SlideShare a Scribd company logo
1 of 15
Download to read offline
Course Name: Professional Practice
Credit Hours: 3(3,0)
Objectives:
A Computing graduate as professional has some
responsibilities with respect to the society. This
course develops student understanding about
historical, social, economic, ethical, and
professional issues related to the discipline of
Computing. It identifies key sources for information
and opinion about professionalism and ethics.
Students analyze, evaluate, and assess ethical and
professional computing case studies.
Historical, social, and economic context of
Computing (software engineering, Computer
Science, Information Technology); Definitions of
Computing (software engineering, Computer
Science, Information Technology) subject areas
and professional activities; professional societies;
professional ethics; professional competency and
life-long learning; uses, misuses, and risks of
software; information security and privacy;
business practices and the economics of software;
intellectual property and software law (cyber law);
social responsibilities, software related contracts,
Software house organization
Resources: 1. Ethics in InformationTechnology, Reynolds, G., 5th Edition
(2015), Cengage CourseTechnology.
It is expected that at the end of this course the student will be able to;
2
At the end of the course, the student should be able to;
3
Lecture # 01
• All facts are related to SE directly or indirectly.
bundled
• System software, is computer software designed to operate and
control the computer hardware and to provide a platform for running
application software.
wide variety of characteristics
• End User
• Computer Programmer
• The purpose of programming is to invoke the desired behavior
(customization) from the machine.
• Customer’s behavior (Nature of problems, how to resolve problems?)
"killer"
application
• A programmer
• Technical programmer
• Open source programmer
• Professional
• Individual who can create
“Killer applications”.

More Related Content

Similar to computingcomputingcomputingcomputingcomputingcomputingcomputingcomputingcomputingcomputingcomputing

creative-technologies-cg-2017-1009.pdf
creative-technologies-cg-2017-1009.pdfcreative-technologies-cg-2017-1009.pdf
creative-technologies-cg-2017-1009.pdfHinlayaganNHSRegionV
 
The ethics of software engineering
The ethics of software engineeringThe ethics of software engineering
The ethics of software engineeringjndatirwa
 
creative-technologies-cg-2017-1009.pdf
creative-technologies-cg-2017-1009.pdfcreative-technologies-cg-2017-1009.pdf
creative-technologies-cg-2017-1009.pdfItsMeSirMJ
 
511595102-SSP-CG-Creative-Technologies-pdf-Version-1.pdf
511595102-SSP-CG-Creative-Technologies-pdf-Version-1.pdf511595102-SSP-CG-Creative-Technologies-pdf-Version-1.pdf
511595102-SSP-CG-Creative-Technologies-pdf-Version-1.pdfMichaelLi519464
 
Gr.-7-10-Creative-Technologies.pdf
Gr.-7-10-Creative-Technologies.pdfGr.-7-10-Creative-Technologies.pdf
Gr.-7-10-Creative-Technologies.pdfChrisTalla1
 
Ikeepsafe Cyber Safety, Ethics and Security Competencies
Ikeepsafe Cyber Safety, Ethics and Security CompetenciesIkeepsafe Cyber Safety, Ethics and Security Competencies
Ikeepsafe Cyber Safety, Ethics and Security CompetenciesJohn Macasio
 
Exploring the Exciting World of B.Tech in Computer Science and Engineering
Exploring the Exciting World of B.Tech in Computer Science and EngineeringExploring the Exciting World of B.Tech in Computer Science and Engineering
Exploring the Exciting World of B.Tech in Computer Science and EngineeringK.R. Mangalam University
 
Roehampton computing workshop 1
Roehampton computing workshop 1Roehampton computing workshop 1
Roehampton computing workshop 1Miles Berry
 
Computing nc
Computing ncComputing nc
Computing ncMrMJSmith
 
1Ethical issues arising from use of ICT technologiesStud.docx
1Ethical issues arising from use of ICT technologiesStud.docx1Ethical issues arising from use of ICT technologiesStud.docx
1Ethical issues arising from use of ICT technologiesStud.docxdrennanmicah
 
Matrix of ict skills for learning
Matrix of ict skills for learningMatrix of ict skills for learning
Matrix of ict skills for learningJorge Arturo Ortiz
 
Primary national curriculum_-_computing
Primary national curriculum_-_computingPrimary national curriculum_-_computing
Primary national curriculum_-_computingCraig Evans
 
