Home COMPUTER STUDIES COMPUTER FORM 3 TOPIC 1: IMPACT OF INFORMATION AND COMMUNICATION TECHNOLOGY (ICT) ON THE SOCIETY...

TOPIC 1: IMPACT OF INFORMATION AND COMMUNICATION TECHNOLOGY (ICT) ON THE SOCIETY | ICS FORM 3

858
37
COMPUTER STUDY NOTES OLEVEL FORM 1 - 4 IMPACT OF INFORMATION AND COMMUNICATION TECHNOLOGY (ICT) ON THE SOCIETY TOPIC: 3 DATABASE AS INFORMATION SYSTEM | ICS FORM 3 COMPUTER STUDY NOTES ICS FORM THREE

TOPIC 1: IMPACT OF INFORMATION AND COMMUNICATION TECHNOLOGY (ICT) ON THE SOCIETY | ICS FORM 3

Introduction

Before we can know about all the impact of information and communication technology, it is essential that we know what information and communication technology is exactly, and its important role in our daily lives.

Today information and communication technology involves more than just computer literacy; it also takes into account how computers work and how these computers can further be used not only for information processing but also for communications and problem solving tasks as well.

Our world today has changed a great deal with the aid of information and communication technology. Things that were once done manually or by hand have now become computerized operating systems, which simply require a single click of a mouse to get a task completed.

With the help of ICT we are not only able to stream line our business processes but we are also able to get constant information in ‘real time’ that is up to the minute and up to date.

The significance of ICT can be seen from the fact that it has penetrated almost every aspect of our daily lives from business to leisure and even society. Today personal computers (PCs), cell phones, TV, radio, fax machines, pagers, email and internet have all not only become an integral part of our very culture but also play an essential role in our day to day activities.

With such a wide scope, let us have a definition of information and communication technologies.

Definition: Information and Communication Technologies can be defined as the generic term used to express the convergence of information technology, broadcasting and communications, e.g. Internet.

FORM THREE COMPUTER STUDIES TOPICS

TOPIC 1: IMPACT OF INFORMATION AND COMMUNICATION TTECHNOLOGY (ICT) ON THE SOCIETY
TOPIC 2: WEB DEVELOPMENT
TOPIC 3: DATABASE AS INFORMATION SYSTEM

IMPACT OF ICT ON THE SOCIETY (Some advantages)

 (a) The role of ICT in:

Education:

▪ Either Students or teachers records processing and keeping.

▪ As a computer aided instruction (CAI) and computer aided learning (CAL),

▪ Used to access learning materials i.e. searching in internet.

▪ Help in the development of open universities (distance learning)

▪ As a research tool e.g. to analyze data from experiment.

▪ To assist education management

Industry and Engineering:

▪ To design drawings for products using Computer Aided Design (CAD) programs e.g. airplanes, bridges, cars, buildings and electronic circuit boards.

▪ To manufacture products by using Computer Aided Manufacture (CAM).

▪ To plan and control major project.

▪ To simulate – to predict in a real life situation from a model situation e.g. timing of traffic lights.

▪ To control some operations in automobiles e.g. mixed of fuel and air enter the engine

▪ A branch of a computer science called artificial intelligence uses programs that help solve problems by applying human knowledge and experience e.g. in medicine and law.

Banking and Business:

▪ To allow banker clerk and custom to find bank balances in an account

▪ To help bankers to record money paid in and out.

▪ To allow people to use automatic teller machine (ATM) in cash withdraw and transfer of funds between accounts.

▪ To keep track of current prices of market stocks, bounds currency.

▪ Creates an effective way of producing documents e.g. reports, brochures and cards

Military uses:

▪ It can be used for planning and decision making.

▪ It can be used for planners to stimulate wars.

▪ It can be used to guide modern weapons such as missiles and field artillery.

In a Government:

▪ It can be used for internal revenue services e.g. to provide reports for tax purposes.

▪ It can be used for planning analysis, forecast, sampling, predictions etc.

▪ It can be used for weather forecast

▪ It can be used for law enforcement.

