SlideShare une entreprise Scribd logo
1  sur  15
Télécharger pour lire hors ligne
Info Tech

Training
Computer
 Ethics
What is
Computer
 Ethics?
COMPUTER
                        ETHICS



   It refers to good manners and right
    It refers to good manners and right
 conduct or behavior that computer users
 conduct or behavior that computer users
   must observe and follow when using
   must observe and follow when using
                 computers.
                  computers.
IT Training Module 1     COMPUTER ETHICS   4
The Ten
                       Commandments
                       Commandments
                        of Computer
                           Ethics
                            by: Dr. Ramon C. Barquin



IT Training Module 1     COMPUTER ETHICS               5
1st Commandment
   Thou shall not use a computer
   Thou shall not use a computer
       to harm other people.
        to harm other people.




IT Training Module 1   COMPUTER ETHICS   6
2nd Commandment
    Thou shall not interfere with
    Thou shall not interfere with
  other people’s computer work.
   other people’s computer work.




IT Training Module 1   COMPUTER ETHICS   7
3rd Commandment
   Thou shall not snoop around in
   Thou shall not snoop around in
        other people’s files.
        other people’s files.




IT Training Module 1   COMPUTER ETHICS   8
4th Commandment
     Thou shall not use a computer
     Thou shall not use a computer
                to steal.
                to steal.




IT Training Module 1   COMPUTER ETHICS   9
5th Commandment
  Thou shall not use a computer
   Thou shall not use a computer
       to bear false witness.
       to bear false witness.




IT Training Module 1   COMPUTER ETHICS   10
6th Commandment




       Thou shall not copy or use
       Thou shall not copy or use
   licensed software for which you
    licensed software for which you
            have not paid.
             have not paid.
IT Training Module 1   COMPUTER ETHICS   11
7th Commandment




      Thou shall not use other people’s
      Thou shall not use other people’s
        computer resources without
        computer resources without
          authorization or proper
           authorization or proper
              compensation.
               compensation.
IT Training Module 1   COMPUTER ETHICS   12
8th Commandment




      Thou shall not use other
       Thou shall not use other
    people’s computer intellectual
    people’s computer intellectual
               output.
               output.
IT Training Module 1   COMPUTER ETHICS   13
9th Commandment

                            Thou shall think
                            Thou shall think
                            about the social
                             about the social
                         consequences of the
                          consequences of the
                         program you write or
                          program you write or
                         the computer system
                          the computer system
                               you design.
                               you design.


IT Training Module 1   COMPUTER ETHICS      14
10th Commandment




         Thou shall use a computer in
         Thou shall use a computer in
         ways that show consideration
         ways that show consideration
          and respect for your fellow
          and respect for your fellow
                   humans.
                    humans.
IT Training Module 1   COMPUTER ETHICS   15

Contenu connexe

Tendances

System’s specification
System’s specificationSystem’s specification
System’s specificationRachel Espino
 
COMPUTER SYSTEM SERVICING NC II CURRICULUM GUIDE
COMPUTER SYSTEM SERVICING NC II CURRICULUM GUIDECOMPUTER SYSTEM SERVICING NC II CURRICULUM GUIDE
COMPUTER SYSTEM SERVICING NC II CURRICULUM GUIDEJohndion Ruloma
 
Proper care for the computer gr.1 - 1
Proper care for the computer  gr.1 - 1Proper care for the computer  gr.1 - 1
Proper care for the computer gr.1 - 1Shirley Valera
 
CSS L01 - Introduction to Computer System Servicing (NCII)
CSS L01 - Introduction to Computer System Servicing (NCII)CSS L01 - Introduction to Computer System Servicing (NCII)
CSS L01 - Introduction to Computer System Servicing (NCII)Marvin Bronoso
 
computer-systems-servicing-dll.docx
computer-systems-servicing-dll.docxcomputer-systems-servicing-dll.docx
computer-systems-servicing-dll.docxrochelleogatis1
 
Kabanata 8. Ang Mamamayang Pilipino
Kabanata 8. Ang Mamamayang PilipinoKabanata 8. Ang Mamamayang Pilipino
Kabanata 8. Ang Mamamayang Pilipinojoywapz
 
