SlideShare a Scribd company logo
1 of 15
A trip to ICT and Society
G7-Newton Multimedia
Productionspresents...A Group 5 G7NEWTON Production
By: Group 2 ICT-TLE
Grade 7-Newton
Members will follow via discussion
THE TEN
COMMANDMENTS
IN COMPUTER
ETHICS
A trip to ICT and Society
Before Proceeding, a simple reminder
about this presentation...
The Reporters will discuss about this
lesson. No explanations can be found on
this presentation.
THE TEN
COMMANDMENTS IN
COMPUTER ETHICS
A trip to ICT and Society
Just like the ten commandments from the Bible,
Computers have these sets of commandments as
well. Click on any number to discover these
commandments:
1
9 10
5 6 7 8
432
V
I
D
E
O
THE FOLLOWING VIDEO IS COPYRIGHTED TO
MR. DANIELLE EDUARDO
We value this video and the creator and
therefore acknowledge him for his work.
You may watch it again on youtube:
http://www.youtube.com/watch?v=HwSHJg7cS
XM
COMMANDMENT #1:
Thou shall not use a computer in ways that may harm people.
Or simply:
Do not use a computer in ways that
may harm other people.
COMMANDMENT #2:
Thou shall not interfere with other people's computer work.
Or simply:
Do not use computer technology to
cause interference in other users'
work.
COMMANDMENT #3:
Thou shall not snoop around in other people's computer files.
Or simply:
Do not spy on another person's
computer data.
COMMANDMENT #4:
Thou shall not use a computer to steal.
Or simply:
Do not use computer technology to
steal information.
COMMANDMENT #5:
Thou shall not use a computer to false witness
Or simply:
Do not contribute to the spread of
misinformation using computer
technology.
COMMANDMENT #6:
Thou shall not copy or use proprietary software for which you
have not paid.
Or simply:
Refrain from copying software or
buying pirated copies. Pay for software
unless it is free.
COMMANDMENT #7:
Thou shall not use other people's computer resources
without authorization or proper compensation.
Or simply:
Do not use someone else's computer
resources unless authorized to.
COMMANDMENT #8:
Thou shall not appropriate other people's intellectual output.
Or simply:
It is wrong to claim ownership on a
work which is the output of someone's
else's intellect.
COMMANDMENT #9:
Thou shall think about the social consequences of the
program you are writing or the system you are designing.
Or simply:
Before developing a software, think
about the social impact it can have.
COMMANDMENT #10:
Thou shall always use a computer in ways that ensure
consideration and respect for your fellow humans.
Or simply:
In using computers for
communication, be respectful and
courteous with the fellow members.
RETURN EXIT

More Related Content

Similar to A Trip to ICT and Society Series 1 : The Ten Commandments of the Internet

Super billing computers are your future
Super billing computers are your futureSuper billing computers are your future
Super billing computers are your futuresuperb11b
 
etiquettes-grade 7.pptx
etiquettes-grade 7.pptxetiquettes-grade 7.pptx
etiquettes-grade 7.pptxCynnePataweg
 
Computer Ethics and Content Marketing Platforms
Computer Ethics and Content Marketing PlatformsComputer Ethics and Content Marketing Platforms
Computer Ethics and Content Marketing PlatformsAmplephi
 
The 10 Commandments of Computer Ethics
The 10 Commandments of Computer EthicsThe 10 Commandments of Computer Ethics
The 10 Commandments of Computer Ethicssmartinson
 
Identify ethical use of computers
Identify ethical use of computersIdentify ethical use of computers
Identify ethical use of computersAl Forte
 
How to promote_smd_services
How to promote_smd_servicesHow to promote_smd_services
How to promote_smd_servicesRobin Pedersen
 
Ethics in using computer
Ethics in using computerEthics in using computer
Ethics in using computeribrahimtbl3147
 
Ethics in using computer
Ethics in using computerEthics in using computer
Ethics in using computerFatin Izzaty
 
Phone 81 development_for_absolute_beginners
Phone 81 development_for_absolute_beginnersPhone 81 development_for_absolute_beginners
Phone 81 development_for_absolute_beginnersJose Luis Fernandez
 
computer and society impact of Computer in society
computer and society  impact of Computer in society computer and society  impact of Computer in society
computer and society impact of Computer in society Sumama Shakir
 
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2JeffUrgelles
 
Your e image presentation 2
Your e image presentation 2Your e image presentation 2
Your e image presentation 2opiedog1
 
Why isn't infosec working? Did you turn it off and back on again?
Why isn't infosec working? Did you turn it off and back on again?Why isn't infosec working? Did you turn it off and back on again?
Why isn't infosec working? Did you turn it off and back on again?Rob Fuller
 
pentest mobile app issue
pentest mobile app issuepentest mobile app issue
pentest mobile app issueshekar M
 
Hushcon 2016 Keynote: Test for Echo
Hushcon 2016 Keynote: Test for EchoHushcon 2016 Keynote: Test for Echo
Hushcon 2016 Keynote: Test for EchoDeja vu Security
 
