0% found this document useful (0 votes)
34 views14 pages

CHP 5 f5

Thank so much for the document
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
34 views14 pages

CHP 5 f5

Thank so much for the document
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 14

CHAPTER 5: THE SOCIAL AND ECONOMIC IMPLICATIONS OF

COMPUTERS
LESSON 16: INFORMATION TECHNOLOGY CAREERS (IT PERSONNELS)
The following careers are common in the domain of information and
communication technology.
1. Programmer: It is a person who understands the problem or the task that a
computer is suppose to work on and translate it into the language that the computer
understands. This process is called programming.
2. Software engineer: Manages the development of a large scale software as a project,
striving and making sure that designs, specification, implementation, etc are carried out
on time, within budget, according to users need and of high quality.
3. Database administrator/manager: This is a management position in an organization.
He/she oversees the database activities of an organization.
4. Database developer: He analyse businesses/projects environment, design, develop and
implements database solutions to support various processes of the organization.
5. Network administrator: He designs, implement and maintains the technical hardware
and software necessary to run a network.
6. Web Engineer: He designs, develop and implement solutions for web based activities
such as company portals and online shopping.
7. System analyst: He works with users to develop a list of requirements so that a possible
computer solution to support those requirements may be designed and implemented.
8. System Network Manager: He installs, maintain and manage computer networks.
9. Data Processing Manager; He ensures the overall running of the data processing department.
10. Computer Engineer: These are engineers that focus on the designed of hardware.
11. Computer System Analyst: They designed, develop and oversee the installation of new systems.
12. Programmer: This is someone who understands a problem, writes and document computer
software using programming language like C, C++, JAVA, etc.
13. Computer Operator: He oversees the running of computer systems, install, maintain
and repair computers and other peripheral devices such as printers.
14. Data Input Staff: Ensures the overall running of the data processing department.
15. Maintenance Technician: This is a person who repairs, install, update computers and
servers.
16. Computer scientist: This is a person who has acquired knowledge of computer science.

