905 Trends in Computing

You might also like

Download as ppt, pdf, or txt
Download as ppt, pdf, or txt
You are on page 1of 71

SOCIAL IMPACT OF COMPUTERS AND

INFORMATION TECHNOLOGY

COMPUTER INTEGRITY AND


SECURITY

06/18/23 1
O level Computer Studies Topic Twelve: Trends in Computing
Computer security

 Computer Security Risks: This  Major Threats To Data


refers to any event or action Security
that could cause a loss or  Power Failure
damage to a computer  Data theft
hardware, software, data or  Data sabotage
information.  Unauthorized access
 Some branches of a computer  Computer viruses
security are accidental but  Fraud
some are planned.  Privacy
 Data alteration

24-Feb-11 2
O level Computer Studies Topic Twelve: Trends in Computing
 Data Alteration: Is the illegal amendment of data or information
with the intension of gaining money or misinforming users.
 Computer Fraud: Refers to the use of a computer to impersonate
others with an aim of benefiting unfairly.
Eg. Online identity theft and using it to get Credit or
withdraw money from the victim’s account
 Computer security refers to the protection and maintenance of
hardware, software and data against Unauthorized access and
modification. Or the denial of data and information to unauthorized
users

06/18/23
O level Computer Studies Topic Twelve: Trends in Computing 3
Computer Viruses

Computer Viruses: Types of Viruses


 A virus is a destructive  Boot sector
program designed by  File viruses
malicious people with the  Macro Viruses
intention of attacking and
 Logic Bombs
destroying computer files,
programs and the entire  Time Bombs
computer system  Worm
 Trojan horse
 Polymorphic virus

24-Feb-11 4
O level Computer Studies Topic Twelve: Trends in Computing
Description of computer viruses
 A Boot Sector Virus: This is a virus that executes when a computer
starts up because it resides in the boot sector of a floppy disk or the
master boot record of a hard disk.
 A File Virus: This is a virus that attaches itself to program file and is
loaded into memory when the affected program is run.
 A macro Virus: This is a virus that uses the macro languages of an
application like a word processor to hide the virus code.
NB. Zombies: This is a dormant program that lies inactive on a
computer activated remotely to aid a collaborative attack on another
computer.

24-Feb-11
O level Computer Studies Topic Twelve: Trends in Computing 5
 A rootkit: is a stealthy type of  Causes Of Data/Program
software, often malicious Corruption In A Computer
designed to hide the existence of  Power failure (Unsaved work).
a certain process or program from  Computer viruses( change,
normal methods of detection and deletion of data, blockage of
enable continued privileged access to data)
access to computer.  Un authorizes access (crackers
NB. activities)
Data control: Defines the measures  Crashing of the hard disk
and policies put in place to ensure  Vandalism (stealing of Hardware
the security of data and programs parts like Storage media)
 Natural disasters (floads, rain)

24-Feb-11 6
O level Computer Studies Topic Twelve: Trends in Computing
Measures Organizations can
employee to prevent Illegal
data Alteration. Like Banks
 Limit the level of access to data.  FUNCTIONS OF AN
 Use of Audit trails ANTVIRUS SOFTWARE
 Set up Log files in the system  Provide a real time protection
 Authenticate all employees any against viruses
time they log into the system  Identify viruses
 A Spyware is an intelligent  Provide a tool for eliminating
program that is able to secretly viruses
track and correct information  Quarantines Files with Viruses
about users and their computers that can not be removed
 Alerts users when a program
behave like a virus

24-Feb-11 7
O level Computer Studies Topic Twelve: Trends in Computing
Computer viruses
Cont
 A logic bomb: This is a virus that activates when it detects a
certain condition. 
 Time bomb: This is a kind of logic bomb that activates on a
particular date. 
 A Worm: This is a virus that copies itself repeatedly in memory or
on a disk drive until no memory or disk space remains which may
result into the computer stoppage.
 NB. Virus Hoax: This is a false warning of a non-existent computer
virus. They cause Network traffic jam as people forward the alerts.

24-Feb-11
O level Computer Studies Topic Twelve: Trends in Computing 8
 Trojan Horse: This a program that hides with in looks like a
legitimate program but executes when certain condition or action
is triggered.
Or
 Trajan Horse is a malicious software that appear to be performing
useful function but instead performs harmful functions in the
background
 A Polymorphic Virus: This is a virus that modifies its code each
time it attached itself to another program or file so that even an
Antivirus Utility has difficulty in detecting it.

