Computer Ethics JSS 2

Computer Ethics

TOPIC: Computer Ethics

CLASS: JSS Two

Definition of Computer Ethics

Computer ethics can be defined as the set of moral principles that regulate the use of computers.

Responsible use of Computer and Internet

The following are the basic security measures taken to prevent damage to the computer system.
1. There must be adequate ventilation.
2. Adequate space must be allowed between each system unit.
3. Avoid dust by using a cover.
4. Avoid moisture.
5. Provision of air conditioners and fans or other cooling machines.
6. Provision of UPS (Uninterruptible Power Supply) and other electrical appliances to avoid loss of information and electrical damage to the system.
7. Adequate care must be taken with storage devices like diskettes, flash drives, CD/DVD writer drives, etc.
8. Disallow an unauthorized user from having access to your computer.
9. Ensure maximum security of files and information on the computer.
10. Provide computer with anti-virus program to avoid viruses.
11. Avoiding food particles dropping into the system.
12. Unplug the system when not in use for a long.
13. Check your email regularly.
14. Give prompt and polite responses to emails.

Reasons for Taking Care of the Computer

a. To avoid damage to files
b. To protect the system
c. To prolong the life of the system
d. To make the user comfortable for maximum efficiency.

Areas of Misusing the Computer

The following are areas in which computers can be misused.
1. Invasion of privacy (hacking):A lot of information can be passed to several places and among people through the internet. To this end, the privacy of information cannot be guaranteed; hence someone can have access to another person’s information. People who gain unauthorized access to a computer system or data belonging to somebody else are called hackers. They invade computer databases to steal the identities of other people by obtaining private information about them
2. Computer virus: This can affect the computer through the internet where unsolicited information is sent to destroy files in other computers. A computer virus can also occur when diskettes, CDs, DVDs, and flash drives that have been corrupted are used in another computer. It is, therefore, necessary that anti-virus programs are installed on our computers to detect and clean any virus that may want to attack our computers.
3. Fraud: Through the internet and computer networks a lot of deception and scams can be perpetrated by dubious people.
4. Stealing: people can steal very important documents, information and money through the misuse of computers and the internet.
5. Pornography: Children and adults misuse the computer by watching pornographic films and pictures on the internet. These are pictures of nude people and obscene sexual acts on the internet.
6. Cyberwar: this is the use of computers and the internet in conducting warfare in cyberspace. The type of attacks includes web vandalism, propaganda, where political messages can be spread through or to anyone with access to the internet, equipment destruction, where military activities that use computers and satellites for coordination are at risk and their communications and orders intercepted or replaced thereby putting a soldier at risk.
8. Software piracy: This is the situation where programs written by people are used without their permission.
9. Plagiarism: This is the situation where the original works of people especially books and other works are copied verbatim (word for word). Without due acknowledgement of the owner. All this can happen on the internet.

Comments

  1. This is a very useful site. But please can you give me two sources of dust generation in the computer lab

    ReplyDelete
  2. This comment has been removed by the author.

    ReplyDelete

Post a Comment

Popular posts from this blog

90 Objective Examination Questions in Major Subjects

Complete Computer Studies/ICT Curriculum for JSS 1 to SSS 3

JSS One Objective Questions in Computer Studies/Information Technology