SlideShare ist ein Scribd-Unternehmen logo
1 von 10
Computer SafetyComputer Safety
What does that mean?What does that mean?
Computer SafetyComputer Safety
Computer Safety has many components:Computer Safety has many components:
Computer ethicsComputer ethics
NetiquetteNetiquette
School District rulesSchool District rules
Internet SafetyInternet Safety
PlagiarismPlagiarism
Computer EthicsComputer Ethics
EthicsEthics
- A set of principles of right conduct/behavior- A set of principles of right conduct/behavior
• Computer EthicsComputer Ethics
- Set of principles of correct behavior while- Set of principles of correct behavior while
using a computerusing a computer
Computer EthicsComputer Ethics
 1. THOU SHALT NOT USE A1. THOU SHALT NOT USE A
COMPUTER TO HARM OTHERCOMPUTER TO HARM OTHER
PEOPLE.PEOPLE.
 2. THOU SHALT NOT INTERFERE2. THOU SHALT NOT INTERFERE
WITH OTHER PEOPLE'SWITH OTHER PEOPLE'S
COMPUTER WORK.COMPUTER WORK.
 3. THOU SHALT NOT SNOOP3. THOU SHALT NOT SNOOP
AROUND IN OTHER PEOPLE'SAROUND IN OTHER PEOPLE'S
COMPUTER FILES.COMPUTER FILES.
 4. THOU SHALT NOT USE A4. THOU SHALT NOT USE A
COMPUTER TO STEAL.COMPUTER TO STEAL.
 5. THOU SHALT NOT USE A5. THOU SHALT NOT USE A
COMPUTERCOMPUTER
TO BEAR FALSE WITNESS.TO BEAR FALSE WITNESS.

 6. THOU SHALT NOT COPY OR USE6. THOU SHALT NOT COPY OR USE
PROPRIETARY SOFTWARE FORPROPRIETARY SOFTWARE FOR
WHICH YOU HAVE NOT PAID.WHICH YOU HAVE NOT PAID.
 7. THOU SHALT NOT USE OTHER7. THOU SHALT NOT USE OTHER
PEOPLE'S COMPUTERPEOPLE'S COMPUTER
RESOURCES WITHOUTRESOURCES WITHOUT
AUTHORIZATION OR PROPERAUTHORIZATION OR PROPER
COMPENSATION.COMPENSATION.
 8. THOU SHALT NOT8. THOU SHALT NOT
APPROPRIATE OTHER PEOPLE'SAPPROPRIATE OTHER PEOPLE'S
INTELLECTUAL OUTPUT.INTELLECTUAL OUTPUT.
 9. THOU SHALT THINK ABOUT THE9. THOU SHALT THINK ABOUT THE
SOCIAL CONSEQUENCES OF THESOCIAL CONSEQUENCES OF THE
PROGRAM YOU ARE WRITING ORPROGRAM YOU ARE WRITING OR
THE SYSTEM YOU ARETHE SYSTEM YOU ARE
DESIGNING.DESIGNING.
 10. THOU SHALT ALWAYS USE A10. THOU SHALT ALWAYS USE A
COMPUTER IN WAYS THAT INSURECOMPUTER IN WAYS THAT INSURE
CONSIDERATION AND RESPECTCONSIDERATION AND RESPECT
FOR YOUR FELLOW HUMANSFOR YOUR FELLOW HUMANS
NetiquetteNetiquette
Develop a list of Do’ and Don'ts ofDevelop a list of Do’ and Don'ts of
communicating on the computercommunicating on the computer
NetiquetteNetiquette
Proper behavior while using the computerProper behavior while using the computer
““Rules of the Road in Cyberspace”Rules of the Road in Cyberspace”
NetiquetteNetiquette
 11. Avoid hurting. Avoid hurting
someone's feelings withsomeone's feelings with
e-mail.e-mail.
 2. Respect other people's2. Respect other people's
online rights.online rights.
 3. Avoid insulting3. Avoid insulting
someone unless you wantsomeone unless you want
to start a flame war.to start a flame war.
 4. If someone insults you,4. If someone insults you,
be calm.be calm.
 5. Avoid "crashing"5. Avoid "crashing"
discussion groups ordiscussion groups or
forums.forums.
 6. Respect the privacy of6. Respect the privacy of
other people.other people.
 7. Be responsible online.7. Be responsible online.
 8. Help other people learn8. Help other people learn
more about the Net.more about the Net.
NetiquetteNetiquette
The following website will help us learnThe following website will help us learn
more about Netiquette:more about Netiquette:
Cyber CitizenCyber Citizen
Bensalem Township School DistrictBensalem Township School District
RulesRules
Bensalem Township School DistrictBensalem Township School District
RulesRules

