users.
 Judicial Standards: Law is judged
by judicial standards.
 Must Follow: Computer users must
follow the regulations and law.
 Punishments: Penalties,
imprisonments and other punishments
for those who break the law.
 Depends On Country: Depends on
country and state where the crime is
committed.
 Prevent Misusing Of Computers: To
prevent misuse of computers.
 Crime: Not honouring the law
means committing a crime.
Intellectual property laws are needed to
establish and safeguard the intellectual
property which refers to works created
by inventors, authors and artists. It is
also needed as businesses today
continue to expand globally. There are
four types of Intellectual Property
protection. They are patents for
invention, trademarks for brand identity,
designs for product appearance and
copyright for material.
•he privacy laws in Malaysia emphasises on the
following:
•Security Services to review the security policy
Security Management to protect the resources
Security Mechanism to implement the required
security services Security Objects, the important
entities within the system environment
Privacy
law
•Example: anti-spam program, firewall, anti-
spyware and antivirus.
Utilities
software
Methods of Authentication
Methods of Verification
There are two commonly used authentication methods, which are biometric
device and callback system. Biometric device is a device that translates
personal characteristics into a digital code that is compared with a digital
code stored in the database. Biometric devices include Fingerprint
Recognition, Facial Recognition, Hand Geogmetry, Iris Scanning, Retinal
Scanning, Voice Recognition and Signature Verification. Callback system
refers to the checking system that authenticates the user.
There are two methods used in verification, which are user identification
and processed object. User identification refers to the process of
validating the user. Processed object refers to something the user has
such as identification card, security token and cell phone.
Pornography
Pornography: can lead to criminal acts such as
exploitation of women and children can lead to sexual
addiction or perversion can develop low moral value
towards other men, women or children can erode good
religious, cultural and social beliefs and behaviour
Slander
Slander: can develop into a society that disregards
honesty and truth can develop bad habit of spreading
untruths and rumours can lead to unnecessary argument
can cause people to have negative attitudes towards
another person
 Cyber Law is needed as in the recent years, many
concerns and issues were raised on the integrity
and security of information, legal status of online
transactions, privacy and confidentiality of
information, intellectual property rights and
security of government data placed on the Internet.
1.2.4.2 Computer crimes below
Fraud
Theft
Copyright
Infringement
Attacks
1.3.2 .1 Security Threats
Computer security means protecting our computer systems
and the information they contain against unwanted access,
damage, destruction or modification. Three types of
computer security are: hardware security software
security/data security network security
Malicious
code
Hacking
Natural
disaster

Weitere ähnliche Inhalte

Was ist angesagt?

Internet security powerpoint
Internet security powerpointInternet security powerpoint
Internet security powerpointArifa Ali
 
Computer crimes and criminals
Computer crimes and criminalsComputer crimes and criminals
Computer crimes and criminalsOnline
 
Computer Ethics and Legal Issues
Computer Ethics and Legal IssuesComputer Ethics and Legal Issues
Computer Ethics and Legal IssuesKak Yong
 
computer ethics
computer ethicscomputer ethics
computer ethicsHoney jose
 
Privacy issues in social networking
Privacy issues in social networkingPrivacy issues in social networking
Privacy issues in social networkingBryan Tran
 
Keyloggers and Spywares
Keyloggers and SpywaresKeyloggers and Spywares
Keyloggers and SpywaresAnkit Mistry
 
Cyber forensic 1
Cyber forensic 1Cyber forensic 1
Cyber forensic 1anilinvns
 
Hacking & its types
Hacking & its typesHacking & its types
Hacking & its typesSai Sakoji
 
Full seminar report on ethical hacking
Full seminar report on ethical hackingFull seminar report on ethical hacking
Full seminar report on ethical hackingGeorgekutty Francis
 
Cyberlaw and Cybercrime
Cyberlaw and CybercrimeCyberlaw and Cybercrime
Cyberlaw and CybercrimePravir Karna
 
