Summary

This document appears to be educational material, possibly notes or a textbook on ICT for Grade 11 students in Sri Lanka. It includes information on the Sri Lanka national anthem and basic HTML concepts. No exam board or year is specified.

Full Transcript

Information and Communication Technology Grade 11 Educational Publications Department First Print - 2015 Second Print - 2016 Third Print - 2017 Fourth Print - 2018 Fifth Print - 2019 All Rights Reserved ISBN 978-955-25-0326...

Information and Communication Technology Grade 11 Educational Publications Department First Print - 2015 Second Print - 2016 Third Print - 2017 Fourth Print - 2018 Fifth Print - 2019 All Rights Reserved ISBN 978-955-25-0326-9 Published by Educational Publications Department Printed by Saraswathi Publications, No. 2/60, Circular Road, Divulapitiya. ii The National Anthem of Sri Lanka Sri Lanka Matha Apa Sri Lanka Namo Namo Namo Namo Matha Sundara siri barinee, surendi athi sobamana Lanka Dhanya dhanaya neka mal palaturu piri jaya bhoomiya ramya Apa hata sepa siri setha sadana jeewanaye matha Piliganu mena apa bhakthi pooja Namo Namo Matha Apa Sri Lanka Namo Namo Namo Namo Matha Oba we apa vidya Obamaya apa sathya Oba we apa shakthi Apa hada thula bhakthi Oba apa aloke Apage anuprane Oba apa jeevana we Apa mukthiya oba we Nava jeevana demine, nithina apa pubudukaran matha Gnana veerya vadawamina regena yanu mana jaya bhoomi kara Eka mavakage daru kela bevina Yamu yamu vee nopama Prema vada sema bheda durerada Namo, Namo Matha Apa Sri Lanka Namo Namo Namo Namo Matha iii wms fjuq tl ujlf. orefjda tl ksjfiys fjfikd tl mdge;s tl reêrh fõ wm lh ;=< ÿjkd tneúks wms fjuq fidhqre fidhqßfhda tl f,i tys jefvkd Ôj;a jk wm fuu ksjfia fid¢k isáh hq;= fõ ieug u fu;a lreKd.=fKkS fj) at the beginning and end of an HTML tag. E.g. - to mark the beginning of a paragraph iii) Generally, HTML closing tags are given in pairs. “/” (back slash) with the name of the tag should be indicated in the ending tag. E.g. - to mark the beginning of a paragraph and to mark the end of it iv) Generally HTML tags are not case sensitive. That means, the use of capital or simple letters of the English language does not affect the meaning. E.g. - , or does not make any difference. v) There will be no error messages if the tag is indicated incorrectly, however, the web browser will ignore that particular. vi) There are three parts of an HTML tag – element, attribute and value. E.g. - Following is the HTML code to display the plain text “I am a student” in Times New Roman font type in blue colour. values I am a student Element Attributes 138 For free distribution The features related to a certain HTML are indicated in the opening tag only and the values related to it are always indicated within inverted commas. 5.1.10 Designing a web page Let us design a web page which gives a short introduction about “Sri Lanka” as given in Figure 5.14. Title text Picture A paragraph A hyperlink Bullet rows A table Figure 5.14 - A web page on a short introduction about Sri Lanka Preparing the Title Text Open a new web page using HTML editor. Then enter the HTML code as shown in the Figure 5.15. Save that web page in a folder in your computer and provide a suitable file name. Display the web page using a web browser and compare it with the output given in Figure 5.15 as well as the title text given in Figure 5.14. For free distribution 139 O Sri Lanka u t SRI LANKA p u SRI LANKA t Header tag Center tag Font tag Figure 5.15 - HTML code to prepare the title text and its output Let us consider the HTML tags further. Header tag Methods such as increasing the font size, making the letters bold etc are used to highlight elements such as headings, sub-headings and other texts from the rest of the document. For a web page, this is carried out using the tag called header. There are header tags from to in the order. Out of these, makes the letters the biggest and the bold. The size and the thickness of the letters are decreased gradually from to. Instead of tag of your web page, use other header tags and adjust the title to a proper size, after checking how it is displayed on the web page. Font tag As you have learnt already, an HTML tag consists of three main components – element, attribute and value. There are three main attributes in the Font tag (ie. size, face and color). The font size attribute shows the size of the letters. For this, you can assign the values in the range from 1 to 7. Default is size 3. That is the size displayed automatically by the web browser when you do not assign a value to the Font size. Font face attribute shows the type of letters. You can assign any type of letters available in your computer as its value. E.g. - “Ariel”, “Verdana” Font color attribute shows the colour of the letters. There are two ways to assign values for this. 140 For free distribution i) Providing the names of the sixteen standard colours as they are, in Figure 5.16 Figure 5.16 - Standard Sixteen Colours Example: SRI LANKA Output SRI LANKA For free distribution 141 Center tag This is a tag used to align the title of your web page to the centre along the horizontal axis. This can be used not only for a text, but also for other elements such as a picture. There are several tags like the Center tag which can be used to design texts. Given below in Table 5.1 shows some of them. Table 5.1 - Text Formatting Tags HTML symbol How the letters are Example designed Bold SRI LANKA Italic SRI LANKA Underline SRI LANKA Emphasis SRI LANKA strike out SRI LANKA Superscript SRI LANKA subscript SRI LANKA horizontally moving text (Check this by applying to a web page) Example: SRI LANKA Output SRI LANKA Refer following sites and study further about HTML tags used to design texts in web sites. Example: http://www.w3schools.com/html http://www.tutorialspoint.com/html Activity Design a web page using the name of your school instead of the school name given in the Figure 5.18. Use different designs you wish to add using Sinhala unicode font (“iskoola pota”). Change 'Encoding' as unicode in 'Save As' dialog box when saving the document (Figure 5.19). Compare your web page with the output shown in Figure 5.20. 142 For free distribution Text Formatting 1' name of your school 2' name of your school 3' name of your school 4' name of your school 5' name of your school 6' name of your school 7' name of your school Figure 5.18 - HTML document Figure 5.19 - Save as dialog box related to activity above Figure 5.20 - Output For free distribution 143 Activity 1. Find out other text formatting tags by referring to websites and books related to HTML codes and prepare a table similar to the Table No 5.1. 2. Design a web page using other text formatting tags instead of header tags given in Figure 5.18. 