SlideShare a Scribd company logo
1 of 26
Download to read offline
Understand Ethics and Security in
The Programming Process
What is Computer Ethics?
“Dealing with ethical problems
aggravated, transformed or created by
computer technology”
- Computer Ethics in the Computer Science Curriculum
Organizations
ACM – Association for Computer Machinery
Centre for Computing and Social Responsibility
The Research Center on Computing & Society
Ethical Considerations
Information Age
Due to the computer’s ability to store and
manipulate large amounts of information
Netiquette
Do not attempt to access the account of another user
without authorization
Do not share your password – change it periodically
Use appropriate subject matter and language, and be
considerate of other people’s beliefs and opinions.
Privacy
Ethical issue
Computers record transactions, calls, etc.
(These records can be used to learn a lot about you.)

Because of privacy issues, many laws have been passed.
Online Profiling
Marketing technique where data is collected about
customers visiting a website
Cookie
Text file created by the server computer when a user enters
information into a website.
(not a delicious treat)
Web Beacon
Tiny, transparent graphics located on web pages or in e-mail
message that are used in combination with cookies to
collect data about web page users or email senders
Privacy Policy
Legally binding document that explains how any personal
information will be used.
Information Technology Laws in the

United States
Technology Laws
• Identity Theft Penalty
Enhancement Act of 2004
• Federal Information Security
Management Act of 2002 (FISMA)
• Consumer Credit Reporting Reform
Act of 1996
• Privacy Act of 1974
• Right to Financial Privacy Act of
1978

• Electronic Communications Privacy
Act of 1986 (ECPA)
• Electronic Freedom of Information
Act of 1996
• Children’s Online Privacy
Protection Act of 1988 (COPPA)
• Safety and Freedom through
Encryption Act of 1999 (SAFE)
• Provide Appropriate Tools Required
to Intercept and Obstruct Terrorism
(PATRIOT) Act of 2001
Implications of Computer Use
Ergonomics
The science that studies safe work environments.
Repetitive stress injuries, eye strain, etc.
Environmental Concerns
Power & paper waste
Disposal of outdated hardware
Employee Monitoring
Issues with computers in the workplace
Invasion of Privacy
Identity theft
Protection of

SOFTWARE
&
DATA
Copyright
Protection of digital information
NET (No Electronic Theft) Act of 1997
• Protects against copyright infringement
Piracy
Illegal copies being distributed.
Virus
Program or series of instruction that can replicate without the
user’s knowledge
Trojan Horse
» Appears as something else

Worm
» Program that is able to reproduce itself over a network
Antivirus-Programs
Install on computers to detect and remove code before it can
replicated or damage data
Precautions to Take
Update virus software
Do not open email attachments without scanning.
Crackers, Hackers
Illegal act to gain access to large computer systems to perform acts of
vandalism.
Electronic Communications Privacy Act of 1986 makes it a federal
offense.
Most networks have a firewall to prevent this type of access.
Phishing
Act of sending an email to a user falsely claiming to be a legitimate
business in an attempt to trick the user into revealing personal
information that could be used for crimes like identity theft.

More Related Content

What's hot

Challenges facing data protection in kenya
Challenges facing data protection in kenyaChallenges facing data protection in kenya
Challenges facing data protection in kenyafillkay
 
Introduction to the management of information security
Introduction to the management of information security  Introduction to the management of information security
Introduction to the management of information security Sammer Qader
 
Security and ethical issues - Arber Hoxhallari
Security and ethical issues - Arber HoxhallariSecurity and ethical issues - Arber Hoxhallari
Security and ethical issues - Arber HoxhallariArber Hoxhallari
 
MIS-CH08: Securing Information Systems
MIS-CH08: Securing Information SystemsMIS-CH08: Securing Information Systems
MIS-CH08: Securing Information SystemsSukanya Ben
 
Chapter 11 laws and ethic information security
Chapter 11   laws and ethic information securityChapter 11   laws and ethic information security
Chapter 11 laws and ethic information securitySyaiful Ahdan
 
Computer Ethics and Legal Issues
Computer Ethics and Legal IssuesComputer Ethics and Legal Issues
Computer Ethics and Legal IssuesKak Yong
 
Computer ethics & copyright
Computer  ethics & copyrightComputer  ethics & copyright
Computer ethics & copyrightVehitaltinci
 
Legal, ethical & professional issues
Legal, ethical & professional issuesLegal, ethical & professional issues
Legal, ethical & professional issuesDhani Ahmad
 
Extending CyberSecurity Beyond The Office Perimeter
Extending CyberSecurity Beyond The Office PerimeterExtending CyberSecurity Beyond The Office Perimeter
Extending CyberSecurity Beyond The Office PerimeterVeriato
 
