SlideShare une entreprise Scribd logo
1  sur  18
LECTURE#25
YASMIN AFZAAL
Computer and Society
 Impact of Computer in Society
 Computer Ethics
2
Computer and Society
 Everyone knows that this is the age of computer and majority of people are
using computer.
 Development of science and technology has direct effect on our daily life as
well as in our social life.
 Computer technology has made communication possible from one part of
the world to the other in seconds.
 They can see the transactions in one part of the world while staying in the
other part.
 Computer development is one of the greatest scientific achievements of the
20 th century.
 Computers are used in various fields as well as in teaching and learning.
3
Major computer application fields
 An aid to management: The computer can also be
used as a management tool to assist in solving business
problems.
 Banking: Branches are equipped with terminals giving
them an online accounting facility and enabling them to
information as such things as current balances,
deposits, overdrafts and interest charges.
 Industrial Application: In industry, production may be
planned, coordinated and controlled with the aid of a
computer.
 Engineering Design: Computer help in calculating that
all the parts of a proposed design are satisfactory and
also assist in the designing.
 and for payroll and also for check-up and treatment of
diseases.
4
Cont.…
 Meteorology: Data is recorded at different levels of
atmosphere at different places, using remote sensors
carried on a satellite.
 Air Travel: Small computers are installed as a part of
the plane's equipment.
 Road Traffic Control: Computers assist with the
control of traffic lights.
 Telephones: Computerized telephone exchanges
handle an ever increasing volume of calls very
efficiently.
 Medicine: Computers are widely used in hospitals for
such task as maintaining drugs, surgical equipment
 In addition computers are also used for recording and
film studios, research, military, etc.
5
 Computers have both positive and negative impact
in our daily life as well as in our social life.
 But the gross development of the nation is faster
with the application of computers in industries and
education.
6
Positive Impact of Computer
 The work can be done in very less time.
 More information can be stored in small space.
 Multitasking and multiprocessing capabilities of
data.
 Easy to access data.
 Impartiality (equal treatment of all rivals or
disputants; fairness).
 Documents can be kept secret.
 Error free result.
 It can be used for various purposes. i.e. It can be
used in any type of work.
7
Negative Impact of Computer
 Highly expensive.
 Data piracy ( illegal copying, distribution, or use
of software/data).
 Increased Unemployment.
 Huge data and information can be lost
sometimes.
 Fast changing computer technology.
 Service distribution(media content such as audio,
video, software ,shared resources…..)
 Illiteracy( lack of basic computer knowledge) of
computing and computers.
8
Computers have both positive and negative
impact in our society. But the use of computer is
increasing
day-by-day.
9
Computer Ethics
 Computer technology advances from time to time and most probably
will keep advancing in the future. With that, computer ethics will also
keep growing and changing to meet the need of the technology.
 Ethics means a set of moral principles that govern the behaviour
of a group or individual.
 Therefore, computer ethics is set of moral principles that
regulate the use of computers. Some common issues of computer
ethics include intellectual property rights (such as copyrighted
electronic content), privacy concerns, and how computers affect
society.
 Hence, generally, computer ethics is needed to avoid the improper
usage of computer technology and bring justice.
10
Cont.…
 For example,
 while it is easy to duplicate copyrighted electronic
(or digital) content, computer ethics would suggest
that it is wrong to do so without the author's
approval.
 And while it may be possible to access someone's
personal information on a computer system,
computer ethics would advise that such an action is
unethical.
11
Objectives of computer ethics
 To ensure the privacy and safety of the computer users.
 To helps people use the computer in the right ways.
 To guarantee that the works that done by someone did not
declare by other people.
12
Importance of computer ethics
 To protect personal & commercial information such as login & password
info, credit card and account information and government and
commercial databases. It also controls unwanted internet mail and ads
