0% found this document useful (0 votes)
9 views13 pages

It Midterms

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
9 views13 pages

It Midterms

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 13

CHAPTER 3: DIGITAL TECHNOLOGY Basic Features of Technologies

and SOCIAL CHANGE


Entertainment
INTRODUCTION TO DIGITAL AGE - With the advent of new technologies, the
world of entertainment is constantly
Digital age, also known as Information evolving. Digital broadcasting has
age, is a period when the computer and completely changed the way we
internet were introduced. experience television and radio.

It is caused by rapid shift from traditional - Computer gaming has also been an
industry to computerization all the way to important influence in the development of
artificial intelligence which brought by graphical interfaces.
Industrial Revolution.
- Technology has been at the forefront of
Digital Technology became prevalent and changes in production and distribution of
widely used around the world. Information music.
can be accessed easily specially with the
use of the internet. Business
- The impact of ICT on business is
The ICT and its role in Social Change particularly significant. It empowers people
Information Communications Technology to share knowledge and advice
(ICT) has the power to transform society. instantaneously and set up an online shop
ICT is defined as a group of interrelated or website at a low cost, dramatically
technologies (electronic devices) for lowering the barriers to starting a
accessing, processing, and disseminating business.
information.
- Online platform has been the
- ICTs are indisputably important part of marketplace where people can transact
our social setting today. and communicate.
- The development of a society mostly
depends on the access to information. - It has made social impact affordable,
- (ICTs) are opening a fresh passageways social impact scalable, and enables new
for transforming the way we live, work, ways to connect to and engage with local
learn, communicate and also provides a communities.
strategic opportunities of diverse and
significant social and economic benefits to Education
people across the globe. - ICT is changing the way of the education
delivery system in the world by enhancing
Social change refers to a transformation of access to information for all. It also
culture and social organizations/structures ensures effective and inclusive education.
over time. The social transformations that
could result from the increasing use of - ICT supports the concept of open
ICTs depend strangely on verdicts made learning where the thrust is upon
by organizations and individuals outside enhanced student access and the
our household, many of whom have great development of student autonomy.
economic leverage, political power or
technical expertise.
- Modern ICT tools not only deliver the THEORIES in TECHNOLOGY
content but also replicate formal learning Understanding the Relationship Between
experience via virtual learning. Technology and Society

- ICT also addresses the need of mobile 1. Technological Determinism


learning. 2. Social Constructivism
3. Technological Change
- Digital resources in classrooms can help
prepare students for a digital society and Introduction to Theories of Technology
economy Theories explain how technology and
society influence each other. Three major
Jobs and earnings perspectives:
- The digital transformation has the
potential to generate substantial changes 1. Technological Determinism (Technology
in the composition of the labor market as drives society)
jobs that require certain skillsets are 2. Social Constructivism (Society shapes
replaced by a combination of technology technology)
and higher skilled labor, or even 3. Technological Change (Continuous
completely automated. evolution of technology)

- Digitalization yields opportunities by TECHNOLOGICAL DETERMINISM


creating employment in new and existing It is the theory which strongly believe that
industries, with greater job-to-job mobility technology shapes the culture, values,
facilitated by online job search tools. social structures of a society.

- Digital technologies may destroy jobs at Technological innovation is the cause of


risk of automation the social progress. The technology has
the control over the society --- over human
- Teleworking (Work from Home) allows actions, culture and values. Technology
people to save time and combine their greatly influences human thought and
work and personal lives action.

Health According to Winner, technology is not the


- Digitalization can affect people’s health slave of the human being but rather
status through the emergence of new humans are slaves to technology as they
physical and mental health risks and are forced to adapt to the technological
through its impact on the health-care environment that surrounds them.
delivery system.
Definition: Technology is the main driver of
- An important aspect of digitalization social change.
concerns the production and use of Key Belief: Society must adapt to
medical data to improve the effectiveness technological advancements.
and efficiency of health systems.
Examples of Technological Determinism:


- Extreme use of digital technologies may Content:
have negative mental health effects Printing Press → Rise of Literacy &
Reformation
✅Industrial Revolution → Urbanization & changes in technology leads to an

✅Internet & Social Media → Changing


Factory Work increase in the productivity of labor, capital
and other production factors.
Communication & Politics
The technology is the most powerful
Criticism of Technological Determinism means of wresting power from nature in all
1. Ignores human control over technology. possible ways. It strengthens the facilities
2. Not all technological changes are of man.
inevitable—some face resistance (e.g.,
ethical debates on AI). Innovation → New technology is created.
3. Society adapts technology to fit its Diffusion → Technology spreads across
needs, not just the other way around. society.
Adaptation → People modify behaviors
SOCIAL CONSTRUCTIVISM based on new tech.