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...
Hacking,History Of Hacking,Types of Hacking,Types  Of Hackers,Cyber Laws for ...Hacking,History Of Hacking,Types of Hacking,Types  Of Hackers,Cyber Laws for ...
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...Qazi Anwar
 
MOBILE PHONE SECURITY./ MOBILE SECURITY
MOBILE PHONE SECURITY./ MOBILE SECURITYMOBILE PHONE SECURITY./ MOBILE SECURITY
MOBILE PHONE SECURITY./ MOBILE SECURITYJASHU JASWANTH
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and securityMuhammad Hamza
 
presentation on cyber crime and security
presentation on cyber crime and securitypresentation on cyber crime and security
presentation on cyber crime and securityAlisha Korpal
 

Was ist angesagt? (20)

Chapter 3_dp-pertemuan 4&5
 Chapter 3_dp-pertemuan 4&5 Chapter 3_dp-pertemuan 4&5
Chapter 3_dp-pertemuan 4&5
 
Internet security powerpoint
Internet security powerpointInternet security powerpoint
Internet security powerpoint
 
Computer crimes and criminals
Computer crimes and criminalsComputer crimes and criminals
Computer crimes and criminals
 
Computer Ethics and Legal Issues
Computer Ethics and Legal IssuesComputer Ethics and Legal Issues
Computer Ethics and Legal Issues
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
 
computer ethics
computer ethicscomputer ethics
computer ethics
 
Botnets
BotnetsBotnets
Botnets
 
Privacy issues in social networking
Privacy issues in social networkingPrivacy issues in social networking
Privacy issues in social networking
 
Keyloggers and Spywares
Keyloggers and SpywaresKeyloggers and Spywares
Keyloggers and Spywares
 
Cyber forensic 1
Cyber forensic 1Cyber forensic 1
Cyber forensic 1
 
Hacking & its types
Hacking & its typesHacking & its types
Hacking & its types
 
Full seminar report on ethical hacking
Full seminar report on ethical hackingFull seminar report on ethical hacking
Full seminar report on ethical hacking
 
Cyber law nepal
Cyber law nepalCyber law nepal
Cyber law nepal
 
Cyberlaw and Cybercrime
Cyberlaw and CybercrimeCyberlaw and Cybercrime
Cyberlaw and Cybercrime
 
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...
Hacking,History Of Hacking,Types of Hacking,Types  Of Hackers,Cyber Laws for ...Hacking,History Of Hacking,Types of Hacking,Types  Of Hackers,Cyber Laws for ...
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...
 
MOBILE PHONE SECURITY./ MOBILE SECURITY
MOBILE PHONE SECURITY./ MOBILE SECURITYMOBILE PHONE SECURITY./ MOBILE SECURITY
MOBILE PHONE SECURITY./ MOBILE SECURITY
 
Information security
Information securityInformation security
Information security
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
presentation on cyber crime and security
presentation on cyber crime and securitypresentation on cyber crime and security
presentation on cyber crime and security
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 

Andere mochten auch

Social, professional, ethical and legal issues
Social, professional, ethical and legal issuesSocial, professional, ethical and legal issues
Social, professional, ethical and legal issuesAndres Baravalle
 
Ethical and Legal Issues in Computational Social Science - Lecture 7 in Intro...
Ethical and Legal Issues in Computational Social Science - Lecture 7 in Intro...Ethical and Legal Issues in Computational Social Science - Lecture 7 in Intro...
Ethical and Legal Issues in Computational Social Science - Lecture 7 in Intro...Lauri Eloranta
 
02 Legal, Ethical, and Professional Issues in Information Security
02 Legal, Ethical, and Professional Issues in Information Security02 Legal, Ethical, and Professional Issues in Information Security
02 Legal, Ethical, and Professional Issues in Information Securitysappingtonkr
 
Ethical And Legal Issues
Ethical And Legal IssuesEthical And Legal Issues
Ethical And Legal IssuesMark Carlson
 
