top of page

Lesson Notes

Information and Communication Technology and Society

Grade

11

Term

3

This lesson explores the broad impact of ICT on our daily lives, covering the good, the bad, and the important rules we need to follow.

Short Notes

  • Legal Issues:

    • Data Theft: Stealing personal information.

    • Copyright & Patents: Laws that protect intellectual property (creations of the mind). Piracy is the illegal copying of software, music, or movies.

  • Ethical Issues:

    • Plagiarism: Copying someone else's work and presenting it as your own.

    • Fair Use: A principle that allows limited use of copyrighted material for purposes like education or news reporting.

  • Security:

    • Physical Security: Protecting the hardware. Examples: Locked doors, CCTV, UPS (Uninterruptible Power Supply) to protect against power cuts.

    • Logical Security: Protecting the software and data. Examples: Passwords, Firewalls (which block unauthorized network access), and Backups.

  • Malware (Malicious Software):

    • Virus: Attaches to a program and spreads when the program is run.

    • Worm: Spreads by itself across networks without needing to attach to a program.

    • Spyware: Secretly collects information about you.

    • Phishing: Tricking you into giving up personal information (like passwords or bank details) by pretending to be a trustworthy entity (like a fake bank website).

    • Spam: Unsolicited junk email.

  • Health and Safety:

    • Ergonomics: Designing your workspace to be comfortable and safe to prevent health issues.

    • RSI (Repetitive Strain Injury): Pain in muscles and nerves from repeating the same motion (like clicking a mouse) for too long.

    • CVS (Computer Vision Syndrome): Eye strain from looking at a screen for extended periods.

  • E-waste: Discarded electronic equipment, which often contains hazardous materials and must be disposed of properly.

  • Social Issues:

    • Digital Divide: The gap between people who have access to ICT and those who do not.

    • Cybercrime: Criminal activities carried out using computers and the internet.

Important Points for the Exam

  • This chapter is full of key terms. Be able to define: Plagiarism, Copyright, Firewall, Phishing, Spam, Virus vs. Worm, E-waste, and the Digital Divide.

  • Understand the difference between Physical Security (protecting the machine) and Logical Security (protecting the data).

  • Be able to provide examples of good ergonomic practices (e.g., screen at eye level, straight back, feet flat on the floor).

  • Explain how to protect yourself from malware (use an antivirus, don't open suspicious emails).

Tips & Tricks for Studying

  • Create Flashcards: This chapter is perfect for flashcards. Write a term on one side and its definition on the other.

  • Use Real-Life Examples: Think about a time you received a spam email. That's an example of a security issue. Have you ever seen an e-waste collection bin? That connects to environmental issues.

Make a Comparison Table: Create a table to compare different types of malware (Virus, Worm, Trojan, Spyware) based on how they spread and what they do. This will help you keep them straight.

වියාචනය (Disclaimer)

Idasara Academy ඉගෙනුම් සම්පත් නිර්මාණය කර ඇත්තේ සිසුන්ට මගපෙන්වීම, පුහුණුව සහ අධ්‍යයන උපායමාර්ග ලබාදී සහයෝගය දැක්වීමටය.

කෙසේ වෙතත්, සියලුම විභාග සහ නිල අවශ්‍යතා සඳහා, සිසුන් අනිවාර්යයෙන්ම ශ්‍රී ලංකා අධ්‍යාපන අමාත්‍යාංශයේ, අධ්‍යාපන ප්‍රකාශන දෙපාර්තමේන්තුව විසින් ප්‍රකාශයට පත් කරන ලද නිල පෙළපොත් සහ සම්පත් පරිශීලනය කළ යුතුය.

ජාතික විභාග සඳහා අන්තර්ගතයේ නිල බලය ලත් මූලාශ්‍රය වනුයේ රජය විසින් නිකුත් කරනු ලබන මෙම ප්‍රකාශනයි.

bottom of page