29
Your Interactive Guide to the Digital World Discovering Computers 2012 Lecture -13

Your Interactive Guide to the Digital World Discovering Computers 2012 Lecture -13

Embed Size (px)

Citation preview

Page 1: Your Interactive Guide to the Digital World Discovering Computers 2012 Lecture -13

Your Interactive Guide to the Digital World

Discovering Computers 2012

Lecture -13

Page 2: Your Interactive Guide to the Digital World Discovering Computers 2012 Lecture -13

COMPUTERS IN DAILY LIFE

Education

Finance

Government

Health care

Science

Publishing

Travel

Manufacturing

Page 3: Your Interactive Guide to the Digital World Discovering Computers 2012 Lecture -13

EXAMPLE - MANUFACTURING

Robots are used for painting, welding, and other repetitive assembly-line jobs

Computers also help track inventory, time the delivery of parts.

control the quality of the production.Engineers use CAD (computer-aided

design) and CAM (computer-aided manufacturing) technologies to design new products and the machines that build those products

Page 4: Your Interactive Guide to the Digital World Discovering Computers 2012 Lecture -13

THE PAPERLESS OFFICE

Experts have predicted the paperless office -

Computer archives will replace reference books and file cabinets

Electronic communication will replace letters and memos

An intranet will coordinate resources

Page 5: Your Interactive Guide to the Digital World Discovering Computers 2012 Lecture -13

COMPUTERS AND JOBS

Computers may cause unemployment

Automation - part of a jobA bank worker no longer needs to fill in a paper ledger

Structural - a whole job disappearsType-setters are no longer used to arrange the lead blocks of type for newspapers; it now goes straight from computer to printing press

Page 6: Your Interactive Guide to the Digital World Discovering Computers 2012 Lecture -13

COMPUTERS CAN CREATE JOBS

Many jobs available now didn’t exist before computers

Web designProgrammerSystems analyst

Page 7: Your Interactive Guide to the Digital World Discovering Computers 2012 Lecture -13

THE ENVIRONMENT

A PC uses a lot of electricity (biggest single user in the average workplace)

And often sits idleThe system unit and CRT

monitor contain heavy metalsPCs are often replaced every 4

or so years, and just thrown out

Page 8: Your Interactive Guide to the Digital World Discovering Computers 2012 Lecture -13

THE GREEN PC

Energy Star compliantPCs requiring little power when they are not in use.

System unitEnergy saving chipSleep mode for chipEliminate cooling fan

DisplayFlat panel (less power, less chemicals)Sleep mode

ManufacturingFewer harmful chemicals

Page 9: Your Interactive Guide to the Digital World Discovering Computers 2012 Lecture -13

WHAT SHOULD YOU DO TO SAVE ENVIRONMENT?Use computers and devices that comply with

Energy Star program

Do not leave the computer running overnight

Turn off the monitor, printer, and other devices when not in use.

Use paperless method to communicate

Recycle paper

Buy recycled paper.

Recycle toner cartridges

Recycled old computers and printers.

Page 10: Your Interactive Guide to the Digital World Discovering Computers 2012 Lecture -13

ETHICS, SAFETY AND LIABILITY

Ethics Good and bad, right and wrong; moral duty “Your good name”

Safety Computer programs and systems must have the

highest priority on safety

Liability Who is to blame when things go wrong? Software engineering – engineering principles Fault tolerant systems

Page 11: Your Interactive Guide to the Digital World Discovering Computers 2012 Lecture -13

PRIVACY ON THE INTERNET AND WWW

Internet has an illusion of anonymity

Email may be monitored within the organization

A copy of every email remains at every “hop” along it’s journey

Your own PC records your browsing history

Most sites you visit record information from your computer

A cookie may be left on your hard disk

Page 12: Your Interactive Guide to the Digital World Discovering Computers 2012 Lecture -13

TAKING STEPS TO PROTECT INTERNET PRIVACYUse a web-based email address (e.g.

Hotmail) as your public addressNever give your real name and detailsEmpty your History fileDelete cookies (by hand or use “Cookie

Cutter” programmes e.g. Window Washer)

Use a software firewalle.g. BlackIce Defender, ZoneAlarmBe aware of the issues

Page 13: Your Interactive Guide to the Digital World Discovering Computers 2012 Lecture -13

COPYRIGHT

Intellectual property is protected by copyright laws

Copyright is the exclusive legal right that prohibits the copying of intellectual property without the permission of the copyright holder

Unauthorized copying of computer programs (software piracy) is theft

Page 14: Your Interactive Guide to the Digital World Discovering Computers 2012 Lecture -13

PIRACY

Software piracy - the illegal copying of software

(one copy may be allowed for backup)

Copying copyright software to sell is illegal

Copying copyright software to give away is illegal

Copying copyright software across a network (e.g. the Internet) is illegal

This also applies to MP3s, videos, and movies

Page 15: Your Interactive Guide to the Digital World Discovering Computers 2012 Lecture -13

PROPRIETARY SOFTWARE

Proprietary software is software that has a copyright applying

Individual or business, usually the developer

The ownership of this software is protected by copyright laws

Buying software does not give you ownership; it gives you a license to use the software

You “rent” the software

The license describes how you may use the software

Page 16: Your Interactive Guide to the Digital World Discovering Computers 2012 Lecture -13

PENALTIES OF COPYRIGHT CRIME

The laws in different countries varySome countries pay little notice; others are very strict

