SlideShare uma empresa Scribd logo
1 de 18
LECTURE#25
YASMIN AFZAAL
Computer and Society
 Impact of Computer in Society
 Computer Ethics
2
Computer and Society
 Everyone knows that this is the age of computer and majority of people are
using computer.
 Development of science and technology has direct effect on our daily life as
well as in our social life.
 Computer technology has made communication possible from one part of
the world to the other in seconds.
 They can see the transactions in one part of the world while staying in the
other part.
 Computer development is one of the greatest scientific achievements of the
20 th century.
 Computers are used in various fields as well as in teaching and learning.
3
Major computer application fields
 An aid to management: The computer can also be
used as a management tool to assist in solving business
problems.
 Banking: Branches are equipped with terminals giving
them an online accounting facility and enabling them to
information as such things as current balances,
deposits, overdrafts and interest charges.
 Industrial Application: In industry, production may be
planned, coordinated and controlled with the aid of a
computer.
 Engineering Design: Computer help in calculating that
all the parts of a proposed design are satisfactory and
also assist in the designing.
 and for payroll and also for check-up and treatment of
diseases.
4
Cont.…
 Meteorology: Data is recorded at different levels of
atmosphere at different places, using remote sensors
carried on a satellite.
 Air Travel: Small computers are installed as a part of
the plane's equipment.
 Road Traffic Control: Computers assist with the
control of traffic lights.
 Telephones: Computerized telephone exchanges
handle an ever increasing volume of calls very
efficiently.
 Medicine: Computers are widely used in hospitals for
such task as maintaining drugs, surgical equipment
 In addition computers are also used for recording and
film studios, research, military, etc.
5
 Computers have both positive and negative impact
in our daily life as well as in our social life.
 But the gross development of the nation is faster
with the application of computers in industries and
education.
6
Positive Impact of Computer
 The work can be done in very less time.
 More information can be stored in small space.
 Multitasking and multiprocessing capabilities of
data.
 Easy to access data.
 Impartiality (equal treatment of all rivals or
disputants; fairness).
 Documents can be kept secret.
 Error free result.
 It can be used for various purposes. i.e. It can be
used in any type of work.
7
Negative Impact of Computer
 Highly expensive.
 Data piracy ( illegal copying, distribution, or use
of software/data).
 Increased Unemployment.
 Huge data and information can be lost
sometimes.
 Fast changing computer technology.
 Service distribution(media content such as audio,
video, software ,shared resources…..)
 Illiteracy( lack of basic computer knowledge) of
computing and computers.
8
Computers have both positive and negative
impact in our society. But the use of computer is
increasing
day-by-day.
9
Computer Ethics
 Computer technology advances from time to time and most probably
will keep advancing in the future. With that, computer ethics will also
keep growing and changing to meet the need of the technology.
 Ethics means a set of moral principles that govern the behaviour
of a group or individual.
 Therefore, computer ethics is set of moral principles that
regulate the use of computers. Some common issues of computer
ethics include intellectual property rights (such as copyrighted
electronic content), privacy concerns, and how computers affect
society.
 Hence, generally, computer ethics is needed to avoid the improper
usage of computer technology and bring justice.
10
Cont.…
 For example,
 while it is easy to duplicate copyrighted electronic
(or digital) content, computer ethics would suggest
that it is wrong to do so without the author's
approval.
 And while it may be possible to access someone's
personal information on a computer system,
computer ethics would advise that such an action is
unethical.
11
Objectives of computer ethics
 To ensure the privacy and safety of the computer users.
 To helps people use the computer in the right ways.
 To guarantee that the works that done by someone did not
declare by other people.
12
Importance of computer ethics
 To protect personal & commercial information such as login & password
info, credit card and account information and government and
commercial databases. It also controls unwanted internet mail and ads