LESSON 17: APPLICATION OF COMPUTERS


Computer with it multifunction is applicable in almost every field of work in live. Below are
some selected areas where you can confidently and effectively use computer to obtain fast and
accurate results.
1. COMMUNICATION:
Computers are widely used for communications using local and wide area networks.
Electronic mails (E-mails) are used by both individuals and organizations.
2. COMMECIAL AND GENERAL DATA PROCESSING:
Businesses use computers in the following different applications like payroll, company
account. With the use of computers here, the system becomes faster, more accurate data
processing, less costly.
3. CAD/CAM (Computer Aided Design/Computer Aided Manufacturing):
CAD is graphic software, but very advance and engineers, architects used it to produce
high quality technical drawing, drawn to scale. It is used to produce plans of houses,
maps, circuit diagrams, engineering drawing etc. An example is Auto CAD.
CAM(computer aided manufacturing)will enable, say, an engineering component to be
designed and manufactured using numerically controlled machine tools.
4. ROBOTICS:
A robot is a machine used to do work that may be difficult for humans to do. They are
used in applications like car assembly, construction, spray painting etc. some basic parts
of a robot are; sensors, transducers, converter, microprocessor and actuator.
The advantages of robots are;
- They can work in environments that are hazardous to humans.
- They can tirelessly perform repetitive task.
- Quality of work produced is consistent.
- They can work to a greater level of accuracy than humans.
Disadvantages
- They are expensive to buy and install.
- Become disastrous when wrongly program.
- In some cases people may be easier to retain than robots.
5. ARTIFICIAL INTELLIGENCE AND EXPERT SYSTEMS
Artificial intelligence (AI) is the science of making machines perform tasks that would
require intelligence if done by people.
Expert systems
This is a computer program that imitates the intelligence of human expert in a specific
field of knowledge. It functions by using a programming technique for problem solving.
It was built for medical diagnosis, electronic fault finding, mineral prospecting etc.
Advantages of an expert system
- The knowledge is always available when you need it.
- The knowledge is not lost if the expert falls under a bus.
- An expert system gives results very fast.
- No emotion in decision making.
Disadvantages of an expert system
- It is inflexible in certain circumstances.
- May be difficult to contradict a decision.
- A human may become over-reliant on the expert system, and rubber-stamp its decisions
without thinking about them.
6. COMPUTERS IN EDUCATION
Computers are used to manage various processes in a school ranging from building
databases for students, teachers and the school administration, management of the
payment of fees and salaries of teachers, drawing up of the school’s timetable.
7. COMPUTERS IN MEDICINE
In medicine, Computers are used in the diagnoses of diseases, used to examine the
internal organs of the body (Echography), and some software’s are used in performing
surgery. At the basis of these, computers are used to store patients’ records, etc.
8. COMPUTERS IN TRAVELING
A good number of travelling agencies around the globe are computerizing their
systems and the services they provide to their customers. Reservations and payments can
be made online. Tracking the progress of a flight can also be done online.
9. MODELLING AND SIMULATION
Modelling: This is a simplified representation of a system or object with the intention of
promoting the understanding of the system or object, or its characteristics.
Simulation: This is simply the implementation of models over time. Simulations bring to
life and show how a particular objects or phenomena will behave.
10. ENTERTAINMENT
Computers can be used for watching video, pictures, playing of games like scrabble
at home, offices, school etc.
11. OFFICES
The availability of cheap processing power has made it possible to automate many office
functions, such as message distribution, record keeping and the filing and classifying of
documents. Application programs like word processor, spread sheet, and database are very useful
in this domain.
12. BANKING
With the use of computers in banks, accounts can be created, queried and updated very fast. Files
and other documents can be move from one branch to another easily and faster.
4.1COMPUTERS IN HEALTH CARE
Computers have improved the quality of medical services in the following areas:
*Hospital Administration: It has facilitated keeping of patients medical record, keeping of
hospital account, monitoring of drug stock, keeping of employee record etc.
*Computers and people living with disabilities: Computer technology has improve the quality
of life for disable people, their ability to communicate and their opportunity for independence
and employment.
-People with control over just an eyelid or a toe, for, eg can communicate by means of the
computer. Computer scanners can convert printed text to verbal output for the visually impaired.
-Voice recognition equipments converts speech to printed or displace output for the hearing
impaired.
-People with physical disabilities can use special pointing devices, pens or touch screen for
interacting with the computer.
-Vision systems have sensors build into special glasses to enable those who are visually impaired
to see.
4.2COMPUTER IN FIGHTING CRIME
*Computerized fingerprint: Finger printing is the science of using the patterns of ridges on our
fingertips for identification purposes. In this process, finger print obtained from objects at the
scene of crime are taken and then compared with the suspect’s fingerprint using a computerized
system.(Biometric device) designed to store and match the prints.
*Drones: Drones are unmanned aircrafts that can be used for surveillance of suspected criminal
zones and can also be loaded with weapons to attack criminals. Drones are used to track drug
traffickers.
4.3COMPUTERS AS HUMANS:
*Robots: A robot is a device made to imitate human thinking and behavior and thus capable of
taking action on its own. Robots may be used for spraying, painting, spot welding and car
assembling. They are also used as security devices inside homes and office buildings, as vehicles
in space exploration, as intelligent wheel chair for disabled people and as underwater
maintenance workers for oil rigs

