SlideShare une entreprise Scribd logo
1  sur  15
WAYS OF MISUSINGTHE
COMPUTER SYSTEM
WEEK 8
NEXT
1. HACKING
This is the theft of hardware
and software resources. It
can also include the theft of
physical cash as well as
official documents.
NEXTBACK
2. PORNOGRAPHY
This is the use of internet to
show nude pictures, thereby
abusing the mind of the
teenage.
NEXTBACK
3. CYBERWAR
This is the use of electronic
network and information on
the net to fervent trouble e.g.
the use of internet to send
provocative word.
NEXTBACK
4. FRAUD
This involves using internet
to defraud others.The
fraudsters commonly refer
to as yahoo boys, defraud
their victim of their money
and valuables.
NEXTBACK
5. PIRACY OF SOFTWARE
When people go to the
internet to copy software and
use it without permission or
authorization is referred to as
the piracy.
NEXTBACK
6. PLAGIARISM
This is the claiming the ownership of
the researched work of software
belonging to another person and get
credit or reward for it.This is possible
when existing job is pirated and
represent as new and original.
BACK NEXT
7. STEALING
This is the use of computer
to steal money (i.e.
unauthorized use or access
to other people ATM). It is
similar to fraud.
NEXTBACK
8.VIRUS ATTACK ORTHREAT
Virus is a program written by the
programmer to adversely affect the
smooth running of the computer system.
Some internet users intentionally send
virus to other internet users.The effects
of virus attack are numerous.
BACK TO CLASS QUIZ
CLASS QUIZ
1.The theft of hardware and software resources is called
………………
(a) Hacking
(b) Fraud
(c) Stealing
CLASS QUIZ
2. ………….. is the use of electronic network and information on
the net to fervent trouble
(a) Cyber war
(b) Stealing
(c) Fraud
CORRECT
NEXT QUIZ
CORRECT
HOME
WRONG
TRY AGAIN
WRONG
TRY AGAIN

Contenu connexe

Tendances (20)

Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
 
Computer Science Class 6
Computer Science Class 6Computer Science Class 6
Computer Science Class 6
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
 
presentation on hacking
presentation on hackingpresentation on hacking
presentation on hacking
 
Cyber-Security in Education
Cyber-Security in EducationCyber-Security in Education
Cyber-Security in Education
 
Cyber fraud
Cyber fraudCyber fraud
Cyber fraud
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
 
trojan horse- malware(virus)
trojan horse- malware(virus)trojan horse- malware(virus)
trojan horse- malware(virus)
 
CyberCrimes
CyberCrimesCyberCrimes
CyberCrimes
 
Hacking & its types
Hacking & its typesHacking & its types
Hacking & its types
 
Threats to a computer
Threats to a computer Threats to a computer
Threats to a computer
 
Case study on cyber crime
Case study on cyber crimeCase study on cyber crime
Case study on cyber crime
 
It Amendments Act
It Amendments ActIt Amendments Act
It Amendments Act
 
Cyber crime in the digital age
Cyber crime in the digital ageCyber crime in the digital age
Cyber crime in the digital age
 
Misuse of Internet
Misuse of InternetMisuse of Internet
Misuse of Internet
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
5G tecnology
5G tecnology5G tecnology
5G tecnology
 
Hacking
HackingHacking
Hacking
 

Similaire à Ways of Misusing The Computer System

Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & securitySohailAkbar14
 
The disadvantages of ict
The disadvantages of ictThe disadvantages of ict
The disadvantages of ictcyb1337
 
The house believes that internet acces is a human right
The house believes that internet acces is a human rightThe house believes that internet acces is a human right
The house believes that internet acces is a human rightAgustina
 
LEGAL AND ETHICAL USE OF TECHNOLOGY.pptx
LEGAL AND ETHICAL USE OF TECHNOLOGY.pptxLEGAL AND ETHICAL USE OF TECHNOLOGY.pptx
LEGAL AND ETHICAL USE OF TECHNOLOGY.pptxAnnMarieTAquinoII
 
Cyber crime in pakistan by zubair
Cyber crime in pakistan by zubairCyber crime in pakistan by zubair
Cyber crime in pakistan by zubairMuhammad Zubair
 
cyber crime and laws
cyber crime and laws cyber crime and laws
cyber crime and laws Aman Bhargava
 
Cyber forensic 1
Cyber forensic 1Cyber forensic 1
Cyber forensic 1anilinvns
 
Cyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj AhirwarCyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj AhirwarNeeraj Ahirwar
 