(Spam).
 To control plagiarism, student identity fraud, and the use of copyrighted
material, etc.
 To make ICT (information and communication technologies)available
and accessible to all peoples, including the disabled and the
deprived. Accessibility needs to be kept in mind during curriculum
design (in educational contexts), in order to maximize the capabilities of
the technology.
 To suppress dishonest business practices and to protect and
encourage fair competition.
 To promote moral and social values in society.
13
Problems…
There are several types of activities that against the computer ethics:
1. Stealing funds via computers.
- The one who did this must be very intelligent to manipulate the
computer system and to access into the system.
2. Unauthorized computer entry.
- The perpetrator will steal a company's trade secrets and data and then sell it
to the competitors. This activity involves both property and privacy.
3. Hacking.
- Any computer-related activity which is not sanctioned or approved by owner of
a system or networks.
4. Plagiarism.
- Duplicating copyrighted content without the author's approval and take any
source without credit to the original author.
5. Phishing scam
- Phishing scams are attempts by scammers to trick people into giving out
personal information such as bank account number, passwords and credit card
numbers.
14
.
How to avoid Phishing Scams
 Keep Informed About Phishing Techniques – New phishing scams
are being developed all the time. Without staying on top of these new
phishing techniques, you could inadvertently fall prey to one. Keep
your eyes peeled for news about new phishing scams.
 Think Before You Click! – It’s fine to click on links when you’re on
trusted sites. Clicking on links that appear in random emails and
instant messages, may lead you where they are supposed to lead?
E.g. A phishing email.
 Install an Anti-Phishing Toolbar – Most popular Internet browsers
can be customized with anti-phishing toolbars. Such toolbars run
quick checks on the sites that you are visiting and compare them to
lists of known phishing sites. If you stumble upon a malicious site, the
toolbar will alert you about it.
15
 Verify a Site’s Security – It’s natural to be a little worry about supplying
sensitive financial information online. As long as you are on a secure
website, however, you shouldn’t run into any trouble. Before submitting any
information, make sure the site’s URL begins with “https” and there should
be a closed lock icon near the address bar. Check for the site’s security
certificate as well. If you get a message stating a certain website may
contain malicious files, do not open the website
 Check Your Online Accounts Regularly – If you don’t visit an online account
for a while, someone could be having a field day with it. Even if you don’t
technically need to, check in with each of your online accounts on a regular basis.
Get into the habit of changing your passwords regularly too.. Get monthly
statements for your financial accounts and check each and every entry carefully to
ensure no fraudulent transactions have been made without your knowledge.
 Keep Your Browser Up to Date – Security patches are released for
popular browsers all the time. They are released in response to the security
loopholes that phishers and other hackers inevitably discover and exploit. If
you typically ignore messages about updating your browsers, stop. The
minute an update is available, download and install it.
16
 Use Firewalls – High-quality firewalls act as buffers between you, your
computer and outside intruders. You should use two different kinds: a desktop
firewall and a network firewall. The first option is a type of software, and the
second option is a type of hardware. When used together, they drastically
reduce the odds of hackers and phishers infiltrating your computer or your
network.
 Be Wary of Pop-Ups –they are phishing attempts. Many popular browsers
allow you to block pop-ups; you can allow them on a case-by-case basis. If
one manages to slip through the cracks, don’t click on the “cancel” button;
such buttons often lead to phishing sites. Instead, click the small “x” in the
upper corner of the window.
 Use Antivirus Software –Antivirus software scans every file which comes
through the Internet to your computer. It helps to prevent damage to your
system. You don’t have to live in fear of phishing scams.
 By keeping the preceding tips in mind, you should be able to enjoy a worry-free
online experience.
 Remember there is no single fool-proof way to avoid phishing attacks,
17
 THE END
18