LESSON 18: HEALTH SAFETY AND THE ENVIRONMENT


6.1Computer and health
Computers can be held responsible for a whole raft of health problems, from stress,
eyestrain to wrist injuries, back problems, stomach ulcers to mental collapse.
 Stress: Simply thinking about computers is enough to cause stress in some people. It is
stressful to be asked to perform task which are new to you and which you are not sure
you can cope with. Just thinking that you have more work to do than you can finish in
time or too little to do and to be bored all day is stressful.
 Repetitive strain injury (RSI): This is the collective name for a variety of disorders
affecting the neck, shoulders and upper limbs. There are two main types;
i. Tendonitis: This is when a tendon is inflamed, caused by some repeated motion or
stress on that tendon.
Symptoms: Extreme pain that extends from the forearm to the hand, along with
tingling in the fingers.
ii. Carpal Tunnel Syndrome: This is the inflammation of the nerves that connect your
forearm to palm of your hand.
Symptoms: Burning pains when the nerve is compressed, along with numbness and
tingling in the thumb and first two fingers.
Caused: RSI is usually a result of;
 Repetitive work
 Bad posture.
 Lack of rest.
6.1.1How to preventing RSI
 Take frequent break.
 Place the mouse at least six inches in front of the edge of the desk.
 Type on a computer keyboard lifting your fingers up and down rather than your wrist.
 Position the mouse at the same height as your keyboard.
 When you slide the mouse around, move your entire arm and not just your wrist.
iii. Eyestrain: Computer users are prone to eyestrain from spending long hours in front
of a computer screen. This falls under computer vision syndrome (CVS).
Causes:
 Glare.
 Improper lighting.
 Improperly corrected vision.
 Poor work practices.
 Poorly designed workstation.
6.1.2Methods of preventing or reducing CVS
1. Take a break of five to ten minutes away from the computer every hour.
2. Reduce glare and reflections from the computer screen.
3. Clean your screen and block out excessive sunlight and reflection.
4. Adjust the contrast and brightness of the computer screen so that there is high contrast
between text on the screen and the screen background.
Iv. Software Hazard: Bad software can be extremely stressful to use. Good software to a user
who has not been train to work with it is a problem as well.
6.2THE ERGONOMIC ENVIROMENT
Ergonomics refers to the design and functionality of the working environment.
Employers or computer users must give consideration to the following;
1. Lighting: The office or workspace should be well lit. Computers should neither face
windows nor back them so that the users have to sit with the sun in their eyes or
reflection. Adjustable blinds should be provided.
2. Furniture: Chairs should be of adjustable height, with a backrest which tilts to support
the user at work and at rest. Chairs should swivel and be at correct height relative to the
keyboard on the desk.
3. Work space: The combination of chairs, desk, computers, accessories (mice and pad,
documents holders etc.), lighting, heating, ventilation all contribute to the workers overall
well-being.
4. Noise: Noisy printers for example should be given covers to reduce the noise or
positioned in a different room.
5. Hardware: The screen must be tilt and swivel and be flicker-free; the keyboard must be
separately attached.
Software: Employers should analyze task which their workers performed and provide software
which makes the task easier. It should be easy to used and adaptable to the user’s experience.
6.3. Computers and the environment
*GREEN TECHNOLOGIES: The term green technologies is used to describe a class of
electronic devices that can promote sustainable management of resources. The terms
environmental technologies, clean technologies, are sometimes used in place of green
technologies.
*GREEN COMPUTER: It is defined as the science of designing, manufacturing/engineering
using and disposing of computer devices in a way that reduces their effect on the
environment. Green computing is concern with the environmentally responsible and eco-
friendly use of computer and their resources. This is done with the goal to:
*Reduce the use of hazardous materials
*Maximize energy efficiency during the product lifetime
*Promote the recyclability or biodegradability of obsolete products and factory.
Green computing practices include: the development of environmentally sustainable production
practices, energy efficiency computers, improved disposal, and recycling products.
Approaches employed to promote green computing practices include:
*Green us: Minimizing the electricity consumption of computers and peripherals.
*Green disposal: Appropriately disposing of or recycling of unwanted electronic equipments.
*Green design: Designing energy efficient computers, servers, printers etc.
*Green manufacturing: Minimizing waste during the manufacturing of computers and other
subsystems to reduce the environmental impact of these activities.
Recommended green practices for computer users include:
*Use hibernate or sleep mode when away from a computer system for extended periods to
conserve energy.
*Use LCD monitor instead of conventional CRT monitors.
*Buy energy efficient notebook computers instead of desktop computers.
*Activate the power management features for controlling energy consumption.
*Turn off computer at the end of each day.
Revision questions
1. State four health and safety issues which may arise for staff using computers.
2. State three responsibilities of an employer in relation to the health of employees who
regularly use computer equipment.
3. People who work in front of a computer monitor for long periods usually expose
themselves to some health hazards.
i. Name four health hazards that could directly be linked to prolonged use of computers.
(4mks)
ii. List and explain four actions you would take to avoid the four different computer-
related health hazards. (8mks)