✅CDs → MP3s → Streaming Services


Social Constructivism believes that
humans play a main role in shaping

✅Landlines → Mobile Phones →


technology rather than technology shaping (Music Industry)
society.

✅ Cash → Credit Cards → Digital


Smartphones (Communication)
It believes that technology does not
determine human action, but rather, Payments (GCash, Apple Pay) (Finance)
human action shapes the technology.
Criticism of Technological Change
Definition: Society influences how 1. Not all technological change is positive
technology is developed and used. (e.g., job displacement due to
Key Belief: Human decisions, culture, and automation).
needs shape technology. 2. Some people lack access to new
technologies, creating inequalities.


Examples of Social Constructivism;
Telephone Evolution → Business Tool


to Personal Communication Device
Social Media Algorithms → Shaped by


User Preferences & Regulations
Renewable Energy Growth → Pushed
by Society’s Concern for Climate Change

Criticism of Social Constructivism


1. Some technologies develop
independently of societal control (e.g., AI,
space exploration).
2. The government and corporations
influence technology adoption more than
ordinary people.

TECHNOLOGICAL CHANGE
Technological change means the technical
knowledge used in the production of
capital and machinery. The various
CHAPTER4: THE NETIQUETTE and the AVOID SLANG, ACRONYMS, AND TEXT
COMPUTER ETHICS TALK
- Communicating effectively in college and
1.​ Netiquette business environments requires the use of
2.​ Cybercrimes correct terminology, spelling, and grammar
3.​ Internet threats that can easily be understood. For
example, use “your” instead of “ur”.
NETIQUETTE
What is Netiquette? AVOID “SCREAMING” IN TYPED
It’s network etiquette – that is the etiquette MESSAGES
of cyberspace and “etiquette” means the - Typing an entire message using all
forms of required by good breeding or capital letters is known as “screaming”. It
prescribed by authority to be required in is distracting and generally frowned upon
social or official life. in professional environments.

In other words, netiquette is a set of rules - It is better to draw emphasis to selected


for behaving properly online. Netiquette, words or phrases by: using italic or bold
or network etiquette, is concerned with the text; using a different color for text or
"proper" way to communicate in an online background color; or denoting emphasis
environment. using special characters (Example:
**Important**).
When you use e-mail, instant messenger,
video calls, or discussion boards to PROOFREAD YOUR MESSAGES
communicate with others online, please be BEFORE SENDING THEM
sure to follow the rules of professional - Proofreading your messages before you
online communications known as send them is a best practice for effective
netiquette. These rules will help you and efficient communication.
communicate with instructors, classmates,
and potential employers more effectively - Strive to make your communications
and will help prevent misunderstandings concise and free of any:
• Spelling and grammar errors
REMEMBER THE GOLDEN RULE • Confusing terms or phrases that could
- Even though you may be interacting with be misunderstood
a computer screen, you are • Errors of omission, such as missing
communicating with a real person who will content or recipients
react to your message. Make a good • Errors in accuracy of information
impression
EXERCISE GOOD JUDGMENT WHEN
- treat others with the same respect that SHARING INFORMATION WITH
you would like to receive and avoid OTHERS ONLINE
confrontational or offensive language. - E-mail and chat messages that you send
or receive are considered private and
- To help convey meaning when creating should not be forwarded or copied to
messages, it is sometimes acceptable to others without gaining the consent of all
include appropriate emoticon symbols, involved participants. In general,
such as a smiley face :) However, for messages posted to discussion boards
professional communications these would and social media sites can be read by the
be inappropriate. public.
- It is a good practice to always ask a TEN COMMANDMENTS OF COMPUTER
post’s author for permission before ETHICS
sharing a post with other parties. Rule 1: Remember the Human
When communicating electronically,
- To protect your privacy and safety, do not whether through email, instant message,
share online any sensitive personal discussion post, text, or some other
information such as: method, practice the Golden Rule: Do
- Your home address or phone number - unto others as you would have others do
Personal conversations unto you. Remember, your written words
- Social plans, such as vacations - are read by real people, all deserving of
Financial information respectful communication. Before you
- Usernames, passwords, or hints press "send" or "submit," ask yourself,
- Anything personal that you would not "Would I be okay with this if someone else
want shared by others over the Internet had written it?"

