0% found this document useful (0 votes)
30 views4 pages

Term 1 Study Material (Year9) 4

Uploaded by

yousifellata
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as ODT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
30 views4 pages

Term 1 Study Material (Year9) 4

Uploaded by

yousifellata
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as ODT, PDF, TXT or read online on Scribd
You are on page 1/ 4

Term 1 study material

Lesson 1 (Software Piracy and viruses)

Introduction:

• ICT products like(games, movies, etc.) are digital and that means it can be illegally used,
copied and downloaded. This is called software Piracy.

• For that ICT creators need a way to protect their products.

What is software Piracy?

• Software piracy is Illegally, Using, sharing or copying copyrighted software, without the
permission of the creator.

How to prevent software Piracy?

• Serial numbers: unique number supplied with genuine copy of the product to prove that
software is genuine.

• Hologram: are often used on packages to indicate that software is genuine.

• Licence agreements: a way used by ICT creators to inform users how to use the product.

What is software virus?

• Software viruses are malicious programs that can infect your device and cause harm.

What do viruses do?

1. Used to get access to your system.

2. Damage files (by deleting and changing them)

3. Used to Steal personal information (Email address, bank details, phone number).

How to prevent viruses?

4. Anti-virus: detects and removes viruses from your device.

5. System update: fixes issues from old version

6. Do not click on suspicious links.


Lesson 2 (Hacking)

Introduction:

1. We use smart devices to store personal information (bank details, emails, phone numbers)
and this information is always targeted by hackers, so it’s important to protect them against
those hackers.

What is hacking?

• Gaining unauthorized access to a computer system without a permission

Why do people hack?

• Identity theft: use your personal information to commit id

• Stealing personal information (email address, phone number, bank details.)

• Damage files (changing your important files or maybe delete them)

What is authentication?

• A way used to prevent non-authorised people from getting access to our system.

• Used to prevent hacking.

What are the two main authentication techniques?

1. User-Id’s and passwords.

2. Biometric authorization

User-IDs and passwords:

Is a way to prevent non authorised people from getting access to computer system by
entering username and password.

What is Biometric authorization?

• Another way to prevent non-authorised people from accessing systems by scanning body
parts to log in (face scan, iris scan, fingerprint scan)

Lesson 3 (Effect of ICT on employment)

Introduction?
ICT have a great impact on our lives, especially on employment.

Because the use if ICT, there are effects on employment and the need for workers.

What are three main effects of ICT on employment?

1. Jobs are lost: many workers have been replaced by computers and robots.

2. Jobs are created: the increased need for ICT have increased the need for people work on
them.

3. Retraining: (train people to use new technologies)

Why do businesses and companies use ICT?

1. Speed: transferring, typing and sending files are much faster by using ICT.

2. Volume: new storage technologies have removed the need for large physical spaces to store
information.

3. Less paper: ICT software like (word, PowerPoint, Access) have decreased the need for paper
use.

4. Connectivity: ICT make communications between companies much better.

5. Less workers: Using ICT (computers, robots) companies have decreased the need for
workers, so they decreased the salary paid.

Areas where ICT decreased the need for employment?

 The increased use if ICT has decreased the need for workers, nowadays computers and
robots replaced many workers.

Examples of Areas:

1. Manual repetitive jobs (car factory)

2. Physical Shop work

3. Banks

4. Telephone exchange (customer service)

Areas where ICT Increased the need for employment?

ICT have created many different new jobs, so for that ICT increased the need for employments to fill
these jobs.

Examples of areas:

1. Web designers

2. Graphic designers

3. Systems analysts

4. Programmers
Lesson 4 (Effect of ICT on working patterns)

Introduction:

• ICT have a great impact on the way that people work and change their working patterns.

What are working patterns?

• Working patterns are the ways and routines that people follow when they work.

What is part time job?

• People work fewer hours than full time.

• 3-4 days a week

What Is telework?

People use ICT to work remotely and reduce the need for travel.

Example:

Customer service

Website designers

What is sharing work?

1. Refers to splitting workload or work hours on more than one worker to complete the job.

What is flexible hours work?

1. Refers to work outside traditional 9-5 pattern.

What are compressed hours work

• Refers to full time hours over less days.

Example:

• 8 hours 5 days

to

• 10 hours 4 days

You might also like