SPI101_WEEK-3-4_Computer-Ethics.ppsx
SPI101_WEEK-3-4_Computer-Ethics.ppsxSPI101_WEEK-3-4_Computer-Ethics.ppsx
SPI101_WEEK-3-4_Computer-Ethics.ppsxozaixyzo
 
Internet PC Security by Khalil Jubran Mindspring Networks
Internet PC Security  by Khalil Jubran  Mindspring Networks  Internet PC Security  by Khalil Jubran  Mindspring Networks
Internet PC Security by Khalil Jubran Mindspring Networks Khalil Jubran
 

Similar to A Trip to ICT and Society Series 1 : The Ten Commandments of the Internet (20)

Super billing computers are your future
Super billing computers are your futureSuper billing computers are your future
Super billing computers are your future
 
etiquettes-grade 7.pptx
etiquettes-grade 7.pptxetiquettes-grade 7.pptx
etiquettes-grade 7.pptx
 
Computer Ethics and Content Marketing Platforms
Computer Ethics and Content Marketing PlatformsComputer Ethics and Content Marketing Platforms
Computer Ethics and Content Marketing Platforms
 
The 10 Commandments of Computer Ethics
The 10 Commandments of Computer EthicsThe 10 Commandments of Computer Ethics
The 10 Commandments of Computer Ethics
 
Identify ethical use of computers
Identify ethical use of computersIdentify ethical use of computers
Identify ethical use of computers
 
How to promote_smd_services
How to promote_smd_servicesHow to promote_smd_services
How to promote_smd_services
 
Ethics in using computer
Ethics in using computerEthics in using computer
Ethics in using computer
 
Ethics in using computer
Ethics in using computerEthics in using computer
Ethics in using computer
 
Phone 81 development_for_absolute_beginners
Phone 81 development_for_absolute_beginnersPhone 81 development_for_absolute_beginners
Phone 81 development_for_absolute_beginners
 
Ethics in-information-security
Ethics in-information-securityEthics in-information-security
Ethics in-information-security
 
computer and society impact of Computer in society
computer and society  impact of Computer in society computer and society  impact of Computer in society
computer and society impact of Computer in society
 
COMPUTER APPLICATIONS Module 5.pptx
COMPUTER APPLICATIONS Module 5.pptxCOMPUTER APPLICATIONS Module 5.pptx
COMPUTER APPLICATIONS Module 5.pptx
 
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2
 
Your e image presentation 2
Your e image presentation 2Your e image presentation 2
Your e image presentation 2
 
Why isn't infosec working? Did you turn it off and back on again?
Why isn't infosec working? Did you turn it off and back on again?Why isn't infosec working? Did you turn it off and back on again?
Why isn't infosec working? Did you turn it off and back on again?
 
pentest mobile app issue
pentest mobile app issuepentest mobile app issue
pentest mobile app issue
 
6 professional ethics
6 professional ethics6 professional ethics
6 professional ethics
 
Hushcon 2016 Keynote: Test for Echo
Hushcon 2016 Keynote: Test for EchoHushcon 2016 Keynote: Test for Echo
Hushcon 2016 Keynote: Test for Echo
 
SPI101_WEEK-3-4_Computer-Ethics.ppsx
SPI101_WEEK-3-4_Computer-Ethics.ppsxSPI101_WEEK-3-4_Computer-Ethics.ppsx
SPI101_WEEK-3-4_Computer-Ethics.ppsx
 
Internet PC Security by Khalil Jubran Mindspring Networks
Internet PC Security  by Khalil Jubran  Mindspring Networks  Internet PC Security  by Khalil Jubran  Mindspring Networks
Internet PC Security by Khalil Jubran Mindspring Networks
 

More from ianpoblete13

Edukasyon sa Pagpapakatao - Module 6 (Karapatan at Tungkulin)
Edukasyon sa Pagpapakatao - Module 6 (Karapatan at Tungkulin)Edukasyon sa Pagpapakatao - Module 6 (Karapatan at Tungkulin)
Edukasyon sa Pagpapakatao - Module 6 (Karapatan at Tungkulin)ianpoblete13
 
Signal number 5: Meteorological Outcomes
Signal number 5: Meteorological OutcomesSignal number 5: Meteorological Outcomes
Signal number 5: Meteorological Outcomesianpoblete13
 
Power of the internet PART 3
Power of the internet PART 3Power of the internet PART 3
Power of the internet PART 3ianpoblete13
 
A trip to ict and society
A trip to ict and societyA trip to ict and society
A trip to ict and societyianpoblete13
 
A Trip to ICT and Society Series 1 : INFECTED! PART 2
A Trip to ICT and Society Series 1 : INFECTED! PART 2A Trip to ICT and Society Series 1 : INFECTED! PART 2
A Trip to ICT and Society Series 1 : INFECTED! PART 2ianpoblete13
 
A Trip to ICT and Society Series 1 : INFECTED! PART 1
A Trip to ICT and Society Series 1 : INFECTED! PART 1 A Trip to ICT and Society Series 1 : INFECTED! PART 1
A Trip to ICT and Society Series 1 : INFECTED! PART 1 ianpoblete13
 
