The words you are searching are inside this book. To get more targeted content, please make full-text search by clicking here.
Discover the best professional documents and content resources in AnyFlip Document Base.
Search
Published by amalipdt, 2021-08-01 13:08:02

DC014 Lecture Note & Tutorial

Applications of IT in Entertainment





Art











• Art is something that is readily available online






at any moment. Pictures, paintings, poetry





and more are just a click away.







• Popular browsers offer specific image search






options to quickly browse through art with a





single keyword.







• Computer photo editing programs and






animation programs are also the sources





behind most movies and professional






photographs.

Applications of IT in Entertainment





Games











• Computer games are a quickly growing market






just like all other forms of video games.







• Computer games offer a very wide array of





possibilities. Computers have access to many






peripheral devices such as keyboards, mouses,





joysticks, controllers and more.







• Computer games also are highly customizable






because computers can manipulate game





files.

Applications of IT in Entertainment





Games











• Computer games are a quickly growing market






just like all other forms of video games.







• Computer games offer a very wide array of





possibilities. Computers have access to many






peripheral devices such as keyboards, mouses,





joysticks, controllers and more.







• Computer games also are highly customizable






because computers can manipulate game





files.

1.2 Categories of Computer
























1.2.1 Learning Outcomes:







– Explain different categories of computer.






• Supercomputer






• Mainframe computer






• Personal computer

1.2 Categories of Computer
























1.2.1 Learning Outcomes:







– Explain different categories of computer.






• Supercomputer






• Mainframe computer






• Personal computer

Categories of Computer:





Supercomputer











• Description







– The largest, most expensive, and most powerful





computer that is used for applications that require




large amounts of calculations.






• Physical Size







– The largest computer; full-room of equipment.






• Speed







– Fastest computer; capable to process more than




one quadrillion instructions per second.

Categories of Computer:





Supercomputer











• Description







– The largest, most expensive, and most powerful





computer that is used for applications that require




large amounts of calculations.






• Physical Size







– The largest computer; full-room of equipment.






• Speed







– Fastest computer; capable to process more than




one quadrillion instructions per second.

Categories of Computer:





Supercomputer

Categories of Computer:





Supercomputer

Categories of Computer:





Supercomputer











• Storage







– Extremely large storage; measured in Petabytes.






• Usage







– Used in industrial or scientific areas for complex




calculations such as to simulate nuclear weapons





capability and to forecast weather.

Categories of Computer:





Supercomputer











• Storage







– Extremely large storage; measured in Petabytes.






• Usage







– Used in industrial or scientific areas for complex




calculations such as to simulate nuclear weapons





capability and to forecast weather.

Categories of Computer:





Mainframe











• Description







– A large, expensive, powerful computer that can





handle hundreds or thousands of connected users




simultaneously.






• Physical Size







– Large computer; partial room to full room of





equipment.






• Speed






– Fast computer; capable to process billions of





instruction per second.

Categories of Computer:





Mainframe











• Description







– A large, expensive, powerful computer that can





handle hundreds or thousands of connected users




simultaneously.






• Physical Size







– Large computer; partial room to full room of





equipment.






• Speed






– Fast computer; capable to process billions of





instruction per second.

Categories of Computer:





Mainframe

Categories of Computer:





Mainframe

Categories of Computer:





Mainframe











• Storage







– Very large storage; measured in Terabytes.






• Usage







– Used by large organizations such as hospitals,




universities, and banks to manage large amount of





centralized data.

Categories of Computer:





Mainframe











• Storage







– Very large storage; measured in Terabytes.






• Usage







– Used by large organizations such as hospitals,




universities, and banks to manage large amount of





centralized data.

Categories of Computer:





Personal Computer











• Description







– A small, least powerful computer that can perform





all of its input, processing, output, and storage




activities by itself.






• Physical Size







– Small computer that is usually placed on a desk.






• Speed







– Fast but slower than mainframe; speed is




measured in GHz (Gigahertz).

Categories of Computer:





Personal Computer











• Description







– A small, least powerful computer that can perform





all of its input, processing, output, and storage




activities by itself.






• Physical Size







– Small computer that is usually placed on a desk.






• Speed







– Fast but slower than mainframe; speed is




measured in GHz (Gigahertz).

Categories of Computer:





Personal Computer

Categories of Computer:





Personal Computer

Categories of Computer:





Personal Computer











• Storage







– Medium size storage; measured in Gigabytes or





Tetabytes.






• Usage






– Used mostly by personal users such as office





workers, lecturers, or students to perform daily





tasks.

Categories of Computer:





Personal Computer











• Storage







– Medium size storage; measured in Gigabytes or





Tetabytes.






