HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
LEGAL ANND ETHICAL USE OF TECHNOLOGY
1.
2. Technology and software issues are also elaborated in order for you to be aware
and be guided in doing the right thing and avoiding the unacceptable acts that may
lead you to committing mistakes or possible software and technology crimes that’s
against the law
3. ETHICAL USE OF SCHOOL TECHNOLOGY
When we are young our parents used to teach us the right behavior and
etiquette. Even in schools and classes , there are certain behaviors and ethics we
need to observe to achieve a healthy relationships with teachers and classmates.
4. ETHICS FOR COMPUTER USER
1. Use the computer to help people and not to do harm.
2. Use your own assigned computer unit and not to interfere with others work.
3. Use the computer using your own files and not to use others files.
4. Use the computer to share information and not to steal others information.
5. Use the computer to spread truthful information and not to do character assassination.
6. Use software that are original an legal not pirated.
7. Use others computer resources with permission and not to duplicate it without authorization.
8. Use your own work and not the work of others .
9. Use the computer that shows respect and consideration for the other people and not to do cyber bullying.
10. Create programs or software having in mind its social impact and not for self interest.
5. ETHICAL ISSUES IN TECHNOLOGY
1. Unauthorized Access and Use of Hardware, software, Network, and Computer Files
There are many cases when we want something's to be kept private and would not allow others to use it, such as diaries, messages in our phones and e-
mails, and many others.
SOME TIPS IN CAREFULLY CREATING A PASSWORD
*Use at least characters.
*Use a combination of upper and lower case letters, words, numbers, and special characters.
*Use join words together.
*Use words from other languages.
*Add one or more numbers at the beginning, middle, or end of a word.
*Use a password that can remembered easily.
*Select a password that can be entered easily even without looking at the keyboard.
*Do not leave written copies of your password anywhere.
* Do not share your password to anyone.
6. 2. HARDWARE THEFT AND VANDALISM
Hardware Theft and Vandalism are some of the security challenges encountered by school administrators and teachers.
3. SOFTWARE THEFT
Software piracy is a form of software theft. These happens when a person copies illegally copyrighted software for personal or
business.
An end-user licence agreement (EULA) or single-user license agreement is the common type of license included in software
packages purchased by an individual .some of the conditions are:
*Users may install the software on only one computer.
*users are prohibited to install the software on a network (school computer lab network)
*Users may make copy for back up purposes.
*Users are prohibited to give copies to friends and copies to friends and colleagues.
7. Various Types of Software Licenses Used in Education
Types of
license
Characteristics Used in Schools
Single-user Software can be
installed only in one
computer. Some
license agreements
allow users to install
the software on one
desktop computer and
one notebook
computer.
Used when school needs
only if you copies of
particular software.
Commonly found in
small schools and when
purchasing specialized
software programs.
Multiple-
user
Software can be
installed on a set of
computers, typically 5,
10, 50, or more. Cost
varies based on
number of computers.
Cost –effective method
to install software or
more than one computer.
Most commonly used in
schools.
8. Network License Software is installed on the
schools network. The
license will specify and the
software will control a
specific number of
simultaneous users, such as
50, 250, or 500. Cost varies
based on number of
computers.
Cost-effective method of
allowing students and
teachers throughout the
school to have access to in
application software
program. As schools
continue to install networks,
network license are
becoming more common.
Community License Frequently used
with software
distributed on
CDs/DVDs. Any
number of
programs can be
purchased from
either macintosh or
PC platforms.
Very cost-effective
method for school
districts to purchase
large quantities of
software. Saving can
be significant over
individual CD or
DVD pricing.
9. 4. INFORMATION THEFT
-information theft is a computer crime when one deliberately steals information for
purposes of studying how to compete with other organization or companies.
5. Malicious Acts in Software
-the following malicious acts are commonly experienced in emails, cell phones, or text
messaging devices and blogs.
Spam is an unwanted message being received through emails, discussions, text
messaging devices, and others.
Phishing may also be called as carding or spoofing.
Spam message can be reduce if not prevented by adjusting the settings in your
emails to delete spam automatically.
Malware is a malicious software that causes harm to one or more computers.
Adware is a software that incorporates the presentation of advertisements and
condition for operating the software.
10. ACCEPTABLE AND UNACCEPTABLE
USES OF SCHOOL TECHNOLOGY
Schools may have different rules and
regulations or policies in implementing
acceptable and unacceptable used of school
technology.
11. Examples of Acceptable Use
of School Technology
Examples of Unacceptable
Use of School Technology
Abiding by the policies and
procedures of other
networks that are accessed.
Being polite and using
appropriate language.
Deleting unwanted messages
or old data from computers
and servers.
Enforcing appropriate used
and reporting misuse or
security issues.
Altering software by deleting
files, downloading programs,
or copying or installing
unauthorized files or
programs.
Assuming the identity or
using the passwords or
materials of another.
Conducting commercial
activities, advertising
products, or taking part in
political lobbying.
12. Running antivirus
software on downloaded
files, attachments,
peripherals, or disks.
Signing correspondence.
Using online time
efficiently.
Using the internet
ethically and legally.
Downloading text,
graphics or software, or
engaging in behaviours
that may considered
obscene, abusive, libelous,
indescent, vulgar, profane,
or lewd.
Gaining access to any
pay- for -view site.
Giving out your own or
others’ private
information, such as
address, phone number,
or passwords.
13. Harassing an individual
using the internet.
Plagiarizing
Transmitting material that
violates any local or
countries regulation, or
obscene material.
Vandalizing equipment,
digital files, or wilfully
spreading computer
viruses.