Search Header Logo
BTEC IT L2 Unit 2 Lesson 4 - Issues of Tech Systems

BTEC IT L2 Unit 2 Lesson 4 - Issues of Tech Systems

Assessment

Presentation

Computers

6th - 10th Grade

Practice Problem

Medium

Created by

Samantha Clawson

Used 3+ times

FREE Resource

30 Slides • 12 Questions

1

BTEC IT Level 2: Tech Systems

Lesson 4: Issues with Tech​

2

​Recap questions

3

Open Ended

What are the four parts of the IPO Model?

4

Open Ended

Define multifunctional device & give 2 examples

5

Multiple Choice

What does CAD stand for?

1

Cloud Aided Disk

2

CPU Aided Device

3

Computer Aided Design

4

Computer Aided Designsation

6

Open Ended

Give 2 examples of how tech is used in the Health sector

7

​Issues with Tech

Health & safety

Environmental

Security

Privacy & Copyright​

8

​Health & Safety

Employer Regulations

Safely using computers e.g. sitting position at computer

Taking regular breaks from computer system to avoid eye strain injury

RSI and DVT

Internet safety

Fraud and criminal activity e.g. hacking

9

​Health & Safety

Employer regulations

The law states that an employer must:

  • provide: tiltable screens; anti-glare screen filters; adjustable chairs; foot supports

  • Ensure suitable lighting

  • Spacious & appropriate workstations (not crammed & cluttered)

  • Frequ​ent breaks

  • Cover expenses for eye tests​ by an optician

10

​Back issues

Users of technology systems can often suffer from back problems due to users leaning forward over their keyboard or being sat awkwardly with a poor posture. This causes strain on the back.

Methods for preventing this from impacting you include:

  • Adjustable chairs

  • Monitors that tilt

  • Foot rests

  • Training for screen health & safety - includes how to use the above, and proper posture

11

​Eye strain

Working in front of a computer for long periods of time can lead to eye strain. This can cause blurred vision, nausea & headaches. It can also worsen a users eye sight over time.

Methods for preventation include:

  • Taking frequent breaks - away from all screens

  • Sitting in a well lit room

  • Reducing screen glare

  • Ensuring a good distance is kept between user and monitor

12

​RSI & DVT

​RSI = Repetitive Strain Injury DVT = Deep Vein Thrombosis

RSI is a term used describe the pain felt in the hands, arms, shoulders & neck from heavily repetitive movements. This could be caused by typing at a keyboard or using the mouse for long periods of time for example.

Methods for prevention:

  • Frequent breaks

  • Ergonomic keyboards and mice

  • Wrist rests

  • Maintaining good posture

  • Using a mouse correctly - use elbow not wrist

13

​Trip Hazards

Technology systems usually involve a lot of cabling i.e. power cables; network cables and peripheral device cables (printer, mouse, keyboard or monitor). These can lead to major hazards which could lead to injury to an employee if they were to trip over any trailing cables. 

Methods for prevention:

  • Cables are well concealed behind tables, under carpets or through cable ducts.

14

media

Interactive PDF - can you find all 11 faults?

https://www.safework.nsw.gov.au/__data/assets/pdf_file/0011/547643/interactive-diagram-office.pdf ​

Please click the link for the PDF​

15

​Environmental

  • Huge amounts of energy is used to mine, manufacture and run and recycle tech systems​

  • Pollution

  • E-Waste & Waste Heat

  • Positive & negative impacts on the environment​

16

​Pollution

The manufacturing and running of tech systems can produce air, water, heat and noise pollution.

For example, a user will need to use electricity to run a computer. This energy is more likely to be supplied using fossil fuels which affects the environmental sustainability.

Methods for prevention

  • Purchasing energy efficient ICT equipment

  • Setting guidelines for turning off machines when not in use

  • Ensure power management features are implemented on devices

17

​Pollution

media

18

​Pollution

  • Huge amounts of electricity is used for all electronic devices and electricity production is having harmful effects on the environment

  • A lot of non- renewable materials are used for manufacturing electronic devices

  • Data centres which store server data (e.g. social media information) consume a lot of electricity to run and to cool them down.

19

​E-Waste & Heat Waste

  • ​E-Waste or Technotrash is waste created by electronic devices

  • Increasing amounts of e-waste each year​ - in huge quantities

  • Proper disposal of e-waste is difficult due to hazardous materials​

  • Landfills are huge areas of land​

  • E-waste is being sent overseas to developing countries​​

Methods for preventing this from impacting you include:

  • Recycle all outdated technology

    Donate the technology you don't want but still works

20

​E-Waste

media

21

​E-Waste - Materials

Many different materials (metals & chemicals) are used to create electronics.

Some are incredibly toxic/hazardous - Lead, mercury, cobalt, cadmium etc

Some are also incredibly rare

​During COVID lockdowns, we experienced a shortage of raw materials. Did you notice a price hike?

22

​E-Waste - Toxic

CRTs: CRTs, or cathode ray tubes, are found in older televisions and computer monitors. They contain lead, which can leach into the ground and contaminate drinking water. Impact to humans, animals and foilage.

PCBs: Printed circuit boards are found in computers, cell phones, and many other electronic devices. They contain harmful chemicals like cadmium and lead, which can cause cancer and damage the nervous system.

Batteries: Batteries used in electronic devices can contain lead, cadmium, and other poisonous substances. If these batteries leak, they can contaminate the soil and water.

Mercury: Mercury is found in fluorescent light bulbs, as well as some switches and relays. When these items are broken or thrown away, mercury can be released into the environment, which can cause health problems for people and animals.

