SlideShare ist ein Scribd-Unternehmen logo
1 von 84
Chapter 11 Computers and Society: Home, Work, and Ethical Issues
Chapter 11 Objectives Understand that computers have made a tremendous difference in daily living Explain how computers are used at home Describe how computers change the way society interacts with disciplines such as education, entertainment, finance, government, health care, science, publishing, and travel Recognize the issues associated with the digital divide Understand how e-commerce affects the way people conduct business Identify ways virtual reality, intelligent agents, and robots are being used in daily life Learn how to prevent health-related disorders and injuries due to computer use Understand how to design a workspace ergonomically Recognize symptoms of computer addiction Explain green computing Understand ethical issues surrounding computer use p.11.2  Next
Living with Computers ,[object Object],[object Object],[object Object],[object Object],[object Object],p.11.2 Fig. 11-1 Next
Living with Computers ,[object Object],[object Object],[object Object],[object Object],[object Object],p.11.2 Next
Living with Computers ,[object Object],[object Object],p.11.3Fig. 11-2 budgeting, personal financial management, and home business management Next Web access personal and business communications research and education entertainment
Living with Computers ,[object Object],[object Object],p.11. 4 Download and watch movies Bank and invest Communicate with others around the world Next Shop for goods and services Download and listen to music Access sources of entertainment and leisure Take a course or access other educational material Access a wealth of information, news , research, and educational material
Living with Computers ,[object Object],[object Object],[object Object],p.11.4 Fig. 11-3 Next
Living with Computers ,[object Object],[object Object],p.11.4 Fig. 11-4 Click to  view video Next
iving with Computers ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],p.11.4 Fig. 11-5 Next
Living with Computers ,[object Object],[object Object],[object Object],[object Object],p.11.5 Fig. 11-6 Next
Technology Trailblazers ,[object Object],[object Object],[object Object],[object Object],[object Object],p.11. 6 Click to view Web Link then click Steve Wozniak Next
Living with Computers ,[object Object],[object Object],[object Object],p.11. 6Fig. 11-7 Next
Living with Computers ,[object Object],[object Object],[object Object],p.11.6 Fig. 11-8 Next
Living with Computers ,[object Object],[object Object],[object Object],p.11.6 Fig. 11-9 Next
Living with Computers ,[object Object],[object Object],[object Object],p.11.7 Reduced training costs Next Simulations Computer-based models of real-life situations Unique instructional experience Unique content Self-paced study
Living with Computers ,[object Object],[object Object],[object Object],[object Object],p.11. 8 Click to  view video Next Enables students to attend class from anywhere in the world and at times that fit their schedules
Living with Computers ,[object Object],[object Object],p.11.8 Fig. 11-10 ATM International Oil Association ATM Employee Working at Home telephone line Employee Working Overseas Employee Working from Ship ATM Global Oil Learning Center ATM Company Headquarters Next
Living with Computers ,[object Object],[object Object],[object Object],p.11.8 Fig. 11-11 Next
Living with Computers ,[object Object],[object Object],[object Object],[object Object],p.11.8 Fig. 11-12 Next
Company on the Cutting Edge ,[object Object],[object Object],[object Object],[object Object],p.11.9 Click to view Web Link then click WebCT Next
Living with Computers ,[object Object],[object Object],[object Object],[object Object],p.11.9 Next
Living with Computers ,[object Object],[object Object],p.11.10 Fig. 11-13 Next
Living with Computers ,[object Object],[object Object],[object Object],p.11.10 Fig. 11-14 Next
Living with Computers ,[object Object],p.11.10 Next Teach America! program Provides online computer training to 75,000 teachers Launched by Gateway  PowerUp A nationwide industry partnership  Goal is to place technology in schools and community centers Anytime Anywhere Learning program Provides teachers and students with notebook computers equipped with the Microsoft Office suite and the capability to access the Internet Launched by Microsoft and Toshiba
