Impact-ict

  • Uploaded by: yusairri
  • 0
  • 0
  • June 2020
  • PDF

This document was uploaded by user and they confirmed that they have the permission to share it. If you are author or own the copyright of this book, please report to us by using this DMCA report form. Report DMCA


Overview

Download & View Impact-ict as PDF for free.

More details

  • Words: 614
  • Pages: 24
1

2

1.4 CURRENT AND FUTURE DEVELOPMENTS

1.4.1 IMPACT OF ICT ON SOCIETY

CONTRIBUTION/ POSITIVE IMPACT

NEGATIVE IMPACT

3

ICT contribution: Education Health care Science and Technology Finance Publishing Travel

4

E-Learning -Changes in the management of the educational sector. - Changes in the work process in education.

5

Many people and companies use computers to help manage their finances. Some use

finance

checkbooks ,

software

to balance

pay bills ,track personal income &

expenses, manage investments,& evaluate financial plans.

6

Hospitals and doctors use computers to maintain patient records. Doctors use the web and medical software to assist with researching and diagnosing health conditions.

7

All branches of science, from biology to astronomy to meteorology, use computers to assist them with collecting, analyzing and modeling data.

8

This works include books, magazines, newspapers, music, film and video. Special software assists graphic designers in developing pages that include text, graphics and photographs.

9

Many airlines now provide passengers with Internet-enabled devices during flights. You can order airline tickets on the Web.

10

11

There is a lot of negative impact of using the ICT such as:Virus Hacking Copyright and Piracy Phishing Biometrics

12

Potentially damaging computer negatively. Not only damage hard disk but also damage your hardware & software.

13

As well as varying ideas of what a hacker is or does. Hacker is any programming specialist who has the Expertise to enter a computer or network without proper authorization. The amount of damage a hacker can do depends on what the Hacker's skill level

14

Copyright is make a copy of any type of CD using a CD writer and sell it. Piracy involves usage, copying, selling & distributing computer program without the permission of its producer

15

Phishing is a technique used to gain personal and financial information for purposes of identity theft by used e-mail. Some phishing e-mail messages ask you to reply with your personal information such as account numbers and passwords, credit card numbers and Social Security numbers.

16

The technology of authenticating a person’s by verifying a personal characteristic. Include fingerprints, hand geometry, facial features, voice, signatures, and eye patterns. (please refer discovery computer text book)

17

18

The consumers of piracy run the risk that their computers may be infected with viruses

Pirates run the risk of massive fines and possible jail sentences if they are caught. COPYRIGHT & PIRACY

If there isn't money to sustain R&D, then the developers won't be able to hire new employee

There is degradation in quality.

no the 19

Technology can cause physical harm to an individual

If their iris scan is stolen, though, and it allows someone else to access personal information

BIOMETRIC

The data obtained using biometrics can be used in unauthorized ways without the individual's consent.

Electronic readers that are able to read the chip in the cards and verify the information present in the card and on the passport. 20

Hacker robe a money in the bank by hacking the system of bank

Hack to the bank system it’s cause the business close.

HACKING

Many people don’t want to used card credit because hacker can hack the number of card credit.

Hospital system may cause many people die because of many people was control by a machine 21

Businesses lose as their clients become victims

An attacker uses a bank or service's own scripts against the victim.

PHISHING

The attacker could then access the victim's account and use it for various criminal purposes, such as spamming.

Create fake accounts in a victim's name, ruin a victim's credit, or even prevent victims from accessing their own accounts. 22

23

1.

THE CONTRIBUTION OF ICT.

2.

NEGATIVE IMPACT

24

More Documents from "yusairri"

Input Devices-ict
June 2020 11
Data Manipulation-ict
June 2020 12
Network Topology-ict
June 2020 16
Induksi-comp Sys
June 2020 10
(ict)-introduction
June 2020 11