• Share
  • Email
  • Embed
  • Like
  • Save
  • Private Content
Computer Lab Management and Ethics in Using Computer
 

Computer Lab Management and Ethics in Using Computer

on

  • 9,149 views

ICTL - Computer Lab Management (Form 1)

ICTL - Computer Lab Management (Form 1)

Statistics

Views

Total Views
9,149
Views on SlideShare
9,123
Embed Views
26

Actions

Likes
1
Downloads
78
Comments
0

3 Embeds 26

http://arshadcekguict.blogspot.com 23
http://web0223.1bestarinet.net 2
http://www.slashdocs.com 1

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

    Computer Lab Management and Ethics in Using Computer Computer Lab Management and Ethics in Using Computer Presentation Transcript

    • COMPUTER LABMANAGEMENT
    • COMPUTER LAB RULES AND REGULATIONS
    • 1.Students are prohibited to enter the lab unless authorized by the teacher2.Scan diskettes/ thumb drive before using them.3.Report all the problems related to the system to the teacher
    • 4. Do not attempt to repair with lab equipment.5. Be responsible when using equipment, software and facilities in the lab.6. Do not move any equipment from original position.7. Do not remove or load any software into the computer.
    • 8. Do not change the settings in the computer.9. Save all work in the external storage device and not in the computer.10. Do not bring in bags, food and drink into the lab.11. Turn off the computer accordingly after use.
    • 12. Switch off all power supplies before leaving the lab.13. Internet facilities is strictly for educational purposes only.14. All users should record the use of computer in the computer logbook.15. The lab should be kept clean and tidy at all times.
    • ETHICS IN USING COMPUTER
    • 10 IMPORTANT INSTRUCTIONS OF COMPUTER ETHICS1. You should not use a computer to harm other people.2. You shall not interfere with other people’s computer work.3. You shall not use a computer to steal4. You shall not copy or use software for which you have not paid illegally5. You shall not use other people’s computer resources without permission or proper compensation.
    • 6. You shall not look around in other people’s computer files7. You shall not use a computer to give false identity.8. You shall not correct other people’s ideas or works9. You shall think about the social effects on the program you are writing or the system you are designing.10.You shall always use a computer in ways that ensure consideration and respect for your fellow friends.
    • COPYRIGHT Is a legal right given to the owner of a copyright to prevent others from copying an artistic works, literary, dramatic or music work. Only the copyright owner has the legal right to reproduce the work in any form and has the right to sue others who copy or distribute unauthorized work without the copyright.• Copyright symbol © or (c)
    • To reproduce the To distribute copies of Sufficient effort haswork the work to the public been expected to by sale or transfer of make work original in ownership, or by character rental, lease, or lendingThe owner ofcopyright has the To disallow other The work has beenspecial right to do persons from using the written down,and authorize the work without recorded or reduced tofollowing permission material form To carry out the workTo prepare copies publicly. (copyright The author is qualifiedworks based protection in Malaysia is person or the work isupon the work governed by the made in Malaysia or Copyright Act 1987. a the work is published work that is eligible is in Malaysia protected automatically upon fulfillment of the following conditions:-
    • COPYRIGHT VIOLATIONA person who does not own the copyright and withoutlicense from the owner or does not have permission inany of the following acts has broken the copyright law
    • Respect the rights and No one should purposelyproperty of others by attempt to weaken the Respect and not accessing other system security or abide by member’s data disturbed system copyright laws performance through “hacking” Send no obscene orharassing messages in Resources are not to beany format in violation used for businessof any applicable law. A person that purposes or private gain. want to use anyEmail messages should copyrightedbe brief, occasional and resources must: Changing of system should indicate the settings is not allowed sender’s true identity Downloading, Use resources only for academicinstallation, or removal assignments and official education andof software or hardware research and not reproduced in any is not allowed material form to the public
    • PLAGIARISMCopying or paraphrasing information from a source without giving credit to the owner.• Using images, audio or video without permission or without giving credit is also plagiarism.
    • EFFECT OF PLAGIARISM Plagiarism is a serious academic offence for students. Any use of another person’s work or ideas must beacknowledged. If you fail to do this, you may fail in the examination or your name maybe removed from the pass list
    • HOW TO AVOID PLAGIARISM Take good notes. Write down Put away your source before Put quotation you begin to write. Read your the tittle, the name of the marks around any source, and then write from source, the author, the page language you your memory. After you write,number(s), and the date for any reproduce you can recheck yourlanguage you copy or adapt and directly from the paraphrase or summary againstfor each of piece of information source the original for accuracy you record