3. Study tag further and design a suitable web page. Inserting and formatting an image Select a picture suitable to insert to your web page. When inserting images to a web page, it should be relatively low size file type such as.png ,.gif or.jpeg. The images to be used in the HTML document can be saved in a separate folder. Image tag tag, which is called the image tag, is used to link an image to a web page. This tag does not have two opening and ending tags. You will come across several such tags later which are called blank tags or empty tags. Though there are about 12 attributes related to the element, only some important ones are explained in Table No 5.2. Table No 5.2 - Some attributes related to element Attribute Explanation about the value Example source or The image file name should contain the file src=“C:\Users\ src extension also. If the image is in another folder, Pictures\pet.png” the relevant path should be given. alternative If the image given by the src attribute is not alt = “map” or alt available in the text, that should be displayed image position indicated here. width The width of the image to be displayed is indicated width = “100” or as the number of pixels or as a percentage of the width = “50%” size of the page. height The height of the image is indicated as the height = “100” or number of pixels or as a percentage of the size height = “50%” of the page. 144 For free distribution border If a border is needed around the picture, its border = “3” thickness should be indicated as the number of pixels. Or else, indicate its vaule as “0”. align A suitable alignment value can be used among align = “middle” left, right, top, bottom, and middle. Example - < img src = ''C:\Users\Pictures\srilanka.jpg'' alt = ''Map'' width = ''100'' height = ''200'' border = ''3'' align = ''middle'' > Output Enter the code as in Figure 5.21 in order to insert the image to web page on Sri Lanka in section 5.10. Open the web page on web browser and compare it with the output in Figure 5.14. Sri Lanka O SRI LANKA u t u A map of Sri lanka t Figure 5.21 - Code to enter the image and the output Inserting and formatting a paragraph To insert a paragraph below the image, insert the code given below in Figure 5.22 to the web page. Open the web page and compare with the output in Figure 5.23 and Figure 5.14. For free distribution 145 Sri Lanka SRI LANKA A map of Sri lanka Sri Lanka is an island located off the southern coast of India. Sri Lanka is surrounded by the Indian Ocean. The geography of Sri Lanka includes coastal plains in the north and hills and mountains in the interior. The government system is a republic. The chief of state and head of government is the President. Paragraph paragraph tag Figure 5.22 - Insert a paragraph Figure 5.23 - Output of code in Figure 5.24 Let us learn about the tag further which is used as the paragraph tag. Paragraph tag The paragraph inserted using the tag is left aligned by default. Four different types of alignments can be used on “left”, “right”, “center” and “justify” attribute in tag. 146 For free distribution Table 5.3 - Paragraph alignment Example Tag Alignment < p align = ''left'' > Left < p align = ''center'' > Center < p align = ''right'' > Right < p align = ''justify'' > Justify How to keep a gap between words This is provided by using &nbsp: tag which belongs to the the type of character entity tags. The government system is &nbsp; a republic. The chief of state and head of government is &nbsp; &nbsp&nbspthe President. Output The government system is a republic. The chief of state and head of government is the President. Activity Identity some more tags which belong to the character entity type by referring to various websites or books related to HTML codes. Inserting some rows Enter the code given below in Figure 5.24 to your web page to insert some rows below the paragraph you entered in the third step. For free distribution 147 Line break tags Figure 5.24 - Code to insert a few rows Figure 5.25 - A part of the output related to the code given in Figure 5.24 The tag, which is called the line break to break lines, belongs to the type of blank tags/empty tags similar to the tag you have used earlier. Identify that only tag is used exactly in the position where you need to break the line, without using two opening/ending tags. Inserting Lists When a number of related items are indicated in an order, it is called a list. Mostly, these items are indicated one below the other. There are three types of main lists in web page designing in the HTML language. i) Unordered lists symbol is used to mark the beginning of an unordered list and the type attribute is used to show the shape of the special symbol with its element. Here are the three values which can be assigned to it. 148 For free distribution 1. Disc 2. Square 3. Circle tag is used to separate each item in the list. Principle Forms of Land use Tag This element, which is indicated as , adds a new row to the table. Just like in , the attributes such as "align", "bgcolor", "border", "bordercolor" can be used differently for separate rows. Example : Tag Used to create cells to include data in a row. Just like for rows, attributes can be added separately for cells as well. Example : Sometimes, cells should be merged adding several rows or columns of the table. There are two attributes used for this. 1. Colspan - Used to create a cell merging several columns. The value of this attribute is the number of columns merged. Example : Figure 5.35 2. Rowspan - Used to create a cell merging several rows. The value of this attribute is the number of rows merged. For free distribution 155 Example : tag Figure 5.36 Tag This tag, which is called the table header tag, is used to indicate the captions of the rows of table. However, this can be used instead of tag related to any cell of the table. What is special about this is that the text in the cell will be bold. Including colspan and rowspan, all the attributes related to tag can be used for this tag as well. Activity Create a web page which includes a table as given below. Make changes to the table using what you have learnt so far and understand thoroughly various tags related to creating tables and their attributes. Create a website as your team has planned using a suitable HTML editor. 156 For free distribution 5.2 Web Designing Software A sound knowledge of HTML language is essential in designing websites using simple word processors or HTML editors. Further HTML coding takes more time. Moreover, the basic HTML codes need changing for updates and alterations. But, there are other web designing software which facilitate web designing quicker and more attractive. There the graphical user interface provides facilities to designing, editing, preview and upload. As per the concept WYSIWYG (What You See Is What You Get), you can create web pages in the same way you design them on the graphical user interface. There are various types of web designing software. For instance, 1. Web authoring tools 2. Content Management Systems (CMS) 5.2.1 web authoring tools The special feature of this type of web designing software is that the relevant HLML document is automatically prepared in a separate interface while the designer is finishing the web page using a graphical user interface. If the designer has knowledge of HTML coding, web page designing can be done using graphical user interface as well as HTML document. There are many open source web editors such as Kompozer, Ckeditor, Bluegriffon which can be downloaded from Internet while there are lots of web editors like Adobe dream viewer, Microsoft front page, Visual studio that are to be purchased. Figure 5.37 - Standard symbols of some open source web editors Designing a website using a web editing software Imagine that a website of six pages is planned to design on the topic "Various systems of human body". Figure 5.38 shows the structure, preview and the content of its Home Page. For free distribution 157 For more information....... For the grade 11 ICT book 2015 Hyperlinks to other web pages Hyperlink to another website Figure 5.38 - Home Page This home page contains the title, images of human systems, a short description, hyperlinks to the other five web pages and further details. This website can be designed using any web designing software you prefer. The steps to design it using kompozer software are as follows. Step 01 - Figure 5.39 shows the interface after installing kompozer. exe file in kompozer software (E.g. - www.kompozer.net/download-07.php). to