1 lesson 17 technology, the workplace, and society computer concepts basics 4 th edition wells
Post on 21-Dec-2015
217 views
TRANSCRIPT
1
Lesson 17Technology, the Workplace, and Society
Computer Concepts BASICS 4th Edition
Wells
Le
sso
n 1
7
Wells Computer Concepts BASICS22
Objectives
Describe the impact of technology on education
Describe the impact of technology on science and medicine
Describe the impact of technology on work and play
Identify types of computer crimes
Le
sso
n 1
7
Wells Computer Concepts BASICS33
Objectives (continued)
Identify computer viruses Identify various security measures Identify computer-related laws Identify the "work" of hackers Describe how privacy is invaded with
computer use
Le
sso
n 1
7
Wells Computer Concepts BASICS44
Vocabulary
artificial intelligence (AI)
biometric security measures
computer-based learning
computer crime computer fraud
computer hacking copyright data diddling digital cash electronic commerce genetic engineering groupware
Le
sso
n 1
7
Wells Computer Concepts BASICS55
Vocabulary (continued)
nanotechnology online learning optical computing plagiarism quantum computing simulation
software piracy time bomb virtual reality (VR) virus worm
Le
sso
n 1
7
Wells Computer Concepts BASICS66
Education
The Internet and the World Wide Web are the biggest factors affecting education today
Students use the Internet for class research The Internet has become a way to deliver
online learning Computer-based learning and computer-
assisted instruction (CAI) are methods where the teacher uses the computer to deliver instruction
Le
sso
n 1
7
Wells Computer Concepts BASICS
Education (continued)
HowStuffWorks Web page
7
Le
sso
n 1
7
Wells Computer Concepts BASICS88
Education (continued)
Simulations are models of real-world activities, designed to allow students to experiment and explore environments that might be dangerous, unavailable, or inaccessible
Le
sso
n 1
7
Wells Computer Concepts BASICS99
Scientific Discovery and Technological Innovations
The goal of artificial intelligence software is to process information on its own without human intervention
Genetic engineering refers to changing the DNA in a living organism and has positively impacted our life span
Virtual reality is an artificial environment that feels like a real environment created with computer hardware and software
Le
sso
n 1
7
Wells Computer Concepts BASICS
Scientific Discovery and Technological Innovations (continued)
Genetic engineering
10
Le
sso
n 1
7
Wells Computer Concepts BASICS1111
Scientific Discovery and Technological Innovations (continued)
Nanotechnology relates to creating computer components that are less than 100 nanometers in size
Optical computing uses light beams for the internal circuits instead of electricity
Quantum computing uses the laws of quantum mechanics and the way that atoms can be in more than one state at once to do computational tasks
Le
sso
n 1
7
Wells Computer Concepts BASICS1212
Work and Play
Technology is affecting the way information and money is transmitted
Electronic commerce, or e-commerce, means having an online business
The digital cash system allows someone to pay by transmitting a number from one computer to another
Le
sso
n 1
7
Wells Computer Concepts BASICS1313
Work and Play (continued)
A computer network can be a vital tool for helping work run more smoothly
Groupware refers to programs and software that help people work together despite location– One of the more common types of groupware is
e-mail. Computers play an important role in our life
from ordering pizza to using the ATM
Le
sso
n 1
7
Wells Computer Concepts BASICS1414
Technological Issues
Computers have made our daily lives much easier, but there are risks and problems
Plagiarism is presenting someone else’s ideas or work as your own, without authorization
Copyright is legal protection for authors of their creative works
Computer crime is a criminal act committed through the use of a computer
Le
sso
n 1
7
Wells Computer Concepts BASICS1515
Technological Issues (continued)
Computer fraud involves the manipulation of a computer or computer data in order to obtain money, property, or value dishonestly or to cause loss– Computer hacking involves invading someone else’s
computer– A virus is a program written to cause the corruption of data – A worm makes copies of itself and slows down a PC– A time bomb causes damage at a time in the future– A Trojan horse is harmful software that does the unexpected– An e-mail virus uses e-mail messages to carry the virus
Le
sso
n 1
7
Wells Computer Concepts BASICS
Technological Issues (continued)
Security scan and virus detection
16
Le
sso
n 1
7
Wells Computer Concepts BASICS1717
Technological Issues (continued)
Theft of computer time is a crime committed regularly in the workplace
Changing data before or after it is entered into the computer is called data diddling
Computer equipment and data are subject to hazards such as fire and flood
Illegally copying and using software is called software piracy
Working on computers for long periods of time can cause ergonomic-related health issues
Le
sso
n 1
7
Wells Computer Concepts BASICS1818
Technological Issues (continued)
Information submitted on the Internet can be used in computer crime
The best way to protect data is to control access of the data, most often through passwords
Other security measures include using ID cards, firewalls, antivirus software, selective hiring practices, and data backups
Biometric security measures examine a fingerprint, a voice pattern, or the iris or retina of the eye and compare them against employee records
Le
sso
n 1
7
Wells Computer Concepts BASICS
Summary
Technology is having a tremendous impact on education. Many people predict that technology will change the entire structure of education.
The Internet and the World Wide Web are the biggest factors affecting education today.
Some people predict an antitechnology backlash. Electronic commerce is the buying and selling of
goods and services using the Internet.
19
Le
sso
n 1
7
Wells Computer Concepts BASICS
Summary (continued)
Digital cash allows someone to pay online by transmitting a number from one computer to another.
New jobs and new job categories are being developed because of the Internet and electronic commerce.
Some technological advances are voice recognition, nonlethal weapons, space travel, flying cars, smart shoes and smart seats, clothes that fight odors, and electronic shopping.
Computer crime has become a major problem, costing companies billions of dollars annually.
20
Le
sso
n 1
7
Wells Computer Concepts BASICS
Summary (continued)
Computer fraud is conduct that involves the manipulation of a computer or computer data for dishonest profit.
Computer hacking involves invading someone else’s computer. Sometimes it is done for financial gain and sometimes just as a prank.
A computer virus is a program that has been written to cause corruption of data on a computer.
To protect against viruses, install and keep an antivirus program running on your computer. Be sure to update it regularly.
21
Le
sso
n 1
7
Wells Computer Concepts BASICS
Summary (continued)
Computer security is necessary to keep hardware, software, and data safe from harm or destruction.
The most common way to control access to data is to use passwords.
Illegally copying and using software is called software piracy. It has cost companies millions of dollars in lost sales.
Laws have been passed in an effort to assist those who have been injured by computer crimes and offenses. Many computer crimes are difficult to prove and prosecute.
22