SlideShare a Scribd company logo
COMPUTER EDUCATION 9
MODULE 5
Security and Ethics
Prepared By: Engr. Jeremy M. Flores
TEN COMPUTER ETHICS
(1)
Thou shall not use computer to
harm other people.
TEN COMPUTER ETHICS
(2)
Thou shall not interfere with
other people’s computer work.
TEN COMPUTER ETHICS
(3)
Thou shall not snoop around in
other people’s files.
TEN COMPUTER ETHICS
(4)
Thou shall not use a computer
to steal.
TEN COMPUTER ETHICS
(5)
Thou shall not use a computer
to bear false witness.
TEN COMPUTER ETHICS
(6)
Thou shall not use or copy
software for which you have
not paid.
TEN COMPUTER ETHICS
(7)
Thou shall not use other
people’s computer resources
without authorization.
TEN COMPUTER ETHICS
(8)
Thou shall not appropriate
other people’s intellectual
output.
TEN COMPUTER ETHICS
(9)
Thou shall think about the
social consequences of the
program you write.
TEN COMPUTER ETHICS
(10)
Thou shall use a computer in
ways that shows consideration
and respect.
MALWARE
Malicious Software
A code or software that is
specifically designed to damage,
disrupt, steal, or in general, inflict
some other “bad” or illegitimate
action on data, hosts, or
networks.
MALWARE
Malicious Software
Malware cannot damage the
physical components of
computer systems and network
equipment, but it can damage
the data and software residing on
the equipment.
TYPES OF MALWARE
ADWARE
(Advertising-supported Software)
A software or program that
automatically delivers
advertisements, such as pop-up ads
on websites, and some serves as
revenue generating tool.
TYPES OF MALWARE
BOT or BOTNET
A software or program created to
automatically perform specific
operations. Some are created for
relatively harmless purpose, while
most are used for DoS attacks.
TYPES OF MALWARE
RANSOMWARE
A software or program that
essentially holds a computer
system captive, such as
restricting user access to the
computer, while demanding a
ransom.
TYPES OF MALWARE
ROOTKIT
A software or program designed
to remotely access or control a
computer without being detected
by users or security programs.
TYPES OF MALWARE
SPYWARE
A software or program that
functions by spying on user
activity without their knowledge,
such as activity monitoring,
collecting keystrokes, data
harvesting, and the like.
TYPES OF MALWARE
TROJAN HORSE
A software or program that
disguises itself as a normal file or
program to trick users into
copying, downloading, and
installing malware.
TYPES OF MALWARE
VIRUS
A software or program that is
capable of copying itself and
spreading to other computers by
attaching themselves to various
programs and executable files.
TYPES OF MALWARE
COMPUTER WORM
A software or program that spreads
over computer networks by
exploiting computer system
vulnerabilities, and have the ability
to self-replicate and spread
independently.
TYPES OF MALWARE
KEYLOGGER
A software or program that
records keystrokes to steal
information, such as a password.
TYPES OF MALWARE
LOGIC BOMB
A software or program that sits
dormant on a computer until it is
triggered by a specific event,
such as specific date or time.
TOP DEVELOPERS OF MALWARE
United States of America
China
Germany
7th to 10th Rank: Philippines
AVERAGE MALWARE INFECTION
ONE COMPUTER FOR
EVERY TWO MINUTES
INTERVAL.
SYMPTOMS OF MALWARE
Increase CPU usage.
Slow computer or web browser speeds.
Problems connecting to networks.
Freezing or crashing.
Modified or deleted files.
SYMPTOMS OF MALWARE
Appearance of strange files, programs, or
icons.
Programs running, turning off, or
reconfiguring themselves.
Emails being sent automatically.
Strange computer behaviors.
PREVENTION AND REMOVAL
Install and run anti-malware and
firewall software. Choose a program
that offers tools for detecting,
quarantining, and removing multiple
types of malware. A combination of an
anti-malware software and a firewall
will ensure safety.
PREVENTION AND REMOVAL
Keep software and operating systems up
to date with current vulnerability patches
for bugs and security flaws that could be
exploited by attackers.
PREVENTION AND REMOVAL
“HIGHLY IMPORTANT”
Be vigilant when copying and
downloading files, programs,
attachments, and the like.

