0% found this document useful (0 votes)
20 views19 pages

Chapter - 6 Effect of Ict

The document discusses the differences between analogue and digital data, highlighting that computers process only digital data while real-world measurements are analogue. It also explores the impact of ICT on society, including software copyright issues, security concerns, and the effects of online shopping and banking. Additionally, it addresses the implications of microprocessor-controlled devices in households and the reliability of information found on the internet.

Uploaded by

levi makokha
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
20 views19 pages

Chapter - 6 Effect of Ict

The document discusses the differences between analogue and digital data, highlighting that computers process only digital data while real-world measurements are analogue. It also explores the impact of ICT on society, including software copyright issues, security concerns, and the effects of online shopping and banking. Additionally, it addresses the implications of microprocessor-controlled devices in households and the reliability of information found on the internet.

Uploaded by

levi makokha
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 19

ANALOGUE AND DIGITAL DATA(cont’ Ch 5)

Computers work with digital data, which consists of discrete, fixed values in a
given range. However, real-world physical measurements are analogue,
meaning they are continuously variable, producing an infinite number of values
within a given range.

Examples of Analogue Data:

• Length

• Weight

• Temperature

• Pressure

These values are measured using an analogue device, which represents data
on a continuous analogue scale.

Figure below shows examples of Analogue Devices

➢ A speedometer, which represents speed using a pointer on a dial.

➢ A thermometer, which represents temperature using the height of the


liquid column.

Analogue Data and Sensors

❖ Analogue data is measured using sensors, which are widely used in


control and monitoring applications.

❖ Computers cannot directly process analogue data, as they only


understand digital data.

❖ To enable computers to process analogue data, it must be converted into


digital format using an Analogue to Digital Converter (ADC).
Digital to Analogue Conversion (DAC)

❖ If a computer is used to control a device, such as a motor or a valve, it


may need to output analogue signals.

❖ Since computers only output digital signals, these signals must be


converted into an analogue signal using a Digital to Analogue Converter
(DAC).

Example of a Control System

A furnace control system is used to demonstrate both ADC and DAC


conversions.

Figure below shows a control System for a Furnace

Illustration:

A sensor measuring the temperature inside the furnace.

The analogue temperature reading is sent to an ADC, which converts it


into digital data.

The digital data is processed by a computer, which compares it to a


stored temperature value.

If the temperature is too low or too high, the computer sends a digital
signal.

The digital signal is converted into an analogue signal using a DAC.

The analogue signal is sent to a valve, which regulates the gas supply to
control furnace temperature.
Ch 6: THE EFFECTS OF USING ICT
This chapter explores the impact of ICT in various areas, including:

a) Software copyright rules

b) Viruses and hacking

Definitions

Ways of protecting systems

c) Effects of ICT on society

Employment

Social impact

Online shopping and banking

Policing of the internet

Use of microprocessors in household appliances

d) Information from the internet

Reliability of data

Risks of undesirable websites

Security (phishing, pharming, spam)

Internet developments (blogs, wikis, social networking)

e) Health and safety issues

Introduction

ICT has greatly influenced daily life, bringing both benefits and challenges.
Some effects include:

a. Changes in employment types and styles

b. Increased convenience through online banking and shopping

c. New problems such as:

i. Software copyright issues


ii. Security concerns (for individuals and companies)

iii. Health and safety risks

SOFTWARE COPYRIGHT

Software is protected by copyright laws, similar to books, films, and CDs. When
software is supplied on CD or DVD, certain rules must be followed:

Illegal actions include,

i. Copying software and selling or giving it away.

ii. Using software on multiple devices without a proper license.

iii. Using copyrighted code in personal software without permission.

iv. Renting software without authorization.

v. Using the name of copyrighted software on another product


without agreement.

