SlideShare a Scribd company logo
Arush Vatsal Unadkat
Malicious Software are
the programs that
generate threats to the
computer system and
stored data.
Virus
Worm
s
Trojan
Horses
Spyware
Malicious Software
• Virus (Vital Information Recourses
Under Seize) is a small program or a
small code segment that is capable of
attaching itself to existing programs of
files and infect them as well as
replicate itself without users
knowledge or permission. It spreads
by external devices like CDs, pen
drives, or email and executes when an
infected program is executed. If an
infected computer gets in contact gets
in contact with an un infected
computer virus may pass onto the
uninfected system and destroy the
files.
Viruses
Boot Sector
File Infecting
PolymorphicStealth
Multipartite
This type of virus
infects the
master boot
record of the
system by either
moving to
another sector or
replacing it with
infected one.
This type of virus
infects the
executable files
or files containing
executable code
such as .exe,
.com, .dll, .sys,
etc.
I
N
F
E
C
T
I
N
G
V
I
R
U
SThese viruses add their code to
executables, which when infected may
send viral code other executables.
When the
infected file is
opened or
used the
virus may
overwrite the
file and cause
permanent
damage to
the content of
the
overwritten
file.
This type of virus changes its code as it propagates
from one file to another. Therefore, each copy that is
generated appears different from others. This makes
the polymorphic virus difficult to be detected by the
antivirus.
Stealth VirusThis type of
virus attempts
to conceal its
presence from
the user
and/or
antivirus
software by
using various
techniques.
A multipartite virus is a
computer virus that infects
multiple different target
platforms, and remains
recursively infective in each
target.
V
I
R
U
S It attempts to attack both
the boot sector and the
executable, or programs,
files at the same time.
This type of virus can re-infect a system over and
over again if all parts of the virus are not
Worms
A computer worm is a
standalone malware co
mputer program that
replicates itself in order
to spread to other
computers. Often, it
uses a computer
network to spread itself,
relying on security
failures on the target
computer to access it.
Unlike a computer virus,
it does not need to
attach itself to an
existing program.
Both worms and viruses tend
to fill computer memory with
useless data thereby
preventing you from using
memory space for legal
applications or programs.
T
R
O
J
A
N
Trojan horse is a program
that appears to be legal and
useful but concurrently does
something unexpected like
destroying existing
programs and files . As it
does not replicate itself in
the computer it is not a
virus.
However it usually opens
a way for the other
malicious software like
viruses to enter into the
computer system. It may
also allow unauthorized
users access the
information stored in the
computer.
h
o
r
s
e
s
Spyware is any technology that aids
in gathering information about a
person or organization without their
knowledge.
On the Internet spyware is programming that is put in
someone's computer to secretly gather information about the
user and relay it to advertisers or other interested parties.
Spam refers to the unsolicited or
unwanted mail or message sent to a
large number of individuals. It is
forced on to the people who would
otherwise choose not to receive such
mails.
In addition it may
also be used to
spreading viruses or
It may flood the e-mails box
due to which no other mail can
be received.
The recipient time is
wasted in reading a
the unwanted e-
mails.
Network
bandwidth is
wasted in sending
such mails.
A hacker is someone who seeks and exploits
weaknesses in a computer system or
computer network. Hackers may be motivated
by a multitude of reasons, such as profit,
protest, or challenge.
The hackers that break
into the computer security
with non-malicious
reasons are known as
The hackers who break into the
computer security without
administration for ulterior purposes
such as theft, terrorism, etc. are
Societal Impacts Of IT (Class X)
An antivirus program
scans the hard the
hard disc for viruses.
After scanning the
software removes the
viruses, so that the
computer is able to
perform efficiently
again.
Most anti-
virus
software
have
an auto
update
feature that
enables the
computer to
download
the definition
of new
viruses.
The updating
of a antivirus
software is
important
because the
virus
'creators’ are
always in the
process of
developing
The updated virus definitions is
should always be maintained so
that users can operate their
computers without any problem.
Data loss is
very
common to
all
Some failure such as hardware
failure, software failure, or natural
disaster may occur resulting in
data loss.
Data backup refers to making duplicate copies of your data and storing them onto some
permanent storage device such as pen drive, portable hard disc, DVD, CD, etc.
The data backup is essential for
recovering the data as quickly,
and with as little damaging impact
on users, as possible.
Full Backup
Method
Incremental
Backup Method
Differential
Backup Method
Mirror Backup
Method
Full
Backup
Method
This is the basic
backup method
that backups up
all the files on the
computer the
computer system.
Generally
performed on a
weekly or monthly
basis.
Consumes a lot of