Contenu connexe

Tendances

Basic computer fundamentals
Basic computer fundamentalsBasic computer fundamentals
Basic computer fundamentalsJames Macalalad
 
computers in our everyday lives
computers in our everyday livescomputers in our everyday lives
computers in our everyday livesKeitumetse Mohale
 
Introduction to ICT - lecture 1
Introduction to ICT - lecture 1Introduction to ICT - lecture 1
Introduction to ICT - lecture 1Mohamed Thawuship
 
Personal computer
Personal computer Personal computer
Personal computer Ali Raza
 
Postive & Nagetive impacts & Applications of computer
Postive & Nagetive impacts & Applications of computerPostive & Nagetive impacts & Applications of computer
Postive & Nagetive impacts & Applications of computermanju rani
 
Computer Software and Operating System
Computer Software and Operating SystemComputer Software and Operating System
Computer Software and Operating SystemRupan Sharma
 
Presentation on computer system
Presentation on computer systemPresentation on computer system
Presentation on computer systemAnnavi John
 
Introduction to Computer
Introduction to ComputerIntroduction to Computer
Introduction to ComputerMeg Grado
 
Information Technology
Information TechnologyInformation Technology
Information TechnologyUlduz Sadiq
 
Introduction to computer
Introduction to computerIntroduction to computer
Introduction to computerZunair Aslam
 
Chapter 1 introduction to computers
Chapter 1   introduction to computersChapter 1   introduction to computers
Chapter 1 introduction to computershaider ali
 
Introduction to Information Technology Lecture Slides PPT
Introduction to Information Technology Lecture Slides PPTIntroduction to Information Technology Lecture Slides PPT
Introduction to Information Technology Lecture Slides PPTOsama Yousaf
 
Computer Software & It's types.
Computer Software &  It's types.Computer Software &  It's types.
Computer Software & It's types.Mohit Dhankher
 
Introduction to Information Technology
Introduction to Information TechnologyIntroduction to Information Technology
Introduction to Information TechnologyRa'Fat Al-Msie'deen
 

Tendances (20)

Types of Computers
Types of ComputersTypes of Computers
Types of Computers
 
Basic computer fundamentals
Basic computer fundamentalsBasic computer fundamentals
Basic computer fundamentals
 
what is computer
what is computerwhat is computer
what is computer
 
computers in our everyday lives
computers in our everyday livescomputers in our everyday lives
computers in our everyday lives
 
Introduction to ICT - lecture 1
Introduction to ICT - lecture 1Introduction to ICT - lecture 1
Introduction to ICT - lecture 1
 
Basic Concepts Of Information Technology (It)
Basic Concepts Of Information Technology (It)Basic Concepts Of Information Technology (It)
Basic Concepts Of Information Technology (It)
 
Personal computer
Personal computer Personal computer
Personal computer
 
Storage unit
Storage unitStorage unit
Storage unit
 
Postive & Nagetive impacts & Applications of computer
Postive & Nagetive impacts & Applications of computerPostive & Nagetive impacts & Applications of computer
Postive & Nagetive impacts & Applications of computer
 
Computer Software and Operating System
Computer Software and Operating SystemComputer Software and Operating System
Computer Software and Operating System
 
Presentation on computer system
Presentation on computer systemPresentation on computer system
Presentation on computer system
 
Introduction to Computer
Introduction to ComputerIntroduction to Computer
Introduction to Computer
 
Information Technology
Information TechnologyInformation Technology
Information Technology
 
Introduction to computer
Introduction to computerIntroduction to computer
Introduction to computer
 
Lecture 1 introduction to computing
Lecture 1 introduction to computingLecture 1 introduction to computing
Lecture 1 introduction to computing
 
Chapter 1 introduction to computers
Chapter 1   introduction to computersChapter 1   introduction to computers
Chapter 1 introduction to computers
 
Introduction to Information Technology Lecture Slides PPT
Introduction to Information Technology Lecture Slides PPTIntroduction to Information Technology Lecture Slides PPT
Introduction to Information Technology Lecture Slides PPT
 
Computer Software & It's types.
Computer Software &  It's types.Computer Software &  It's types.
Computer Software & It's types.
 
