
BTEC IT L2 Unit 2 Lesson 4 - Issues of Tech Systems
Presentation
•
Computers
•
6th - 10th Grade
•
Practice Problem
•
Medium
Samantha Clawson
Used 3+ times
FREE Resource
30 Slides • 12 Questions
1
BTEC IT Level 2: Tech Systems
Lesson 4: Issues with Tech
2
Recap questions
3
Open Ended
What are the four parts of the IPO Model?
4
Open Ended
Define multifunctional device & give 2 examples
5
Multiple Choice
What does CAD stand for?
Cloud Aided Disk
CPU Aided Device
Computer Aided Design
Computer Aided Designsation
6
Open Ended
Give 2 examples of how tech is used in the Health sector
7
Issues with Tech
Health & safety
Environmental
Security
Privacy & Copyright
8
Health & Safety
Employer Regulations
Safely using computers e.g. sitting position at computer
Taking regular breaks from computer system to avoid eye strain injury
RSI and DVT
Internet safety
Fraud and criminal activity e.g. hacking
9
Health & Safety
Employer regulations
The law states that an employer must:
provide: tiltable screens; anti-glare screen filters; adjustable chairs; foot supports
Ensure suitable lighting
Spacious & appropriate workstations (not crammed & cluttered)
Frequent breaks
Cover expenses for eye tests by an optician
10
Back issues
Users of technology systems can often suffer from back problems due to users leaning forward over their keyboard or being sat awkwardly with a poor posture. This causes strain on the back.
Methods for preventing this from impacting you include:
Adjustable chairs
Monitors that tilt
Foot rests
Training for screen health & safety - includes how to use the above, and proper posture
11
Eye strain
Working in front of a computer for long periods of time can lead to eye strain. This can cause blurred vision, nausea & headaches. It can also worsen a users eye sight over time.
Methods for preventation include:
Taking frequent breaks - away from all screens
Sitting in a well lit room
Reducing screen glare
Ensuring a good distance is kept between user and monitor
12
RSI & DVT
RSI = Repetitive Strain Injury DVT = Deep Vein Thrombosis
RSI is a term used describe the pain felt in the hands, arms, shoulders & neck from heavily repetitive movements. This could be caused by typing at a keyboard or using the mouse for long periods of time for example.
Methods for prevention:
Frequent breaks
Ergonomic keyboards and mice
Wrist rests
Maintaining good posture
Using a mouse correctly - use elbow not wrist
13
Trip Hazards
Technology systems usually involve a lot of cabling i.e. power cables; network cables and peripheral device cables (printer, mouse, keyboard or monitor). These can lead to major hazards which could lead to injury to an employee if they were to trip over any trailing cables.
Methods for prevention:
Cables are well concealed behind tables, under carpets or through cable ducts.
14
Interactive PDF - can you find all 11 faults?
https://www.safework.nsw.gov.au/__data/assets/pdf_file/0011/547643/interactive-diagram-office.pdf
Please click the link for the PDF
15
Environmental
Huge amounts of energy is used to mine, manufacture and run and recycle tech systems
Pollution
E-Waste & Waste Heat
Positive & negative impacts on the environment
16
Pollution
The manufacturing and running of tech systems can produce air, water, heat and noise pollution.
For example, a user will need to use electricity to run a computer. This energy is more likely to be supplied using fossil fuels which affects the environmental sustainability.
Methods for prevention
Purchasing energy efficient ICT equipment
Setting guidelines for turning off machines when not in use
Ensure power management features are implemented on devices
17
Pollution
18
Pollution
Huge amounts of electricity is used for all electronic devices and electricity production is having harmful effects on the environment
A lot of non- renewable materials are used for manufacturing electronic devices
Data centres which store server data (e.g. social media information) consume a lot of electricity to run and to cool them down.
