Upload
dominick-hodges
View
216
Download
3
Tags:
Embed Size (px)
Citation preview
Your Interactive Guide to the Digital World
Discovering Computers 2012
Lecture -13
COMPUTERS IN DAILY LIFE
Education
Finance
Government
Health care
Science
Publishing
Travel
Manufacturing
EXAMPLE - MANUFACTURING
Robots are used for painting, welding, and other repetitive assembly-line jobs
Computers also help track inventory, time the delivery of parts.
control the quality of the production.Engineers use CAD (computer-aided
design) and CAM (computer-aided manufacturing) technologies to design new products and the machines that build those products
THE PAPERLESS OFFICE
Experts have predicted the paperless office -
Computer archives will replace reference books and file cabinets
Electronic communication will replace letters and memos
An intranet will coordinate resources
COMPUTERS AND JOBS
Computers may cause unemployment
Automation - part of a jobA bank worker no longer needs to fill in a paper ledger
Structural - a whole job disappearsType-setters are no longer used to arrange the lead blocks of type for newspapers; it now goes straight from computer to printing press
COMPUTERS CAN CREATE JOBS
Many jobs available now didn’t exist before computers
Web designProgrammerSystems analyst
THE ENVIRONMENT
A PC uses a lot of electricity (biggest single user in the average workplace)
And often sits idleThe system unit and CRT
monitor contain heavy metalsPCs are often replaced every 4
or so years, and just thrown out
THE GREEN PC
Energy Star compliantPCs requiring little power when they are not in use.
System unitEnergy saving chipSleep mode for chipEliminate cooling fan
DisplayFlat panel (less power, less chemicals)Sleep mode
ManufacturingFewer harmful chemicals
WHAT SHOULD YOU DO TO SAVE ENVIRONMENT?Use computers and devices that comply with
Energy Star program
Do not leave the computer running overnight
Turn off the monitor, printer, and other devices when not in use.
Use paperless method to communicate
Recycle paper
Buy recycled paper.
Recycle toner cartridges
Recycled old computers and printers.
ETHICS, SAFETY AND LIABILITY
Ethics Good and bad, right and wrong; moral duty “Your good name”
Safety Computer programs and systems must have the
highest priority on safety
Liability Who is to blame when things go wrong? Software engineering – engineering principles Fault tolerant systems
PRIVACY ON THE INTERNET AND WWW
Internet has an illusion of anonymity
Email may be monitored within the organization
A copy of every email remains at every “hop” along it’s journey
Your own PC records your browsing history
Most sites you visit record information from your computer
A cookie may be left on your hard disk
TAKING STEPS TO PROTECT INTERNET PRIVACYUse a web-based email address (e.g.
Hotmail) as your public addressNever give your real name and detailsEmpty your History fileDelete cookies (by hand or use “Cookie
Cutter” programmes e.g. Window Washer)
Use a software firewalle.g. BlackIce Defender, ZoneAlarmBe aware of the issues
COPYRIGHT
Intellectual property is protected by copyright laws
Copyright is the exclusive legal right that prohibits the copying of intellectual property without the permission of the copyright holder
Unauthorized copying of computer programs (software piracy) is theft
PIRACY
Software piracy - the illegal copying of software
(one copy may be allowed for backup)
Copying copyright software to sell is illegal
Copying copyright software to give away is illegal
Copying copyright software across a network (e.g. the Internet) is illegal
This also applies to MP3s, videos, and movies
PROPRIETARY SOFTWARE
Proprietary software is software that has a copyright applying
Individual or business, usually the developer
The ownership of this software is protected by copyright laws
Buying software does not give you ownership; it gives you a license to use the software
You “rent” the software
The license describes how you may use the software
PENALTIES OF COPYRIGHT CRIME
The laws in different countries varySome countries pay little notice; others are very strict
