Effects of
Computer
and Human
Error
Good effects of use of computer
(Advantages)
Multitasking – Multitasking is one among the main advantage of computer. Person can do
multiple task, multiple operation at a same time, calculate numerical problems within few
seconds. Computer can perform millions or trillions of work in one second.
Speed – Now computer isn’t just a calculating device. Nowaday’s computer has vital role in
human life. One of the most advantages of computer is its incredible speed, which helps
human to finish their task in few seconds.
Cost/ Stores huge – Person can save huge amount ofdata. Centralized database of storing
information is that the major advantage which will reduce cost.
Accuracy – A computer will perform not only calculations but also help with accuracy.
Data Security – Protecting digital data is understood as data security.
Good effects of use of computer
(Advantages)
Task completer – Completes tasks that might be impossible for humans to complete.
Communication – Computer helps the user in better understanding and communication with
the other devices.
Productivity – The level of productivity gets automatically doubled as the computer can done
the work at very fast.
Reduces work load – Information are often accessed by more than one person with the
necessity for work to be duplicated.
Reliability – Computers can perform same sort of work repeatedly without throwing up errors
thanks to tiredness or boredom, which are quite common among humans.
Storage – The pc has an in-built memory where it can store an outsized amount of knowledge .
You can also store data on other storage devices.
Bad effects of use of computer
(Disadvantages)
Time Consuming
Much time will be wasted in front of the computer if a person starts watching videos and
playing games without stopping. One should know the harmful effects of spending too
much time on the computer. Sitting in front of a computer for too long can forget their
essential works and responsibility towards others. It also affects our social skills like
communication.
Lack of Intelligence
The computers cannot make decisions on their own at certain times, which sometimes
makes our work slow, only after giving the proper and correct instructions, they work. If
computers get wrong or improper instructions, then the result will be wrong.
Bad effects of use of computer
(Disadvantages)
Eyes Vision
Can lead to health problems such as poor eyesight, low energy, obesity in the
body, and other diseases. Viewing the monitor screen of a computer all day
weakens the eyes’ vision and hurts the backbone.
Addiction
People with highly addicted computers can affect their sleep at night, or even
afternoon can adversely affect their mind and health. Therefore, one must
always know the limitations of computer use; otherwise, nothing good will come.
Bad effects of use of computer
(Disadvantages)
Cyber Security Problems
Viruses, malware, stealing personal data, stealing passwords, stealing payment details, etc.,
can be done through cyber attacks.
Electricity
A computer needs electricity to process and work; without electricity, a computer is no more
than a metal box.
Updates
A computer needs to be updated from time to time. If it is not done, the computer cannot
function properly, and there is a risk of catching viruses.
Accuracy of Information
Like we instruct the computer. In the same way, the computer starts doing
that instruction completely and correctly. Just depends on the person giving
the instruction, whether he gives the computer the correct instructions or the
wrong instructions.
Reasons for errors and failures of information
Bad programming
Poor training
Poor procedures
Data
protection
(cont.)
Most users are interested in
taking steps to prevent others
from accessing their computer.
Whether it be to protect yourself
from malware or ensure your
private information is safe, having
a secure computer can provide
peace of mind.
Data protection (cont.)
Passwords
Make sure a password is set for your computer's operating system.
Disable screen
The power save feature on your computer automatically switches off the
monitor when the computer hasn't been used for a set period of time,
saving energy bills and preventing a condition known as "screen burn"
that can permanently damage the monitor display.
Data protection (cont.)
Firewalls
A firewall is a network security system that monitors and controls incoming and
outgoing network traffic based on predetermined security rules. A firewall
establishes a barrier between a trusted network and an untrusted network, such
as the Internet.
Screen saver
Screen saver is a good way to protect your computer from prying eyes when
you walk away without locking it. After a short time of inactivity, screen saver will
automatically lock the screen and apply password protection.
Data protection (cont.)
Wireless connection
Make sure that unknown devices cannot make a wireless connection to
your device.
Safety
Keep your computer safe by keeping it in locked rooms and control
access to these rooms.
Vulnerability of portable storage
Using portable devices can increase the risk of data loss (when a physical device is
lost), data exposure (when sensitive data is exposed to the public or a third party without
consent), and increased exposure to network-based attacks to and from any system the
device is connected to (both directly and via networks ...
Password protect the device using a strong password or PIN.
Before downloading applications and games, find out if they will have access to on
your device.
Download applications, games, and music only from trusted sources. Download
applications, games, and music only from trusted sources.
Vulnerability of portable storage
Disable Bluetooth, Wi-Fi, and other services when you’re not using them.
If your device supports location tracking, activate global positioning system
(GPS) functionality so you can track the location of your device if you
misplace it.
When possible, set up a local firewall on the device to filter inbound and
outbound traffic and block malicious software.
Set an idle timeout that will automatically lock the device when you’re not
using it.
Computer criminals
Cybercriminals are individuals or teams of
people who use technology to commit
malicious activities on digital systems or
networks with the intention of stealing
sensitive company information or personal
data, and generating profit.
Attack techniques
You may recognize a few cyber crime attack techniques:
Botnet - a network of software robots, or bots, that automatically
spread malware
Fast Flux - moving data quickly among the computers in a botnet to make it
difficult to trace the source of malware or phishing websites
Zombie Computer - a computer that has been hacked into and is used to
launch malicious attacks or to become part of a botnet
Some identity thieves target organisations that store people's personal information,
like schools or credit card companies.
Attack techniques
Social Engineering - using lies and manipulation to trick people into
revealing their personal information. Phishing is a form of social
engineering
Denial-of-Service attacks - flooding a network or server with traffic in
order to make it unavailable to its users
Skimmers - Devices that steal credit card information when the card is
swiped through them. This can happen in stores or restaurants when the
card is out of the owner's view, and frequently the credit card information is
then sold online through a criminal community.
Read here!
Read here!
This is
important!