In Communication: (Telecommunication)

▪Communication has also become cheaper, quicker, and more efficient. We can now communicate with anyone around the globe by simply text messaging them or sending them an email for an almost instantaneous response. The internet has also opened up face to face direct communication from different parts of the world thanks to the helps of video conferencing.

▪ Telephone switching (automatic routing and connections of calls) transmission of computer data via network and electronic mail.

▪Transportations connections; time table, scheduling times, road, airways, railways etc.

In an entertainment:

▪ To play Games

▪ To watch moves

▪ Chatting through E-mail

▪ Listening from music

▪ Reading

Management:

▪ Files management

▪ Office record keeping

Cost effectiveness:

Information and communication technology has helped to computerize the business process thus streamlining businesses to make them extremely cost effective money making machines.

This in turn increases productivity which ultimately gives rise to profits that means better pay and less exhausting working conditions. Although the cost factor is still a challenge in general, the relative cost of ICT has greatly fallen over the past years and it will continue to fall.

Creation of new jobs:

Probably the best advantage of information and communication technology is the creation of new and interesting jobs. Computer programmers, Systems analyzers, Hardware and Software developers, radio / TV presenter, Phone shops, ICT technician and Web designers are just some of the many new employment opportunities created with the help of ICT.

More time:

ICT has made it possible for businesses to be open 24hr all over the globe. This means that a business can be open anytime anywhere, making purchases from different countries easier and more convenient.

It also means that you can have your goods delivered right to your doorstep without having to move a single muscle. Not yet full practice in Tanzania.

Speed:

Simultaneous information in writing, sound and picture can be exchanged within a fraction of seconds around the clock. Moreover, the internet allows real time ‘many to many’ interactions.

Integration:

ICT allow for the integration of different types of media. For instance, the combination of a local radio with the Internet allow access not only to much wider range of information sources but also the efficient exchange of broadcasting modules, making e.g. censorship (restriction) more difficult.

(b) The role of ICT in making awareness in: Gender, HIV / AIDS, Drug / drug Abuse and Corruption:

The role of ICT is to spread information.

Information about Gender, HIV / AIDS, Drug / drug Abuse and Corruption is dispread and received all over the world through communication media such as TV, Radio, CD-ROMs, News Papers and Computer internet etc.

Gender sensitive:

∙ Girls and boys have equal right to join the school.

∙ Woman have right to own land

∙ Violate to women

∙ Biasness

∙ Rap

HIV transmission ways:

∙ Sexual intercourse

∙ Blood transmission (unsafe blood)

∙ Untreated exchanging injection

∙ Shape objects

HIV precaution ways:

∙ To stop sex

∙ To have only one lover

∙ To use a condom

HIV / AIDS victims:

∙ To attend counseling and guidance to professional counselor

∙ To attend treatment

∙ Not to isolate them (stigmatization)

∙ To provide them with a balance diet

∙ To visit their home, to comfort and show them love

Drug / drug Abuse:

∙ Mental disturbance

∙ HIV transmission way

∙ Luck of education

Corruption:

To misuse the leadership power

To go against human rights

Globalization:

ICT has not only brought the world closer together, but it has allowed the world’s economy to become a single interdependent system. This means that we can not only share information quickly and efficiently, but we can also bring down barriers of linguistic and geographic boundaries.

The world has developed into a global village due to the help of information and communication technology allowing countries like Chile and Japan who are not only separated by distance but also by language to share ideas and information with each other.

Family life:

▪ Home budget

▪ Shopping timetable

▪ Home records keeping

▪ Reading news and stories

▪ Refreshment i.e. games and movies

Culture changes

Bridging the cultural gap (interactivity) – Information and communication technology has helped to bridge the cultural gap by helping people from different cultures to communicate with one another, and allow for the exchange of views and ideas (facilitate dialogue), thus increasing awareness and reducing prejudice. With ICT local radios can be much more interactive and run more economically than a decade ago.

Road safety (Transportation):

▪ Traffic control

▪ Driving simulators

▪ Reservation systems

▪ Are embedded in air traffic to provide efficiency in flying.