(Spam).
 To control plagiarism, student identity fraud, and the use of copyrighted
material, etc.
 To make ICT (information and communication technologies)available
and accessible to all peoples, including the disabled and the
deprived. Accessibility needs to be kept in mind during curriculum
design (in educational contexts), in order to maximize the capabilities of
the technology.
 To suppress dishonest business practices and to protect and
encourage fair competition.
 To promote moral and social values in society.
13
Problems…
There are several types of activities that against the computer ethics:
1. Stealing funds via computers.
- The one who did this must be very intelligent to manipulate the
computer system and to access into the system.
2. Unauthorized computer entry.
- The perpetrator will steal a company's trade secrets and data and then sell it
to the competitors. This activity involves both property and privacy.
3. Hacking.
- Any computer-related activity which is not sanctioned or approved by owner of
a system or networks.
4. Plagiarism.
- Duplicating copyrighted content without the author's approval and take any
source without credit to the original author.
5. Phishing scam
- Phishing scams are attempts by scammers to trick people into giving out
personal information such as bank account number, passwords and credit card
numbers.
14
.
How to avoid Phishing Scams
 Keep Informed About Phishing Techniques – New phishing scams
are being developed all the time. Without staying on top of these new
phishing techniques, you could inadvertently fall prey to one. Keep
your eyes peeled for news about new phishing scams.
 Think Before You Click! – It’s fine to click on links when you’re on
trusted sites. Clicking on links that appear in random emails and
instant messages, may lead you where they are supposed to lead?
E.g. A phishing email.
 Install an Anti-Phishing Toolbar – Most popular Internet browsers
can be customized with anti-phishing toolbars. Such toolbars run
quick checks on the sites that you are visiting and compare them to
lists of known phishing sites. If you stumble upon a malicious site, the
toolbar will alert you about it.
15
 Verify a Site’s Security – It’s natural to be a little worry about supplying
sensitive financial information online. As long as you are on a secure
website, however, you shouldn’t run into any trouble. Before submitting any
information, make sure the site’s URL begins with “https” and there should
be a closed lock icon near the address bar. Check for the site’s security
certificate as well. If you get a message stating a certain website may
contain malicious files, do not open the website
 Check Your Online Accounts Regularly – If you don’t visit an online account
for a while, someone could be having a field day with it. Even if you don’t
technically need to, check in with each of your online accounts on a regular basis.
Get into the habit of changing your passwords regularly too.. Get monthly
statements for your financial accounts and check each and every entry carefully to
ensure no fraudulent transactions have been made without your knowledge.
 Keep Your Browser Up to Date – Security patches are released for
popular browsers all the time. They are released in response to the security
loopholes that phishers and other hackers inevitably discover and exploit. If
you typically ignore messages about updating your browsers, stop. The
minute an update is available, download and install it.
16
 Use Firewalls – High-quality firewalls act as buffers between you, your
computer and outside intruders. You should use two different kinds: a desktop
firewall and a network firewall. The first option is a type of software, and the
second option is a type of hardware. When used together, they drastically
reduce the odds of hackers and phishers infiltrating your computer or your
network.
 Be Wary of Pop-Ups –they are phishing attempts. Many popular browsers
allow you to block pop-ups; you can allow them on a case-by-case basis. If
one manages to slip through the cracks, don’t click on the “cancel” button;
such buttons often lead to phishing sites. Instead, click the small “x” in the
upper corner of the window.
 Use Antivirus Software –Antivirus software scans every file which comes
through the Internet to your computer. It helps to prevent damage to your
system. You don’t have to live in fear of phishing scams.
 By keeping the preceding tips in mind, you should be able to enjoy a worry-free
online experience.
 Remember there is no single fool-proof way to avoid phishing attacks,
17
 THE END
18