Weitere ähnliche Inhalte

Was ist angesagt?

Computer system servicing
Computer system servicingComputer system servicing
Computer system servicingLindyl Geral
 
Ict 9 module 4, lesson 1.3 diagnosing computer systems
Ict 9 module 4, lesson 1.3 diagnosing computer systemsIct 9 module 4, lesson 1.3 diagnosing computer systems
Ict 9 module 4, lesson 1.3 diagnosing computer systemsYonel Cadapan
 
Configure Computer System and Network
Configure Computer System and NetworkConfigure Computer System and Network
Configure Computer System and NetworkEILLEN IVY PORTUGUEZ
 
Lesson 1 computer safety and maintenance
Lesson 1   computer safety and maintenanceLesson 1   computer safety and maintenance
Lesson 1 computer safety and maintenanceSchool
 
Install computer system,devices and peripherals
Install computer system,devices and peripheralsInstall computer system,devices and peripherals
Install computer system,devices and peripheralsRaiza Janelle
 
Online Safety and Security
Online Safety and Security Online Safety and Security
Online Safety and Security Arah Louise
 
Ict 9 module 3, lesson 2.5 basic computer configuration setup
Ict 9 module 3, lesson 2.5 basic computer configuration setupIct 9 module 3, lesson 2.5 basic computer configuration setup
Ict 9 module 3, lesson 2.5 basic computer configuration setupYonel Cadapan
 
Ict 9 module 3, lesson 2.1 safety precautions
Ict 9 module 3, lesson 2.1 safety precautionsIct 9 module 3, lesson 2.1 safety precautions
Ict 9 module 3, lesson 2.1 safety precautionsYonel Cadapan
 
Security threats and safety measures
Security threats and safety measuresSecurity threats and safety measures
Security threats and safety measuresDnyaneshwar Beedkar
 
381091947 introduction-computer-systems-servicing-nc-ii
381091947 introduction-computer-systems-servicing-nc-ii381091947 introduction-computer-systems-servicing-nc-ii
381091947 introduction-computer-systems-servicing-nc-iihantos_cute
 
Setting up a network
Setting up a networkSetting up a network
Setting up a networkRachel Espino
 
Computer health & safety issues
Computer health & safety issuesComputer health & safety issues
Computer health & safety issuesBuxoo Abdullah
 
Why are Software Updates so Important for your Security
Why are Software Updates so Important for your SecurityWhy are Software Updates so Important for your Security
Why are Software Updates so Important for your SecurityQuick Heal Technologies Ltd.
 