24-Feb-11
O level Computer Studies Topic Twelve: Trends in Computing 9
 RISKS POSED BY VIRUSES
 The range of threats posed by viruses and primary impact of a
virus can be broadly classified as:
 Destructive Viruses
 Non Destructive Viruses 
 Types of Destruction 
i. Massive Destruction
ii. Partial Destruction
 Massive Destruction: This attacks the formats of the disk.
Where by any program or damage will be unrecoverable.

24-Feb-11
O level Computer Studies Topic Twelve: Trends in Computing 10
 Partial Destruction: This erases and modifies a specific portion of
the disk affecting any files stored in that location.
 Selective Destruction: This erases and modifies specific files of file
groups. 
 Random Havoc: This randomly changes data on a disk or in
memory during normal program execution or changing key stroke
values or data from other input/output.
 Network Saturation: This systematically used up all memory or
space to impede……………..performance or cause system to
crash.

24-Feb-11
O level Computer Studies Topic Twelve: Trends in Computing 11
 Non Destruction Viruses: These viruses do not cause any
destruction but they are annoying. They values display
massages, change display colors, change key stroke values. For
example: They can change the effects of the shift/unshift key and
delete characters displayed on visual display.

24-Feb-11
O level Computer Studies Topic Twelve: Trends in Computing 12
Symptoms of computer
viruses 
 The presence of a virus can be  Less memory available than
indicated if one or more of the usual
following symptoms appear on  Access lights turning on for
your computer:  non referred devices
 Unfamiliar graphics or quizzed  Disk access tune seeming
massages appearing on excessive for simple task.
screens.  N.B: The spread of computer
 Programs taking longer than viruses is accelerated by the
usual to load. increased use of networks,
 Un usual error massages internet and E-mail.
occurring more frequently.
24-Feb-11 13
O level Computer Studies Topic Twelve: Trends in Computing
Features of computer viruses 

 They attach themselves to files  Some delete files and programs


and programs in a computer
 They install themselves in a  How viruses can be activated on
computer system without computers: 
permission  Viruses are activated in three
 They replicate (multiply) basic ways: 
themselves occupying large i. Opening an infected file
ii. Running an infected
space in memory
program
 Some amend files or iii. Starting up a computer
operations of a program with an infected floppy
without permission. disks.
06/18/23 14
O level Computer Studies Topic Twelve: Trends in Computing
 SOURCES OF VIRUSES Precautions to present virus
 Contact with contaminated infections include:
system Ensure that the E mail is from
 Pirated Software trusted source before opening or
 Fake Games executing any email attached.
 Free ware and Share ware Install an antivirus utility and
 Updates of software update its virus definition
distributed via internet or other frequently
network.

24-Feb-11 15
O level Computer Studies Topic Twelve: Trends in Computing
Precautions to present virus
infections. conts
 Never start up a computer with  Avoid using pirated software.
a floppy disk in a floppy drive.  Educate all computer users on
 Scan all disks and files for the dangers of viruses
possible virus infection before  Scan all secondary storage
opening them. media before use
 Right protect the recovery disk  Scan all files and programs for
before using it. viruses before downloading
 Back up important files them
regularly.  Install a firewall

06/18/23 16
O level Computer Studies Topic Twelve: Trends in Computing
Unauthorized Access and used of
the computer system
 Un Authorized Access: This is the use of a computer or network
without permission.
 What is the difference between A Hacker And A Cracker?
 A hacker breaks codes and password in a computer system through
intelligent guessing or using certain software without any ill intensions
other than proving his or her computer wizardly
 A cracker breaks into a computer system for an illegal purpose through
use of codes or a password.
 A firewall a combination of Hardware and software designed to block
unauthorized access while permitting authorized traffic.
 Log file these are system files installed in a computer system to maintain
a record of how the system is being used.
06/18/23
O level Computer Studies Topic Twelve: Trends in Computing 17
FORMS OF UNAUTHORISED
ACCESS
 Eavesdropping  Tapping: The use of intelligent
 Industrial espionage programs known as spywares
 Cracking to gain access to information
 Phishing or data that is on it way from
 Surveillance the host computer to the
 Hacking destination computer.
 Eavesdropping: This is a form  Difference between Tapping
of tapping that involves and Eavesdropping is:
acquiring data by listening to a
communication channel.