Living with Computers ,[object Object],[object Object],[object Object],[object Object],p.11.10 Next
Living with Computers ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],p.11. 11 Fig. 11-15 Next
Living with Computers ,[object Object],[object Object],[object Object],[object Object],[object Object],p.11.12 Fig. 11-16 Next
Living with Computers ,[object Object],[object Object],[object Object],[object Object],[object Object],p.11.12 Next
Living with Computers ,[object Object],[object Object],[object Object],p.11.13 Fig. 11-17 Next
Living with Computers ,[object Object],[object Object],p.11.13 Fig. 11-17 Next
Living with Computers ,[object Object],[object Object],p.11.14 Fig. 11-18a Next
Living with Computers ,[object Object],[object Object],p.11.14 Fig. 11-18b Click to view Web Link then click Bluetooth™ Next
Living with Computers ,[object Object],[object Object],p.11.14 Fig. 11-19 Next
Living with Computers ,[object Object],[object Object],[object Object],p.11.14 Fig. 11-20 Next
Living with Computers ,[object Object],[object Object],p.11.16 Fig. 11-21 Next
Living with Computers ,[object Object],[object Object],p.11.16 Fig. 11-22 Next
Living with Computers ,[object Object],[object Object],p.11.18 Fig. 11-23a Next
Living with Computers ,[object Object],[object Object],p.11.18 Fig. 11-23b Next
Living with Computers ,[object Object],[object Object],[object Object],[object Object],[object Object],p.11.18 Fig. 11-24 Next
Living with Computers ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],p.11.19 Fig. 11-25 Next
Living with Computers ,[object Object],[object Object],p.11.19 Fig. 11-26 Click to view Web Link then click Telemedicine Next
Living with Computers ,[object Object],[object Object],[object Object],p.11.20 Next Computer-aided learning (CAL) Used by other medical professionals, such as physicians and dentists, during training
Living with Computers ,[object Object],[object Object],[object Object],[object Object],[object Object],p.11.20 Fig. 11-27 Next
Living with Computers ,[object Object],[object Object],[object Object],p.11.21 Fig. 11-28 Next
Living with Computers ,[object Object],[object Object],[object Object],p.11.21 Fig. 11-29 Next
Living with Computers ,[object Object],[object Object],[object Object],p.11.22 Fig. 11-30 Implant delivers electrical energy to electrodes in cochlea 4 Coil carries signals to the implant 3 Microphone picks up sound and carries it to a computer 1 Computer digitizes sound 2 Next Electrodes stimulate auditory nerve fibers 5 Auditory nerve sends sound information to brain 6
Living with Computers ,[object Object],[object Object],[object Object],p.11.23 Fig. 11-31 Next
Living with Computers ,[object Object],[object Object],[object Object],p.11.22 Fig. 11-32 Click to view  Web Link then click  E-Books Next
Company on the Cutting Edge ,[object Object],[object Object],[object Object],[object Object],[object Object],p.11. 23 Click to view Web Link then click Britannica Next
Living with Computers ,[object Object],[object Object],[object Object],[object Object],p.11. 24 Next
Living with Computers ,[object Object],[object Object],[object Object],p.11.24 Fig. 11-33 Next
Living with Computers ,[object Object],p.11. 24 Make reservations Track stolen vehicle Honk horn  Next Provide directions Automatically call for help in emergency Provide emergency services when a button is pressed Dispatch roadside assistance Unlock door Perform remote diagnostics if warning light on dashboard appears
Living with Computers ,[object Object],[object Object],[object Object],[object Object],[object Object],p.11.25 Fig. 11-34 Next
Living with Computers ,[object Object],[object Object],[object Object],p.11.25 Fig. 11-35 Next
Living with Computers ,[object Object],[object Object],[object Object],[object Object],p.11.26 Fig. 11-36 Click to view Web Link then click Telecommuting Next
Living with Computers ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],p.11. 26 Fig. 11-36 Next
Emerging Technologies ,[object Object],[object Object],[object Object],[object Object],p.11.27 Fig. 11-37 Click to view Web Link then click Virtual Reality Next
