Escolar Documentos
Profissional Documentos
Cultura Documentos
End Show
Developing Team
S.K.N.Suriyaarachchi
(PICTEC-Western Province)
N.Nobel Ravi(ZICTEC-Nuwara Eliya)
A.M.Vazeer (CRC- Kahagolla)
D.M.D.Kumarihamy(ZEO-Welimada)
L.K.Rathnayake(ZICTEC-Passara)
End Show
End Show
End Show
End Show
End Show
E-channeling
Research and Innovation
Medical testing &
reporting
Surgery
Maintenance of Medical
History Records
In house management
Remote surgery
End Show
ICT in Education
End Show
End Show
Online courses/exams
Huge collection of subject related electronic
materials and methodologies(Lessons,
Tutorials, simulations etc.)
Learning Management System(LMS)
Educational fora, video conferencing,
CAL(Computer Assisted Learning)
School net
End Show
End Show
End Show
ICT in Agriculture
ICT in Industry
End Show
ATM
Credit Cards
Inter Bank Money Transfer
On-Line banking (e-banking)
Image Processing Cheque Clearing Systems
Money grams
Etc.
End Show
End Show
End Show
Social Issues
Digital Divide
Ethical Issues
Piracy
Cracking
Hacking
Unauthorized access
etc.
End Show
Legal Issues
End Show
Security Issues
Hardware Protection
Computer must be protected from
outside threats
Software Protection
Programs must be protected from
various threats
End Show
Hardware protection
Your computer should be equipped with
A UPS(Uninterrupted Power Supplier)
to avoid risk of sudden power failure
and fluctuations.
Surge protection safeguard against
lightening and thunder.
Stabilizer to control voltage.
End Show
Logical Security
The software and the data in your
computer can be protected by
Passwords
Backups
End Show
Malicious codes
The expression "malicious code"
has been used by analysts to
describe
the
category to which
Virus
Worm
Trojan Horse
falls
End Show
Computer Viruses
End Show
Multipartite Virus
Polymorphic Virus
Stealth Virus
End Show
File Virus
Macro Virus
Written using a simplified macro
programming language, these viruses
affect Microsoft Office applications
A document infected with a macro virus
generally modifies a pre-existing,
commonly used command (such as Save)
to trigger its payload upon execution of
End Show
that command.
Multipartite Virus
End Show
Polymorphic Virus
changes code whenever it passes to
another machine;
in theory these viruses should be
more difficult for antivirus scanners
to detect, but in practice they're
usually not that well written.
End Show
Stealth Virus
End Show
Worm
Worms
spread
from
computer to computer, A
worm takes advantage of
file
or
information
transport features on your
system, which allows it to
travel unaided. The biggest
danger with a worm is its
capability to replicate itself
on your system
End Show
A Trojan Horse
End Show
Norton
Mcafee
Symantec
PC cillin
AVG
Norman
Dr.Solomon's
End Show
Firewall software
A firewall is a system
that
prevents
unauthorized use and
access
to
your
computer. A firewall
can be either hardware
or software.The most
popular firewall choice
is a software firewall.
End Show
Spy ware
End Show
The End