SlideShare ist ein Scribd-Unternehmen logo
1 von 15
Downloaden Sie, um offline zu lesen
Info Tech

Training
Computer
 Ethics
What is
Computer
 Ethics?
COMPUTER
                        ETHICS



   It refers to good manners and right
    It refers to good manners and right
 conduct or behavior that computer users
 conduct or behavior that computer users
   must observe and follow when using
   must observe and follow when using
                 computers.
                  computers.
IT Training Module 1     COMPUTER ETHICS   4
The Ten
                       Commandments
                       Commandments
                        of Computer
                           Ethics
                            by: Dr. Ramon C. Barquin



IT Training Module 1     COMPUTER ETHICS               5
1st Commandment
   Thou shall not use a computer
   Thou shall not use a computer
       to harm other people.
        to harm other people.




IT Training Module 1   COMPUTER ETHICS   6
2nd Commandment
    Thou shall not interfere with
    Thou shall not interfere with
  other people’s computer work.
   other people’s computer work.




IT Training Module 1   COMPUTER ETHICS   7
3rd Commandment
   Thou shall not snoop around in
   Thou shall not snoop around in
        other people’s files.
        other people’s files.




IT Training Module 1   COMPUTER ETHICS   8
4th Commandment
     Thou shall not use a computer
     Thou shall not use a computer
                to steal.
                to steal.




IT Training Module 1   COMPUTER ETHICS   9
5th Commandment
  Thou shall not use a computer
   Thou shall not use a computer
       to bear false witness.
       to bear false witness.




IT Training Module 1   COMPUTER ETHICS   10
6th Commandment




       Thou shall not copy or use
       Thou shall not copy or use
   licensed software for which you
    licensed software for which you
            have not paid.
             have not paid.
IT Training Module 1   COMPUTER ETHICS   11
7th Commandment




      Thou shall not use other people’s
      Thou shall not use other people’s
        computer resources without
        computer resources without
          authorization or proper
           authorization or proper
              compensation.
               compensation.
IT Training Module 1   COMPUTER ETHICS   12
8th Commandment




      Thou shall not use other
       Thou shall not use other
    people’s computer intellectual
    people’s computer intellectual
               output.
               output.
IT Training Module 1   COMPUTER ETHICS   13
9th Commandment

                            Thou shall think
                            Thou shall think
                            about the social
                             about the social
                         consequences of the
                          consequences of the
                         program you write or
                          program you write or
                         the computer system
                          the computer system
                               you design.
                               you design.


IT Training Module 1   COMPUTER ETHICS      14
10th Commandment




         Thou shall use a computer in
         Thou shall use a computer in
         ways that show consideration
         ways that show consideration
          and respect for your fellow
          and respect for your fellow
                   humans.
                    humans.
IT Training Module 1   COMPUTER ETHICS   15

Weitere ähnliche Inhalte

Was ist angesagt?

Ict 9 module 4, lesson 1.3 diagnosing computer systems
Ict 9 module 4, lesson 1.3 diagnosing computer systemsIct 9 module 4, lesson 1.3 diagnosing computer systems
Ict 9 module 4, lesson 1.3 diagnosing computer systemsYonel Cadapan
 
TLE10_ICT_CSS_Q1_M3_v3.docx
TLE10_ICT_CSS_Q1_M3_v3.docxTLE10_ICT_CSS_Q1_M3_v3.docx
TLE10_ICT_CSS_Q1_M3_v3.docxXyrevManeclang
 
Computer system servicing
Computer system servicingComputer system servicing
Computer system servicingLindyl Geral
 
CSS L03 - Mensuration and Calculation in CSS
CSS L03 - Mensuration and Calculation in CSSCSS L03 - Mensuration and Calculation in CSS
CSS L03 - Mensuration and Calculation in CSSMarvin Bronoso
 
Computer system, devices and peripherals
Computer system, devices and peripheralsComputer system, devices and peripherals
Computer system, devices and peripheralsRojen Sabile
 
CSS L16 - IP ADDRESSING
CSS L16 - IP ADDRESSINGCSS L16 - IP ADDRESSING
CSS L16 - IP ADDRESSINGMarvin Bronoso
 
Grade 11_Q1_W5-6_3.b_PerformMensuration_for Student.pdf
Grade 11_Q1_W5-6_3.b_PerformMensuration_for Student.pdfGrade 11_Q1_W5-6_3.b_PerformMensuration_for Student.pdf
Grade 11_Q1_W5-6_3.b_PerformMensuration_for Student.pdfsherelynbalada1
 
Computer safety
Computer safetyComputer safety
Computer safetyahentz
 
ICT Orientation (CSS)
ICT Orientation (CSS)ICT Orientation (CSS)
ICT Orientation (CSS)Ydel Capales
 