24-Feb-11 18
O level Computer Studies Topic Twelve: Trends in Computing
 Eavesdropping involves acquiring data by listening to a
communication channel While
 Tapping involves acquiring data by redirection of a communication
 Phishing: This is the practice whereby fraudster acting as
legitimate organizations seed misleading E-mail requesting
personal and financial details from unsuspecting recipients.
Eg Banks and online payment
 Industrial espionage: the use of a person with extensive computer
and network skills to break into a computer or a computer network
to steal, delete data or information.

06/18/23
O level Computer Studies Topic Twelve: Trends in Computing 19
CYBER CRIME

 Cyber crime refers to online  Benefits Of Hacking To An


or internet based illegal Organization
actions.  Reveals the weaknesses of the
INTERNET/NETWORK System.
ATTACKS  Identifies areas that need
patching up.
 Explains past leakage
incidences of data

24-Feb-11 20
O level Computer Studies Topic Twelve: Trends in Computing
COMPUTER CRIMES

 Computer Crime: This refers to  Alteration


any illegal action involving a  Industrial espionage
computer such as Cyber  Sniffing
Crime.  Spamming
Examples of computer Crimes:  Salami Attack
 Hacking  Spoofing
 Cracking Sniffing is the processes of
 Tapping eavesdropping using a
 Trespass program that monitors data
 Computer Fraud transmission over a network
 Eavesdropping
06/18/23 21
O level Computer Studies Topic Twelve: Trends in Computing
Trespass: The illegal access to a  Cookies: A cookie also known
protected building or data sent over as an HTTP cookie, Web
a network Cookie or Browser cookie is
A spyware: This is an intelligent usually a small piece of data
program that is able to secretly
sent form a website and
track and collect information about
stored in the user’s web
a user and their computers. Like
cookies browser while the user is
Spamming: is the sending of browsing the website
unsolicited mail to a group of
internet users who have expressed
no interest in the product or service
being markted
06/18/23 22
O level Computer Studies Topic Twelve: Trends in Computing
 Control measures a company  Using firewalls
can implement to restrict  Auto Locking a system that
Hacker from accessing its may be left idle or open
information systems:  Creating and enforcing
 Using physical locks like policies on information access.
Padlocks and burglar proofs  Biometric security
 Employing Guards  Use of log files
 Encrypting data  Use of Audit Trail
 Enforcing frequent automatic  Use of Security Patch
password change for user

06/18/23 23
O level Computer Studies Topic Twelve: Trends in Computing
Eplaination of terms related to
protection against computer
crime
 Security patch: this is a piece  Goals of Computer Security
of code that is added to a  Integrity: This is to guarantee
software so as to improve its that data is what we expect
security feature.  Confidentiality: the information
 Audit trials: This is a thorough must just be accessible to only
study done on an information authorized people.
system by experts to identify  Authentication:
any loophole that can be used
to illegally access a system.

06/18/23 24
O level Computer Studies Topic Twelve: Trends in Computing
Software Theft
 Software theft is when some one  A single user License
steals software media, intentionally agreement typically Contains
erases programs, illegally copies
the following conditions
and registers and activates a
program.
 Install software on one
 Software Piracy is the computer
Unauthorized and illegal duplication  Make one copy of the s/w
of a copyrighted software.  Un install the s/w from your
 In general, you do not have the computer before giving it to
right to Copy, Rent, or in any way
a second party
distribute the software unless
otherwise specified in the License.

06/18/23 25
O level Computer Studies Topic Twelve: Trends in Computing
 Not permitted to  Software site License: Gives
 Install the software on a the buyer the right to install
network the software on multiple
 Share copy with a friend computer at a single site (e.g
 Rent a copy to a second A school computer Lab)
party
NB. Network site License
allows network users to
share a single copy of the
software, which resides on
the network server
06/18/23 26
O level Computer Studies Topic Twelve: Trends in Computing
 Consequences of pirated  INFORMATION THEFT:
software  This is the stealing of
 No upgrade of software personal or confidential
 No technical support, information from others
manuals or Documentation
 Serious legal exposure

06/18/23 27
O level Computer Studies Topic Twelve: Trends in Computing
COMPUTERS AND HEALTH RISKS

Workers who use computers for long


periods of time are susceptible to health
problems. Many of these problems are
avoidable. You need to be aware of what
the problems are and how they can be
avoided.