Tools and Equipment used in CSS NCII
Tools and Equipment used in CSS NCIITools and Equipment used in CSS NCII
Tools and Equipment used in CSS NCIIDepEd-Bataan
 
Unang markahang pagsusulit esp 7 / TOS
Unang markahang pagsusulit esp 7 / TOSUnang markahang pagsusulit esp 7 / TOS
Unang markahang pagsusulit esp 7 / TOSESMAEL NAVARRO
 
Lesson 1. Computer ethics and safety.pptx
Lesson 1. Computer ethics and safety.pptxLesson 1. Computer ethics and safety.pptx
Lesson 1. Computer ethics and safety.pptxCherryLim21
 
Grade 7 or Grade 8 ICT Photo Editing Learning Materials
Grade 7 or Grade 8 ICT Photo Editing Learning MaterialsGrade 7 or Grade 8 ICT Photo Editing Learning Materials
Grade 7 or Grade 8 ICT Photo Editing Learning MaterialsPaulita Mamansag
 
Demonstration lesson-plan-in-ict grade 11
Demonstration lesson-plan-in-ict grade 11Demonstration lesson-plan-in-ict grade 11
Demonstration lesson-plan-in-ict grade 11Luffy Kun
 
Computer hardware troubleshooting
Computer hardware troubleshootingComputer hardware troubleshooting
Computer hardware troubleshootingJerome Luison
 
Dll in esp and ap yunit ii week 1
Dll in esp and ap  yunit ii week 1Dll in esp and ap  yunit ii week 1
Dll in esp and ap yunit ii week 1EDITHA HONRADEZ
 
Esp10.module9
Esp10.module9Esp10.module9
Esp10.module9Corz Gaza
 
Computer Hardware Servicing Learning Module v.2.0
Computer Hardware Servicing Learning Module v.2.0Computer Hardware Servicing Learning Module v.2.0
Computer Hardware Servicing Learning Module v.2.0Bogs De Castro
 
Ict 9 module 3, lesson 2.2 system's specification
Ict 9 module 3, lesson 2.2 system's specificationIct 9 module 3, lesson 2.2 system's specification
Ict 9 module 3, lesson 2.2 system's specificationYonel Cadapan
 

Tendances (20)

System’s specification
System’s specificationSystem’s specification
System’s specification
 
COMPUTER SYSTEM SERVICING NC II CURRICULUM GUIDE
COMPUTER SYSTEM SERVICING NC II CURRICULUM GUIDECOMPUTER SYSTEM SERVICING NC II CURRICULUM GUIDE
COMPUTER SYSTEM SERVICING NC II CURRICULUM GUIDE
 
Proper care for the computer gr.1 - 1
Proper care for the computer  gr.1 - 1Proper care for the computer  gr.1 - 1
Proper care for the computer gr.1 - 1
 
CSS L01 - Introduction to Computer System Servicing (NCII)
CSS L01 - Introduction to Computer System Servicing (NCII)CSS L01 - Introduction to Computer System Servicing (NCII)
CSS L01 - Introduction to Computer System Servicing (NCII)
 
computer-systems-servicing-dll.docx
computer-systems-servicing-dll.docxcomputer-systems-servicing-dll.docx
computer-systems-servicing-dll.docx
 
How to install windows 7 operating system
How to install  windows 7 operating system How to install  windows 7 operating system
How to install windows 7 operating system
 
Kabanata 8. Ang Mamamayang Pilipino
Kabanata 8. Ang Mamamayang PilipinoKabanata 8. Ang Mamamayang Pilipino
Kabanata 8. Ang Mamamayang Pilipino
 
Tools and Equipment used in CSS NCII
Tools and Equipment used in CSS NCIITools and Equipment used in CSS NCII
Tools and Equipment used in CSS NCII
 
Unang markahang pagsusulit esp 7 / TOS
Unang markahang pagsusulit esp 7 / TOSUnang markahang pagsusulit esp 7 / TOS
Unang markahang pagsusulit esp 7 / TOS
 