insert tables to insert pictures to attach files to format letters and texts to see HTML code to preview web page designing area Figure 5.39 - Interface of Kompozer software 158 For free distribution Step 02 - Type the title “Systems in Human Body” on the topmost in web designing area. Format the title by changing font, type, size, colour and background colour. Step 03 - Using commands in File Menu, save it in a suitable folder with a suitable name. Preview your webpage using a web browser. Step 04 - Though the image and other texts can be included as given above, use of a proper content layout makes the task easier. Let us include a table for this. Get the Dialog Box given in Figure 5.40 using “Insert Menu” or “Table tool” in Menu bar. д ‫ רּ נּ‬42 5.40 Figure : ‫ וֹ‬Ř‫ וֹ‬-ş Dialog ‫ ס‬ĭ ‌ Ī Ćг Box‫בּ צּ‬to ‫‏ךּ ן‬insert ‫ ‏ וֹםפֿ תּ‬a‫ ٍ ךּ‬table ‫וֹ◄ד‬ Insert a table with 6 raws and 3 columns. Step 05 - As in word processing, the table can be formatted to change size of cells, insert, delete and merge cells. Format the table as in figure 5.41. Systems of the Human Body Figure 5.41 - Arrangement of cells in the table For free distribution 159 Step 06 - Format the table including texts, images, hyperlinks as in Figure 5.39. It is easier if all the images used to design web pages are saved in one folder. Step 07 - New pages can be opened using “New tool”. Create separate pages for each system on the Home Page. Save these in the same folder using suitable names. Step 08 - After forming hyperlinks to the relevant pages, preview the web page and format as necessary. 5.2.2 Static websites and dynamic websites There are two types of websites according to the nature of its content as static and dynamic. 1. Static Websites If the content of a website is maintained without any change over a period of time, such a website is called a static website. Normally, websites based on HTML language are static websites. Their structure and content are designed using HTML codes. The web content can be changed only by changing the code. This kind of websites can be designed in a very simple way as a collection of a number of web pages. Users are not directly connected to the web server when using the websites. Only the designer of the website can enter the relevant changes by connecting to the web server where the website is hosted. These websites are safer even though it consumes more time for coding. Websites that were created so far using word processing software, HTML editor, web editor etc are static web sites. 2. Dynamic Websites If the web content is often changed, such a website is called a dynamic website. These are designed using software such as PHP (Hypertext Preprocessor), ASP.net (Active Server Page.net), JSP(Java Server Page). Here the web server generates information using a data base or program. Example: 1. Current time is displayed as dynamic in a website. 2. Showing results of a candidate related to the index number. 160 For free distribution Users are directly connected to the web server while using such websites. Information is exchanged from the user to web server or vice versa. Hence, the security of the website is threatened compared to a static website. This is more appropriate for commercial, social or exam holding websites which should be often changed. However, higher knowledge and experience are required to build such websites in a protective way. Static Server Client/browser Dynamic Client/browser Web server Database server Figure 5.42 - Static and dynamic websites 5.2.3 Content Management Systems (CMS) CMS can be defined as software used for dynamic website designing, content management and publishing. It is possible for the web designer to re-publish his website often changing its content. Web designing and managing using CMS is very easy and fast, while no prior knowledge of computer languages is required. Hence, CMS is the most popular web designing tool at present. The creativity of designing is limited to a certain range if various audio visual information is entered to the website using templates and wizards provided by the software. All the websites that are designed this way will be monotonous. This weakness can be largely avoided by changing relevant codes if you possess a sound knowledge of computer languages such as HTML, PHP, javascript, CSS, SQL. For free distribution 161 Some open code CMS software with their web addresses are as follows. 1. Joomla (www.joomla.org/download.html) 2. Wordpress (www.wordpress.org/download) 3. Drupal (www.drupal.org/download) How a website is designed using a CMS software You can design this website using any CMS software you prefer and the steps to install ''Joomla'' software are as follows. Step 01 - Install the three types of software given below in your computer. The web addresses required to download these are also given. 1. APACHE (www.apache.org) 2. PHP(www.php.net) 3. MySql (www.mysql.com) However, it is easier to install a single package which includes all the above two such software are as follows. 1. WAMP (www.wampserver.com) 2. XAMPP (www.apachefriends.org/index.html) Step 02 - Download Joomla software from www.joomla.org website and install it in your computer. Since there are lots of steps here, get necessary advice from a suitable website. Example - https://docs.joomla.org/J3.x:Installing_Joomla Step 03 - There is need to select proper templates, articles and components for a new website. Get necessary advice for this from a suitable website. Step 04 - See the preview and do the necessary changes to your website. Activity Build the website your team planned using Joomla software. 162 For free distribution 5.2.4 Roles related to web designing Designing a website for a certain institute and maintaining it while keeping it updated is a team work involving in many people. Each person has a role to play with the relevant tasks and many responsibilities. Let us identify some important roles among those. 1. Author - Designs interfaces of the website 2. Editor - Writes codes, checks errors and rectifies those. 3. Publisher - Fulfills tasks related to the publishing of the website. 4. Administrator - Fulfills maintenance tasks related to the web server and database. 5. Users - Use the website. 5.3 Publication of a website Publication of a website includes the tasks such as designing website, hosting, updating and posting etc. There are several requirements a web publisher should fulfill for this. 1. A web designing software 2. A web host 3. A domain name 4. File transfer protocol 5. Internet connection 5.3.1 Web Host The designed website should be hosted in a place where any person can access at any time from any place through Internet. Such service providing computers are called web hosts. If the website is designed for a mass scale institute, normally they have their own dedicated host. If it is for a small scale institute, they get space from shared hosts maintained by other institutes. Shared hosts charge basic fee and annual charge according to the allocated capasity. There are many institutes in Sri Lanka as well as in the world which provide such web host services. There are institutes which provide web host services free of charge as well. You can get this facility through various websites. Here, their advertisements are also displayed in your website. For free distribution 163 Activity Name two institutes which provide free web host services along with their relevant web addresses. 