Computer Future Challenge

The outlook for innovative and beneficial computer applications is very bright. The area of applications that are socially, economically and technologically feasible is expanding steadily.



Use and expansion of computer networks and online database will tremendously influence business, communications, office automation, manufacturing, retail and financial services, publishing, transportation, health case, government and administration, education, entertainment etc. Artificial intelligence will eventually revolutionize computing in the future generation. Computers can improve the quality of life and contribute to improve our economy. The challenge is to harness the power of computers and direct it to the benefit of society. The poor countries find it difficult to invest money for expanding computer education and computerization. However, careful steps are essential to use computers to improve productivity and socio-economic condition of our society.he future generation. Computers can improve the quality of life and contribute to improve our economy. The challenge is to harness the power of computers and direct it to the benefit of society. The poor countries find it difficult to invest money for expanding computer education and computerization. However, careful steps are essential to use computers to improve productivity and socio-economic condition of our society.

Read more...

Computer Access Control

Various means have been devised to give access to authorized people.
These means fall into four broad categories.

1)  ID card or key 
2) Password or ID number 
3) Sign document 
4)  Biometrics. 

ID card or key :  

The user may have a key, badge, token, or plastic card to give inn or her physical access to the computer room or a locked up terminal. A card with a magnetized strip, for example, can give the user access to the bank account via a remote cash machine. Taking a step further, some employees begin each business day by donning an active badge, a clip-on identification card with an embedded computer chip. The active badge, which is becoming increasingly common, presents a challenging problem : balancing an employees privacy against a corporations desire for efficiency and control.

Password and ID number

Standard items are system password or identification number for bank cash machine. Cipher looks on doors require that a user knows the correct combination of numbers.
Sign document : Sign documents provide identification of a person. Though a signatures lend themselves to human interaction better than machine interaction.

Biometrics :

Some security systems use biometric devices which identify a person through finger print, voice intonation or other biological characteristics. Even newer is the concept of identification by the retina of the eye, which has a pattern that is harder to duplicate. Some systems use a combination of the preceding categories. For example, access to an automated teller machine requires both something like a plastic card and a personal identification number (PIN)

Read more...

What is Computer Controversies

Society depends very much upon the computational and information processing skills of computers computers. The benefits of using computers are6 obvious and have been discussed above.6 However computer revolution has generated intense controversies. Some of these heated controversies are listed below:



1) Privacy and misuse of personal information

2) Monitoring data on job activities

3) Electronic fund transfer and basilers society

4) Effect of automation on job

5) Computer crimes. 

Privacy :

A great deal of data about individuals are stored in computers , and the trend to store such data is increasing. Some of the data are of personal or private nature and there is a natural concern that they should not be misused. Some countries have passed or are about to pass the data protection act and create data protection authority to stop the misuse of personal data and to cheek violation of privacy.

Computer Monitoring :

In computer monitoring, computer continuously gather and assimilate data on job activities to measure performance of the employees. Computer monitoring has proved itself a usefull took for increasing productitivy. However, workers usually complain that being constantly observed and analyzed by a computer automatically add unnecessary stress to them.

Casheless Society :

In electronic fund transfer (EFT) money is transferred electronically from account to account by computers. Use of automatic teller machines (ATM) and payroll transfer systems are increasing. Some banks offer home banking services through their computers. Money may be climinated in future resulting in a casheless society ! It has some advantages, but the critical issue is the misuse of personal information as the system needs every thing from a persons life style to his or her location to be monitored.

Jobs and Unemployment Issues :

Computers usually affect the work of staff within the organization  organization. As a result, some jobs may be created and some may be lost. This creates a demand for training and retraining. Loss of jobs owing to computerization gives rise to alarm. However, only a very small proportion of the unemployment is directly caused by new technology. In certain applications jobs likely to be lost are : some office and factory jobs. Whether job losses result in permanent unemployment is another matter. It depends on the process of reemployment and retraining of the affected persons.

Computer Crimes :

There are many types of computer crimes. However, three aspects of computer crimes are often reported and deserve attention because of their social importance. They are :

1) Hacking and Computer fraud

2) Computer Viruses

3) Copyright Piracy .

The term "hacker" identifies a programmer who works in an skillful but illegal way. The name has become associated with individuals who make a hobby of making unauthorized access to computer systems. This anti-social behavior often leads to loss and inconvenience to the individuals. Legislation has been passed in many countries to make hacking illegal. The technique used by hackers to bypass system security are similar to those used by individuals concerned in computer fraud. Computer systems should be made as safe and secure as possible against hacking, fraud and viruses.

A computer virus is a program which attaches itself to another program. It replicates itself and causes infect systems by disks which have been infected. When a virus infected program is run the virus, modifies its host, and also replicate itself. Some viruses are merely annoying. Others cause data to be corrupted or deleted. There are many virus detection and protection packages in use.




Software software piracy is the use of unauthorized copies of software. It is like any other breach of copyright and the individuals responsible can face stiff penalties. Many countries, including Bangladesh, passed regulation to prevent software copy right piracy.

Read more...

  © Blogger templates Designed by Sabbir Alam @ Copyright 2012