Social impact of computer ages
Social impact of computer agesSocial impact of computer ages
Social impact of computer ages
 
Introduction to Information Technology
Introduction to Information TechnologyIntroduction to Information Technology
Introduction to Information Technology
 

Similaire à computer and society impact of Computer in society

chapter 5.pptxggggggggggggggggggggggggggg
chapter 5.pptxgggggggggggggggggggggggggggchapter 5.pptxggggggggggggggggggggggggggg
chapter 5.pptxgggggggggggggggggggggggggggadabotor7
 
computer and security
computer and security computer and security
computer and security Sumama Shakir
 
Computer ethics cyber security and technology of it
Computer ethics cyber security and technology of itComputer ethics cyber security and technology of it
Computer ethics cyber security and technology of itsr24production
 
How to stay safe online
How to stay safe onlineHow to stay safe online
How to stay safe onlineHadilAlHaj
 
Business ethics ppt
Business ethics pptBusiness ethics ppt
Business ethics pptWulax37
 
Computer Ethics
Computer EthicsComputer Ethics
Computer EthicsRamki M
 
First Union Bank Report
First Union Bank ReportFirst Union Bank Report
First Union Bank ReportYogesh Kumar
 
Internet Security
Internet SecurityInternet Security
Internet SecurityParv Poddar
 
Target Data Breach Case Study 10242014
Target Data Breach Case Study 10242014Target Data Breach Case Study 10242014
Target Data Breach Case Study 10242014Joseph White MPA CPM
 
What is Network Security?
What is Network Security?What is Network Security?
What is Network Security?Faith Zeller
 
Ethical and security issues on MIS inte 322 assignment.docx
Ethical and security issues on MIS inte 322 assignment.docxEthical and security issues on MIS inte 322 assignment.docx
Ethical and security issues on MIS inte 322 assignment.docxGogoOmolloFrancis
 

Similaire à computer and society impact of Computer in society (20)

chapter 5.pptxggggggggggggggggggggggggggg
chapter 5.pptxgggggggggggggggggggggggggggchapter 5.pptxggggggggggggggggggggggggggg
chapter 5.pptxggggggggggggggggggggggggggg
 
computer and security
computer and security computer and security
computer and security
 
Computer ethics cyber security and technology of it
Computer ethics cyber security and technology of itComputer ethics cyber security and technology of it
Computer ethics cyber security and technology of it
 
Corporate ethics
Corporate ethicsCorporate ethics
Corporate ethics
 
How to stay safe online
How to stay safe onlineHow to stay safe online
How to stay safe online
 
COMPUTER ETHICS.pptx
COMPUTER ETHICS.pptxCOMPUTER ETHICS.pptx
COMPUTER ETHICS.pptx
 
Business ethics ppt
Business ethics pptBusiness ethics ppt
Business ethics ppt
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
First Union Bank Report
First Union Bank ReportFirst Union Bank Report
First Union Bank Report
 
Computer
ComputerComputer
Computer
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
 
Target Data Breach Case Study 10242014
Target Data Breach Case Study 10242014Target Data Breach Case Study 10242014
Target Data Breach Case Study 10242014
 
Cyber Laws
Cyber LawsCyber Laws
Cyber Laws
 
Shailendra Pandey.ppt
Shailendra Pandey.pptShailendra Pandey.ppt
Shailendra Pandey.ppt
 
What is Network Security?
What is Network Security?What is Network Security?
What is Network Security?
 