- If the material you share with others Rule 2: Adhere to the same standards of
online came from another source, make behavior online that you follow in real life
every effort to gain permission from the While it can be argued that standards of
original author or copyright holder. behavior may be different in the virtual
Copying someone else's work and world, they certainly should not be lower.
passing it off as your own is plagiarism. It You should do your best to act within the
damages your reputation and could laws and ethical manners of society
subject you to serious academic and legal whenever you inhabit "cyberspace."
consequences. Would you behave rudely to someone
face-to-face? On most occasions, no.
RESPECT DIVERSITY IN VIEWPOINTS Neither should you behave this way in the
- Be constructive and respectful when virtual world.
sharing opinions, beliefs, and criticisms, or
responding to those of others in the Rule 3: Know where you are in
conversation. cyberspace
“Netiquette varies from domain to
- When sharing a viewpoint that differs domain.“ (Shea, 1994) Depending on
from someone else’s, it is a best practice where you are in the virtual world, the
to first acknowledge the other person by same written communication can be
briefly restating what he or she said, but in acceptable in one area, where it might be
your own words. This lets the person know considered inappropriate in another. What
that you are listening and trying to you text to a friend may not be appropriate
understand them. in an email to a classmate or colleague.

- When presenting an opinion or criticism, Rule 4: Respect other people's time and
it is helpful to use phrases that identify to bandwidth
whose point of view you are referring. If Electronic communication takes time: time
the opinion is yours, you can begin with to read and time in which to respond. Most
the phrase “In my experience” or “In my people today lead busy lives, just like you
opinion”. If it is a viewpoint of someone do, and don't have time to read or respond
else, make sure you identify that in your to frivolous emails or discussion posts. As
message (Example: “According to Eric a virtual world communicator, it is your
Ericson,” or “The president believes”). responsibility to make sure that the time
spent reading your words isn't wasted. Rule 7: Help keep flame wars under
Make your written communication control
meaningful and to the point, without What is meant by "flaming" and "flame
extraneous text or superfluous graphics or wars?" "Flaming is what people do when
attachments that may take forever to they express a strongly held opinion
download. without holding back any emotion." (Shea,
1994).
Rule 5: Make yourself look good online
writing. While "flaming" is not necessarily
One of the best things about the virtual forbidden in virtual communication, "flame
world is the lack of judgment associated wars," when two or three people exchange
with your physical appearance, sound of angry posts between one another, must
your voice, or the clothes you wear be controlled or the camaraderie of the
(unless you post a video of yourself group could be compromised.
singing Karaoke in a clown outfit.)
Don't feed the flames; extinguish them by
You will, however, be judged by the quality guiding the discussion back to a more
of your writing, so keep the following tips productive direction.
in mind:
- Always check for spelling and grammar Rule 8: Respect other people's privacy
errors Depending on what you are reading in the
- Know what you're talking about and state virtual world, be it an online class
it clearly discussion forum, Facebook page, or an
- Be pleasant and polite email, you may be exposed to some
private or personal information that needs
Rule 6: Share expert knowledge to be handled with care.
The Internet offers its users many
benefits; one is the ease in which Just as you expect others to respect your
information can be shared or accessed privacy, so should you respect the privacy
and in fact, this "information sharing“ of others. Be sure to err on the side of
capability is one of the reasons the caution when deciding to discuss or not to
Internet was founded. So, in the spirit of discuss virtual communication.
the Internet's "founding fathers," share
what you know! Rule 9: Don't abuse your power
Just like in face-to-face situations, there
When you post a question and receive are people in cyberspace who have more
intelligent answers, share the results with "power" than others. They have more
others. expertise in technology or they have years
of experience in a particular skill or subject
Are you an expert at something? Post matter. Maybe it's you who possesses all
resources and references about your of this knowledge and power! Just
subject matter. Recently expanded your remember: knowing more than others do
knowledge about a subject that might be or having more power than others may
of interest to others? Share that as well. have does not give you the right to take
advantage of anyone. Think of Rule 1:
Remember the human.
Rule 10: Be forgiving of other people's to do the same. Copyright infringement is
mistakes the violation, piracy or theft of a copyright
Not everyone has the same amount of holder's exclusive rights through the
experience working in the virtual world. unauthorized use of a copyrighted
And not everyone knows the rules of material or work.
netiquette. At some point, you will see a
stupid question, read an unnecessarily b. Plagiarism
long response, or encounter misspelled An act or instance of using or closely
words; when this happens, practice imitating the language and thoughts of
kindness and forgiveness as you would another author without authorization
hope someone would do if you had
committed the same offense. If it's a minor c. Computer Addiction
