SlideShare ist ein Scribd-Unternehmen logo
1 von 35
Computer Ethics
What does Ethics mean?
Computer Ethics
What does Ethics mean?
Ethics can be defined as either principles,moral
belief or moral values
The ten commandments of
computer ethics

There are 10 commandments we must follow
when working with computers
Commandment 1

Thou shalt not use a computer to ____ other
people.
a) Educate
b) Harm
c) Provoke
Commandment 1

Thou shalt not use a computer to ____ other
people.
b) Harm
Commandment 1
It is unethical to use a
computer to harm
another user such as
corrupting their data
files or stealing
personal information.
Commandment 2

Thou shalt not ______ with other people's
computer work.
a) copy
b) borrow
c) interfere
Commandment 2

Thou shalt not ______ with other people's
computer work.
c) interfere
Commandment 2
It is unethical to create
viruses as these can
damage the data of
users or make the
hardware perform
slower
Commandment 3

Thou shalt not _____ around in other people's
files.
a) dance
b) Snoop
c) share
Commandment 3

Thou shalt not _____ around in other people's
files.
b) Snoop
Commandment 3

It is unethical to read
someone's email
messages or having
unauthorised access
to someone's
computer to obtain
files or data as it is a
direct invasion of
their privacy.
Commandment 4

Thou shalt not use a computer to ____.
a) steal
b) cook
c) download
Commandment 4

Thou shalt not use a computer to ____.
a) steal
b) cook
c) download
Commandment 4

Thou shalt not use a computer to ____.
a) steal
Commandment 4
Stealing sensitive
information such as
personal information
about employees or
breaking into bank
accounts is treated
as robbery in some
countries. This can
be classed as fraud.
Commandment 5

Thou shalt not use a computer to bear false
_______.
a) Information
b) stories
c) witness
Commandment 5

Thou shalt not use a computer to bear false
_______.
c) witness
Commandment 5
It is unethical to spread rumours or false
information about people/incidents/historical
events on the internet.
Commandment 6

Thou shalt not use or copy _____ for which
you have not paid for.
a)Software
b) Hardware
c) Operating System
Commandment 6

Thou shalt not use or copy _____ for which
you have not paid for.
a)Software
Commandment 6
Software is protected under copyright laws
which means it is unethical to use if it has not
been purchased.
Commandment 7

Thou shalt not use other people's computer
resources without ________.
a) Authorisation
b) Acknowledgement
c) Money
Commandment 7

Thou shalt not use other people's computer
resources without ________.
a) Authorisation
Commandment 7
Important
information on a
network can be
accessed with
specific Ids and
passwords. It is
unethical to hack
into password
protected
systems.
Another extreme example
Commandment 8

Thou shalt not appropriate other people's
_______ output.
a) Online
b) Intellectual
c) Digital
Commandment 8

Thou shalt not appropriate other people's
_______ output.
b) Intellectual
Commandment 8
Pretending someone's
work is your own is
considered unethical
and is known as
plagiarism. You
should always get
permission from
artist and give credit.
Commandment 9

Thou shalt think about the _____
consequences of the program you write.
a) fantastic
b) social
c) negative
Commandment 9

Thou shalt think about the _____
consequences of the program you write.
b) social
Commandment 9
When designing
software or a
computer system, we
must consider it's
affect on certain
sections of society so
it doesn't not offend
anyone.
Commandment 10

Thou shalt use a computer in ways that show
consideration and _____.
a)honour
b) mercy
c) respect
Commandment 10

Thou shalt use a computer in ways that show
consideration and _____.
c) respect
Commandment 10

It is considered
ethical to show
respect when online
and when socialising
through the internet
as well.

Weitere ähnliche Inhalte

Andere mochten auch

Keywords used in javascript
Keywords used in javascriptKeywords used in javascript
Keywords used in javascript
Max Friel
 
Web design save earth
Web design save earthWeb design save earth
Web design save earth
Max Friel
 
Summer course
Summer courseSummer course
Summer course
Max Friel
 
Lesson plan 2 matt 3
Lesson plan 2 matt 3Lesson plan 2 matt 3
Lesson plan 2 matt 3
Max Friel
 
Group web design
Group web designGroup web design
Group web design
Max Friel
 
Creating a program from flowchart
Creating a program from flowchartCreating a program from flowchart
Creating a program from flowchart
Max Friel
 
Errors in coding
Errors in codingErrors in coding
Errors in coding
Max Friel
 

Andere mochten auch (10)

Keywords used in javascript
Keywords used in javascriptKeywords used in javascript
Keywords used in javascript
 
