Cxc IT Social and Economic Impact of ICT

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/74

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 2:02 PM on 5/1/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

75 Terms

1
New cards

Computer Vulnerability

A weakness or flaw in one or more computer systems,used to gain access and even damage the data

2
New cards

Types of Vulnerabilities

1.Hardware 2.Software 3.Data Communications

3
New cards

External Vulnerabilities

1.Natural Disasters

2.Power Surges

3.Terrorist Attacks

4
New cards

Internal Vulnerabilities

1.Employee Error

2.No Backup plan

3.lack of anti virus

5
New cards

Security Threat

An attempt to take advantage of a vulnerability in a system

6
New cards

Computer Security

cybersecurity, involves protecting systems, networks, and data from digital attacks, damage, or unauthorized access

7
New cards

Data Security

It is the protection of data against intentional or accidental damage

8
New cards

Hacking

it is the unauthorized access and use of networked or standalone computers systems to steal or damage data and programs

9
New cards

Accidental Damage

It occurs due to genuine errors by computer users

Eg.entering incorrect commands,viruses transmitted via the internet,secondary storage device

10
New cards

Data Communications

IT is the electronic exchange of information between devices via electronic channels

11
New cards

Disadvantage of data communication

All electronic transmissions can be intercepted by person other than the intended receiver

12
New cards

Proprietary Data and Software

The data and software developed and used exclusively by the organisation used by employees for day to day operations.

NB.Org go through great lengths to protect the integrity and security of this data

13
New cards

Computer Fraud

IT is the illegal use of computers, networks, or digital devices to manipulate data, breach systems, or deceive individuals for financial gain.

14
New cards

Ways in which info can be misused

Propaganda,Identity Theft,Espionage,Financial abuse

15
New cards

Progaganda

The use of computer systems to spread information used to promote a particular point of view

16
New cards

identity theft

A crime that involves the use of computerized systems to steal someone identity in order to steal money or obtain benefits

17
New cards

espionage

It is is the act of secretly stealing or gathering confidential information from an enemy, competitor, or government

18
New cards

Ways Identity theft can be prevented

Checking for unusual purchases

Secure websites

not making online purchases with debit card

not using public computers

19
New cards

Financial Abuse

Individuals gain unauthorized access to financial accounts and change details to their advantage

20
New cards

Data Protection

refers to measures taken to protect data from loss, damage or unauthorized access

21
New cards

Surveillance

Computer surveillance involves the use of technology to gather information on the user and from the computer often without the users knowledge

22
New cards

Physical Security

Alarm Systems

Computer Controlled locks

Biometric recognitions

Access codes

23
New cards

Consequences of surveillance

1.Loss of privacy

2.potential misuse of information

24
New cards

Survelliance Techniques

1.Monitoring witth utiliy software

2.Physical devices

25
New cards

Monitoring with Utility software

Packet sniffing is the monitoring of data packets as they travel across a network

Eg. Keyloggers that record keystrokes

26
New cards

Monitoring with Physical devices

Devices called bugs are keystroke loggers implemented in a keyboard.

27
New cards

phising attack

phishing is a digital scam where someone pretends to be someone you trusted via email,sms to trick you into giving up sensetive information

28
New cards

Denial of Service (DoS) Attack

occurs when computer systems or networks are flood with requests by zombie machines until it cannot handle any legitimate requests

29
New cards

electronic eavesdropping

It is the use of electronic devices to monitor communications between two or more groups without permission

30
New cards

Protection From Nature

Data should be protected from natural disasters like fire,storm damage,dust and humidity.

Organisations use fireproof cabinets and safes

Computer systems should make use of surge protectors to protect computer hardware against electricla surges or spikes

The effects of power outages can be minimized with a uninterruptible power supply(UPS)

31
New cards

Uninterruptible power supply(UPS)

An Uninterruptible Power Supply (UPS) is a device that provides instant, short-term battery backup power to connected electronics so they can backup important data when the main power source fails

32
New cards

Protection From Theft

Organisation often lock computers to the desks to prevent theft of the systems.

They limit access to authorised persons and maintain rcords and logs of computer users

33
New cards

Malware

software that is designed to disrupt,damage or gain unauthorized access to a computer system

34
New cards

Computer Virus

A computer virus is a program that infects computer files and make them do something unexpected or damaging

35
New cards

Types of Viruses

File Infector Virus: These common viruses attach themselves to executable files or programs. When the user runs the application, the virus activates and can infect other files on the system.

Boot Sector Virus: These target the boot sector of a hard drive or storage device. They are highly dangerous because they load into memory as soon as the computer starts, allowing them to control the system before anti-virus software loads.

Macro Virus: Written in macro languages for applications like Microsoft Word or Excel, these viruses infect documents and spreadsheets. They automatically execute when the infected file is opened and can destroy or rewrite files, or spread via email attachments.

36
New cards

What is a Worm?

