chapter 1

33
Introduction To Information And Communication Technology

Upload: hamidahrahim

Post on 26-May-2015

401 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: Chapter 1

Introduction To Information And Communication

Technology

Page 2: Chapter 1

LESSON 1Introduction

LESSON 3Usage

LESSON 2Evaluation

LESSON 4Computerized

LESSON 5Impact

LESSON 7Differences

LESSON 6Ethic

LESSON 8Intellectual

Property

LESSON 9Privacy

LESSON 11Identification

LESSON 10Authentication

LESSON 12Controversial

Page 3: Chapter 1

Introduction to Information and Communication Technology

Sir,What Is ICT ?

Page 4: Chapter 1

Technology required for information processing , The use of electronic computers, communication

devices and software application to convert, store, protect, process, transmit and retrieve information

From anywhere, anytime.

The knowledge obtained from reading, investigation, study or research

Is an act of transmitting messages. InformationIs exchanged between individuals using symbols,

signs, or verbal interaction

Is the use of scientific knowledge, experienceand resources to create processes and

products that fulfill human needs.

Page 5: Chapter 1

FIRST GENERATION (1940-1956)- ENIAC ( Electronic Numerical Integrator and Calculator)ENIAC ( Electronic Numerical Integrator and Calculator)- Presper Eckert and Willian Mauchly build ENIAC- use Vacuum Tube- huge, slow, expensive and often unreliable.- Disadvantage :

- tubes also burnt out frequently- huge, slow, expensive- need large space

Evolution Of Computer

Page 6: Chapter 1

SECOND GENERATION (1956-1963)-The famous scientists during second generation era were :

- Transistor was small devices use to transfer electronic signal across a resister.

- Advantages :-Transistor were smaller then Vacuum Tube- there needed no warm up time- consumed less energy- Generated less heat- Faster and more reliable

Page 7: Chapter 1

THIRD GENERATION (1964-1971)

- Integrated Circuit (IC) is a complete circuit on a small chip of silicone, also known as semi conductor

- Advantage :-Silicon chip were reliable, compact and cheaper- sold hardware and software separately- it is a complete electronic circuit on a small chip of silicon, also known as semi conductor

Page 8: Chapter 1

FOURTH GENERATION (1971-PRESENT)

-The microprocessor is a large-scale integrated circuit which contained thousand of transistor- The transistor on this one chip are capable of performing all of the function of a computer’s central processing unit.- Advantage :

- Computer become 100 times smaller then ENIAC- Gain in speed, reliability and storage capacity- Personal and software industry boomed

Page 9: Chapter 1

FIFTH GENERATION (PRESENT- BEYOND)

- The fifth generation computer are technologically advance and are still being development to become more efficient.-The inventions of new hardware technology in the fifth generation have grown rapidly including many other modern computer devices such as :

- silicon chips- processor- robotics- virtual reality- intelligent system- programs which translate languages

Page 10: Chapter 1

Usage Of ICT In Daily Life

EDUCATIONComputer are used in the sector of education because they can offer

a) Student b) researcher

c) Teacher d) school administrator

BANKING To control entire banking system that alsoInclude Electronic Banking Services

Cognitive Development

Interactive Experiences

Enhance Learning

Cheque Deposit

Automated Teller Machine (ATM)

Electronic Fund Transfera) Customer b) Businessmenc) Bank Administrator

INDUSTRYAre used to facilitate production planning

and control system, To support chainmanagement and to help in product design

in the industrial sector

E-COMMERCEHelps in boosting he economy. It makes

Buying and selling activityeasier, more efficient and faster

Supplier

Customer

Employees

Researchers

Workers

Administrator

Page 11: Chapter 1

COMPUTERISED AND NON COMPUTERISED SYSTEM

- A system is an arrangement of elements that when it is put together it becomes an organized and establish procedure.

- A system typically consists of components connected together in order to facilitate. The flow of information, matter or energy.

Non-Computerized

(Before ICT)

Usage Computerised

(With ICT)

-Was done manually by taking deposits directly

- Transactions only during working hour

Banking -All transactions are done by computers -Transactions can be done at anytime, and place. Online services, phone banking are available

- Productions was slow because everything done manually and totally depend on human labour

Industry - Computers and telecommunications industry became very popular and profitable since production can be increase through an all day operation.

-Using barter system- trading globally was extremely slow, late and expensive.

Commerce -e-commerce plays an important role in economic scene.- includes distribution, buying, selling and servicing products that done electronically

Page 12: Chapter 1

The Impact Of ICT In Society

Faster Communication Speed-Save time and inexpensive- information can travel fast

and at an instant

Effective Sharing Of Information

-Information can be share andExchange opinions, news and info

through discussion group, mailing list and forum.

