SlideShare une entreprise Scribd logo
1  sur  35
Computer Ethics
What does Ethics mean?
Computer Ethics
What does Ethics mean?
Ethics can be defined as either principles,moral
belief or moral values
The ten commandments of
computer ethics

There are 10 commandments we must follow
when working with computers
Commandment 1

Thou shalt not use a computer to ____ other
people.
a) Educate
b) Harm
c) Provoke
Commandment 1

Thou shalt not use a computer to ____ other
people.
b) Harm
Commandment 1
It is unethical to use a
computer to harm
another user such as
corrupting their data
files or stealing
personal information.
Commandment 2

Thou shalt not ______ with other people's
computer work.
a) copy
b) borrow
c) interfere
Commandment 2

Thou shalt not ______ with other people's
computer work.
c) interfere
Commandment 2
It is unethical to create
viruses as these can
damage the data of
users or make the
hardware perform
slower
Commandment 3

Thou shalt not _____ around in other people's
files.
a) dance
b) Snoop
c) share
Commandment 3

Thou shalt not _____ around in other people's
files.
b) Snoop
Commandment 3

It is unethical to read
someone's email
messages or having
unauthorised access
to someone's
computer to obtain
files or data as it is a
direct invasion of
their privacy.
Commandment 4

Thou shalt not use a computer to ____.
a) steal
b) cook
c) download
Commandment 4

Thou shalt not use a computer to ____.
a) steal
b) cook
c) download
Commandment 4

Thou shalt not use a computer to ____.
a) steal
Commandment 4
Stealing sensitive
information such as
personal information
about employees or
breaking into bank
accounts is treated
as robbery in some
countries. This can
be classed as fraud.
Commandment 5

Thou shalt not use a computer to bear false
_______.
a) Information
b) stories
c) witness
Commandment 5

Thou shalt not use a computer to bear false
_______.
c) witness
Commandment 5
It is unethical to spread rumours or false
information about people/incidents/historical
events on the internet.
Commandment 6

Thou shalt not use or copy _____ for which
you have not paid for.
a)Software
b) Hardware
c) Operating System
Commandment 6

Thou shalt not use or copy _____ for which
you have not paid for.
a)Software
Commandment 6
Software is protected under copyright laws
which means it is unethical to use if it has not
been purchased.
Commandment 7

Thou shalt not use other people's computer
resources without ________.
a) Authorisation
b) Acknowledgement
c) Money
Commandment 7

Thou shalt not use other people's computer
resources without ________.
a) Authorisation
Commandment 7
Important
information on a
network can be
accessed with
specific Ids and
passwords. It is
unethical to hack
into password
protected
systems.
Another extreme example
Commandment 8

Thou shalt not appropriate other people's
_______ output.
a) Online
b) Intellectual
c) Digital
Commandment 8

Thou shalt not appropriate other people's
_______ output.
b) Intellectual
Commandment 8
Pretending someone's
work is your own is
considered unethical
and is known as
plagiarism. You
should always get
permission from
artist and give credit.
Commandment 9

Thou shalt think about the _____
consequences of the program you write.
a) fantastic
b) social
c) negative
Commandment 9

Thou shalt think about the _____
consequences of the program you write.
b) social
Commandment 9
When designing
software or a
computer system, we
must consider it's
affect on certain
sections of society so
it doesn't not offend
anyone.
Commandment 10

Thou shalt use a computer in ways that show
consideration and _____.
a)honour
b) mercy
c) respect
Commandment 10

Thou shalt use a computer in ways that show
consideration and _____.
c) respect
Commandment 10

It is considered
ethical to show
respect when online
and when socialising
through the internet
as well.

Contenu connexe

En vedette

Keywords used in javascript
Keywords used in javascriptKeywords used in javascript
Keywords used in javascriptMax Friel
 
Web design save earth
Web design save earthWeb design save earth
Web design save earthMax Friel
 
Summer course
Summer courseSummer course
Summer courseMax Friel
 
Lesson plan 2 matt 3
Lesson plan 2 matt 3Lesson plan 2 matt 3
Lesson plan 2 matt 3Max Friel
 
Group web design
Group web designGroup web design
Group web designMax Friel
 
Creating a program from flowchart
Creating a program from flowchartCreating a program from flowchart
Creating a program from flowchartMax Friel
 
Errors in coding
Errors in codingErrors in coding
Errors in codingMax Friel
 

En vedette (10)

Keywords used in javascript
Keywords used in javascriptKeywords used in javascript
Keywords used in javascript
 
Web design save earth
Web design save earthWeb design save earth
Web design save earth
 
Summer course
Summer courseSummer course
Summer course
 
Lesson plan 2 matt 3
Lesson plan 2 matt 3Lesson plan 2 matt 3
Lesson plan 2 matt 3
 
Group web design
Group web designGroup web design
Group web design
 
Basics
BasicsBasics
Basics
 
Creating a program from flowchart
Creating a program from flowchartCreating a program from flowchart
Creating a program from flowchart
 