Nfwordle
NfwordleNfwordle
Nfwordle
 
Hamza
HamzaHamza
Hamza
 
Ethical and security issues on MIS inte 322 assignment.docx
Ethical and security issues on MIS inte 322 assignment.docxEthical and security issues on MIS inte 322 assignment.docx
Ethical and security issues on MIS inte 322 assignment.docx
 
Cyberattacks.pptx
Cyberattacks.pptxCyberattacks.pptx
Cyberattacks.pptx
 

Plus de Sumama Shakir

Chemistry Short Question Notes 9th Exercise full Book
Chemistry Short Question Notes 9th Exercise full BookChemistry Short Question Notes 9th Exercise full Book
Chemistry Short Question Notes 9th Exercise full BookSumama Shakir
 
Chemistry Short Question Notes 9th Exercise full Book
Chemistry Short Question Notes 9th Exercise full BookChemistry Short Question Notes 9th Exercise full Book
Chemistry Short Question Notes 9th Exercise full BookSumama Shakir
 
9th Chemistry Numericals 1st Chapter
9th Chemistry Numericals 1st Chapter9th Chemistry Numericals 1st Chapter
9th Chemistry Numericals 1st ChapterSumama Shakir
 
Chemistry 10th Urdu medium Notes Solved
Chemistry 10th Urdu medium Notes SolvedChemistry 10th Urdu medium Notes Solved
Chemistry 10th Urdu medium Notes SolvedSumama Shakir
 
Chemistry 9th Class Test Yourself Full Book
Chemistry 9th Class Test Yourself Full Book Chemistry 9th Class Test Yourself Full Book
Chemistry 9th Class Test Yourself Full Book Sumama Shakir
 
10th Class Chemistry Urdu Medium Full Book Exercise Short Answers
10th Class Chemistry  Urdu Medium Full Book Exercise Short Answers10th Class Chemistry  Urdu Medium Full Book Exercise Short Answers
10th Class Chemistry Urdu Medium Full Book Exercise Short AnswersSumama Shakir
 
Chemistry 10th in English medium,This book is by Punjab Curriculum and Textbo...
Chemistry 10th in English medium,This book is by Punjab Curriculum and Textbo...Chemistry 10th in English medium,This book is by Punjab Curriculum and Textbo...
Chemistry 10th in English medium,This book is by Punjab Curriculum and Textbo...Sumama Shakir
 
Chemistry 9Th Book, PUNJAB TEXT BOOK
Chemistry 9Th Book, PUNJAB TEXT BOOK Chemistry 9Th Book, PUNJAB TEXT BOOK
Chemistry 9Th Book, PUNJAB TEXT BOOK Sumama Shakir
 
Nitric acid preparation & uses
Nitric acid preparation &  usesNitric acid preparation &  uses
Nitric acid preparation & usesSumama Shakir
 
Nitric acid Preparation & Uses
Nitric acid Preparation & UsesNitric acid Preparation & Uses
Nitric acid Preparation & UsesSumama Shakir
 
Nitric acid Preparation & Uses
Nitric acid Preparation & UsesNitric acid Preparation & Uses
Nitric acid Preparation & UsesSumama Shakir
 
Nitric acid Preparation & Uses
Nitric acid Preparation & UsesNitric acid Preparation & Uses
Nitric acid Preparation & UsesSumama Shakir
 
Nitric acid Preparation & Uses
Nitric acid Preparation & UsesNitric acid Preparation & Uses
Nitric acid Preparation & UsesSumama Shakir
 
Nitric acid Preparation & Uses Raw materials, Flow sheet diagram unit operat...
Nitric acid Preparation & Uses Raw materials, Flow sheet diagram unit operat...Nitric acid Preparation & Uses Raw materials, Flow sheet diagram unit operat...
Nitric acid Preparation & Uses Raw materials, Flow sheet diagram unit operat...Sumama Shakir
 
Nitric acid Preparation & Uses Raw materials, Flow sheet diagram unit operat...
Nitric acid Preparation & Uses Raw materials, Flow sheet diagram unit operat...Nitric acid Preparation & Uses Raw materials, Flow sheet diagram unit operat...
Nitric acid Preparation & Uses Raw materials, Flow sheet diagram unit operat...Sumama Shakir
 
Nitric acid Preparation & Uses
Nitric acid Preparation & UsesNitric acid Preparation & Uses
Nitric acid Preparation & UsesSumama Shakir
 
preparation and uses of nitric acid
preparation and uses of nitric acid preparation and uses of nitric acid
preparation and uses of nitric acid Sumama Shakir
 