1 1st meeting for computer system servicing nc ii
1 1st meeting for computer system servicing nc ii1 1st meeting for computer system servicing nc ii
1 1st meeting for computer system servicing nc iiMarilou Jamero
 
Rules of netiquette
Rules of netiquetteRules of netiquette
Rules of netiquetteklknight79
 
381091947 introduction-computer-systems-servicing-nc-ii
381091947 introduction-computer-systems-servicing-nc-ii381091947 introduction-computer-systems-servicing-nc-ii
381091947 introduction-computer-systems-servicing-nc-iihantos_cute
 
K-12 Teacher's Guide on Computer Hardware Servicing
K-12 Teacher's Guide on Computer Hardware ServicingK-12 Teacher's Guide on Computer Hardware Servicing
K-12 Teacher's Guide on Computer Hardware ServicingRenz Cuaresma
 

Was ist angesagt? (20)

Ict 9 module 4, lesson 1.3 diagnosing computer systems
Ict 9 module 4, lesson 1.3 diagnosing computer systemsIct 9 module 4, lesson 1.3 diagnosing computer systems
Ict 9 module 4, lesson 1.3 diagnosing computer systems
 
Computer Fundamentals
Computer FundamentalsComputer Fundamentals
Computer Fundamentals
 
TLE10_ICT_CSS_Q1_M3_v3.docx
TLE10_ICT_CSS_Q1_M3_v3.docxTLE10_ICT_CSS_Q1_M3_v3.docx
TLE10_ICT_CSS_Q1_M3_v3.docx
 
Computer system servicing
Computer system servicingComputer system servicing
Computer system servicing
 
CSS L03 - Mensuration and Calculation in CSS
CSS L03 - Mensuration and Calculation in CSSCSS L03 - Mensuration and Calculation in CSS
CSS L03 - Mensuration and Calculation in CSS
 
Netiquette
NetiquetteNetiquette
Netiquette
 
Computer system, devices and peripherals
Computer system, devices and peripheralsComputer system, devices and peripherals
Computer system, devices and peripherals
 
CSS L16 - IP ADDRESSING
CSS L16 - IP ADDRESSINGCSS L16 - IP ADDRESSING
CSS L16 - IP ADDRESSING
 
Grade 11_Q1_W5-6_3.b_PerformMensuration_for Student.pdf
Grade 11_Q1_W5-6_3.b_PerformMensuration_for Student.pdfGrade 11_Q1_W5-6_3.b_PerformMensuration_for Student.pdf
Grade 11_Q1_W5-6_3.b_PerformMensuration_for Student.pdf
 
Computer safety
Computer safetyComputer safety
Computer safety
 
ICT Orientation (CSS)
ICT Orientation (CSS)ICT Orientation (CSS)
ICT Orientation (CSS)
 
1 1st meeting for computer system servicing nc ii
1 1st meeting for computer system servicing nc ii1 1st meeting for computer system servicing nc ii
1 1st meeting for computer system servicing nc ii
 
Introduction of ICT
Introduction of ICTIntroduction of ICT
Introduction of ICT
 
Rules of netiquette
Rules of netiquetteRules of netiquette
Rules of netiquette
 
Gr. 1 peopleware - 3
Gr. 1 peopleware - 3Gr. 1 peopleware - 3
Gr. 1 peopleware - 3
 
Capabilities and limitations of computer
Capabilities and limitations of computerCapabilities and limitations of computer
Capabilities and limitations of computer
 
Word Lesson 1: Word Basics
Word Lesson 1: Word BasicsWord Lesson 1: Word Basics
Word Lesson 1: Word Basics
 
381091947 introduction-computer-systems-servicing-nc-ii
381091947 introduction-computer-systems-servicing-nc-ii381091947 introduction-computer-systems-servicing-nc-ii
381091947 introduction-computer-systems-servicing-nc-ii
 
Netiquette
NetiquetteNetiquette
Netiquette
 
K-12 Teacher's Guide on Computer Hardware Servicing
K-12 Teacher's Guide on Computer Hardware ServicingK-12 Teacher's Guide on Computer Hardware Servicing
K-12 Teacher's Guide on Computer Hardware Servicing
 

Andere mochten auch

10 commandments of computer ethics with example
10 commandments of computer ethics with example10 commandments of computer ethics with example
10 commandments of computer ethics with exampleMhia Maravilla
 
Manners – computer etiquetteamg
Manners – computer etiquetteamgManners – computer etiquetteamg
Manners – computer etiquetteamgsjytech
 
Presentation skills workshop
Presentation skills workshopPresentation skills workshop
Presentation skills workshopJames Prince
 
Ten commandments
Ten commandmentsTen commandments
Ten commandmentslsanford84
 
10 Rules of Netiquette
10 Rules of Netiquette10 Rules of Netiquette
10 Rules of NetiquetteSakuta Riwsie
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentationkatespeach
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentationguest65a1c4
 