Borderless Communication-Internet offer fast information

retrieval, interactivity, accessibilityand versatile.

Health Problem-Expose to bad posture,

eyestrain, physical and mentalstress

Another effect of ICT is:-Fraud

- identity theft- Pornography

- Hacking

Paperless Environment-Information can be stored

and retrieved through the digitalMedium instead of paper.

Reliable mode of Communication

-With internet, information could be access and retrieved from

anywhere and anytime.

Lower Communication Cost-Access to large amounts of data at a very low cost.

Page 13: Chapter 1

Computer Ethics

Ethics in General- A guideline is needed to stop the current technology products from being exploited for example replicating original CD.-Unethical refers to any code of conducts that are not confirming to approved Standards of social or professional behavior.-Computer ethics is a system of moral standards or values used as a guideline forComputer users.

Ethical computer code of conductsa) Sending warning about viruses to other computer usersb) Asking permission before sending any business advertisements to otherc) Using information with authorizations

Page 14: Chapter 1

Definition of Ethics-Ethics moral guideline to refer to when using the computer and computer network.

Definition of Law-Law is a legal system comprising of rules and principles that govern the affairs of a community and controlled by a political authority

Computer Ethics

Respecting Ownership

Respecting Privacy

Respecting Property

We must respect ownership by not stealing other people work either by duplicating or

Distributing it.

We should respect other people privacy and confidentiality by refraining ourselves

from reading their mails or files without their Permission.

-Property means ownership. Individual data and information consider as property, An act of tempering and changing electronic

Information is consider as vandalism and Disrespect for other people property.

Page 15: Chapter 1

The ten commandments of computer ethics

Page 16: Chapter 1

The Differences between Ethic and Law

SIMILARITIES BETWEEN ETHICS AND LAW :

-To guide user from misusing computers- to create a healthy computer society, so that computers are used to contribute to a better life- To prevent any crime

SIMILARITIES BETWEEN ETHICS AND LAW :

-To guide user from misusing computers- to create a healthy computer society, so that computers are used to contribute to a better life- To prevent any crime

ETHICS LAW

Guideline Control

Moral Standards Judicial Standards

Free to follow Must Follow

No punishments Penalties, Imprisonments and other punishment

Universals Depends on country

Produce ethical computer users

Prevent misusing of computers

Immoral crime

Page 17: Chapter 1

Unethical versus law breaking conducts

Unethical:- Using the office computer to do personal thing

- Reading your friend’s email without his or her permission- Plagiarizing and using materials from the internet for your class assignment

without giving credit to the original author.

Law Breaking :-Sending a computer virus via e-mail

- hacking into your school’s database to change your examination result- selling pirate software in a night market

Page 18: Chapter 1

Intellectual Property Right

DEFINITION OF INTELLECTUAL PROPERTY- Refer to works created by inventors, authors and artist.

- these works are unique and have value in the market place.

INTELLECTUAL PROPERTY LAW- covers ideas, inventions, literary creations, unique names, business model, industrial process,

computer program codes and more

INVENTIONS PROTECED BY INTELLECTUAL PROPERTY LAWS :a) Trademarksb) Service marksc) Trade/company namesd) Domain namese) Geographical indicationsf) Copyrightsg) Patents

Page 19: Chapter 1

Privacy In Computer Usage

Privacy

Refer to data and information privacy

SPAM

Unsolicited email massage, advertisements orNewsgroup posting sent to many

recipients at once.

COOKIES

- Are used to identify users by web casting, e-commerce and other web applications-Contain user information and are saved in computer hard disk

ELECTRONIC PROFILE

-Is the combining of data in a database that can be sold to the interne by the company to the interested parties

SPYWARE

- A program that collects user information without the user knowledge

Way computer Technologythreaten our privacy

Page 20: Chapter 1

Privacy In Computer Usage

Can privacy be protected ??

Privacy Law

-Security Services to review the security policy- security management to protect the resources- security mechanism to implement the required security services-Security objects, the important entitieswithin the system environment

Utilities Software

- anti-spam program- firewall- anti - spyware-antivirus

Page 21: Chapter 1

Authentication

Is a process where users verify that they are who they say they are...

The user who attempt to perform functions in asystem is in fact the user who is authorized to do so

Biometric device

-Is a device that translate personal characteristics into a digital

code that is compared with a digital code stored in the database

Callback system

- refers to the checking system that Authenticates the user.