06/18/23 28
O level Computer Studies Topic Twelve: Trends in Computing
Health risks of computer use
include the following
 Eye strain  stress due to noise from fans,
 - Repetitive Strain Injury (RSI) Printers, power inputs 
 Carpal Tunnel Syndrome  Addiction from use
 headache
 Back pain due to poor sitting  ear problems for use of ear
posture phones especially with
 Neck pain embedded systems
 Electromagnetic radiation  Wrist pain to do non -
especially with CRT monitors ergonometric

06/18/23 29
O level Computer Studies Topic Twelve: Trends in Computing
Health risks of computer use
cont’s
 Repetitive Strain Injury (RSI) This is cause due to the following:
 Users are carrying out repetitive tasks
 Have positioned the keyboard so that they are at awkward angle.
 Are squeezing a mouse too tightly.
 TUC data shows that 78% of young workers have jobs that
involve repetition and more that 2 million workers are forced to work in
awkward positions
Symptoms include
 Stiffness and swelling in the wrists and other joints

24-Feb-11
O level Computer Studies Topic Twelve: Trends in Computing 30
Health risks of computer use
cont’s
 HOW TO REDUCE RSI
 Using a wrist guard whilst typing.
 Ensuring users vary their work so they are not always in the same
position
 Using specially designed “ergonomic” keyboards

24-Feb-11
O level Computer Studies Topic Twelve: Trends in Computing 31
Health risks of computer use
cont’s
Back problems: Prevention
This is caused by Having an ergonomically,
Users use pcs for a long period adjustable swivel chair that
of time supports the lower back.
Adopt a bad posture Adjusting the chair to the correct
Have their seat at an incorrect height.
height Adjusting the VDU to the correct
Symptoms position
 Back pain or stiffness, possibly Using a footrest
in the neck and shoulders Taking regular breaks (5
minutes every hour)
24-Feb-11 32
O level Computer Studies Topic Twelve: Trends in Computing
Health risks of computer use
cont’s
Eye strain:
 Staring at anything for a long
Looking at a computer for a long
period of time will cause
period of time.
blurred vision
Causes
 Loss of negative ions in the
Bad monitor resolution, flickering,
atmosphere due to
or glare at the monitor
electrostatic charges on the
Poor lighting conditions in the
face of the CRT.
computer room
Symptoms
Electromagnetic radiation
 Impaired vision, double vision
emitted by the VDT (UVA)
and blurred vision
 Difficulty looking at one point
for a period of time
06/18/23 33
O level Computer Studies Topic Twelve: Trends in Computing
Health risks of computer use
cont’s
 Itchy dry eyes and discomfort  Having regular eye tests to
while looking at the VDT ensure vision is corrected
 Headaches  Use your knowledge of
 Eye fatigue that can have ergonomics
serious impact later in life  Take breaks when you feel
Prevention strained
 Having suitable lighting fixing  Use your laptop when
screens so they don`t flicker possible because the monitor
 Having appropriate blinds on emits less radiation
windows to prevent glare  Adjust the brightness of your
screen
 Wear protective eye glasses
06/18/23 34
O level Computer Studies Topic Twelve: Trends in Computing
Health risks of computer use
cont’s
Epilepsy: Stress:
Causes out of 10 users say they are
Flickering screens can regularly by a computer related
contribute to the frequency of issue
Issues include:
attacks
Prevention Slow performance
System crashes
The use of low emission
Viruses
monitors and screen filters is
Pop-up ads
likely to reduce the risk of
Noise from fan, printer power
triggering an attack
input etc.
 