Emerging Technologies ,[object Object],[object Object],[object Object],p.11.27 Fig. 11-37 Next
Emerging Technologies ,[object Object],[object Object],[object Object],p.11.28 Fig. 11-38 Next
Emerging Technologies ,[object Object],[object Object],[object Object],p.11. 28 Next smart software Software with built-in intelligence
Emerging Technologies ,[object Object],[object Object],p.11.29 Fig. 11-39 Click to view Web Link then click Intelligent Agents Next Intelligent agent offers a suggestion
Emerging Technologies ,[object Object],[object Object],[object Object],[object Object],p.11. 29 Next
Emerging Technologies ,[object Object],[object Object],p.11.30 Fig. 11-40 Click to view Web Link then click Robotics Next
A Healthy Work Environment ,[object Object],[object Object],p.11.30 Green computing Ergonomics and workplace design Next Computer addiction Job-related injuries and illnesses
A Healthy Work Environment ,[object Object],[object Object],[object Object],[object Object],[object Object],Tendonitis Inflammation of a tendon due to some repeated motion or stress on that tendon p.11. 30 Carpal tunnel syndrome (CTS) Inflammation of the nerve that connects your forearm to the palm of your wrist Next
A Healthy Work Environment ,[object Object],[object Object],[object Object],[object Object],[object Object],p.11.31 Fig. 11-41 Hand Exercises Next
A Healthy Work Environment ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],p.11. 31 Next
A Healthy Work Environment ,[object Object],p.11.31 Fig. 11-42 Next
A Healthy Work Environment ,[object Object],[object Object],[object Object],p.11. 32 Fig. 11-43 Click to  view video Click to  view Web Link then click  Ergonomics 1. Viewing distance: 18 to 28 inches 1 2. Viewing angle: 20 ° to center of screen 2 3. Arms: elbows at 90 ° and arms and hands parallel to floor 3 4. Keyboard height: 23 to 28 inches depending on height of user 4 5. Adjustable backrest 5 6. Adjustable seat 6 7. Adjustable height chair with 5 legs for stability 7 8. Feet flat on floor 8 Next
A Healthy Work Environment ,[object Object],p.11. 32 Next Keyboards Built-in wrist rests Ergonomic design specifically to prevent RSI Monitors Tilt-and-swivel base Controls to adjust the brightness, contrast, positioning, height, and width of images MPR II standard defines acceptable levels of radiation
A Healthy Work Environment ,[object Object],[object Object],[object Object],[object Object],p.11. 32 Next ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
A Healthy Work Environment ,[object Object],[object Object],[object Object],p.11. 33 Click to view Web Link then click Green Computing ENERGY STAR program Developed by the United States Department of Energy (DOE) and the United States Environmental Protection Agency (EPA) Encourages manufacturers to create energy–efficient devices that require little power when they are not in use Next
A Healthy Work Environment ,[object Object],p.11.33 Fig. 11-44 Next
Ethics and Society ,[object Object],[object Object],[object Object],p.11.34 Next Software theft (piracy) Information accuracy Codes of conduct Unauthorized use of computer systems Information privacy Intellectual property rights
Ethics and Society ,[object Object],p.11.34 Fig. 11-45 Next
Ethics and Society ,[object Object],[object Object],[object Object],p.11.34 Fig. 11-46 Next
Ethics and Society ,[object Object],[object Object],[object Object],p.11.36 Fig. 11-47 Next
Ethics and Society ,[object Object],[object Object],[object Object],p.11.36 Next © copyright TM trademark
Technology Trailblazer ,[object Object],[object Object],[object Object],p.11.35 Click to view Web Link then click Mitch Kapor Next
Ethics and Society ,[object Object],[object Object],[object Object],[object Object],[object Object],p.11.36 © Next Software piracy  The unauthorized and illegal duplication of copyrighted software
Ethics and Society ,[object Object],[object Object],[object Object],[object Object],p.11.36 TM Next
Ethics and Society ,[object Object],[object Object],[object Object],p.11.37 Fig. 11-48 Next
Summary of Computers and Society: Home, Work, and Ethical Issues ,[object Object],[object Object],[object Object],[object Object],Next
Chapter 11 Complete

