SlideShare une entreprise Scribd logo
1  sur  4
 Be Responsible- Protect the computer you
are using.
 Be Smart- Report immediately to your
teacher any hardware and software trouble
for proper diagnosis and repair.
 Be Courteous- Ask permission from the
teacher or the regularly assigned user
before using the computer unit.
 Be Conscious of Cleanliness and Orderliness-
Clean the computer and tables regularly to
keep them free from dust.
 Be Considerate-Avoid placing cellphones and
speakers beside the computer monitors.
 Be Cautious- Avoid using diskettes or other
external computer-related media from an
outside source.
 Be Organized and Systematic- each finished
job should be labeled and have back-up files.
 Be Cost Efficient- Refrain from using the
Internet and downloading files not related to
the scope of the lesson, unless needed and with
the teacher’s consent. Playing computer games
is strictly prohibited.

Contenu connexe

En vedette

Uses of powerpoints
Uses of powerpointsUses of powerpoints
Uses of powerpointsFrya Lora
 
Chapter01discovering computers2012
Chapter01discovering computers2012Chapter01discovering computers2012
Chapter01discovering computers2012Frya Lora
 
Chapter04 system unit
Chapter04 system unitChapter04 system unit
Chapter04 system unitFrya Lora
 
Lo1.1 safety precautions
Lo1.1 safety precautionsLo1.1 safety precautions
Lo1.1 safety precautionsFrya Lora
 
Ict integrated lesson plan isodel - ver 2.0
Ict integrated lesson plan   isodel - ver 2.0Ict integrated lesson plan   isodel - ver 2.0
Ict integrated lesson plan isodel - ver 2.0Uwes Chaeruman
 
Troubleshoot beeping computers
Troubleshoot beeping computersTroubleshoot beeping computers
Troubleshoot beeping computersFrya Lora
 
Ict based discussion lesson plan {powerpoint}
Ict based discussion lesson plan {powerpoint}Ict based discussion lesson plan {powerpoint}
Ict based discussion lesson plan {powerpoint}sruthisarath
 
Interdisciplinary Lesson Plan ICT-Art
Interdisciplinary Lesson Plan ICT-ArtInterdisciplinary Lesson Plan ICT-Art
Interdisciplinary Lesson Plan ICT-ArtDaniela Silva
 
Introducing ppt 2010
Introducing ppt 2010Introducing ppt 2010
Introducing ppt 2010Frya Lora
 
Lo1.2 types of computer system error
Lo1.2 types of computer system errorLo1.2 types of computer system error
Lo1.2 types of computer system errorFrya Lora
 

En vedette (20)

Uses of powerpoints
Uses of powerpointsUses of powerpoints
Uses of powerpoints
 
Lesson Plan - ICT
Lesson Plan - ICTLesson Plan - ICT
Lesson Plan - ICT
 
5 s
5 s5 s
5 s
 
Mod4 l2.2
Mod4 l2.2Mod4 l2.2
Mod4 l2.2
 
2.2
2.22.2
2.2
 
Chapter01discovering computers2012
Chapter01discovering computers2012Chapter01discovering computers2012
Chapter01discovering computers2012
 
2.4
2.42.4
2.4
 
Chapter04 system unit
Chapter04 system unitChapter04 system unit
Chapter04 system unit
 
2.3
2.32.3
2.3
 
Lo1.1 safety precautions
Lo1.1 safety precautionsLo1.1 safety precautions
Lo1.1 safety precautions
 
Ergonomics
ErgonomicsErgonomics
Ergonomics
 
Ict integrated lesson plan isodel - ver 2.0
Ict integrated lesson plan   isodel - ver 2.0Ict integrated lesson plan   isodel - ver 2.0
Ict integrated lesson plan isodel - ver 2.0
 
Mod4 l2.1
Mod4 l2.1Mod4 l2.1
Mod4 l2.1
 
Troubleshoot beeping computers
Troubleshoot beeping computersTroubleshoot beeping computers
Troubleshoot beeping computers
 
Ict based discussion lesson plan {powerpoint}
Ict based discussion lesson plan {powerpoint}Ict based discussion lesson plan {powerpoint}
Ict based discussion lesson plan {powerpoint}
 
MY ICT LESSON PLAN 3
MY ICT LESSON PLAN 3MY ICT LESSON PLAN 3
MY ICT LESSON PLAN 3
 
Interdisciplinary Lesson Plan ICT-Art
Interdisciplinary Lesson Plan ICT-ArtInterdisciplinary Lesson Plan ICT-Art
Interdisciplinary Lesson Plan ICT-Art
 