English Vs American English
English Vs  American  EnglishEnglish Vs  American  English
English Vs American Englishantoniapm
 
Ict - Computer Ethics
Ict - Computer EthicsIct - Computer Ethics
Ict - Computer Ethicsaleeya91
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentationkatespeach
 

Andere mochten auch (8)

ethical legal issues
ethical legal issuesethical legal issues
ethical legal issues
 
Social, professional, ethical and legal issues
Social, professional, ethical and legal issuesSocial, professional, ethical and legal issues
Social, professional, ethical and legal issues
 
Ethical and Legal Issues in Computational Social Science - Lecture 7 in Intro...
Ethical and Legal Issues in Computational Social Science - Lecture 7 in Intro...Ethical and Legal Issues in Computational Social Science - Lecture 7 in Intro...
Ethical and Legal Issues in Computational Social Science - Lecture 7 in Intro...
 
02 Legal, Ethical, and Professional Issues in Information Security
02 Legal, Ethical, and Professional Issues in Information Security02 Legal, Ethical, and Professional Issues in Information Security
02 Legal, Ethical, and Professional Issues in Information Security
 
Ethical And Legal Issues
Ethical And Legal IssuesEthical And Legal Issues
Ethical And Legal Issues
 
English Vs American English
English Vs  American  EnglishEnglish Vs  American  English
English Vs American English
 
Ict - Computer Ethics
Ict - Computer EthicsIct - Computer Ethics
Ict - Computer Ethics
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentation
 

Ähnlich wie Chapter 1

Chapter 1-introduction to ict
Chapter 1-introduction to ictChapter 1-introduction to ict
Chapter 1-introduction to ictAten Kecik
 
Jawapan bab 1
Jawapan bab 1Jawapan bab 1
Jawapan bab 1ikmalsham
 
Ict form 4 chapter 1(answer)
Ict form 4 chapter 1(answer)Ict form 4 chapter 1(answer)
Ict form 4 chapter 1(answer)smkengkilili2011
 
Digital Citizenship by Fatema Salik
Digital Citizenship by Fatema SalikDigital Citizenship by Fatema Salik
Digital Citizenship by Fatema Salikguest8541ec
 
Digital Citizenship...
Digital Citizenship...Digital Citizenship...
Digital Citizenship...guest8541ec
 
Digital Citizenship by Fatema
Digital Citizenship by FatemaDigital Citizenship by Fatema
Digital Citizenship by Fatemaguest8541ec
 
Share Digital Society and Computer Ethics.pptx
Share Digital Society and Computer Ethics.pptxShare Digital Society and Computer Ethics.pptx
Share Digital Society and Computer Ethics.pptxeyesred813
 
Presentation of ict impacts
Presentation of ict impactsPresentation of ict impacts
Presentation of ict impactsBeing Aabis
 
a brief introduction of ict and its components
a brief introduction of ict and its componentsa brief introduction of ict and its components
a brief introduction of ict and its componentsGloriaRamos83
 
Cyber law by pravin ghosekar
Cyber law by pravin ghosekarCyber law by pravin ghosekar
Cyber law by pravin ghosekarPravinGhosekar
 
Information and Communication Technology.pptx
Information and Communication Technology.pptxInformation and Communication Technology.pptx
Information and Communication Technology.pptxDigitalizedNepal
 
Ethical and Social Issues in ICT
Ethical and Social Issues in ICTEthical and Social Issues in ICT
Ethical and Social Issues in ICTRoshanMaharjan13
 
Nine elements of digital citizenship
Nine elements of digital citizenshipNine elements of digital citizenship
Nine elements of digital citizenshipmonazarrinkelk
 

Ähnlich wie Chapter 1 (20)

Chapter 1-introduction to ict
Chapter 1-introduction to ictChapter 1-introduction to ict
Chapter 1-introduction to ict
 
Ict
IctIct
Ict
 
Jawapan bab 1
Jawapan bab 1Jawapan bab 1
Jawapan bab 1
 
COMPUTER ETHICS
COMPUTER ETHICSCOMPUTER ETHICS
COMPUTER ETHICS
 
Ict form 4 chapter 1(answer)
Ict form 4 chapter 1(answer)Ict form 4 chapter 1(answer)
Ict form 4 chapter 1(answer)
 
Digital Citizenship by Fatema Salik
Digital Citizenship by Fatema SalikDigital Citizenship by Fatema Salik
Digital Citizenship by Fatema Salik
 
Digital Citizenship...
Digital Citizenship...Digital Citizenship...
Digital Citizenship...
 
