A computer is an electronic device that manipulates information, or data. It has the ability to store, retrieve, and process data. You may already know that you can use a computer to type documents, send email, play games, and browse the Web. You can also use it to edit or create spreadsheets, prese...
A computer is an electronic device that manipulates information, or data. It has the ability to store, retrieve, and process data. You may already know that you can use a computer to type documents, send email, play games, and browse the Web. You can also use it to edit or create spreadsheets, presentations, and even videos.
The History of the computer started from a simple device called abacus. It is a mechanical device that is used to aid an individual in performing mathematical calculations like addition and subtraction. It was developed by the Egyptian in10th Century BC but it was given its final shape in the 12th century AD by the Chinese
of Scotland invented a calculating device in 1617 called the Napier Bones. It allowed the operator to multiply, divide and calculate square and cube roots by moving the rods around and placing them in specially constructed boards.
In 1642,Blaise Pascal,
a French scientist, invented an adding machine called the Pascal`s Calculator. It made use of gears to represent the position of digits and it was its limitation to addition and subtraction and it is too expensive.
Size: 2.91 MB
Language: en
Added: Mar 05, 2025
Slides: 17 pages
Slide Content
Welcome to ICT
What is ICT ICT stands for Information and Communication Technology. It refers to technologies that provide access to information through telecommunications. This includes internet, wireless networks, cell phones, and other communication mediums. ICT encompasses both the hardware and software used for these technologies, as well as the various applications and services they enable
10 Commandment in computer Ethics Ten Commandments of Computer Ethics The Ten Commandments of Computer Ethics were created in 1992 by the Washington, D.C. based Computer Ethics Institute. • The commandments were introduced in the paper "In Pursuit of a 'Ten Commandments' for Computer Ethics" by Ramon C. Barquin as a means to create "a set of standards to guide and instruct people in the ethical use of computers.
1.Thou shalt not use a computer to harm other people. This principle emphasizes the importance of using computers and technology responsibly and ethically to prevent harm to others. It promotes the idea that technology should be used for positive and constructive purposes rather than for causing harm or engaging in malicious activities. Malware 6. Hacking Phishing 7. Man in the middle attacks Denial of service attacks 8. crypto jacking Social engineering 9. botnets Data breaching 10. Inside threats
Thou shalt not interfere with other people's computer work. The command "Thou shalt not interfere with other people's computer work" emphasizes the importance of respecting others' work, time, and space in the digital domain.
Thou shalt not snoop around in other people's computer files. The importance of respecting others' privacy and boundaries in the digital realm. It serves as a reminder to refrain from accessing, viewing, or tampering with someone else's personal or confidential files without their explicit consent or authorization. Snooping around in other people's computer files is a violation of privacy and can lead to trust issues, breach of confidentiality, and potential legal repercussions.
Thou shalt not use a computer to steal. Stealing through the use of a computer can take various forms, including hacking into systems to steal sensitive information, engaging in fraud, phishing scams, or identity theft, and misappropriating someone else's digital assets. Such actions can have serious consequences, including financial loss, reputational damage, and legal repercussions .
Thou shalt not use a computer to bear false witness. It underscores the significance of honesty, integrity, and ethical conduct in our interactions and communications, even in the digital realm. It emphasizes the importance of not spreading misinformation, lies, or deceitful information through digital means such as computers, the internet, or any technology platform
Thou shalt not copy or use proprietary software for which you have not paid (without permission). Using proprietary software without permission or proper licensing can lead to legal consequences and undermines the efforts of developers and companies that invest time and resources into creating these products. ownership
. Thou shalt not use other people's computer resources without authorization or proper compensation. Accessing or using someone else's computer resources without their explicit consent is considered unauthorized use. This could include accessing a colleague's files, using a network without permission, or exploiting someone else's computing power Unauthorized use can lead to legal consequences under laws concerning computer mis use . It is also a violation of ethical standards in both personal and professional contexts.
Thou shalt not appropriate other people's intellectual output. it is considered a violation, illegal and unethical to copy text or photographs from another website and publish them on your own. It is unethical to claim someone else’s work without asking/seeking permission.
Thou shalt think about the social consequences of the program you are writing or the system you are designing. is the programmer's responsibility to understand his target audience/users and the effect it may have on them. A software developer/development firm should consider the influence their code can have on the society. Social Consequences a) Impact- b) Effect c) Culturally Appropriate
Thou shalt always use a computer in ways that ensure consideration and respect for your fellow humans. In using computers for communication, be respectful and courteous with the fellow members. One should not intrude others' private space, use abusive language, make false statements or pass irresponsible remarks about others. One should be courteous while communicating over the web and should respect others' time and resources. Also, one should be considerate with a novice computer user. NEW
Assignment 1. Students will research on the History of Computer and its Development What are the impact of the Development in todays society (Long Band Pepper)