LESSON: SOCIAL EFFECTS


A computer crime is any illegal act that involves the computer either as the target of the crime or
as a tool used in committing the crime. When the computer is the target of the criminal act, the
crime is said to be a computer-related crime. When it is a tool used to commit the crime, the
crime is referred to as a computer-assisted crime.

2.1. Types of Computer Crimes


2.1.1. Phishing
It is the process of acquiring or attempting to acquire sensitive information such as usernames,
passwords and credit card details by masquerading as a trustworthy entity in an electronic
communication.

2.1.2. Software Piracy


Software piracy or copyright infringement is the illegal (unauthorized) reproduction of
copyrighted software for personal use, for sale or free distribution.

2.1.3. Malware Attacks


Malware (malicious software) is any software that could harm a computer system, interfere with
a user's data, or make the computer to perform actions without the owner's knowledge or
permission. Examples are virus, worms, Trojan horse, spyware and logic bombs.

✓ Virus
A virus is a computer program that can copy itself and infect a computer where it destroys files
and disrupts the operation of the computer.

✓ Worm
A worm is a self-replicating malicious program which uses a computer network to send copies of
itself to other computers (nodes) on the network and it may do so without any user intervention.
Unlike a virus, it does not need to attach itself to an existing program. Worms cause harm to the
network by consuming bandwidth whereas viruses corrupt or modify files on a targeted
computer.

✓ Trojan horse
A Trojan horse is malware that appears to perform a desirable function for the user prior to run
or install but instead facilitates unauthorized access of the user's computer system. Once a Trojan
horse has been installed on a target computer system, a hacker may have access to the computer
remotely and perform various operations, limited by user privileges on the target computer
system and the design of the Trojan horse.

✓ Spyware
Spyware is software that monitors a computer user’s activity without their knowledge and
reports it to a central location.

✓ Logic bomb
A logic bomb also known as slag code, is a piece of computer code that executes a malicious
task such as clearing a hard drive or deleting specific files, when it is triggered by a specific
event.

2.1.4. Denial of Service


A denial or degradation of service (DoS) is an attack to a computer system that puts it out of
action by overloading it with data in a way that the system was never prepared to handle.

2.1.5. Hacking and Cracking

A hacker is someone who illegally attempts to access a computer system without authorization in
order to steal, modify or damage the data that the system contain.

A cracker in the other hand is someone who uses code to access strictly restricted software.
2.1.7. Cyber Stalking
Cyber stalking is a crime in which the attacker harasses a victim using electronic
communication, such as e-mail or instant messaging (IM), or messages posted to a web site or a
discussion group.

2.1.8. Cyber Terrorism


Cyber terrorism can be defined as an act of terrorism committed through the use of cyberspace or
computer resources. As such, a simple propaganda in the Internet, that there will be bomb attacks
during the holidays can be considered cyber terrorism.
Other types of crimes are: scamming, theft of computer equipment, pharming, spoofing, and
phreaking.

3. Computer Systems Security or Measures to Combat Computer Crimes


Computer system security is the process of preventing and detecting the unauthorized use of
computer systems. Prevention helps stop unauthorized users from accessing any part of the
computer system by controlling access to the system, while detection helps determine whether or
not someone attempted to break into the system, if they were successful, and what they may have
done.

