Introduction To Information And Communication
Technology
LESSON 1Introduction
LESSON 3Usage
LESSON 2Evaluation
LESSON 4Computerized
LESSON 5Impact
LESSON 7Differences
LESSON 6Ethic
LESSON 8Intellectual
Property
LESSON 9Privacy
LESSON 11Identification
LESSON 10Authentication
LESSON 12Controversial
Introduction to Information and Communication Technology
Sir,What Is ICT ?
Technology required for information processing , The use of electronic computers, communication
devices and software application to convert, store, protect, process, transmit and retrieve information
From anywhere, anytime.
The knowledge obtained from reading, investigation, study or research
Is an act of transmitting messages. InformationIs exchanged between individuals using symbols,
signs, or verbal interaction
Is the use of scientific knowledge, experienceand resources to create processes and
products that fulfill human needs.
FIRST GENERATION (1940-1956)- ENIAC ( Electronic Numerical Integrator and Calculator)ENIAC ( Electronic Numerical Integrator and Calculator)- Presper Eckert and Willian Mauchly build ENIAC- use Vacuum Tube- huge, slow, expensive and often unreliable.- Disadvantage :
- tubes also burnt out frequently- huge, slow, expensive- need large space
Evolution Of Computer
SECOND GENERATION (1956-1963)-The famous scientists during second generation era were :
- Transistor was small devices use to transfer electronic signal across a resister.
- Advantages :-Transistor were smaller then Vacuum Tube- there needed no warm up time- consumed less energy- Generated less heat- Faster and more reliable
THIRD GENERATION (1964-1971)
- Integrated Circuit (IC) is a complete circuit on a small chip of silicone, also known as semi conductor
- Advantage :-Silicon chip were reliable, compact and cheaper- sold hardware and software separately- it is a complete electronic circuit on a small chip of silicon, also known as semi conductor
FOURTH GENERATION (1971-PRESENT)
-The microprocessor is a large-scale integrated circuit which contained thousand of transistor- The transistor on this one chip are capable of performing all of the function of a computer’s central processing unit.- Advantage :
- Computer become 100 times smaller then ENIAC- Gain in speed, reliability and storage capacity- Personal and software industry boomed
FIFTH GENERATION (PRESENT- BEYOND)
- The fifth generation computer are technologically advance and are still being development to become more efficient.-The inventions of new hardware technology in the fifth generation have grown rapidly including many other modern computer devices such as :
- silicon chips- processor- robotics- virtual reality- intelligent system- programs which translate languages
Usage Of ICT In Daily Life
EDUCATIONComputer are used in the sector of education because they can offer
a) Student b) researcher
c) Teacher d) school administrator
BANKING To control entire banking system that alsoInclude Electronic Banking Services
Cognitive Development
Interactive Experiences
Enhance Learning
Cheque Deposit
Automated Teller Machine (ATM)
Electronic Fund Transfera) Customer b) Businessmenc) Bank Administrator
INDUSTRYAre used to facilitate production planning
and control system, To support chainmanagement and to help in product design
in the industrial sector
E-COMMERCEHelps in boosting he economy. It makes
Buying and selling activityeasier, more efficient and faster
Supplier
Customer
Employees
Researchers
Workers
Administrator
COMPUTERISED AND NON COMPUTERISED SYSTEM
- A system is an arrangement of elements that when it is put together it becomes an organized and establish procedure.
- A system typically consists of components connected together in order to facilitate. The flow of information, matter or energy.
Non-Computerized
(Before ICT)
Usage Computerised
(With ICT)
-Was done manually by taking deposits directly
- Transactions only during working hour
Banking -All transactions are done by computers -Transactions can be done at anytime, and place. Online services, phone banking are available
- Productions was slow because everything done manually and totally depend on human labour
Industry - Computers and telecommunications industry became very popular and profitable since production can be increase through an all day operation.
-Using barter system- trading globally was extremely slow, late and expensive.
Commerce -e-commerce plays an important role in economic scene.- includes distribution, buying, selling and servicing products that done electronically
The Impact Of ICT In Society
Faster Communication Speed-Save time and inexpensive- information can travel fast
and at an instant
Effective Sharing Of Information
-Information can be share andExchange opinions, news and info
through discussion group, mailing list and forum.