Mais conteúdo relacionado

Mais procurados

Introduction to microsoft office
Introduction to microsoft officeIntroduction to microsoft office
Introduction to microsoft officeTimesRide
 
Assignment on Input and output devices
Assignment on Input and output devicesAssignment on Input and output devices
Assignment on Input and output devicesMahmudur Rahman Shojib
 
Chapter 1 Introduction To Computers
Chapter 1 Introduction To ComputersChapter 1 Introduction To Computers
Chapter 1 Introduction To Computersnorzaini
 
Introduction To Computer 1
Introduction To Computer  1Introduction To Computer  1
Introduction To Computer 1Amit Chandra
 
Postive & Nagetive impacts & Applications of computer
Postive & Nagetive impacts & Applications of computerPostive & Nagetive impacts & Applications of computer
Postive & Nagetive impacts & Applications of computermanju rani
 
Impact of ict on society
Impact of ict on societyImpact of ict on society
Impact of ict on societyAMOSOGAGAH
 
computers in our everyday lives
computers in our everyday livescomputers in our everyday lives
computers in our everyday livesKeitumetse Mohale
 
Central Processing Unit
Central Processing UnitCentral Processing Unit
Central Processing UnitJan Ralph
 
Classification of computer
Classification of computerClassification of computer
Classification of computerjoy grace bagui
 
APPLICATIONS OF COMPUTER
APPLICATIONS OF COMPUTERAPPLICATIONS OF COMPUTER
APPLICATIONS OF COMPUTERArpita Singh
 
Advantages of disadvantages of using the computer
Advantages of disadvantages of using the computerAdvantages of disadvantages of using the computer
Advantages of disadvantages of using the computerMissNDuncan
 
Input and Output Devices.
Input and Output Devices.Input and Output Devices.
Input and Output Devices.Varun Gupta
 

Mais procurados (20)

Introduction to microsoft office
Introduction to microsoft officeIntroduction to microsoft office
Introduction to microsoft office
 
Assignment on Input and output devices
Assignment on Input and output devicesAssignment on Input and output devices
Assignment on Input and output devices
 
Chapter 1 Introduction To Computers
Chapter 1 Introduction To ComputersChapter 1 Introduction To Computers
Chapter 1 Introduction To Computers
 
Types of Computers
Types of ComputersTypes of Computers
Types of Computers
 
Introduction To Computer 1
Introduction To Computer  1Introduction To Computer  1
Introduction To Computer 1
 
Computer hardware and its components
Computer hardware and its componentsComputer hardware and its components
Computer hardware and its components
 
Postive & Nagetive impacts & Applications of computer
Postive & Nagetive impacts & Applications of computerPostive & Nagetive impacts & Applications of computer
Postive & Nagetive impacts & Applications of computer
 
Why we use computer and need it
Why we use computer and need itWhy we use computer and need it
Why we use computer and need it
 
Computer Software & its Types
Computer Software & its Types Computer Software & its Types
Computer Software & its Types
 
Computer and its types
Computer and its typesComputer and its types
Computer and its types
 
Impact of ict on society
Impact of ict on societyImpact of ict on society
Impact of ict on society
 
Uses of computer
Uses of computer Uses of computer
Uses of computer
 
computers in our everyday lives
computers in our everyday livescomputers in our everyday lives
computers in our everyday lives
 
Central Processing Unit
Central Processing UnitCentral Processing Unit
Central Processing Unit
 
Motherboard ppt
Motherboard pptMotherboard ppt
Motherboard ppt
 
Classification of computer
Classification of computerClassification of computer
Classification of computer
 
APPLICATIONS OF COMPUTER
APPLICATIONS OF COMPUTERAPPLICATIONS OF COMPUTER
APPLICATIONS OF COMPUTER
 
Advantages of disadvantages of using the computer
Advantages of disadvantages of using the computerAdvantages of disadvantages of using the computer
Advantages of disadvantages of using the computer
 
Introduction to the internet
Introduction to the internetIntroduction to the internet
Introduction to the internet
 
Input and Output Devices.
Input and Output Devices.Input and Output Devices.
Input and Output Devices.
 

