Вы находитесь на странице: 1из 47

Computer and Information Technology for (HKCEE) Core Module

16.1Occupational Safety
16.2Environmental Issues of Computer Equipment
16.3Computer Viruses
16.4Securing Internet Transactions
16.5Cashless Society
16.6The Knowledge-Based Society and
Globalisation
16.7Impacts of Upcoming Technologies
Computer and Information
Technology for (HKCEE)
Core module: Part E

16.1 Occupational Safety


Ergonomics
science of suiting the workplace environment to
the user
Computer-related diseases
Computer Vision Syndrome (CVS)
Repetitive Stress Injuries (RSI)

© Longman Hong Kong Education Page2


Computer and Information
Technology for (HKCEE)
Core module: Part E

16.1 Occupational Safety


Computer Vision Syndrome (CVS)
appear when using computer for a prolonged
period of time
symptoms
dry / irritated eyes
blurry vision
headaches
preventions
incorporate rest periods in each workday
use glare screens
use a stand to hold hard copies
© Longman Hong Kong Education Page3
Computer and Information
Technology for (HKCEE)
Core module: Part E

16.1 Occupational Safety


Repetitive Stress Injuries (RSI)
appear after repeating the same physical
movements for a long time
Prevention of RSI
5 minutes break for every hour of work
stretch muscles

© Longman Hong Kong Education Page4


Computer and Information
Technology for (HKCEE)
Core module: Part E

16.1 Occupational Safety


Ergonomic devices
Goal: provide comfort, efficiency and safety in
workplaces

ergonomic mouse ergonomic keyboard

© Longman Hong Kong Education Page5


Computer and Information
Technology for (HKCEE)
Core module: Part E

Well-designed
work area
35 to 6
0 cm
viewing angle
• Elbows at 90º 20º to the centre
of screen
• Arms and
hands parallel
keyboard height
depend on height
adjustable
of user
backrest

adjustable seat
feet flat on floor
adjustable height
chair with 5 legs

© Longman Hong Kong Education Page6


Computer and Information
Technology for (HKCEE)
Core module: Part E

16.1 Occupational Safety


Job stress
harmful physical and emotional responses
occur when requirements of job do not match the
capabilities of workers

© Longman Hong Kong Education Page7


Computer and Information
Technology for (HKCEE)
Core module: Part E

16.2 Environmental Issues of


Computer Equipment
Computer technology
cause more pollution problems than benefit to
environment

© Longman Hong Kong Education Page8


Computer and Information
Technology for (HKCEE)
Core module: Part E

16.2.1 Computer Waste


Toxic materials found in a computer
Hexavalent chromium
steel plate
Phosphor
coat to CRT face plate

Barium
front panel of CRT

Plastic

Lead
CRT display
© Longman Hong Kong Education Page9
Computer and Information
Technology for (HKCEE)
Core module: Part E

16.2.1 Computer Waste


Toxic materials found in a computer

Hexavalent chromium Plastics


steel plate

Lead Beryllium
circuit board motherboards
and connectors
Mercury
flat panel displays, Cadmium
switches and printed
wiring boards
© Longman Hong Kong Education Page10
Computer and Information
Technology for (HKCEE)
Core module: Part E

16.2.1 Computer Waste


Toxic materials found in a computer

Plastics

© Longman Hong Kong Education Page11


Computer and Information
Technology for (HKCEE)
Core module: Part E

16.2.1 Computer Waste


Electronic waste
world’s fastest growing waste
problem
Useful life of a computer
current life is 3 to 5 years
reduce to 2 years by 2005

© Longman Hong Kong Education Page12


Computer and Information
Technology for (HKCEE)
Core module: Part E

16.2.1 Computer Waste


Traditional treatment of computer
landfill
leaching to water sources
incineration
toxic gas emissions
open burning
acid baths
toxic dumping

© Longman Hong Kong Education Page13


Computer and Information
Technology for (HKCEE)
Core module: Part E

16.2.2 Benefits of Reuse and Recycling


1. Extend the useful life of computers
2. Provide opportunities for people who cannot
afford new computer
3. Keep electronic waste out of landfills
4. Conserve natural resources
5. Supply renewed products

© Longman Hong Kong Education Page14


Computer and Information
Technology for (HKCEE)
Core module: Part E

16.3 Computer Viruses


Computer virus
corrupt a computer system
replicate itself to infect other computer systems
Types of computer viruses
e-mail viruses
worms
Trojan horses

