Professional Documents
Culture Documents
Software Piracy
Prevention
Software can be protected against
piracy in a number of ways including:
1. Serial Numbers
2. Holograms
3. Licence agreements
Serial Numbers
When software is being installed,
users are often asked to enter a
unique number which proves the
software is original.
Serial numbers are supplied with the
original copy of the software.
Holograms
Holograms are often used on the
packaging of software and they
indicate that the copy is genuine.
Software without a hologram on the
packaging is usually an illegal copy.
Licence Agreements
Licence agreements are part of the
software installation process and they
inform the user exactly how they are
legally allowed to use the product.
Computer Viruses
Definition:
Hacking
Definition:
"The process of accessing a
computer system without
permission"
Overview of hacking:
Hacking is where people 'break' into
computer systems without
permission. These people are known
as 'hackers'.
Hackers often use the Internet to
break into the system.
Firewall's
Firewall's provide a 'shield' between
your computer and the Internet.
Firewall's can block unwanted data
(including hackers) from reaching
your computer. They can also stop
your computer from connecting to
unwanted websites.
Data Encryption
Encryption makes the files on you
system unreadable if the user does
not know the password to un-encrypt
them.
If someone try's to read an encrypted
file they will just see random junk
instead of the real data
Impacts on Patterns of
Employment
Why do businesses use ICT?
Computer usage in businesses and
companies has increased massively
within the last 30 years. The benefits
that computers bring to business is
just too hard for the owners to
ignore. For example:
1.Speed
Data can bestored,processedandsearchedextremely fast
2.Volume
Vast quantities of data can be stored in small amounts of space
3.Less Paper Work
Computersremove the needfor huge quantities ofpaper-work.
4.Less Workers
Computers can do thework of many peoplewhichsaves
expenses in wages
5.Connectivity
The Internetmeans that companies canshare dataor
evenhold meetingsin different countrieswithout actually
leaving the office
Microprocessor Controlled
Devices
What is a microprocessor?
A microprocessor is really just atiny
cpu built onto a single chip.
Microprocessors are put
intoelectronic devicestocontrol
how they function.
Computer System
Your desktop PC or laptop will contain
a microprocessor called
aCPU(powerful machines will
contain more than one).
The CPUcontrols all the
processingthat go's on within the
computer.
Washing Machines
Washing machines contain
microprocessors to control things
like:
Water temperature
Valves to let water in
Pumps to let water out
Alarm Systems
The microprocessor inside a burglar
alarm is used todetect
intrudersand they also set the
alarm off.
Some even contact the police for you
automatically.
Heating Systems
Heating systems use
microprocessors to control things
like:
Time when the heating is
switched on / off
Keeping a constant temperature
Some can even make the
temperature different from room
to room
Effects of microprocessors on
the need to leave the home
ICT has progressed to a point where it
would be possible to never have to leave
your home.
Entertainment
We can entertain ourselves very easily
using microprocessor devices and the
Internet. For example:
YouTube (videos, music etc)
Gaming
Social networking to chat to friends
Downloading mp3's to the computer
Downloading and watching DVD's
Chat-rooms.
Online Banking
Banking can now becarried out online.
We can perform all sorts of tasks without
actually visiting the bank. These tasks
include:
Transferring money
Viewing statements to track your
spending
Paying bills
Setting up new accounts
Applying for loans.
Capabilities of ICT
devices
What things do ICT devices do
well?
ICT devices and systems are capable
of performing lots of tasks very well.
Some of these are listed below:
1. Speed
Computers perform tasks very fast. Somecpu'scan execute
literally'billions' of instructions per second.
2.Accuracy
If programmed properly, computers are capable of performing
the sametasks 100% accurately every time.
For example, a robot that is programmed to bolt a wheel to a
car will get it exactly right each time.
3.Multi-Tasking
Computers are able to performmany tasks at the same
time.
4.RepetitiveTasks
Computers will carry outboring and repetitive tasks
accurately. Humans tend to get bored and make mistakes.
For example, machines that count bank notes will do that job
all day long without making a mistake.
5.Networking
Computers can bejoined together(either as a LAN or a WAN) and
allows them to easilyshare resourcessuch as printersanddata.
6.Huge amounts of Data Storage
Computer databases can storeenormous amounts of data.
All types of data be stored including text, numbers, images and
video.
7.Fast Searches Computers cansearch for stored data extremely
fast.
For example, the police can match fingerprints in a database in
minutes rather than spending weeks searching through printed
copies.
8.Security
Data can besecuredwithpasswordsorencryption.
1. Battery Life
Portable device such as laptops,PDAsandmobile phones
arelimited by their battery life. These devices only remain
charged for so long before they need to be plugged into the mains.
2.Weight
Some portable devices areheavy(especially laptops). This does not
make them ideal for carrying around.
3.Screen and Keyboard Size
Smaller devices such asmobile phonesandPDAshave very small
screensandkeyboardswhich can cause problems for some people.
4.Bandwidth
Bandwidth is thespeed that data can be transported over the
Internet.
Low bandwidth means that large files will take a long time to transfer.
Internet Developments
and Issues
Uses of Blog's, wikis, digital
media websites and social
networks
Blog's (weblogs)
A blog is a kind ofonline journalora
logwhere'bloggers'write abouttopics
that are important to them.
Blog's can be about anything that the
blogger wants to share with other Internet
users and interesting Blog's can
attractmillions of visitors.
Wikis
Wikis areinteractive web pagesthat can beviewed
and edited by users.
Anyone with a web browser can visit a wiki and
makechanges to the content. This has both
advantages and disadvantages as shown below:
Advantage
Information is quickly added as many people collaborate
their knowledge.
Disadvantage
One of the problems with letting everyone add to the wiki
is that sometimes incorrect information is posted.
Unreliable information
Undesirable information
Unreliable information
Just because something is written on
the Internet does not necessarily
make ittrueor correct.Anyone
can make a websiteand a lot of
the information held on these
websites isnever checked or
verified.
Undesirable information
Undesirable
websites
are
those
that
includecontent that is offensive to individuals
or even races. Undesirable content can include:
Pornography
Violent videos or images
Content promoting hatred
Racial content
Phishing
Pharming
The intention of pharming is the same as phishing..... to
obtain personal information such
asusernames,passwordsandbank
detailsetc.
Pharming usually targets users of online banking or
shopping websites.
The
way
this
is
done
however
is
slightly
different.'Pharmers'infectlegitimate websites with
malicious codethat will're-direct'you to theirbogus
version
of
the
website.
The bogus website will look very similar, or even
identical, as the legitimate website. This makes pharming
very dangerous and difficult to detect.
Spam
Spam is'junk email'that issent
automaticallytothousands,
or
even
millions,
of
email
inboxes.Spam over-runs your inbox
very quickly and it is a pain to have
to delete all of these unwanted
emails
every
day.
Health problems
There are a number of health
problems that you can suffer if you
useICT devices incorrectlyor
fortoo long. The main ones are:
Repetitive Strain Injury (RSI)
Back and Neck Strain
Eye Strain and Headaches
Safety Issues
Electrocution
use of a residual circuit breaker (RCB)
check insulation on wires regularly
do not allow drinks near computers
check equipment regularly
Trailing wires
use cable ducts to make the wires
safe
cover wires and/or have them neatly
tucked away (under desks, etc.)
try and use wireless connections
wherever possible, thus eliminating
cables altogether
Fire risk