Digital Citizenship by Fatema
Digital Citizenship by FatemaDigital Citizenship by Fatema
Digital Citizenship by Fatema
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
 
1 ICT in Society
1 ICT in Society1 ICT in Society
1 ICT in Society
 
Share Digital Society and Computer Ethics.pptx
Share Digital Society and Computer Ethics.pptxShare Digital Society and Computer Ethics.pptx
Share Digital Society and Computer Ethics.pptx
 
devansh .pdf
devansh .pdfdevansh .pdf
devansh .pdf
 
devansh .pdf
devansh .pdfdevansh .pdf
devansh .pdf
 
Presentation of ict impacts
Presentation of ict impactsPresentation of ict impacts
Presentation of ict impacts
 
a brief introduction of ict and its components
a brief introduction of ict and its componentsa brief introduction of ict and its components
a brief introduction of ict and its components
 
Cyber law by pravin ghosekar
Cyber law by pravin ghosekarCyber law by pravin ghosekar
Cyber law by pravin ghosekar
 
Information and Communication Technology.pptx
Information and Communication Technology.pptxInformation and Communication Technology.pptx
Information and Communication Technology.pptx
 
Ethical and Social Issues in ICT
Ethical and Social Issues in ICTEthical and Social Issues in ICT
Ethical and Social Issues in ICT
 
Week 4 - 6.pdf
Week 4 - 6.pdfWeek 4 - 6.pdf
Week 4 - 6.pdf
 
Nine elements of digital citizenship
Nine elements of digital citizenshipNine elements of digital citizenship
Nine elements of digital citizenship
 

Mehr von meisaina

Chapter 2 computer system
Chapter 2 computer systemChapter 2 computer system
Chapter 2 computer systemmeisaina
 

Mehr von meisaina (6)

Chapter 6
Chapter 6Chapter 6
Chapter 6
 
Chapter 5
Chapter 5Chapter 5
Chapter 5
 
Chapter 4
Chapter 4Chapter 4
Chapter 4
 
Bab3
Bab3Bab3
Bab3
 
Chapter 2 computer system
Chapter 2 computer systemChapter 2 computer system
Chapter 2 computer system
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 

Kürzlich hochgeladen

Mythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITWMythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITWQuiz Club NITW
 
How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17Celine George
 
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITWQ-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITWQuiz Club NITW
 
6 ways Samsung’s Interactive Display powered by Android changes the classroom
6 ways Samsung’s Interactive Display powered by Android changes the classroom6 ways Samsung’s Interactive Display powered by Android changes the classroom
6 ways Samsung’s Interactive Display powered by Android changes the classroomSamsung Business USA
 
Healthy Minds, Flourishing Lives: A Philosophical Approach to Mental Health a...
Healthy Minds, Flourishing Lives: A Philosophical Approach to Mental Health a...Healthy Minds, Flourishing Lives: A Philosophical Approach to Mental Health a...
Healthy Minds, Flourishing Lives: A Philosophical Approach to Mental Health a...Osopher
 
Sulphonamides, mechanisms and their uses
Sulphonamides, mechanisms and their usesSulphonamides, mechanisms and their uses
Sulphonamides, mechanisms and their usesVijayaLaxmi84
 
Scientific Writing :Research Discourse
Scientific  Writing :Research  DiscourseScientific  Writing :Research  Discourse
Scientific Writing :Research DiscourseAnita GoswamiGiri
 