Lesson 1. Computer ethics and safety.pptx
Lesson 1. Computer ethics and safety.pptxLesson 1. Computer ethics and safety.pptx
Lesson 1. Computer ethics and safety.pptx
 
Junior Girl Scout
Junior Girl ScoutJunior Girl Scout
Junior Girl Scout
 
Ang proseso ng paggawa ng mabuting pasya
Ang proseso ng paggawa ng mabuting pasyaAng proseso ng paggawa ng mabuting pasya
Ang proseso ng paggawa ng mabuting pasya
 
Grade 7 or Grade 8 ICT Photo Editing Learning Materials
Grade 7 or Grade 8 ICT Photo Editing Learning MaterialsGrade 7 or Grade 8 ICT Photo Editing Learning Materials
Grade 7 or Grade 8 ICT Photo Editing Learning Materials
 
Demonstration lesson-plan-in-ict grade 11
Demonstration lesson-plan-in-ict grade 11Demonstration lesson-plan-in-ict grade 11
Demonstration lesson-plan-in-ict grade 11
 
Gsp investiture
Gsp investitureGsp investiture
Gsp investiture
 
Computer hardware troubleshooting
Computer hardware troubleshootingComputer hardware troubleshooting
Computer hardware troubleshooting
 
Dll in esp and ap yunit ii week 1
Dll in esp and ap  yunit ii week 1Dll in esp and ap  yunit ii week 1
Dll in esp and ap yunit ii week 1
 
Esp10.module9
Esp10.module9Esp10.module9
Esp10.module9
 
Computer Hardware Servicing Learning Module v.2.0
Computer Hardware Servicing Learning Module v.2.0Computer Hardware Servicing Learning Module v.2.0
Computer Hardware Servicing Learning Module v.2.0
 
Ict 9 module 3, lesson 2.2 system's specification
Ict 9 module 3, lesson 2.2 system's specificationIct 9 module 3, lesson 2.2 system's specification
Ict 9 module 3, lesson 2.2 system's specification
 

En vedette

10 commandments of computer ethics with example
10 commandments of computer ethics with example10 commandments of computer ethics with example
10 commandments of computer ethics with exampleMhia Maravilla
 
Manners – computer etiquetteamg
Manners – computer etiquetteamgManners – computer etiquetteamg
Manners – computer etiquetteamgsjytech
 
Presentation skills workshop
Presentation skills workshopPresentation skills workshop
Presentation skills workshopJames Prince
 
Ten commandments
Ten commandmentsTen commandments
Ten commandmentslsanford84
 
The ten commandments of computer ethics
The ten commandments of computer ethicsThe ten commandments of computer ethics
The ten commandments of computer ethicssalj_16
 
10 Rules of Netiquette
10 Rules of Netiquette10 Rules of Netiquette
10 Rules of NetiquetteSakuta Riwsie
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentationkatespeach
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentationguest65a1c4
 
Computer ethics
Computer ethicsComputer ethics
Computer ethicsJagan Nath
 
The 10 Commandments of Computer Ethics
The 10 Commandments of Computer EthicsThe 10 Commandments of Computer Ethics
The 10 Commandments of Computer Ethicssmartinson
 

En vedette (11)

10 commandments of computer ethics with example
10 commandments of computer ethics with example10 commandments of computer ethics with example
10 commandments of computer ethics with example
 
Manners – computer etiquetteamg
Manners – computer etiquetteamgManners – computer etiquetteamg
Manners – computer etiquetteamg
 
Presentation skills workshop
Presentation skills workshopPresentation skills workshop
Presentation skills workshop
 
Ten commandments
Ten commandmentsTen commandments
Ten commandments
 
The ten commandments of computer ethics
The ten commandments of computer ethicsThe ten commandments of computer ethics
The ten commandments of computer ethics
 
10 Rules of Netiquette
10 Rules of Netiquette10 Rules of Netiquette
10 Rules of Netiquette
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentation
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentation
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
The 10 Commandments of Computer Ethics
The 10 Commandments of Computer EthicsThe 10 Commandments of Computer Ethics
The 10 Commandments of Computer Ethics
 

