SlideShare une entreprise Scribd logo
1  sur  4
 Be Responsible- Protect the computer you
are using.
 Be Smart- Report immediately to your
teacher any hardware and software trouble
for proper diagnosis and repair.
 Be Courteous- Ask permission from the
teacher or the regularly assigned user
before using the computer unit.
 Be Conscious of Cleanliness and Orderliness-
Clean the computer and tables regularly to
keep them free from dust.
 Be Considerate-Avoid placing cellphones and
speakers beside the computer monitors.
 Be Cautious- Avoid using diskettes or other
external computer-related media from an
outside source.
 Be Organized and Systematic- each finished
job should be labeled and have back-up files.
 Be Cost Efficient- Refrain from using the
Internet and downloading files not related to
the scope of the lesson, unless needed and with
the teacher’s consent. Playing computer games
is strictly prohibited.

Contenu connexe

En vedette

Uses of powerpoints
Uses of powerpointsUses of powerpoints
Uses of powerpointsFrya Lora
 
Chapter01discovering computers2012
Chapter01discovering computers2012Chapter01discovering computers2012
Chapter01discovering computers2012Frya Lora
 
Chapter04 system unit
Chapter04 system unitChapter04 system unit
Chapter04 system unitFrya Lora
 
Lo1.1 safety precautions
Lo1.1 safety precautionsLo1.1 safety precautions
Lo1.1 safety precautionsFrya Lora
 
Ict integrated lesson plan isodel - ver 2.0
Ict integrated lesson plan   isodel - ver 2.0Ict integrated lesson plan   isodel - ver 2.0
Ict integrated lesson plan isodel - ver 2.0Uwes Chaeruman
 
Troubleshoot beeping computers
Troubleshoot beeping computersTroubleshoot beeping computers
Troubleshoot beeping computersFrya Lora
 
Ict based discussion lesson plan {powerpoint}
Ict based discussion lesson plan {powerpoint}Ict based discussion lesson plan {powerpoint}
Ict based discussion lesson plan {powerpoint}sruthisarath
 
Interdisciplinary Lesson Plan ICT-Art
Interdisciplinary Lesson Plan ICT-ArtInterdisciplinary Lesson Plan ICT-Art
Interdisciplinary Lesson Plan ICT-ArtDaniela Silva
 
Introducing ppt 2010
Introducing ppt 2010Introducing ppt 2010
Introducing ppt 2010Frya Lora
 
Lo1.2 types of computer system error
Lo1.2 types of computer system errorLo1.2 types of computer system error
Lo1.2 types of computer system errorFrya Lora
 

En vedette (20)

Uses of powerpoints
Uses of powerpointsUses of powerpoints
Uses of powerpoints
 
Lesson Plan - ICT
Lesson Plan - ICTLesson Plan - ICT
Lesson Plan - ICT
 
5 s
5 s5 s
5 s
 
Mod4 l2.2
Mod4 l2.2Mod4 l2.2
Mod4 l2.2
 
2.2
2.22.2
2.2
 
Chapter01discovering computers2012
Chapter01discovering computers2012Chapter01discovering computers2012
Chapter01discovering computers2012
 
2.4
2.42.4
2.4
 
Chapter04 system unit
Chapter04 system unitChapter04 system unit
Chapter04 system unit
 
2.3
2.32.3
2.3
 
Lo1.1 safety precautions
Lo1.1 safety precautionsLo1.1 safety precautions
Lo1.1 safety precautions
 
Ergonomics
ErgonomicsErgonomics
Ergonomics
 
Ict integrated lesson plan isodel - ver 2.0
Ict integrated lesson plan   isodel - ver 2.0Ict integrated lesson plan   isodel - ver 2.0
Ict integrated lesson plan isodel - ver 2.0
 
Mod4 l2.1
Mod4 l2.1Mod4 l2.1
Mod4 l2.1
 
Troubleshoot beeping computers
Troubleshoot beeping computersTroubleshoot beeping computers
Troubleshoot beeping computers
 
Ict based discussion lesson plan {powerpoint}
Ict based discussion lesson plan {powerpoint}Ict based discussion lesson plan {powerpoint}
Ict based discussion lesson plan {powerpoint}
 
MY ICT LESSON PLAN 3
MY ICT LESSON PLAN 3MY ICT LESSON PLAN 3
MY ICT LESSON PLAN 3
 
Interdisciplinary Lesson Plan ICT-Art
Interdisciplinary Lesson Plan ICT-ArtInterdisciplinary Lesson Plan ICT-Art
Interdisciplinary Lesson Plan ICT-Art
 