"offense," you might want to let it slide. If • Offline: generally used when speaking
you feel compelled to respond to a about excessive gaming behavior, which
mistake, do so in a private email rather can be practiced both offline and online.
than a public forum. • Online: Also known as “Internet
Addiction”, gets more attention in general
CYBERCRIMES from scientific research than offline
What is Cyber? computer addiction, mainly because most
It is the Characteristics of the culture of cases of computer addiction are related to
computers, information, technology and the excessive use of the Internet.
virtual reality. *Virtual Self -The persona you create
Cybercrime is defined as a crime in which about yourself virtually.
a computer is the object of the crime
(hacking, phishing, spamming and child CRIMINAL ACTIVITIES
pornography) is used as a tool to commit a. Hacking
an offense. b. Computer-related forgery, fraud and/or
Cybercriminals may use computer identity theft
technology to access personal c. Electronic theft
information, business trade secrets or use d. Cyberbullying
the internet for exploitative or malicious e. Cybersex
purposes. f. Child Pornography
Republic Act No. 10175 Cybercrime g. Cyber Defamation
Prevention Act of 2012 is a law in the
Philippines approved on September a. Hacking
12,2012 which aims to address legal • Unauthorized access of or interference
issues concerning online interactions and with computer systems, servers, or other
internet. information and communication systems
Republic Act No. 10173 Data Privacy Act • Unauthorized access to corrupt, alter,
of 2012 is an act protecting individual steal, or destroy electronic data using
personal information. computers or other information and
communication systems without the
COMMON FORMS OF CYBERCRIMES computer or system owner’s knowledge
a. Copyright and consent
The exclusive legal right, given to an • The introduction of computer viruses
originator or an assignee to print, publish, resulting in the corruption, alteration, theft,
perform, film, or record literary, artistic, or or loss of such data
musical material, and to authorize others • Illegal Access
• Illegal Interception of any lascivious exhibition of sexual
• Data Interference organs or sexual activity with the aid of a
• System Interference computer system for favor or
• Misuse of Devices consideration.
• Infection of IT Systems with Malware – if • There is a discussion on this matter if it
the act is committed against critical involves “couples” or “people in
infrastructure of the Philippines the, relationship” who engage in cybersex.
penalty is between 12-20 years reclusion • Penalty at least Php 200,000 and or
temporal prison mayor
• Six years up to twelve years of
imprisonment also known as prison mayor f. Child Pornography
• Is a form of child sexual exploitation.
b. Computer-related forgery, fraud and/or • Unlawful or prohibited acts defined and
identity theft punishable by Republic Act No. 9775 or
• An attempt to obtain sensitive the Anti- Child Pornography Act of 2009,
information such as usernames, committed through a computer system.
passwords, and credit card details and • Penalty of 12-20 years of imprisonment
(indirectly money), often for malicious or reclusion temporal
reasons.
• Phishing g. Cyber Defamation
• Pharming • Is an unprivileged false statement of fact
• Spam which tends to harm the reputation of a
• Maximum of Php 200,000 fine or prison person or company.
mayor. • Penalty of 6-12 years of imprisonment or
prison mayor.
c. Electronic theft
• Illegal Downloading INTERNET THREATS
• Obtaining files that you do not have the Hacking
right to use from the internet. is a term used to describe actions taken
• Digital Piracy by someone to gain unauthorized access
• Practice of illegally copying and selling to a computer. The availability of
digital music, video, computer software, information online on the tools,
etc. techniques, and malware makes it easier
• Copyright Infringement for even non-technical people to
• Penalty of Php 50,000 – 500, 000 and or undertake malicious activities. The
prison mayor process by which cyber criminals gain
access to your computer
d. Cyberbullying
• The use of electronic communication to What it can do:
bully a person, typically by sending a • Find weaknesses (or pre-existing bugs)
message of an intimidating or threatening in your security settings and exploit them
nature. in order to access your information.
• The Anti-Bullying Act of 2013 (RA • Install a Trojan horse, providing a back
10627) door for hackers to enter and search for
your information.
e. Cybersex
• Willful engagement, maintenance,
control, or operation, directly or indirectly
Malware What it can do:
is one of the more common ways to • Trick you into giving them information by
infiltrate or damage your computer. asking you to update, validate or confirm
Malicious software that infects your your account. It is often presented in a
computer, such as computer viruses, manner than seems official and
worms, Trojan horses, spyware, and intimidating, to encourage you to take
adware. action.
• Provides cyber criminals with your
What it can do: username and passwords so that they can
• Intimidate you with scareware, which is access your accounts (your online bank
usually a pop-up message that tells you account, shopping accounts, etc.) and
your computer has a security problem or steal your credit card numbers.
other false information.
• Reformat the hard drive of your Ransomware
computer causing you to lose all your is a type of malware that restricts access
information. to your computer or your files and displays
• Alter or delete files. a message that demands payment in
• Steal sensitive information. order for the restriction to be removed.