Semelhante a computer and society impact of Computer in society

chapter 5.pptxggggggggggggggggggggggggggg
chapter 5.pptxgggggggggggggggggggggggggggchapter 5.pptxggggggggggggggggggggggggggg
chapter 5.pptxgggggggggggggggggggggggggggadabotor7
 
computer and security
computer and security computer and security
computer and security Sumama Shakir
 
Computer ethics cyber security and technology of it
Computer ethics cyber security and technology of itComputer ethics cyber security and technology of it
Computer ethics cyber security and technology of itsr24production
 
How to stay safe online
How to stay safe onlineHow to stay safe online
How to stay safe onlineHadilAlHaj
 
Business ethics ppt
Business ethics pptBusiness ethics ppt
Business ethics pptWulax37
 
Computer Ethics
Computer EthicsComputer Ethics
Computer EthicsRamki M
 
First Union Bank Report
First Union Bank ReportFirst Union Bank Report
First Union Bank ReportYogesh Kumar
 
Internet Security
Internet SecurityInternet Security
Internet SecurityParv Poddar
 
Target Data Breach Case Study 10242014
Target Data Breach Case Study 10242014Target Data Breach Case Study 10242014
Target Data Breach Case Study 10242014Joseph White MPA CPM
 
What is Network Security?
What is Network Security?What is Network Security?
What is Network Security?Faith Zeller
 
Ethical and security issues on MIS inte 322 assignment.docx
Ethical and security issues on MIS inte 322 assignment.docxEthical and security issues on MIS inte 322 assignment.docx
Ethical and security issues on MIS inte 322 assignment.docxGogoOmolloFrancis
 

Semelhante a computer and society impact of Computer in society (20)

chapter 5.pptxggggggggggggggggggggggggggg
chapter 5.pptxgggggggggggggggggggggggggggchapter 5.pptxggggggggggggggggggggggggggg
chapter 5.pptxggggggggggggggggggggggggggg
 
computer and security
computer and security computer and security
computer and security
 
Computer ethics cyber security and technology of it
Computer ethics cyber security and technology of itComputer ethics cyber security and technology of it
Computer ethics cyber security and technology of it
 
Corporate ethics
Corporate ethicsCorporate ethics
Corporate ethics
 
How to stay safe online
How to stay safe onlineHow to stay safe online
How to stay safe online
 
COMPUTER ETHICS.pptx
COMPUTER ETHICS.pptxCOMPUTER ETHICS.pptx
COMPUTER ETHICS.pptx
 
Business ethics ppt
Business ethics pptBusiness ethics ppt
Business ethics ppt
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
First Union Bank Report
First Union Bank ReportFirst Union Bank Report
First Union Bank Report
 
Computer
ComputerComputer
Computer
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
 
Target Data Breach Case Study 10242014
Target Data Breach Case Study 10242014Target Data Breach Case Study 10242014
Target Data Breach Case Study 10242014
 
Cyber Laws
Cyber LawsCyber Laws
Cyber Laws
 
Shailendra Pandey.ppt
Shailendra Pandey.pptShailendra Pandey.ppt
Shailendra Pandey.ppt
 
What is Network Security?
What is Network Security?What is Network Security?
What is Network Security?
 
Nfwordle
NfwordleNfwordle
Nfwordle
 
Hamza
HamzaHamza
Hamza
 
Ethical and security issues on MIS inte 322 assignment.docx
Ethical and security issues on MIS inte 322 assignment.docxEthical and security issues on MIS inte 322 assignment.docx
Ethical and security issues on MIS inte 322 assignment.docx
 
Cyberattacks.pptx
Cyberattacks.pptxCyberattacks.pptx
Cyberattacks.pptx
 

Mais de Sumama Shakir

Chemistry Short Question Notes 9th Exercise full Book
Chemistry Short Question Notes 9th Exercise full BookChemistry Short Question Notes 9th Exercise full Book
Chemistry Short Question Notes 9th Exercise full BookSumama Shakir
 