Similaire à 3 Rd Computer Ethics

the lesson about the information and communication to technology
the lesson about the information and communication to technologythe lesson about the information and communication to technology
the lesson about the information and communication to technologylcnemedez
 
Super billing computers are your future
Super billing computers are your futureSuper billing computers are your future
Super billing computers are your futuresuperb11b
 
etiquettes-grade 7.pptx
etiquettes-grade 7.pptxetiquettes-grade 7.pptx
etiquettes-grade 7.pptxCynnePataweg
 
Computer Ethics and Content Marketing Platforms
Computer Ethics and Content Marketing PlatformsComputer Ethics and Content Marketing Platforms
Computer Ethics and Content Marketing PlatformsAmplephi
 
Computer safety
Computer safetyComputer safety
Computer safetyahentz
 
Identify ethical use of computers
Identify ethical use of computersIdentify ethical use of computers
Identify ethical use of computersAl Forte
 
Ethics And Pc Troubleshooting
Ethics And Pc TroubleshootingEthics And Pc Troubleshooting
Ethics And Pc Troubleshootingswiatekj
 
Ethics in using computer
Ethics in using computerEthics in using computer
Ethics in using computerFatin Izzaty
 
computer ethics
computer ethicscomputer ethics
computer ethicsHoney jose
 
Presentation computer ethics
Presentation computer ethicsPresentation computer ethics
Presentation computer ethicsYuyul Yieyien
 
A Trip to ICT and Society Series 1 : The Ten Commandments of the Internet
A Trip to ICT and Society Series 1 : The Ten Commandments of the InternetA Trip to ICT and Society Series 1 : The Ten Commandments of the Internet
A Trip to ICT and Society Series 1 : The Ten Commandments of the Internetianpoblete13
 
Ethics in using computer
Ethics in using computerEthics in using computer
Ethics in using computeribrahimtbl3147
 
Lesson 5 may 4
Lesson 5 may 4Lesson 5 may 4
Lesson 5 may 4Max Friel
 
qwe.pptx
qwe.pptxqwe.pptx
qwe.pptxjeba50
 

Similaire à 3 Rd Computer Ethics (20)

the lesson about the information and communication to technology
the lesson about the information and communication to technologythe lesson about the information and communication to technology
the lesson about the information and communication to technology
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Super billing computers are your future
Super billing computers are your futureSuper billing computers are your future
Super billing computers are your future
 
etiquettes-grade 7.pptx
etiquettes-grade 7.pptxetiquettes-grade 7.pptx
etiquettes-grade 7.pptx
 
Computer Ethics and Content Marketing Platforms
Computer Ethics and Content Marketing PlatformsComputer Ethics and Content Marketing Platforms
Computer Ethics and Content Marketing Platforms
 
Computer safety
Computer safetyComputer safety
Computer safety
 
Identify ethical use of computers
Identify ethical use of computersIdentify ethical use of computers
Identify ethical use of computers
 
Ethics in computing
Ethics in computingEthics in computing
Ethics in computing
 
Ethics And Pc Troubleshooting
Ethics And Pc TroubleshootingEthics And Pc Troubleshooting
Ethics And Pc Troubleshooting
 
Ethics in using computer
Ethics in using computerEthics in using computer
Ethics in using computer
 
computer ethics
computer ethicscomputer ethics
computer ethics
 
Presentation computer ethics
Presentation computer ethicsPresentation computer ethics
Presentation computer ethics
 
A Trip to ICT and Society Series 1 : The Ten Commandments of the Internet
A Trip to ICT and Society Series 1 : The Ten Commandments of the InternetA Trip to ICT and Society Series 1 : The Ten Commandments of the Internet
A Trip to ICT and Society Series 1 : The Ten Commandments of the Internet
 
Ethics in using computer
Ethics in using computerEthics in using computer
Ethics in using computer
 