• Send emails on your behalf. The two most common means of infection
• Take control of your computer and all the appear to be phishing emails that contain
software running on it. malicious attachments and website pop-up
advertisements.
Pharming
is a common type of online fraud. A What it can do:
means to point you to a malicious and • There are two common types of
illegitimate website by redirecting the ransomware:
legitimate URL. Even if the URL is entered • Lockscreen ransomware: displays an
correctly, it can still be redirected to a fake image that prevents you from accessing
website. your computer
• Encryption ransomware: encrypts files
What it can do: on your system's hard drive and
• Convince you that the site is real and sometimes on shared network drives, USB
legitimate by spoofing or looking almost drives, external hard drives, and even
identical to the actual site down to the some cloud storage drives, preventing you
smallest details. You may enter your from opening them
personal information and unknowingly • Ransomware will display a notification
give it to someone with malicious intent. stating that your computer or data have
been locked and demanding a payment
Phishing be made for you to regain access.
is used most often by cyber criminals Sometimes the notification states that
because it's easy to execute and can authorities have detected illegal activity on
produce the results they're looking for with your computer, and that the payment is a
very little effort. Fake emails, text fine to avoid prosecution.
messages and websites created to look
like they're from authentic companies. • Do not pay the ransom. These threats
They're sent by criminals to steal personal are meant to scare and intimidate you,
and financial information from you. This is and they do not come from a law
also known as “spoofing”. enforcement agency. Even if you submit
payment, there is no guarantee that you What it can do:
will regain access to your system. • Collect information about you without
• If your computer has been infected (i.e. you knowing about it and give it to third
you are unable to access your computer parties.
or your files have been encrypted), contact • Send your usernames, passwords,
a reputable computer technician or surfing habits, list of applications you've
specialist to find out whether your downloaded, settings, and even the
computer can be repaired and your data version of your operating system to third
retrieved. parties.
• In order to lessen the impact of a • Change the way your computer runs
ransomware infection, be sure to regularly without your knowledge.
back-up your data with a removable • Take you to unwanted sites or inundate
external storage drive. It's possible that you with uncontrollable pop-up ads.
your files might be irretrievable; having an
up-to-date backup could be invaluable. Trojan Horses
A Trojan horse may not be a term you're
Spam familiar with, but there's a good chance
is one of the more common methods of you or someone you know has been
both sending information out and affected by one. A malicious program that
collecting it from unsuspecting people. is disguised as, or embedded within,
The mass distribution of unsolicited legitimate software. It is an executable file
messages, advertising or pornography to that will install itself and run automatically
addresses which can be easily found on once it's downloaded.
the Internet through things like social
networking sites, company websites and What it can do:
personal blogs. • Delete your files.
• Use your computer to hack other
What it can do: computers.
• Annoy you with unwanted junk mail. • Watch you through your web cam.
• Create a burden for communications • Log your keystrokes (such as a credit
service providers and businesses to filter card number you entered in an online
electronic messages. purchase).
• Phish for your information by tricking you • Record usernames, passwords and
into following links or entering details with other personal information.
toogood- to-be-true offers and promotions.
• Provide a vehicle for malware, scams, Wi-Fi Eavesdropping
fraud and threats to your privacy WiFi eavesdropping is another method
used by cyber criminals to capture
Spyware (Spyware & Adware) personal information. Virtual “listening in”
Spyware and adware are often used by on information that's shared over an
third parties to infiltrate your computer. unsecure (not encrypted) WiFi network.
Software that collects personal information
about you without you knowing. They What it can do:
often come in the form of a ‘free' download • Potentially access your computer with
and are installed automatically with or the right equipment.
without your consent. These are difficult to • Steal your personal information including
remove and can infect your computer with logins and passwords
viruses.
What they can do: caused by Adware that has been installed
• Spread to everyone in your contact list. on your computer).
• Cause a tremendous amount of damage • Web pages are slow to load.
by shutting down parts of the Internet, • Your computer screen looks distorted.
wreaking havoc on an internal network • Programs are running without your
and costing companies’ enormous control.
amounts of lost revenue. • If you suspect a problem, make sure
your security software is up to date and
Viruses run it to check for infection. If nothing is
Most people have heard of computer found, or if you are unsure of what to do,
viruses, but not many know exactly what seek technical help.
they are or what they do. Malicious
computer programs that are often sent as
an email attachment or a download with
the intent of infecting your computer, as
well as the computers of everyone in your
contact list. Just visiting a site can start an
automatic download of a virus.