PIRACY AND SOFTWARE PROTECTION

Piracy (illegal copying of software) is a serious concern. Companies take various


steps to prevent this, including:

i. Key reference numbers: Users must enter a unique code during


installation.

ii. License agreements: Users must accept terms before installation


continues.

iii. Hologram labels: Indicate genuine copies of software.

iv. CD/DVD checks: Some software requires the original disc to run.

v. Dongles: Some software will only function if a dongle is connected to a


USB port.
VIRUSES AND HACKING

Viruses

A virus is a program that replicates itself and is designed to harm a computer. It


spreads by attaching to files and can cause:

a) Crashes (the system stops functioning normally).

b) Loss of files (important system files may be deleted).

c) Data corruption (stored information becomes unusable).

How Viruses Spread

a) Email attachments

b) Illegal or infected software downloads

c) Internet downloads from unsafe sources

Protection Against Viruses

a) Use updated antivirus software to detect and remove viruses.

b) Avoid illegal software and unknown CDs/DVDs.

c) Download software only from reputable sites.

d) Use firewalls to prevent malware entry.

Hacking

Hacking is the act of gaining unauthorized access to a system. Hackers may:

a) Edit or delete files.

b) Install harmful software.

c) Execute unauthorized files.

d) Commit fraud.

❖ Some companies hire ethical hackers to test system security. However,


disconnecting a computer from the internet is the only foolproof way to
prevent hacking—though it is often impractical.
Protection Against Hacking

a) Firewalls: Control incoming/outgoing traffic, prevent malicious file


transfers, and block unauthorized access.

b) Strong passwords & user IDs: Prevent unauthorized logins.

c) Encryption: Makes files unreadable to unauthorized users (but does not


stop hacking itself).

EFFECTS OF ICT ON SOCIETY

Social Divide

a. The development of ICT has created a social divide between:

i. The "haves" (those with ICT skills or financial resources to access


technology).

ii. The "have-nots" (those who lack access to technology).

b. This divide continues to grow, leaving the disadvantaged further behind.

Impact on Employment

Job Losses Due to ICT

❖ ICT has replaced manual labor in many industries:

a. Manufacturing: Robots now perform tasks such as paint spraying in


car factories.

b. Warehousing: Automated, computer-controlled warehouses


reduce the need for workers.

c. Labour-intensive work: Jobs in industries like printing, where ICT now


handles data processing and file management.

New Job Creation

❖ Despite job losses, ICT has created new opportunities:

a. Software development: Writing and maintaining software programs.


b. Robot maintenance: Overseeing automated systems and
machinery.

c. Website management: Setting up and maintaining online


businesses.

Workplace Changes Due to ICT

a. Workers need retraining to operate and maintain ICT systems.

b. Cleaner and safer work environments as robots handle dangerous or dirty


tasks.

c. De-skilling of workers: High-skill jobs are now done by computers, e.g.,:

✓ DTP (Desktop Publishing) software in printing.

✓ CAD (Computer-Aided Design) software in engineering.

Benefits for Companies

a. Reduced labor costs: Fewer employees needed.

b. Higher productivity: Robots work without breaks, holidays, or sick days.

c. Consistency in production: Every item produced is identical.

IMPACT OF ICT ON ONLINE SHOPPING AND BANKING

❖ Traditional jobs in shops and banks are declining due to automation.

❖ New job roles in online services have emerged, such as:

a. Order processing

b. Customer service for online transactions

Advantages of Online Shopping and Banking

a. Convenience: No need to travel to the city center, reducing


transportation costs, pollution, and congestion.

b. Access to a global market: Consumers can compare prices and buy from
anywhere in the world.

c. Improved accessibility: Disabled and elderly people can shop or bank


without leaving home.
d. 24/7 Availability: Online services operate at all hours.

e. More free time: People can spend time on other activities instead of
visiting physical stores.

Disadvantages of Online Shopping and Banking

a. Social isolation: People may become less socially active.

b. Health risks: Potential physical and mental health issues.

c. Security concerns:

✓ Hacking and identity theft.

✓ Phishing, pharming, and online fraud.

d. Requirements for access:

✓ Need for a computer and internet connection.

✓ Possible additional costs (broadband, software, etc.).

e. Product inspection issues:

✓ Inability to see or try items before purchase.