02 Legal, Ethical, and Professional Issues in Information Security
02 Legal, Ethical, and Professional Issues in Information Security02 Legal, Ethical, and Professional Issues in Information Security
02 Legal, Ethical, and Professional Issues in Information Securitysappingtonkr
 
PECB Webinar: The Internet of Things
PECB Webinar: The Internet of ThingsPECB Webinar: The Internet of Things
PECB Webinar: The Internet of ThingsPECB
 

What's hot (19)

Challenges facing data protection in kenya
Challenges facing data protection in kenyaChallenges facing data protection in kenya
Challenges facing data protection in kenya
 
Introduction to the management of information security
Introduction to the management of information security  Introduction to the management of information security
Introduction to the management of information security
 
Security and ethical issues - Arber Hoxhallari
Security and ethical issues - Arber HoxhallariSecurity and ethical issues - Arber Hoxhallari
Security and ethical issues - Arber Hoxhallari
 
Computer ethics
Computer ethics Computer ethics
Computer ethics
 
Ethics in-information-security
Ethics in-information-securityEthics in-information-security
Ethics in-information-security
 
Cyber security
Cyber securityCyber security
Cyber security
 
MIS-CH08: Securing Information Systems
MIS-CH08: Securing Information SystemsMIS-CH08: Securing Information Systems
MIS-CH08: Securing Information Systems
 
Is ch1 (2)
Is ch1 (2)Is ch1 (2)
Is ch1 (2)
 
Ethics and information security 2
Ethics and information security 2Ethics and information security 2
Ethics and information security 2
 
Chapter 11 laws and ethic information security
Chapter 11   laws and ethic information securityChapter 11   laws and ethic information security
Chapter 11 laws and ethic information security
 
Computer Ethics and Legal Issues
Computer Ethics and Legal IssuesComputer Ethics and Legal Issues
Computer Ethics and Legal Issues
 
Cyber security
Cyber securityCyber security
Cyber security
 
Computer ethics and crime
Computer ethics and crimeComputer ethics and crime
Computer ethics and crime
 
Computer ethics & copyright
Computer  ethics & copyrightComputer  ethics & copyright
Computer ethics & copyright
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Legal, ethical & professional issues
Legal, ethical & professional issuesLegal, ethical & professional issues
Legal, ethical & professional issues
 
Extending CyberSecurity Beyond The Office Perimeter
Extending CyberSecurity Beyond The Office PerimeterExtending CyberSecurity Beyond The Office Perimeter
Extending CyberSecurity Beyond The Office Perimeter
 
02 Legal, Ethical, and Professional Issues in Information Security
02 Legal, Ethical, and Professional Issues in Information Security02 Legal, Ethical, and Professional Issues in Information Security
02 Legal, Ethical, and Professional Issues in Information Security
 
PECB Webinar: The Internet of Things
PECB Webinar: The Internet of ThingsPECB Webinar: The Internet of Things
PECB Webinar: The Internet of Things
 

Viewers also liked

Excel IF function
Excel IF functionExcel IF function
Excel IF functionHtay Aung
 
Excel formulas with-example-narration
Excel formulas with-example-narrationExcel formulas with-example-narration
Excel formulas with-example-narrationBelinda Prahl
 
Investigating Graphic Image Design
Investigating Graphic Image DesignInvestigating Graphic Image Design
Investigating Graphic Image DesignCasey Robertson
 

Viewers also liked (7)

New Coding Vocabulary
New Coding VocabularyNew Coding Vocabulary
New Coding Vocabulary
 
Using Formulas in Excel
Using Formulas in ExcelUsing Formulas in Excel
Using Formulas in Excel
 
Setting Goals
Setting GoalsSetting Goals
Setting Goals
 
Marketing Research
Marketing ResearchMarketing Research
Marketing Research
 
Excel IF function
Excel IF functionExcel IF function
Excel IF function
 
Excel formulas with-example-narration
Excel formulas with-example-narrationExcel formulas with-example-narration
Excel formulas with-example-narration
 
Investigating Graphic Image Design
Investigating Graphic Image DesignInvestigating Graphic Image Design
Investigating Graphic Image Design
 

Similar to Understand Ethics and Security in the Programming Process

Security And Ethical Challenges Of Infornation Technology
Security And Ethical Challenges Of Infornation TechnologySecurity And Ethical Challenges Of Infornation Technology
Security And Ethical Challenges Of Infornation Technologyparamalways
 
Computer ethics cyber security and technology of it
Computer ethics cyber security and technology of itComputer ethics cyber security and technology of it
Computer ethics cyber security and technology of itsr24production
 
Business ethics ppt
Business ethics pptBusiness ethics ppt
Business ethics pptWulax37
 