Computer security has three main goals, confidentiality, integrity and availability, which can be
conveniently summarized by the acronym "CIA":
✓ Confidentiality ensures that information is not accessed by unauthorized persons. In other
words, it ensures that information is kept secret or private.
✓ Integrity ensures that information is not altered by unauthorized persons in a way that is
not detectable by authorized users. That means that there is an external consistency in the
system - everything is as it is expected to be.
✓ Availability ensures that the system is accessible and useable upon appropriate demand by
authorized users. In other words, this means preventing denial-ofservice.

Different mechanisms used to ensure the security of computer systems are authentication,
encryption, firewalls, digital signatures, etc.

3.1. Authentication
Authentication is the process of determining if someone is who they declare to be. In simple
terms, it is proving someone’s identity. Authentication can be obtained by the user providing
something they know (password), something they have (smart card) or something they are
(biometrics).

3.1.1. Passwords
A password is a secret sequence of characters that is required to login to a system, thus
preventing unauthorized persons from gaining access to the system. Passwords can be guessed or
cracked and so if anyone is using a password to protect their system, the following guidelines
will help make it more secure:

✓ Don’t choose an obvious password (like your name, date of birth or name of relative)
✓ Keep your password secret. Don’t share it!
✓ Change your password regularly but not too often.
✓ Make your password at least eight characters long.
✓ Do not use common or proper words of phrases - these can be found using a dictionary
cracker.
✓ Use a mixture of upper and lower case letters and numbers.
3.1.2. Smart Card
A smart card is a small card that holds user authentication information. When the card is inserted
into a card reader, electrical fingers wipe against the card. The information in the card is read
and used to authenticate the person. Cards can be stolen and so are not as reliable as biometrics.

3.1.3. Biometrics
Biometrics is the science and technology of measuring and analyzing biological data. In
computer security, it refers to the use of measurable biological characteristics such as
fingerprints, eye retinas, iris patterns, facial patterns, voice patterns, hand measurements and
DNA, to identify a person. It is the safest authentication technique.

Assignment: What do you understand by access control?

Answer: The limitation and control of access to a system through identification and
authentication.

Or

The process of limiting access to a system only to authorized users. This can be achieved
through identification and authentication.

3.2. Encryption
Encryption is the process of transforming a message using an algorithm into a form unreadable
by anyone except the intended recipient. The original message is known as plaintext, the
algorithm is cipher and the encrypted text is ciphertext. To read an encrypted message, one must
have access to a key that will enable them to decrypt it.

3.3. Firewall
A firewall is a system designed to prevent unauthorized access to or from a private network.
Firewalls are implemented in either hardware or software form, or a combination of both. They
prevent unauthorized Internet users from accessing private networks connected to the Internet.
All messages entering or leaving the network must pass through the firewall which examines
each message and blocks those that do not meet the specified security criteria. Some Operating
Systems like Windows XP, 7 and Mac OS X, have built-in firewalls.

3.4. Intrusion Detection


Intrusion detection is the art and science of sensing when a system or network is being used
inappropriately or without authorization. An intrusion-detection system (IDS) monitors system
and network resources and activities and, using information gathered from these sources, notifies
the authorities when it identifies a possible intrusion.

3.5. Digital Signatures


A digital signature is a computed digest of a message that is encrypted and sent with the
message. The recipient decrypts the signature and compares it with the received text. If they
match, the message is authenticated and proved intact from the sender. Digital signatures also
ensure non-repudiation. Non-repudiation is the prevention of either the sender or the receiver
denying a transmitted message. A system must be able to prove that certain messages were sent
and received.