Port types
Port typesPort types
Port types
 
Introducing ppt 2010
Introducing ppt 2010Introducing ppt 2010
Introducing ppt 2010
 
Lo1.2 types of computer system error
Lo1.2 types of computer system errorLo1.2 types of computer system error
Lo1.2 types of computer system error
 

Similaire à Guidelines and code of conduct in using the computer

#4 gr.-3 elements of a computer system - 4
#4   gr.-3 elements of a computer system - 4#4   gr.-3 elements of a computer system - 4
#4 gr.-3 elements of a computer system - 4Shirley Valera
 
User responsibilities policy
User responsibilities policyUser responsibilities policy
User responsibilities policyJigyanshu Jangid
 
Bs rua
Bs ruaBs rua
Bs ruaRoss
 
Computer Laboratoy Guidelines 1.1.4
Computer Laboratoy Guidelines 1.1.4Computer Laboratoy Guidelines 1.1.4
Computer Laboratoy Guidelines 1.1.4Keshuv
 
Presentation computer care
Presentation   computer carePresentation   computer care
Presentation computer careaneita28
 
Quick Safety Tips
Quick Safety TipsQuick Safety Tips
Quick Safety TipsMiss Cheska
 
21st Century Learning Initiative Training Slideshow
21st Century Learning Initiative Training Slideshow21st Century Learning Initiative Training Slideshow
21st Century Learning Initiative Training SlideshowPunxsutawney School District
 
1 1 laptop 2013 copy
1  1 laptop 2013 copy1  1 laptop 2013 copy
1 1 laptop 2013 copyDebbie Oliver
 
JOVEN LOPEZ(PPT, TECHNOLOGY)_1.pptx
JOVEN LOPEZ(PPT, TECHNOLOGY)_1.pptxJOVEN LOPEZ(PPT, TECHNOLOGY)_1.pptx
JOVEN LOPEZ(PPT, TECHNOLOGY)_1.pptxJovenLopez1
 
Cyber security awareness training by cyber security infotech(csi)
Cyber security awareness training by cyber security infotech(csi)Cyber security awareness training by cyber security infotech(csi)
Cyber security awareness training by cyber security infotech(csi)Cyber Security Infotech
 
4 mobile and remote best practices
4   mobile and remote best practices 4   mobile and remote best practices
4 mobile and remote best practices mohamad Hamizi
 
Cyber pledge infoMagnum
Cyber pledge infoMagnumCyber pledge infoMagnum
Cyber pledge infoMagnumARUN REDDY M
 

Similaire à Guidelines and code of conduct in using the computer (20)

#4 gr.-3 elements of a computer system - 4
#4   gr.-3 elements of a computer system - 4#4   gr.-3 elements of a computer system - 4
#4 gr.-3 elements of a computer system - 4
 
User responsibilities policy
User responsibilities policyUser responsibilities policy
User responsibilities policy
 
Bs rua
Bs ruaBs rua
Bs rua
 
Computer Laboratoy Guidelines 1.1.4
Computer Laboratoy Guidelines 1.1.4Computer Laboratoy Guidelines 1.1.4
Computer Laboratoy Guidelines 1.1.4
 
Laptop Training Revised
Laptop Training RevisedLaptop Training Revised
Laptop Training Revised
 
Presentation computer care
Presentation   computer carePresentation   computer care
Presentation computer care
 
Ch 11
Ch 11Ch 11
Ch 11
 
Quick Safety Tips
Quick Safety TipsQuick Safety Tips
Quick Safety Tips
 
laptoptraining
laptoptraininglaptoptraining
laptoptraining
 
IT Policy
IT Policy IT Policy
IT Policy
 
Safety Presentation
Safety PresentationSafety Presentation
Safety Presentation
 
21st Century Learning Initiative Training Slideshow
21st Century Learning Initiative Training Slideshow21st Century Learning Initiative Training Slideshow
21st Century Learning Initiative Training Slideshow
 
1 1 laptop 2013 copy
1  1 laptop 2013 copy1  1 laptop 2013 copy
1 1 laptop 2013 copy
 
JOVEN LOPEZ(PPT, TECHNOLOGY)_1.pptx
JOVEN LOPEZ(PPT, TECHNOLOGY)_1.pptxJOVEN LOPEZ(PPT, TECHNOLOGY)_1.pptx
JOVEN LOPEZ(PPT, TECHNOLOGY)_1.pptx
 