time as of time as
well as secondary
memory.
Incremental
Backup
Method
This method backs up
only those files that
have been modified
since the most recent
backup, thereby
making each backup an
increment to the last
backup.
A single backup is
not sufficient to
restore all the
files, which makes
the restoring
process slower. It consumes
less time and
memory
space to take
a backup.
Differential
Backup
Method
This method backs up
all the files that have
any difference from
the last backup.
Restoring files require
the full backup and
only the last
differential backup.
This makes restoring
little faster than
incremental backup.
Backing up is slower
and storage
requirement is higher
than incremental
backup.
Mirror
Backup
Method
The mirror backup
method copies the
files or folders being
backed up without
any compressions.
It keeps each file
separate in the
destination thereby
making the
destination a mirror
of the source.
The feature makes
this methods fastest
of all methods.
However, it requires
more storage space
as compared to other
methods.
Firstly, this method not only
enables you to recover data
after file corruption or
computer failure, but you can
also recover data even if a
natural disaster
has destroyed everything at
your place.
Secondly, you can access your data anywhere in the
world and at anytime. In addition, the files to be backed
up are encrypted
by your computer before being sent to the remote
This ensures the protection of
your data from unauthorized
access.
However, it is not affordable
for individual users or small
business to subscribe for
online backup services.
Sometimes, you lose
important data because of
disk failure, accidental
deletion of files, etc
A recover tool
enables you to
recover lost
data.
The situation even
becomes worse if
you are not having
backup of data.
Suppose you friend forgot his passport at your house
and went away. You want to send it to him but you don’t
want anyone else to steal the passport.
How will you do it?
This
picture
is a hint
to the
puzzle.
This
picture
is a hint
to the
puzzle.
You will put the passport in a
box and lock it with a lock and
key. This key will Remain with
you. Then you send the box to
your friend. Your friend will put
another lock on it with another
key that will remain with him.
He will send it back. You will
unlock your lock with your key
and send it back to him. He will
unlock his lock with his key and
take his passport.
Encryption and
decryption works
in the same way.
A firewall is a software or hardware-based
network security system that controls the
incoming and outgoing network traffic by
analyzing the data packets and determining
whether they should be allowed through or
not, based on applied rule set.
Many personal
computer oper
ating
systems includ
e software-
based firewalls
to protect
against threats
from the public
Internet.
Many routers t
hat pass data
between
networks
contain firewall
components
and,
conversely,
many firewalls
can perform
basic routing
functions.
All Traffic in either
direction must pass
through the firewall.
The firewall
itself is immune
to penetration.
Only traffic
authorized by the
local security policy
must be allowed to
Social Networking refers
to the grouping of
individuals to share their
common interests or
activities
Nowadays, online social networking
is gaining popularity and a number
of websites (known as social sites)
are available for creating online
communities.
Introduction
To
ICT
ICT has become the integral part of our
working and living environments and
will continue to be a powerful resource
for business.
ICT stands for Information and
Communication Technologies.
These technologies include
computers, internet,
broadcasting technologies (radio
and television) and telephony.
Due to globalization and other factors,
these technologies are changing and
improving dad by day.
Benefits of ICT
ICT provides several significant
benefits and today , it has been used
everywhere and in every field including
education, healthcare, governance,
etc.
Some important
benefits of ICT are
as follows:-
• Education
• Healthcare
• Governance
The use of sounds effects,
comic characters and scripted
act attracts the students and
helps them to understand the
lessons by getting involved
with the lessons being
delivered. This keeps the
process of learning new
concepts very lively.
Education
The introduction of ICT
in education has made
the learning fun and
interesting for student
now a days.
Many
illustrations
are given in
the form of
video clips
which help
students to
understand
quickly.
This technology has made the scope for error very minor and helps the
doctor to perform surgeries remotely
The scanners process
the data present in
them in a readable
format,
microprocessors help
to control many
medical devices like
pacemaker and the
computer-guided
lasers are used for
various kinds of
surgeries.
Governance
All or most of the information
generated by the government
is easily accessible through
the electronic media, such as
Internet, mobile phones, etc.
The use of ICT in governance
practices offers better interaction
between government, its
institutions and people. This
leads enhanced governance
practices and effective
This increases the
transparency of
government and
administration to the
business as well as its
citizens.
Societal Impacts Of IT (Class X)