© Longman Hong Kong Education Page15


Computer and Information
Technology for (HKCEE)
Core module: Part E

16.3 Computer Viruses


E-mail viruses
replicates itself by automatically mailing itself to
people in victim’s e-mail address book
infect computers through attachments

© Longman Hong Kong Education Page16


Computer and Information
Technology for (HKCEE)
Core module: Part E

16.3 Computer Viruses


How a virus spread through an email message
B’s e-mail C@abc.com
address D@abc.com
book E@abc.com C’s computer

D’s computer
A’s computer B’s computer

E’s computer

© Longman Hong Kong Education Page17


Computer and Information
Technology for (HKCEE)
Core module: Part E

16.3 Computer Viruses


Worm
software that uses computer networks and
security holes to replicate itself
Trojan horse
a program in which harmful code is contained in
apparently harmless program
enter the computer without notice
hackers can view and steal file inside computer if
infected

© Longman Hong Kong Education Page18


Computer and Information
Technology for (HKCEE)
Core module: Part E

16.3 Computer Viruses


How can we avoid virus attacks?
Do not accept files from high-risk sources
unchecked floppy disk
CD-ROMs
unknown downloaded files
Install antivirus software with regular updates
Scan the computer before run it
Backup the program and files constantly
Update password constantly

© Longman Hong Kong Education Page19


Computer and Information
Technology for (HKCEE)
Core module: Part E

16.3 Computer Viruses


Antivirus software
determine whether
files are infected
disinfect the disk if
necessary
scan for virus
signatures
regular updates for
detecting new viruses

© Longman Hong Kong Education Page20


Computer and Information
Technology for (HKCEE)
Core module: Part E

16.4 Securing Internet Transactions


Four requirements of secure Internet
transactions
authentication
an entity proves its identity to another entity
non-repudiation
both sender and receiver cannot deny the message
after transaction
confidentiality
no message is leaked out during transaction
data integrity
message sent and received are unaltered
© Longman Hong Kong Education Page21
Computer and Information
Technology for (HKCEE)
Core module: Part E

16.4 Securing Internet Transactions

© Longman Hong Kong Education Page22


Computer and Information
Technology for (HKCEE)
Core module: Part E

16.4 Securing Internet Transactions


Encryption
convert readable data into unreadable characters
prevent unauthorised access
Decryption
convert unreadable data into readable characters
encryption

LONGMAN MNOLNAG
decryption

© Longman Hong Kong Education Page23


Computer and Information
Technology for (HKCEE)
Core module: Part E

16.4 Securing Internet Transactions


Some encryption process uses
algorithm
mathematical formula
encryption key
a string of numbers and characters
secure to have longer key

© Longman Hong Kong Education Page24


Computer and Information
Technology for (HKCEE)
Core module: Part E

16.4 Securing Internet Transactions


Private key encryption
Both sender and recipient use the same key to
encrypt and decrypt data
sender recipient
private key private key
(encryption) (decryption)

Internet

plaintext ciphertext ciphertext plaintext

© Longman Hong Kong Education Page25


Computer and Information
Technology for (HKCEE)
Core module: Part E

16.4 Securing Internet Transactions


Public key encryption
Sender uses recipient’s public key to encrypt data
Recipient decrypts the data with private key
sender recipient
public-key
server private key
public key (encryption) (decryption)

Internet

plaintext ciphertext ciphertext plaintext

© Longman Hong Kong Education Page26


Computer and Information
Technology for (HKCEE)
Core module: Part E

16.4 Securing Internet Transactions


Digital Certificate
guarantee that a user
is legitimate
also called public-key
certificate
issued and verified by
Certificate Authority
(CA)

© Longman Hong Kong Education Page27


Computer and Information
Technology for (HKCEE)
Core module: Part E

16.4 Securing Internet Transactions


Components of a digital certificate
name
public key
expiration date
issuing CA’s name and signature
serial number of the certificate

© Longman Hong Kong Education Page28


Computer and Information
Technology for (HKCEE)
Core module: Part E

16.4 Securing Internet Transactions


Secure Sockets Layer (SSL)
protocol providing secure data transmission via
the Internet
included as part of Netscape and Microsoft
browsers
obtain confidential information from commercial
web sites
web address starts with https://

© Longman Hong Kong Education Page29


Computer and Information
Technology for (HKCEE)
Core module: Part E

16.4 Securing Internet Transactions


Secure Sockets Layer (SSL)