Chemistry Short Question Notes 9th Exercise full Book
Chemistry Short Question Notes 9th Exercise full BookChemistry Short Question Notes 9th Exercise full Book
Chemistry Short Question Notes 9th Exercise full BookSumama Shakir
 
9th Chemistry Numericals 1st Chapter
9th Chemistry Numericals 1st Chapter9th Chemistry Numericals 1st Chapter
9th Chemistry Numericals 1st ChapterSumama Shakir
 
Chemistry 10th Urdu medium Notes Solved
Chemistry 10th Urdu medium Notes SolvedChemistry 10th Urdu medium Notes Solved
Chemistry 10th Urdu medium Notes SolvedSumama Shakir
 
Chemistry 9th Class Test Yourself Full Book
Chemistry 9th Class Test Yourself Full Book Chemistry 9th Class Test Yourself Full Book
Chemistry 9th Class Test Yourself Full Book Sumama Shakir
 
10th Class Chemistry Urdu Medium Full Book Exercise Short Answers
10th Class Chemistry  Urdu Medium Full Book Exercise Short Answers10th Class Chemistry  Urdu Medium Full Book Exercise Short Answers
10th Class Chemistry Urdu Medium Full Book Exercise Short AnswersSumama Shakir
 
Chemistry 10th in English medium,This book is by Punjab Curriculum and Textbo...
Chemistry 10th in English medium,This book is by Punjab Curriculum and Textbo...Chemistry 10th in English medium,This book is by Punjab Curriculum and Textbo...
Chemistry 10th in English medium,This book is by Punjab Curriculum and Textbo...Sumama Shakir
 
Chemistry 9Th Book, PUNJAB TEXT BOOK
Chemistry 9Th Book, PUNJAB TEXT BOOK Chemistry 9Th Book, PUNJAB TEXT BOOK
Chemistry 9Th Book, PUNJAB TEXT BOOK Sumama Shakir
 
Nitric acid preparation & uses
Nitric acid preparation &  usesNitric acid preparation &  uses
Nitric acid preparation & usesSumama Shakir
 
Nitric acid Preparation & Uses
Nitric acid Preparation & UsesNitric acid Preparation & Uses
Nitric acid Preparation & UsesSumama Shakir
 
Nitric acid Preparation & Uses
Nitric acid Preparation & UsesNitric acid Preparation & Uses
Nitric acid Preparation & UsesSumama Shakir
 
Nitric acid Preparation & Uses
Nitric acid Preparation & UsesNitric acid Preparation & Uses
Nitric acid Preparation & UsesSumama Shakir
 
Nitric acid Preparation & Uses
Nitric acid Preparation & UsesNitric acid Preparation & Uses
Nitric acid Preparation & UsesSumama Shakir
 
Nitric acid Preparation & Uses Raw materials, Flow sheet diagram unit operat...
Nitric acid Preparation & Uses Raw materials, Flow sheet diagram unit operat...Nitric acid Preparation & Uses Raw materials, Flow sheet diagram unit operat...
Nitric acid Preparation & Uses Raw materials, Flow sheet diagram unit operat...Sumama Shakir
 
Nitric acid Preparation & Uses Raw materials, Flow sheet diagram unit operat...
Nitric acid Preparation & Uses Raw materials, Flow sheet diagram unit operat...Nitric acid Preparation & Uses Raw materials, Flow sheet diagram unit operat...
Nitric acid Preparation & Uses Raw materials, Flow sheet diagram unit operat...Sumama Shakir
 
Nitric acid Preparation & Uses
Nitric acid Preparation & UsesNitric acid Preparation & Uses
Nitric acid Preparation & UsesSumama Shakir
 
preparation and uses of nitric acid
preparation and uses of nitric acid preparation and uses of nitric acid
preparation and uses of nitric acid Sumama Shakir
 
Computer and their Uses types of computer
Computer and their Uses types of computer Computer and their Uses types of computer
Computer and their Uses types of computer Sumama Shakir
 