More Related Content

PPTX
Social impacts information technology
Rimple Darra
 
PPTX
Cloud computing presentation
Priyanka Sharma
 
PPTX
Social Impact of Information Technology
Sanjeev Gupta
 
PPTX
Impact Of IT on Society.
Monica Khatri
 
PPTX
Mobile technology
Venkata Sreeram
 
PPTX
Societal impacts of it
Samrat Sikri
 
PPTX
Societal Impact Of IT
Vishwajeet Aman
 
PPTX
Cybersecurity PowerPoint Presentation
Ritik Kumar
 
Social impacts information technology
Rimple Darra
 
Cloud computing presentation
Priyanka Sharma
 
Social Impact of Information Technology
Sanjeev Gupta
 
Impact Of IT on Society.
Monica Khatri
 
Mobile technology
Venkata Sreeram
 
Societal impacts of it
Samrat Sikri
 
Societal Impact Of IT
Vishwajeet Aman
 
Cybersecurity PowerPoint Presentation
Ritik Kumar
 

What's hot (20)

PPTX
Introduction to Internet of Things (IoT)
Amarjeetsingh Thakur
 
PPT
CT01 Computer Basics
ehillpamlico
 
DOCX
Computer in Society
MdMojibulHoqueRony
 
PPTX
5G technology
Vishal Rathee
 
PPTX
Internet And Its Uses
Rishabh27
 
PPTX
Impact of internet in day to day life
Vidhyalakshmi K
 
PPTX
Introduction to information technology
Haider Ali Malik
 
PPT
This presentation is about Computer Systems and its Components
abena
 
PPTX
Computer Virus powerpoint presentation
shohrabkhan
 
PPTX
ppt on WIFI
Rohit Lakkabathini
 
DOCX
Computer science seminar topics
123seminarsonly
 
PPTX
Introduction to IOT
Zubayer Al Billal Khan
 
PPTX
Internet of things startup basic
Mathan kumar
 
PPTX
9 Chap 1 Introduction to internet.pptx
Amirthaa736414
 
PPTX
Information Technology
Ulduz Sadiq
 
PPTX
Internet of Things Overview
Romin Irani
 
PPTX
Cybersecurity
Foram Gosai
 
PPTX
Information technology boon to society
Usha Ravichandran
 
PPTX
Internet of things (IOT) | Future Trends
Devanand Hariperumal
 
PPTX
Mobile Computing and Application 2.pptx
DiptimayeeTripathy1
 
Introduction to Internet of Things (IoT)
Amarjeetsingh Thakur
 
CT01 Computer Basics
ehillpamlico
 
Computer in Society
MdMojibulHoqueRony
 
5G technology
Vishal Rathee
 
Internet And Its Uses
Rishabh27
 
Impact of internet in day to day life
Vidhyalakshmi K
 
Introduction to information technology
Haider Ali Malik
 
This presentation is about Computer Systems and its Components
abena
 
Computer Virus powerpoint presentation
shohrabkhan
 
ppt on WIFI
Rohit Lakkabathini
 
Computer science seminar topics
123seminarsonly
 
Introduction to IOT
Zubayer Al Billal Khan
 
Internet of things startup basic
Mathan kumar
 
9 Chap 1 Introduction to internet.pptx
Amirthaa736414
 
Information Technology
Ulduz Sadiq
 
Internet of Things Overview
Romin Irani
 
Cybersecurity
Foram Gosai
 
Information technology boon to society
Usha Ravichandran
 
Internet of things (IOT) | Future Trends
Devanand Hariperumal
 
Mobile Computing and Application 2.pptx
DiptimayeeTripathy1
 
Ad

Similar to Societal Impacts Of IT (Class X) (20)

PPTX
Computer security ethics_and_privacy
Ardit Meti
 
PDF
security By ZAK
Tabsheer Hasan
 
PPTX
Computer security threats & prevention
PriSim
 
PDF
Ch14 Desktop Protection
phanleson
 
PPT
Presentation2
Jeslynn
 
PDF
Threats of Computer System and its Prevention
Universitas Pembangunan Panca Budi
 