✓ Longer delivery times.

f. Risk of reduced physical activity: Less movement due to reliance on online


services.

g. High street business closures: Many physical stores are shutting down,
leading to "ghost towns."

EFFECTS ON COMPANIES DUE TO THE SPREAD OF ONLINE SHOPPING AND


BANKING

❖ The growth of ICT has significantly affected companies and organizations


in various ways:

Advantages for Companies

a. Cost Savings: Fewer staff are needed since many interactions are
automated.
b. Wider Customer Base: The internet's global reach allows companies to
attract more customers.

Disadvantages for Companies

a. New Costs: Companies must invest in re-training staff and hiring more
employees for dispatch departments.

b. Website Maintenance Costs: Setting up and maintaining e-commerce


and online banking platforms requires financial investment.

c. Loss of Customer Loyalty: The lack of personal service and direct


interaction with customers may result in reduced customer retention.

Should the Internet Be Policed?

❖ This is a long-debated issue with strong arguments for and against internet
regulation.

Arguments in Favor of Internet Control

i. Prevention of Harmful Content: Helps stop the spread of illegal, racist,


prejudiced, or terrorist-promoting material.

ii. Limits Access to Dangerous Information: Prevents people from easily


finding information on hacking, bomb-making, etc.

iii. Protecting Children and Vulnerable Groups: Ensures they are not exposed
to inappropriate or harmful content.

iv. Improved Information Accuracy: Since anyone can publish online, control
could reduce misinformation.

Arguments Against Internet Control

i. Availability from Other Sources: Harmful material is already accessible


through books and other media.

ii. High Costs of Regulation: Policing all websites would be expensive.

iii. Difficulty in Enforcement: Implementing regulations globally would be


challenging.

iv. Threat to Freedom of Information: Controlling online content could lead to


censorship.
v. Existing Laws: Many harmful activities online are already illegal, and laws
exist to address them.

MICROPROCESSOR-CONTROLLED DEVICES IN THE HOME

❖ Modern household devices use microprocessors to control functions and


improve efficiency.

Types of Microprocessor-Controlled Devices:

a) Labour-Saving Devices

Examples: Automatic washing machines, microwave ovens, ovens,


dishwashers.

b) Other Household Devices

Examples: TVs, hi-fi systems, fridges/freezers, central heating systems.

These are not labour-saving but are enhanced with microprocessors


for better control.

Advantages of Microprocessor-Controlled Devices

a) Increased Leisure Time: Devices handle tasks automatically.

b) More Time for Social Activities: People have more freedom to go out and
socialize.

c) Advanced Technology: Devices are becoming more sophisticated, using


embedded web technology.

Disadvantages of Microprocessor-Controlled Devices

a) Unhealthy Lifestyles: People may rely too much on automated food


preparation (e.g., TV dinners).

b) Encourages Laziness: Overdependence on automation may reduce


physical activity and engagement in household tasks.
INFORMATION FROM THE INTERNET

❖ This section examines the quality of information found on the internet


when using search engines. The key aspects considered are:

a. Reliability of Information

b. Undesirability of Certain Websites

c. Security Issues

d. Other Internet Issues

Reliability of Information

❖ Internet information is often more up-to-date than books since websites


can be updated quickly.

❖ Easier access to information through search engines, which link relevant


keywords.

❖ A vast amount of information is available, making it easier to locate data


than searching books manually.

❖ Some information online may be incorrect, inaccurate, or biased, as it


does not go through a strict verification process.

❖ Information overload can occur, where users receive too many search
results, making it difficult to find relevant data.

Undesirability of Certain Websites

❖ Users risk encountering undesirable websites containing inappropriate or


harmful content.

❖ Fake or doubtful websites exist, which may contain misleading information


or security threats.

❖ Security risks are a major concern, leading to potential cyber threats


(discussed in the security section).

Security Issues

Security concerns related to internet use include viruses, hacking, phishing,


pharming, spam, and spyware.
Phishing

❖ A type of fraudulent email scam designed to steal personal and financial


information.

❖ Attackers send emails pretending to be from legitimate organizations


(e.g., banks).