What is Information techology
What is Information techology What is Information techology
What is Information techology Sumama Shakir
 

Mais de Sumama Shakir (20)

Chemistry Short Question Notes 9th Exercise full Book
Chemistry Short Question Notes 9th Exercise full BookChemistry Short Question Notes 9th Exercise full Book
Chemistry Short Question Notes 9th Exercise full Book
 
Chemistry Short Question Notes 9th Exercise full Book
Chemistry Short Question Notes 9th Exercise full BookChemistry Short Question Notes 9th Exercise full Book
Chemistry Short Question Notes 9th Exercise full Book
 
9th Chemistry Numericals 1st Chapter
9th Chemistry Numericals 1st Chapter9th Chemistry Numericals 1st Chapter
9th Chemistry Numericals 1st Chapter
 
Chemistry 10th Urdu medium Notes Solved
Chemistry 10th Urdu medium Notes SolvedChemistry 10th Urdu medium Notes Solved
Chemistry 10th Urdu medium Notes Solved
 
Chemistry 9th Class Test Yourself Full Book
Chemistry 9th Class Test Yourself Full Book Chemistry 9th Class Test Yourself Full Book
Chemistry 9th Class Test Yourself Full Book
 
10th Class Chemistry Urdu Medium Full Book Exercise Short Answers
10th Class Chemistry  Urdu Medium Full Book Exercise Short Answers10th Class Chemistry  Urdu Medium Full Book Exercise Short Answers
10th Class Chemistry Urdu Medium Full Book Exercise Short Answers
 
Chemistry 10th in English medium,This book is by Punjab Curriculum and Textbo...
Chemistry 10th in English medium,This book is by Punjab Curriculum and Textbo...Chemistry 10th in English medium,This book is by Punjab Curriculum and Textbo...
Chemistry 10th in English medium,This book is by Punjab Curriculum and Textbo...
 
Chemistry 9Th Book, PUNJAB TEXT BOOK
Chemistry 9Th Book, PUNJAB TEXT BOOK Chemistry 9Th Book, PUNJAB TEXT BOOK
Chemistry 9Th Book, PUNJAB TEXT BOOK
 
Nitric acid preparation & uses
Nitric acid preparation &  usesNitric acid preparation &  uses
Nitric acid preparation & uses
 
Nitric acid Preparation & Uses
Nitric acid Preparation & UsesNitric acid Preparation & Uses
Nitric acid Preparation & Uses
 
Nitric acid Preparation & Uses
Nitric acid Preparation & UsesNitric acid Preparation & Uses
Nitric acid Preparation & Uses
 
Nitric acid Preparation & Uses
Nitric acid Preparation & UsesNitric acid Preparation & Uses
Nitric acid Preparation & Uses
 
Nitric acid Preparation & Uses
Nitric acid Preparation & UsesNitric acid Preparation & Uses
Nitric acid Preparation & Uses
 
Nitric acid Preparation & Uses Raw materials, Flow sheet diagram unit operat...
Nitric acid Preparation & Uses Raw materials, Flow sheet diagram unit operat...Nitric acid Preparation & Uses Raw materials, Flow sheet diagram unit operat...
Nitric acid Preparation & Uses Raw materials, Flow sheet diagram unit operat...
 
Nitric acid Preparation & Uses Raw materials, Flow sheet diagram unit operat...
Nitric acid Preparation & Uses Raw materials, Flow sheet diagram unit operat...Nitric acid Preparation & Uses Raw materials, Flow sheet diagram unit operat...
Nitric acid Preparation & Uses Raw materials, Flow sheet diagram unit operat...
 
