Transcript kjjhghgff
Lesson 17
Technology, the Workplace, and
Society
Computer Concepts
BASICS 4th Edition
1
Wells
Objectives
Lesson 17
2
Describe the impact of technology on
education
Describe the impact of technology on
science and medicine
Describe the impact of technology on work
and play
Identify types of computer crimes
Wells
Computer Concepts BASICS
Objectives (continued)
Lesson 17
Identify computer viruses
Identify various security measures
Identify computer-related laws
Identify the "work" of hackers
Describe how privacy is invaded with
computer use
3
Wells
Computer Concepts BASICS
Vocabulary
Lesson 17
4
artificial intelligence
(AI)
biometric security
measures
computer-based
learning
computer crime
computer fraud
Wells
computer hacking
copyright
data diddling
digital cash
electronic commerce
genetic engineering
groupware
Computer Concepts BASICS
Vocabulary (continued)
Lesson 17
nanotechnology
online learning
optical computing
plagiarism
quantum computing
simulation
5
Wells
software piracy
time bomb
virtual reality (VR)
virus
worm
Computer Concepts BASICS
Education
Lesson 17
The Internet and the World Wide Web are
the biggest factors affecting education today
Students use the Internet for class research
The Internet has become a way to deliver
online learning
Computer-based learning and computerassisted instruction (CAI) are methods where
the teacher uses the computer to deliver
instruction
6
Wells
Computer Concepts BASICS
Education (continued)
HowStuffWorks Web page
Lesson 17
7
Wells
Computer Concepts BASICS
Education (continued)
Lesson 17
8
Simulations are models of real-world
activities, designed to allow students to
experiment and explore environments that
might be dangerous, unavailable, or
inaccessible
Wells
Computer Concepts BASICS
Scientific Discovery and Technological
Innovations
Lesson 17
The goal of artificial intelligence software is
to process information on its own without
human intervention
Genetic engineering refers to changing the
DNA in a living organism and has positively
impacted our life span
Virtual reality is an artificial environment that
feels like a real environment created with
computer hardware and software
9
Wells
Computer Concepts BASICS
Scientific Discovery and Technological
Innovations (continued)
Genetic engineering
Lesson 17
10
Wells
Computer Concepts BASICS
Scientific Discovery and Technological
Innovations (continued)
Lesson 17
11
Nanotechnology relates to creating
computer components that are less than 100
nanometers in size
Optical computing uses light beams for the
internal circuits instead of electricity
Quantum computing uses the laws of
quantum mechanics and the way that atoms
can be in more than one state at once to do
computational tasks
Wells
Computer Concepts BASICS
Work and Play
Lesson 17
12
Technology is affecting the way information
and money is transmitted
Electronic commerce, or e-commerce,
means having an online business
The digital cash system allows someone to
pay by transmitting a number from one
computer to another
Wells
Computer Concepts BASICS
Work and Play (continued)
Lesson 17
13
A computer network can be a vital tool for
helping work run more smoothly
Groupware refers to programs and software
that help people work together despite
location
–
One of the more common types of groupware is
e-mail.
Computers play an important role in our life
from ordering pizza to using the ATM
Wells
Computer Concepts BASICS
Technological Issues
Lesson 17
14
Computers have made our daily lives much
easier, but there are risks and problems
Plagiarism is presenting someone else’s
ideas or work as your own, without
authorization
Copyright is legal protection for authors of
their creative works
Computer crime is a criminal act committed
through the use of a computer
Wells
Computer Concepts BASICS
Technological Issues (continued)
Computer fraud involves the manipulation of a
computer or computer data in order to obtain money,
property, or value dishonestly or to cause loss
Lesson 17
–
–
–
–
–
–
15
Wells
Computer hacking involves invading someone else’s
computer
A virus is a program written to cause the corruption of data
A worm makes copies of itself and slows down a PC
A time bomb causes damage at a time in the future
A Trojan horse is harmful software that does the unexpected
An e-mail virus uses e-mail messages to carry the virus
Computer Concepts BASICS
Technological Issues (continued)
Security scan and virus detection
Lesson 17
16
Wells
Computer Concepts BASICS
Technological Issues (continued)
Lesson 17
17
Theft of computer time is a crime committed
regularly in the workplace
Changing data before or after it is entered into the
computer is called data diddling
Computer equipment and data are subject to
hazards such as fire and flood
Illegally copying and using software is called
software piracy
Working on computers for long periods of time can
cause ergonomic-related health issues
Wells
Computer Concepts BASICS
Technological Issues (continued)
Lesson 17
18
Information submitted on the Internet can be used in
computer crime
The best way to protect data is to control access of
the data, most often through passwords
Other security measures include using ID cards,
firewalls, antivirus software, selective hiring
practices, and data backups
Biometric security measures examine a
fingerprint, a voice pattern, or the iris or retina of the
eye and compare them against employee records
Wells
Computer Concepts BASICS
Summary
Lesson 17
19
Technology is having a tremendous impact on
education. Many people predict that technology will
change the entire structure of education.
The Internet and the World Wide Web are the
biggest factors affecting education today.
Some people predict an antitechnology backlash.
Electronic commerce is the buying and selling of
goods and services using the Internet.
Wells
Computer Concepts BASICS
Summary (continued)
Lesson 17
20
Digital cash allows someone to pay online by
transmitting a number from one computer to another.
New jobs and new job categories are being
developed because of the Internet and electronic
commerce.
Some technological advances are voice recognition,
nonlethal weapons, space travel, flying cars, smart
shoes and smart seats, clothes that fight odors, and
electronic shopping.
Computer crime has become a major problem,
costing companies billions of dollars annually.
Wells
Computer Concepts BASICS
Summary (continued)
Lesson 17
21
Computer fraud is conduct that involves the
manipulation of a computer or computer data for
dishonest profit.
Computer hacking involves invading someone else’s
computer. Sometimes it is done for financial gain
and sometimes just as a prank.
A computer virus is a program that has been written
to cause corruption of data on a computer.
To protect against viruses, install and keep an
antivirus program running on your computer. Be sure
to update it regularly.
Wells
Computer Concepts BASICS
Summary (continued)
Lesson 17
22
Computer security is necessary to keep hardware,
software, and data safe from harm or destruction.
The most common way to control access to data is
to use passwords.
Illegally copying and using software is called
software piracy. It has cost companies millions of
dollars in lost sales.
Laws have been passed in an effort to assist those
who have been injured by computer crimes and
offenses. Many computer crimes are difficult to prove
and prosecute.
Wells
Computer Concepts BASICS