PPT
computer security
Azhar Akhtar
 
PPT
Presentation24190
KRT395
 
PDF
Computer/Cyber/IT Security MCQ Questions
SONU HEETSON
 
PDF
Computer crimes
Muniba Bukhari
 
PPTX
SOCIETAL IMPACTS OF IT gfgjgfutftujfujigf
asujal2009
 
PPTX
Computing safety
Brulius
 
PDF
4 threatsandvulnerabilities
richarddxd
 
PPT
RRB JE Stage 2 Computer and Applications Questions Part 5
CAS
 
PDF
The process of computer security
WritingHubUK
 
PPT
Itc lec 15 Computer security risks
AnzaDar3
 
PPTX
Computer-software (1).pptx
JohnRebenRequinto1
 
PPTX
Types of malicious software and remedies
Manish Kumar
 
PPTX
SECURITY THREATS AND SAFETY MEASURES
Shyam Kumar Singh
 
PPTX
Computer Viruses
Tanu Basoiya
 
Computer security ethics_and_privacy
Ardit Meti
 
security By ZAK
Tabsheer Hasan
 
Computer security threats & prevention
PriSim
 
Ch14 Desktop Protection
phanleson
 
Presentation2
Jeslynn
 
Threats of Computer System and its Prevention
Universitas Pembangunan Panca Budi
 
computer security
Azhar Akhtar
 
Presentation24190
KRT395
 
Computer/Cyber/IT Security MCQ Questions
SONU HEETSON
 
Computer crimes
Muniba Bukhari
 
SOCIETAL IMPACTS OF IT gfgjgfutftujfujigf
asujal2009
 
Computing safety
Brulius
 
4 threatsandvulnerabilities
richarddxd
 
RRB JE Stage 2 Computer and Applications Questions Part 5
CAS
 
The process of computer security
WritingHubUK
 
Itc lec 15 Computer security risks
AnzaDar3
 
Computer-software (1).pptx
JohnRebenRequinto1
 
Types of malicious software and remedies
Manish Kumar
 
SECURITY THREATS AND SAFETY MEASURES
Shyam Kumar Singh
 
Computer Viruses
Tanu Basoiya
 
Ad

Recently uploaded (20)

PDF
Health-The-Ultimate-Treasure (1).pdf/8th class science curiosity /samyans edu...
Sandeep Swamy
 
PPTX
A Smarter Way to Think About Choosing a College
Cyndy McDonald
 
PPTX
Dakar Framework Education For All- 2000(Act)
santoshmohalik1
 
PPTX
Care of patients with elImination deviation.pptx
AneetaSharma15
 
PPTX
Continental Accounting in Odoo 18 - Odoo Slides
Celine George
 
PPTX
INTESTINALPARASITES OR WORM INFESTATIONS.pptx
PRADEEP ABOTHU
 
PPTX
BASICS IN COMPUTER APPLICATIONS - UNIT I
suganthim28
 
PDF
What is CFA?? Complete Guide to the Chartered Financial Analyst Program
sp4989653
 
PPTX
An introduction to Prepositions for beginners.pptx
drsiddhantnagine
 
PPTX
Gupta Art & Architecture Temple and Sculptures.pptx
Virag Sontakke
 
PDF
Virat Kohli- the Pride of Indian cricket
kushpar147
 
PPTX
Information Texts_Infographic on Forgetting Curve.pptx
Tata Sevilla
 
DOCX
pgdei-UNIT -V Neurological Disorders & developmental disabilities
JELLA VISHNU DURGA PRASAD
 
PPTX
Virus sequence retrieval from NCBI database
yamunaK13
 
PDF
The Minister of Tourism, Culture and Creative Arts, Abla Dzifa Gomashie has e...
nservice241
 
PPTX
Tips Management in Odoo 18 POS - Odoo Slides
Celine George
 
DOCX
Unit 5: Speech-language and swallowing disorders
JELLA VISHNU DURGA PRASAD
 
PPTX
HISTORY COLLECTION FOR PSYCHIATRIC PATIENTS.pptx
PoojaSen20
 
PPTX
Applications of matrices In Real Life_20250724_091307_0000.pptx
gehlotkrish03
 
PPTX
How to Manage Leads in Odoo 18 CRM - Odoo Slides
Celine George
 
Health-The-Ultimate-Treasure (1).pdf/8th class science curiosity /samyans edu...
Sandeep Swamy
 
A Smarter Way to Think About Choosing a College
Cyndy McDonald
 
Dakar Framework Education For All- 2000(Act)
santoshmohalik1
 
Care of patients with elImination deviation.pptx
AneetaSharma15
 
Continental Accounting in Odoo 18 - Odoo Slides
Celine George
 
INTESTINALPARASITES OR WORM INFESTATIONS.pptx
PRADEEP ABOTHU
 
BASICS IN COMPUTER APPLICATIONS - UNIT I
suganthim28
 
What is CFA?? Complete Guide to the Chartered Financial Analyst Program
sp4989653
 