More Related Content

What's hot

Trojan horse and salami attack
Trojan horse and salami attackTrojan horse and salami attack
Trojan horse and salami attack
guestc8c7c02bb
 
Trojan virus & backdoors
Trojan virus & backdoorsTrojan virus & backdoors
Trojan virus & backdoors
Shrey Vyas
 
Virus (Trojan Horse,Salami Attack)
Virus (Trojan Horse,Salami Attack)Virus (Trojan Horse,Salami Attack)
Virus (Trojan Horse,Salami Attack)
Ferellica
 
All about computer malwares
All about computer malwaresAll about computer malwares
All about computer malwares
Kriti kohli
 
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
JazzyNF
 
Types of malware
Types of malwareTypes of malware
Types of malware
techexpert2345
 
Internet Threats
Internet ThreatsInternet Threats
Internet Threats
Leelet1121
 
Computer virus
Computer virusComputer virus
Computer virus
arif srk
 
SECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURESSECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURES
Shyam Kumar Singh
 
Internet threat
Internet threatInternet threat
Internet threat
ShekainaLiwanag1
 
Internet Threats
Internet ThreatsInternet Threats
Internet Threats
Ronalyn_Cao
 
Trojan horse nitish nagar
Trojan horse nitish nagarTrojan horse nitish nagar
Trojan horse nitish nagar
Nitish Nagar
 
Internet security
Internet securityInternet security
Internet security
rfukunaga
 
Internet threats
Internet threatsInternet threats
Internet threats
AngelicaMaliwat
 
Presentation
PresentationPresentation
Presentation
Nishant Barot
 
Impact of ict on society
Impact of ict on societyImpact of ict on society
Impact of ict on society
Rizwan Razman
 
Virus trojanworm
Virus trojanwormVirus trojanworm
Virus trojanworm
JenMorri
 
Internet Security in Web 2.0
Internet Security in Web 2.0 Internet Security in Web 2.0
Internet Security in Web 2.0
Arjunsinh Sindhav
 
Ppt123
Ppt123Ppt123
Ppt123
Faiz Khan
 
Do’s & don’ts of computer security rough
Do’s & don’ts of computer security  roughDo’s & don’ts of computer security  rough
Do’s & don’ts of computer security rough
Nathaniel (Nate) Tuenge
 

What's hot (20)

Trojan horse and salami attack
Trojan horse and salami attackTrojan horse and salami attack
Trojan horse and salami attack
 
Trojan virus & backdoors
Trojan virus & backdoorsTrojan virus & backdoors
Trojan virus & backdoors
 
Virus (Trojan Horse,Salami Attack)
Virus (Trojan Horse,Salami Attack)Virus (Trojan Horse,Salami Attack)
Virus (Trojan Horse,Salami Attack)
 
All about computer malwares
All about computer malwaresAll about computer malwares
All about computer malwares
 
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
 
Types of malware
Types of malwareTypes of malware
Types of malware
 
Internet Threats
Internet ThreatsInternet Threats
Internet Threats
 
Computer virus
Computer virusComputer virus
Computer virus
 
SECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURESSECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURES
 
Internet threat
Internet threatInternet threat
Internet threat
 
Internet Threats
Internet ThreatsInternet Threats
Internet Threats
 
Trojan horse nitish nagar
Trojan horse nitish nagarTrojan horse nitish nagar
Trojan horse nitish nagar
 
Internet security
Internet securityInternet security
Internet security
 
Internet threats
Internet threatsInternet threats
Internet threats
 
Presentation
PresentationPresentation
Presentation
 
Impact of ict on society
Impact of ict on societyImpact of ict on society
Impact of ict on society
 
Virus trojanworm
Virus trojanwormVirus trojanworm
Virus trojanworm
 
Internet Security in Web 2.0
Internet Security in Web 2.0 Internet Security in Web 2.0
Internet Security in Web 2.0
 
Ppt123
Ppt123Ppt123
Ppt123
 
Do’s & don’ts of computer security rough
Do’s & don’ts of computer security  roughDo’s & don’ts of computer security  rough
Do’s & don’ts of computer security rough
 