5.3.2 Domain Name National identity number is given to each and every person in the world to identify a person uniquely. In the same way, there is a system to find a website in the World Wide Web. It is known as ICANN (Internet Corporation for Assigned Names and Numbers) that bears the responsibility of assigning and administrating domain names for websites. After designing a website, it should be registered in that institute with a suitable domain name. Some of such other institutes are as follows. 1. www.godaddy.com 2. www.bluehost.com 3. ww.nic.lk It is more appropriate to get registered paying a basic fee. Registration should be renewed paying an annual fee. Sometimes, it is done by the person who is responsible for hosting. However, if you need to host your website in another web host later, this can create issues on registration. Hence, it is more appropriate if the publisher himself registers the website. Things to consider when selecting a domain name to a website. 1. It is appropriate to give a certain identification about the institute the website belongs to or the objective of preparing the website through the domain name. This makes the users easier to find the website through search engines. Example: The web address www.nie.lk indicates the institute the website belongs to the user by the domain name “nie”. 2. According to the nature of the website, top level domain names such as “.com”, “.edu”, “.org”,“.lk” can be attached. Example: The top level domain name “.org” of the web address www. wikipedia.org indicates that it belongs to non commercial type websites..(Root) com edu gov mil net...... fr pe sp jp cd gr... uk Organizational hierarchy Geographic hierarchy Figure 5.43 - Domain names of websites 164 For free distribution 3. If the domain name is short, it is easy for the user to remember it as well as to type it accurately. 4. It is not appropriate to include numbers, lines, in domain name. The reason for this is when the web address is read orally, it may not be communicated correctly to the listener. Example: Reader Listener www.myweb2.org www.mywebtu.org Activity Visit www.nic.lk and study the steps to obtain.lk domain name. 5.3.3 File Transfer Protocol/FTP These are the software used to transfer the website you have designed to the selected web host according to the international standards. These can be purchased or downloaded free from Internet. Example - 1. Filezilla (https://filezilla-project.org) 2. SmartFTP (https://www.smartftp.com) Since most of the web designing tools include file transfer facility as well, another software is not needed. Further, the institutes which provide shared host services too provide the facility of file transferring. 5.3.4 Internet Connection Internet connection is essential for the three steps of publishing a website – transferring, updating and path declaration. Internet connection is the medium which connects the users with the web host. A proper Internet service provider should be selected to get Internet connection. Things such as the speed of the connection, charges, and maintenance services should be considered here. Some Internet service providers in Sri Lanka are as follows.. 1. Sri Lanka Telecom 2. Lanka Bell 3. Mobitel 4. Dialog Axiata For free distribution 165 5.3.5 Maintenance of Website Regular maintenance is an essential factor for the success of a website. This can be explained from several aspects. 1. Depending on the nature of the website, its content should be updated daily, weekly or monthly. Not only should the content of the website be changed here, but also the way it is presented, pictures, colours, shapes and other objects should be changed. By maintaining a column on the Home Page to publish new information, current changes can be updated instantly. 2. Harmful software like viruses, unauthorized access can create the website malfunction. Hence, regular attention should be paid, while getting back up time to time and proper security methods should be followed. 3. If there are new versions of the software used to design the website, website should be updated accordingly. It is important for the security of the website. Activity Publish the website your team has designed following proper steps. Website designing and development process can be summarized as follows; 1) The concept 2) Design 7) Update and develop manage Stages in web design and development 3) Domain name 6) Test 4) Hosting 5) Upload Figure 5.44 - Steps of web design and development 166 For free distribution Summary ² In web designing, it is essential to design it with a structure and a pre design, and organize it well with the proper content which suits the needs of the users of the web site. ² Depending on the content, there are two types of web sites – static and dynamic. ² HTML is the basic language used for web designing. Knowledge of this language is essential to be a successful web editor. This makes writing HTML codes easier. ² Simple web sites can be designed even without any knowledge of HTML language, using the software such as web authoring tools and Content Management Systems. ² Dynamic web sites can be designed using Content Management Systems. ² A suitable web host, domain name, and a file transfer protocol should be selected to publish a designed web site. ² There should be a maintenance process for the success of a web site. For free distribution 167 Information and Communication 6 Technology and Society After studying this chapter, you will understand the following: ² Contribution of ICT to entertainment ² Ethical and legal issues in ICT ² Precautions related to ICT infrastructure protection ² Health and safety issues inherent in the use of ICT 6.1 ICT in entertainment Society is driven towards various forms of entertainment facilities for relaxation from everyday stress. However, most people prefer watching a film for relaxation. Unlike in the past, film producers nowadays enjoy the advantage of producing films of high quality with the use of ICT. Some of these modern facilities that film producers enjoy are as described below: i) 3D – three Dimensional With the use of advanced technologies producers can now make life look real on films using three dimensional technology. To view films using 3D technology the user needs to use 3D spectacles available for the purpose. Figure 6.1 - movies created by 3D technology ii) Holographic image processing technology A scene from a set shot in some place is recorded on camera. Holographic image processing technology is used to display this image elsewhere. This technology is mostly used with scenes depicting horror. Figure 6.2 - Holographic image processing technology 168 For free distribution iii) Cartoon films Cartoon films are popular among both adults and the young. The 3D features and the development of technology in the relevant software have increased their attraction. (Fig 6.3) Figure 6.3 - Cartoon films iv) Digital audio materials The use of the computer is evident with modern music and related editing. Recording of songs, creating rhythm and mixing are freely done using modern software to entertain audiences (Fig 6.4). Songs recorded in this manner can easily be stored on compact Figure 6.4 - Digital audio materials discs (CDs) and other digital media. It is also possible to listen to or view them using home theatre systems (Fig 6.5). Figure 6.5 - Home Theatre systems v) Digital games Digital games have become very popular today. Digital games can easily be played on computers or cell phones. Digital games in both 3D and 4D (four diamentional) are the most popular today. Figure 6.6 - Digital games For free distribution 169 vi) Simulation games Simulation games are based on an everyday activity in a natural setting created artificially. Simulation games are mostly used with training for sports activities, investigations, planning, military training, mercantile activities, and miming. Figure 6.7 - Simulation games 6.2 Problems associated with the use of ICT It is possible for Information Communication Technologies (ICT) to be mankind’s closest friend providing many facilities to make life comfortable. Yet, with the use of ICT, mankind faces many unforeseen problems. These problems can be related to the following: Harmful Environmental Physical software issues problems Health related Issues related issues to Values Issues associated with the use of Social issues Legal Information and issues Communication Technology Figure 6.8 - Issues associated with the use of ICT 170 For free distribution These issues and likely solutions are detailed in the following sub-section. 