© Longman Hong Kong Education Page30


Computer and Information
Technology for (HKCEE)
Core module: Part E

16.4 Securing Internet Transactions


Pretty Good Privacy (PGP)
e-mail encryption programs
freeware for non-commercial users

© Longman Hong Kong Education Page31


Computer and Information
Technology for (HKCEE)
Core module: Part E

16.4 Securing Internet Transactions


Digital Signature
digital code attached to a message to verify the
origins and contents of a message
public key method
senders encrypt digital signature by their private key
receivers use sender’s public key to decrypt digital
signature
receivers generate a new hash of received message
for verification

© Longman Hong Kong Education Page32


Computer and Information
Technology for (HKCEE)
Core module: Part E

16.4 Securing Internet Transactions


Digital Signature
private key public key
(encryption) (decryption)

original signed verified


text text verifying text

© Longman Hong Kong Education Page33


Computer and Information
Technology for (HKCEE)
Core module: Part E

16.4 Securing Internet Transactions


Example of a digital signature

© Longman Hong Kong Education Page34


Computer and Information
Technology for (HKCEE)
Core module: Part E

16.5 The Cashless Society


Cashless society
speeded up by Internet
immediate transfer of funds between buyer and
seller
payment methods

smart cards (e.g. Octopus)

credit cards
electronic money (e.g. EPS)
© Longman Hong Kong Education Page35
Computer and Information
Technology for (HKCEE)
Core module: Part E

16.6 The Knowledge-Based Society


and Globalisation
Knowledge-based society
people require constant improvement and
upgrading: life-long learning
Globalisation
development of media
allow people to obtain information around the world
most update and fast
affect our culture, religions and ethnics

© Longman Hong Kong Education Page36


Computer and Information
Technology for (HKCEE)
Core module: Part E

16.6 The Knowledge-Based Society


and Globalisation
Positive effect of globalisation
people in the globe are more connected to each
other
easier to do business with worldwide companies
people pay more attention to the global issues
environmental
political
economic

© Longman Hong Kong Education Page37


Computer and Information
Technology for (HKCEE)
Core module: Part E

16.6 The Knowledge-Based Society


and Globalisation
Adverse effects of globalisation
International enterprises deprives works in the
Third World countries
Dominant cultures devour the local cultures

© Longman Hong Kong Education Page38


Computer and Information
Technology for (HKCEE)
Core module: Part E

16.7 Impact of Upcoming Technologies


High bandwidth
more high-bandwidth demanded applications run
on the Internet

© Longman Hong Kong Education Page39


Computer and Information
Technology for (HKCEE)
Core module: Part E

16.7 Impact of Upcoming Technologies


Mobile technology
allow wireless product to communicate across
distances
driven by convenience, cost and access

pager handheld computer


mobile phone
© Longman Hong Kong Education Page40
Computer and Information
Technology for (HKCEE)
Core module: Part E

16.7 Impact of Upcoming Technologies


Bluetooth
protocol of short range frequency-hopping radio
link between devices
simplify data synchronization among Internet
devices

© Longman Hong Kong Education Page41


Computer and Information
Technology for (HKCEE)
Core module: Part E

16.7 Impact of Upcoming Technologies


Application of Bluetooth wireless technology

handheld device car


camera

© Longman Hong Kong Education Page42


Computer and Information
Technology for (HKCEE)
Core module: Part E

16.7 Impact of Upcoming Technologies


Global System for Mobile (GSM)
digital mobile telephone system
SIM (Subscribe Identity Module) cards are provided
for GSM users
roaming service

SIM card for GSM phone

© Longman Hong Kong Education Page43


Computer and Information
Technology for (HKCEE)
Core module: Part E

16.7 Impact of Upcoming Technologies


Third-generation (3G)
support enhanced multimedia
compatible with 2G
connect with wired networks
indoor bandwidth = 2 Mbps
outdoor bandwidth
= 144 Kbps / 384 Kbps
support GSM roaming services

© Longman Hong Kong Education Page44


Computer and Information
Technology for (HKCEE)
Core module: Part E

16.7 Impact of Upcoming Technologies


Smart home technology
integrate services or technology to homes
enhance the quality of life

© Longman Hong Kong Education Page45


Computer and Information
Technology for (HKCEE)
Core module: Part E

16.7 Impact of Upcoming Technologies


Advantages of smart home technology
maximal safety and security
maximal comfort
best communication
minimal cost of energy

© Longman Hong Kong Education Page46


Computer and Information Technology for (HKCEE) Core Module

END

Вам также может понравиться