LC Computer Science Subject Presentation 2024.pptx
LC Computer Science Subject Presentation 2024.pptxLC Computer Science Subject Presentation 2024.pptx
LC Computer Science Subject Presentation 2024.pptxJulieAnneCollins1
 
Computing curriculum design workshop
Computing curriculum design workshopComputing curriculum design workshop
Computing curriculum design workshopMiles Berry
 
Security and ethical challenges of it
Security and ethical challenges of itSecurity and ethical challenges of it
Security and ethical challenges of itPraveen Choursiya
 
Diploma in IT: Empowering Careers in the World of Technology
Diploma in IT: Empowering Careers in the World of TechnologyDiploma in IT: Empowering Careers in the World of Technology
Diploma in IT: Empowering Careers in the World of Technologyabieducators0
 
Social and professional issuesin it
Social and professional issuesin itSocial and professional issuesin it
Social and professional issuesin itRushana Bandara
 

Similar to computingcomputingcomputingcomputingcomputingcomputingcomputingcomputingcomputingcomputingcomputing (20)

creative-technologies-cg-2017-1009.pdf
creative-technologies-cg-2017-1009.pdfcreative-technologies-cg-2017-1009.pdf
creative-technologies-cg-2017-1009.pdf
 
The ethics of software engineering
The ethics of software engineeringThe ethics of software engineering
The ethics of software engineering
 
creative-technologies-cg-2017-1009.pdf
creative-technologies-cg-2017-1009.pdfcreative-technologies-cg-2017-1009.pdf
creative-technologies-cg-2017-1009.pdf
 
511595102-SSP-CG-Creative-Technologies-pdf-Version-1.pdf
511595102-SSP-CG-Creative-Technologies-pdf-Version-1.pdf511595102-SSP-CG-Creative-Technologies-pdf-Version-1.pdf
511595102-SSP-CG-Creative-Technologies-pdf-Version-1.pdf
 
Gr.-7-10-Creative-Technologies.pdf
Gr.-7-10-Creative-Technologies.pdfGr.-7-10-Creative-Technologies.pdf
Gr.-7-10-Creative-Technologies.pdf
 
Ikeepsafe Cyber Safety, Ethics and Security Competencies
Ikeepsafe Cyber Safety, Ethics and Security CompetenciesIkeepsafe Cyber Safety, Ethics and Security Competencies
Ikeepsafe Cyber Safety, Ethics and Security Competencies
 
Exploring the Exciting World of B.Tech in Computer Science and Engineering
Exploring the Exciting World of B.Tech in Computer Science and EngineeringExploring the Exciting World of B.Tech in Computer Science and Engineering
Exploring the Exciting World of B.Tech in Computer Science and Engineering
 
Roehampton computing workshop 1
Roehampton computing workshop 1Roehampton computing workshop 1
Roehampton computing workshop 1
 
Computing nc
Computing ncComputing nc
Computing nc
 
1Ethical issues arising from use of ICT technologiesStud.docx
1Ethical issues arising from use of ICT technologiesStud.docx1Ethical issues arising from use of ICT technologiesStud.docx
1Ethical issues arising from use of ICT technologiesStud.docx
 
Matrix of ict skills for learning
Matrix of ict skills for learningMatrix of ict skills for learning
Matrix of ict skills for learning
 
Digital literacy and Citizenship syllabus
Digital literacy and Citizenship syllabusDigital literacy and Citizenship syllabus
Digital literacy and Citizenship syllabus
 
Primary national curriculum_-_computing
Primary national curriculum_-_computingPrimary national curriculum_-_computing
Primary national curriculum_-_computing
 
LC Computer Science Subject Presentation 2024.pptx
LC Computer Science Subject Presentation 2024.pptxLC Computer Science Subject Presentation 2024.pptx
LC Computer Science Subject Presentation 2024.pptx
 
Computing curriculum design workshop
Computing curriculum design workshopComputing curriculum design workshop
Computing curriculum design workshop
 
Security and ethical challenges of it
Security and ethical challenges of itSecurity and ethical challenges of it
Security and ethical challenges of it
 
Diploma in IT: Empowering Careers in the World of Technology
Diploma in IT: Empowering Careers in the World of TechnologyDiploma in IT: Empowering Careers in the World of Technology
Diploma in IT: Empowering Careers in the World of Technology
 