An introduction to Prepositions for beginners.pptx
drsiddhantnagine
 
Gupta Art & Architecture Temple and Sculptures.pptx
Virag Sontakke
 
Virat Kohli- the Pride of Indian cricket
kushpar147
 
Information Texts_Infographic on Forgetting Curve.pptx
Tata Sevilla
 
pgdei-UNIT -V Neurological Disorders & developmental disabilities
JELLA VISHNU DURGA PRASAD
 
Virus sequence retrieval from NCBI database
yamunaK13
 
The Minister of Tourism, Culture and Creative Arts, Abla Dzifa Gomashie has e...
nservice241
 
Tips Management in Odoo 18 POS - Odoo Slides
Celine George
 
Unit 5: Speech-language and swallowing disorders
JELLA VISHNU DURGA PRASAD
 
HISTORY COLLECTION FOR PSYCHIATRIC PATIENTS.pptx
PoojaSen20
 
Applications of matrices In Real Life_20250724_091307_0000.pptx
gehlotkrish03
 
How to Manage Leads in Odoo 18 CRM - Odoo Slides
Celine George
 

Societal Impacts Of IT (Class X)

  • 2. Malicious Software are the programs that generate threats to the computer system and stored data.
  • 4. • Virus (Vital Information Recourses Under Seize) is a small program or a small code segment that is capable of attaching itself to existing programs of files and infect them as well as replicate itself without users knowledge or permission. It spreads by external devices like CDs, pen drives, or email and executes when an infected program is executed. If an infected computer gets in contact gets in contact with an un infected computer virus may pass onto the uninfected system and destroy the files.
  • 6. This type of virus infects the master boot record of the system by either moving to another sector or replacing it with infected one.
  • 7. This type of virus infects the executable files or files containing executable code such as .exe, .com, .dll, .sys, etc. I N F E C T I N G V I R U SThese viruses add their code to executables, which when infected may send viral code other executables. When the infected file is opened or used the virus may overwrite the file and cause permanent damage to the content of the overwritten file.
  • 8. This type of virus changes its code as it propagates from one file to another. Therefore, each copy that is generated appears different from others. This makes the polymorphic virus difficult to be detected by the antivirus.
  • 9. Stealth VirusThis type of virus attempts to conceal its presence from the user and/or antivirus software by using various techniques.
  • 10. A multipartite virus is a computer virus that infects multiple different target platforms, and remains recursively infective in each target. V I R U S It attempts to attack both the boot sector and the executable, or programs, files at the same time. This type of virus can re-infect a system over and over again if all parts of the virus are not
  • 11. Worms A computer worm is a standalone malware co mputer program that replicates itself in order to spread to other computers. Often, it uses a computer network to spread itself, relying on security failures on the target computer to access it. Unlike a computer virus, it does not need to attach itself to an existing program. Both worms and viruses tend to fill computer memory with useless data thereby preventing you from using memory space for legal applications or programs.
  • 12. T R O J A N Trojan horse is a program that appears to be legal and useful but concurrently does something unexpected like destroying existing programs and files . As it does not replicate itself in the computer it is not a virus. However it usually opens a way for the other malicious software like viruses to enter into the computer system. It may also allow unauthorized users access the information stored in the computer. h o r s e s
  • 13. Spyware is any technology that aids in gathering information about a person or organization without their knowledge. On the Internet spyware is programming that is put in someone's computer to secretly gather information about the user and relay it to advertisers or other interested parties.
  • 14. Spam refers to the unsolicited or unwanted mail or message sent to a large number of individuals. It is forced on to the people who would otherwise choose not to receive such mails. In addition it may also be used to spreading viruses or
  • 15. It may flood the e-mails box due to which no other mail can be received. The recipient time is wasted in reading a the unwanted e- mails. Network bandwidth is wasted in sending such mails.
  • 16. A hacker is someone who seeks and exploits weaknesses in a computer system or computer network. Hackers may be motivated by a multitude of reasons, such as profit, protest, or challenge. The hackers that break into the computer security with non-malicious reasons are known as The hackers who break into the computer security without administration for ulterior purposes such as theft, terrorism, etc. are
  • 18. An antivirus program scans the hard the hard disc for viruses. After scanning the software removes the viruses, so that the computer is able to perform efficiently again. Most anti- virus software have an auto update feature that enables the computer to download the definition of new viruses. The updating of a antivirus software is important because the virus 'creators’ are always in the process of developing The updated virus definitions is should always be maintained so that users can operate their computers without any problem.
  • 19. Data loss is very common to all Some failure such as hardware failure, software failure, or natural disaster may occur resulting in data loss. Data backup refers to making duplicate copies of your data and storing them onto some permanent storage device such as pen drive, portable hard disc, DVD, CD, etc. The data backup is essential for recovering the data as quickly, and with as little damaging impact on users, as possible.