• Usage






– Used mostly by personal users such as office





workers, lecturers, or students to perform daily





tasks.

Categories of

Supercomputer Mainframe Personal Computer
Computer




Description The largest, most expensive A large, expensive, A small, least powerful


and most powerful computer powerful computer that computer that can perform all


that is used for applications can handle hundreds or of its input, processing, output



that require large amounts of thousands of connected and storage activities by itself.


calculations. users simultaneously.


Physical size Largest computer; full-room Large computer; partial Small computer that is usually



of equipment. room to full room of placed in a desk.


equipment.


Speed Fastest computer; can Fast computer; can Fast but slower than



process more than one process billions of mainframe; speed in measured


quadrillion instructions per instruction per second. in GHz (Gigahertz).


second.





Storage Extremely large storage; Very large storage; Medium size storage; measured


measured in Petabytes. measure in Terabytes. in Gigabytes or Terabytes.














Usage Used in industrial or scientific Used by large organizations Used mostly by personal users


areas for complex to manage large amount of such as office workers, lecturers


calculations. centralized data. or students to perform daily



tasks.

Categories of

Supercomputer Mainframe Personal Computer
Computer




Description The largest, most expensive A large, expensive, A small, least powerful


and most powerful computer powerful computer that computer that can perform all


that is used for applications can handle hundreds or of its input, processing, output



that require large amounts of thousands of connected and storage activities by itself.


calculations. users simultaneously.


Physical size Largest computer; full-room Large computer; partial Small computer that is usually



of equipment. room to full room of placed in a desk.


equipment.


Speed Fastest computer; can Fast computer; can Fast but slower than



process more than one process billions of mainframe; speed in measured


quadrillion instructions per instruction per second. in GHz (Gigahertz).


second.





Storage Extremely large storage; Very large storage; Medium size storage; measured


measured in Petabytes. measure in Terabytes. in Gigabytes or Terabytes.














Usage Used in industrial or scientific Used by large organizations Used mostly by personal users


areas for complex to manage large amount of such as office workers, lecturers


calculations. centralized data. or students to perform daily



tasks.

Summary















• Explain different categories of computer.







Supercomputer






Mainframe






Personal Computer

Summary















• Explain different categories of computer.







Supercomputer






Mainframe






Personal Computer

1.3 Impact of Information Technology on society
























1.3.1 Learning Outcomes:






Discuss the impact of Information Technology on





society.

1.3 Impact of Information Technology on society
























1.3.1 Learning Outcomes:






Discuss the impact of Information Technology on





society.

1.3 Impact of Information Technology on society






Impact Of IT On : Personal Life.












• IT have not just made everything easier for us but we are




not totally dependent on all the technologies. Our




thinking capacity have decreased, even if we have




intelligence it is of use because of this technology.





• Because of the dependency we are becoming weak




physically also some of the technologies even pollutes





the atmosphere.

1.3 Impact of Information Technology on society






Impact Of IT On : Personal Life.












• IT have not just made everything easier for us but we are




not totally dependent on all the technologies. Our




thinking capacity have decreased, even if we have




intelligence it is of use because of this technology.





• Because of the dependency we are becoming weak




physically also some of the technologies even pollutes





the atmosphere.

Impact Of IT On : Personal Life.













• Information technology have decreased the distance





between the continents, communication due to the





rapid development in the sector of IT have lowered




the cost of communication also increased the speed





the data exchange.






• It made the day-to-day activities simpler,





easier and faster. The smart life have






resulted in a more luxurious life.

Impact Of IT On : Personal Life.













• Information technology have decreased the distance





between the continents, communication due to the





rapid development in the sector of IT have lowered




the cost of communication also increased the speed





the data exchange.






• It made the day-to-day activities simpler,





easier and faster. The smart life have






resulted in a more luxurious life.

Impact Of IT On : Education.










• IT have become a blessing in the field of education.





The e-class system have enhanced the way of





education the emails system have reduced the stress




of notes whereas making easier for the students to





get their notes whenever they need.






• The distance education offered by some universities




have reduced the transport and made the students





eligible to get their degree from their hometown




itself.

Impact Of IT On : Education.










• IT have become a blessing in the field of education.





The e-class system have enhanced the way of





education the emails system have reduced the stress




of notes whereas making easier for the students to





get their notes whenever they need.






• The distance education offered by some universities




have reduced the transport and made the students





eligible to get their degree from their hometown




itself.

Impact Of IT On : Education.












• Promote independent learning in students.






• Prepares student for the future.






• Has the potential to lower textbook and tuition





prices.






• Allows teachers to create an exiting way to educate




student.