Weitere ähnliche Inhalte

Was ist angesagt?

NOTES Nov 14, 2011
NOTES Nov 14, 2011NOTES Nov 14, 2011
NOTES Nov 14, 2011Alif Deedat
 
Title 09 - computer application in media industries (2)
Title   09 - computer application in media industries (2)Title   09 - computer application in media industries (2)
Title 09 - computer application in media industries (2)Adzline Nurul
 
Information Technology and Modern Gadgets
Information Technology and Modern GadgetsInformation Technology and Modern Gadgets
Information Technology and Modern GadgetsArnav Chowdhury
 
Lecture-4: Introduction to Programming & Databases
Lecture-4: Introduction to Programming & DatabasesLecture-4: Introduction to Programming & Databases
Lecture-4: Introduction to Programming & DatabasesMubashir Ali
 
Computer Applications In Business by Mahatma Gandhi University
Computer Applications In Business by Mahatma Gandhi University Computer Applications In Business by Mahatma Gandhi University
Computer Applications In Business by Mahatma Gandhi University Mahatma Gandhi University
 
TSL061, Computer Literacy - Chapter 01
TSL061, Computer Literacy - Chapter 01TSL061, Computer Literacy - Chapter 01
TSL061, Computer Literacy - Chapter 01Aien Lee
 
6th chapter modern communication device.
6th chapter modern communication device.6th chapter modern communication device.
6th chapter modern communication device.venkatesh yadav
 
Business communication
Business communicationBusiness communication
Business communicationSyed Ahmed
 
2. communication through technology
2. communication through technology2. communication through technology
2. communication through technologykamlesh p joshi
 
Introduction to Computers
Introduction to ComputersIntroduction to Computers
Introduction to ComputersSamudin Kassan
 
COMMUNICATION THROUGH TECHNOLOGY BY NEERAJ BHANDARI(SURKHET,NEPAL)
COMMUNICATION THROUGH TECHNOLOGY BY NEERAJ BHANDARI(SURKHET,NEPAL)COMMUNICATION THROUGH TECHNOLOGY BY NEERAJ BHANDARI(SURKHET,NEPAL)
COMMUNICATION THROUGH TECHNOLOGY BY NEERAJ BHANDARI(SURKHET,NEPAL)Neeraj Bhandari
 

Was ist angesagt? (20)

NOTES Nov 14, 2011
NOTES Nov 14, 2011NOTES Nov 14, 2011
NOTES Nov 14, 2011
 
Title 09 - computer application in media industries (2)
Title   09 - computer application in media industries (2)Title   09 - computer application in media industries (2)
Title 09 - computer application in media industries (2)
 
Information Technology and Modern Gadgets
Information Technology and Modern GadgetsInformation Technology and Modern Gadgets
Information Technology and Modern Gadgets
 
Chapter01
Chapter01Chapter01
Chapter01
 
Computers and society
Computers and societyComputers and society
Computers and society
 
Botany Software
Botany SoftwareBotany Software
Botany Software
 
Social impact of computer ages
Social impact of computer agesSocial impact of computer ages
Social impact of computer ages
 
Lecture-4: Introduction to Programming & Databases
Lecture-4: Introduction to Programming & DatabasesLecture-4: Introduction to Programming & Databases
Lecture-4: Introduction to Programming & Databases
 
Computer Applications In Business by Mahatma Gandhi University
Computer Applications In Business by Mahatma Gandhi University Computer Applications In Business by Mahatma Gandhi University
Computer Applications In Business by Mahatma Gandhi University
 
TSL061, Computer Literacy - Chapter 01
TSL061, Computer Literacy - Chapter 01TSL061, Computer Literacy - Chapter 01
TSL061, Computer Literacy - Chapter 01
 
Ict topic 4
Ict topic 4Ict topic 4
Ict topic 4
 
6th chapter modern communication device.
6th chapter modern communication device.6th chapter modern communication device.
6th chapter modern communication device.
 