Computer and their Uses types of computer
Computer and their Uses types of computer Computer and their Uses types of computer
Computer and their Uses types of computer Sumama Shakir
 
What is Information techology
What is Information techology What is Information techology
What is Information techology Sumama Shakir
 

Plus de Sumama Shakir (20)

Chemistry Short Question Notes 9th Exercise full Book
Chemistry Short Question Notes 9th Exercise full BookChemistry Short Question Notes 9th Exercise full Book
Chemistry Short Question Notes 9th Exercise full Book
 
Chemistry Short Question Notes 9th Exercise full Book
Chemistry Short Question Notes 9th Exercise full BookChemistry Short Question Notes 9th Exercise full Book
Chemistry Short Question Notes 9th Exercise full Book
 
9th Chemistry Numericals 1st Chapter
9th Chemistry Numericals 1st Chapter9th Chemistry Numericals 1st Chapter
9th Chemistry Numericals 1st Chapter
 
Chemistry 10th Urdu medium Notes Solved
Chemistry 10th Urdu medium Notes SolvedChemistry 10th Urdu medium Notes Solved
Chemistry 10th Urdu medium Notes Solved
 
Chemistry 9th Class Test Yourself Full Book
Chemistry 9th Class Test Yourself Full Book Chemistry 9th Class Test Yourself Full Book
Chemistry 9th Class Test Yourself Full Book
 
10th Class Chemistry Urdu Medium Full Book Exercise Short Answers
10th Class Chemistry  Urdu Medium Full Book Exercise Short Answers10th Class Chemistry  Urdu Medium Full Book Exercise Short Answers
10th Class Chemistry Urdu Medium Full Book Exercise Short Answers
 
Chemistry 10th in English medium,This book is by Punjab Curriculum and Textbo...
Chemistry 10th in English medium,This book is by Punjab Curriculum and Textbo...Chemistry 10th in English medium,This book is by Punjab Curriculum and Textbo...
Chemistry 10th in English medium,This book is by Punjab Curriculum and Textbo...
 
Chemistry 9Th Book, PUNJAB TEXT BOOK
Chemistry 9Th Book, PUNJAB TEXT BOOK Chemistry 9Th Book, PUNJAB TEXT BOOK
Chemistry 9Th Book, PUNJAB TEXT BOOK
 
Nitric acid preparation & uses
Nitric acid preparation &  usesNitric acid preparation &  uses
Nitric acid preparation & uses
 
Nitric acid Preparation & Uses
Nitric acid Preparation & UsesNitric acid Preparation & Uses
Nitric acid Preparation & Uses
 
Nitric acid Preparation & Uses
Nitric acid Preparation & UsesNitric acid Preparation & Uses
Nitric acid Preparation & Uses
 
Nitric acid Preparation & Uses
Nitric acid Preparation & UsesNitric acid Preparation & Uses
Nitric acid Preparation & Uses
 
Nitric acid Preparation & Uses
Nitric acid Preparation & UsesNitric acid Preparation & Uses
Nitric acid Preparation & Uses
 
Nitric acid Preparation & Uses Raw materials, Flow sheet diagram unit operat...
Nitric acid Preparation & Uses Raw materials, Flow sheet diagram unit operat...Nitric acid Preparation & Uses Raw materials, Flow sheet diagram unit operat...
Nitric acid Preparation & Uses Raw materials, Flow sheet diagram unit operat...
 
Nitric acid Preparation & Uses Raw materials, Flow sheet diagram unit operat...
Nitric acid Preparation & Uses Raw materials, Flow sheet diagram unit operat...Nitric acid Preparation & Uses Raw materials, Flow sheet diagram unit operat...
Nitric acid Preparation & Uses Raw materials, Flow sheet diagram unit operat...
 