▪ Traffic signs and their interpretations

Some disadvantages of ICT include:

Unemployment:

While information and communication technology may have streamlined the business process it has also crated job redundancies, downsizing and outsourcing. This means that a lot of lower and middle level jobs have been done away with causing more people to become unemployed.

Privacy:

Though information and communication technology may have made communication quicker, easier and more convenient, it has also purchased along privacy issues. From cell phone signal interceptions to email hacking, people are now worried about their once private information becoming public knowledge.

Lack of job security:

Industry experts believe that the internet has made job security a big issue as since technology keeps on changing with each day. This means that one has to be in a constant learning mode, if he or she wishes for their job to be secure.

Dominant culture:

While information and communication technology may have made the world a global village, it has also contributed to one culture dominating another weaker one. For example it is now argued that US influences most young teenagers all over the world now in terms of act, dress and behave. Languages ​​too have become overshadowed, with English becoming the primary mode of communication for business and everything else.

Health risk (hazards):

∙ Eye strain; if you are looking at computer monitor for too long.

∙ Neck / back strain; this is caused by poor seating arrangement.

∙ Repetitive strain injury (RSI); this is from using a keyboard for too long.

∙ Fitness problems; from lack of exercise.

ICT are based on digital information held as 1s and 0s, and comprises the hardware (i.e. Computer set, Handset of Mobile phone), Software and Networks.

There are also other technology apart from digital, others include:

“Intermediate” technology, still based largely on analogy information held as electromagnetic waves such as radio, television and telephone.

“Literate” technology, based on information held as the written word such as books and newspapers

“Organic” technology, based solely on the human body such as brain and sound waves.

Therefore in building up the model of ICT, two separate elements have already been identified: The technology (1) and the information on which it operates (2). Other elements are IS (Information System- collection of hardware, software, people, procedures, and data) and Institutional and other influencing factors (e.g. Political, economic, socio-cultural, technical and legal).

ICT and Crimes:

Some criminal cases in ICT include:

✔ Viruses ’transmission

✔ Junk mail

Information security (Los of secrecy)

Computer Security

INTRODUCTION

Computer Security, techniques developed to safeguard information and information systems stored on computers. Potential threats include the destruction of computer hardware and software and the loss, modification, theft, unauthorized use, observation, or disclosure of computer data.

Computers and the information they contain are often considered confidential systems because their use is typically restricted to a limited number of users. This confidentiality can be compromised in a variety of ways. For example, computers and computer data can be harmed by people who spread computer viruses and worms.

A computer virus is a set of computer program instructions that attaches itself to programs in other computers. The viruses are often parts of documents that are transmitted as attachments to e-mail messages. A worm is similar to a virus but is a self-contained program that transports itself from one computer to another through networks. Thousands of viruses and worms exist and can quickly contaminate millions of computers.

People who intentionally create viruses are computer experts often known as hackers. Hackers also violate confidentiality by observing computer monitor screens and by impersonating authorized users of computers in order to gain access to the users ’computers. They invade computer databases to steal the identities of other people by obtaining private, identifying information about them.

Hackers also engage in software piracy and deface Web sites on the Internet. For example, they may insert malicious or unwanted messages on a Web site, or alter graphics on the site. They gain access to Web sites by impersonating Web site managers.

Malicious hackers are increasingly developing powerful software crime tools such as automatic computer virus generators, Internet eavesdropping sniffers, password guessers, vulnerability testers, and computer service saturators. For example, an Internet eavesdropping sniffer intercepts Internet messages sent to other computers.

A password guesser tries millions of combinations of characters in an effort to guess a computer’s password. Vulnerability testers look for software weaknesses. These crime tools are also valuable security tools used for testing the security of computers and networks.

An increasingly common hacker tool that has gained widespread public attention is the computer service saturator, used in denial-of-service attacks, which can shut down a selected or targeted computer on the Internet by bombarding the computer with more requests than it can handle. This tool first searches for vulnerable computers on the Internet where it can install its own software program. Once installed, the compromised computers act like “zombies” sending usage requests to the target computer. If thousands of computers become infected with the software, then all would be sending usage requests to the target computer, overwhelming its ability to handle the requests for service.

