think and explain inappropriate use of computer may result accident or hazard give four safety issues with ict and suggest prevention from the given issues
Answers
Answered by
2
First if u have to keep safe ur eyes u should wear a spackes,
Save electricity, don't use more computer, be careful. Thks
Save electricity, don't use more computer, be careful. Thks
Answered by
2
Heya !!!
Here is your answer :-
Information technology (IT) is playing a crucial role in society. It has transformed the whole world into a global village with a global economy. As technology has advanced, the way in which privacy is protected and violated has also changed.
Several positive and some negative social impact of Information Technology could be far reaching.
There are various malicious programs that are used to damage computer system, gather sensitive information, or gain access to private computer systems. It includes viruses, worms, Trojan horses, rootkits, spyware, adware etc.
Cyber crime are also happening, it is defined as the crime in which a computer is the object of the crime or is used as a tool to commit an offence.
PREVENTION :
1. Antivirus ( Virus Cleaner )
2. Data Backup
3. Data recovery
4. Information security provisions in e-commerce.
Here is your answer :-
Information technology (IT) is playing a crucial role in society. It has transformed the whole world into a global village with a global economy. As technology has advanced, the way in which privacy is protected and violated has also changed.
Several positive and some negative social impact of Information Technology could be far reaching.
There are various malicious programs that are used to damage computer system, gather sensitive information, or gain access to private computer systems. It includes viruses, worms, Trojan horses, rootkits, spyware, adware etc.
Cyber crime are also happening, it is defined as the crime in which a computer is the object of the crime or is used as a tool to commit an offence.
PREVENTION :
1. Antivirus ( Virus Cleaner )
2. Data Backup
3. Data recovery
4. Information security provisions in e-commerce.
Similar questions