Punishment variesLarger companies tend to attract larger fines

Large-scale copying for profit may lead to prison

This issue is becoming more important, especially in the entertainment industry

Page 17: Your Interactive Guide to the Digital World Discovering Computers 2012 Lecture -13

PLAGIARISM

Very easy to use IT to plagiarise; copy and paste

More and more e-Journals, e-Books

Software developed to detect plagiarism

Page 18: Your Interactive Guide to the Digital World Discovering Computers 2012 Lecture -13

YOUR RESPONSIBILITIES

Purchase genuine software and use according to the license

Do not trade in pirate software

Managers/owners of a business are responsible for what happens in their business

Helping someone to break the law can be as bad as doing it yourself

Ethical behaviour -

“Doing the right thing”

Page 19: Your Interactive Guide to the Digital World Discovering Computers 2012 Lecture -13

D I S C O V E R I N G C O M P U T E R S 2 0 1 2 : C H A P T ER 1 1

19

COMPUTER SECURITY RISKS

A computer security risk is any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability

A cybercrime is an online or Internet-based illegal act

Pages 556 - 557

Page 20: Your Interactive Guide to the Digital World Discovering Computers 2012 Lecture -13

D I S C O V E R I N G C O M P U T E R S 2 0 1 2 : C H A P T ER 1 1

20

COMPUTER SECURITY RISKS

Pages 556 – 557

Figure 11-1

Page 21: Your Interactive Guide to the Digital World Discovering Computers 2012 Lecture -13

D I S C O V E R I N G C O M P U T E R S 2 0 1 2 : C H A P T ER 1 1

21

INTERNET AND NETWORK ATTACKSTYPES OF MALICIOUS SOFTWARE

Virus

• Affects a computer negatively by altering the way the computer works

Worm

• Copies itself repeatedly, using up resources and possibly shutting down the computer or network

Trojan Horse

• A malicious program that hides within or looks like a legitimate program

Rootkit

• Program that hides in a computer and allows someone from a remote location to take full control

Page 558

Page 22: Your Interactive Guide to the Digital World Discovering Computers 2012 Lecture -13

D I S C O V E R I N G C O M P U T E R S 2 0 1 2 : C H A P T ER 1 1

22

INTERNET AND NETWORK ATTACKS

An infected computer has one or more of the following symptoms:

Pages 558 - 559

Operating system runs much slower than usual

Available memory is less than expected

Files become corrupted

Screen displays unusual

message or image

Music or unusual sound

plays randomly

Existing programs and files disappear

Programs or files do not

work properly

Unknown programs or

files mysteriously

appear

System properties

change

Operating system does not start up

Operating system shuts

down unexpectedly

Page 23: Your Interactive Guide to the Digital World Discovering Computers 2012 Lecture -13

D I S C O V E R I N G C O M P U T E R S 2 0 1 2 : C H A P T ER 1 1

23

INTERNET AND NETWORK ATTACKS

Page 560 – 561

Figure 11-7

Page 24: Your Interactive Guide to the Digital World Discovering Computers 2012 Lecture -13

D I S C O V E R I N G C O M P U T E R S 2 0 1 2 : C H A P T ER 1 1

24

INTERNET AND NETWORK ATTACKS

A firewall is hardware and/or software that protects a network’s resources from intrusion

Pages 563 - 564

Figure 11-8

Page 25: Your Interactive Guide to the Digital World Discovering Computers 2012 Lecture -13

D I S C O V E R I N G C O M P U T E R S 2 0 1 2 : C H A P T ER 1 1

25

UNAUTHORIZED ACCESS AND USE

Unauthorized

access is the use of

a computer or network

without permission

Unauthorized use is the use of

a computer or its data

for unapprove

d or possibly illegal

activities

Page 564

Page 26: Your Interactive Guide to the Digital World Discovering Computers 2012 Lecture -13

D I S C O V E R I N G C O M P U T E R S 2 0 1 2 : C H A P T ER 1 1

26

UNAUTHORIZED ACCESS AND USE

Access controls define who can access a computer, when they can access it, and what actions they can take

Two-phase processes called identification and authentication Username Password

Pages 565 – 567

Figure 11-11

Page 27: Your Interactive Guide to the Digital World Discovering Computers 2012 Lecture -13

D I S C O V E R I N G C O M P U T E R S 2 0 1 2 : C H A P T ER 1 1

27

UNAUTHORIZED ACCESS AND USE

A possessed object is any item that you must carry to gain access to a computer or computer facility

Often are used in combination with a personal identification number (PIN)

A biometric device authenticates a person’s identity by translating a personal characteristic into a digital code that is compared with a digital code in a computer

Page 568

Figure 11-14

Page 28: Your Interactive Guide to the Digital World Discovering Computers 2012 Lecture -13

D I S C O V E R I N G C O M P U T E R S 2 0 1 2 : C H A P T ER 1 1

28

HARDWARE THEFT AND VANDALISM

Hardware theft is the act of

stealing computer equipment

Hardware vandalism is the act of defacing or

destroying computer equipment

Page 570

Page 29: Your Interactive Guide to the Digital World Discovering Computers 2012 Lecture -13

D I S C O V E R I N G C O M P U T E R S 2 0 1 2 : C H A P T ER 1 1

29

HARDWARE THEFT AND VANDALISM

To help reduce the of chances of theft, companies and schools use a variety of security measures

Page 570

Figure 11-15

Physical access controls Alarm systems Cables to lock

equipment

Real time location system

Passwords, possessed objects,

and biometrics