A variety of simple techniques can help prevent computer crimes, such as protecting computer screens from observation, keeping printed information and computers in locked facilities, backing up copies of data files and software, and clearing desktops of sensitive information and materials. Increasingly, however, more sophisticated methods are needed to prevent computer crimes. These include using encryption techniques, establishing software usage permissions, mandating passwords, and installing firewalls and intrusion detection systems. In addition, controls within application systems and disaster recovery plans are also necessary.

BACKUP

Storing backup copies of software and data and having backup computer and communication capabilities are important basic safeguards because the data can then be restored if it was altered or destroyed by a computer crime or accident.

Computer data should be backed up frequently and should be stored nearby in secure locations in case of damage at the primary site. Transporting sensitive data to storage locations should also be done securely.

ENCRYPTION

Another technique to protect confidential information is encryption. Computer users can scramble information to prevent unauthorized users from accessing it. Authorized users can unscramble the information when needed by using a secret code called a key. Without the key the scrambled information would be impossible or very difficult to unscramble. A more complex form of encryption uses two keys, called the public key and the private key, and a system of double encryption.

Each participant possesses a secret, private key and a public key that is known to potential recipients. Both keys are used to encrypt, and matching keys are used to decrypt the message. However, the advantage over the single-key method lies with the private keys, which are never shared and so cannot be intercepted. The public key verifies that the sender is the one who transmitted it. The keys are modified periodically, further hampering unauthorized unscrambling and making the encrypted information more difficult to decipher.

APPROVED USERS

Another technique to help prevent abuse and misuse of computer data is to limit the use of computers and data files to approved persons. Security software can verify the identity of computer users and limit their privileges to use, view, and alter files. The software also securely records their actions to establish accountability. Military organizations give access rights to classified, confidential, secret, or top-secret information according to the corresponding security clearance level of the user. Other types of organizations also classify information and specify different degrees of protection.

PASSWORDS

Smart Card

Smart cards, like this one for an employee of the Microsoft Corporation, are becoming increasingly common as security devices for accessing computer networks and corporate buildings. In addition to an identifying photograph, the smart card contains an embedded microchip on the reverse side that stores data about the user, including a password that changes periodically. This information is read by a device attached to a computer and ensures that only authorized persons can access a corporation’s internal computer network.

Kathleen Green

Passwords are confidential sequences of characters that allow approved persons to make use of specified computers, software, or information. To be effective, passwords must be difficult to guess and should not be found in dictionaries. Effective passwords contain a variety of characters and symbols that are not part of the alphabet. To thwart imposters, computer systems usually limit the number of attempts and restrict the time it takes to enter the correct password.

A more secure method is to require possession and use of tamper-resistant plastic cards with microprocessor chips, known as “smart cards,” which contain a stored password that automatically changes after each use. When a user logs on, the computer reads the card’s password, as well as another password entered by the user, and matches these two respectively to an identical card password generated by the computer and the user’s password stored in the computer in encrypted form. Use of passwords and ‘smart cards’ is beginning to be reinforced by biometrics, identification methods that use unique personal characteristics, such as fingerprints, retinal patterns, facial characteristics, or voice recordings.

FIREWALLS

Computers connected to communication networks, such as the Internet, are particularly vulnerable to electronic attack because so many people have access to them. These computers can be protected by using firewall computers or software placed between the networked computers and the network.

The firewall examines, filters, and reports on all information passing through the network to ensure its appropriateness. These functions help prevent saturation of input capabilities that otherwise might deny deny to legitimate users, and they ensure that information received from an outside source is expected and does not contain computer viruses.

INTRUSION DETECTION SYSTEMS

Security software called intrusion detection systems may be used in computers to detect unusual and suspicious activity and, in some cases, stop a variety of harmful actions by authorized or unauthorized persons. Abuse and misuse of sensitive system and application programs and data such as password, inventory, financial, engineering, and personnel files can be detected by these systems.