6.2.1 Legal issues i) Data thefts - Personally Identifiable Information (PII) stolen from a computer or other device can be considered as data theft. E.g. - stealing or keeping flash drives, digital camera, mobile phones that contain personal names, telephone numbers, Figure 6.9 - Data thefts photos etc. without permission or legal rights. ii) Unauthorized access into computer systems - It is possible to access computer systems unlawfully with the theft of or manipulating user name and password of a computer. An organization's data can easily be stolen in this manner. iii) Intellectual property rights - 1. What are intellectual property rights? Intellectual property usually relates to mind creations. Intellectual property rights relate to an innovation or a completely new product from a person or an organization currently. Such innovations or brand new products to enter the market are the property of the first person or organization to develop and release the product. They claim ownership to the innovation. It is their right to identify themselves as the legal or lawful owners. Presenting such products in the names of others or using such products for other developments or sale of such products without the knowledge of the first person or organization is illegal. Such claims belong to the category of stolen intellectual property. 2. It is possible to obtain patent rights for protection of intellectual property. A patent is a license issued by the State for innovations. To receive a patent license the innovator must apply to the national office governing patents. iv) Fraud Computer fraud is any dishonest misinterpretation of fact intended to let another to do or refrain from doing something which causes loss. The fraud will result in obtaining a benefit by, for example: For free distribution 171 Altering in an unauthorized way (e.g. employees entering false data) Altering, destroying, suppressing or stealing output to conceal unauthorized transactions Identity theft: deliberate use of someone else's identity as a method to gain a financial advantage. (e.g. someone using another's Personally Identifying Information, NIC numbers, credit card numbers etc. without permission to commit fraud. 6.2.2 Issues related to values i) Plagiarism Plagiarism is the act of stealing another’s creative work and displaying it as one’s own. Plagiarism is very common among users of computers today with the stealing of data and other related information from the Internet. It is possible to use data and other Figure 6.10 - Plagiarism information collected from the Internet in better accepted ways. Better accepted ways refer to the correct use of such collected information without in any way harming the reputation of the correct owner. This, can be done by, 1. citing - mentioning the rightful owner and his/her information. 2. quoting - the use of inverted commas (“…”) to identify a selected or borrowed section. 3. referencing - the listing of resources from which the information was collected. This is usually done at the end of an essay or article. 6.2.3 Physical and logical issues Computers need to be used carefully. Careless use of computers is likely to bring about both physical and logical issues. Sudden power failures may lead to damaged computing devices. There may be computer thieves. It is also possible to experience a complete network breakdown with malware coming through the Internet. Environmental factors also contribute towards physical damage to computers. If so, how can computers be made secure to free ourselves from physical and logical issues that are likely to arise? 172 For free distribution ¾ Physical Security i) Uninterrupted Power Supply (UPS) In case of an electricity breakdown, there has to be some alternate arrangement to supply power to the computer so that the network and the documents face no harm. Here, the alternate arrangement to supply comes with the battery contained in a UPS. This prevents interruption to the supply of power to the computer.(Fig. 6.11). Computer Main Supply UPS Figure 6.11 - Uninterrupted Power Supply (UPS) ii) Hardware Firewalls Hardware firewalls bought as a separate unit have now been built into broadband routers. Hardware firewalls are essential especially with computer networks connected to the Internet. A firewall protects a network from unauthorized access to or from a network by filtering data that pass through it. All messages entering or leaving a network pass through the firewall, which examines each message and blocks those that do not security criteria (fig. 6.12) Outgoing Data Fi Incoming re w al Data l Internet Figure 6.12 - Hardware Firewalls For free distribution 173 iii) Controlled access through locked doors Closed and locked doors are essential to ensure security of a computer laboratory. Closed and locked doors prevent or limit unlawful entry of people. It can also improve safety of computer systems and other accessories while protecting the information contained (Fig 6.13). Figure 6.13 - Controlled access through doors iv) CCTV It is possible to install CCTV cameras inside a computer laboratory and monitor movement from outside or arrange for the day’s proceedings to be recorded as a video clip for viewing later (Fig. 6.14). Figure 6.14 - CCTV v) Surge protector The surge protector protects computers and other accessories inside a laboratory by controlling the voltage in the power supply. The local voltage supply for houses or offices is 230 V. The surge protector acts in situations where the power supply exceeds this limit, to control Figure 6.15 - Surge protector the destruction that could happen to electronic devices (Fig 6.15). vi) Environmental factors Environmental factors can affect the proper function of a computer. Therefore, it is important to maintain a laboratory or a private computer in a safe environment free from dirt, dust, moisture and the like (Fig 6.16). Figure 6.16 - Environmental factors 174 For free distribution ¾ Logical Security i) Passwords Passwords are used to secure data stored in a computer. Passwords protect unauthorized entry or use of a computer. In using a password, it is advisable to mix letters, symbols and numbers to make the password stronger. (Fig. 6.17) Figure 6.17 - Passwords ii) Software Firewalls Software firewalls are installed on a computer (like any software) and can be customized by the user. A software firewall will protect a computer from outside attempts to control or gain access to it (Fig. 6.18). Figure 6.18 - Software Firewalls iii) Backups In the event of a failure of a computer system, essential data and information in the computer can be lost. Therefore, a backup is essential towards securing protection of data and information. A backup can be maintained in an external hard disk, CD, DVD, a flash drive or a memory chip. It is also advisable to keep such backups securely in another physical Figure 6.19 - Backups