objective 3 electronic communications. uses of computing pros made tasks such as clerical work and...

14
OBJECTIVE 3 ELECTRONIC COMMUNICATIONS

Upload: grant-sherman

Post on 12-Jan-2016

214 views

Category:

Documents


0 download

TRANSCRIPT

O B J E C T I V E 3

ELECTRONIC COMMUNICATIONS

USES OF COMPUTING

• Pros• Made tasks such as

clerical work and computing easier and faster

• Buying, banking, and paying bills can be done from home

• Easy access to useful information

• New forms of entertainment

• Cons• Computers are still

quite expensive• Developing software is

time consuming and expensive

• Once developed, it is difficult to make changes to software

• Excessive use of the computer has changed our society and relationships.

COMPUTERS – WORK PLACE

• Used in every job• Payroll, accounts, bookkeeping• Operations• Communications

COMPUTERS - SOCIAL

• Cell phones• iPads• Skype• Social media• Teleconferencing• Twitter

COMPUTERS - GOVERNMENT

• Tracking• Gov’t websites• Affordable Care Act! Yeah!

• Military• Computers got their start in the military• Surveillance equipment• Administrative purposes• Data repositories

USING COMPUTERS SAFELY, ETHICALLY, AND LEGALLY

Rules

Not usually illegal

In writing

Consequences are specific to the entity that

made the rules

Laws

Illegal

In writing

Consequences more severe from fines to

jail time

Ethics

Not usually illegal, but can

be

Set by the society you

live in

About “doing the right thing”

Consequences change the person you

are

1. Don’t smoke in front of children2. Don’t fill your mind with images you can’t erase3. Don’t steal work resources, even if you won’t get caught4. Don’t use the internet to bully, intimidate, or destroy the reputation of yourself or others05. Don’t share copyrighted material you have purchased with others

Ethics1. Don’t smoke in public buildings2. Don’t look at child pornography3. Don’t use work resources to make money for someone else4. Don’t use slander or libel against others in the public domain5. Don’t post copyrighted pictures on the internet or published works

Law1. Don’t smoke in the house2. Don’t look at inappropriate images on the internet3. Don’t use work computers for personal stuff4. Don’t post compromising pictures of yourself on the internet5. Don’t use a copyrighted picture without permission for personal projects

Rule

PROTECTING YOUR IDENTITY

• Malware – Software that is intended to damage or disable computers and computer systemsVirus - piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data.

• Spyware – Software that enables a user to obtain covert information about another’s computer activities by transmitting data covertly from another hard drive.

• Adware – Software that automatically displays or downloads advertising material (often unwanted) when a user is online

• Trojan Horse – a hacking program that is non self-replicating, which appears to perform a desirable function but instead causes harm.

PROTECTING YOUR IDENTITY

• Cookies – a small piece of data sent from a website and stored in a user’s web browser while the user is browsing the website. • Not necessarily malicious. Can store passwords and user

information• You can clear out your cookies periodically.• Sometimes required to run certain websites

• Firewall – Establishes a barrier between a trusted, secure internal network and another network that is not necessarily secure or trusted.

• Virus Protection Software – Software designed to seek out and destroy computer viruses. Must be updated each year or it will not find new viruses. Cannot guarantee to work every time.

TIPS FOR SECURING YOUR IDENTITY

• Choose good passwords and pins• Don’t use passwords that are too long or too short• Don’t include any personal info (name, birthdate, family

names, nickname)• Use punctuation and upper and lowercase letters• Use made up words or words made up from a line from

your favorite song

• Keep your virus protection up to date• Beware of scams• Don’t give out identity details• Never answer unsolicited or unwanted emails

(spam)

ERGONOMICS

• The study of people’s efficiency in their working environment• Invest in a good office chair• Move regularly• Position monitor correctly• Position keyboard correctly• Organize and clean your office or area

JOE VS. THE VOLCANO

• Having an unhealthy office environment can be dangerous to workers. Nerve damage, spinal injury, and illness.• Watch this video and look for

things that are unhealthy in the work environment.

Watch Video