uses of ict in our environment

14
USES OF ICT IN OUR ENVIRONMENT. MADE BY: JEET KOTHADIYA

Upload: jeet-kothadiya

Post on 11-Jun-2015

210 views

Category:

Documents


2 download

TRANSCRIPT

Page 1: Uses of ict in our environment

USES OF

ICT

IN O

UR

ENVIRONMENT.

M A D E B Y : J E E T K O T H A D I Y A

Page 2: Uses of ict in our environment

INTRODUCTION

• Uses of ICT had affected our day to day lives in many ways.

• For example: online shopping and e-banking

Page 3: Uses of ict in our environment

IS YOUR COMPUTER SAFE?

• Hacking is a act of gaining access to a computer system or network without legal authorization.

• ICT has cause lot many of crimes in our society. Due to which innocent people get in trouble.

• Also hackers change, copy, leak, delete the information which is kept in secret.

Page 4: Uses of ict in our environment

EFFECTS OF ICT ON SOCIETY.

Page 5: Uses of ict in our environment

IMPACT ON EMPLOYEES.

Advantages:-• People get jobs easily

online.• Some people do their

jobs online at home and get paid.

Disadvantages:-• Robots are over taking.• Decrease in

employment.

Page 6: Uses of ict in our environment

IMPACT ON ONLINE SHOPPING.

Advantages

• Can get number of verities.

• Useful for old-age people because they do walk for a long distance.

• Less time consumed Disadvantages

• Can be a fake website.

• Product might be fake

Page 7: Uses of ict in our environment

IMPACT ON E-BANKING

Advantages

• Easy to use rather than waiting in the office.

• Good for old people. Due to health problems.

• Transactions are very fast and time saving.

Disadvantages

• Can be hacked.

• Transfers may happen to wrong accounts.

• He/she should need to be trained.

Page 8: Uses of ict in our environment

SECURITY ISSUES.

There are many types of security issue.

1. Phishing

2. Pharming

3. Spam

4. Spyware

Page 9: Uses of ict in our environment

PHISHING

Phishing is similar to fishing in a lake, but instead of trying to capture fish, phishers attempt to steal your personal information. They send out e-mails that appear to come from legitimate websites such as eBay, PayPal, or other banking institutions. The e-mails state that your information needs to be updated or validated and ask that you enter your username and password, after clicking a link included in the e-mail. 

Page 10: Uses of ict in our environment

PHARMING

Pharming is yet another way hackers attempt to manipulate users on the Internet. While phishing attempts to capture personal information by getting users to visit a fake website, pharming redirects users to false websites without them even knowing it.

Page 11: Uses of ict in our environment

SPAM

Spam is most often considered to be electronic junk mail or junk newsgroup postings. Some people define spam even more generally as any unsolicited email. However, if a long-lost brother finds your email address and sends you a message, this could hardly be called spam, even though it is unsolicited. Real spam is generally email advertising for some product sent to a mailing listor newsgroup.

Page 12: Uses of ict in our environment

SPYWARE

Spyware is any technology that aids in gathering information about a person or organization without their knowledge. On the Internet (where it is sometimes called a spybot or tracking software), spyware is programming that is put in someone's computer to secretly gather information about the user and relay it to advertisers or other interested parties. Spyware can get in a computer as a software virus or as the result of installing a new program.

Page 13: Uses of ict in our environment

SHOULD THE INTERNET BE POLICED?

Page 14: Uses of ict in our environment

THANK YOU