location. (Fig 6.19) For free distribution 175 6.2.4 Malicious software / Malware i) The use of a computer involves various threats. Malicious software/Malware or malicious codes cause serious harm to computers and networks in many ways. Some examples of such effects are listed below: ² Decreased efficiency of the computer. (Improper function, unnecessary attempts or re-start again and again) Figure 6.20 - Malicious ² Destruction or mal-function of software software ² Inability to install other software ² Weaken computer hardware ² Sabotage of computer networks ² Data theft and destruction ² Reduction of the storage capacity of the hard disk by storing unnecessary documents and files. Harmful software and resultant damage A few types of harmful software and resultant damage are as described in the Table. Harmful software Resultant damage Computer Virus Computer viruses gain entry into the computer through a computer program and spread rapidly within the computer causing enough harm. Viruses can enter a computer through networks, a USB flash drive, external devices like memory chips, or through e-mail. Viruses enter the system as executable files. In other words the viruses always remain active within the computer. Computer Worms Computer worms also act similar to computer viruses. Worms, however, are capable of acting and spreading alone using e-mail attachments, false websites and instant messages. 176 For free distribution Spyware Trojan Horse The Trojan Horse is a harmful software based on the Greek Trojan Horse constructed using wood. It presents itself as harmless and enters the system without the knowledge of the user. Trojan Horse spyware makes the user uncomfortable by unnecessary opening up windows, producing different desktops, deleting documents and stealing data. Further, it allows other harmful software to gain entry. Trojan enters computer with e mail attachments. However, unlike computer viruses and worms, the Trojan Horse does not spread by itself. Adware The adware is displaying unnecessary notices on the computer screen. Using these advertisements, adware collects commercial information. Adware is not harmful as other computer viruses but disturbs the user mentally. Bots Bots are derived from the word ‘robots’. Bots is harmful software that functions on its own communicating with other networks. Bots are used to collect personal information through Internet messages and conversations. Hijacker/ Browser Hijacker/Browser Hijacker is capable of misdirecting Hijacker a user to a different website through the Internet, to collect information regarding trade, commerce and advertisements. Hijacker, is similar to adware. Phishing Phishing is the art of deceiving users to collect information about bank accounts or electronic accounts. E-mail is used for the purpose. Such mail is sent through a popular organization or a friend together with a link for access. With a click on the link, or by filling forms, valuable information and cash deposits related to the unsuspecting user get stolen. Spam Spam is unauthorized e-mail. Most often, spam relates to advertisements about products or a mail from an unknown person. The mail box can get filled with such mail and make the user uncomfortable. Also, Spam may collect e-mail addresses that can be used unlawfully for frauds. For free distribution 177 Safeguarding computer and a computer network from harmful software ² Install a virus guard into the computer. Update the virus guard as is necessary. Keep Guard/Shield/Auto Scan/Update always active. ² Be careful with the use of a USB memory. Check USBs for possible viruses using anti virus software. ² Always install authorized software ² Instead of an administrator account, maintain a user account If the computer is connected to the Internet, ² Access secure websites. Check URL for verification. ² Select only secure websites for the download of software or other material. ² Before a download, check with a virus guard. ² Be careful with opening up e-mail. Where necessary use a virus guard before a downloading and attachment. Do not click on suspicious links in e-mail. Avoid opening suspicious e mails. ² Avoid suspicious advertisements or messages. ² Do not enter personal information without checking on security. ² Use firewall, virus guards, email filters to avoid the risk. Some secure, popular virus guards to be installed on a computer are as follows. ² Avira Antivirus ² Avast Antivirus AVG Antivirus ² K7 Antivirus ² Digital Defender Antivirus ² Norman Antivirus ² Kaspersky Antivirus ² Panda Cloud Antivirus (B) ² Microsoft Security Essentials ² Norton Antivirus ² BitDefender Antivirus ² McAfee Antivirus Prevention is better than cure 178 For free distribution Activity Make a list of virus guards from the Internet other than what is mentioned above. Tabulate the names of the manufacturer and the dates of manufacture. Agencies in Sri Lanka responsible for the security of information exchange There is hardly any individual or an organization in Sri Lanka who/which is not connected to the Internet. Over the last few years, unauthorized access into social networks, financial websites has been observed over the world. Sri Lanka is no exception. Therefore, the necessity for responsible agencies to secure Internet access has arisen. This is also called ‘Cyber Security’. Cyber security is not limited to e-mail, Internet solutions, or social networks. They are useful for personal networks and operating systems (OS). Some organizations responsible for cyber security are as follows. ² Institution for Information Security of Sri Lanka Information and Communication Technology Agency (ICTA) is responsible for the establishment of this institution in Sri Lanka. It provides facilities to various organizations as listed below: ◦ Citizens ◦ Business establishments ◦ State institutions. ² ICTA, Sri Lanka Standards Bureau and the Sri Lanka Emergency Computer Services have together organized to certify Information Security Management Systems (ISMS) to ensure security of information. Individuals and organizations can register for this. Activity Access the websites given. Make a list of computer related services you can obtain from them. http://www.gov.lk/web/ http://www.engage.icta.lk https://www.techcert.lk/si/ https://www.cert.gov.lk For free distribution 179 6.2.5 Health issues related to use of Information Communication Technology ² Ergonomics and health issues Ergonomics is a word made with the use of two words in the Greek Language. According to Greek Language “ergon” is job or action. “nomos” is law. Therefore, the simple meaning to be collected from this word is: “a job must be created to the comfort of the worker and the worker must not be forced to adjust himself/herself to the work. If not, the worker will subject himself/ herself to various tensions and illnesses.” As of today, technology has become indispensable to mankind. Technology and mankind are now interconnected as inseparable. Daily, the numbers using technology keep increasing. As a result, technology related health issues too keep increasing. Issues arise as a result of the continuous use of a computer for over four hours at a stretch. Let us take a look at these health issues: i) Musculoskeletal Problems Non-stop use of a computer can bring about pain in different muscles and bones of the human system. The main reason for this is the wrong posture taken with the use of the computer (Fig 6.21). Figure 6.21 - Musculoskeletal problems ii) RSI – Repetitive Stress Injury Repetitive stress injury is the pain extending from the shoulder to the fingers of the body. The affected areas can show swelling and hardness