Você está na página 1de 49

UNIT SEVEN

Information and Communication


Technology(ICT) and Society

End Show

Developing Team
S.K.N.Suriyaarachchi
(PICTEC-Western Province)
N.Nobel Ravi(ZICTEC-Nuwara Eliya)
A.M.Vazeer (CRC- Kahagolla)
D.M.D.Kumarihamy(ZEO-Welimada)
L.K.Rathnayake(ZICTEC-Passara)

End Show

Information and Communication


Technology(ICT) and Society
ICT for National Developme
nt
Issues in the use of ICT

End Show

7.1 - ICT for National Development

Information and Communication Technology has


become a vital player in the national development
of modern society.
Methods of gathering, processing and
dissemination of information has dramatically
changed in the modern era with the advent of
ICT.
End Show

ICT has an impact on the


Social
Cultural
Economic
Administrative
aspects of society

End Show

ICT has contributed to increase


productivity of goods and services
relevant to
Health
Education
Agriculture
Industries
and almost all other
sectors in Sri Lanka

End Show

ICT in the health sector

End Show

ICT in the Health Sector

E-channeling
Research and Innovation
Medical testing &
reporting
Surgery
Maintenance of Medical
History Records
In house management
Remote surgery
End Show

ICT in Education

End Show

ICT is used in education under


Learning
Teaching
Management

End Show

ICT for learning

Online courses/exams
Huge collection of subject related electronic
materials and methodologies(Lessons,
Tutorials, simulations etc.)
Learning Management System(LMS)
Educational fora, video conferencing,
CAL(Computer Assisted Learning)
School net
End Show

ICT for teaching


Hypermedia tools
Simulation, animation, modeling,
audio and video
Huge Collection of Subject Related
Materials (Lessons, Tutorials etc.)
Modern Learning / Teaching
Methodologies

End Show

ICT for teaching cont


School Management Systems
Web sites related to Education
Management

End Show

ICT in Agriculture

Introduces modern machinery and equipment


Provides information on seeds that maximize
harvest and preservation of products
Provides awareness in the field of modern
Agriculture
Fertilizers
Pesticides
Provides information on modern techniques
in horticulture and in agro technology
Research on farming, animal husbandry
Virtual/competitive markets for agricultural
products
End Show

ICT in Industry

Provides information on modern tools, equipment,


machinery
Provides software on designing and modeling

Provides know how on the use of new techniques in


various industries including self employment
E.g. hair dressing, beauty culture and apparel

Provides facilities for advertising and marketing


End Show

ICT in Industry contd.

Facilitates office automated systems


Electronic processing saves energy and time
Increases productivity, efficiency and accuracy
Minimizes paper work
Provides on-line jobs
Facilitates tele-commuting
Provides infrastructure facilities for call centers

End Show

ICT in Banking Sector

ATM
Credit Cards
Inter Bank Money Transfer
On-Line banking (e-banking)
Image Processing Cheque Clearing Systems
Money grams
Etc.
End Show

ICT in Insurance Sector


On the Spot Claims
Medical coverage using electronic
cards

End Show

ICT in Share Market

Provides information on current


foreign exchanges

Provides facility to deal with the


share market
End Show

Issues in the use of ICT


Social
Ethical
Legal
Security
Health & safety

End Show

Social Issues

Digital Divide

Digital divide is the division of


people according to the accessibility
to ICT Resources. There is a gap
between those who can access ICT
resources easily and those who can
not access.
End Show

Ethical Issues

Piracy
Cracking
Hacking
Unauthorized access
etc.
End Show

Legal Issues

Violation of Intellectual Property


Rights
Copyright
Patent

End Show

Security Issues
Hardware Protection
Computer must be protected from

outside threats
Software Protection
Programs must be protected from
various threats
End Show

Hardware protection
Your computer should be equipped with
A UPS(Uninterrupted Power Supplier)
to avoid risk of sudden power failure
and fluctuations.
Surge protection safeguard against
lightening and thunder.
Stabilizer to control voltage.
End Show

Environmental factors to protect your


computer
Your computer should be kept in a
dust free,
Dry (moisture free),
Smoke free
environment.
End Show

Logical Security
The software and the data in your
computer can be protected by
Passwords
Backups
End Show

Malicious codes
The expression "malicious code"
has been used by analysts to
describe
the
category to which
Virus
Worm
Trojan Horse
falls

End Show

Computer Viruses

A program or piece of code that is


loaded onto your computer without
your knowledge and runs against your
wishes.
All computer viruses are manmade. A
computer virus attaches itself to a
program or file so that it can spread
from one computer to another, leaving
infections as it travels. Much like
human viruses, computer viruses can
range in severity.