Was ist angesagt? (20)

Computer system servicing
Computer system servicingComputer system servicing
Computer system servicing
 
Ict 9 module 4, lesson 1.3 diagnosing computer systems
Ict 9 module 4, lesson 1.3 diagnosing computer systemsIct 9 module 4, lesson 1.3 diagnosing computer systems
Ict 9 module 4, lesson 1.3 diagnosing computer systems
 
Configure Computer System and Network
Configure Computer System and NetworkConfigure Computer System and Network
Configure Computer System and Network
 
Lesson 1 computer safety and maintenance
Lesson 1   computer safety and maintenanceLesson 1   computer safety and maintenance
Lesson 1 computer safety and maintenance
 
Install computer system,devices and peripherals
Install computer system,devices and peripheralsInstall computer system,devices and peripherals
Install computer system,devices and peripherals
 
Gr. 1 peopleware - 3
Gr. 1 peopleware - 3Gr. 1 peopleware - 3
Gr. 1 peopleware - 3
 
Computer maintenance
Computer maintenanceComputer maintenance
Computer maintenance
 
Computer Security Threats
Computer Security ThreatsComputer Security Threats
Computer Security Threats
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & security
 
Online Safety and Security
Online Safety and Security Online Safety and Security
Online Safety and Security
 
Ict 9 module 3, lesson 2.5 basic computer configuration setup
Ict 9 module 3, lesson 2.5 basic computer configuration setupIct 9 module 3, lesson 2.5 basic computer configuration setup
Ict 9 module 3, lesson 2.5 basic computer configuration setup
 
Ict 9 module 3, lesson 2.1 safety precautions
Ict 9 module 3, lesson 2.1 safety precautionsIct 9 module 3, lesson 2.1 safety precautions
Ict 9 module 3, lesson 2.1 safety precautions
 
Security threats and safety measures
Security threats and safety measuresSecurity threats and safety measures
Security threats and safety measures
 
381091947 introduction-computer-systems-servicing-nc-ii
381091947 introduction-computer-systems-servicing-nc-ii381091947 introduction-computer-systems-servicing-nc-ii
381091947 introduction-computer-systems-servicing-nc-ii
 
Laptop maintenance
Laptop maintenanceLaptop maintenance
Laptop maintenance
 
Setting up a network
Setting up a networkSetting up a network
Setting up a network
 
Computer health & safety issues
Computer health & safety issuesComputer health & safety issues
Computer health & safety issues
 
Viruses, worms, and trojan horses
Viruses, worms, and trojan horsesViruses, worms, and trojan horses
Viruses, worms, and trojan horses
 
Installing Operating System
Installing Operating System Installing Operating System
Installing Operating System
 
Why are Software Updates so Important for your Security
Why are Software Updates so Important for your SecurityWhy are Software Updates so Important for your Security
Why are Software Updates so Important for your Security
 

Andere mochten auch

Health & safety presentation
Health & safety presentationHealth & safety presentation
Health & safety presentationPhalinng
 
Safe Manual Handling in the Workplace
Safe Manual Handling in the WorkplaceSafe Manual Handling in the Workplace
Safe Manual Handling in the WorkplaceDjCurrie
 
Manual Handling - Shift Materials Safely
Manual Handling - Shift Materials SafelyManual Handling - Shift Materials Safely
Manual Handling - Shift Materials SafelyMandy Bruford
 
Health And Safety
Health And SafetyHealth And Safety
Health And SafetySaimaRafiq
 
Manual Handling Of Loads
Manual Handling Of LoadsManual Handling Of Loads
Manual Handling Of LoadsFrank_Keenan
 
Health issues of ICT
Health issues of ICTHealth issues of ICT
Health issues of ICTCJ900
 
Mh Manual Handling
Mh  Manual HandlingMh  Manual Handling
Mh Manual Handlingneiltilley
 
Manual Handling Ppt
Manual Handling PptManual Handling Ppt
Manual Handling Pptvtsiri
 
Occupational Health & Safety Presentation
Occupational Health & Safety PresentationOccupational Health & Safety Presentation
Occupational Health & Safety PresentationMark Zeeman
 

Andere mochten auch (12)

Health & safety presentation
Health & safety presentationHealth & safety presentation
Health & safety presentation
 
Safe Manual Handling in the Workplace
Safe Manual Handling in the WorkplaceSafe Manual Handling in the Workplace
Safe Manual Handling in the Workplace
 