❖ When users click on links in phishing emails, they are directed to spoof
websites where their personal details are stolen.

❖ Prevention: Many ISPs filter phishing emails, but users should always be
cautious of emails requesting personal information.

Pharming

❖ A scam involving malicious code that redirects users to fake websites


without their knowledge.

❖ Unlike phishing, pharming does not require email interactions and affects
a large number of users.

❖ Process of pharming:

✓ A hacker/pharmer infects a computer with a virus via email,


software installation, or website visits.

✓ The virus modifies the system, redirecting users to fraudulent


websites when they try to visit genuine ones.

✓ Users unknowingly enter their sensitive information, which is stolen.

✓ Prevention: Anti-spyware, anti-virus, and anti-pharming software


can detect and remove threats.

Spam

❖ Unwanted junk emails sent by companies or hackers, often as


advertisements.

❖ Spam can:

✓ Slow down networks

✓ Overload email inboxes

✓ Contain security threats (e.g., malware)


❖ Prevention: Many ISPs filter spam, but users must monitor their email
settings to prevent legitimate messages from being marked as spam.

Spyware

❖ Malicious software that secretly gathers user data through network


connections.

❖ Once installed, spyware:

✓ Records keystrokes and sends data to hackers.

✓ Installs other malware and modifies browser settings.

✓ Changes homepages or search engines to fraudulent sites.

❖ Prevention: Anti-spyware programs can detect and remove spyware


infections.

Other Internet Issues

While not necessarily security threats, the following internet issues can be
nuisances to users.

Cookies

✓ Small files stored on a user’s computer when visiting websites.

✓ They store user preferences and login details to improve browsing


experience.

✓ Examples of how cookies function:

Remember login details for personalized greetings.

Track buying habits and display related advertisements.

✓ Concerns: Some users worry about privacy and unwanted tracking of


their online activity.

INTERNET DEVELOPMENTS

❖ The internet has evolved significantly since its inception and continues to
develop. This section covers some of the latest advancements in how the
internet is used.
Web 2.0

Web 2.0 refers to the second generation of internet development and design. It
introduced new web-based communication, applications, and hosted servers.
Key examples include:

➢ Blogs

➢ Wikis

➢ Digital media sharing websites

➢ Social networking sites

➢ Folksonomies

Blogs

❖ Dfn:Short for web logs, blogs are personal internet journals where
individuals (bloggers) share their observations, opinions, or links to other
relevant websites.

❖ Accessibility: No training is required to start a blog.

❖ Uses: Blogs range from casual topics (celebrity gossip, personal


experiences) to serious discussions (politics, product reviews, event
awareness).

❖ Legal Concerns: Bloggers are not immune to the law and can face legal
action if they post offensive or defamatory statements.

Wikis

❖ Definition: The word ‘wiki’ comes from a Hawaiian term meaning ‘fast’.
Wikis are collaborative online platforms allowing users to create and edit
web pages easily.

❖ Features:

Support hyperlinks

Use simple syntax

Often described as ‘web pages with an edit button’


❖ Caution: As anyone can edit a wiki, the information may not always be
accurate or reliable.

❖ Example: Wikipedia is one of the most well-known wikis.

Digital Media Sharing Websites

❖ Dfn:Websites that allow users to upload and share media files such as
videos, images, and music.

❖ Functionality:

a. Media is stored on a server.

b. Websites provide code snippets to embed media on other


platforms.

❖ Popularity: These websites have grown significantly because users lack


unlimited storage space.

❖ Example: YouTube is a leading digital media-sharing platform.

Social Networking Sites

❖ Platforms that connect users with similar interests and activities.

❖ Common Uses:

i. Share photos, videos, music, and personal updates.

ii. Post messages on bulletin boards.

iii. Communicate with friends and groups.

❖ Examples: Facebook and MySpace.

❖ Impact: Social networking has become a modern way to interact


globally, especially among young people.

Folksonomies

❖ A system of user-generated tagging that helps categorize and organize


content.
❖ Relation to Social Bookmarking: Users can tag web pages with relevant
words to describe content.