2.2. Measures to Combat Computer Crimes


The following measures can be used to combat computer crimes:
✓ Install strong doors and locks to computer rooms to prevent computer equipment theft.
✓ Use access control mechanisms that will ensure confidentiality, integrity and availability.
✓ Encrypt confidential data stored in computers or transmitted over communication networks.
✓ Install antivirus software and update it regularly
✓ Install intrusion detection systems to help detect any unauthorized access to the system.
✓ Install firewalls to prevent unauthorized access to local networks.
5. Legislation
Legislation is the act of making and passing laws.Some laws that govern the use of computers
area the Data Protection Act, the Computer Misuse Act, the Copyright, Design and Patent Act,
and the Health and Safety Act.

5.1. The Data Protection Act


It is aimed at protecting the rights of individuals to privacy. Some Data Protection Act rules are:

1. If an organization holds data on individuals, it must be registered under the act.


2. Personal data should be processed fairly and lawfully
3. Personal data should not be disclosed in anyway other than lawfully and within the
registered purpose.
4. Personal data should be adequate and relevant and not excessive for the required purpose.
5. Personal data should be kept accurate and kept up to date
6. Data must be processed in accordance with the right of the data subject
7. Appropriate security measures must be taken against unauthorized access

5.2. The ComputerMisuse Act


This act makes it an offence to access any computer to which you do not have an authorized
right to use. It introduces three criminal offences:
1. Unauthorized access to computer material.
2. Unauthorized access with intent to commit or facilitate commission of further offences.
3. Unauthorized modification of computer material.

5.3. Copyright, Design and Patent Act


This Act is designed to protect all types of intellectual property and ensure that authors or
creators of a piece of work receive both credit and compensation.
4. Computer Ethics
Ethics refers to the principles of right and wrong that individuals, acting as free moral agents, use
to make choices that guide their own behavior. Ethical principles place a value on human acts
according to whether they are good or bad.

Computer ethics refers to standards of good conduct applied within the use of computers.

It defines principles for judging computing acts whether they are good or bad.

✓ Copyrightis a statutory grant that protects original work. Something that is


copyrighted is not to be reproduced, published or copied without permission from
the copyright holder. Ideas are not protected by copyright; only the specific
presentation of the idea is copyrightable.

✓ Designis the appearance or construction of something. A design is not immediately


protected.Itmust be registered with the appropriate institution,

✓ A Patentis a grant to inventors that give them exclusive monopoly over their
invention. It gives them the right to stop others from producing, selling or using
their invention. Unlike copyrights, patents protect the ideas or design of the
invention rather than any tangible form of the invention.
4.1. Fundamental Principlesof ComputerEthics
The fundamental principles of computer ethics formulated by the Computer Ethics Institute
(CEI) as the“ten commandments” of computer ethics are:
1. Thou shall not use a computer to harm other people.
2. Thou shall not interfere with other people’s computer work.
3. Thou shall not snoop around in other people’s files.
4. Thou shall not use a computer to steal.
5. Thou shall not use a computer to bear false witness.
6. Thou shall not copy or use proprietary software for which you have not paid.
7. Thou shall not use other people’s computer resources without authorization or proper
compensation.
8. Thou shall not appropriate other people’s intellectual output.
9. Thou shall think about the social consequences of the program you write or the system
you design.
10. Thou shall use a computer in ways that show consideration and respect for your fellow
humans.
4.3. Netiquette
Netiquette is short for network etiquette. It is a set of rules about acceptable behavior when
communicating over the Internet. Some basic rules of netiquette are:
✓ Avoid flaming i.e. using obscene or inappropriate language in your emails or posts
✓ Avoid using capital letters in your emails/comments, it is considered like YOU ARE
SHOUTING and it is harder to read.
✓ Avoid sloppiness i.e. avoid spelling and grammatical errors. Re-read and edit your
emails/comments before you send/post
✓ Do not send huge file attachments unless they are requested
✓ Always fill the subject field of an email before you send
✓ Do not format your emails with colored text or background color. They may cause them
hard to read.

You might also like