Port types
Port typesPort types
Port types
 
Introducing ppt 2010
Introducing ppt 2010Introducing ppt 2010
Introducing ppt 2010
 
Lo1.2 types of computer system error
Lo1.2 types of computer system errorLo1.2 types of computer system error
Lo1.2 types of computer system error
 

Similaire à Guidelines and code of conduct in using the computer

#4 gr.-3 elements of a computer system - 4
#4   gr.-3 elements of a computer system - 4#4   gr.-3 elements of a computer system - 4
#4 gr.-3 elements of a computer system - 4Shirley Valera
 
User responsibilities policy
User responsibilities policyUser responsibilities policy
User responsibilities policyJigyanshu Jangid
 
Bs rua
Bs ruaBs rua
Bs ruaRoss
 
Computer Laboratoy Guidelines 1.1.4
Computer Laboratoy Guidelines 1.1.4Computer Laboratoy Guidelines 1.1.4
Computer Laboratoy Guidelines 1.1.4Keshuv
 
Presentation computer care
Presentation   computer carePresentation   computer care
Presentation computer careaneita28
 
Quick Safety Tips
Quick Safety TipsQuick Safety Tips
Quick Safety TipsMiss Cheska
 
21st Century Learning Initiative Training Slideshow
21st Century Learning Initiative Training Slideshow21st Century Learning Initiative Training Slideshow
21st Century Learning Initiative Training SlideshowPunxsutawney School District
 
1 1 laptop 2013 copy
1  1 laptop 2013 copy1  1 laptop 2013 copy
1 1 laptop 2013 copyDebbie Oliver
 
JOVEN LOPEZ(PPT, TECHNOLOGY)_1.pptx
JOVEN LOPEZ(PPT, TECHNOLOGY)_1.pptxJOVEN LOPEZ(PPT, TECHNOLOGY)_1.pptx
JOVEN LOPEZ(PPT, TECHNOLOGY)_1.pptxJovenLopez1
 
Cyber security awareness training by cyber security infotech(csi)
Cyber security awareness training by cyber security infotech(csi)Cyber security awareness training by cyber security infotech(csi)
Cyber security awareness training by cyber security infotech(csi)Cyber Security Infotech
 
4 mobile and remote best practices
4   mobile and remote best practices 4   mobile and remote best practices
4 mobile and remote best practices mohamad Hamizi
 
Cyber pledge infoMagnum
Cyber pledge infoMagnumCyber pledge infoMagnum
Cyber pledge infoMagnumARUN REDDY M
 

Similaire à Guidelines and code of conduct in using the computer (20)

#4 gr.-3 elements of a computer system - 4
#4   gr.-3 elements of a computer system - 4#4   gr.-3 elements of a computer system - 4
#4 gr.-3 elements of a computer system - 4
 
User responsibilities policy
User responsibilities policyUser responsibilities policy
User responsibilities policy
 
Bs rua
Bs ruaBs rua
Bs rua
 
Computer Laboratoy Guidelines 1.1.4
Computer Laboratoy Guidelines 1.1.4Computer Laboratoy Guidelines 1.1.4
Computer Laboratoy Guidelines 1.1.4
 
Laptop Training Revised
Laptop Training RevisedLaptop Training Revised
Laptop Training Revised
 
Presentation computer care
Presentation   computer carePresentation   computer care
Presentation computer care
 
Ch 11
Ch 11Ch 11
Ch 11
 
Quick Safety Tips
Quick Safety TipsQuick Safety Tips
Quick Safety Tips
 
laptoptraining
laptoptraininglaptoptraining
laptoptraining
 
IT Policy
IT Policy IT Policy
IT Policy
 
Safety Presentation
Safety PresentationSafety Presentation
Safety Presentation
 
21st Century Learning Initiative Training Slideshow
21st Century Learning Initiative Training Slideshow21st Century Learning Initiative Training Slideshow
21st Century Learning Initiative Training Slideshow
 
1 1 laptop 2013 copy
1  1 laptop 2013 copy1  1 laptop 2013 copy
1 1 laptop 2013 copy
 
JOVEN LOPEZ(PPT, TECHNOLOGY)_1.pptx
JOVEN LOPEZ(PPT, TECHNOLOGY)_1.pptxJOVEN LOPEZ(PPT, TECHNOLOGY)_1.pptx
JOVEN LOPEZ(PPT, TECHNOLOGY)_1.pptx
 