A worm is electronic threat unlike a virus does not need a host and can be transmitted via email and are capable of copying themselves into memory

37
New cards

What is a bot

Controls your computer and communicate with other computers

38
New cards

Trojan

act as legitimate software but has malware in it

39
New cards

Preventing Viruses

Virus protection programs not only scan a computers data for harmful viruses but also protect from and intercepts viruses attempting to infect data

The best way to protect a computer:

1.Install anti virus software -This protects the operating system,programs and files against,viruses.

Eg. Mcaffe,Avast,Avg

2.Firewall-are software programs that check all incoming and outgoing data on a network.It block certain traffic based on set instructions

3.Password-are used to restrict access to unauthorised data or information

4.Never open an email attachment that contains an executable file with an extension EXE,COM or VBS, even if you know who sent the email

40
New cards

Protecting Files and Databases

A database contains the raw data for information.Often the database in an organisation are its life blood.Companies therefore cannot afford to lose records.Maintaing several generations of backups as well as archives of all its critical files are advised.The master and backup files should be stored in fireproof safes or preferably in separate buildings away from the main computer center

41
New cards

Backups and archives(Protecting Files and Database)

Making backups of files is always important for businesses and other organizations that depend on databases. Files can be corrupted or even lost

Most modern networks have software which automatically performs backups of data files to magnetic tape or CD-RW

Remote data backup-Stores backups in cyberspace. Users and companies buy online storage for easy access

42
New cards

Network and cybersecurity

Companies address cyber threats with encryptions or decryption techniques.They encode data before transmission so that it appears unintelligible unless it is decrypted using a software key

Users on a network can each be given username with an individual password.This prevents other users accessing an individual's file,Change settings,Or installing,Copying or deleting software

43
New cards

CopyRight

Copyright is the name given to the protection in law of the rights of the persons responsible for creating such things as text,a piece of music,paintings or computer program

44
New cards

Software Piracy

Software piracy is the unauthorized copying, distribution, or use of copyrighted software, violating intellectual property rights

45
New cards

illegal Activities

1.Planting computer virus

2.copy computer program illegaly

3.hacking into a computer

4.use of computer to commit a crime

5.use of employers computer to do unauthorised work

46
New cards

Social Impact (Effects of It in the Workspace)

-less social contact among employees

-A large increase in the use of games

-easier to keep in touch with people

-privacy consideration-how secure is personal data?

47
New cards

Work Patterns (effect of It in the workspace)

-The internet and WANs have allowed employees to work from home

-Advantage include flexible hours,a more relaxed atmosphere and no commuting

-Disadvantages are a lack of social contact

48
New cards

Cashless Society (effects of it in the workspace)

-Workers are automatically paid by electronic fund transfer into their account

-Credit and debit are used more for payment

-Advantage no need to carry cash

-Disadvantage is the possibility of fraud or lost or stolen cards

49
New cards

Employment (Effect of IT in the workspace)

-Practical skilled jobs on the decline

-Possible redundancies if a more efficient IT based system replaces workers

-New jobs created in IT related fields such as programmers,system analyst,robot maintenance

-Workers need to be retrainned

50
New cards

Health and Safety (Effect of IT in the workspace)

-Attention need to made to posture problems from sittinf for long periods

-Radiation hazzard from monitors and eye strain

-RST(Repetitive starin injury

51
New cards

Changes in the workspace

Information Technology (IT) has caused many changes in the workspace. Tasks that were once done manually are now automated, making work faster and more efficient. IT has also made remote work possible, allowing employees to work from home using the internet. Offices have become more paperless as documents are stored digitally. Communication has improved through emails and video calls, and workers can sometimes have flexible hours. However, while IT has created new jobs, it has also replaced some traditional ones, and employees now need new technical skills to keep up with these changes.

52
New cards

Loss of jobs and retrainning

-Repetitive jobs-telephone operator

-dangerous jobs

office jobs that can be automated or take less time using ict skills

Most jobs now require some ICT skills and so for some people retrainning is necessary to remain in the workforce

53
New cards

Telecommuting

Telecommuting (also called remote work or working from home) is a way of working where employees do their jobs from outside a traditional office, usually using technology like the internet, computers, and phones.

Advantages:

Reducing office space

Saves time and money (no travel)

More flexible schedule

Comfortable work environment

Disadvantages:

Can feel isolated

Harder to separate work and home life

Requires self-discipline

54
New cards

Social Concerns

The widespread use of information systems has led to more efficient ways of working and to a decrease in the hours that many people have to work,this allows more time for people to spend on leisure pursuits,the growth of telecommunication including the internet has led to a situation where people can share information in a "global village".Distance is no longer an issue with people communicating.

55
New cards

Health Concerns

Millions of people use computers regularly for work education and leisure.As with any other equipment computers should be used safely and in a way that doesnt harm users health

Using computers for long periods of time can affect your health and result in injury

Examples:

Repetitive strain injury(RSI)

-Repetitive Strain Injury (RSI) is a condition caused by doing the same movements over and over again, especially when using computers.