APPLICATION SAFEGUARDS

The most serious threats to the integrity and authenticity of computer information come from those who have been entrusted with usage privileges and yet commit computer fraud. For example, authorized persons may secretly transfer money in financial networks, alter credit histories, sabotage information, or commit bill payment or payroll fraud. Modifying, removing, or misrepresenting existing data threatens the integrity and authenticity of computer information.

For example, omitting sections of a bad credit history so that only the good credit history remains violates the integrity of the document. Entering false data to complete a fraudulent transfer or withdrawal of money violates the authenticity of banking information. These crimes can be prevented by using a variety of techniques. One such technique is check summing. Checksumming sums the numerically coded word contents of a file before and after it is used.

If the sums are different, then the file has been altered. Other techniques include authenticating the sources of messages, confirming transactions with those who initiate them, segregating and limiting job assignments to make it necessary for more than one person to be involved in committing a crime, and limiting the amount of money that can be transferred through a computer.

DISASTER RECOVERY PLANS

Organizations and businesses that rely on computers need to institute disaster recovery plans that are periodically tested and upgraded. This is because computers and storage components such as diskettes or hard disks are easy to damage. A computer’s memory can be erased or flooding, fire, or other forms of destruction can damage the computer’s hardware. Computers, computer data, and components should be installed in safe and locked facilities.

ICT and employment:

This part is still a debate in ICT, simple because to some people are in advantage side but some are in disadvantage side.

Creation of new jobs:

Probably the best advantage of information and communication technology is the creation of new and interesting jobs. Computer programmers, Systems analyzers, Hardware and Software developers, radio / TV presenter, Phone shops, ICT technician and Web designers are just some of the many new employment opportunities created with the help of ICT.

Unemployment

While information and communication technology may have streamlined the business process it has also crated job redundancies, downsizing and outsourcing. This means that a lot of lower and middle level jobs have been done away with causing more people to become unemployed. The ability of the computer to handle high volume of jobs may cause loss of employment in a specific field.

ICT and Culture interaction

Bridging the cultural gap (interactivity)

Information and communication technology has helped to bridge the cultural gap by helping people from different cultures to communicate with one another, and allow for the exchange of views and ideas (facilitate dialogue), thus increasing awareness and reducing prejudice. With ICT local radios can be much more interactive and run

more economically than a decade ago. People ca interact one another via radio, TV, computer, Recorder, DVD player, tabloid on dressing

ICT Hazard

It is restricted that do not expose the electronic equipments to the environment.

The Health hazards of ICT:

∙ Eye strain; if you are looking at computer monitor for too long.

∙ Neck / back strain; this is caused by poor seating arrangement.

∙ Repetitive strain injury (RSI); this is from using a keyboard for too long.

∙ Fitness problems; from lack of exercise.

Negative effects of the ICT:

The internet is the worldwide publicly accessible network of interconnected computer networks. In this case it is possible to find some information, pictures, news or stories etc which are not good from one society to another or one country to another.

Nowadays there are some websites accessing different pictures or messages which are unethical manner e.g. sex. This is not acceptable in some countries such as Tanzania.

Also you can find that, through internets some African people are nowadays left out African culture and follow western countries culture. These including the way they wear clothes, types of food, greetings, usage of language etc.

FORM THREE COMPUTER STUDIES TOPICS

TOPIC 1: IMPACT OF INFORMATION AND COMMUNICATION TTECHNOLOGY (ICT) ON THE SOCIETY
TOPIC 2: WEB DEVELOPMENT
TOPIC 3: DATABASE AS INFORMATION SYSTEM

37 COMMENTS

  1. When I originally commented I clicked the -Notify me when new feedback are added- checkbox and now every time a remark is added I get 4 emails with the same comment. Is there any way you may take away me from that service? Thanks!

  2. Hello! I know this is kind of off topic but I was wondering iff you knew whereI could find a captcha plugin for my comment form?I’m using the same blogg platform as yours and I’m having problems finding one?Thanks a lot!

LEAVE A REPLY

Please enter your comment!
Please enter your name here