Fingerprint recognition

Iris Scanning

Hand Geometry ScanningFacial Recognition

Signature VerificationSystem

Voice RecognitionRetinal Scanning

Page 22: Chapter 1

Verifications

Is the act of proving or disproving the correctness of a system with respect to a certain formal specification

Methods of Verification

User IdentificationExample :a) Key in the user name to log on to a system And the system will verify whether the user Is valid or invalid

b) Show the exam slip to verify that you are the valid candidate for theexam

Processed ObjectExample :a) The policeman will check on the driver’s license to identify the valid driver

b) Employees have to swipe their security card to enter the building

Page 23: Chapter 1

Controversial Content

Is information that cause disagreement in opinions and may cause the disruptionOf peace because different people or culture will have different views about the contents

Definition of PornographyIs any form of media or material (like book and

photography) that depicts erotic behavior And is intended to cause sexual excitement.

Definition of SlanderIs a legal term for false and malicious statement

about someone.

Pornography:

- Can lead to criminal acts such as exploitation of Women and children

- Can lead to sexual addiction or perversion- can develop low moral value towards other men, women

Or children

Slander :

-Can develop into a society that disregards honesty And truth

-Can develop bad habit of spreading untruths andrumors

- can lead unnecessary argument- can cause people to have negative attitude

towards another person

Impact on Malaysian SocietyWhat can you conclude about the impact of

controversial content on the Malaysia society.

Page 24: Chapter 1

Internet Filtering

Is a process that prevent orblocks access to certainmaterials on the internet

Controlling Access to the Internet

Keyword Blocking

- One of the strategies is by using keyword blocking method

- This method uses a list of banned words or objectionable terms

Web Rating Systems- Are rated in term of nudity, sex,

violence and language

Site Blocking-The software prevents access to any

sites on this list.

Page 25: Chapter 1

Cyber Law

Cyber Law

Integrity and security Of information

Security of Government Data

Intellectual Property Right

Legal Status of Online Transaction

Privacy and ConfidentiallyOf Information

Page 26: Chapter 1

Computer Crime

• Is defined as any criminal activity that is related to the use of computer.

• These activities include computer fraud, copyright infringement, computer theft and computer attack.

Computer Fraud

- Is defined as having an intention to takeadvantage over or causing loss to other

people, mainly on monetary basis through the use of computer.

-Email hoaxes, programme fraud,investment schemes, promotions

and claims

Computer Infringement

- is defined as a violation of therights secured by a copyright.

-Involvers illegal copy or reproduction of copyright Material by the

black market group

Computer Theft

- is defined as the unauthorized use of another person property with the

intention to deny the owner the rightful Possessions of the property or its use.

Example :a) Transfer of payments to the

wrong accounts

Computer Attack

-Is defined as any activities taken to disrupt the equipment of computer

systems, change processing control or Corrupt stored data.

Example :-Physical attack

- electronic attack-Computer network attack

Page 27: Chapter 1

Computer Security

Definition

Computer security means protecting our computer system and the information they contain against unwanted access, damage, destruction or modification.

Hardware security Network securitySoftware security

- Refer to security measures used toprotect the hardware specifically the computer and its related document

- Refer to security measures used toprotect the software and the loss of data files

- Refer to security measures used toprotect the network system. Exampleis firewall

Page 28: Chapter 1

Computer Threats

Computer threats can come from many ways either from human or natural disaster.

Malicious Code

Virus- A program that can pass on the Malicious code to other programs

by modifying them

Trapdoor or Backdoor - a feature in a program that allows

someone to access theprogram with special privileges

Logic Bomb- That goes off when a specific

condition occurs

Trojan Horse-A program which can performuseful and unexpected action

Worm-A program that copies and

spreads itself through a network

- Is also known as a rogue program.- it is a threat to computing assets by causing

undesired Effects in the programmer’s part.

Page 29: Chapter 1

Computer Threats

Natural & Environment Threat

Theft

Hacker

- Refer to unauthorized access to the computer system by a hacker

Hacker Cracker

-Two types of theft :a) computer is used to steal money, goods, information and resourcesb) stealing of computers especially notebook and PDA

Three approaches to prevent theft : a)b)c)

- Are also threatened by natural or environmental disaster.

Examples :

Page 30: Chapter 1

Security Measure

Are measures taken as a precaution against theft or espionage or sabotage or possible danger or failure

Page 31: Chapter 1
Page 32: Chapter 1

Cryptography

Page 33: Chapter 1

Plaintext Ciphertext

Plaintext Ciphertext

Encrypt

Decrypt

Is a process of converting plaintext into chipertext.

Is a process of converting ciphertext into plaintext