Business communication
Business communicationBusiness communication
Business communication
 
2. communication through technology
2. communication through technology2. communication through technology
2. communication through technology
 
amaha internet course
amaha internet courseamaha internet course
amaha internet course
 
Introduction to Computers
Introduction to ComputersIntroduction to Computers
Introduction to Computers
 
COMMUNICATION THROUGH TECHNOLOGY BY NEERAJ BHANDARI(SURKHET,NEPAL)
COMMUNICATION THROUGH TECHNOLOGY BY NEERAJ BHANDARI(SURKHET,NEPAL)COMMUNICATION THROUGH TECHNOLOGY BY NEERAJ BHANDARI(SURKHET,NEPAL)
COMMUNICATION THROUGH TECHNOLOGY BY NEERAJ BHANDARI(SURKHET,NEPAL)
 
Computer in Society
Computer in SocietyComputer in Society
Computer in Society
 
SKOLA
SKOLASKOLA
SKOLA
 
ICT in Society
ICT in SocietyICT in Society
ICT in Society
 

Andere mochten auch

تجربة الصين الاستثمارية
تجربة الصين الاستثماريةتجربة الصين الاستثمارية
تجربة الصين الاستثماريةAli Hassan Ba-Issa
 
What Do You know about Toastmasters?. تعريف شامل عن أندية التوستماسترز
What Do You know about Toastmasters?. تعريف شامل عن أندية التوستماسترزWhat Do You know about Toastmasters?. تعريف شامل عن أندية التوستماسترز
What Do You know about Toastmasters?. تعريف شامل عن أندية التوستماسترزAli Hassan Ba-Issa
 
Computers and Society 01 - Course Overview
Computers and Society 01 - Course OverviewComputers and Society 01 - Course Overview
Computers and Society 01 - Course OverviewRandy Connolly
 
امن المعلومات المحاضرة الثالثة
امن المعلومات المحاضرة الثالثةامن المعلومات المحاضرة الثالثة
امن المعلومات المحاضرة الثالثةايمن البيلي
 
Information Security Awareness
Information Security AwarenessInformation Security Awareness
Information Security AwarenessAli Hassan Ba-Issa
 
العرض المصاحب لوحدة أمن المعلومات
العرض المصاحب لوحدة أمن المعلوماتالعرض المصاحب لوحدة أمن المعلومات
العرض المصاحب لوحدة أمن المعلوماتتقانة
 
الملاحظة كعملية 3
الملاحظة   كعملية 3الملاحظة   كعملية 3
الملاحظة كعملية 3Dr Abdalla Mahmoud
 
شبكات و أمن المعلومات 3
شبكات و أمن المعلومات 3شبكات و أمن المعلومات 3
شبكات و أمن المعلومات 3emad tawfeek
 
شبكات و أمن المعلومات 1
شبكات و أمن المعلومات 1شبكات و أمن المعلومات 1
شبكات و أمن المعلومات 1emad tawfeek
 
أنظمة الحماية من الفايروسات و الهاكرز
أنظمة الحماية من الفايروسات و الهاكرزأنظمة الحماية من الفايروسات و الهاكرز
أنظمة الحماية من الفايروسات و الهاكرزsultan_Alqarni
 
أساسيات أمن المعلومات
أساسيات أمن المعلوماتأساسيات أمن المعلومات
أساسيات أمن المعلوماتMohammed Almeshekah
 
امن المعلومات المحاضرة الاولى
امن المعلومات المحاضرة الاولىامن المعلومات المحاضرة الاولى
امن المعلومات المحاضرة الاولىايمن البيلي
 
information security
information securityinformation security
information securityMoamen Ayyad
 
Living with computer
Living with computerLiving with computer
Living with computerkarenglish
 
امن الوثائق والمعلومات عرض تقديمى
امن الوثائق والمعلومات عرض تقديمىامن الوثائق والمعلومات عرض تقديمى
امن الوثائق والمعلومات عرض تقديمىNasser Shafik
 
امن المعلومات
امن المعلوماتامن المعلومات
امن المعلوماتToto Tarik
 

Andere mochten auch (20)

3021 conteudo intensivo
3021 conteudo intensivo3021 conteudo intensivo
3021 conteudo intensivo
 
تجربة الصين الاستثمارية
تجربة الصين الاستثماريةتجربة الصين الاستثمارية
تجربة الصين الاستثمارية
 
Modon GIS final draft
Modon GIS final draftModon GIS final draft
Modon GIS final draft
 
What Do You know about Toastmasters?. تعريف شامل عن أندية التوستماسترز
What Do You know about Toastmasters?. تعريف شامل عن أندية التوستماسترزWhat Do You know about Toastmasters?. تعريف شامل عن أندية التوستماسترز
What Do You know about Toastmasters?. تعريف شامل عن أندية التوستماسترز
 