Computer ethics
Computer ethicsComputer ethics
Computer ethicsJagan Nath
 
The 10 Commandments of Computer Ethics
The 10 Commandments of Computer EthicsThe 10 Commandments of Computer Ethics
The 10 Commandments of Computer Ethicssmartinson
 

Andere mochten auch (10)

10 commandments of computer ethics with example
10 commandments of computer ethics with example10 commandments of computer ethics with example
10 commandments of computer ethics with example
 
Manners – computer etiquetteamg
Manners – computer etiquetteamgManners – computer etiquetteamg
Manners – computer etiquetteamg
 
Presentation skills workshop
Presentation skills workshopPresentation skills workshop
Presentation skills workshop
 
Ten commandments
Ten commandmentsTen commandments
Ten commandments
 
10 Rules of Netiquette
10 Rules of Netiquette10 Rules of Netiquette
10 Rules of Netiquette
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentation
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentation
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
The 10 Commandments of Computer Ethics
The 10 Commandments of Computer EthicsThe 10 Commandments of Computer Ethics
The 10 Commandments of Computer Ethics
 

Ähnlich wie 3 Rd Computer Ethics

the lesson about the information and communication to technology
the lesson about the information and communication to technologythe lesson about the information and communication to technology
the lesson about the information and communication to technologylcnemedez
 
Super billing computers are your future
Super billing computers are your futureSuper billing computers are your future
Super billing computers are your futuresuperb11b
 
etiquettes-grade 7.pptx
etiquettes-grade 7.pptxetiquettes-grade 7.pptx
etiquettes-grade 7.pptxCynnePataweg
 
Computer Ethics and Content Marketing Platforms
Computer Ethics and Content Marketing PlatformsComputer Ethics and Content Marketing Platforms
Computer Ethics and Content Marketing PlatformsAmplephi
 
Identify ethical use of computers
Identify ethical use of computersIdentify ethical use of computers
Identify ethical use of computersAl Forte
 
Ethics And Pc Troubleshooting
Ethics And Pc TroubleshootingEthics And Pc Troubleshooting
Ethics And Pc Troubleshootingswiatekj
 
Ethics in using computer
Ethics in using computerEthics in using computer
Ethics in using computerFatin Izzaty
 
computer ethics
computer ethicscomputer ethics
computer ethicsHoney jose
 
Presentation computer ethics
Presentation computer ethicsPresentation computer ethics
Presentation computer ethicsYuyul Yieyien
 
A Trip to ICT and Society Series 1 : The Ten Commandments of the Internet
A Trip to ICT and Society Series 1 : The Ten Commandments of the InternetA Trip to ICT and Society Series 1 : The Ten Commandments of the Internet
A Trip to ICT and Society Series 1 : The Ten Commandments of the Internetianpoblete13
 
Ethics in using computer
Ethics in using computerEthics in using computer
Ethics in using computeribrahimtbl3147
 
Lesson 5 may 4
Lesson 5 may 4Lesson 5 may 4
Lesson 5 may 4Max Friel
 
Lesson 1. Computer ethics and safety.pptx
Lesson 1. Computer ethics and safety.pptxLesson 1. Computer ethics and safety.pptx
Lesson 1. Computer ethics and safety.pptxCherryLim21
 
qwe.pptx
qwe.pptxqwe.pptx
qwe.pptxjeba50
 

Ähnlich wie 3 Rd Computer Ethics (20)

the lesson about the information and communication to technology
the lesson about the information and communication to technologythe lesson about the information and communication to technology
the lesson about the information and communication to technology
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Super billing computers are your future
Super billing computers are your futureSuper billing computers are your future
Super billing computers are your future
 
etiquettes-grade 7.pptx
etiquettes-grade 7.pptxetiquettes-grade 7.pptx
etiquettes-grade 7.pptx
 
Computer Ethics and Content Marketing Platforms
Computer Ethics and Content Marketing PlatformsComputer Ethics and Content Marketing Platforms
Computer Ethics and Content Marketing Platforms
 
Identify ethical use of computers
Identify ethical use of computersIdentify ethical use of computers
Identify ethical use of computers
 
Ethics in computing
Ethics in computingEthics in computing
Ethics in computing
 
Ethics And Pc Troubleshooting
Ethics And Pc TroubleshootingEthics And Pc Troubleshooting
Ethics And Pc Troubleshooting
 
Ethics in using computer
Ethics in using computerEthics in using computer
Ethics in using computer
 
computer ethics
computer ethicscomputer ethics
computer ethics
 
Presentation computer ethics
Presentation computer ethicsPresentation computer ethics
Presentation computer ethics
 
A Trip to ICT and Society Series 1 : The Ten Commandments of the Internet
A Trip to ICT and Society Series 1 : The Ten Commandments of the InternetA Trip to ICT and Society Series 1 : The Ten Commandments of the Internet
A Trip to ICT and Society Series 1 : The Ten Commandments of the Internet
 