Lesson 5 may 4
Lesson 5 may 4Lesson 5 may 4
Lesson 5 may 4
 
Nfwordle
NfwordleNfwordle
Nfwordle
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
COMPUTER APPLICATIONS Module 5.pptx
COMPUTER APPLICATIONS Module 5.pptxCOMPUTER APPLICATIONS Module 5.pptx
COMPUTER APPLICATIONS Module 5.pptx
 
qwe.pptx
qwe.pptxqwe.pptx
qwe.pptx
 
Netiquette
NetiquetteNetiquette
Netiquette
 

Plus de ERIC M. DE GUZMAN (13)

slope of a line
slope of a lineslope of a line
slope of a line
 
A father’s day presentation
A father’s day presentationA father’s day presentation
A father’s day presentation
 
I Have Fallen Inlove 3 X
I Have Fallen Inlove 3 XI Have Fallen Inlove 3 X
I Have Fallen Inlove 3 X
 
Optical Illusion 2
Optical Illusion 2Optical Illusion 2
Optical Illusion 2
 
Opening Prayer
Opening PrayerOpening Prayer
Opening Prayer
 
Brain Teaser
Brain  TeaserBrain  Teaser
Brain Teaser
 
Dream Occupation
Dream OccupationDream Occupation
Dream Occupation
 
Sikretongbuhay
SikretongbuhaySikretongbuhay
Sikretongbuhay
 
Illusions
IllusionsIllusions
Illusions
 
Zoo Caravan Prayer
Zoo Caravan PrayerZoo Caravan Prayer
Zoo Caravan Prayer
 
History Of Publishing
History Of PublishingHistory Of Publishing
History Of Publishing
 
I Can...And I Cannot(Edit)
I Can...And I Cannot(Edit)I Can...And I Cannot(Edit)
I Can...And I Cannot(Edit)
 
Butterfly
ButterflyButterfly
Butterfly
 

Dernier

AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityWSO2
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxRemote DBA Services
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 

Dernier (20)

AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 

3 Rd Computer Ethics

  • 4. COMPUTER ETHICS It refers to good manners and right It refers to good manners and right conduct or behavior that computer users conduct or behavior that computer users must observe and follow when using must observe and follow when using computers. computers. IT Training Module 1 COMPUTER ETHICS 4
  • 5. The Ten Commandments Commandments of Computer Ethics by: Dr. Ramon C. Barquin IT Training Module 1 COMPUTER ETHICS 5
  • 6. 1st Commandment Thou shall not use a computer Thou shall not use a computer to harm other people. to harm other people. IT Training Module 1 COMPUTER ETHICS 6
  • 7. 2nd Commandment Thou shall not interfere with Thou shall not interfere with other people’s computer work. other people’s computer work. IT Training Module 1 COMPUTER ETHICS 7
  • 8. 3rd Commandment Thou shall not snoop around in Thou shall not snoop around in other people’s files. other people’s files. IT Training Module 1 COMPUTER ETHICS 8
  • 9. 4th Commandment Thou shall not use a computer Thou shall not use a computer to steal. to steal. IT Training Module 1 COMPUTER ETHICS 9
  • 10. 5th Commandment Thou shall not use a computer Thou shall not use a computer to bear false witness. to bear false witness. IT Training Module 1 COMPUTER ETHICS 10
  • 11. 6th Commandment Thou shall not copy or use Thou shall not copy or use licensed software for which you licensed software for which you have not paid. have not paid. IT Training Module 1 COMPUTER ETHICS 11
  • 12. 7th Commandment Thou shall not use other people’s Thou shall not use other people’s computer resources without computer resources without authorization or proper authorization or proper compensation. compensation. IT Training Module 1 COMPUTER ETHICS 12
  • 13. 8th Commandment Thou shall not use other Thou shall not use other people’s computer intellectual people’s computer intellectual output. output. IT Training Module 1 COMPUTER ETHICS 13
  • 14. 9th Commandment Thou shall think Thou shall think about the social about the social consequences of the consequences of the program you write or program you write or the computer system the computer system you design. you design. IT Training Module 1 COMPUTER ETHICS 14
  • 15. 10th Commandment Thou shall use a computer in Thou shall use a computer in ways that show consideration ways that show consideration and respect for your fellow and respect for your fellow humans. humans. IT Training Module 1 COMPUTER ETHICS 15