Borderless Communication-Internet offer fast information
retrieval, interactivity, accessibilityand versatile.
Health Problem-Expose to bad posture,
eyestrain, physical and mentalstress
Another effect of ICT is:-Fraud
- identity theft- Pornography
- Hacking
Paperless Environment-Information can be stored
and retrieved through the digitalMedium instead of paper.
Reliable mode of Communication
-With internet, information could be access and retrieved from
anywhere and anytime.
Lower Communication Cost-Access to large amounts of data at a very low cost.
Computer Ethics
Ethics in General- A guideline is needed to stop the current technology products from being exploited for example replicating original CD.-Unethical refers to any code of conducts that are not confirming to approved Standards of social or professional behavior.-Computer ethics is a system of moral standards or values used as a guideline forComputer users.
Ethical computer code of conductsa) Sending warning about viruses to other computer usersb) Asking permission before sending any business advertisements to otherc) Using information with authorizations
Definition of Ethics-Ethics moral guideline to refer to when using the computer and computer network.
Definition of Law-Law is a legal system comprising of rules and principles that govern the affairs of a community and controlled by a political authority
Computer Ethics
Respecting Ownership
Respecting Privacy
Respecting Property
We must respect ownership by not stealing other people work either by duplicating or
Distributing it.
We should respect other people privacy and confidentiality by refraining ourselves
from reading their mails or files without their Permission.
-Property means ownership. Individual data and information consider as property, An act of tempering and changing electronic
Information is consider as vandalism and Disrespect for other people property.
The ten commandments of computer ethics
The Differences between Ethic and Law
SIMILARITIES BETWEEN ETHICS AND LAW :
-To guide user from misusing computers- to create a healthy computer society, so that computers are used to contribute to a better life- To prevent any crime
SIMILARITIES BETWEEN ETHICS AND LAW :
-To guide user from misusing computers- to create a healthy computer society, so that computers are used to contribute to a better life- To prevent any crime
ETHICS LAW
Guideline Control
Moral Standards Judicial Standards
Free to follow Must Follow
No punishments Penalties, Imprisonments and other punishment
Universals Depends on country
Produce ethical computer users
Prevent misusing of computers
Immoral crime
Unethical versus law breaking conducts
Unethical:- Using the office computer to do personal thing
- Reading your friend’s email without his or her permission- Plagiarizing and using materials from the internet for your class assignment
without giving credit to the original author.
Law Breaking :-Sending a computer virus via e-mail
- hacking into your school’s database to change your examination result- selling pirate software in a night market
Intellectual Property Right
DEFINITION OF INTELLECTUAL PROPERTY- Refer to works created by inventors, authors and artist.
- these works are unique and have value in the market place.
INTELLECTUAL PROPERTY LAW- covers ideas, inventions, literary creations, unique names, business model, industrial process,
computer program codes and more
INVENTIONS PROTECED BY INTELLECTUAL PROPERTY LAWS :a) Trademarksb) Service marksc) Trade/company namesd) Domain namese) Geographical indicationsf) Copyrightsg) Patents
Privacy In Computer Usage
Privacy
Refer to data and information privacy
SPAM
Unsolicited email massage, advertisements orNewsgroup posting sent to many
recipients at once.
COOKIES
- Are used to identify users by web casting, e-commerce and other web applications-Contain user information and are saved in computer hard disk
ELECTRONIC PROFILE
-Is the combining of data in a database that can be sold to the interne by the company to the interested parties
SPYWARE
- A program that collects user information without the user knowledge
Way computer Technologythreaten our privacy
Privacy In Computer Usage
Can privacy be protected ??
Privacy Law
-Security Services to review the security policy- security management to protect the resources- security mechanism to implement the required security services-Security objects, the important entitieswithin the system environment
Utilities Software
- anti-spam program- firewall- anti - spyware-antivirus
Authentication
Is a process where users verify that they are who they say they are...
The user who attempt to perform functions in asystem is in fact the user who is authorized to do so
Biometric device
-Is a device that translate personal characteristics into a digital
code that is compared with a digital code stored in the database
Callback system
- refers to the checking system that Authenticates the user.