Computers and Society 01 - Course Overview
Computers and Society 01 - Course OverviewComputers and Society 01 - Course Overview
Computers and Society 01 - Course Overview
 
امن المعلومات المحاضرة الثالثة
امن المعلومات المحاضرة الثالثةامن المعلومات المحاضرة الثالثة
امن المعلومات المحاضرة الثالثة
 
Information Security Awareness
Information Security AwarenessInformation Security Awareness
Information Security Awareness
 
العرض المصاحب لوحدة أمن المعلومات
العرض المصاحب لوحدة أمن المعلوماتالعرض المصاحب لوحدة أمن المعلومات
العرض المصاحب لوحدة أمن المعلومات
 
شبكة الانترنت 2
شبكة الانترنت 2شبكة الانترنت 2
شبكة الانترنت 2
 
الملاحظة كعملية 3
الملاحظة   كعملية 3الملاحظة   كعملية 3
الملاحظة كعملية 3
 
شبكات و أمن المعلومات 3
شبكات و أمن المعلومات 3شبكات و أمن المعلومات 3
شبكات و أمن المعلومات 3
 
شبكات و أمن المعلومات 1
شبكات و أمن المعلومات 1شبكات و أمن المعلومات 1
شبكات و أمن المعلومات 1
 
أنظمة الحماية من الفايروسات و الهاكرز
أنظمة الحماية من الفايروسات و الهاكرزأنظمة الحماية من الفايروسات و الهاكرز
أنظمة الحماية من الفايروسات و الهاكرز
 
أساسيات أمن المعلومات
أساسيات أمن المعلوماتأساسيات أمن المعلومات
أساسيات أمن المعلومات
 
امن المعلومات المحاضرة الاولى
امن المعلومات المحاضرة الاولىامن المعلومات المحاضرة الاولى
امن المعلومات المحاضرة الاولى
 
information security
information securityinformation security
information security
 
Living with computer
Living with computerLiving with computer
Living with computer
 
امن الوثائق والمعلومات عرض تقديمى
امن الوثائق والمعلومات عرض تقديمىامن الوثائق والمعلومات عرض تقديمى
امن الوثائق والمعلومات عرض تقديمى
 
امن المعلومات
امن المعلوماتامن المعلومات
امن المعلومات
 
Gandhi1
Gandhi1Gandhi1
Gandhi1
 

Ähnlich wie Chapter 11 Computers And Society Home, Work, And Ethical Iss

The Internet Presentation
The Internet Presentation The Internet Presentation
The Internet Presentation guest9e3d59
 
The Internet Presentation
The Internet PresentationThe Internet Presentation
The Internet Presentationguest3d7966
 
The Internet Presentation
The Internet Presentation The Internet Presentation
The Internet Presentation guestc2627d
 
The Internet Presentation
The Internet Presentation The Internet Presentation
The Internet Presentation guestc2627d
 
Best invention ever
Best invention everBest invention ever
Best invention everJahid Hasan
 
Impact of computing
Impact of computingImpact of computing
Impact of computingsidra naz
 
Near and far contemplating (nfc)
Near and far contemplating (nfc) Near and far contemplating (nfc)
Near and far contemplating (nfc) Andy Black
 
About internet by krishna tibdewal...!!!!
About internet by krishna tibdewal...!!!!About internet by krishna tibdewal...!!!!
About internet by krishna tibdewal...!!!!Krishna Tibdewal
 
Digital Audio / Visual Technologies
Digital Audio / Visual TechnologiesDigital Audio / Visual Technologies
Digital Audio / Visual TechnologiesFeLix Gato
 
CORE's 10 Trends 2009
CORE's 10 Trends 2009CORE's 10 Trends 2009
CORE's 10 Trends 2009Derek Wenmoth
 
Empowerment Technologies - Module 1.pptx
Empowerment Technologies - Module 1.pptxEmpowerment Technologies - Module 1.pptx
Empowerment Technologies - Module 1.pptxjoelphillipGranada2
 

