Академический Документы
Профессиональный Документы
Культура Документы
ICT (Definition)
Medicine:
Though the precise nature of the impact is much more
difficult to predict, it seems that the health sector will
benefit from advances in mobile telephony and
internet services. For example:
Patients and informal providers in Bangladesh
routinely seek advice from doctors supporting Health
Line, a subscriber service implemented by the
Grameen mobile telephone company.
Medical
Communication :
We also have very fast and convenient
access to information. Through Email
we can communicate for information
sharing with a person sitting
thousands of miles away in seconds.
There is chat software that enables
one to chat with another person in a
real-time basis. Video conferencing
tools are becoming readily available to
the common man, we can
communicate with others with very
low cost or free with the help of
Business :
Shops, malls, trade centers and
supermarkets along the business
houses are fully integrated with ICT
system for file management,
calculating the bills, office
communication, administrative work,
decision making etc. one can predict
future trends of business using
artificial intelligence software. There
are fully automated factories running
on software in the world
Health Problem :
Computers
Piracy :
Piracy
Pornography :
One can post adult contents like text,
images, videos etc. on net and many
social networking sites which causes
and disturbs the ones images. There
is cyber law but its very difficult to
implement this kind of crime. These
pornography sites may cause the
disturbance in ones education in a
wrong way and make the people
offensive and sexual in their manners.
Computer Virus :
Computer viruses are small software
programs that are designed to spread
from one computer to another and to
interfere with computer operation. Viruses
can also replicate themselves. Computer
viruses are often spread by attachments in
email messages or instant messaging
messages. That is why it is essential that
you never open email attachments unless
you know who it's from and you are
expecting it
Hacking :
The
End