Nitric acid Preparation & Uses
Nitric acid Preparation & UsesNitric acid Preparation & Uses
Nitric acid Preparation & Uses
 
preparation and uses of nitric acid
preparation and uses of nitric acid preparation and uses of nitric acid
preparation and uses of nitric acid
 
Lecture27
Lecture27Lecture27
Lecture27
 
Computer and their Uses types of computer
Computer and their Uses types of computer Computer and their Uses types of computer
Computer and their Uses types of computer
 
What is Information techology
What is Information techology What is Information techology
What is Information techology
 

Último

Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxDr. Sarita Anand
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptxMaritesTamaniVerdade
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfNirmal Dwivedi
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Pooja Bhuva
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Association for Project Management
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfSherif Taha
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Pooja Bhuva
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024Elizabeth Walsh
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentationcamerronhm
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxEsquimalt MFRC
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - Englishneillewis46
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...Nguyen Thanh Tu Collection
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSCeline George
 

Último (20)

Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 

computer and society impact of Computer in society

  • 2. Computer and Society  Impact of Computer in Society  Computer Ethics 2
  • 3. Computer and Society  Everyone knows that this is the age of computer and majority of people are using computer.  Development of science and technology has direct effect on our daily life as well as in our social life.  Computer technology has made communication possible from one part of the world to the other in seconds.  They can see the transactions in one part of the world while staying in the other part.  Computer development is one of the greatest scientific achievements of the 20 th century.  Computers are used in various fields as well as in teaching and learning. 3
  • 4. Major computer application fields  An aid to management: The computer can also be used as a management tool to assist in solving business problems.  Banking: Branches are equipped with terminals giving them an online accounting facility and enabling them to information as such things as current balances, deposits, overdrafts and interest charges.  Industrial Application: In industry, production may be planned, coordinated and controlled with the aid of a computer.  Engineering Design: Computer help in calculating that all the parts of a proposed design are satisfactory and also assist in the designing.  and for payroll and also for check-up and treatment of diseases. 4
  • 5. Cont.…  Meteorology: Data is recorded at different levels of atmosphere at different places, using remote sensors carried on a satellite.  Air Travel: Small computers are installed as a part of the plane's equipment.  Road Traffic Control: Computers assist with the control of traffic lights.  Telephones: Computerized telephone exchanges handle an ever increasing volume of calls very efficiently.  Medicine: Computers are widely used in hospitals for such task as maintaining drugs, surgical equipment  In addition computers are also used for recording and film studios, research, military, etc. 5
  • 6.  Computers have both positive and negative impact in our daily life as well as in our social life.  But the gross development of the nation is faster with the application of computers in industries and education. 6
  • 7. Positive Impact of Computer  The work can be done in very less time.  More information can be stored in small space.  Multitasking and multiprocessing capabilities of data.  Easy to access data.  Impartiality (equal treatment of all rivals or disputants; fairness).  Documents can be kept secret.  Error free result.  It can be used for various purposes. i.e. It can be used in any type of work. 7
  • 8. Negative Impact of Computer  Highly expensive.  Data piracy ( illegal copying, distribution, or use of software/data).  Increased Unemployment.  Huge data and information can be lost sometimes.  Fast changing computer technology.  Service distribution(media content such as audio, video, software ,shared resources…..)  Illiteracy( lack of basic computer knowledge) of computing and computers. 8
  • 9. Computers have both positive and negative impact in our society. But the use of computer is increasing day-by-day. 9
  • 10. Computer Ethics  Computer technology advances from time to time and most probably will keep advancing in the future. With that, computer ethics will also keep growing and changing to meet the need of the technology.  Ethics means a set of moral principles that govern the behaviour of a group or individual.  Therefore, computer ethics is set of moral principles that regulate the use of computers. Some common issues of computer ethics include intellectual property rights (such as copyrighted electronic content), privacy concerns, and how computers affect society.  Hence, generally, computer ethics is needed to avoid the improper usage of computer technology and bring justice. 10