What can be done to stop RSI:

-take regular breaks

-place the mouse to the immediate left or right of keyboard

-hold mouse losely

-use wrist or arm rest

-stretch and move your arms,wrist,and neck

-Relax-rsi csn be caused by tension

Back Problems

-Back problems can be caused by poor or incorrect posture when using furniture or equipment

What can be done to stop it:

-use chair that is adjuustable to height

-sit in comfortable position

-take breaks and standup and walk

Eye Problem

Eye strain is the most common health problem linked to using computers screens for long period.Eye problem also linked to poor lighting,glare and being to close to screen.

Stress

Information Technology (IT) can cause stress in the workspace due to constant use of computers, heavy workloads, and the pressure to meet deadlines quickly. Workers may feel overwhelmed by emails, messages, and the need to stay connected all the time. This can lead to tiredness, lack of focus, and reduced productivity. Stress can be reduced by taking regular breaks, managing time properly, and not overusing technology.

56
New cards

Environmental concerns

Information Technology (IT) can cause environmental concerns because it leads to increased electronic waste when old computers and devices are thrown away. These devices can release harmful chemicals into the environment. IT also uses a lot of electricity, which increases energy consumption and contributes to pollution. However, IT can also help reduce environmental damage by promoting paperless offices and reducing the need for travel through online communication.

57
New cards

Legal,ethical and moral effects

The legal,ethical and moral effects of information systems will continue to be an area of concerns to users.A great deal of personal information is held on computers.

The data protection act tries to ensure that personal information is held and processed responsibly.Laws have also been passed to try to stop hacking and piracy of software

Ethical and moral issues:

-How far should the law go to giving government officers such as police access to everyones personal data

-how technology should be used to monitor people activities

-what will happen to people who cant afford computer systems

58
New cards

It skills required in workspace

Information Technology (IT) skills are important in the workspace because many jobs require the use of computers and digital tools

-Basic typing and computer skills

-Using word processing software (e.g., documents)

-Using spreadsheets for calculations and data

-Sending and receiving emails

-Internet research skills

-Using communication tools (video calls, messaging)

-File management (saving, organizing documents)

-Basic knowledge of cybersecurity (protecting data and passwords)

-Using presentation software (slideshows)

-Data entry and database management

-Basic troubleshooting (fixing simple computer problems)

-Using printers, scanners, and other devices

-Accounting and budgeting

-Animations

-Using specialized software

59
New cards

ICT personnel

1.Computer support specialist

2.Computer Programmer

3.system analyst

4.Database Administrator (DBA)

5.Network Administrator

6.Social media specialist

7.software developer

8.System Administrator

9.Web Developer

60
New cards

Computer support specialist

Provides technical assistance directly to computer users who needs assistance with a specific application

61
New cards

Computer Programmer

A Computer Programmer is a professional who writes, tests, and fixes code that tells computers how to perform tasks. They work with existing designs or instructions to create software and make sure it runs correctly.

62
New cards

system analyst

analyses systems currently in place to assess their suitability for computerisation or recommends upgrades for existing computer systems

63
New cards

Database Administrator (DBA)

A Database Administrator (DBA) is a professional who manages and organizes an organization's databases. They ensure that data is stored safely, backed up, and easily accessible when needed. DBAs also control who can access the data, monitor database performance, and fix any issues that arise.

64
New cards

Network Administrator

A Network Administrator is a professional who manages and maintains an organization's computer networks. They set up, monitor, and troubleshoot networks to ensure they run smoothly and securely. Network administrators also control access to the network, protect it from security threats, and upgrade hardware and software when needed.

65
New cards

Network Engineer

Attends to any hardware faults and malfunctions in the equipment, installs new systems and service computers

66
New cards

Social media specialist

Communicates with the public using social media to create and share content using social media platforms such as twitter.Manages their employer's social media accounts, and working to build the brand's reputation

67
New cards

software developer

A Software Developer is a professional who designs, creates, and maintains computer programs and applications. They write code, test software, fix bugs, and update programs to meet users' needs.

68
New cards

System Administrator

Monitors and maintains the system security,and determines what the organisation system needs and adds users to a network and assigns and updates security permissions on the network

69
New cards

Web Developer

Builds websites, which involves writing the programming code necessary for an efficient and stable website.

Web developer oversee and direct the development of the website from idea stage to its final published state,ensuring that loading times are minimised so that users can access info quickly

70
New cards

advantages of computerized info systems

-Save money on paper and filling space

-Rapidly find calculate and sort data

-work automatically

-data easily imported from another system or program

-data easily entered or updated

-easier ways to collaborate on information at the same time

71
New cards

Disadvantages of computerized info systems

-Some systems can be complicated and require a lot of time to be spent on staff training

-The computer running the information system may not work due to an electrical failure or hardware/software fault.

-Data may be incorrect

-Some people may try to access confidential information

72
New cards

When choosing a computer system u need to consider:

1.What hardware is used

2.What software is used

3.What processing takes place

4.What human-computer interface is used

5.Which people are involved and what work they do

6.What data is required

73
New cards

CAI

Computer aided instructions

74
New cards

CAL

Computer aided learning

75
New cards

Expert system

An expert system is an artificial intelligence program that emulates the decision-making skills of a human expert to solve complex, domain-specific problems