Tree View Decoration Attribute in the Odoo 17
Tree View Decoration Attribute in the Odoo 17Tree View Decoration Attribute in the Odoo 17
Tree View Decoration Attribute in the Odoo 17Celine George
 
Objectives n learning outcoms - MD 20240404.pptx
Objectives n learning outcoms - MD 20240404.pptxObjectives n learning outcoms - MD 20240404.pptx
Objectives n learning outcoms - MD 20240404.pptxMadhavi Dharankar
 
Indexing Structures in Database Management system.pdf
Indexing Structures in Database Management system.pdfIndexing Structures in Database Management system.pdf
Indexing Structures in Database Management system.pdfChristalin Nelson
 
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnvESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnvRicaMaeCastro1
 
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...Association for Project Management
 
Satirical Depths - A Study of Gabriel Okara's Poem - 'You Laughed and Laughed...
Satirical Depths - A Study of Gabriel Okara's Poem - 'You Laughed and Laughed...Satirical Depths - A Study of Gabriel Okara's Poem - 'You Laughed and Laughed...
Satirical Depths - A Study of Gabriel Okara's Poem - 'You Laughed and Laughed...HetalPathak10
 
4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptx4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptxmary850239
 
Employablity presentation and Future Career Plan.pptx
Employablity presentation and Future Career Plan.pptxEmployablity presentation and Future Career Plan.pptx
Employablity presentation and Future Career Plan.pptxryandux83rd
 
4.9.24 School Desegregation in Boston.pptx
4.9.24 School Desegregation in Boston.pptx4.9.24 School Desegregation in Boston.pptx
4.9.24 School Desegregation in Boston.pptxmary850239
 
ARTERIAL BLOOD GAS ANALYSIS........pptx
ARTERIAL BLOOD  GAS ANALYSIS........pptxARTERIAL BLOOD  GAS ANALYSIS........pptx
ARTERIAL BLOOD GAS ANALYSIS........pptxAneriPatwari
 

Kürzlich hochgeladen (20)

Mythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITWMythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITW
 
How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17
 
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITWQ-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
 
prashanth updated resume 2024 for Teaching Profession
prashanth updated resume 2024 for Teaching Professionprashanth updated resume 2024 for Teaching Profession
prashanth updated resume 2024 for Teaching Profession
 
6 ways Samsung’s Interactive Display powered by Android changes the classroom
6 ways Samsung’s Interactive Display powered by Android changes the classroom6 ways Samsung’s Interactive Display powered by Android changes the classroom
6 ways Samsung’s Interactive Display powered by Android changes the classroom
 
Healthy Minds, Flourishing Lives: A Philosophical Approach to Mental Health a...
Healthy Minds, Flourishing Lives: A Philosophical Approach to Mental Health a...Healthy Minds, Flourishing Lives: A Philosophical Approach to Mental Health a...
Healthy Minds, Flourishing Lives: A Philosophical Approach to Mental Health a...
 
Sulphonamides, mechanisms and their uses
Sulphonamides, mechanisms and their usesSulphonamides, mechanisms and their uses
Sulphonamides, mechanisms and their uses
 
Mattingly "AI & Prompt Design: Large Language Models"
Mattingly "AI & Prompt Design: Large Language Models"Mattingly "AI & Prompt Design: Large Language Models"
Mattingly "AI & Prompt Design: Large Language Models"
 
Scientific Writing :Research Discourse
Scientific  Writing :Research  DiscourseScientific  Writing :Research  Discourse
Scientific Writing :Research Discourse
 
Tree View Decoration Attribute in the Odoo 17
Tree View Decoration Attribute in the Odoo 17Tree View Decoration Attribute in the Odoo 17
Tree View Decoration Attribute in the Odoo 17
 
Spearman's correlation,Formula,Advantages,
Spearman's correlation,Formula,Advantages,Spearman's correlation,Formula,Advantages,
Spearman's correlation,Formula,Advantages,
 