23

​Positive Impact

  • ​Improved sustainability - video conferencing & collaborative services have reduced travelling & employees can work from home - no need to travel to a different country for a meeting.

  • Emails can send documents electronically - reduces use of paper and storage space

  • ​Digitisation of books, records, journals etc. Less storage and paper required.

  • Technology systems, including sensors, analyse data from products such as cars & kettles to enable manufacturers to design more sustainable products

24

​Negative Impact

To add what has been stated already:

  • Manufacturing electronics uses natural resources that are mined. ​

  • A lot of energy is spent to mine, manufacture, use and recycle/dispose.

    • This energy generates Heat Waste

    • Waste heat is the energy that is not used and is lost into the environment.

    • More electricity is required to cool computers, especially server rooms that need air con - servers & air-con will run 24/7

    • Have you noticed your devices get hot when they are doing extensive tasks, or left idle?

  • Disposing ​of old devices is difficult, creates landfill and can release dangerous chemicals

25

​Research

Sustainability is about protecting the planet and making sure there are resources for the future. ​​

​Have you heard someone (or yourself) say: "Things don't last as long as they used to?"

Research in to the the average lifespan of technology over the years. Also, can you find any companies that have been caught out purposely sabotaging their old tech?

26

​Security

All mobile devices are tracked around the world.

Service providers keeps records of calls, texts, locations and websites visited.

​Hacking

Malware

Legislation:​

RIPA (Regulation of Investigatory Powers Act 2000) allows officers and security services to obtain information without your knowledge.

The Data Protection Act 1998 was used to protect data that was used. This has now been replaced by the GDPR from 25 May 2018.

27

​Security

Research GDPR

What is it?

When did it come into place?

Why was it created?​

What are the benefits?

What are the drawbacks?​

28

​Malware

Short for malicious software, malware are small programs that are designed to attack computer systems. Examples include viruses, spyware, worms & trojans.

These attacks might be to prevent a system from working or possibly to steal data for identity theft and bank fraud.

Methods for prevention:

  • Using anti-virus and firewall software

  • Ensuring we don’t download any files we are not sure are safe

29

​Hackers

This is the gaining of unauthorised access to a technology system. Malicious users known as hackers will use a variety of techniques to force their way into a system so that they can read, alter, delete & steal information.

Any data stolen can then be used for blackmail, identity theft and bank fraud. 

Methods for prevention:

  • Use firewall software

  • Using sufficiently complicated passwords.

30

​Security - Task

Research into hacking or data breaches of businesses

  • How did it impact the business?

  • How did it impact the consumers/clients of the business?

  • Was there an impact on employees, or ​local economies? (for example, a store closure means loss of jobs)

Put together a quick case study. Include references of articles, journals etc that you have used.

31

​Copyright

Copyright Design and Patents Act 1988 (UK)

  • This gives the original creator of work the legal rights to use the work exclusively or give others permission to use it.

  • Copyright legally protects ownership of data

  • Huge amount of information on the internet, it is the user's responsibility to not breach copyright laws.

  • Copyright means a creator of information owns it - and others cannot use it, or claim it as their own. For example a singer or an artist, owns the rights to their work. Unless they have sold the rights to a record label or gallery.

  • When copyright laws have been breached, the victim can sue​

32

​Copyright

A lot of copyright material is being illegally distributed online. It is common for things like films, software and music to be shared using things like online streaming services and bittorrents.

This is illegal due to the Copyright, Designs & Patents Act, but it still happens a lot. Businesses must ensure they don’t use copyright material without permission.

Methods for prevention:

  • Set clear policies on the installation of software within your business to prevent pirate software being installed.

Streaming services like Netflix, Prime, NowTV etc, have to have licenses to show their non-original content. ​

33

​Privacy

We share our data all the time - sometimes without even releasing it.

With online shops, our personal information & photos on social media and we send private conversations using email and instant messaging.

Malicious ICT users might try to steal our personal information for identity fraud, bank fraud or blackmail purposes. 

Methods for prevention:

  • Set appropriate privacy settings on social media accounts

  • Limit the amount of private information is published online

  • Set secure passwords and regularly change them so your account cannot be hacked

34

Multiple Choice

What type of personal data could be given away and collected as a result of: using online maps

1

Home Address

2

Bank Details

3

Location

4

Name

35

Multiple Select

What type of personal data could be given away and collected as a result of: submitting online forms

1

Name

2

Phone number

3

Email Address

4

Home address

36

Multiple Choice

Which of the following is NOT an example of health & safety issues?

1

Back Strain

2

RSI & DVT

3

Data Breach

4

Fire Hazards

37

Multiple Choice

A firewall is a program that is designed to prevent viruses and other malware from infecting your computer before they can cause damage.

1

True

2

False

38

A firewall is a program that monitors all data being transferred to and from a computer system and closing down any connections that it thinks might be harmful.

What is described in the question is anti-virus software.

39

Multiple Choice

Sustainability is the use of environmental resources in a way that does not damage and deplete them and so allows for long term environmental quality.

1

True

2

False

40

Multiple Select

Which below are common types of malware?

1

Trojan

2

Virus

3

Worm

4

Spyware

5

GDPR

41

Multiple Choice

To protect private information business’ store data in a coded form that cannot be easily read. What is the process of turning the data into the coded form known as?

1

Anti-virus

2

Encryption

3

Trojan

4

Firewall

42

Open Ended

Describe the effects on the environment of online shopping (2 Marks)

BTEC IT Level 2: Tech Systems

Lesson 4: Issues with Tech​

Show answer

Auto Play

Slide 1 / 42

SLIDE