Ähnlich wie Chapter 11 Computers And Society Home, Work, And Ethical Iss (19)

Chapter01.ppt
Chapter01.pptChapter01.ppt
Chapter01.ppt
 
Misinformation on Computer
Misinformation on ComputerMisinformation on Computer
Misinformation on Computer
 
The Internet Presentation
The Internet Presentation The Internet Presentation
The Internet Presentation
 
The Internet Presentation
The Internet PresentationThe Internet Presentation
The Internet Presentation
 
The Internet Presentation
The Internet Presentation The Internet Presentation
The Internet Presentation
 
The Internet Presentation
The Internet Presentation The Internet Presentation
The Internet Presentation
 
Internet info
Internet infoInternet info
Internet info
 
Best invention ever
Best invention everBest invention ever
Best invention ever
 
INTERNET - Copy.pptx
INTERNET - Copy.pptxINTERNET - Copy.pptx
INTERNET - Copy.pptx
 
Impact of computing
Impact of computingImpact of computing
Impact of computing
 
Multimedia and ICT.pptx
Multimedia and ICT.pptxMultimedia and ICT.pptx
Multimedia and ICT.pptx
 
computers in education
computers in educationcomputers in education
computers in education
 
Near and far contemplating (nfc)
Near and far contemplating (nfc) Near and far contemplating (nfc)
Near and far contemplating (nfc)
 
About internet by krishna tibdewal...!!!!
About internet by krishna tibdewal...!!!!About internet by krishna tibdewal...!!!!
About internet by krishna tibdewal...!!!!
 
Digital Audio / Visual Technologies
Digital Audio / Visual TechnologiesDigital Audio / Visual Technologies
Digital Audio / Visual Technologies
 
CORE's 10 Trends 2009
CORE's 10 Trends 2009CORE's 10 Trends 2009
CORE's 10 Trends 2009
 
Empowerment Technologies - Module 1.pptx
Empowerment Technologies - Module 1.pptxEmpowerment Technologies - Module 1.pptx
Empowerment Technologies - Module 1.pptx
 
Chapter 01 (Discovering Computers)
Chapter 01 (Discovering Computers)Chapter 01 (Discovering Computers)
Chapter 01 (Discovering Computers)
 
Chapter01
Chapter01Chapter01
Chapter01
 

Mehr von norzaini

Using The Function In Excel 3
Using The Function In Excel 3Using The Function In Excel 3
Using The Function In Excel 3norzaini
 
Protecting Your Computer
Protecting Your ComputerProtecting Your Computer
Protecting Your Computernorzaini
 
Exploring The Word Window
Exploring The Word WindowExploring The Word Window
Exploring The Word Windownorzaini
 
Computer Software
Computer SoftwareComputer Software
Computer Softwarenorzaini
 
Word Processing
Word ProcessingWord Processing
Word Processingnorzaini
 
Spreadsheet 1
Spreadsheet 1Spreadsheet 1
Spreadsheet 1norzaini
 
Managing Files
Managing FilesManaging Files
Managing Filesnorzaini
 
Computer Basic Definitions
Computer Basic DefinitionsComputer Basic Definitions
Computer Basic Definitionsnorzaini
 
Building Formulas With Excel 2
Building Formulas With Excel 2Building Formulas With Excel 2
Building Formulas With Excel 2norzaini
 
Chapter 8 Operating Systems And Utility Programs
Chapter 8 Operating Systems And Utility ProgramsChapter 8 Operating Systems And Utility Programs
Chapter 8 Operating Systems And Utility Programsnorzaini
 
Chapter 3 Application Software
Chapter 3  Application  SoftwareChapter 3  Application  Software
Chapter 3 Application Softwarenorzaini
 
Chapter 7 Storage
Chapter 7 StorageChapter 7 Storage
Chapter 7 Storagenorzaini
 
Chapter 6 Output
Chapter 6 OutputChapter 6 Output
Chapter 6 Outputnorzaini
 
Chapter 5 Input
Chapter 5 InputChapter 5 Input
Chapter 5 Inputnorzaini
 
Chapter 4 The Components Of The System Unit
Chapter 4 The Components Of The System UnitChapter 4 The Components Of The System Unit
Chapter 4 The Components Of The System Unitnorzaini
 