Impact Of IT On : Education.












• Promote independent learning in students.






• Prepares student for the future.






• Has the potential to lower textbook and tuition





prices.






• Allows teachers to create an exiting way to educate




student.

Impact Of IT On : Education.














• The education offered by the recorded videos at




nominal rates have helped many people to learn





different activities from anywhere, for example




YouTube. This is also a result of competition between





many educational institutes.






• The email systems have made easier for






the students gaining a distance education.





This have become an easier and direct






contact between the students and the






faculty of that particular university.

Impact Of IT On : Education.














• The education offered by the recorded videos at




nominal rates have helped many people to learn





different activities from anywhere, for example




YouTube. This is also a result of competition between





many educational institutes.






• The email systems have made easier for






the students gaining a distance education.





This have become an easier and direct






contact between the students and the






faculty of that particular university.

Impact Of IT On : Cyber Crimes.














• Cyber Crime is either committed by a vast group or individual




using computer and its network for his own profit or for the



victim’s or cause physical or mental harm, or loss.





• Computers with a good network connection is used for such



crime. These crime are done with an intention of harming the




reputation of the victim of cause physical or mental harm or




loss to the victim directly or indirectly.




• These crime also include illegal hacking





using the internet or websites in an





illegal way of copyrights and piracy, etc.

Impact Of IT On : Cyber Crimes.














• Cyber Crime is either committed by a vast group or individual




using computer and its network for his own profit or for the



victim’s or cause physical or mental harm, or loss.





• Computers with a good network connection is used for such



crime. These crime are done with an intention of harming the




reputation of the victim of cause physical or mental harm or




loss to the victim directly or indirectly.




• These crime also include illegal hacking





using the internet or websites in an





illegal way of copyrights and piracy, etc.

Impact Of IT On : Cyber Crimes.














• The target of cyber crime can be :






I. Financial Fraud Crime






II. Cyber terrorism






III. Cyber extortion.

Impact Of IT On : Cyber Crimes.














• The target of cyber crime can be :






I. Financial Fraud Crime






II. Cyber terrorism






III. Cyber extortion.

Impact Of IT On : Cyber Crimes.














The target of cyber Crime can be:






i. Financial Fraud Crimes.






This requires little technical expertise and is




common form of theft by employees entering the





false data and or unauthorized instructions or by




using and unauthorized processes.






This includes bank fraud, identity






theft, extortion, and theft of






classified information.

Impact Of IT On : Cyber Crimes.














The target of cyber Crime can be:






i. Financial Fraud Crimes.






This requires little technical expertise and is




common form of theft by employees entering the





false data and or unauthorized instructions or by




using and unauthorized processes.






This includes bank fraud, identity






theft, extortion, and theft of






classified information.

Impact Of IT On : Cyber Crimes.














The target of cyber crime can be:






ii. Cyber Terrorism






 It is an acts of terrorism committed using computers




and computer networks.






 A Cyber terrorist is someone persuade a government





or an organization to advance his or her political or




social objectives by launching a computer-based





attack against computers, network, or the





information stored on them.

Impact Of IT On : Cyber Crimes.














The target of cyber crime can be:






ii. Cyber Terrorism






 It is an acts of terrorism committed using computers




and computer networks.






 A Cyber terrorist is someone persuade a government





or an organization to advance his or her political or




social objectives by launching a computer-based





attack against computers, network, or the





information stored on them.

Impact Of IT On : Cyber Crimes.














The target of cyber crime can be:






iii. Cyber Extortion






 Cyber extortion occurs when website, e mail server, or




computer system is threatened with repeated denial





of service or other attacks by hackers. These hackers




demand money in return for promising to stop the





attacks and to offer “protection”.






 According to the FBI, cybercrime extortionists are





increasingly attacking corporate websites and




networks, disabling their ability to operate and




demanding payments to restore their service.

Impact Of IT On : Cyber Crimes.














The target of cyber crime can be:






iii. Cyber Extortion






 Cyber extortion occurs when website, e mail server, or




computer system is threatened with repeated denial





of service or other attacks by hackers. These hackers




demand money in return for promising to stop the





attacks and to offer “protection”.






 According to the FBI, cybercrime extortionists are





increasingly attacking corporate websites and




networks, disabling their ability to operate and




demanding payments to restore their service.

Impact Of IT On : Cyber Crimes.














The target of cyber crime can be:






ii. Cyber Extortion - continue






• More than 20 cases are reported each month to the




FB and many go unreported in order to keep the





victim’s name out of the public domain. Perpetrators




typically use a distributed denial of service attack.


Click to View FlipBook Version