raquel ICT discussion [Autosaved] Grade 7.pptx

RSLCelea 11 views 17 slides Mar 05, 2025
Slide 1
Slide 1 of 17
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15
Slide 16
16
Slide 17
17

About This Presentation

A computer is an electronic device that manipulates information, or data. It has the ability to store, retrieve, and process data. You may already know that you can use a computer to type documents, send email, play games, and browse the Web. You can also use it to edit or create spreadsheets, prese...


Slide Content

Welcome to ICT

What is ICT ICT stands for Information and Communication Technology. It refers to technologies that provide access to information through telecommunications. This includes internet, wireless networks, cell phones, and other communication mediums. ICT encompasses both the hardware and software used for these technologies, as well as the various applications and services they enable

10 Commandment in computer Ethics Ten Commandments of Computer Ethics The Ten Commandments of Computer Ethics were created in 1992 by the Washington, D.C. based Computer Ethics Institute. • The commandments were introduced in the paper "In Pursuit of a 'Ten Commandments' for Computer Ethics" by Ramon C. Barquin as a means to create "a set of standards to guide and instruct people in the ethical use of computers.

1.Thou shalt not use a computer to harm other people. This principle emphasizes the importance of using computers and technology responsibly and ethically to prevent harm to others. It promotes the idea that technology should be used for positive and constructive purposes rather than for causing harm or engaging in malicious activities. Malware 6. Hacking Phishing 7. Man in the middle attacks Denial of service attacks 8. crypto jacking Social engineering 9. botnets Data breaching 10. Inside threats

Thou shalt not interfere with other people's computer work. The command "Thou shalt not interfere with other people's computer work" emphasizes the importance of respecting others' work, time, and space in the digital domain.

Thou shalt not snoop around in other people's computer files. The importance of respecting others' privacy and boundaries in the digital realm. It serves as a reminder to refrain from accessing, viewing, or tampering with someone else's personal or confidential files without their explicit consent or authorization. Snooping around in other people's computer files is a violation of privacy and can lead to trust issues, breach of confidentiality, and potential legal repercussions.

Thou shalt not use a computer to steal. Stealing through the use of a computer can take various forms, including hacking into systems to steal sensitive information, engaging in fraud, phishing scams, or identity theft, and misappropriating someone else's digital assets. Such actions can have serious consequences, including financial loss, reputational damage, and legal repercussions .

Thou shalt not use a computer to bear false witness. It underscores the significance of honesty, integrity, and ethical conduct in our interactions and communications, even in the digital realm. It emphasizes the importance of not spreading misinformation, lies, or deceitful information through digital means such as computers, the internet, or any technology platform

Thou shalt not copy or use proprietary software for which you have not paid (without permission). Using proprietary software without permission or proper licensing can lead to legal consequences and undermines the efforts of developers and companies that invest time and resources into creating these products. ownership

. Thou shalt not use other people's computer resources without authorization or proper compensation. Accessing or using someone else's computer resources without their explicit consent is considered unauthorized use. This could include accessing a colleague's files, using a network without permission, or exploiting someone else's computing power Unauthorized use can lead to legal consequences under laws concerning computer mis use . It is also a violation of ethical standards in both personal and professional contexts.

Thou shalt not appropriate other people's intellectual output. it is considered a violation, illegal and unethical to copy text or photographs from another website and publish them on your own. It is unethical to claim someone else’s work without asking/seeking permission.

Thou shalt think about the social consequences of the program you are writing or the system you are designing. is the programmer's responsibility to understand his target audience/users and the effect it may have on them. A software developer/development firm should consider the influence their code can have on the society. Social Consequences a) Impact- b) Effect c) Culturally Appropriate

Thou shalt always use a computer in ways that ensure consideration and respect for your fellow humans. In using computers for communication, be respectful and courteous with the fellow members. One should not intrude others' private space, use abusive language, make false statements or pass irresponsible remarks about others. One should be courteous while communicating over the web and should respect others' time and resources. Also, one should be considerate with a novice computer user. NEW

Assignment 1. Students will research on the History of Computer and its Development What are the impact of the Development in todays society (Long Band Pepper)

THANK YOU

Computer Programing
Tags