Ict 2
Ict 2
Ict 2
Many people are computer illiterate and will hardly benefit from
internet usage
There is a lot of wrong information on the internet since any person can
post anything.
TELNET
Email
It allows the transfer of messages, documents and pictures among
others, across the internet.
Mailing list
File transfer
Newsgroups
Worldwide web
Instant messaging
Usenet
Web Directory
Social networking
A type of service where users can seek others who share their interests,
find out what’s going on in their areas of concern and share information
with one another e.g. Facebook, twitter
Cloud computing
A service in which computer software, hardware and data are used
remotely over the internet, instead of acquiring and using them on a
local computer.
Search engines
Software programs that look through the Web to located sites matching
a keyword entered by the use of keyword. A string of letters or words
that indicates the subject to be searched.
Easy to use. Emails applications have user friendly tools that help
during composing messages
Easy to prioritize since the mails have subject lines it is easy to prioritize
them and ignore unwanted mails
Emails can also carry hyperlinks that lead to other webpages with just a
click.
One can subscribe to news and other online services through email
24/7 anytime access at any time of the day or night one can
communicate with friends, relatives, professors and business
associations
Emails can spread viruses, the recipient’s needs to scan the emails, as
viruses are transmitted through them and have the potential to harm
computer system
Spam and junk emails when used to send unsolicited messages and
unwanted advertisements create nuisance called spam checking and
deleting these unwanted mails can unnecessarily consume a lot of time,
and it has become necessary to block or filter the unwanted emails by
means of spam filters.
Crowded inbox- over a period of time, the email inbox may get
crowded with mails and it becomes difficult for the user to manage a
huge chunk of mails.
In case one forgets the password, it becomes hard to sign in this can
lead to loss of information.
Emails may violate privacy in case someone else gets to know you
password and may check your emails
Components of an email
Header
The header contains information concerning the sender and
recipients
The may also contain;
Subject- the theme/ what the message is about
Sender (form) - this contains the email address of the sender/ the
sender who creates the message
Recipient (To): the mail address of the intended recipient is typed
here
Note:
During the process of sending emails to multiple recipients, they
may be notified/ acknowledged about who else has received the
email.
CC: (carbon copy) – this feature allows sending an email to
multiple recipients without acknowledging them about who else
has received the email
Attachment – a feature that allows the sender to include a text
document, audio clip, video clip or graphics within the same email
and send it as a unit
Body
This contains the actual content or message to be conveyed or
communicated to the intended recipients. This part may also
include signature and auto generated text that is inserted by the
senders email system.
To create a message, the sender clicks on the option compose /
appears on the same list of folders in an email system
HOW TO USE INTERNET FACILITY FOR RESEARCH
Open any web- browser and type in a group of words describing what
your search is about
Netiquette guidelines
Be clear i.e. make sure the subject line (email) or title (webpages)
reflects your content
Use appropriate language i.e. avoid offensive and emotional
messages
Avoid using all capital letters while typing a message or article
Make the message as brief as possible
Make a good impression i.e. your words and content represent
you therefore, edit your words and images before clicking on send
Avoid forwarding email messages you have received without
permission of the original sender
Obey copyright laws i.e. avoid use of images or website content
without permission from the authors.
Avoid creating and sending spam messages i.e. posting unsolicited
email or advertising messages to a wide audience
Avoid responding to personal attacks
Always keep messages brief and use proper grammar and spelling
Make yourself look good online
Respect other people’s privacy
Post only acceptable information that has no harm to the public
Avoid downloading attachments from unknown sources
WORLDWIDE WEB
Terminologies used:
URL (uniform resource location) refers to the address used to find and
access a particular website. It is written the form
http/www.newvision.co.ug
Co. Company
Homepage (index page) is the first page on a website that serves as the
primary point of entry to related pages within the website and is
usually linked to other websites
Search engine a program that looks for and locates documents on the
world wide web for specified keywords and returns a list of documents/
websites where the keywords were found e.g. google, Yahoo, YouTube,
MSN, Bing, Ask Jeeves
TYPES OF WEBSITES
Personal website
News website
E-commerce website
Education website
Wiki
The difference between a wiki and a blog is that users cannot modify
original posts made by the blogger
Portal
FORMAT OF URL
i. Protocol
ii. Server (domain)
iii. File path
iv. File name
e.g. http:/www.mtn.co.Ug/mobile/services/zone.html
2. Data security
Refers to protective measure that are applied to ensure integrity,
availability, confidential data or information
Data corruption refers to errors in data that may occur during witting
processing storage and transmission of data hence causing unwanted
changes to be original data
QN
i. System threat
ii. Information theft
iii. Hardware theft
iv. Software theft
v. Internet and network attacks
vi. Malicious programs e.g. virus
vii. Unauthorized alteration, malicious destruction of hard ware and
software network
What are the causes of system failure?