Ethics in using computer
Ethics in using computerEthics in using computer
Ethics in using computer
 
Lesson 5 may 4
Lesson 5 may 4Lesson 5 may 4
Lesson 5 may 4
 
Nfwordle
NfwordleNfwordle
Nfwordle
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
COMPUTER APPLICATIONS Module 5.pptx
COMPUTER APPLICATIONS Module 5.pptxCOMPUTER APPLICATIONS Module 5.pptx
COMPUTER APPLICATIONS Module 5.pptx
 
Lesson 1. Computer ethics and safety.pptx
Lesson 1. Computer ethics and safety.pptxLesson 1. Computer ethics and safety.pptx
Lesson 1. Computer ethics and safety.pptx
 
qwe.pptx
qwe.pptxqwe.pptx
qwe.pptx
 
Netiquette
NetiquetteNetiquette
Netiquette
 

Mehr von ERIC M. DE GUZMAN (13)

slope of a line
slope of a lineslope of a line
slope of a line
 
A father’s day presentation
A father’s day presentationA father’s day presentation
A father’s day presentation
 
I Have Fallen Inlove 3 X
I Have Fallen Inlove 3 XI Have Fallen Inlove 3 X
I Have Fallen Inlove 3 X
 
Optical Illusion 2
Optical Illusion 2Optical Illusion 2
Optical Illusion 2
 
Opening Prayer
Opening PrayerOpening Prayer
Opening Prayer
 
Brain Teaser
Brain  TeaserBrain  Teaser
Brain Teaser
 
Dream Occupation
Dream OccupationDream Occupation
Dream Occupation
 
Sikretongbuhay
SikretongbuhaySikretongbuhay
Sikretongbuhay
 
Illusions
IllusionsIllusions
Illusions
 
Zoo Caravan Prayer
Zoo Caravan PrayerZoo Caravan Prayer
Zoo Caravan Prayer
 
History Of Publishing
History Of PublishingHistory Of Publishing
History Of Publishing
 
I Can...And I Cannot(Edit)
I Can...And I Cannot(Edit)I Can...And I Cannot(Edit)
I Can...And I Cannot(Edit)
 
Butterfly
ButterflyButterfly
Butterfly
 

Kürzlich hochgeladen

Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Principled Technologies
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024SynarionITSolutions
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 

Kürzlich hochgeladen (20)

Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 

3 Rd Computer Ethics

  • 4. COMPUTER ETHICS It refers to good manners and right It refers to good manners and right conduct or behavior that computer users conduct or behavior that computer users must observe and follow when using must observe and follow when using computers. computers. IT Training Module 1 COMPUTER ETHICS 4
  • 5. The Ten Commandments Commandments of Computer Ethics by: Dr. Ramon C. Barquin IT Training Module 1 COMPUTER ETHICS 5
  • 6. 1st Commandment Thou shall not use a computer Thou shall not use a computer to harm other people. to harm other people. IT Training Module 1 COMPUTER ETHICS 6
  • 7. 2nd Commandment Thou shall not interfere with Thou shall not interfere with other people’s computer work. other people’s computer work. IT Training Module 1 COMPUTER ETHICS 7
  • 8. 3rd Commandment Thou shall not snoop around in Thou shall not snoop around in other people’s files. other people’s files. IT Training Module 1 COMPUTER ETHICS 8
  • 9. 4th Commandment Thou shall not use a computer Thou shall not use a computer to steal. to steal. IT Training Module 1 COMPUTER ETHICS 9
  • 10. 5th Commandment Thou shall not use a computer Thou shall not use a computer to bear false witness. to bear false witness. IT Training Module 1 COMPUTER ETHICS 10
  • 11. 6th Commandment Thou shall not copy or use Thou shall not copy or use licensed software for which you licensed software for which you have not paid. have not paid. IT Training Module 1 COMPUTER ETHICS 11
  • 12. 7th Commandment Thou shall not use other people’s Thou shall not use other people’s computer resources without computer resources without authorization or proper authorization or proper compensation. compensation. IT Training Module 1 COMPUTER ETHICS 12
  • 13. 8th Commandment Thou shall not use other Thou shall not use other people’s computer intellectual people’s computer intellectual output. output. IT Training Module 1 COMPUTER ETHICS 13
  • 14. 9th Commandment Thou shall think Thou shall think about the social about the social consequences of the consequences of the program you write or program you write or the computer system the computer system you design. you design. IT Training Module 1 COMPUTER ETHICS 14
  • 15. 10th Commandment Thou shall use a computer in Thou shall use a computer in ways that show consideration ways that show consideration and respect for your fellow and respect for your fellow humans. humans. IT Training Module 1 COMPUTER ETHICS 15