Chapter 2 The Internet And World Wide Web
Chapter 2 The Internet And World Wide WebChapter 2 The Internet And World Wide Web
Chapter 2 The Internet And World Wide Webnorzaini
 
Chapter 1 Introduction To Computers
Chapter 1 Introduction To ComputersChapter 1 Introduction To Computers
Chapter 1 Introduction To Computersnorzaini
 

Mehr von norzaini (17)

Using The Function In Excel 3
Using The Function In Excel 3Using The Function In Excel 3
Using The Function In Excel 3
 
Protecting Your Computer
Protecting Your ComputerProtecting Your Computer
Protecting Your Computer
 
Exploring The Word Window
Exploring The Word WindowExploring The Word Window
Exploring The Word Window
 
Computer Software
Computer SoftwareComputer Software
Computer Software
 
Word Processing
Word ProcessingWord Processing
Word Processing
 
Spreadsheet 1
Spreadsheet 1Spreadsheet 1
Spreadsheet 1
 
Managing Files
Managing FilesManaging Files
Managing Files
 
Computer Basic Definitions
Computer Basic DefinitionsComputer Basic Definitions
Computer Basic Definitions
 
Building Formulas With Excel 2
Building Formulas With Excel 2Building Formulas With Excel 2
Building Formulas With Excel 2
 
Chapter 8 Operating Systems And Utility Programs
Chapter 8 Operating Systems And Utility ProgramsChapter 8 Operating Systems And Utility Programs
Chapter 8 Operating Systems And Utility Programs
 
Chapter 3 Application Software
Chapter 3  Application  SoftwareChapter 3  Application  Software
Chapter 3 Application Software
 
Chapter 7 Storage
Chapter 7 StorageChapter 7 Storage
Chapter 7 Storage
 
Chapter 6 Output
Chapter 6 OutputChapter 6 Output
Chapter 6 Output
 
Chapter 5 Input
Chapter 5 InputChapter 5 Input
Chapter 5 Input
 
Chapter 4 The Components Of The System Unit
Chapter 4 The Components Of The System UnitChapter 4 The Components Of The System Unit
Chapter 4 The Components Of The System Unit
 
Chapter 2 The Internet And World Wide Web
Chapter 2 The Internet And World Wide WebChapter 2 The Internet And World Wide Web
Chapter 2 The Internet And World Wide Web
 
Chapter 1 Introduction To Computers
Chapter 1 Introduction To ComputersChapter 1 Introduction To Computers
Chapter 1 Introduction To Computers
 

Kürzlich hochgeladen

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 

Kürzlich hochgeladen (20)

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 

Chapter 11 Computers And Society Home, Work, And Ethical Iss

  • 1. Chapter 11 Computers and Society: Home, Work, and Ethical Issues
  • 2. Chapter 11 Objectives Understand that computers have made a tremendous difference in daily living Explain how computers are used at home Describe how computers change the way society interacts with disciplines such as education, entertainment, finance, government, health care, science, publishing, and travel Recognize the issues associated with the digital divide Understand how e-commerce affects the way people conduct business Identify ways virtual reality, intelligent agents, and robots are being used in daily life Learn how to prevent health-related disorders and injuries due to computer use Understand how to design a workspace ergonomically Recognize symptoms of computer addiction Explain green computing Understand ethical issues surrounding computer use p.11.2 Next
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
  • 35.
  • 36.
  • 37.
  • 38.
  • 39.
  • 40.
  • 41.
  • 42.
  • 43.
  • 44.
  • 45.
  • 46.
  • 47.
  • 48.
  • 49.
  • 50.
  • 51.
  • 52.
  • 53.
  • 54.
  • 55.
  • 56.
  • 57.
  • 58.
  • 59.
  • 60.
  • 61.
  • 62.
  • 63.
  • 64.
  • 65.
  • 66.
  • 67.
  • 68.
  • 69.
  • 70.
  • 71.
  • 72.
  • 73.
  • 74.
  • 75.
  • 76.
  • 77.
  • 78.
  • 79.
  • 80.
  • 81.
  • 82.
  • 83.