Cyber security awareness training by cyber security infotech(csi)
Cyber security awareness training by cyber security infotech(csi)Cyber security awareness training by cyber security infotech(csi)
Cyber security awareness training by cyber security infotech(csi)
 
4 mobile and remote best practices
4   mobile and remote best practices 4   mobile and remote best practices
4 mobile and remote best practices
 
2015 parent presentation yr 7 12 slideshare
2015 parent presentation yr 7   12 slideshare2015 parent presentation yr 7   12 slideshare
2015 parent presentation yr 7 12 slideshare
 
Netbook Orientation
Netbook OrientationNetbook Orientation
Netbook Orientation
 
Cyber pledge infoMagnum
Cyber pledge infoMagnumCyber pledge infoMagnum
Cyber pledge infoMagnum
 
MODULE 3.pptx
MODULE 3.pptxMODULE 3.pptx
MODULE 3.pptx
 

Plus de Frya Lora

Troubleshooting vocab
Troubleshooting vocabTroubleshooting vocab
Troubleshooting vocabFrya Lora
 
Lo1.3 diagnosing computer systems
Lo1.3 diagnosing computer systemsLo1.3 diagnosing computer systems
Lo1.3 diagnosing computer systemsFrya Lora
 
Network cable
Network cableNetwork cable
Network cableFrya Lora
 
1.5 tools(cn)
1.5 tools(cn)1.5 tools(cn)
1.5 tools(cn)Frya Lora
 
1.3 computer system devices&peripherals
1.3 computer system devices&peripherals1.3 computer system devices&peripherals
1.3 computer system devices&peripheralsFrya Lora
 
Kinds of computer g9
Kinds of computer g9Kinds of computer g9
Kinds of computer g9Frya Lora
 
Viewing the worksheet in different ways
Viewing the worksheet in different waysViewing the worksheet in different ways
Viewing the worksheet in different waysFrya Lora
 
L1 introenparts
L1 introenpartsL1 introenparts
L1 introenpartsFrya Lora
 
Ppt intro watukendu
Ppt intro watukenduPpt intro watukendu
Ppt intro watukenduFrya Lora
 
Ms office ppt 2010 views
Ms office ppt 2010 viewsMs office ppt 2010 views
Ms office ppt 2010 viewsFrya Lora
 

Plus de Frya Lora (13)

Troubleshooting vocab
Troubleshooting vocabTroubleshooting vocab
Troubleshooting vocab
 
GPU
GPUGPU
GPU
 
Lo1.3 diagnosing computer systems
Lo1.3 diagnosing computer systemsLo1.3 diagnosing computer systems
Lo1.3 diagnosing computer systems
 
Network cable
Network cableNetwork cable
Network cable
 
1.5 tools(cn)
1.5 tools(cn)1.5 tools(cn)
1.5 tools(cn)
 
1.4 network
1.4 network1.4 network
1.4 network
 
1.3 computer system devices&peripherals
1.3 computer system devices&peripherals1.3 computer system devices&peripherals
1.3 computer system devices&peripherals
 
Lesson 1 cn
Lesson 1 cnLesson 1 cn
Lesson 1 cn
 
Kinds of computer g9
Kinds of computer g9Kinds of computer g9
Kinds of computer g9
 
Viewing the worksheet in different ways
Viewing the worksheet in different waysViewing the worksheet in different ways
Viewing the worksheet in different ways
 
L1 introenparts
L1 introenpartsL1 introenparts
L1 introenparts
 
Ppt intro watukendu
Ppt intro watukenduPpt intro watukendu
Ppt intro watukendu
 
Ms office ppt 2010 views
Ms office ppt 2010 viewsMs office ppt 2010 views
Ms office ppt 2010 views
 

Dernier

A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 

Dernier (20)

A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 

Guidelines and code of conduct in using the computer

  • 1.
  • 2.  Be Responsible- Protect the computer you are using.  Be Smart- Report immediately to your teacher any hardware and software trouble for proper diagnosis and repair.  Be Courteous- Ask permission from the teacher or the regularly assigned user before using the computer unit.
  • 3.  Be Conscious of Cleanliness and Orderliness- Clean the computer and tables regularly to keep them free from dust.  Be Considerate-Avoid placing cellphones and speakers beside the computer monitors.  Be Cautious- Avoid using diskettes or other external computer-related media from an outside source.
  • 4.  Be Organized and Systematic- each finished job should be labeled and have back-up files.  Be Cost Efficient- Refrain from using the Internet and downloading files not related to the scope of the lesson, unless needed and with the teacher’s consent. Playing computer games is strictly prohibited.