Objectives n learning outcoms - MD 20240404.pptx
Objectives n learning outcoms - MD 20240404.pptxObjectives n learning outcoms - MD 20240404.pptx
Objectives n learning outcoms - MD 20240404.pptx
 
Indexing Structures in Database Management system.pdf
Indexing Structures in Database Management system.pdfIndexing Structures in Database Management system.pdf
Indexing Structures in Database Management system.pdf
 
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnvESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
 
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
 
Satirical Depths - A Study of Gabriel Okara's Poem - 'You Laughed and Laughed...
Satirical Depths - A Study of Gabriel Okara's Poem - 'You Laughed and Laughed...Satirical Depths - A Study of Gabriel Okara's Poem - 'You Laughed and Laughed...
Satirical Depths - A Study of Gabriel Okara's Poem - 'You Laughed and Laughed...
 
4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptx4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptx
 
Employablity presentation and Future Career Plan.pptx
Employablity presentation and Future Career Plan.pptxEmployablity presentation and Future Career Plan.pptx
Employablity presentation and Future Career Plan.pptx
 
4.9.24 School Desegregation in Boston.pptx
4.9.24 School Desegregation in Boston.pptx4.9.24 School Desegregation in Boston.pptx
4.9.24 School Desegregation in Boston.pptx
 
ARTERIAL BLOOD GAS ANALYSIS........pptx
ARTERIAL BLOOD  GAS ANALYSIS........pptxARTERIAL BLOOD  GAS ANALYSIS........pptx
ARTERIAL BLOOD GAS ANALYSIS........pptx
 