Cyber Law and Cyber Crime
Cyber Law and Cyber CrimeCyber Law and Cyber Crime
Cyber Law and Cyber CrimeSyangba132
 
The disadvantage of ict.pptx
The disadvantage of ict.pptxThe disadvantage of ict.pptx
The disadvantage of ict.pptxangellaclarianes1
 
The disadvantages of ICT.pptx-final [Autosaved].pptx
The disadvantages of ICT.pptx-final [Autosaved].pptxThe disadvantages of ICT.pptx-final [Autosaved].pptx
The disadvantages of ICT.pptx-final [Autosaved].pptxAnecitaLCalamohoy
 
The disadvantages of ICT.pptx-final [Autosaved].pptx
The disadvantages of ICT.pptx-final [Autosaved].pptxThe disadvantages of ICT.pptx-final [Autosaved].pptx
The disadvantages of ICT.pptx-final [Autosaved].pptxAnecitaLCalamohoy
 
Cyber crime types & laws
Cyber crime types & lawsCyber crime types & laws
Cyber crime types & lawssureshjogesh48
 
Greendeana unit 8 project cj216 copy
Greendeana unit 8 project cj216 copyGreendeana unit 8 project cj216 copy
Greendeana unit 8 project cj216 copyDee Green
 

Similaire à Ways of Misusing The Computer System (20)

Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & security
 
The disadvantages of ict
The disadvantages of ictThe disadvantages of ict
The disadvantages of ict
 
The house believes that internet acces is a human right
The house believes that internet acces is a human rightThe house believes that internet acces is a human right
The house believes that internet acces is a human right
 
Chapter 8.legal. opportunities
Chapter 8.legal. opportunitiesChapter 8.legal. opportunities
Chapter 8.legal. opportunities
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Unit 2
Unit 2Unit 2
Unit 2
 
Unit 2
Unit 2Unit 2
Unit 2
 
LEGAL AND ETHICAL USE OF TECHNOLOGY.pptx
LEGAL AND ETHICAL USE OF TECHNOLOGY.pptxLEGAL AND ETHICAL USE OF TECHNOLOGY.pptx
LEGAL AND ETHICAL USE OF TECHNOLOGY.pptx
 
Cyber crime in pakistan by zubair
Cyber crime in pakistan by zubairCyber crime in pakistan by zubair
Cyber crime in pakistan by zubair
 
cyber crime and laws
cyber crime and laws cyber crime and laws
cyber crime and laws
 
Cyber forensic 1
Cyber forensic 1Cyber forensic 1
Cyber forensic 1
 
Cyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj AhirwarCyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj Ahirwar
 
Cyber Law and Cyber Crime
Cyber Law and Cyber CrimeCyber Law and Cyber Crime
Cyber Law and Cyber Crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
The disadvantage of ict.pptx
The disadvantage of ict.pptxThe disadvantage of ict.pptx
The disadvantage of ict.pptx
 
The disadvantages of ICT.pptx-final [Autosaved].pptx
The disadvantages of ICT.pptx-final [Autosaved].pptxThe disadvantages of ICT.pptx-final [Autosaved].pptx
The disadvantages of ICT.pptx-final [Autosaved].pptx
 
The disadvantages of ICT.pptx-final [Autosaved].pptx
The disadvantages of ICT.pptx-final [Autosaved].pptxThe disadvantages of ICT.pptx-final [Autosaved].pptx
The disadvantages of ICT.pptx-final [Autosaved].pptx
 
Cyber crime types & laws
Cyber crime types & lawsCyber crime types & laws
Cyber crime types & laws
 
Greendeana unit 8 project cj216 copy
Greendeana unit 8 project cj216 copyGreendeana unit 8 project cj216 copy
Greendeana unit 8 project cj216 copy
 
Hacking
HackingHacking
Hacking
 

Plus de Ejiro Ndifereke

Sale For E-Note and Exam Questions For Secondary Schools.pdf
Sale For E-Note and Exam Questions For Secondary Schools.pdfSale For E-Note and Exam Questions For Secondary Schools.pdf
Sale For E-Note and Exam Questions For Secondary Schools.pdfEjiro Ndifereke
 
A Presentation on Spreadsheet
A Presentation on SpreadsheetA Presentation on Spreadsheet
A Presentation on SpreadsheetEjiro Ndifereke
 
A Data Processing Presentation on Graphics
A Data Processing Presentation on GraphicsA Data Processing Presentation on Graphics
A Data Processing Presentation on GraphicsEjiro Ndifereke
 