Punishment variesLarger companies tend to attract larger fines
Large-scale copying for profit may lead to prison
This issue is becoming more important, especially in the entertainment industry
PLAGIARISM
Very easy to use IT to plagiarise; copy and paste
More and more e-Journals, e-Books
Software developed to detect plagiarism
YOUR RESPONSIBILITIES
Purchase genuine software and use according to the license
Do not trade in pirate software
Managers/owners of a business are responsible for what happens in their business
Helping someone to break the law can be as bad as doing it yourself
Ethical behaviour -
“Doing the right thing”
D I S C O V E R I N G C O M P U T E R S 2 0 1 2 : C H A P T ER 1 1
19
COMPUTER SECURITY RISKS
A computer security risk is any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability
A cybercrime is an online or Internet-based illegal act
Pages 556 - 557
D I S C O V E R I N G C O M P U T E R S 2 0 1 2 : C H A P T ER 1 1
20
COMPUTER SECURITY RISKS
Pages 556 – 557
Figure 11-1
D I S C O V E R I N G C O M P U T E R S 2 0 1 2 : C H A P T ER 1 1
21
INTERNET AND NETWORK ATTACKSTYPES OF MALICIOUS SOFTWARE
Virus
• Affects a computer negatively by altering the way the computer works
Worm
• Copies itself repeatedly, using up resources and possibly shutting down the computer or network
Trojan Horse
• A malicious program that hides within or looks like a legitimate program
Rootkit
• Program that hides in a computer and allows someone from a remote location to take full control
Page 558
D I S C O V E R I N G C O M P U T E R S 2 0 1 2 : C H A P T ER 1 1
22
INTERNET AND NETWORK ATTACKS
An infected computer has one or more of the following symptoms:
Pages 558 - 559
Operating system runs much slower than usual
Available memory is less than expected
Files become corrupted
Screen displays unusual
message or image
Music or unusual sound
plays randomly
Existing programs and files disappear
Programs or files do not
work properly
Unknown programs or
files mysteriously
appear
System properties
change
Operating system does not start up
Operating system shuts
down unexpectedly
D I S C O V E R I N G C O M P U T E R S 2 0 1 2 : C H A P T ER 1 1
23
INTERNET AND NETWORK ATTACKS
Page 560 – 561
Figure 11-7
D I S C O V E R I N G C O M P U T E R S 2 0 1 2 : C H A P T ER 1 1
24
INTERNET AND NETWORK ATTACKS
A firewall is hardware and/or software that protects a network’s resources from intrusion
Pages 563 - 564
Figure 11-8
D I S C O V E R I N G C O M P U T E R S 2 0 1 2 : C H A P T ER 1 1
25
UNAUTHORIZED ACCESS AND USE
Unauthorized
access is the use of
a computer or network
without permission
Unauthorized use is the use of
a computer or its data
for unapprove
d or possibly illegal
activities
Page 564
D I S C O V E R I N G C O M P U T E R S 2 0 1 2 : C H A P T ER 1 1
26
UNAUTHORIZED ACCESS AND USE
Access controls define who can access a computer, when they can access it, and what actions they can take
Two-phase processes called identification and authentication Username Password
Pages 565 – 567
Figure 11-11
D I S C O V E R I N G C O M P U T E R S 2 0 1 2 : C H A P T ER 1 1
27
UNAUTHORIZED ACCESS AND USE
A possessed object is any item that you must carry to gain access to a computer or computer facility
Often are used in combination with a personal identification number (PIN)
A biometric device authenticates a person’s identity by translating a personal characteristic into a digital code that is compared with a digital code in a computer
Page 568
Figure 11-14
D I S C O V E R I N G C O M P U T E R S 2 0 1 2 : C H A P T ER 1 1
28
HARDWARE THEFT AND VANDALISM
Hardware theft is the act of
stealing computer equipment
Hardware vandalism is the act of defacing or
destroying computer equipment
Page 570
D I S C O V E R I N G C O M P U T E R S 2 0 1 2 : C H A P T ER 1 1
29
HARDWARE THEFT AND VANDALISM
To help reduce the of chances of theft, companies and schools use a variety of security measures
Page 570
Figure 11-15
Physical access controls Alarm systems Cables to lock
equipment
Real time location system
Passwords, possessed objects,
and biometrics