Code
CodeCode
Code
 
Errors in coding
Errors in codingErrors in coding
Errors in coding
 
Untitled 1
Untitled 1Untitled 1
Untitled 1
 

Similaire à Lesson 5 may 4

Cybersecurity.pptx
Cybersecurity.pptxCybersecurity.pptx
Cybersecurity.pptxssuser2209e8
 
the lesson about the information and communication to technology
the lesson about the information and communication to technologythe lesson about the information and communication to technology
the lesson about the information and communication to technologylcnemedez
 
etiquettes-grade 7.pptx
etiquettes-grade 7.pptxetiquettes-grade 7.pptx
etiquettes-grade 7.pptxCynnePataweg
 
Ten commandments
Ten commandmentsTen commandments
Ten commandmentslsanford84
 
computer ethics.pptx
computer ethics.pptxcomputer ethics.pptx
computer ethics.pptxglorysunny
 
The 10 Commandments of Computer Ethics
The 10 Commandments of Computer EthicsThe 10 Commandments of Computer Ethics
The 10 Commandments of Computer Ethicssmartinson
 
Computer Ethics and Content Marketing Platforms
Computer Ethics and Content Marketing PlatformsComputer Ethics and Content Marketing Platforms
Computer Ethics and Content Marketing PlatformsAmplephi
 
Ethical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its ProspectsEthical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its ProspectsRwik Kumar Dutta
 
Computer Ethics
Computer EthicsComputer Ethics
Computer EthicsRamki M
 
Computer safety
Computer safetyComputer safety
Computer safetyahentz
 
Ethics in using computer
Ethics in using computerEthics in using computer
Ethics in using computerFatin Izzaty
 
Chapter 4_Information, Control, and Privacy.pptx
Chapter 4_Information, Control, and Privacy.pptxChapter 4_Information, Control, and Privacy.pptx
Chapter 4_Information, Control, and Privacy.pptxnorwinadriatico
 
Identify ethical use of computers
Identify ethical use of computersIdentify ethical use of computers
Identify ethical use of computersAl Forte
 

Similaire à Lesson 5 may 4 (20)

Cybersecurity.pptx
Cybersecurity.pptxCybersecurity.pptx
Cybersecurity.pptx
 
the lesson about the information and communication to technology
the lesson about the information and communication to technologythe lesson about the information and communication to technology
the lesson about the information and communication to technology
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
etiquettes-grade 7.pptx
etiquettes-grade 7.pptxetiquettes-grade 7.pptx
etiquettes-grade 7.pptx
 
3 Rd Computer Ethics
3 Rd Computer Ethics3 Rd Computer Ethics
3 Rd Computer Ethics
 
Ten commandments
Ten commandmentsTen commandments
Ten commandments
 
Ethics in computing
Ethics in computingEthics in computing
Ethics in computing
 
computer ethics.pptx
computer ethics.pptxcomputer ethics.pptx
computer ethics.pptx
 
Computer security
Computer securityComputer security
Computer security
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
The 10 Commandments of Computer Ethics
The 10 Commandments of Computer EthicsThe 10 Commandments of Computer Ethics
The 10 Commandments of Computer Ethics
 
Computer Ethics and Content Marketing Platforms
Computer Ethics and Content Marketing PlatformsComputer Ethics and Content Marketing Platforms
Computer Ethics and Content Marketing Platforms
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Ethical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its ProspectsEthical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its Prospects
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Computer safety
Computer safetyComputer safety
Computer safety
 
Ethics in using computer
Ethics in using computerEthics in using computer
Ethics in using computer
 
shubhangi.pptx
shubhangi.pptxshubhangi.pptx
shubhangi.pptx
 
Chapter 4_Information, Control, and Privacy.pptx
Chapter 4_Information, Control, and Privacy.pptxChapter 4_Information, Control, and Privacy.pptx
Chapter 4_Information, Control, and Privacy.pptx
 
Identify ethical use of computers
Identify ethical use of computersIdentify ethical use of computers
Identify ethical use of computers
 

Plus de Max Friel

Plus de Max Friel (20)

Assum 4
Assum 4Assum 4
Assum 4
 
Tourism
TourismTourism
Tourism
 
Project 1
Project 1Project 1
Project 1
 
Practice and debugging
Practice and debuggingPractice and debugging
Practice and debugging
 
Debugging
DebuggingDebugging
Debugging
 
Strings
StringsStrings
Strings
 
Loops
LoopsLoops
Loops
 
Loops
LoopsLoops
Loops
 
If conditions
If conditionsIf conditions
If conditions
 
Variables
VariablesVariables
Variables
 
Developing html skills 1
Developing html skills 1Developing html skills 1
Developing html skills 1
 
Matching game
Matching gameMatching game
Matching game
 
activity flowcharts
activity flowchartsactivity flowcharts
activity flowcharts
 
Lesson one
Lesson oneLesson one
Lesson one
 
Law
LawLaw
Law
 
Phishing
PhishingPhishing
Phishing
 
Tourism in bangkok
Tourism in bangkokTourism in bangkok
Tourism in bangkok
 
Untitled 2
Untitled 2Untitled 2
Untitled 2
 
Refresher
RefresherRefresher
Refresher
 
Refresher
RefresherRefresher
Refresher
 

Dernier

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 

Dernier (20)

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 

Lesson 5 may 4