Web design save earth
Web design save earthWeb design save earth
Web design save earth
 
Summer course
Summer courseSummer course
Summer course
 
Lesson plan 2 matt 3
Lesson plan 2 matt 3Lesson plan 2 matt 3
Lesson plan 2 matt 3
 
Group web design
Group web designGroup web design
Group web design
 
Basics
BasicsBasics
Basics
 
Creating a program from flowchart
Creating a program from flowchartCreating a program from flowchart
Creating a program from flowchart
 
Code
CodeCode
Code
 
Errors in coding
Errors in codingErrors in coding
Errors in coding
 
Untitled 1
Untitled 1Untitled 1
Untitled 1
 

Ähnlich wie Lesson 5 may 4

the lesson about the information and communication to technology
the lesson about the information and communication to technologythe lesson about the information and communication to technology
the lesson about the information and communication to technology
lcnemedez
 
Ten commandments
Ten commandmentsTen commandments
Ten commandments
lsanford84
 
Computer Ethics and Content Marketing Platforms
Computer Ethics and Content Marketing PlatformsComputer Ethics and Content Marketing Platforms
Computer Ethics and Content Marketing Platforms
Amplephi
 
Computer safety
Computer safetyComputer safety
Computer safety
ahentz
 

Ähnlich wie Lesson 5 may 4 (20)

Cybersecurity.pptx
Cybersecurity.pptxCybersecurity.pptx
Cybersecurity.pptx
 
the lesson about the information and communication to technology
the lesson about the information and communication to technologythe lesson about the information and communication to technology
the lesson about the information and communication to technology
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
etiquettes-grade 7.pptx
etiquettes-grade 7.pptxetiquettes-grade 7.pptx
etiquettes-grade 7.pptx
 
3 Rd Computer Ethics
3 Rd Computer Ethics3 Rd Computer Ethics
3 Rd Computer Ethics
 
Ten commandments
Ten commandmentsTen commandments
Ten commandments
 
Ethics in computing
Ethics in computingEthics in computing
Ethics in computing
 
computer ethics.pptx
computer ethics.pptxcomputer ethics.pptx
computer ethics.pptx
 
Computer security
Computer securityComputer security
Computer security
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
The 10 Commandments of Computer Ethics
The 10 Commandments of Computer EthicsThe 10 Commandments of Computer Ethics
The 10 Commandments of Computer Ethics
 
Computer Ethics and Content Marketing Platforms
Computer Ethics and Content Marketing PlatformsComputer Ethics and Content Marketing Platforms
Computer Ethics and Content Marketing Platforms
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Ethical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its ProspectsEthical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its Prospects
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Computer safety
Computer safetyComputer safety
Computer safety
 
Ethics in using computer
Ethics in using computerEthics in using computer
Ethics in using computer
 
shubhangi.pptx
shubhangi.pptxshubhangi.pptx
shubhangi.pptx
 
Chapter 4_Information, Control, and Privacy.pptx
Chapter 4_Information, Control, and Privacy.pptxChapter 4_Information, Control, and Privacy.pptx
Chapter 4_Information, Control, and Privacy.pptx
 
Identify ethical use of computers
Identify ethical use of computersIdentify ethical use of computers
Identify ethical use of computers
 

Mehr von Max Friel (20)

Assum 4
Assum 4Assum 4
Assum 4
 
Tourism
TourismTourism
Tourism
 
Project 1
Project 1Project 1
Project 1
 
Practice and debugging
Practice and debuggingPractice and debugging
Practice and debugging
 
Debugging
DebuggingDebugging
Debugging
 
Strings
StringsStrings
Strings
 
Loops
LoopsLoops
Loops
 
Loops
LoopsLoops
Loops
 
If conditions
If conditionsIf conditions
If conditions
 
Variables
VariablesVariables
Variables
 
Developing html skills 1
Developing html skills 1Developing html skills 1
Developing html skills 1
 
Matching game
Matching gameMatching game
Matching game
 
activity flowcharts
activity flowchartsactivity flowcharts
activity flowcharts
 
Lesson one
Lesson oneLesson one
Lesson one
 
Law
LawLaw
Law
 
Phishing
PhishingPhishing
Phishing
 
Tourism in bangkok
Tourism in bangkokTourism in bangkok
Tourism in bangkok
 
Untitled 2
Untitled 2Untitled 2
Untitled 2
 
Refresher
RefresherRefresher
Refresher
 
Refresher
RefresherRefresher
Refresher
 

Kürzlich hochgeladen

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 

Kürzlich hochgeladen (20)

Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 

Lesson 5 may 4