19
E-Waste & Heat Waste
E-Waste or Technotrash is waste created by electronic devices
Increasing amounts of e-waste each year - in huge quantities
Proper disposal of e-waste is difficult due to hazardous materials
Landfills are huge areas of land
E-waste is being sent overseas to developing countries
Methods for preventing this from impacting you include:
Recycle all outdated technology
Donate the technology you don't want but still works
20
E-Waste
21
E-Waste - Materials
Many different materials (metals & chemicals) are used to create electronics.
Some are incredibly toxic/hazardous - Lead, mercury, cobalt, cadmium etc
Some are also incredibly rare
During COVID lockdowns, we experienced a shortage of raw materials. Did you notice a price hike?
22
E-Waste - Toxic
CRTs: CRTs, or cathode ray tubes, are found in older televisions and computer monitors. They contain lead, which can leach into the ground and contaminate drinking water. Impact to humans, animals and foilage.
PCBs: Printed circuit boards are found in computers, cell phones, and many other electronic devices. They contain harmful chemicals like cadmium and lead, which can cause cancer and damage the nervous system.
Batteries: Batteries used in electronic devices can contain lead, cadmium, and other poisonous substances. If these batteries leak, they can contaminate the soil and water.
Mercury: Mercury is found in fluorescent light bulbs, as well as some switches and relays. When these items are broken or thrown away, mercury can be released into the environment, which can cause health problems for people and animals.
23
Positive Impact
Improved sustainability - video conferencing & collaborative services have reduced travelling & employees can work from home - no need to travel to a different country for a meeting.
Emails can send documents electronically - reduces use of paper and storage space
Digitisation of books, records, journals etc. Less storage and paper required.
Technology systems, including sensors, analyse data from products such as cars & kettles to enable manufacturers to design more sustainable products
24
Negative Impact
To add what has been stated already:
Manufacturing electronics uses natural resources that are mined.
A lot of energy is spent to mine, manufacture, use and recycle/dispose.
This energy generates Heat Waste
Waste heat is the energy that is not used and is lost into the environment.
More electricity is required to cool computers, especially server rooms that need air con - servers & air-con will run 24/7
Have you noticed your devices get hot when they are doing extensive tasks, or left idle?
Disposing of old devices is difficult, creates landfill and can release dangerous chemicals
25
Research
Sustainability is about protecting the planet and making sure there are resources for the future.
Have you heard someone (or yourself) say: "Things don't last as long as they used to?"
Research in to the the average lifespan of technology over the years. Also, can you find any companies that have been caught out purposely sabotaging their old tech?
26
Security
All mobile devices are tracked around the world.
Service providers keeps records of calls, texts, locations and websites visited.
Hacking
Malware
Legislation:
RIPA (Regulation of Investigatory Powers Act 2000) allows officers and security services to obtain information without your knowledge.
The Data Protection Act 1998 was used to protect data that was used. This has now been replaced by the GDPR from 25 May 2018.
27
Security
Research GDPR
What is it?
When did it come into place?
Why was it created?
What are the benefits?
What are the drawbacks?
28
Malware
Short for malicious software, malware are small programs that are designed to attack computer systems. Examples include viruses, spyware, worms & trojans.
These attacks might be to prevent a system from working or possibly to steal data for identity theft and bank fraud.
Methods for prevention:
Using anti-virus and firewall software
Ensuring we don’t download any files we are not sure are safe
29
Hackers
This is the gaining of unauthorised access to a technology system. Malicious users known as hackers will use a variety of techniques to force their way into a system so that they can read, alter, delete & steal information.
Any data stolen can then be used for blackmail, identity theft and bank fraud.
Methods for prevention:
Use firewall software
Using sufficiently complicated passwords.
30
Security - Task
Research into hacking or data breaches of businesses
How did it impact the business?
How did it impact the consumers/clients of the business?
Was there an impact on employees, or local economies? (for example, a store closure means loss of jobs)
Put together a quick case study. Include references of articles, journals etc that you have used.
31
Copyright
Copyright Design and Patents Act 1988 (UK)
This gives the original creator of work the legal rights to use the work exclusively or give others permission to use it.
