project 1a evaluation section. using ict advantages and disadvantages of using ict
TRANSCRIPT
![Page 1: Project 1a Evaluation Section. Using ICT Advantages and Disadvantages of using ICT](https://reader036.vdocuments.us/reader036/viewer/2022062517/56649f175503460f94c2dff4/html5/thumbnails/1.jpg)
Project 1a
Evaluation Section
![Page 2: Project 1a Evaluation Section. Using ICT Advantages and Disadvantages of using ICT](https://reader036.vdocuments.us/reader036/viewer/2022062517/56649f175503460f94c2dff4/html5/thumbnails/2.jpg)
Using ICT
Advantages and Disadvantages of using ICT
![Page 3: Project 1a Evaluation Section. Using ICT Advantages and Disadvantages of using ICT](https://reader036.vdocuments.us/reader036/viewer/2022062517/56649f175503460f94c2dff4/html5/thumbnails/3.jpg)
Advantages of using ICT• You can change the text, mistakes without having to start
from the very beginning again. • Work is easy to save and document, rather than someone
keeping them in folders were they can get misplaced. • You can make back up files quickly. • Can keep all files under one folder e.g. project1a • Crop pictures down accurately • Use scanners to scan in pictures form magazine and books. • Printers produce high quality work • Access to the internet • You can email letters and document to people all over the
world.
![Page 4: Project 1a Evaluation Section. Using ICT Advantages and Disadvantages of using ICT](https://reader036.vdocuments.us/reader036/viewer/2022062517/56649f175503460f94c2dff4/html5/thumbnails/4.jpg)
Disadvantages of using ICT• The internet server can go down randomly, so you cannot
connect to a webpage. • Networks can get hacked into. • Shopping online leaves shoppers prone to online credit card
theft. • Viruses can come through the internet damaging the files in
your computer • Some software can be difficult for some generations and
people to learn how to use • People start to rely on computers too much and use them to
do everything. • Repetitive strain injury, strain on tendon in the arms, back
problems and painful eyes are caused from prolonged use of computers.
• Work sometimes does not look exactly like what you want it to look like
![Page 5: Project 1a Evaluation Section. Using ICT Advantages and Disadvantages of using ICT](https://reader036.vdocuments.us/reader036/viewer/2022062517/56649f175503460f94c2dff4/html5/thumbnails/5.jpg)
Working Responsibly
Explain how you worked safely and took care of equipment.
![Page 6: Project 1a Evaluation Section. Using ICT Advantages and Disadvantages of using ICT](https://reader036.vdocuments.us/reader036/viewer/2022062517/56649f175503460f94c2dff4/html5/thumbnails/6.jpg)
This is why we need health and safety regulations.
How many things will have a bad effect on this man’s health?
![Page 7: Project 1a Evaluation Section. Using ICT Advantages and Disadvantages of using ICT](https://reader036.vdocuments.us/reader036/viewer/2022062517/56649f175503460f94c2dff4/html5/thumbnails/7.jpg)
Working Responsibly
Explain how you observed copyright and confidentiality
![Page 8: Project 1a Evaluation Section. Using ICT Advantages and Disadvantages of using ICT](https://reader036.vdocuments.us/reader036/viewer/2022062517/56649f175503460f94c2dff4/html5/thumbnails/8.jpg)
Bits and pieces
It is illegal to steal work by someone else by copying it.
It’s also illegal to steal part of someone else's in order to make a similar product, though in some cases this can be hard to prove.
![Page 9: Project 1a Evaluation Section. Using ICT Advantages and Disadvantages of using ICT](https://reader036.vdocuments.us/reader036/viewer/2022062517/56649f175503460f94c2dff4/html5/thumbnails/9.jpg)
True or false
![Page 10: Project 1a Evaluation Section. Using ICT Advantages and Disadvantages of using ICT](https://reader036.vdocuments.us/reader036/viewer/2022062517/56649f175503460f94c2dff4/html5/thumbnails/10.jpg)
Copying software – when is it allowed?
![Page 11: Project 1a Evaluation Section. Using ICT Advantages and Disadvantages of using ICT](https://reader036.vdocuments.us/reader036/viewer/2022062517/56649f175503460f94c2dff4/html5/thumbnails/11.jpg)
Working Responsibly
Viruses and Virus Checkers
![Page 12: Project 1a Evaluation Section. Using ICT Advantages and Disadvantages of using ICT](https://reader036.vdocuments.us/reader036/viewer/2022062517/56649f175503460f94c2dff4/html5/thumbnails/12.jpg)
Computer viruses
A virus is a piece of computer code which copies itself, usually without your permission.
Some viruses can damage data. All viruses use up system resources (memory, hard disk space, etc.).
Viruses are written by people, they don't just appear. On many occasions they are sent as attachments to e-mails.
Because viruses cause computer code to be modified (changed), they are illegal under the Computer Misuse Act.
The first British virus writer to be prosecuted, in 1995, was sentenced to 18 months in prison.
![Page 13: Project 1a Evaluation Section. Using ICT Advantages and Disadvantages of using ICT](https://reader036.vdocuments.us/reader036/viewer/2022062517/56649f175503460f94c2dff4/html5/thumbnails/13.jpg)
Keeping data safe
![Page 14: Project 1a Evaluation Section. Using ICT Advantages and Disadvantages of using ICT](https://reader036.vdocuments.us/reader036/viewer/2022062517/56649f175503460f94c2dff4/html5/thumbnails/14.jpg)
Firewalls
A firewall can stop others from hacking into your computer. This is a program which filters data coming in through the Internet to a computer or network.
It stops people hacking into your system, taking control of your computer and using your machine as a host to access or run programs.
![Page 15: Project 1a Evaluation Section. Using ICT Advantages and Disadvantages of using ICT](https://reader036.vdocuments.us/reader036/viewer/2022062517/56649f175503460f94c2dff4/html5/thumbnails/15.jpg)
Preventing infections
Install anti-virus software and ensure it is updated regularly.
Avoid downloading programs from unknown sources.
Never run macros in programs unless you know what they are.
Never open an e-mail attachment if it is not from someone you know.