❖ Visual Representation: Tag clouds, where larger fonts indicate more


frequently used tags.

❖ Example: Flickr uses folksonomies for photo organization.

HEALTH AND SAFETY ISSUES

❖ Regular use of computers can lead to various health and safety concerns.

Health Issues

Focus: Preventing illness or negative health effects caused by prolonged


computer use.

Regulations: Computer workstations should include:

a. Tiltable and anti-glare screens

b. Adjustable chairs and foot supports

c. Suitable lighting

d. Uncluttered workstations

e. Frequent breaks and eye tests

Safety Issues

❖ Focus: Preventing serious injuries or life-threatening dangers related to


computer use.

❖ Distinction from Health Issues: Safety involves risks such as electrical


hazards, while health focuses on physical well-being.

HEALTH ASPECTS

Back and Neck Problems/Strain

❖ Causes: Poor posture when using a computer for long periods.


❖ Solutions:

a. Use fully adjustable chairs to support proper posture.

b. Use footrests to prevent slouching.

c. Use tiltable screens to keep the neck at the correct angle.

Repetitive Strain Injury (RSI) – Damage to Fingers and Wrists

❖ Causes: Repeated movements while using a mouse or keyboard.

❖ Solutions:

a. Maintain correct posture (e.g., correct arm position).

b. Use a wrist rest when typing or using a mouse.

c. Take regular breaks and engage in hand exercises.

d. Use ergonomic keyboards that reduce strain.

e. Consider voice-activated software for users prone to RSI.

Eyestrain (Caused by Staring at a Computer Screen for Too Long or Bad Lighting)

❖ Causes: Screen glare, flickering, and poor lighting conditions.

❖ Solutions:

a. Ensure no screen flicker by adjusting refresh rates.

b. Switch to LCD screens, which have less flicker than CRT monitors.

c. Take regular breaks and focus on distant objects.

d. Use anti-glare screens or window blinds to reduce glare.

e. Get regular eye tests and use middle-vision glasses if necessary.

Headaches

❖ Causes: Screen glare, poor lighting, and prolonged computer use.

❖ Solutions:
a. Use an anti-glare screen or window blinds to cut out reflections.

b. Take frequent breaks and exercise.

c. Have eyes tested regularly to ensure proper vision correction.

Ozone Irritation (Dry Skin, Respiratory Problems)

❖ Causes: Ozone gas emitted from laser printers.

❖ Solutions:

a. Ensure proper ventilation to remove ozone gas.

b. Place laser printers in a designated printer room.

c. Switch to inkjet printers if ozone irritation is a persistent problem.

SAFETY ASPECTS

Table 6.4 outlines key safety hazards in computer environments and solutions to
minimize risks.

1. Electrocution

❖ Causes: Faulty wiring, damaged insulation, or spills near electrical


equipment.

❖ Solutions:

a. Use a residual circuit breaker (RCB) to prevent electrical surges.

b. Regularly check insulation on wires.

c. Keep drinks away from computers to avoid spills.

d. Conduct frequent equipment checks to detect faults early.

Trailing Wires (Trip Hazard)

❖ Causes: Unorganized cables lying across the floor.

❖ Solutions:
a. Use cable ducts to manage and secure wires.

b. Keep cables neatly tucked away under desks.

c. Use wireless technology where possible to reduce cables.

Heavy Equipment Falling

❖ Causes: Unstable positioning of heavy computer hardware.

❖ Solutions:

a. Use strong desks and tables to support hardware.

b. Ensure hardware is not placed near the edges of desks.

Fire Risk

❖ Causes: Overheating hardware, overloaded sockets, and poor


ventilation.

❖ Solutions:

a. Keep a CO2 or dry fire extinguisher nearby (NOT a water


extinguisher).

b. Do not cover vents, as it can lead to overheating.

c. Regularly maintain and inspect hardware.

d. Ensure good ventilation in rooms to prevent heat buildup.

e. Avoid overloading sockets with too many devices.

f. Switch to low-voltage hardware (e.g., replace CRT monitors with


LCD monitors).

-End chapter 6-

You might also like