  • 21. Full Backup Method This is the basic backup method that backups up all the files on the computer the computer system. Generally performed on a weekly or monthly basis. Consumes a lot of time as of time as well as secondary memory.
  • 22. Incremental Backup Method This method backs up only those files that have been modified since the most recent backup, thereby making each backup an increment to the last backup. A single backup is not sufficient to restore all the files, which makes the restoring process slower. It consumes less time and memory space to take a backup.
  • 23. Differential Backup Method This method backs up all the files that have any difference from the last backup. Restoring files require the full backup and only the last differential backup. This makes restoring little faster than incremental backup. Backing up is slower and storage requirement is higher than incremental backup.
  • 24. Mirror Backup Method The mirror backup method copies the files or folders being backed up without any compressions. It keeps each file separate in the destination thereby making the destination a mirror of the source. The feature makes this methods fastest of all methods. However, it requires more storage space as compared to other methods.
  • 25. Firstly, this method not only enables you to recover data after file corruption or computer failure, but you can also recover data even if a natural disaster has destroyed everything at your place. Secondly, you can access your data anywhere in the world and at anytime. In addition, the files to be backed up are encrypted by your computer before being sent to the remote This ensures the protection of your data from unauthorized access. However, it is not affordable for individual users or small business to subscribe for online backup services.
  • 26. Sometimes, you lose important data because of disk failure, accidental deletion of files, etc A recover tool enables you to recover lost data. The situation even becomes worse if you are not having backup of data.
  • 27. Suppose you friend forgot his passport at your house and went away. You want to send it to him but you don’t want anyone else to steal the passport. How will you do it? This picture is a hint to the puzzle. This picture is a hint to the puzzle.
  • 28. You will put the passport in a box and lock it with a lock and key. This key will Remain with you. Then you send the box to your friend. Your friend will put another lock on it with another key that will remain with him. He will send it back. You will unlock your lock with your key and send it back to him. He will unlock his lock with his key and take his passport. Encryption and decryption works in the same way.
  • 29. A firewall is a software or hardware-based network security system that controls the incoming and outgoing network traffic by analyzing the data packets and determining whether they should be allowed through or not, based on applied rule set. Many personal computer oper ating systems includ e software- based firewalls to protect against threats from the public Internet. Many routers t hat pass data between networks contain firewall components and, conversely, many firewalls can perform basic routing functions.
  • 30. All Traffic in either direction must pass through the firewall. The firewall itself is immune to penetration. Only traffic authorized by the local security policy must be allowed to
  • 31. Social Networking refers to the grouping of individuals to share their common interests or activities Nowadays, online social networking is gaining popularity and a number of websites (known as social sites) are available for creating online communities.
  • 32. Introduction To ICT ICT has become the integral part of our working and living environments and will continue to be a powerful resource for business. ICT stands for Information and Communication Technologies. These technologies include computers, internet, broadcasting technologies (radio and television) and telephony. Due to globalization and other factors, these technologies are changing and improving dad by day.
  • 33. Benefits of ICT ICT provides several significant benefits and today , it has been used everywhere and in every field including education, healthcare, governance, etc. Some important benefits of ICT are as follows:- • Education • Healthcare • Governance
  • 34. The use of sounds effects, comic characters and scripted act attracts the students and helps them to understand the lessons by getting involved with the lessons being delivered. This keeps the process of learning new concepts very lively. Education The introduction of ICT in education has made the learning fun and interesting for student now a days. Many illustrations are given in the form of video clips which help students to understand quickly.
  • 35. This technology has made the scope for error very minor and helps the doctor to perform surgeries remotely The scanners process the data present in them in a readable format, microprocessors help to control many medical devices like pacemaker and the computer-guided lasers are used for various kinds of surgeries.
  • 36. Governance All or most of the information generated by the government is easily accessible through the electronic media, such as Internet, mobile phones, etc. The use of ICT in governance practices offers better interaction between government, its institutions and people. This leads enhanced governance practices and effective This increases the transparency of government and administration to the business as well as its citizens.

Editor's Notes