06/18/23 35
O level Computer Studies Topic Twelve: Trends in Computing
Health risks of computer use
cont’s
Prevention Carpal Tunnel Syndrome:
Install correct hardware that is This is a Repetitive Stress
capable of meeting tasks Injury (RSI) caused when the
Having a reliable support team median is pushed by the flexor
Providing users with adequate tendons insides the tunnel made
support and training up of the wrist bones, or carpals.
Going for a short walk to get
fresh air

06/18/23 36
O level Computer Studies Topic Twelve: Trends in Computing
Health risks of computer use
cont’s
  The forearm flexor tendons Symptoms
Pain that may run up the hand
and a few nerves pass
into the wrist and arm
through a small tunnel formed Numbness and coldness in the
by the wrist bones. Or carpals, hands
into the hand. As you move Loss of strength and/or joint
your hands and fingers, the movement
flexor tendons rub against the Discomfort and stiffness in the
sides of the tunnel, sometimes hands
them to swell and push the The need to massage your hands,
median nerve. When the wrists and arms
median nerve is pushed by the Swelling and coldness in the hand
tendon, we feel pain.
06/18/23 37
O level Computer Studies Topic Twelve: Trends in Computing
Health risks of computer use
cont’s
Reasons for CTS injury the flexor tendons that one
Stress will increase muscle receives and the tunnel’s
tension causing pain geometry.
Long hours in the keyboard,  Other health problems like
especially those that type more diabetes and rheumatoid
than four hours arthritis
Lack of circulation. In the  Poor posture including the
muscles that prevents that sitting, placement of hands on
nutrients and oxygen to reach the the keyboard and proper and
tissues proper height of the key –
Inadequate rest and breaks board.
Genetic predisposition to the  Poor diet (lack of vitamins)
amount of lubrication of
06/18/23 38
O level Computer Studies Topic Twelve: Trends in Computing
CTS TREATMENT  Surgery should be your last
Rest, rest and more rest retreat if everything else fails.
Use of a wrist brace or splint Internet addiction
Take medication like ibuprofen  Use Internet every day without
Cut back on sugar, caffeine, days off
alcohol and take vitamins  Loosing track of time while
Keep hands warm, take breaks, surfing the Net
exercise your hands and arms  Staying home more loosing
Correct your typing use you social contacts
knowledge of ergonomics  Denial of high usage
 51% of internet addicts suffer
severe job
06/18/23 39
O level Computer Studies Topic Twelve: Trends in Computing
 impairment
 58% get addicted within the first
12 months of Internet usage
 NB. ergonomic “The science of
work”, the field of technology
that considers human
capabilities and limitations in the
design of machines and objects
that people use, the work
processes that they must follow,
and the environment in which
they operate.

06/18/23 40
O level Computer Studies Topic Twelve: Trends in Computing
COMPUTERS AND SOCIETY

EFFECTS OF USING COMPUTERS TO


SOCIETY

06/18/23 41
O level Computer Studies Topic Twelve: Trends in Computing
POSITIVE EFFECTS OF USING
COMPUTERS TO SOCIETY
 Created and widened employment opportunities e.g.; software
engineers, computer teachers, technicians, etc.
 Improved education and research by simplifying teaching and
learning. E.g. abstract content can be made real through cyber
science technology – others are computer aided teaching and
computer aided learning, presentations software, etc.
 Improved entertainment and leisure through computer games, music,
etc for people to refresh and make-up.
 Improved communication and collaboration through computer
networks.

06/18/23
O level Computer Studies Topic Twelve: Trends in Computing 42
POSITIVE EFFECTS OF USING COMPUTERS TO
SOCIETY con’t

 Improved health services where computers facilitate recording,


monitoring, and diagnosis for patients.
 Improved security through computer managed gates and monitoring of
commercial and domestic premises, detecting and controlling crime by
police.
 Reduced production time and manufacturing processes through
computer aided manufacturing and computer aided designing which
have greatly improved the quantity and quality of life.
 Improved customer services delivery and care e.g networked
computers provide 24/7 on-line services like credit cards
 Improved business and investment opportunities.
 Improved data and document production, storage and manipulation.

24-Feb-11
O level Computer Studies Topic Twelve: Trends in Computing 43
NEGATIVE EFFECTS OF USING
COMPUTERS TO SOCIETY

 Computer related crime e.g. forgeries, computer based illegal


funds transfers, etc
 Moral degeneration through morally dangerous clips, messages,
etc
 Increased cost of production as computers are very expensive to
buy and maintain. Computer experts can as well be expensive to
hire.
 They are both health and environmental hazards e.g. can cause
eye defects, and their disposal after use has got a lot of
environmental concerns.