A Trip to ICT and Society Series 1 : INFECTED! PART 2
A Trip to ICT and Society Series 1 : INFECTED! PART 2A Trip to ICT and Society Series 1 : INFECTED! PART 2
A Trip to ICT and Society Series 1 : INFECTED! PART 2ianpoblete13
 
Power of the internet PART 1
Power of the internet PART 1Power of the internet PART 1
Power of the internet PART 1ianpoblete13
 

More from ianpoblete13 (8)

Edukasyon sa Pagpapakatao - Module 6 (Karapatan at Tungkulin)
Edukasyon sa Pagpapakatao - Module 6 (Karapatan at Tungkulin)Edukasyon sa Pagpapakatao - Module 6 (Karapatan at Tungkulin)
Edukasyon sa Pagpapakatao - Module 6 (Karapatan at Tungkulin)
 
Signal number 5: Meteorological Outcomes
Signal number 5: Meteorological OutcomesSignal number 5: Meteorological Outcomes
Signal number 5: Meteorological Outcomes
 
Power of the internet PART 3
Power of the internet PART 3Power of the internet PART 3
Power of the internet PART 3
 
A trip to ict and society
A trip to ict and societyA trip to ict and society
A trip to ict and society
 
A Trip to ICT and Society Series 1 : INFECTED! PART 2
A Trip to ICT and Society Series 1 : INFECTED! PART 2A Trip to ICT and Society Series 1 : INFECTED! PART 2
A Trip to ICT and Society Series 1 : INFECTED! PART 2
 
A Trip to ICT and Society Series 1 : INFECTED! PART 1
A Trip to ICT and Society Series 1 : INFECTED! PART 1 A Trip to ICT and Society Series 1 : INFECTED! PART 1
A Trip to ICT and Society Series 1 : INFECTED! PART 1
 
A Trip to ICT and Society Series 1 : INFECTED! PART 2
A Trip to ICT and Society Series 1 : INFECTED! PART 2A Trip to ICT and Society Series 1 : INFECTED! PART 2
A Trip to ICT and Society Series 1 : INFECTED! PART 2
 
Power of the internet PART 1
Power of the internet PART 1Power of the internet PART 1
Power of the internet PART 1
 

Recently uploaded

Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxJiesonDelaCerna
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupJonathanParaisoCruz
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentInMediaRes1
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfadityarao40181
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 

Recently uploaded (20)

Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptx
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized Group
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media Component
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdf
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 

A Trip to ICT and Society Series 1 : The Ten Commandments of the Internet

  • 1. A trip to ICT and Society G7-Newton Multimedia Productionspresents...A Group 5 G7NEWTON Production
  • 2. By: Group 2 ICT-TLE Grade 7-Newton Members will follow via discussion THE TEN COMMANDMENTS IN COMPUTER ETHICS A trip to ICT and Society Before Proceeding, a simple reminder about this presentation... The Reporters will discuss about this lesson. No explanations can be found on this presentation.
  • 3. THE TEN COMMANDMENTS IN COMPUTER ETHICS A trip to ICT and Society Just like the ten commandments from the Bible, Computers have these sets of commandments as well. Click on any number to discover these commandments: 1 9 10 5 6 7 8 432 V I D E O
  • 4. THE FOLLOWING VIDEO IS COPYRIGHTED TO MR. DANIELLE EDUARDO We value this video and the creator and therefore acknowledge him for his work. You may watch it again on youtube: http://www.youtube.com/watch?v=HwSHJg7cS XM
  • 5. COMMANDMENT #1: Thou shall not use a computer in ways that may harm people. Or simply: Do not use a computer in ways that may harm other people.
  • 6. COMMANDMENT #2: Thou shall not interfere with other people's computer work. Or simply: Do not use computer technology to cause interference in other users' work.
  • 7. COMMANDMENT #3: Thou shall not snoop around in other people's computer files. Or simply: Do not spy on another person's computer data.
  • 8. COMMANDMENT #4: Thou shall not use a computer to steal. Or simply: Do not use computer technology to steal information.
  • 9. COMMANDMENT #5: Thou shall not use a computer to false witness Or simply: Do not contribute to the spread of misinformation using computer technology.
  • 10. COMMANDMENT #6: Thou shall not copy or use proprietary software for which you have not paid. Or simply: Refrain from copying software or buying pirated copies. Pay for software unless it is free.
  • 11. COMMANDMENT #7: Thou shall not use other people's computer resources without authorization or proper compensation. Or simply: Do not use someone else's computer resources unless authorized to.
  • 12. COMMANDMENT #8: Thou shall not appropriate other people's intellectual output. Or simply: It is wrong to claim ownership on a work which is the output of someone's else's intellect.
  • 13. COMMANDMENT #9: Thou shall think about the social consequences of the program you are writing or the system you are designing. Or simply: Before developing a software, think about the social impact it can have.
  • 14. COMMANDMENT #10: Thou shall always use a computer in ways that ensure consideration and respect for your fellow humans. Or simply: In using computers for communication, be respectful and courteous with the fellow members.