Cyber security awareness training by cyber security infotech(csi)
Cyber security awareness training by cyber security infotech(csi)Cyber security awareness training by cyber security infotech(csi)
Cyber security awareness training by cyber security infotech(csi)
 
4 mobile and remote best practices
4   mobile and remote best practices 4   mobile and remote best practices
4 mobile and remote best practices
 
2015 parent presentation yr 7 12 slideshare
2015 parent presentation yr 7   12 slideshare2015 parent presentation yr 7   12 slideshare
2015 parent presentation yr 7 12 slideshare
 
Netbook Orientation
Netbook OrientationNetbook Orientation
Netbook Orientation
 
Cyber pledge infoMagnum
Cyber pledge infoMagnumCyber pledge infoMagnum
Cyber pledge infoMagnum
 
MODULE 3.pptx
MODULE 3.pptxMODULE 3.pptx
MODULE 3.pptx
 

Plus de Frya Lora

Troubleshooting vocab
Troubleshooting vocabTroubleshooting vocab
Troubleshooting vocabFrya Lora
 
Lo1.3 diagnosing computer systems
Lo1.3 diagnosing computer systemsLo1.3 diagnosing computer systems
Lo1.3 diagnosing computer systemsFrya Lora
 
Network cable
Network cableNetwork cable
Network cableFrya Lora
 
1.5 tools(cn)
1.5 tools(cn)1.5 tools(cn)
1.5 tools(cn)Frya Lora
 
1.3 computer system devices&peripherals
1.3 computer system devices&peripherals1.3 computer system devices&peripherals
1.3 computer system devices&peripheralsFrya Lora
 
Kinds of computer g9
Kinds of computer g9Kinds of computer g9
Kinds of computer g9Frya Lora
 
Viewing the worksheet in different ways
Viewing the worksheet in different waysViewing the worksheet in different ways
Viewing the worksheet in different waysFrya Lora
 
L1 introenparts
L1 introenpartsL1 introenparts
L1 introenpartsFrya Lora
 
Ppt intro watukendu
Ppt intro watukenduPpt intro watukendu
Ppt intro watukenduFrya Lora
 
Ms office ppt 2010 views
Ms office ppt 2010 viewsMs office ppt 2010 views
Ms office ppt 2010 viewsFrya Lora
 

Plus de Frya Lora (13)

Troubleshooting vocab
Troubleshooting vocabTroubleshooting vocab
Troubleshooting vocab
 
GPU
GPUGPU
GPU
 
Lo1.3 diagnosing computer systems
Lo1.3 diagnosing computer systemsLo1.3 diagnosing computer systems
Lo1.3 diagnosing computer systems
 
Network cable
Network cableNetwork cable
Network cable
 
1.5 tools(cn)
1.5 tools(cn)1.5 tools(cn)
1.5 tools(cn)
 
1.4 network
1.4 network1.4 network
1.4 network
 
1.3 computer system devices&peripherals
1.3 computer system devices&peripherals1.3 computer system devices&peripherals
1.3 computer system devices&peripherals
 
Lesson 1 cn
Lesson 1 cnLesson 1 cn
Lesson 1 cn
 
Kinds of computer g9
Kinds of computer g9Kinds of computer g9
Kinds of computer g9
 
Viewing the worksheet in different ways
Viewing the worksheet in different waysViewing the worksheet in different ways
Viewing the worksheet in different ways
 
L1 introenparts
L1 introenpartsL1 introenparts
L1 introenparts
 
Ppt intro watukendu
Ppt intro watukenduPpt intro watukendu
Ppt intro watukendu
 
Ms office ppt 2010 views
Ms office ppt 2010 viewsMs office ppt 2010 views
Ms office ppt 2010 views
 

Dernier

The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 

Dernier (20)

The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 

Guidelines and code of conduct in using the computer

  • 1.
  • 2.  Be Responsible- Protect the computer you are using.  Be Smart- Report immediately to your teacher any hardware and software trouble for proper diagnosis and repair.  Be Courteous- Ask permission from the teacher or the regularly assigned user before using the computer unit.
  • 3.  Be Conscious of Cleanliness and Orderliness- Clean the computer and tables regularly to keep them free from dust.  Be Considerate-Avoid placing cellphones and speakers beside the computer monitors.  Be Cautious- Avoid using diskettes or other external computer-related media from an outside source.
  • 4.  Be Organized and Systematic- each finished job should be labeled and have back-up files.  Be Cost Efficient- Refrain from using the Internet and downloading files not related to the scope of the lesson, unless needed and with the teacher’s consent. Playing computer games is strictly prohibited.