Manual Handling
Manual HandlingManual Handling
Manual Handling
 
Manual Handling - Shift Materials Safely
Manual Handling - Shift Materials SafelyManual Handling - Shift Materials Safely
Manual Handling - Shift Materials Safely
 
Health And Safety
Health And SafetyHealth And Safety
Health And Safety
 
Manual Handling Of Loads
Manual Handling Of LoadsManual Handling Of Loads
Manual Handling Of Loads
 
Health issues of ICT
Health issues of ICTHealth issues of ICT
Health issues of ICT
 
Principles of manual handling
Principles of manual handlingPrinciples of manual handling
Principles of manual handling
 
Mh Manual Handling
Mh  Manual HandlingMh  Manual Handling
Mh Manual Handling
 
Manual_handling
Manual_handlingManual_handling
Manual_handling
 
Manual Handling Ppt
Manual Handling PptManual Handling Ppt
Manual Handling Ppt
 
Occupational Health & Safety Presentation
Occupational Health & Safety PresentationOccupational Health & Safety Presentation
Occupational Health & Safety Presentation
 

Ähnlich wie Computer safety

Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2JeffUrgelles
 
Identify ethical use of computers
Identify ethical use of computersIdentify ethical use of computers
Identify ethical use of computersAl Forte
 
etiquettes-grade 7.pptx
etiquettes-grade 7.pptxetiquettes-grade 7.pptx
etiquettes-grade 7.pptxCynnePataweg
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentationguest65a1c4
 
Super billing computers are your future
Super billing computers are your futureSuper billing computers are your future
Super billing computers are your futuresuperb11b
 
computer ethics.pptx
computer ethics.pptxcomputer ethics.pptx
computer ethics.pptxglorysunny
 
Computer Ethics and Content Marketing Platforms
Computer Ethics and Content Marketing PlatformsComputer Ethics and Content Marketing Platforms
Computer Ethics and Content Marketing PlatformsAmplephi
 
COMPUTER ETHICS
COMPUTER ETHICSCOMPUTER ETHICS
COMPUTER ETHICSRJ Khan
 
Computer ethics-presentation-1221139444034074-9
Computer ethics-presentation-1221139444034074-9Computer ethics-presentation-1221139444034074-9
Computer ethics-presentation-1221139444034074-9sajida zafar
 
the lesson about the information and communication to technology
the lesson about the information and communication to technologythe lesson about the information and communication to technology
the lesson about the information and communication to technologylcnemedez
 
Lesson-2-Rules-of-Netiquette safety Online
Lesson-2-Rules-of-Netiquette safety OnlineLesson-2-Rules-of-Netiquette safety Online
Lesson-2-Rules-of-Netiquette safety Onlinessuser9cd7f3
 
computer and society impact of Computer in society
computer and society  impact of Computer in society computer and society  impact of Computer in society
computer and society impact of Computer in society Sumama Shakir
 
Computer Ethics
Computer EthicsComputer Ethics
Computer EthicsRamki M
 

Ähnlich wie Computer safety (20)

3 Rd Computer Ethics
3 Rd Computer Ethics3 Rd Computer Ethics
3 Rd Computer Ethics
 
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2
 
Identify ethical use of computers
Identify ethical use of computersIdentify ethical use of computers
Identify ethical use of computers
 
etiquettes-grade 7.pptx
etiquettes-grade 7.pptxetiquettes-grade 7.pptx
etiquettes-grade 7.pptx
 
Nfwordle
NfwordleNfwordle
Nfwordle
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentation
 
Super billing computers are your future
Super billing computers are your futureSuper billing computers are your future
Super billing computers are your future
 
computer ethics.pptx
computer ethics.pptxcomputer ethics.pptx
computer ethics.pptx
 
Webgraphicorganizerkaur
WebgraphicorganizerkaurWebgraphicorganizerkaur
Webgraphicorganizerkaur
 