End Show

Types of computer viruses


Boot Sector Virus
File Virus
Macro Virus

Multipartite Virus
Polymorphic Virus
Stealth Virus

End Show

Boot Sector Virus

replaces or implants itself in the


boot sector---an area of the hard
drive (or any other disk) accessed
when you first turn on your
computer. This kind of virus can
prevent you from being able to
boot your hard disk.
End Show

File Virus

infects applications. These


executables then spread the virus
by infecting associated documents
and other applications whenever
they're opened or run.
End Show

Macro Virus
Written using a simplified macro
programming language, these viruses
affect Microsoft Office applications
A document infected with a macro virus
generally modifies a pre-existing,
commonly used command (such as Save)
to trigger its payload upon execution of
End Show
that command.

Multipartite Virus

infects both files and the boot


sector--a double shot that can reinfect your system dozens of times
before it's caught.

End Show

Polymorphic Virus
changes code whenever it passes to
another machine;
in theory these viruses should be
more difficult for antivirus scanners
to detect, but in practice they're
usually not that well written.

End Show

Stealth Virus

hides its presence by making an


infected file not appear infected,
but doesn't usually stand up to
antivirus software.

End Show

Worm

Worms
spread
from
computer to computer, A
worm takes advantage of
file
or
information
transport features on your
system, which allows it to
travel unaided. The biggest
danger with a worm is its
capability to replicate itself
on your system

End Show

A Trojan Horse

It will appear to be useful software but will actually


do damage once installed or run on your
computer. When a Trojan is activated the results can
vary.
Some Trojans are designed to be more annoying
than malicious (like changing your desktop, adding
silly active desktop icons)
they can cause serious damage by deleting files and
destroying information on your system.
End Show

Precautions to Protect the computer


systems
Avoid infected disks and flash drives.
Avoid downloading infected
executable file.
Be careful when opening e-mails with
unfamiliar addresses.
Use the latest version of an anti virus
program and run it regularly.

End Show

Anti virus program


A utility that searches storage devices for viruses and
removes any that are found. Scanning software looks for a
virus in one of two ways

If it's a known virus it is removed


from
your system.
In the case of new viruses it
quarantines (isolates) the
End Show
questionable program.

Some popular anti virus


software

Norton
Mcafee
Symantec
PC cillin
AVG
Norman
Dr.Solomon's

End Show

Firewall software

A firewall is a system
that
prevents
unauthorized use and
access
to
your
computer. A firewall
can be either hardware
or software.The most
popular firewall choice
is a software firewall.

End Show

Spy ware

A general term for a program that secretly


monitors your actions. While they are
sometimes evil, like a remote control
program used by a hacker, software
companies have been known to use spy
ware to gather data about customers.

End Show

Health and Safety Issues

Ergonomics & health


issues
Repetitive Stress Injuries
Eye Strains
Electro-Magnetic Field
(EMF) exposure
End Show

To avoid Repetitive Stress Injuries

The keyboard should be at elbow


height, and at a distance and
angle that allow you to keep
your wrists straight.
If your chair doesn't have arms,
use a pillow to support your
arms.
Adjust your chair so that your
feet are flat on the ground and
your hips are slightly higher than
your knees
End Show

To avoid Repetitive Stress Injuries


contd

Keep your feet flat on the floor.


Don't slouch(bend).
Keep your head in a "neutral" position
Relieve neck strain by looking back over your shoulder
while sitting up straight. Hold for 10 seconds, then slowly
turn and look the other way.
Relax shoulders by rolling them backwards and forwards.
Reduce muscle tension in your hands by spreading your
fingers wide apart. Hold, and then make a tight fist
End Show

To avoid Eye Strains

Your head should be about 18 - 30 inches from the


monitor.
Blink frequently so your eyes don't get dry.
Clean the screen every once in a while to remove
dust that has become one with your screen due to
static electricity.
Refocus your eyes every ten minutes or so by
looking away from the computer and briefly
focusing on an object at least 20 feet away.
End Show

Electro-Magnetic Field (EMF)


exposure
Take frequent breaks away from
the computer
Sit at arms length from the System
and the Monitor
Use a flat panel display
End Show

The End

Você também pode gostar