Nitric acid Preparation & Uses
Nitric acid Preparation & UsesNitric acid Preparation & Uses
Nitric acid Preparation & Uses
 
preparation and uses of nitric acid
preparation and uses of nitric acid preparation and uses of nitric acid
preparation and uses of nitric acid
 
Lecture27
Lecture27Lecture27
Lecture27
 
Computer and their Uses types of computer
Computer and their Uses types of computer Computer and their Uses types of computer
Computer and their Uses types of computer
 
What is Information techology
What is Information techology What is Information techology
What is Information techology
 

Dernier

Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...anjaliyadav012327
 
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...Pooja Nehwal
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxShobhayan Kirtania
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 

Dernier (20)

Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptx
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 

computer and society impact of Computer in society

  • 2. Computer and Society  Impact of Computer in Society  Computer Ethics 2
  • 3. Computer and Society  Everyone knows that this is the age of computer and majority of people are using computer.  Development of science and technology has direct effect on our daily life as well as in our social life.  Computer technology has made communication possible from one part of the world to the other in seconds.  They can see the transactions in one part of the world while staying in the other part.  Computer development is one of the greatest scientific achievements of the 20 th century.  Computers are used in various fields as well as in teaching and learning. 3
  • 4. Major computer application fields  An aid to management: The computer can also be used as a management tool to assist in solving business problems.  Banking: Branches are equipped with terminals giving them an online accounting facility and enabling them to information as such things as current balances, deposits, overdrafts and interest charges.  Industrial Application: In industry, production may be planned, coordinated and controlled with the aid of a computer.  Engineering Design: Computer help in calculating that all the parts of a proposed design are satisfactory and also assist in the designing.  and for payroll and also for check-up and treatment of diseases. 4
  • 5. Cont.…  Meteorology: Data is recorded at different levels of atmosphere at different places, using remote sensors carried on a satellite.  Air Travel: Small computers are installed as a part of the plane's equipment.  Road Traffic Control: Computers assist with the control of traffic lights.  Telephones: Computerized telephone exchanges handle an ever increasing volume of calls very efficiently.  Medicine: Computers are widely used in hospitals for such task as maintaining drugs, surgical equipment  In addition computers are also used for recording and film studios, research, military, etc. 5
  • 6.  Computers have both positive and negative impact in our daily life as well as in our social life.  But the gross development of the nation is faster with the application of computers in industries and education. 6
  • 7. Positive Impact of Computer  The work can be done in very less time.  More information can be stored in small space.  Multitasking and multiprocessing capabilities of data.  Easy to access data.  Impartiality (equal treatment of all rivals or disputants; fairness).  Documents can be kept secret.  Error free result.  It can be used for various purposes. i.e. It can be used in any type of work. 7
  • 8. Negative Impact of Computer  Highly expensive.  Data piracy ( illegal copying, distribution, or use of software/data).  Increased Unemployment.  Huge data and information can be lost sometimes.  Fast changing computer technology.  Service distribution(media content such as audio, video, software ,shared resources…..)  Illiteracy( lack of basic computer knowledge) of computing and computers. 8
  • 9. Computers have both positive and negative impact in our society. But the use of computer is increasing day-by-day. 9
  • 10. Computer Ethics  Computer technology advances from time to time and most probably will keep advancing in the future. With that, computer ethics will also keep growing and changing to meet the need of the technology.  Ethics means a set of moral principles that govern the behaviour of a group or individual.  Therefore, computer ethics is set of moral principles that regulate the use of computers. Some common issues of computer ethics include intellectual property rights (such as copyrighted electronic content), privacy concerns, and how computers affect society.  Hence, generally, computer ethics is needed to avoid the improper usage of computer technology and bring justice. 10
  • 11. Cont.…  For example,  while it is easy to duplicate copyrighted electronic (or digital) content, computer ethics would suggest that it is wrong to do so without the author's approval.  And while it may be possible to access someone's personal information on a computer system, computer ethics would advise that such an action is unethical. 11