Webgraphicorganizerkaur
WebgraphicorganizerkaurWebgraphicorganizerkaur
Webgraphicorganizerkaur
 
Ethics in computing
Ethics in computingEthics in computing
Ethics in computing
 
Webgraphicorganizerkaur
WebgraphicorganizerkaurWebgraphicorganizerkaur
Webgraphicorganizerkaur
 
Computer Ethics and Content Marketing Platforms
Computer Ethics and Content Marketing PlatformsComputer Ethics and Content Marketing Platforms
Computer Ethics and Content Marketing Platforms
 
COMPUTER ETHICS
COMPUTER ETHICSCOMPUTER ETHICS
COMPUTER ETHICS
 
Computer ethics-presentation-1221139444034074-9
Computer ethics-presentation-1221139444034074-9Computer ethics-presentation-1221139444034074-9
Computer ethics-presentation-1221139444034074-9
 
the lesson about the information and communication to technology
the lesson about the information and communication to technologythe lesson about the information and communication to technology
the lesson about the information and communication to technology
 
Lesson-2-Rules-of-Netiquette safety Online
Lesson-2-Rules-of-Netiquette safety OnlineLesson-2-Rules-of-Netiquette safety Online
Lesson-2-Rules-of-Netiquette safety Online
 
computer and society impact of Computer in society
computer and society  impact of Computer in society computer and society  impact of Computer in society
computer and society impact of Computer in society
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
ICT
ICTICT
ICT
 

Mehr von ahentz

Tech stats
Tech statsTech stats
Tech statsahentz
 
Workshop Aug
Workshop AugWorkshop Aug
Workshop Augahentz
 
Workshop Aug
Workshop AugWorkshop Aug
Workshop Augahentz
 
Workshop Aug
Workshop AugWorkshop Aug
Workshop Augahentz
 
Workshop Aug
Workshop AugWorkshop Aug
Workshop Augahentz
 
Workshop Aug
Workshop AugWorkshop Aug
Workshop Augahentz
 
Bentech
BentechBentech
Bentechahentz
 
Shafer
ShaferShafer
Shaferahentz
 
Wiki Ning2
Wiki Ning2Wiki Ning2
Wiki Ning2ahentz
 
Makebeliefscomix2
Makebeliefscomix2Makebeliefscomix2
Makebeliefscomix2ahentz
 

Mehr von ahentz (11)