Copyright legally protects ownership of data
Huge amount of information on the internet, it is the user's responsibility to not breach copyright laws.
Copyright means a creator of information owns it - and others cannot use it, or claim it as their own. For example a singer or an artist, owns the rights to their work. Unless they have sold the rights to a record label or gallery.
When copyright laws have been breached, the victim can sue
32
Copyright
A lot of copyright material is being illegally distributed online. It is common for things like films, software and music to be shared using things like online streaming services and bittorrents.
This is illegal due to the Copyright, Designs & Patents Act, but it still happens a lot. Businesses must ensure they don’t use copyright material without permission.
Methods for prevention:
Set clear policies on the installation of software within your business to prevent pirate software being installed.
Streaming services like Netflix, Prime, NowTV etc, have to have licenses to show their non-original content.
33
Privacy
We share our data all the time - sometimes without even releasing it.
With online shops, our personal information & photos on social media and we send private conversations using email and instant messaging.
Malicious ICT users might try to steal our personal information for identity fraud, bank fraud or blackmail purposes.
Methods for prevention:
Set appropriate privacy settings on social media accounts
Limit the amount of private information is published online
Set secure passwords and regularly change them so your account cannot be hacked
34
Multiple Choice
What type of personal data could be given away and collected as a result of: using online maps
Home Address
Bank Details
Location
Name
35
Multiple Select
What type of personal data could be given away and collected as a result of: submitting online forms
Name
Phone number
Email Address
Home address
36
Multiple Choice
Which of the following is NOT an example of health & safety issues?
Back Strain
RSI & DVT
Data Breach
Fire Hazards
37
Multiple Choice
A firewall is a program that is designed to prevent viruses and other malware from infecting your computer before they can cause damage.
True
False
38
A firewall is a program that monitors all data being transferred to and from a computer system and closing down any connections that it thinks might be harmful.
What is described in the question is anti-virus software.
39
Multiple Choice
Sustainability is the use of environmental resources in a way that does not damage and deplete them and so allows for long term environmental quality.
True
False
40
Multiple Select
Which below are common types of malware?
Trojan
Virus
Worm
Spyware
GDPR
41
Multiple Choice
To protect private information business’ store data in a coded form that cannot be easily read. What is the process of turning the data into the coded form known as?
Anti-virus
Encryption
Trojan
Firewall
42
Open Ended
Describe the effects on the environment of online shopping (2 Marks)
BTEC IT Level 2: Tech Systems
Lesson 4: Issues with Tech
Show answer
Auto Play
Slide 1 / 42
SLIDE
Similar Resources on Wayground
35 questions
Q2. Assessment 1 Practice: Quiz
Presentation
•
KG
33 questions
Inherited genetic disorders
Presentation
•
6th - 9th Grade
39 questions
Geometry Terms
Presentation
•
7th - 10th Grade
37 questions
Moon Phases and Eclipses
Presentation
•
6th - 9th Grade
35 questions
Grade 9 General Unit 2 Lesson 3
Presentation
•
7th - 9th Grade
38 questions
Pronouns
Presentation
•
6th - 10th Grade
38 questions
Week 6 Install operating system and drivers for peripherals/devi
Presentation
•
7th - 9th Grade
34 questions
Elements of Nonfiction
Presentation
•
7th - 10th Grade
Popular Resources on Wayground
20 questions
"What is the question asking??" Grades 3-5
Quiz
•
1st - 5th Grade
20 questions
“What is the question asking??” Grades 6-8
Quiz
•
6th - 8th Grade
10 questions
Fire Safety Quiz
Quiz
•
12th Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
34 questions
STAAR Review 6th - 8th grade Reading Part 1
Quiz
•
6th - 8th Grade
20 questions
“What is the question asking??” English I-II
Quiz
•
9th - 12th Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
47 questions
8th Grade Reading STAAR Ultimate Review!
Quiz
•
8th Grade