You are on page 1of 12

INFORMATION AND

COMMUNICATION
TECHNOLOGY
Tavia Lord 506
IMPACT OF ICT ON THE
ENTERTAINMENT
INDUSTRY
SECTION 1
COMPUTERS IN ENTERTAINMENT
Computers are used in Entertainment for:
◦ Gaming
◦ Creating and editing music
◦ Art (photo editing programs and animation programs)
◦ Streaming and watching videos
HARDWARE USED ENTERTAINMENT AND
THEIR USES
Graphics tablet
◦ This is a digital input device that allows a user to hand-draw pictures, animations, and illustrations using
a special pen-like stylus, similar to how a human would draw images on paper using a pencil.
Cameras
◦ To take photographs that can be copied or saved to a memory card or other internal storage for later
viewing or processing.
Personal Computers
◦ For watching and streaming videos, listening to music files, playing video games, and keeping track of
one's location while camping or hiking
SOFTWARE USED ENTERTAINMENT AND
THEIR USES
Game editors
◦ These are used in the development and editing games.
Special effects software
◦ We use special effects software to set the tone, clarify the plot, and help boost the drama.
Animation software
◦ Users may use animation tools to create moving graphics from still images. Users can animate 2D, 3D,
hand-drawn, or computer-generated graphics, depending on the application, and sometimes with the
ability to add music or other effects.
MEASURES TO PROTECT
AND SECURE
INFORMATION
SECTION 2
Keeping information secure from unwanted
access/users is what protecting and preserving
information entails.
HARDWARE MEASURES RESTRICTION
◦ In a dedicated space or house, keep the computer or portable storage. Locks and a mix of surveillance
cameras, alarms, and security guards will be used to protect this location.
◦ In a cabinet (fireproof cabinet) or vault, lock manual files or portable storage with backup data. Make a
second backup copy and save it somewhere else (archiving).
◦ Biometrics refers to the use of a person's physical features to classify him or her. To obtain access to the
information or the origin of the information, a person's iris, fingerprint, or handprint will need to be
checked.
SOFTWARE MEASURES RESTRICTION
◦ Passwords are a string of characters used to block unauthorized entry to a device. A password may be
used to secure a device or individual files on the computer. The proper password must be entered in order
for access to be given.
◦ Encryption is the act of decoding data in such a way that it has no resemblance to the original
(unrecognizable form). Anyone attempting to open an encrypted file would have it scrambled. To be
remembered, it must first be decrypted. The method of decoding encrypted data in order to recover the
original data is known as decryption.
◦ Virus protection – A virus is a malicious software that is programmed to infect data on a device and/or
prohibit it from functioning properly. Anti-virus software (virus protection) is a form of software that
attempts to identify and delete viruses from a device or removable storage media.
DATA CORRUPTION
When data becomes unusable, unreadable, or otherwise unavailable to a user or program, it is called data
corruption.

Causes of Data Corruption Ways to reduce Data Corruption

◦ A virus on a device ◦ Anti-virus program installation


◦ Conduct quality management audits to reduce the risk
◦ Employees' willful actions
of willful corruption.
◦ A problem with the computer ◦ Reduce the probability of machine failure by
◦ Power spikes and blackouts conducting routine computer maintenance and
maintaining the device in a comfortable, dust-free
environment.
◦ Surge protectors and uninterruptible power supply
modules are used.
COMPUTER SECURITY VS CYBER
SECURITY
Computer Security Cyber Security

◦ Protects the privacy of computers, networks, ◦ Using software and hardware systems, ensures
files, and programs from cyberspace attacks, the security, accessibility, and integrity of data
unauthorized entry, and destruction. and networks.
PERSONAL SECURITY PRACTICES

ACCESS TO FREE WI-FI KEEPING MOBILE DEVICES SECURITY IN THE CYBER


NETWORKS IS BEING SECURE WORLD (FOR EXAMPLE,
LIMITED. SOCIAL MEDIA).

You might also like