24-Feb-11
O level Computer Studies Topic Twelve: Trends in Computing 44
NEGATIVE EFFECTS OF USING
COMPUTERS TO SOCIETY con’t
 Loss of employment as they take over job assignments for semi
and less skilled job functions.
 Deaths and accidents due to computer malfunctioning or explosion
 Virus threats which has made data storage and safety very
vulnerable
 Erosion of human integrity and creativity as even the smallest
calculation is assigned to the computer. Other cases are GMFs,
test tube children, etc.
 Loss of man-hours as some workers go for unproductive computer
based leisure at the expense of their work.
 Cyber terrorism

24-Feb-11
O level Computer Studies Topic Twelve: Trends in Computing 45
24-Feb-11 46
O level Computer Studies Topic Twelve: Trends in Computing
SYSTEMS ANALYSIS
 What is systems analysis? is the study of an organization's
problem or situation and the specification of business
requirements for an improved system.
 Systems design is the detailed specification of a computer based
solution to the business requirements.
 What is systems analysis and design? Systems Analysis and
Design covers the entire systems development process from:
Planning to implementation, maintenance, and evoluation. It
includes all activities performed to produce an automated IS.

24-Feb-11
O level Computer Studies Topic Twelve: Trends in Computing 47
Phases of System Analysis
 Systems Planning Phase: Begins with a formal request to the IT
department, called a Systems request. The purpose of this phase
is to perform a preliminary investigation to evaluate an IT-related
business opportunity or problem. Feasibility study key at this
phase and a course of action based on operational, technical,
economic, and time factors is recommend after the study.
 Outputs
 Preliminary Investigation Report
 Feasibility Study
 Recommendations

24-Feb-11
O level Computer Studies Topic Twelve: Trends in Computing 48
 Systems Analysis Phase: The purpose of the systems analysis
phase is to build a logical model of the new system. To understand
the system, fact-finding techniques such as
interviews, are used to collect facts necessary to build the model.
Requirements modeling help to get the systems requirements of
the system.
Outputs Systems Requirements Document
 System Design Phase: The purpose of this phase is to create a
physical model that will satisfy all documented requirements for the
system. At this stage, you design the user interface and identify
necessary outputs, inputs, and processes, plus the internal and
external controls
-Feb-11
O level Computer Studies Topic Twelve: Trends in Computing 49
 Systems Implementation Phase: During the systems
implementation phase, the new system is constructed - programs
are written, tested, and documented, and the system is installed.
 This phase also includes an assessment, called a systems
evaluation, to determine whether the system operates properly
and if costs and benefits are within expectations.
 Systems Maintenance Phase: In this phase IT staff maintain,
enhance, and protect the system. Maintenance changes correct
errors and adapt to changes in the environment, such as new tax
rates. Enhancements provide new features and benefits. Security
controls safeguard the system from both external and internal
threats.
24-Feb-11
O level Computer Studies Topic Twelve: Trends in Computing 50
 A scalable design can expand to meet new business requirements
and volumes.