  • 11. Cont.…  For example,  while it is easy to duplicate copyrighted electronic (or digital) content, computer ethics would suggest that it is wrong to do so without the author's approval.  And while it may be possible to access someone's personal information on a computer system, computer ethics would advise that such an action is unethical. 11
  • 12. Objectives of computer ethics  To ensure the privacy and safety of the computer users.  To helps people use the computer in the right ways.  To guarantee that the works that done by someone did not declare by other people. 12
  • 13. Importance of computer ethics  To protect personal & commercial information such as login & password info, credit card and account information and government and commercial databases. It also controls unwanted internet mail and ads (Spam).  To control plagiarism, student identity fraud, and the use of copyrighted material, etc.  To make ICT (information and communication technologies)available and accessible to all peoples, including the disabled and the deprived. Accessibility needs to be kept in mind during curriculum design (in educational contexts), in order to maximize the capabilities of the technology.  To suppress dishonest business practices and to protect and encourage fair competition.  To promote moral and social values in society. 13
  • 14. Problems… There are several types of activities that against the computer ethics: 1. Stealing funds via computers. - The one who did this must be very intelligent to manipulate the computer system and to access into the system. 2. Unauthorized computer entry. - The perpetrator will steal a company's trade secrets and data and then sell it to the competitors. This activity involves both property and privacy. 3. Hacking. - Any computer-related activity which is not sanctioned or approved by owner of a system or networks. 4. Plagiarism. - Duplicating copyrighted content without the author's approval and take any source without credit to the original author. 5. Phishing scam - Phishing scams are attempts by scammers to trick people into giving out personal information such as bank account number, passwords and credit card numbers. 14
  • 15. . How to avoid Phishing Scams  Keep Informed About Phishing Techniques – New phishing scams are being developed all the time. Without staying on top of these new phishing techniques, you could inadvertently fall prey to one. Keep your eyes peeled for news about new phishing scams.  Think Before You Click! – It’s fine to click on links when you’re on trusted sites. Clicking on links that appear in random emails and instant messages, may lead you where they are supposed to lead? E.g. A phishing email.  Install an Anti-Phishing Toolbar – Most popular Internet browsers can be customized with anti-phishing toolbars. Such toolbars run quick checks on the sites that you are visiting and compare them to lists of known phishing sites. If you stumble upon a malicious site, the toolbar will alert you about it. 15
  • 16.  Verify a Site’s Security – It’s natural to be a little worry about supplying sensitive financial information online. As long as you are on a secure website, however, you shouldn’t run into any trouble. Before submitting any information, make sure the site’s URL begins with “https” and there should be a closed lock icon near the address bar. Check for the site’s security certificate as well. If you get a message stating a certain website may contain malicious files, do not open the website  Check Your Online Accounts Regularly – If you don’t visit an online account for a while, someone could be having a field day with it. Even if you don’t technically need to, check in with each of your online accounts on a regular basis. Get into the habit of changing your passwords regularly too.. Get monthly statements for your financial accounts and check each and every entry carefully to ensure no fraudulent transactions have been made without your knowledge.  Keep Your Browser Up to Date – Security patches are released for popular browsers all the time. They are released in response to the security loopholes that phishers and other hackers inevitably discover and exploit. If you typically ignore messages about updating your browsers, stop. The minute an update is available, download and install it. 16
  • 17.  Use Firewalls – High-quality firewalls act as buffers between you, your computer and outside intruders. You should use two different kinds: a desktop firewall and a network firewall. The first option is a type of software, and the second option is a type of hardware. When used together, they drastically reduce the odds of hackers and phishers infiltrating your computer or your network.  Be Wary of Pop-Ups –they are phishing attempts. Many popular browsers allow you to block pop-ups; you can allow them on a case-by-case basis. If one manages to slip through the cracks, don’t click on the “cancel” button; such buttons often lead to phishing sites. Instead, click the small “x” in the upper corner of the window.  Use Antivirus Software –Antivirus software scans every file which comes through the Internet to your computer. It helps to prevent damage to your system. You don’t have to live in fear of phishing scams.  By keeping the preceding tips in mind, you should be able to enjoy a worry-free online experience.  Remember there is no single fool-proof way to avoid phishing attacks, 17