Tech stats
Tech statsTech stats
Tech stats
 
Workshop Aug
Workshop AugWorkshop Aug
Workshop Aug
 
Workshop Aug
Workshop AugWorkshop Aug
Workshop Aug
 
Workshop Aug
Workshop AugWorkshop Aug
Workshop Aug
 
Workshop Aug
Workshop AugWorkshop Aug
Workshop Aug
 
Workshop Aug
Workshop AugWorkshop Aug
Workshop Aug
 
Bentech
BentechBentech
Bentech
 
Diigo
DiigoDiigo
Diigo
 
Shafer
ShaferShafer
Shafer
 
Wiki Ning2
Wiki Ning2Wiki Ning2
Wiki Ning2
 
Makebeliefscomix2
Makebeliefscomix2Makebeliefscomix2
Makebeliefscomix2
 

Computer safety

  • 1. Computer SafetyComputer Safety What does that mean?What does that mean?
  • 2. Computer SafetyComputer Safety Computer Safety has many components:Computer Safety has many components: Computer ethicsComputer ethics NetiquetteNetiquette School District rulesSchool District rules Internet SafetyInternet Safety PlagiarismPlagiarism
  • 3. Computer EthicsComputer Ethics EthicsEthics - A set of principles of right conduct/behavior- A set of principles of right conduct/behavior • Computer EthicsComputer Ethics - Set of principles of correct behavior while- Set of principles of correct behavior while using a computerusing a computer
  • 4. Computer EthicsComputer Ethics  1. THOU SHALT NOT USE A1. THOU SHALT NOT USE A COMPUTER TO HARM OTHERCOMPUTER TO HARM OTHER PEOPLE.PEOPLE.  2. THOU SHALT NOT INTERFERE2. THOU SHALT NOT INTERFERE WITH OTHER PEOPLE'SWITH OTHER PEOPLE'S COMPUTER WORK.COMPUTER WORK.  3. THOU SHALT NOT SNOOP3. THOU SHALT NOT SNOOP AROUND IN OTHER PEOPLE'SAROUND IN OTHER PEOPLE'S COMPUTER FILES.COMPUTER FILES.  4. THOU SHALT NOT USE A4. THOU SHALT NOT USE A COMPUTER TO STEAL.COMPUTER TO STEAL.  5. THOU SHALT NOT USE A5. THOU SHALT NOT USE A COMPUTERCOMPUTER TO BEAR FALSE WITNESS.TO BEAR FALSE WITNESS.   6. THOU SHALT NOT COPY OR USE6. THOU SHALT NOT COPY OR USE PROPRIETARY SOFTWARE FORPROPRIETARY SOFTWARE FOR WHICH YOU HAVE NOT PAID.WHICH YOU HAVE NOT PAID.  7. THOU SHALT NOT USE OTHER7. THOU SHALT NOT USE OTHER PEOPLE'S COMPUTERPEOPLE'S COMPUTER RESOURCES WITHOUTRESOURCES WITHOUT AUTHORIZATION OR PROPERAUTHORIZATION OR PROPER COMPENSATION.COMPENSATION.  8. THOU SHALT NOT8. THOU SHALT NOT APPROPRIATE OTHER PEOPLE'SAPPROPRIATE OTHER PEOPLE'S INTELLECTUAL OUTPUT.INTELLECTUAL OUTPUT.  9. THOU SHALT THINK ABOUT THE9. THOU SHALT THINK ABOUT THE SOCIAL CONSEQUENCES OF THESOCIAL CONSEQUENCES OF THE PROGRAM YOU ARE WRITING ORPROGRAM YOU ARE WRITING OR THE SYSTEM YOU ARETHE SYSTEM YOU ARE DESIGNING.DESIGNING.  10. THOU SHALT ALWAYS USE A10. THOU SHALT ALWAYS USE A COMPUTER IN WAYS THAT INSURECOMPUTER IN WAYS THAT INSURE CONSIDERATION AND RESPECTCONSIDERATION AND RESPECT FOR YOUR FELLOW HUMANSFOR YOUR FELLOW HUMANS
  • 5. NetiquetteNetiquette Develop a list of Do’ and Don'ts ofDevelop a list of Do’ and Don'ts of communicating on the computercommunicating on the computer
  • 6. NetiquetteNetiquette Proper behavior while using the computerProper behavior while using the computer ““Rules of the Road in Cyberspace”Rules of the Road in Cyberspace”
  • 7. NetiquetteNetiquette  11. Avoid hurting. Avoid hurting someone's feelings withsomeone's feelings with e-mail.e-mail.  2. Respect other people's2. Respect other people's online rights.online rights.  3. Avoid insulting3. Avoid insulting someone unless you wantsomeone unless you want to start a flame war.to start a flame war.  4. If someone insults you,4. If someone insults you, be calm.be calm.  5. Avoid "crashing"5. Avoid "crashing" discussion groups ordiscussion groups or forums.forums.  6. Respect the privacy of6. Respect the privacy of other people.other people.  7. Be responsible online.7. Be responsible online.  8. Help other people learn8. Help other people learn more about the Net.more about the Net.
  • 8. NetiquetteNetiquette The following website will help us learnThe following website will help us learn more about Netiquette:more about Netiquette: Cyber CitizenCyber Citizen
  • 9. Bensalem Township School DistrictBensalem Township School District RulesRules
  • 10. Bensalem Township School DistrictBensalem Township School District RulesRules