01 computing
01 computing01 computing
01 computing
 
An ABC of cyberethics
An ABC of cyberethicsAn ABC of cyberethics
An ABC of cyberethics
 
Social and professional issuesin it
Social and professional issuesin itSocial and professional issuesin it
Social and professional issuesin it
 

Recently uploaded

Unsatisfied Bhabhi ℂall Girls Ahmedabad Book Esha 6378878445 Top Class ℂall G...
Unsatisfied Bhabhi ℂall Girls Ahmedabad Book Esha 6378878445 Top Class ℂall G...Unsatisfied Bhabhi ℂall Girls Ahmedabad Book Esha 6378878445 Top Class ℂall G...
Unsatisfied Bhabhi ℂall Girls Ahmedabad Book Esha 6378878445 Top Class ℂall G...Payal Garg #K09
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdfKamal Acharya
 
Max. shear stress theory-Maximum Shear Stress Theory ​ Maximum Distortional ...
Max. shear stress theory-Maximum Shear Stress Theory ​  Maximum Distortional ...Max. shear stress theory-Maximum Shear Stress Theory ​  Maximum Distortional ...
Max. shear stress theory-Maximum Shear Stress Theory ​ Maximum Distortional ...ronahami
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdfKamal Acharya
 
UNIT 4 PTRP final Convergence in probability.pptx
UNIT 4 PTRP final Convergence in probability.pptxUNIT 4 PTRP final Convergence in probability.pptx
UNIT 4 PTRP final Convergence in probability.pptxkalpana413121
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaOmar Fathy
 
Digital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptxDigital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptxpritamlangde
 
Basic Electronics for diploma students as per technical education Kerala Syll...
Basic Electronics for diploma students as per technical education Kerala Syll...Basic Electronics for diploma students as per technical education Kerala Syll...
Basic Electronics for diploma students as per technical education Kerala Syll...ppkakm
 
Fundamentals of Internet of Things (IoT) Part-2
Fundamentals of Internet of Things (IoT) Part-2Fundamentals of Internet of Things (IoT) Part-2
Fundamentals of Internet of Things (IoT) Part-2ChandrakantDivate1
 
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...HenryBriggs2
 
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwaitjaanualu31
 
Path loss model, OKUMURA Model, Hata Model
Path loss model, OKUMURA Model, Hata ModelPath loss model, OKUMURA Model, Hata Model
Path loss model, OKUMURA Model, Hata ModelDrAjayKumarYadav4
 
Computer Graphics Introduction To Curves
Computer Graphics Introduction To CurvesComputer Graphics Introduction To Curves
Computer Graphics Introduction To CurvesChandrakantDivate1
 
Cybercrimes in the Darknet and Their Detections: A Comprehensive Analysis and...
Cybercrimes in the Darknet and Their Detections: A Comprehensive Analysis and...Cybercrimes in the Darknet and Their Detections: A Comprehensive Analysis and...
Cybercrimes in the Darknet and Their Detections: A Comprehensive Analysis and...dannyijwest
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdfKamal Acharya
 
fitting shop and tools used in fitting shop .ppt
fitting shop and tools used in fitting shop .pptfitting shop and tools used in fitting shop .ppt
fitting shop and tools used in fitting shop .pptAfnanAhmad53
 
Augmented Reality (AR) with Augin Software.pptx
Augmented Reality (AR) with Augin Software.pptxAugmented Reality (AR) with Augin Software.pptx
Augmented Reality (AR) with Augin Software.pptxMustafa Ahmed
 
Post office management system project ..pdf
Post office management system project ..pdfPost office management system project ..pdf
Post office management system project ..pdfKamal Acharya
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayEpec Engineered Technologies
 

Recently uploaded (20)

Unsatisfied Bhabhi ℂall Girls Ahmedabad Book Esha 6378878445 Top Class ℂall G...
Unsatisfied Bhabhi ℂall Girls Ahmedabad Book Esha 6378878445 Top Class ℂall G...Unsatisfied Bhabhi ℂall Girls Ahmedabad Book Esha 6378878445 Top Class ℂall G...
Unsatisfied Bhabhi ℂall Girls Ahmedabad Book Esha 6378878445 Top Class ℂall G...
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdf
 