24-Feb-11
O level Computer Studies Topic Twelve: Trends in Computing 51
COMPUTER PROFESSIONS
 A. WEBMASTER: Webmasters develop and maintain Web sites
and web resources. The job may include backup of the company
Web site, updating resources, or developing of new resources.
Webmasters are involved in the design and development of
website. Part of their job may also include monitoring and
updating the interface design. Some webmasters monitor traffic on
site.
 B. COMPUTER TRAINERS: Computer trainers instruct new user
on the latest software or hardware. They are usually expected to
prepare new materials for instruction and may be asked to write
and maintain course manual.
24-Feb-11
O level Computer Studies Topic Twelve: Trends in Computing 52
COMPUTER PROFESSIONS
 C. DESKTOP PUBLISHER: material. They may create books,
magazines newsletter, and newspapers on computers using
special applications software’s large part of the job is designing
page layout, importing text, and manipulating graphics. Most
desktop publishers work for companies that handle commercial
printing accounts.
 D.COMPUTER SUPPORT SPECIALISTS PROVIDE: Technical
support to customers and other users. They may also be called
technical support specialist or help desk technicians. They manage
the everyday problems faced by computer users. They resolve
common networking problems and may use troubleshooting
programs to diagnose problems.
24-Feb-11
O level Computer Studies Topic Twelve: Trends in Computing 53
COMPUTER PROFESSIONS
E. COMPUTER TECHNICIAN  Experienced computer
Computer technicians may technicians may work with
repair and install computer computer engineers to
components and systems. They diagnose problems and run
may work on everything from routine maintenance on
personal computers to complex systems.
mainframe servers or printers F.DATA ENTRANTS
Some Computer technicians  Data entry workers input
are responsible for setting up customer information, lists, and
and maintaining computer other type of data. Input
networks. devices are typically limited to
keyboards, mice, and
scanners.
24-Feb-11 54
O level Computer Studies Topic Twelve: Trends in Computing
COMPUTER PROFESSIONS
Because the accuracy of programming, but focus on the
recorded data is so important, design and development of
data entry workers are often programs using the principles of
required to verify the accuracy of mathematics and engineering.
data they and others have They rarely write codes
entered. themselves.
G. SOFTWARE ENGINEERS. H. Network administrator
Most Software engineers analyse manages a company’s LAN and
user need and create application WAN networks. They may be
software. Software engineers responsible for the design,
usually have experience in implementation and maintenance
of networks. Responsibilities
usually
06/18/23 55
O level Computer Studies Topic Twelve: Trends in Computing
COMPUTER PROFESSIONS
include the maintenance of both writers work for software firms,
hardware and software relating government agencies, and
to a company’s intranet and research institutions.
internet networks. Some are J. Cryptography is the science
responsible for planning and of disguising and revealing
implementing the security encrypted information. In ICT
measures as well. Cryptography means keeping
I. Technical writers prepare any intercepted information
instructional manuals, technical private. For example information
reports, and other scientific or like financial data, banking and
technical documents. Most credit card information used
Technical
06/18/23 56
O level Computer Studies Topic Twelve: Trends in Computing
COMPUTER PROFESSIONS
in online shopping or private e- These professionals consult with
mail and correspondence. management, staff and
Cryptographers design systems, customers to
break systems, and do research L. Database administrators use
on encryption. database management software
K. Information system managers to determine the most efficient
oversee the work of programmers, ways to organize and access a
computer specialists, system company’s data. They are
analysts, and other computer responsible for maintaining
professionals. They create and database security and backing
implement corporate computer up systems.
policy and systems.

06/18/23 57
O level Computer Studies Topic Twelve: Trends in Computing
COMPUTER PROFESSIONS
M. Systems analyst follows the N. COMPUTER
steps described in the systems PROGRAMMERS
development life cycle. Analysts Computer programmers create,
plan and design new systems or test, and troubleshoot programs
reorganize a company’s used by computers.
computer resources to best Programmers may also update
utilize them. and repair existing programs.

06/18/23 58
O level Computer Studies Topic Twelve: Trends in Computing
EMERGING TECHNOLOGIES

The major concern ,here is the


emergence of artificial Intelligence
and Digital Forensics

06/18/23 59
O level Computer Studies Topic Twelve: Trends in Computing
EMERGING TECHNOLOGIES cont….

 THE ARTIFICIAL INTELLIGENCE (A1)


 Intelligence is the computational part of the ability to achieve goals
in the world. Varying kinds and degrees of intelligence occur in
people, many animals and some machines.
In particular.
 The ability to solve novel problems
 The ability to act rationally
 The ability to act like humans

Artificial intelligence is study of computer systems that attempt to model


and apply the intelligence of the human mind.

24-Feb-11
O level Computer Studies Topic Twelve: Trends in Computing 60
 Artificial intelligence refers to collective attributes of a computer,
robot, or other device capable of performing function such as
learning, decision making, or other intelligent human behaviors. Or
 it is the science and engineering of making intelligent machines,
especially intelligent computer programs.
 It is related to the similar task of using computers to understand
human intelligence, but AI does not have to confine itself to
methods that are biologically observable.

24-Feb-11
O level Computer Studies Topic Twelve: Trends in Computing 61
COMMON TERMS RELATED TO AI
 Autonomous Agent: A hardware (or software) based system that
has the following properties:
 Autonomy – able to operate without the direct intervention of humans or
others.
 Social ability – able to interact with other agents and possibly humans.
 Reactivity – able to perceive their environment and respond to changes
that occur in it.
 Agency: A particular system composed of intelligent agents, such
as computers or robots that cooperate in order to solve a problem.
 Behavior Engineering: A methodology used to develop behavior –
based autonomous agents.