  • 12. Objectives of computer ethics  To ensure the privacy and safety of the computer users.  To helps people use the computer in the right ways.  To guarantee that the works that done by someone did not declare by other people. 12
  • 13. Importance of computer ethics  To protect personal & commercial information such as login & password info, credit card and account information and government and commercial databases. It also controls unwanted internet mail and ads (Spam).  To control plagiarism, student identity fraud, and the use of copyrighted material, etc.  To make ICT (information and communication technologies)available and accessible to all peoples, including the disabled and the deprived. Accessibility needs to be kept in mind during curriculum design (in educational contexts), in order to maximize the capabilities of the technology.  To suppress dishonest business practices and to protect and encourage fair competition.  To promote moral and social values in society. 13
  • 14. Problems… There are several types of activities that against the computer ethics: 1. Stealing funds via computers. - The one who did this must be very intelligent to manipulate the computer system and to access into the system. 2. Unauthorized computer entry. - The perpetrator will steal a company's trade secrets and data and then sell it to the competitors. This activity involves both property and privacy. 3. Hacking. - Any computer-related activity which is not sanctioned or approved by owner of a system or networks. 4. Plagiarism. - Duplicating copyrighted content without the author's approval and take any source without credit to the original author. 5. Phishing scam - Phishing scams are attempts by scammers to trick people into giving out personal information such as bank account number, passwords and credit card numbers. 14
  • 15. . How to avoid Phishing Scams  Keep Informed About Phishing Techniques – New phishing scams are being developed all the time. Without staying on top of these new phishing techniques, you could inadvertently fall prey to one. Keep your eyes peeled for news about new phishing scams.  Think Before You Click! – It’s fine to click on links when you’re on trusted sites. Clicking on links that appear in random emails and instant messages, may lead you where they are supposed to lead? E.g. A phishing email.  Install an Anti-Phishing Toolbar – Most popular Internet browsers can be customized with anti-phishing toolbars. Such toolbars run quick checks on the sites that you are visiting and compare them to lists of known phishing sites. If you stumble upon a malicious site, the toolbar will alert you about it. 15
  • 16.  Verify a Site’s Security – It’s natural to be a little worry about supplying sensitive financial information online. As long as you are on a secure website, however, you shouldn’t run into any trouble. Before submitting any information, make sure the site’s URL begins with “https” and there should be a closed lock icon near the address bar. Check for the site’s security certificate as well. If you get a message stating a certain website may contain malicious files, do not open the website  Check Your Online Accounts Regularly – If you don’t visit an online account for a while, someone could be having a field day with it. Even if you don’t technically need to, check in with each of your online accounts on a regular basis. Get into the habit of changing your passwords regularly too.. Get monthly statements for your financial accounts and check each and every entry carefully to ensure no fraudulent transactions have been made without your knowledge.  Keep Your Browser Up to Date – Security patches are released for popular browsers all the time. They are released in response to the security loopholes that phishers and other hackers inevitably discover and exploit. If you typically ignore messages about updating your browsers, stop. The minute an update is available, download and install it. 16
  • 17.  Use Firewalls – High-quality firewalls act as buffers between you, your computer and outside intruders. You should use two different kinds: a desktop firewall and a network firewall. The first option is a type of software, and the second option is a type of hardware. When used together, they drastically reduce the odds of hackers and phishers infiltrating your computer or your network.  Be Wary of Pop-Ups –they are phishing attempts. Many popular browsers allow you to block pop-ups; you can allow them on a case-by-case basis. If one manages to slip through the cracks, don’t click on the “cancel” button; such buttons often lead to phishing sites. Instead, click the small “x” in the upper corner of the window.  Use Antivirus Software –Antivirus software scans every file which comes through the Internet to your computer. It helps to prevent damage to your system. You don’t have to live in fear of phishing scams.  By keeping the preceding tips in mind, you should be able to enjoy a worry-free online experience.  Remember there is no single fool-proof way to avoid phishing attacks, 17