SS2 Data Processing Examination with Test of Practicals (Third Term)
SS2 Data Processing Examination with Test of Practicals (Third Term)SS2 Data Processing Examination with Test of Practicals (Third Term)
SS2 Data Processing Examination with Test of Practicals (Third Term)Ejiro Ndifereke
 
SS1 Data Processing Examination with Test of Practical (Third Term)
SS1 Data Processing Examination with Test of Practical  (Third Term)SS1 Data Processing Examination with Test of Practical  (Third Term)
SS1 Data Processing Examination with Test of Practical (Third Term)Ejiro Ndifereke
 
JS2 Computer Studies Examination (Third Term)
JS2 Computer Studies Examination (Third Term)JS2 Computer Studies Examination (Third Term)
JS2 Computer Studies Examination (Third Term)Ejiro Ndifereke
 
Js1 computer studies examination (Third Term)
Js1 computer studies examination (Third Term)Js1 computer studies examination (Third Term)
Js1 computer studies examination (Third Term)Ejiro Ndifereke
 
SS3 DATA PROCESSING EXAMINATION (FIRST TERM)
SS3 DATA PROCESSING EXAMINATION (FIRST TERM)SS3 DATA PROCESSING EXAMINATION (FIRST TERM)
SS3 DATA PROCESSING EXAMINATION (FIRST TERM)Ejiro Ndifereke
 
SS2 DATA PROCESSING EXAMINATION (FIRST TERM)
SS2 DATA PROCESSING EXAMINATION (FIRST TERM)SS2 DATA PROCESSING EXAMINATION (FIRST TERM)
SS2 DATA PROCESSING EXAMINATION (FIRST TERM)Ejiro Ndifereke
 
SS1 DATA PROCESSING EXAMINATION (FIRST TERM)
SS1 DATA PROCESSING EXAMINATION (FIRST TERM)SS1 DATA PROCESSING EXAMINATION (FIRST TERM)
SS1 DATA PROCESSING EXAMINATION (FIRST TERM)Ejiro Ndifereke
 
JSS3 COMPUTER STUDIES EXAMINATION (FIRST TERM)
JSS3 COMPUTER STUDIES EXAMINATION (FIRST TERM)JSS3 COMPUTER STUDIES EXAMINATION (FIRST TERM)
JSS3 COMPUTER STUDIES EXAMINATION (FIRST TERM)Ejiro Ndifereke
 
JSS2 COMPUTER STUDIES EXAMINATION (FIRST TERM)
JSS2 COMPUTER STUDIES EXAMINATION (FIRST TERM)JSS2 COMPUTER STUDIES EXAMINATION (FIRST TERM)
JSS2 COMPUTER STUDIES EXAMINATION (FIRST TERM)Ejiro Ndifereke
 
JSS1 COMPUTER STUDIES EXAMINATION (FIRST TERM)
JSS1 COMPUTER STUDIES EXAMINATION (FIRST TERM)JSS1 COMPUTER STUDIES EXAMINATION (FIRST TERM)
JSS1 COMPUTER STUDIES EXAMINATION (FIRST TERM)Ejiro Ndifereke
 
SS3 DATA PROCESSING PRACTICAL EXAMINATION (FIRST TERM)
SS3 DATA PROCESSING PRACTICAL EXAMINATION (FIRST TERM)SS3 DATA PROCESSING PRACTICAL EXAMINATION (FIRST TERM)
SS3 DATA PROCESSING PRACTICAL EXAMINATION (FIRST TERM)Ejiro Ndifereke
 
SS2 DATA PROCESSING PRACTICAL EXAMINATION (FIRST TERM)
SS2 DATA PROCESSING PRACTICAL EXAMINATION (FIRST TERM)SS2 DATA PROCESSING PRACTICAL EXAMINATION (FIRST TERM)
SS2 DATA PROCESSING PRACTICAL EXAMINATION (FIRST TERM)Ejiro Ndifereke
 
SS1 DATA PROCESSING PRACTICAL EXAMINATION (FIRST TERM)
SS1 DATA PROCESSING PRACTICAL EXAMINATION (FIRST TERM)SS1 DATA PROCESSING PRACTICAL EXAMINATION (FIRST TERM)
SS1 DATA PROCESSING PRACTICAL EXAMINATION (FIRST TERM)Ejiro Ndifereke
 
S3 DATA PROCESSING FIRST TERM PRE-WAEC (2ND HALF EXAMINATION)
S3 DATA PROCESSING FIRST TERM PRE-WAEC (2ND HALF EXAMINATION)S3 DATA PROCESSING FIRST TERM PRE-WAEC (2ND HALF EXAMINATION)
S3 DATA PROCESSING FIRST TERM PRE-WAEC (2ND HALF EXAMINATION)Ejiro Ndifereke
 