VTU - MIS Module 8 - Security and Ethical Challenges
VTU - MIS Module 8 -  Security and Ethical ChallengesVTU - MIS Module 8 -  Security and Ethical Challenges
VTU - MIS Module 8 - Security and Ethical ChallengesPriya Diana Mercy
 
IT Security for the Physical Security Professional
IT Security for the Physical Security ProfessionalIT Security for the Physical Security Professional
IT Security for the Physical Security Professionalciso_insights
 
Info2 sec 5_-_protecting_ict_systems
Info2 sec 5_-_protecting_ict_systemsInfo2 sec 5_-_protecting_ict_systems
Info2 sec 5_-_protecting_ict_systemssaltashict
 
ITBIS105 3
ITBIS105 3ITBIS105 3
ITBIS105 3Suad 00
 
One - Social & Ethical Issues
One - Social & Ethical IssuesOne - Social & Ethical Issues
One - Social & Ethical IssuesMISY
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethicsiallen
 
3999779.ppt
3999779.ppt3999779.ppt
3999779.pptpixvilx
 
Cat21:Development Mangement Information Systems
Cat21:Development Mangement Information SystemsCat21:Development Mangement Information Systems
Cat21:Development Mangement Information SystemsSimeon Ogao
 
Security And Ethical Challenges
Security And  Ethical  ChallengesSecurity And  Ethical  Challenges
Security And Ethical ChallengesRam Dutt Shukla
 
Lecture-3.ppt
Lecture-3.pptLecture-3.ppt
Lecture-3.pptKaty Kate
 
Ict form 4 chapter 1(answer)
Ict form 4 chapter 1(answer)Ict form 4 chapter 1(answer)
Ict form 4 chapter 1(answer)smkengkilili2011
 
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...Dr. Khaled Bakro
 

Similar to Understand Ethics and Security in the Programming Process (20)

TAMUC LO 7
TAMUC LO 7TAMUC LO 7
TAMUC LO 7
 
Security And Ethical Challenges Of Infornation Technology
Security And Ethical Challenges Of Infornation TechnologySecurity And Ethical Challenges Of Infornation Technology
Security And Ethical Challenges Of Infornation Technology
 
Computer ethics cyber security and technology of it
Computer ethics cyber security and technology of itComputer ethics cyber security and technology of it
Computer ethics cyber security and technology of it
 
Business ethics ppt
Business ethics pptBusiness ethics ppt
Business ethics ppt
 
Ppt lesson 17
Ppt lesson 17Ppt lesson 17
Ppt lesson 17
 
SHAILENDRA.ppt
SHAILENDRA.pptSHAILENDRA.ppt
SHAILENDRA.ppt
 
VTU - MIS Module 8 - Security and Ethical Challenges
VTU - MIS Module 8 -  Security and Ethical ChallengesVTU - MIS Module 8 -  Security and Ethical Challenges
VTU - MIS Module 8 - Security and Ethical Challenges
 
IT Security for the Physical Security Professional
IT Security for the Physical Security ProfessionalIT Security for the Physical Security Professional
IT Security for the Physical Security Professional
 
Info2 sec 5_-_protecting_ict_systems
Info2 sec 5_-_protecting_ict_systemsInfo2 sec 5_-_protecting_ict_systems
Info2 sec 5_-_protecting_ict_systems
 
IT-Presentation.pptx
IT-Presentation.pptxIT-Presentation.pptx
IT-Presentation.pptx
 
Chapter 1.ppt
Chapter 1.pptChapter 1.ppt
Chapter 1.ppt
 
ITBIS105 3
ITBIS105 3ITBIS105 3
ITBIS105 3
 
One - Social & Ethical Issues
One - Social & Ethical IssuesOne - Social & Ethical Issues
One - Social & Ethical Issues
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
3999779.ppt
3999779.ppt3999779.ppt
3999779.ppt
 
Cat21:Development Mangement Information Systems
Cat21:Development Mangement Information SystemsCat21:Development Mangement Information Systems
Cat21:Development Mangement Information Systems
 
Security And Ethical Challenges
Security And  Ethical  ChallengesSecurity And  Ethical  Challenges
Security And Ethical Challenges
 
Lecture-3.ppt
Lecture-3.pptLecture-3.ppt
Lecture-3.ppt
 
Ict form 4 chapter 1(answer)
Ict form 4 chapter 1(answer)Ict form 4 chapter 1(answer)
Ict form 4 chapter 1(answer)
 
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...
 

