0% found this document useful (0 votes)
15 views7 pages

Term 1 Notes Y9

Uploaded by

yousifellata
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
15 views7 pages

Term 1 Notes Y9

Uploaded by

yousifellata
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 7

Term 1 study material

Lesson 1 (Software Piracy and viruses)

Introduction:

• ICT products like (games, movies, etc.) are digital and that means it can be illegally used,
copied and downloaded. This is called software Piracy.

• For that ICT creators need a way to protect their products.

What is software Piracy?

• Software piracy is Illegally, Using, sharing or copying copyrighted software, without the
permission of the creator.

How to prevent software Piracy?

• Serial numbers: unique number supplied with genuine copy of the product to prove that
software is genuine.

• Hologram: are often used on packages to indicate that software is genuine.

• Licence agreements: a way used by ICT creators to inform users how to use the product.

What is software virus?

• Software viruses are malicious programs that can infect your device and cause harm.

What do viruses do?

1. Used to get access to your system.

2. Damage files (by deleting and changing them)

3. Used to Steal personal information (Email address, bank details, phone number).

How to prevent viruses?

4. Anti-virus: detects and removes viruses from your device.

5. System update: fixes issues from old version

6. Do not click on suspicious links.


Lesson 2 (Hacking)

Introduction:

1. We use smart devices to store personal information (bank details, emails, phone numbers)
and this information is always targeted by hackers, so it’s important to protect them against
those hackers.

What is hacking?

• Gaining unauthorized access to a computer system without a permission

Why do people hack?

• Identity theft: use your personal information to commit id

• Stealing personal information (email address, phone number, bank details.)

• Damage files (changing your important files or maybe delete them)

What is authentication?

• A way used to prevent non-authorised people from getting access to our system.

• Used to prevent hacking.

What are the two main authentication techniques?

1. User-Id’s and passwords.

2. Biometric authorization

User-IDs and passwords:

Is a way to prevent non authorised people from getting access to computer system by
entering username and password.

What is Biometric authorization?

• Another way to prevent non-authorised people from accessing systems by scanning body
parts to log in (face scan, iris scan, fingerprint scan)

Lesson 3 (Effect of ICT on employment)

Introduction?

ICT have a great impact on our lives, especially on employment.


Because the use if ICT, there are effects on employment and the need for workers.

What are three main effects of ICT on employment?

1. Jobs are lost: many workers have been replaced by computers and robots.

2. Jobs are created: the increased need for ICT have increased the need for people work on
them.

3. Retraining: (train people to use new technologies)

Why do businesses and companies use ICT?

1. Speed: transferring, typing and sending files are much faster by using ICT.

2. Volume: new storage technologies have removed the need for large physical spaces to store
information.

3. Less paper: ICT software like (word, PowerPoint, Access) have decreased the need for paper
use.

4. Connectivity: ICT make communications between companies much better.

5. Less workers: Using ICT (computers, robots) companies have decreased the need for
workers, so they decreased the salary paid.

Areas where ICT decreased the need for employment?

• The increased use if ICT has decreased the need for workers, nowadays computers and
robots replaced many workers.

Examples of Areas:

1. Manual repetitive jobs (car factory)

2. Physical Shop work

3. Banks

4. Telephone exchange (customer service)

Areas where ICT Increased the need for employment?

ICT have created many different new jobs, so for that ICT increased the need for employments to fill
these jobs.

Examples of areas:

1. Web designers

2. Graphic designers

3. Systems analysts

4. Programmers
Lesson 4 (Effect of ICT on working patterns)

Introduction:

• ICT have a great impact on the way that people work and change their working patterns.

What are working patterns?

• Working patterns are the ways and routines that people follow when they work.

What is part time job?

• People work fewer hours than full time.

• 3-4 days a week

What Is telework?

People use ICT to work remotely and reduce the need for travel.

Example:

Customer service

Website designers

What is sharing work?

1. Refers to splitting workload or work hours on more than one worker to complete the job.

What is flexible hours work?

1. Refers to work outside traditional 9-5 pattern.

What are compressed hours work

• Refers to full time hours over less days.

Example:

• 8 hours 5 days

to

• 10 hours 4 days
• Lesson 5 (Effects of using ICT equipment)

Introduction:

There are several health problems that you can suffer if you use ICT devices incorrectly or for too
long.

Main health problems caused by using ICT:

• Repetitive Strain Injury (RSI)

• Back and Neck Strain

• Eye Strain and Headaches

1- Repetitive Strain Injury (RSI) (Causes):

• RSI is caused by doing the same small movements over and over again across a long period
of time. For example, clicking a mouse button repeatedly.

• RSI causes painful swelling of the wrist and fingers. Sufferers with really bad RSI are unable
to use their hands at all.

How to prevent RSI:

• Use an ergonomic keyboard/mouse.

• Use a wrist rest.

2- Back and neck problems:

• Back ache and neck ache can cause great pain and really affect the quality of your life.

Both back and neck ache can be caused by sitting incorrectly and using poor quality chairs
without back rests. This is called poor posture (see below).

How to prevent:

Sit upright against the back rest.

Use adjustable chairs.

3-Eye strain and headaches:

• Staring at a computer screen for too long can strain your eyes and cause headaches.

Eye strain can cause your vision to blur.

Common causes of eye strain are screen flicker and having direct light causing screen
glare.

• How to prevent:
Use LCD screens rather than CRT as they have less flicker.
• Use an anti-glare screen.
• Keep the screen clean of dirt.
• 20-20-20 rule for Eye care: Take 20 seconds break to look at something 20 feet away
every 20 minutes.

• Lesson 6 (latest ICT developments)

Introduction:

In recent years there has been a major shift in technology, especially information and
communications technology. and has become integral part of our life. Everyday we can see new
technology emerged (new app, new device…etc).

What is cloud computing?

Cloud computing is where users store their documents, programs, photos, on internet rather
than on their devices.
If you have internet connection you can create, share, edit files from any location.

Uses of cloud computing

1. Streaming music:
-Accessing websites where music is stored
-listening to musing without the need to download on your device.
Popular streaming music websites:
Spotify
Jango
2. Google docs:

• Offers users the ability to use free software such as spreadsheets, word processors.
• This software stored on the internet (users don’t have to download it on their devices.)
document can be accessed from any location as it is stored in cloud.
Advantages:

Low cost: many software are for free to use

Increased accessibility: accessing the information from any location (if you have internet)

Time saving: no need waste the time downloading the apps.

Disadvantages:

Security risks: data stored online always vulnerable to hackers and viruses.

Decreased accessibility: information can not be accessed if no internet connection.

Increased costs: some of the software are not free to use.


IOT (Internet of things):

The internet of things, or IoT, is a network of interrelated devices that connect and exchange
data with other IoT devices and the cloud.

Advantages:

Efficiency: IoT enables automation and remote monitoring.

Save time: reduce the human manual tasks.

Quick response to issues: sends notifications in case if any failure.

Disadvantages:
Privacy and security: devices connected to internet can be vulnerable to cyber-attacks.

Cost: expensive devices.

Energy consumption: electricity usage

You might also like