that brings out the pain. The difficulty to move the mouse is a result of this pain. The cause of the pain is incorrect posture (Fig. 6.22). Figure 6.22 - Repetitive Stress Injury 180 For free distribution iii) CTS – Carpel Tunnel Syndrome (Fig.6.23) Carpel tunnel syndrome is the feeling of a numbness and pain in the fingers. The pain arises due to the pressure exerted on the wrist. Incorrect use of the key board and the mouse or placing them in the incorrect positions are reasons for the syndrome. Figure 6.23 - Carpel Tunnel Syndrome iv) CVS - Computer Vision Syndrome Sticking to the computer continuously for 6 to 7 hours can cause irritation of the eyes and is identified as the Computer Vision Syndrome. Dry eyes, redness in the eyes, tearing, blurred vision, or pain in the head, neck or back are symptoms of the discomfort. (Fig.6.24) Figure 6.24 - Computer Vision Syndrome v) Headache Pressure on the muscles of the neck and tiredness around the eyes usually cause headaches to users of computers. (Fig. 6.25) Figure 6.25 - Headache vi) Stress Increase of activities in the working environment due to the technological advancement cause stress, sleeplessness, tiredness, lack of appetite etc. (Fig. 6.26) Figure 6.26 - Stress For free distribution 181 How can these health problems be avoided? Correct posture in the use of a computer, is essential. This is an essential feature of ergonomics. Correct posture in the use of a computer can help prevent many problems associated with health. They are, 1 2 } 3 5 4 Figure 6.27 - Correct posture 1. Keeping the computer on a suitable table at eye level or a little lower. 2. The distance between the computer screen and the eye to be 18 – 28 inches or 45 – 70 cm. 3. Keeping the user’s back straight against the back of the chair and keeping shoulders relaxed. 4. Keeping legs vertical to the ground with the soles flat on the surface. 5. Keeping the mouse near the computer, keying in words lightly, moving wrist as is necessary while keeping the keyboard straight at elbow level or lower. To adhere to these movements: ² Adjust light on the computer to make the eyes comfortable ² Blink and take eyes off the screen on and off ² Take a break in between work, walk short distances ² Fix playtime sessions for children and direct them to other activities ² People using computers at work for 7 to 8 hours need to refrain from using computers at home and maintain a relaxed mind. Followers of these procedures are unlikely to face health issues. 182 For free distribution 6.2.6 e waste - Harmful elements and effects on environment Electronic products such as computers, television, mobile phones, printers worked using electricity or powered by batteries have become non working after reaching the end of their useful life are known as e waste. ^Figure 6.28& Mouse, key board and other Scanners electronic devices and copiers Personal electronic devices Audio/video e waste equipment Television Mobile phones CFL bulbs Figure 6.28 - e waste at the end of the useful life These productions are made up of lots of harmful elements. Once the useful life is over and discarded to the open environment without following the correct procedure of disposal, it causes immense harm to humans and the environment as well. Pollution of the environment effects man himself. Brain Lungs Skin Liver Figure 6.29 If CFL (compact fluorescent light) bulbs are disposed in an improper way, it can harm the environment since they contain minute particles of mercury, a toxic metal that is hazardous. For free distribution 183 Health hazards and effects of Mercury ² Damage to brain cells ² Disruption of the nervous system ² Allergies on the skin ² Once inhaled, Mercury vapour can harm kidney, liver and central nervous system ² Damage to DNA (Deoxyribonucleic Acid) and chromosome Further, the improper disposal of other e waste can cause swelling and irritation on the body, nausea, stress, issues in blood veins and cancers. some such harmful elements are, Arsenic, Barium, Beryllium, Cadmium, Chromium, Dioxins, Lead, Mercury, Selenium Proper disposal of e waste 1. Reduce usage - Reduce unnecessary purchase by maintaining the existing electronic devices 2. Reuse - Sell or donate old but working electronic devices without discarding 3. Recycle - Directing irreparable devices to an institute which recycle them Activity 1. Visit the website of Central Environmental Authority of Sri Lanka and identify the steps that are taken for e waste disposal. 2. Visit www.ewaste.lk, the institute dedicated to the proper disposal of e waste in Sri Lanka. Prepare a booklet containing the services provided by that institute and how these services are obtained. 6.2.7 Social issues related with ICT Hey, Mr. Jhonson.. Mr. Jhonson? i) Digital divide Digital divide is an economic and social inequality due to the differences in access to, ability to or use of Information Communication Technology. Figure 6.30 - Digital divide 184 For free distribution Some of the reasons for the digital divide are as follows; ² Education ² Lack of education ² Ability to use technology ² Inability to use technology ² Affluence ² Poverty ² Industrial development ² Under industrial development ² Suburban ² Rural Figure 6.31 ² Education/Lack of education - Ignorance regarding the benefits of Information Communication Technology and their use create differences among individuals. ² Availability/Unavailability of technical know-how - There is little possibility of connection between people who are knowledgeable of and make good use of Information Communication technology with those who are totally ignorant of Information Communication Technology or their uses. ² Affluence/Poverty - Even though, there is a need and the necessity to learn and use ICT, afford ability becomes a matter for denied. ² Industrial development/under industrial development - Industrialization of a country is a reason for the use of Information Communication Technology. Non-industrialization leads to a digital divide between countries. ² Suburban/Rural - Those leading urban lives are very busy and use Information Communication Technology heavily. On the other hand, those leading simple lives freely in rural areas simply do not care for the use of Information Communication Technology. As a result, there arises a digital divide between people. ii) Digital Bridge - Digital bridge is forming connections among people avoiding the digital divide. However, it is not possible to create a digital bridge by providing each and everyone with a computer or a mobile phone. It is necessary for people to acquire different technological products, get to know them and learn how to use them effectively. Otherwise, the technology may become meaningless and lose value. For free distribution 185 How to form a digital bridge Figure 6.32 - Digital Bridge ² Digital Literacy – Acquiring ICT Knowledge helps get over a digital divide. Establishing places such as, Vidatha centres, Nenasala centres, Computer Resource Centers to provide free use of computers or at low cost in different parts of the country, can contribute towards overcoming a digital divide. To promote the use of such centres, there need to be mobile publicity, delivery of handouts and poster displays. The benefits of digital literacy are as follows: ◦ Realization of the need of using ICT resulting in an urge to use it ◦ Helps overcome issues arising from the use of ICT as far as possible. ◦ Realizes the value of using the Internet for payment of bills, doing research and collecting information about education, being aware of information related to modern medicine and in applying for jobs. ² Supply of computers - Digital literacy is the foundation of the digital bridge. Organizing the purchase of computers at easy concessionary rates can increase the literacy rate in a country. It helps not only those anxious to gain digital literacy but also other members of such families as well. ² Equal opportunities to dispel other financial difficulties - Making it possible for everyone to access the Internet for free on a reasonable payment and clearing all obstacles towards this process. Easy access to the Internet for everybody will certainly help school children of all ages to collect necessary information for their study purposes while making online education possible. It will also provide opportunities for employment, observe market trends, exchange information through social networks and related concerns. 