24-Feb-11
O level Computer Studies Topic Twelve: Trends in Computing 62
ACADEMIC DISCIPLINES RELEVANT
TO AI
 Philosophy: Logic, methods of reasoning, min as physical system,
foundations of learning, language, rationality.
 Mathematics: Formal representation and proof, algorithms,
computation, (un) decidability, (in) tractability.
 Probability/Statistics: modeling uncertainty, learning from data.
 Economics: utility, decision theory, rational economic agents.
 Neuroscience: neurons as information processing units.
 Psychology: how do people behave, perceive, process cognitive.
 Cognitive Science: information, represent knowledge.

24-Feb-11
O level Computer Studies Topic Twelve: Trends in Computing 63
 Computer engineering: APPLICATION OF ARTIFICIAL
building fast computers. INTELLIGENCE:
 Control theory: design Game playing: You can buy
systems that maximize an machines that can play master
objective function over time. level chess. There is some AI in
 Linguistics: knowledge them, but they play well against
representation, grammars. people mainly through bully force
computation – looking at
hundreds of thousands of
positions.

24-Feb-11 64
O level Computer Studies Topic Twelve: Trends in Computing
 Speech recognition: In the  Understanding natural
1990s, computer speech language: Computers can be
recognition a reached practical trained to earn and take
for limited purposes. Thus instructions. Natural
United Airlines has replaced languages. This is possible in
its keyboard tree for flight some developed countries
information by a system using there robots understand this
speech recognition of fight process.
number and city names it is
suite convenient.

06/18/23 65
O level Computer Studies Topic Twelve: Trends in Computing
 Expert systems: A “knowledge  MYCIN in 1974, which
engineer” interviews experts in diagnosed bacterial infections
a certain field and tries to of the blood and suggested
represent their knowledge in a treatments. It did better than
computer program for carrying medical students or practicing
out some task. How well this doctors.
works depends on whether the
academic method required for
the task is within the present
state of AI. One of the first
expert system was

06/18/23 66
O level Computer Studies Topic Twelve: Trends in Computing
DIGITAL FORENSICS
 Digital forensics (sometime timed known as digital forensics
science) is a branch of investigative science around material
found in digital devices, often in relation to computer crime for
example, hacking, cracking, spamming. etc.
 The technical aspect of an investigation is divided into several
sub-branches, relating to the type of digital devices involved:

06/18/23
O level Computer Studies Topic Twelve: Trends in Computing 67
BRANCHES OF DIGITAL FORENSICS
 i) Computer forensics: the goal of computer forensics is to explain
the current state of a digital object. Such as a computer system,
storage medium or electronic document.
 ii) Mobile device forensics: Mobile device forensics is a sub –
branch of digital forensics relating to recovery of digital evidence
or data from a mobile device.
 iii) Network forensics: Network forensics is concerned with the
monitoring and analysis of computer network traffic. Both local
and WAN /internet, for the purposes of information gathering,
evidence collection or crime detection. Traffic is usually stopped at
the packet level, and either stored for later analysis or filtered in
real-time.
24-Feb-11
O level Computer Studies Topic Twelve: Trends in Computing 68
 iv) Database forensics: Database forensics is a branch of digital
forensics to the forensic study of databases and their metadata.
Investigations use database contents, log files and in – RAM data
to build a time relevant information.

GREEN COMPUNTNG:
 Green computing is the environmentally responsible and eco-
friendly use of computers and their resources.

 In broader terms, it is also defined as the study of designing,


manufacturing /engineering, using and disposing of computing
devices in a way that reduces their environmental.
24-Feb-11
O level Computer Studies Topic Twelve: Trends in Computing 69
THE GOAL/ ELEMENTS OF GREEN
COMPUTING
 To cut down to as little as possible the amount of energy used.
 To minimize the inclusion of harmful materials.
 To use as many biodegradable materials as possible.
 To extend as far as possible the life of the equipment.
GREEN COMPUTING SUGGESTIONS/ PRACTICES
 Use computers and devices that comply with the ENERGY STAR
program
 Do not leave the computer running overnight
 Turn off the monitor, and other devices when not in use
 Use LCD monitors instead of CRT monitors
 Use paperless methods to communicate

24-Feb-11
O level Computer Studies Topic Twelve: Trends in Computing 70
 Recycle paper
 Buy recycled paper
 Recycle toner cartridges

24-Feb-11
O level Computer Studies Topic Twelve: Trends in Computing 71

You might also like