Security threats for hardware and software
Hardware theft and vandalism
Hardware theft is the act of stealing computer equipment
Hardware vandalism is the act of destroying computer equipment
Software theft is the act of stealing or illegally software erasing
Software piracy is illegally duplication of copyright software
To guard against software theft and piracy products activation is
used
Product activation allows the user to input product
Identification number online or by phone and receive unique
installation and identification number
A license agreement gives the right to use software for a given
period of time.
Internet and network attacks
Information transmitted over networks has a higher degree of
security risks than information kept on an organization premises
An unauthorized access and use
An unauthorized access is the use of computer or network
without permission
Unauthorized use increase the variety of activities e.g. an
employee using an organization computer to send personal email
messages or someone gaining access to a computer and
performing unauthorized transfer
COMPUTER VIRUSES
Computer virus is malicious software that affects general
performance of a computer. It may infect the computer by
occupying its memory, corrupting data and software as well as
slowing down the computer speed
Other examples of malicious software include;
Worms
Root kit
Trojan horses
Effects of computer viruses on a computer system
Operating system runs much slower than usual
Available memory is less than expected
Files become corrupted
Screen displays unusual message or image
Unknown programs or files mysteriously appear
Music or unusual sound plays randomly
Existing programs and files disappear
Programs or files do not work properly
System properties change
Operating system does not start up
Operating system shuts down unexpectedly
Note:
An antivirus is a program used to detect and remove viruses
from the computer
Examples of antivirus software include;
Avira
Avast
Avg
360 total security
Smadav
Kaspersky
Norton
Control measures against viruses
To protect an information against viruses
Install the latest versions of antivirus software on the computer
Always scan removable storage media for viruses before using them
Both hackers and crackers have advanced computer and network skills
A script kiddie has the same intent as a cracker but does not have the
technical skills and knowledge. Script kiddie often use prewritten
hacking and cracking programs to break into computers
Back doors
Emerging technologies
ICT is always improving and charging and new technologies are being
developed all of the time. Developments in technology will by nature,
impact on our everyday lives and these include;
Artificial intelligence
Digital forensics
Biometrics
Robotics
Quantum cryptography
Computer Assisted Translation
3D painting and holographic imaging (holograms)
Virtual reality
Internet of things
Cloud computing
Artificial intelligence (AI)
This is a computer science that is focused on creating computer
systems that stimulate human intelligence. The term was first
used by a computer scientist at the Massachusetts institute of
technology (MIT) who was focused on trying to make computers
behave like humans
AI is being developed in the following applications areas
Expert systems- these are computers that have been
programmed to make decisions based on information they are
given. For example medical expert systems can diagnose patient’s
illness based on symptoms entered
Languages- this type of AI involves computers that can
understand different human languages as they are spoken to
them
Robotics- robotics artificial intelligence is where machines are
programmed to imitate a human.
Game playing- computer developed to play games against human
players. In 1977 a computer named ‘deep-blue’ defeated a word
champion in game of chess.
EXPERT SYSTEMS
An expert system is a computer program that uses AI.
Technologies to stimulate the judgment and behavior of the
human or an organization that expertise and experience in a
particular field.
Expert systems are usually intended to complement not to
replace human experts
Expert systems have played a big role in many industries including
the following;
– Financial services where they make decision about markets
of various markets and other financial indicators
– Telecommunication- used to make decision about network
technologies used and maintenance of existing networks.
– Health care- assist with medical diagnosis
– Agriculture- assist within/with forecast crop damage
– Custom service- helps to give orders, route custom requests
and solve problems
– Mechanical engineering, where they trouble shoot complex
electromechanical problem
– Transportation-where they contribute in a range of areas
including highway design traffic highway and train
scheduling and maintenance aviation highway pattern
control
– Law-where automation is starting to be used by deliver legal
service to make civil case evaluation and access product
liability
Permanency
Control cost
Multiple experts
Logical deduction
Expert systems draw conclusions from existing facts using various types
of roles such as if-then
Challenges of expert system
Linear thinking
In some cases e.g. medical diagnosis human emotion is very useful. The
disclosure of sensitive medical information to a patient requires
emotional intelligence that an expert system may be lacking
Safer transport- self driving cars already exist will drastically reduce
road accidents. Driverless trains too already exist in some countries.
The few seconds saved in getting the correct tool to the doctor can save
patients’ lives
Digital forensics
Law enforcement
Criminal prosecutors
Military intelligence
Insurance agencies
Digital evidence tendered on court often fails to meet the same high
standards expected more established forensics practices particularly in
ensuring the evidence is what it supposed to be. It is increasingly
common for criminal trials to rely on digital evidence. And regrettably,
it is common for innocents and guilty people acquitted of digital
evidence.
Biometrics
All of these parts of the human body are unique from person to person
and can be used authenticate identity. Even identical twins have slightly
different fingerprints
Better airport security- used in some airports, travellers have their eyes
and iris scanned into a system and this data is later matched up when
the person is performing airport checks
Disadvantages
In case the software fails to function well biometric security will fail to
work
Robotics
Note: these are all jobs harm or kill a human. Exploring extreme
environments e.g. inside volcanoes, planets or the depths of the ocean.
Humans cannot visit these environments due to lack of oxygen and high
pressure/heat levels