Max. shear stress theory-Maximum Shear Stress Theory ​ Maximum Distortional ...
Max. shear stress theory-Maximum Shear Stress Theory ​  Maximum Distortional ...Max. shear stress theory-Maximum Shear Stress Theory ​  Maximum Distortional ...
Max. shear stress theory-Maximum Shear Stress Theory ​ Maximum Distortional ...
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdf
 
UNIT 4 PTRP final Convergence in probability.pptx
UNIT 4 PTRP final Convergence in probability.pptxUNIT 4 PTRP final Convergence in probability.pptx
UNIT 4 PTRP final Convergence in probability.pptx
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
 
Signal Processing and Linear System Analysis
Signal Processing and Linear System AnalysisSignal Processing and Linear System Analysis
Signal Processing and Linear System Analysis
 
Digital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptxDigital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptx
 
Basic Electronics for diploma students as per technical education Kerala Syll...
Basic Electronics for diploma students as per technical education Kerala Syll...Basic Electronics for diploma students as per technical education Kerala Syll...
Basic Electronics for diploma students as per technical education Kerala Syll...
 
Fundamentals of Internet of Things (IoT) Part-2
Fundamentals of Internet of Things (IoT) Part-2Fundamentals of Internet of Things (IoT) Part-2
Fundamentals of Internet of Things (IoT) Part-2
 
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
 
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
 
Path loss model, OKUMURA Model, Hata Model
Path loss model, OKUMURA Model, Hata ModelPath loss model, OKUMURA Model, Hata Model
Path loss model, OKUMURA Model, Hata Model
 
Computer Graphics Introduction To Curves
Computer Graphics Introduction To CurvesComputer Graphics Introduction To Curves
Computer Graphics Introduction To Curves
 
Cybercrimes in the Darknet and Their Detections: A Comprehensive Analysis and...
Cybercrimes in the Darknet and Their Detections: A Comprehensive Analysis and...Cybercrimes in the Darknet and Their Detections: A Comprehensive Analysis and...
Cybercrimes in the Darknet and Their Detections: A Comprehensive Analysis and...
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdf
 
fitting shop and tools used in fitting shop .ppt
fitting shop and tools used in fitting shop .pptfitting shop and tools used in fitting shop .ppt
fitting shop and tools used in fitting shop .ppt
 
Augmented Reality (AR) with Augin Software.pptx
Augmented Reality (AR) with Augin Software.pptxAugmented Reality (AR) with Augin Software.pptx
Augmented Reality (AR) with Augin Software.pptx
 
Post office management system project ..pdf
Post office management system project ..pdfPost office management system project ..pdf
Post office management system project ..pdf
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
 

computingcomputingcomputingcomputingcomputingcomputingcomputingcomputingcomputingcomputingcomputing

  • 1. Course Name: Professional Practice Credit Hours: 3(3,0) Objectives: A Computing graduate as professional has some responsibilities with respect to the society. This course develops student understanding about historical, social, economic, ethical, and professional issues related to the discipline of Computing. It identifies key sources for information and opinion about professionalism and ethics. Students analyze, evaluate, and assess ethical and professional computing case studies. Historical, social, and economic context of Computing (software engineering, Computer Science, Information Technology); Definitions of Computing (software engineering, Computer Science, Information Technology) subject areas and professional activities; professional societies; professional ethics; professional competency and life-long learning; uses, misuses, and risks of software; information security and privacy; business practices and the economics of software; intellectual property and software law (cyber law); social responsibilities, software related contracts, Software house organization Resources: 1. Ethics in InformationTechnology, Reynolds, G., 5th Edition (2015), Cengage CourseTechnology.
  • 2. It is expected that at the end of this course the student will be able to; 2
  • 3. At the end of the course, the student should be able to; 3
  • 5.
  • 6. • All facts are related to SE directly or indirectly.
  • 7.
  • 8.
  • 9.
  • 10. bundled • System software, is computer software designed to operate and control the computer hardware and to provide a platform for running application software.
  • 11. wide variety of characteristics
  • 12. • End User • Computer Programmer
  • 13. • The purpose of programming is to invoke the desired behavior (customization) from the machine.
  • 14. • Customer’s behavior (Nature of problems, how to resolve problems?)
  • 15. "killer" application • A programmer • Technical programmer • Open source programmer • Professional • Individual who can create “Killer applications”.