More from Casey Robertson

Introduction to Typography
Introduction to TypographyIntroduction to Typography
Introduction to TypographyCasey Robertson
 
Concerns with Technology
Concerns with TechnologyConcerns with Technology
Concerns with TechnologyCasey Robertson
 
Production and Manufacturing Planning
Production and Manufacturing PlanningProduction and Manufacturing Planning
Production and Manufacturing PlanningCasey Robertson
 
Types of Production and Manufacturing
Types of Production and ManufacturingTypes of Production and Manufacturing
Types of Production and ManufacturingCasey Robertson
 
Human Resource Management
Human Resource ManagementHuman Resource Management
Human Resource ManagementCasey Robertson
 
Introduction to Layouts in Graphic Design
Introduction to Layouts in Graphic DesignIntroduction to Layouts in Graphic Design
Introduction to Layouts in Graphic DesignCasey Robertson
 
Features in Graphic and Publication Design
Features in Graphic and Publication DesignFeatures in Graphic and Publication Design
Features in Graphic and Publication DesignCasey Robertson
 
Five Types of Partners in a Business Partnership
Five Types of Partners in a Business PartnershipFive Types of Partners in a Business Partnership
Five Types of Partners in a Business PartnershipCasey Robertson
 
Forms of Business Organization
Forms of Business OrganizationForms of Business Organization
Forms of Business OrganizationCasey Robertson
 
Factors and Regulations for the Global Economy
Factors and Regulations for the Global EconomyFactors and Regulations for the Global Economy
Factors and Regulations for the Global EconomyCasey Robertson
 
Classification of Economic Conditions
Classification of Economic ConditionsClassification of Economic Conditions
Classification of Economic ConditionsCasey Robertson
 
The Systems Approach to Design
The Systems Approach to DesignThe Systems Approach to Design
The Systems Approach to DesignCasey Robertson
 
Measuring Economic Activity
Measuring Economic ActivityMeasuring Economic Activity
Measuring Economic ActivityCasey Robertson
 
Understanding Economic Systems - Supply and Demand
Understanding Economic Systems - Supply and DemandUnderstanding Economic Systems - Supply and Demand
Understanding Economic Systems - Supply and DemandCasey Robertson
 

More from Casey Robertson (20)

Workplace Hazards
Workplace HazardsWorkplace Hazards
Workplace Hazards
 
Introduction to Typography
Introduction to TypographyIntroduction to Typography
Introduction to Typography
 
Concerns with Technology
Concerns with TechnologyConcerns with Technology
Concerns with Technology
 
Technology In Business
Technology In BusinessTechnology In Business
Technology In Business
 
Business Operations
Business OperationsBusiness Operations
Business Operations
 
Production and Manufacturing Planning
Production and Manufacturing PlanningProduction and Manufacturing Planning
Production and Manufacturing Planning
 
Types of Production and Manufacturing
Types of Production and ManufacturingTypes of Production and Manufacturing
Types of Production and Manufacturing
 
Levels of Management
Levels of ManagementLevels of Management
Levels of Management
 
Human Resource Management
Human Resource ManagementHuman Resource Management
Human Resource Management
 
Introduction to Layouts in Graphic Design
Introduction to Layouts in Graphic DesignIntroduction to Layouts in Graphic Design
Introduction to Layouts in Graphic Design
 
Features in Graphic and Publication Design
Features in Graphic and Publication DesignFeatures in Graphic and Publication Design
Features in Graphic and Publication Design
 
Types of Leadership
Types of LeadershipTypes of Leadership
Types of Leadership
 
Principals of Managment
Principals of ManagmentPrincipals of Managment
Principals of Managment
 
Five Types of Partners in a Business Partnership
Five Types of Partners in a Business PartnershipFive Types of Partners in a Business Partnership
Five Types of Partners in a Business Partnership
 
Forms of Business Organization
Forms of Business OrganizationForms of Business Organization
Forms of Business Organization
 
Factors and Regulations for the Global Economy
Factors and Regulations for the Global EconomyFactors and Regulations for the Global Economy
Factors and Regulations for the Global Economy
 
Classification of Economic Conditions
Classification of Economic ConditionsClassification of Economic Conditions
Classification of Economic Conditions
 
The Systems Approach to Design
The Systems Approach to DesignThe Systems Approach to Design
The Systems Approach to Design
 
Measuring Economic Activity
Measuring Economic ActivityMeasuring Economic Activity
Measuring Economic Activity
 
Understanding Economic Systems - Supply and Demand
Understanding Economic Systems - Supply and DemandUnderstanding Economic Systems - Supply and Demand
Understanding Economic Systems - Supply and Demand
 

Recently uploaded

Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxJisc
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Pooja Bhuva
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfDr Vijay Vishwakarma
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentationcamerronhm
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17Celine George
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxDr. Ravikiran H M Gowda
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfSherif Taha
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibitjbellavia9
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structuredhanjurrannsibayan2
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Association for Project Management
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Pooja Bhuva
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfNirmal Dwivedi
 

Recently uploaded (20)

Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 

Understand Ethics and Security in the Programming Process