3. MISSION “The University shall serve a center of excellence in agriculture, fisheries, forestry, science, engineering and industrial technology, teacher education, information technology and other related fields in arts and sciences. It also serves as research and extension services centers in its fields of expertise.”
4. VISION “A premier university in CALABARZON, offering academic programs and related services designed to respond to the requirements of the Philippines and the global economy particularly Asian countries”
7. What is a Computer Ethics: …………..Computer Ethics is a branch of practical philosophy which deals with how computing professionals should make decisions regarding professional and social conduct..
8. Introduction: A computer system consists not only of software , hardware, data/information and procedures, but also people (the users of computer system). Because computers systems are the products of human efforts, we cannot trust them anymore than we trust people. People can use computer systems for both good and bad purposes, and they may appreciate them or be suspicious of them when they use them.
9. …..…….But regardless of how they use them or how they feel about them, most people realize that computers have changed the way we live.
10.
11. What are the consequences of the widespread presence of the computer technology??
13. Introduction: Information technology can be disabled by a number of occurrences. It may be harmed by people, procedural, and software errors; by electromechanical problems; and by “dirty data”. It may be threatened by natural hazards and by civil strife and terrorism. Criminal acts perpetrated against computers include theft of hardware, software, time and services, and information; and crimes of malice and destruction…
14. ….Computers may be harmed by viruses. Computers can also be used as instruments of crime. Criminals may be employees, outside users, hackers, crackers, and professional criminals…
17. The threats to computers and communications systems… Errors and Accidents Natural and Other Hazards Crimes Against Information Technology Crimes Using Information Technology Virus
19. …….In general, errors and accidents in computer systems may be classified as People Errors, Procedural Errors, Software Errors, Electromechanical Problems, and “Dirty Data” problems….
20. People Errors Recall that one part of computer system is the people who manage it or run it…
21. Procedural Errors Some spectacular computer failures have occurred because someone didn’t follow procedures..
22. Software Errors We are forever hearing about “Software Glitches” or software bugs. A Software Bug is an error in a program that causes it to malfunction..
26. Natural Hazards What ever is harmful to property and to people, is harmful to computers and communication system. This certainly includes natural disasters… ………Natural Hazards can disable all the electronic systems we take for granted…
29. Information-technology Crime can be of two types: Illegal act perpetrated against computers or telecommunications.. Use of computers or telecommunications to accomplish an illegal act..
30. Crimes against information technology include theft…. Theft of Hardware Theft of Software Theft of Time and Services Theft of Information Theft of Malice and Destruction
31. Crimes Using Computers and Communications…… Computers and communications or information technology has also been used to solve crimes…. ……..Just as a car can be used to assist in a crime, so can a computer or communication system..
33. Viruses Viruses are a form of high-tech maliciousness. Computer Viruses are “Deviant” programs that can cause destruction to computers that contract them…
34. They are passed in two ways……. Via an Infected Diskette Via a Network
35. Some common forms of Viruses… Boot-sector Virus File Virus Worm Logic Bomb Trojan Horse Polymorphic Virus Virus Mutation Engines
36.
37. Antivirus Software Scans a computer’s hard disk, diskettes, and main memory to detect viruses, and sometimes, to destroythem…..