186 For free distribution ² Participation of intermediaries - To make the digital bridge a success, it is extremely necessary to get the support of various business concerns, people’s associations and both public and private sector sponsorship and assistance. Activity Find what measures the Sri Lankan government has taken to get over the digital divide and establish a digital bridge. iii) De-Skilling Figure 6.33 De-skilling is also one of the effects of using ICT. (Fig. 7.33) Machinery or automation has taken over skilled labour in places of work, driving people away towards unemployment. It is easy to direct and maintain machinery at work. However, the chances lost by skilled workers are enormous and have made them helpless. People and organizations have a wealth of knowledge collected over the years. All this knowledge is wasted with the shift to machinery. Further, the change does not allow for more knowledge and allows for lost opportunities. These contribute to the disadvantages of automation. A few such examples are discussed below: ² Machinery has taken over the industry replacing the talents of people. ² Libraries have been made to close down and jobs in the sector lost due to the electronic books and magazines. ² Online learning through the distance mode has limited teacher resources. ² Health concerns are easily sorted out from home itself, cutting down the job opportunities in laboratory services For free distribution 187 Technology related employment opportunities We learnt that technology would, in various ways deny us opportunities for employment. (Fig. 15.34) Yet, technology has, today, come to be an invaluable asset to mankind. The main reason for this is the availability of sufficient opportunities for employment to those aware of ICT Some high level, prosperous and well paid employment opportunities for those with knowledge of and the ability to handle ICT Figure 6.34 - Technology related are listed as follows. There are many more employment opportunities. opportunities other than for those listed. ² Computer programmer ² Computer/Information Systems Analyst ² Data Communications Analyst ² Database Programmers and Analyst ² Desktop/Applications Support Specialist ² Mobile Application Developer ² Network and Systems Security Specialist ² Network Managers and Administrator ² Software Engineer ² Technical Sales Specialists ² Technical Trainer ² Telecom manager ² Telecommunications Line Installer ² Website Developers But of these, Software Engineers are the most in demand, locally and globally. At present, Software Engineers employed abroad have come to be the largest contributors towards foreign exchange earnings. This is due to the Software Engineers being a highly paid employment opportunity. Therefore, being highly educated about the development of software as well as ICT can certainly help you win prosperity with highly paid employment opportunities. 188 For free distribution 6.2.8 Misuse of ICT to harm Society i) Social Media Social media could be introduced as a fertile breeding ground towards connecting people globally, cultivating associations and grouping like-minded people towards exchanging personal information and opinions on related topics of interest. Given below are a few services social media provide. ² Promote one’s products profitably Figure 6.35 - Social Media ² Blogs – Blogs are a shortened term for Web logs and refer to routing personal diaries or magazines. These web logs are created for people to present their daily experiences or about happenings that could cause harm to society. On reading web logs others too can contribute opinions. ² Social media helps attract people using the Internet to one’s own website, product detailing websites or blogs. ² Forum – Forums are routine discussion panels. Forum provides a good opportunity for people to openly express common opinion. Forum is another service from social media. ² It has become increasingly possible for social media to connect people from different parts of the globe share opinions, participate in lively discussions, exchange images, video clips, and songs. ii) Cyber crime However, irresponsible use of social media has engendered misconduct in society. This irresponsible use is identified as cyber crime. A few such acts are as described. ² Uploading others’ images without permission ² Releasing unsuitable photographs or videos of women or young girls to the Internet and making use of such images or videos to frighten, threaten or blackmail ² Giving publicity to information that can harm a person’s reputation ² Misleading people with wrong information and images about others published on the Internet to cause personal discomfort ² Using social media to give out false information and, thereby attract others to finally destroy lives ² Using unfair means to gain access to others’ personal accounts and stealing personal information. For free distribution 189 iii) How can we protect ourselves from using social media? ² Be careful in selecting social media over the Internet ² Be cautious about making friends through social media over the Internet ² Be careful in presenting personal information to social media over the Internet ² Avoid accessing suspicious e-mails ² Do not click on suspicious links that come through e-mail ² Ignore anonymous e-mails ² Do not allow social media to access the e-mail address book ² Do not use personal e-mail to access social media ² Avoid installing applications in your computer that come through social media. ² Think twice before using social media ² Make little children and friends aware about the harm social media can cause. Summary ² Technology is used in various ways to entertain. ² The use of the Internet brings up issues. They relate to legal, ethical and physical issues, harmful software, environmental, health and the social. ² Patent rights help secure legal rights of intellectual property. ² To avoid physical issues interrupted power supply, hardware firewalls, closed circuit TVs restricted entry through locked doors, surge protectors can be used. ² Logical issues are best met with passwords, making firewalls active and maintaining backups. ² Harmful software can come in as computer viruses, computer worms, spyware, bots, hijackers, phishing and spam. ² It is safe to use antivirus software for protection against harmful software. ² Physical strain can be minimized with correct posture. ² Electronic waste needs to be disposed of correctly to avoid unnecessary harm to the environment. ² Digital divide is a social issue arising from ICT. ² Digital bridge can help avoid digital divide. ² ICT contributes towards elimination of inherent talent. ² Those quite knowledgeable about ICT have an advantage over others in well paid employment. ² Safe use of social media can help minimize cyber crime 190 For free distribution

Use Quizgecko on...
Browser
Browser