Chapter 1

  • 2.  1.1.1.1 Define ICT. ICT is the technology required for information processing, in particular, the use of electronic computers, communication devices and software applications to convert, store, protect, process, transmit and retrieve information from anywhere, anytime.
  • 3.  INFORMATION Information refers to the knowledge obtained from reading, investigation, study or research. The tools to transmit information are the telephone, television and radio. Information is knowledge and helps us to fulfill our daily tasks.  COMMUNICATION Communication is an act of transmitting messages. It is a process whereby information is exchanged between individuals using symbols, signs or verbal interactions. Communication is important in order to gain knowledge.  TECHNOLOGY Technology is the use of scientific knowledge, experience and resources to create processes products that fulfill human needs. Technology is vital in communication
  • 4.  1.1.1.2 Evolution of computers. COMPUTER GENERATIONS  First Generation (1940-1956)  SECOND GENERATION (1956-1963)  THIRD GENERATION (1964-1971)  FOURTH GENERATION (1971- PRESENT)   FIFTH GENERATION (PRESENT & BEYOND)  NEW ERA COMPUTER
  • 5.  1.1.2.1 The usage of ICT in everyday life ◊ EDUCATION In education, teachers, students, researchers and school administrators benefits from the usage of ICT. ◊ BANKING In the banking, customers, businessman & bank administrator benefits from the usage of ICT. ◊ INDUSTRY Computers are used to facilitate production planning and control systems, to support chain management and to help in product design in the industrial sector. In the industrial sector, workers, researchers and administrator benefits from the usage of ICT. ◊ E-COMMERCE E-commerce helps in boosting the economy. It makes buying and selling activities easier, more efficient and faster. For this application, computers, Internet and shared software are needed. In the e-commerce sector, customers, suppliers and employees benefits from the usage of ICT.
  • 6. 1.1.2.2 Differences between computerised and non-computerised systems. Computerised Non-Computerised more interesting & interactive experiences depends on teachers & textbook all transactions are done by computers banking was done manually Computers and telecommunications industry became very popular and profitable since production can be increased through an all day operation. Production was slow because everything was done depended on human labour. E-commerce plays an important role in the economic scene. It includes distribution, buying, selling and servicing products that are done electronically Trading was made using the barter system and it was then later developed into currency.
  • 7. impact of ICT on society FASTER COMMUNICATION SPEED LOWER COMMUNICATION COST RELIABLE MODE OF COMMUNICATION EFFECTIVE SHARING OF INFORMATION PAPERLESS ENVIRONMENT BORDERLESS COMMUNICATION SOCIAL PROBLEMS
  • 8. COMPUTER ETHICS Computer ethics is a system of moral standards or values used as a guideline for computer users. It is needed to stop the current technology products from being exploited. Ethics is a moral philosophy where a person makes a specific moral choice and sticks to it. Code of ethics in computing means moral guidelines to refer to when using the computer and the Internet.
  • 9. INTELLECTUAL PROPERTY Intellectual property refers to any product of human intellect that is unique and has value in the market place. This covers ideas, inventions, unique name, computer program codes and many more. PRIVACY Privacy in IT refers to data and information privacy. In general, data include texts, numbers, sounds, images and video. Information privacy is described as the rights of individuals and companies to deny or restrict the collection and use of information about them. CYBER LAW Cyber law refers to any laws relating to protecting the Internet and other online communication technologies.
  • 10. ETHICS LAW  Guideline: As a guideline to computer users.  Moral Standards: Ethical behaviour is judged by moral standards.  No Punishments: No punishment for anyone who violates ethics.  Free To Follow: Computer users are free to follow or ignore the code of ethics.  Immoral: Not honouring computer ethics means ignoring the moral elements (immoral).  Universals: Universal, can be applied anywhere, all over the world  Produce Ethical Computer Users: To produce ethical computer users  Control: As a rule to control computer users.  Judicial Standards: Law is judged by judicial standards.  Must Follow: Computer users must follow the regulations and law.  Punishments: Penalties, imprisonments and other punishments for those who break the law.  Depends On Country: Depends on country and state where the crime is committed.  Prevent Misusing Of Computers: To prevent misuse of computers.  Crime: Not honouring the law means committing a crime.
  • 11. Intellectual property laws are needed to establish and safeguard the intellectual property which refers to works created by inventors, authors and artists. It is also needed as businesses today continue to expand globally. There are four types of Intellectual Property protection. They are patents for invention, trademarks for brand identity, designs for product appearance and copyright for material.
  • 12. •he privacy laws in Malaysia emphasises on the following: •Security Services to review the security policy Security Management to protect the resources Security Mechanism to implement the required security services Security Objects, the important entities within the system environment Privacy law •Example: anti-spam program, firewall, anti- spyware and antivirus. Utilities software
  • 13. Methods of Authentication Methods of Verification There are two commonly used authentication methods, which are biometric device and callback system. Biometric device is a device that translates personal characteristics into a digital code that is compared with a digital code stored in the database. Biometric devices include Fingerprint Recognition, Facial Recognition, Hand Geogmetry, Iris Scanning, Retinal Scanning, Voice Recognition and Signature Verification. Callback system refers to the checking system that authenticates the user. There are two methods used in verification, which are user identification and processed object. User identification refers to the process of validating the user. Processed object refers to something the user has such as identification card, security token and cell phone.
  • 14. Pornography Pornography: can lead to criminal acts such as exploitation of women and children can lead to sexual addiction or perversion can develop low moral value towards other men, women or children can erode good religious, cultural and social beliefs and behaviour Slander Slander: can develop into a society that disregards honesty and truth can develop bad habit of spreading untruths and rumours can lead to unnecessary argument can cause people to have negative attitudes towards another person
  • 15.  Cyber Law is needed as in the recent years, many concerns and issues were raised on the integrity and security of information, legal status of online transactions, privacy and confidentiality of information, intellectual property rights and security of government data placed on the Internet. 1.2.4.2 Computer crimes below Fraud Theft Copyright Infringement Attacks
  • 16. 1.3.2 .1 Security Threats Computer security means protecting our computer systems and the information they contain against unwanted access, damage, destruction or modification. Three types of computer security are: hardware security software security/data security network security Malicious code Hacking Natural disaster