Fingerprint recognition
Iris Scanning
Hand Geometry ScanningFacial Recognition
Signature VerificationSystem
Voice RecognitionRetinal Scanning
Verifications
Is the act of proving or disproving the correctness of a system with respect to a certain formal specification
Methods of Verification
User IdentificationExample :a) Key in the user name to log on to a system And the system will verify whether the user Is valid or invalid
b) Show the exam slip to verify that you are the valid candidate for theexam
Processed ObjectExample :a) The policeman will check on the driver’s license to identify the valid driver
b) Employees have to swipe their security card to enter the building
Controversial Content
Is information that cause disagreement in opinions and may cause the disruptionOf peace because different people or culture will have different views about the contents
Definition of PornographyIs any form of media or material (like book and
photography) that depicts erotic behavior And is intended to cause sexual excitement.
Definition of SlanderIs a legal term for false and malicious statement
about someone.
Pornography:
- Can lead to criminal acts such as exploitation of Women and children
- Can lead to sexual addiction or perversion- can develop low moral value towards other men, women
Or children
Slander :
-Can develop into a society that disregards honesty And truth
-Can develop bad habit of spreading untruths andrumors
- can lead unnecessary argument- can cause people to have negative attitude
towards another person
Impact on Malaysian SocietyWhat can you conclude about the impact of
controversial content on the Malaysia society.
Internet Filtering
Is a process that prevent orblocks access to certainmaterials on the internet
Controlling Access to the Internet
Keyword Blocking
- One of the strategies is by using keyword blocking method
- This method uses a list of banned words or objectionable terms
Web Rating Systems- Are rated in term of nudity, sex,
violence and language
Site Blocking-The software prevents access to any
sites on this list.
Cyber Law
Cyber Law
Integrity and security Of information
Security of Government Data
Intellectual Property Right
Legal Status of Online Transaction
Privacy and ConfidentiallyOf Information
Computer Crime
• Is defined as any criminal activity that is related to the use of computer.
• These activities include computer fraud, copyright infringement, computer theft and computer attack.
Computer Fraud
- Is defined as having an intention to takeadvantage over or causing loss to other
people, mainly on monetary basis through the use of computer.
-Email hoaxes, programme fraud,investment schemes, promotions
and claims
Computer Infringement
- is defined as a violation of therights secured by a copyright.
-Involvers illegal copy or reproduction of copyright Material by the
black market group
Computer Theft
- is defined as the unauthorized use of another person property with the
intention to deny the owner the rightful Possessions of the property or its use.
Example :a) Transfer of payments to the
wrong accounts
Computer Attack
-Is defined as any activities taken to disrupt the equipment of computer
systems, change processing control or Corrupt stored data.
Example :-Physical attack
- electronic attack-Computer network attack
Computer Security
Definition
Computer security means protecting our computer system and the information they contain against unwanted access, damage, destruction or modification.
Hardware security Network securitySoftware security
- Refer to security measures used toprotect the hardware specifically the computer and its related document
- Refer to security measures used toprotect the software and the loss of data files
- Refer to security measures used toprotect the network system. Exampleis firewall
Computer Threats
Computer threats can come from many ways either from human or natural disaster.
Malicious Code
Virus- A program that can pass on the Malicious code to other programs
by modifying them
Trapdoor or Backdoor - a feature in a program that allows
someone to access theprogram with special privileges
Logic Bomb- That goes off when a specific
condition occurs
Trojan Horse-A program which can performuseful and unexpected action
Worm-A program that copies and
spreads itself through a network
- Is also known as a rogue program.- it is a threat to computing assets by causing
undesired Effects in the programmer’s part.
Computer Threats
Natural & Environment Threat
Theft
Hacker
- Refer to unauthorized access to the computer system by a hacker
Hacker Cracker
-Two types of theft :a) computer is used to steal money, goods, information and resourcesb) stealing of computers especially notebook and PDA
Three approaches to prevent theft : a)b)c)
- Are also threatened by natural or environmental disaster.
Examples :
Security Measure
Are measures taken as a precaution against theft or espionage or sabotage or possible danger or failure
Cryptography
Plaintext Ciphertext
Plaintext Ciphertext
Encrypt
Decrypt
Is a process of converting plaintext into chipertext.
Is a process of converting ciphertext into plaintext