S2 DATA PROCESSING FIRST TERM C.A 2
S2 DATA PROCESSING FIRST TERM C.A 2S2 DATA PROCESSING FIRST TERM C.A 2
S2 DATA PROCESSING FIRST TERM C.A 2Ejiro Ndifereke
 
S1 DATA PROCESSING FIRST TERM C.A 2
S1 DATA PROCESSING FIRST TERM C.A 2S1 DATA PROCESSING FIRST TERM C.A 2
S1 DATA PROCESSING FIRST TERM C.A 2Ejiro Ndifereke
 
JS3 COMPUTER STUDIES FIRST TERM C.A 2
JS3 COMPUTER STUDIES FIRST TERM C.A 2JS3 COMPUTER STUDIES FIRST TERM C.A 2
JS3 COMPUTER STUDIES FIRST TERM C.A 2Ejiro Ndifereke
 

Plus de Ejiro Ndifereke (20)

Sale For E-Note and Exam Questions For Secondary Schools.pdf
Sale For E-Note and Exam Questions For Secondary Schools.pdfSale For E-Note and Exam Questions For Secondary Schools.pdf
Sale For E-Note and Exam Questions For Secondary Schools.pdf
 
A Presentation on Spreadsheet
A Presentation on SpreadsheetA Presentation on Spreadsheet
A Presentation on Spreadsheet
 
A Data Processing Presentation on Graphics
A Data Processing Presentation on GraphicsA Data Processing Presentation on Graphics
A Data Processing Presentation on Graphics
 
SS2 Data Processing Examination with Test of Practicals (Third Term)
SS2 Data Processing Examination with Test of Practicals (Third Term)SS2 Data Processing Examination with Test of Practicals (Third Term)
SS2 Data Processing Examination with Test of Practicals (Third Term)
 
SS1 Data Processing Examination with Test of Practical (Third Term)
SS1 Data Processing Examination with Test of Practical  (Third Term)SS1 Data Processing Examination with Test of Practical  (Third Term)
SS1 Data Processing Examination with Test of Practical (Third Term)
 
JS2 Computer Studies Examination (Third Term)
JS2 Computer Studies Examination (Third Term)JS2 Computer Studies Examination (Third Term)
JS2 Computer Studies Examination (Third Term)
 
Js1 computer studies examination (Third Term)
Js1 computer studies examination (Third Term)Js1 computer studies examination (Third Term)
Js1 computer studies examination (Third Term)
 
SS3 DATA PROCESSING EXAMINATION (FIRST TERM)
SS3 DATA PROCESSING EXAMINATION (FIRST TERM)SS3 DATA PROCESSING EXAMINATION (FIRST TERM)
SS3 DATA PROCESSING EXAMINATION (FIRST TERM)
 
SS2 DATA PROCESSING EXAMINATION (FIRST TERM)
SS2 DATA PROCESSING EXAMINATION (FIRST TERM)SS2 DATA PROCESSING EXAMINATION (FIRST TERM)
SS2 DATA PROCESSING EXAMINATION (FIRST TERM)
 
SS1 DATA PROCESSING EXAMINATION (FIRST TERM)
SS1 DATA PROCESSING EXAMINATION (FIRST TERM)SS1 DATA PROCESSING EXAMINATION (FIRST TERM)
SS1 DATA PROCESSING EXAMINATION (FIRST TERM)
 
JSS3 COMPUTER STUDIES EXAMINATION (FIRST TERM)
JSS3 COMPUTER STUDIES EXAMINATION (FIRST TERM)JSS3 COMPUTER STUDIES EXAMINATION (FIRST TERM)
JSS3 COMPUTER STUDIES EXAMINATION (FIRST TERM)
 
JSS2 COMPUTER STUDIES EXAMINATION (FIRST TERM)
JSS2 COMPUTER STUDIES EXAMINATION (FIRST TERM)JSS2 COMPUTER STUDIES EXAMINATION (FIRST TERM)
JSS2 COMPUTER STUDIES EXAMINATION (FIRST TERM)
 
JSS1 COMPUTER STUDIES EXAMINATION (FIRST TERM)
JSS1 COMPUTER STUDIES EXAMINATION (FIRST TERM)JSS1 COMPUTER STUDIES EXAMINATION (FIRST TERM)
JSS1 COMPUTER STUDIES EXAMINATION (FIRST TERM)
 
