Академический Документы
Профессиональный Документы
Культура Документы
End Show
Developing Team
S.K.N.Suriyaarachchi (PICTEC-Western Province) N.Nobel Ravi(ZICTEC-Nuwara Eliya) A.M.Vazeer (CRC- Kahagolla) D.M.D.Kumarihamy(ZEO-Welimada) L.K.Rathnayake(ZICTEC-Passara)
End Show
End Show
Information and Communication Technology has become a vital player in the national development of modern society. Methods of gathering, processing and dissemination of information has dramatically changed in the modern era with the advent of ICT.
End Show
ICT has contributed to increase productivity of goods and services relevant to Health Education Agriculture Industries and almost all other sectors in Sri Lanka
End Show
End Show
E-channeling Research and Innovation Medical testing & reporting Surgery Maintenance of Medical History Records In house management Remote surgery
End Show
ICT in Education
End Show
End Show
Online courses/exams Huge collection of subject related electronic materials and methodologies(Lessons, Tutorials, simulations etc.) Learning Management System(LMS) Educational fora, video conferencing, CAL(Computer Assisted Learning) School net
End Show
Hypermedia tools Simulation, animation, modeling, audio and video Huge Collection of Subject Related Materials (Lessons, Tutorials etc.) Modern Learning / Teaching Methodologies
End Show
ICT for teaching cont School Management Systems Web sites related to Education Management
End Show
ICT in Agriculture
Introduces modern machinery and equipment Provides information on seeds that maximize harvest and preservation of products Provides awareness in the field of modern Agriculture Fertilizers Pesticides Provides information on modern techniques in horticulture and in agro technology Research on farming, animal husbandry Virtual/competitive markets for agricultural products
End Show
ICT in Industry
Provides information on modern tools, equipment, machinery Provides software on designing and modeling Provides know how on the use of new techniques in various industries including self employment E.g. hair dressing, beauty culture and apparel
Facilitates office automated systems Electronic processing saves energy and time Increases productivity, efficiency and accuracy Minimizes paper work Provides on-line jobs Facilitates tele-commuting Provides infrastructure facilities for call centers
End Show
ATM Credit Cards Inter Bank Money Transfer On-Line banking (e-banking) Image Processing Cheque Clearing Systems Money grams Etc.
End Show
ICT in Insurance Sector On the Spot Claims Medical coverage using electronic cards
End Show
Social Issues
Digital Divide Digital divide is the division of people according to the accessibility to ICT Resources. There is a gap between those who can access ICT resources easily and those who can not access.
End Show
Ethical Issues
Legal Issues
End Show
Security Issues
Hardware
Protection Computer must be protected from outside threats Software Protection Programs must be protected from various threats
End Show
Hardware protection
Your computer should be equipped with A UPS(Uninterrupted Power Supplier) to avoid risk of sudden power failure and fluctuations. Surge protection safeguard against lightening and thunder. Stabilizer to control voltage.
End Show
Environmental factors to protect your computer Your computer should be kept in a dust free, Dry (moisture free), Smoke free environment.
End Show
Logical Security The software and the data in your computer can be protected by Passwords Backups
End Show
Malicious codes
The expression "malicious code" has been used by analysts to describe the category to which
Computer Viruses
A program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. All computer viruses are manmade. A computer virus attaches itself to a program or file so that it can spread from one computer to another, leaving infections as it travels. Much like human viruses, computer viruses can range in severity.
End Show
End Show
replaces or implants itself in the boot sector---an area of the hard drive (or any other disk) accessed when you first turn on your computer. This kind of virus can prevent you from being able to boot your hard disk.
End Show
File Virus
infects applications. These executables then spread the virus by infecting associated documents and other applications whenever they're opened or run.
End Show
Macro Virus
Written using a simplified macro programming language, these viruses affect Microsoft Office applications A document infected with a macro virus generally modifies a pre-existing, commonly used command (such as Save) to trigger its payload upon execution of End Show that command.
Multipartite Virus
infects both files and the boot sector--a double shot that can reinfect your system dozens of times before it's caught.
End Show
Polymorphic Virus
changes code whenever it passes to another machine; in theory these viruses should be more difficult for antivirus scanners to detect, but in practice they're usually not that well written.
End Show
Stealth Virus
hides its presence by making an infected file not appear infected, but doesn't usually stand up to antivirus software.
End Show
Worm
Worms spread from computer to computer, A worm takes advantage of file or information transport features on your system, which allows it to travel unaided. The biggest danger with a worm is its capability to replicate itself on your system
End Show
A Trojan Horse
It will appear to be useful software but will actually do damage once installed or run on your computer. When a Trojan is activated the results can vary. Some Trojans are designed to be more annoying than malicious (like changing your desktop, adding silly active desktop icons) they can cause serious damage by deleting files and destroying information on your system.
End Show
Avoid infected disks and flash drives. Avoid downloading infected executable file. Be careful when opening e-mails with unfamiliar addresses. Use the latest version of an anti virus program and run it regularly.
End Show
If it's a known virus it is removed from your system. In the case of new viruses it quarantines (isolates) the questionable program.
End Show
End Show
Firewall software
A firewall is a system that prevents unauthorized use and access to your computer. A firewall can be either hardware or software.The most popular firewall choice is a software firewall.
End Show
Spy ware
A general term for a program that secretly monitors your actions. While they are sometimes evil, like a remote control program used by a hacker, software companies have been known to use spy ware to gather data about customers.
End Show
Ergonomics & health issues Repetitive Stress Injuries Eye Strains Electro-Magnetic Field (EMF) exposure
End Show
The keyboard should be at elbow height, and at a distance and angle that allow you to keep your wrists straight. If your chair doesn't have arms, use a pillow to support your arms. Adjust your chair so that your feet are flat on the ground and your hips are slightly higher than your knees
End Show
Keep your feet flat on the floor. Don't slouch(bend). Keep your head in a "neutral" position Relieve neck strain by looking back over your shoulder while sitting up straight. Hold for 10 seconds, then slowly turn and look the other way. Relax shoulders by rolling them backwards and forwards. Reduce muscle tension in your hands by spreading your fingers wide apart. Hold, and then make a tight fist
End Show
Your head should be about 18 - 30 inches from the monitor. Blink frequently so your eyes don't get dry. Clean the screen every once in a while to remove dust that has become one with your screen due to static electricity. Refocus your eyes every ten minutes or so by looking away from the computer and briefly focusing on an object at least 20 feet away. End Show
Electro-Magnetic Field (EMF) exposure Take frequent breaks away from the computer Sit at arms length from the System and the Monitor Use a flat panel display
End Show
The End