Viewers also liked

Ethics of security and surveillance technologies opinion 28
Ethics of security and surveillance technologies opinion 28Ethics of security and surveillance technologies opinion 28
Ethics of security and surveillance technologies opinion 28
Karlos Svoboda
 
Question h challanges in banking
Question h   challanges in bankingQuestion h   challanges in banking
Question h challanges in banking
Daniel Kheyfets
 
Marketing public relation
Marketing public relationMarketing public relation
Marketing public relation
jublegeorge
 
Direct marketing and public relation
Direct marketing and public relationDirect marketing and public relation
Direct marketing and public relation
deepu2000
 
Advertising effectiveness
Advertising effectivenessAdvertising effectiveness
Advertising effectiveness
Dimple Parmar
 
Ethics in finacne
Ethics in finacneEthics in finacne
Ethics in finacne
Dimple Parmar
 
Public Relations
Public RelationsPublic Relations
Public Relations
Prathamesh Parab
 

Viewers also liked (7)

Ethics of security and surveillance technologies opinion 28
Ethics of security and surveillance technologies opinion 28Ethics of security and surveillance technologies opinion 28
Ethics of security and surveillance technologies opinion 28
 
Question h challanges in banking
Question h   challanges in bankingQuestion h   challanges in banking
Question h challanges in banking
 
Marketing public relation
Marketing public relationMarketing public relation
Marketing public relation
 
Direct marketing and public relation
Direct marketing and public relationDirect marketing and public relation
Direct marketing and public relation
 
Advertising effectiveness
Advertising effectivenessAdvertising effectiveness
Advertising effectiveness
 
Ethics in finacne
Ethics in finacneEthics in finacne
Ethics in finacne
 
Public Relations
Public RelationsPublic Relations
Public Relations
 

Similar to COMPED9 Module 5 Security and Ethics

Malware
MalwareMalware
Malware
zelkan19
 
Malware
MalwareMalware
Malware
zelkan19
 
INFORMATION AND COMPUTER SECURITY.pptx
INFORMATION AND COMPUTER SECURITY.pptxINFORMATION AND COMPUTER SECURITY.pptx
INFORMATION AND COMPUTER SECURITY.pptx
ToleraYadessaGonfa
 
Spyware powerpoint
Spyware powerpointSpyware powerpoint
Spyware powerpoint
galaxy201
 
computer virus presentation
computer virus presentationcomputer virus presentation
computer virus presentation
Kalpana Dangol
 
RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5
CAS
 
Computer securety
Computer securetyComputer securety
Computer securety
rushil ahmed
 
Virus and Worms
Virus and WormsVirus and Worms
Virus and Worms
DINESH KAMBLE
 
Computer crimes
Computer crimesComputer crimes
Computer crimes
Muniba Bukhari
 
Type of Malware and its different analysis and its types !
Type of Malware and its different analysis and its types  !Type of Malware and its different analysis and its types  !
Type of Malware and its different analysis and its types !
Mohammed Jaseem Tp
 
The process of computer security
The process of computer securityThe process of computer security
The process of computer security
WritingHubUK
 
Malware program by mohsin ali dahar khairpur
Malware program by mohsin ali dahar khairpurMalware program by mohsin ali dahar khairpur
Malware program by mohsin ali dahar khairpur
Mohsin Dahar
 
Malware: To The Realm of Malicious Code (Training)
Malware: To The Realm of Malicious Code (Training)Malware: To The Realm of Malicious Code (Training)
Malware: To The Realm of Malicious Code (Training)
Satria Ady Pradana
 
Trojan Backdoors
Trojan                         BackdoorsTrojan                         Backdoors
Trojan Backdoors
JauwadSyed
 
Malware
MalwareMalware
Information Technology - System Threats
Information Technology - System ThreatsInformation Technology - System Threats
Information Technology - System Threats
Drishti Bhalla
 
list of Deception as well as detection techniques for maleware
list of Deception as well as detection techniques for malewarelist of Deception as well as detection techniques for maleware
list of Deception as well as detection techniques for maleware
AJAY VISHKARMA
 
What is Malware (Antivirus)
What is Malware (Antivirus)What is Malware (Antivirus)
What is Malware (Antivirus)
Paras Intotech
 