SS3 DATA PROCESSING PRACTICAL EXAMINATION (FIRST TERM)
SS3 DATA PROCESSING PRACTICAL EXAMINATION (FIRST TERM)SS3 DATA PROCESSING PRACTICAL EXAMINATION (FIRST TERM)
SS3 DATA PROCESSING PRACTICAL EXAMINATION (FIRST TERM)
 
SS2 DATA PROCESSING PRACTICAL EXAMINATION (FIRST TERM)
SS2 DATA PROCESSING PRACTICAL EXAMINATION (FIRST TERM)SS2 DATA PROCESSING PRACTICAL EXAMINATION (FIRST TERM)
SS2 DATA PROCESSING PRACTICAL EXAMINATION (FIRST TERM)
 
SS1 DATA PROCESSING PRACTICAL EXAMINATION (FIRST TERM)
SS1 DATA PROCESSING PRACTICAL EXAMINATION (FIRST TERM)SS1 DATA PROCESSING PRACTICAL EXAMINATION (FIRST TERM)
SS1 DATA PROCESSING PRACTICAL EXAMINATION (FIRST TERM)
 
S3 DATA PROCESSING FIRST TERM PRE-WAEC (2ND HALF EXAMINATION)
S3 DATA PROCESSING FIRST TERM PRE-WAEC (2ND HALF EXAMINATION)S3 DATA PROCESSING FIRST TERM PRE-WAEC (2ND HALF EXAMINATION)
S3 DATA PROCESSING FIRST TERM PRE-WAEC (2ND HALF EXAMINATION)
 
S2 DATA PROCESSING FIRST TERM C.A 2
S2 DATA PROCESSING FIRST TERM C.A 2S2 DATA PROCESSING FIRST TERM C.A 2
S2 DATA PROCESSING FIRST TERM C.A 2
 
S1 DATA PROCESSING FIRST TERM C.A 2
S1 DATA PROCESSING FIRST TERM C.A 2S1 DATA PROCESSING FIRST TERM C.A 2
S1 DATA PROCESSING FIRST TERM C.A 2
 
JS3 COMPUTER STUDIES FIRST TERM C.A 2
JS3 COMPUTER STUDIES FIRST TERM C.A 2JS3 COMPUTER STUDIES FIRST TERM C.A 2
JS3 COMPUTER STUDIES FIRST TERM C.A 2
 

Dernier

Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the ClassroomPooky Knightsmith
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSCeline George
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structuredhanjurrannsibayan2
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701bronxfugly43
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsKarakKing
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17Celine George
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentationcamerronhm
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptxMaritesTamaniVerdade
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxAmanpreet Kaur
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024Elizabeth Walsh
 

Dernier (20)

Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 

Ways of Misusing The Computer System

  • 1. WAYS OF MISUSINGTHE COMPUTER SYSTEM WEEK 8 NEXT
  • 2. 1. HACKING This is the theft of hardware and software resources. It can also include the theft of physical cash as well as official documents. NEXTBACK
  • 3. 2. PORNOGRAPHY This is the use of internet to show nude pictures, thereby abusing the mind of the teenage. NEXTBACK
  • 4. 3. CYBERWAR This is the use of electronic network and information on the net to fervent trouble e.g. the use of internet to send provocative word. NEXTBACK
  • 5. 4. FRAUD This involves using internet to defraud others.The fraudsters commonly refer to as yahoo boys, defraud their victim of their money and valuables. NEXTBACK
  • 6. 5. PIRACY OF SOFTWARE When people go to the internet to copy software and use it without permission or authorization is referred to as the piracy. NEXTBACK
  • 7. 6. PLAGIARISM This is the claiming the ownership of the researched work of software belonging to another person and get credit or reward for it.This is possible when existing job is pirated and represent as new and original. BACK NEXT
  • 8. 7. STEALING This is the use of computer to steal money (i.e. unauthorized use or access to other people ATM). It is similar to fraud. NEXTBACK
  • 9. 8.VIRUS ATTACK ORTHREAT Virus is a program written by the programmer to adversely affect the smooth running of the computer system. Some internet users intentionally send virus to other internet users.The effects of virus attack are numerous. BACK TO CLASS QUIZ
  • 10. CLASS QUIZ 1.The theft of hardware and software resources is called ……………… (a) Hacking (b) Fraud (c) Stealing
  • 11. CLASS QUIZ 2. ………….. is the use of electronic network and information on the net to fervent trouble (a) Cyber war (b) Stealing (c) Fraud