What they can do:


• Send spam.
• Provide criminals with access to your
computer and contact lists.
• Scan and find personal information like
passwords on your computer.
• Hijack your web browser.
• Disable your security settings.
• Display unwanted ads.
• When a program is running, the virus
attached to it could infiltrate your hard
drive and also spread to USB keys and
external hard drives. Any attachment you
create using this program and send to
someone else could also infect them with
the virus.

How will you know if your computer is


infected? Here are a few things to check
for:
• It takes longer than usual for your
computer to start up, it restarts on its own
or doesn't start up at all.
• It takes a long time to launch a program.
• Files and data have disappeared.
• Your system and programs crash
constantly.
• The homepage you set on your web
browser is different (note that this could be
CHAPTER5: COMPUTERIZED and - More productive
NON-COMPUTERIZED SYSTEM
INDUSTRY
1.​ Computer system NON-COMPUTERIZED
2.​ Banking System - Production was slow because it is all
3.​ Industry done manually and depended on human
4.​ E-commerce labor

COMPUTER SYSTEM COMPUTERIZED


A system is an arrangement of elements - Production is fast and profitable: It can
that when it is put together it becomes an be increased through an all day operation.
organized and established procedure. A
system typically consists of components COMMERCE
connected to facilitate the flow of Commerce is an activity of exchanging,
information, matter, or energy. A computer buying, and selling commodities on a
system consists of a set of hardware and large-scale involving transportation from
software which processes data in a place to place.
meaningful way.
NON-COMPUTERIZED
EDUCATION - Trading was made using the barter
Education is the science of teaching and system and it was then later developed
learning specific skills. It also imparts into currency.
knowledge, good judgment, and wisdom. - The advertisement was in the form of
word of a mouth, billboards and printed
NON - COMPUTERIZED flyers.
Teachers use chalks, and talk for teaching, - Trading globally was extremely slow,
forum and conferences. late, and expensive. Traders had to find
ways to market local products in the global
COMPUTERIZED market.
Teachers use computers to do research
for teaching materials, participate in online COMPUTERIZED
forums and online conferences. - E-commerce plays an important role in
the economic scene. It includes
BANKING SYSTEM distribution, buying, selling and servicing
NON-COMPUTERIZED products that are done electronically.
- Banking system was done manually.
- Transactions can only be made during ADVANTAGES and DISADVANTAGES
working hours OF COMPUTERIZED SYSTEM
- It takes long time for any banking
process ADVANTAGES OF COMPUTERIZED
- Less productive SYSTEM
- All banking activities are done by using
COMPUTERIZED computer system.
- All banking activities are done using - Transactions can be done anywhere and
computer system anytime
- Transaction is anywhere, anytime - It takes shorten time for any banking
- Banking process – shorten times process
- Online services, credit cards available - More productive
DISADVANTAGES OF COMPUTERIZED
SYSTEM
- Cost of computerized system is very
high.
- High cost of maintenance
- The system can be infected by viruses
- Member of workers have to be reduce as
they are no longer needed

THE IMPACT OF ICT ON SOCIETY


POSITIVE IMPACT
- Faster communication speed
- Lower communication cost
- Can share opinions and information
- Paperless environment
- Information & communication can be
borderless

NEGATIVE IMPACT
- Computers can harm users
- Borderless information can be negative.

You might also like