Malware in penetration testing 1
Malware in penetration testing 1Malware in penetration testing 1
Malware in penetration testing 1
Arbab Usmani
 
Computervirus
Computervirus Computervirus
Computervirus
Dushyant Shekhawat
 

Similar to COMPED9 Module 5 Security and Ethics (20)

Malware
MalwareMalware
Malware
 
Malware
MalwareMalware
Malware
 
INFORMATION AND COMPUTER SECURITY.pptx
INFORMATION AND COMPUTER SECURITY.pptxINFORMATION AND COMPUTER SECURITY.pptx
INFORMATION AND COMPUTER SECURITY.pptx
 
Spyware powerpoint
Spyware powerpointSpyware powerpoint
Spyware powerpoint
 
computer virus presentation
computer virus presentationcomputer virus presentation
computer virus presentation
 
RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5
 
Computer securety
Computer securetyComputer securety
Computer securety
 
Virus and Worms
Virus and WormsVirus and Worms
Virus and Worms
 
Computer crimes
Computer crimesComputer crimes
Computer crimes
 
Type of Malware and its different analysis and its types !
Type of Malware and its different analysis and its types  !Type of Malware and its different analysis and its types  !
Type of Malware and its different analysis and its types !
 
The process of computer security
The process of computer securityThe process of computer security
The process of computer security
 
Malware program by mohsin ali dahar khairpur
Malware program by mohsin ali dahar khairpurMalware program by mohsin ali dahar khairpur
Malware program by mohsin ali dahar khairpur
 
Malware: To The Realm of Malicious Code (Training)
Malware: To The Realm of Malicious Code (Training)Malware: To The Realm of Malicious Code (Training)
Malware: To The Realm of Malicious Code (Training)
 
Trojan Backdoors
Trojan                         BackdoorsTrojan                         Backdoors
Trojan Backdoors
 
Malware
MalwareMalware
Malware
 
Information Technology - System Threats
Information Technology - System ThreatsInformation Technology - System Threats
Information Technology - System Threats
 
list of Deception as well as detection techniques for maleware
list of Deception as well as detection techniques for malewarelist of Deception as well as detection techniques for maleware
list of Deception as well as detection techniques for maleware
 
What is Malware (Antivirus)
What is Malware (Antivirus)What is Malware (Antivirus)
What is Malware (Antivirus)
 
Malware in penetration testing 1
Malware in penetration testing 1Malware in penetration testing 1
Malware in penetration testing 1
 
Computervirus
Computervirus Computervirus
Computervirus
 

Recently uploaded

Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
amberjdewit93
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
Celine George
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
adhitya5119
 
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
GeorgeMilliken2
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
heathfieldcps1
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
Priyankaranawat4
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Excellence Foundation for South Sudan
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
Nicholas Montgomery
 
How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17
Celine George
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
chanes7
 
BBR 2024 Summer Sessions Interview Training
BBR  2024 Summer Sessions Interview TrainingBBR  2024 Summer Sessions Interview Training
BBR 2024 Summer Sessions Interview Training
Katrina Pritchard
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
Celine George
 
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
RitikBhardwaj56
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
tarandeep35
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
Dr. Shivangi Singh Parihar
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
ak6969907
 
Walmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdfWalmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdf
TechSoup
 
Community pharmacy- Social and preventive pharmacy UNIT 5
Community pharmacy- Social and preventive pharmacy UNIT 5Community pharmacy- Social and preventive pharmacy UNIT 5
Community pharmacy- Social and preventive pharmacy UNIT 5
sayalidalavi006
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
Israel Genealogy Research Association
 

Recently uploaded (20)

Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
 
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
 
How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
 
BBR 2024 Summer Sessions Interview Training
BBR  2024 Summer Sessions Interview TrainingBBR  2024 Summer Sessions Interview Training
BBR 2024 Summer Sessions Interview Training
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
 
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
 
Walmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdfWalmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdf
 
Community pharmacy- Social and preventive pharmacy UNIT 5
Community pharmacy- Social and preventive pharmacy UNIT 5Community pharmacy- Social and preventive pharmacy UNIT 5
Community pharmacy- Social and preventive pharmacy UNIT 5
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
 

COMPED9 Module 5 Security and Ethics