...permission before installing, attempting to install or storing programs of any type on the computers. • Damaging, disabling, or otherwise harming the operation of computers, or intentionally wasting resources puts your work at risk, and will cut short your time with the ICT equipment. • Only use the computers for educational purposes. Activities such as buying or selling goods are inappropriate. • Always check files brought in on removable media (such as floppy disks, CDs, flash drives etc.) with antivirus software and only use them if they are found to be clean of viruses. • Always check mobile equipment (e.g. laptops, tablet PCs, PDAs etc.) with antivirus software, and ensure they have been found to be clean of viruses, before connecting them to the network. • Protect the computers from spillages by eating or drinking well away from the ICT equipment. Security and Privacy • Protect your work by keeping your password to yourself; never use someone else’s logon name or password. • Always get permission before revealing your home address, telephone number, school name, or picture to people you meet on the Internet. • Other computer users should be respected and should not be harassed, harmed, offended or insulted. • To protect yourself and the systems, you should respect the security on the computers; attempting to bypass or alter the settings may put you or your work at risk. • Computer storage areas and floppy disks will be treated like school lockers. Staff may review...
Words: 926 - Pages: 4
...card allow the computer to play sound? YES/NO 3. Does the mouse work for left hand users? YES/NO 4. Does the hard drive allow the user to save data? YES/NO 5. Does Microsoft Office Word work? YES/NO 6. Does Windows operating system load up when computer is turned on? YES/NO 7. Does the keyboard send data to the computer? YES/NO 8. Does the printer work from the computer? YES/NO 9. Does the computer produce graphics? YES/NO 10. Does the computer connect to the school’s network? YES/NO 11. Does the shortcut for the documents work? YES/NO 12. Does the anti-virus scan the computer on weekends at 2am? YES/NO Answers 1. Did the monitor display the computer’s screen? YES/ 5 NO 2. Does the sound card allow the computer to play sound? 5 YES/ NO 3. Does the mouse work for left hand users? 5 YES/ NO 4. Does the hard...
Words: 1095 - Pages: 5
...Commandments of Computer Ethics 1. Thou shalt not use a computer to harm other people. 2. Thou shalt not interfere with other people's computer work. 3. Thou shalt not snoop around in other people's computer files. 4. Thou shalt not use a computer to steal. 5. Thou shalt not use a computer to bear false witness. 6. Thou shalt not copy or use proprietary software for which you have not paid. 7. Thou shalt not use other people's computer resources without authorization or proper compensation. 8. Thou shalt not appropriate other people's intellectual output. 9. Thou shalt think about the social consequences of the program you are writing or the system you are designing. 10. Thou shalt always use a computer in ways that ensure consideration and respect for your fellow humans. Exegesis * Commandment 1 Simply put: Do not use a computer in ways that may harm other people. Explanation: This commandment says that it is unethical to use a computer to harm another user. It is not limited to physical injury. It includes harming or corrupting other users' data or files. The commandment states that it is wrong to use a computer to steal someone's personal information. Manipulating or destroying files of other users is ethically wrong. It is unethical to write programs, which on execution lead to stealing, copying or gaining unauthorized access to other users' data. Being involved in practices like hacking, spamming, phishing or cyber bullying does not conform to computer ethics. * Commandment...
Words: 1766 - Pages: 8
...EFFECTS OF COMPUTER INNOVATION Introduction: Today man’s scientific knowledge is very wide and highly advanced. It has helped him to discover and invent many things for his ease, comfort and efficiency. Computer is the latest and most brilliant child of science. They used for work, school, hospital, industrial, office, shops, house etc. The Computer can be a helpful place to find information on certain topics. With their quick processing ability helping, it makes informed decisions more quickly and to perform our work faster and easier. That is why many people in the world were depending in computers. And yet computer is a very friendly use for us to do whatever and whenever task we want to do. The Computer has a great literacy for over fifty years; beginning with the famous ENIAC, a revolution has been taking place in the United States and the world. The personal computer has changed the way many people think and live. With its amazing versatility, it has found its way into every area of life, and knowing how to operate it is a requirement for today's world. Body of the Paper: Computers today are used in a way people commonly are doing work on it. There is more to computer typing there’s programming, troubleshooting, communications, and many of more uses from them people and I go through. People has know that there is more to computers then just typing more of it comes where in how other specific devices are used to convert data. Troubleshooting things such as...
Words: 2537 - Pages: 11
...Health Issues Related Computer Use BUS 5505: Fundamentals of Information Systems and Quantitative Methods December 4, 2009 Although it is unlikely that computer equipment will be dangerous itself, it can be used in ways which can be hazardous to health of staff ("Computer health and," 2003). Ergonomics is an applied science devoted to incorporating comfort, efficiency, and safety into the design of items in the workplace (Shelly, & Vermaat, 2008). Studies done using ergonomics show that using the correct chair, keyboard, display device, and work surface configurations helps computer users work comfortably and efficiently and also preserve their health. According to previous studies, the majority of computer workers experience some eye or vision symptoms, but what was not clear was if whether these problems occur to a greater extent in these workers than in others who work in other visually demanding occupations. A national survey of doctors of optometry found that more than 14% of their present patients with eye or vision-related symptoms resulting from computer work. Working on a computer for a long period of time can cause different types of forearm and wrist CTDs, which are inflammation of tendons, nerve sheaths, and ligaments and damage to the soft tissues. Tenosynovitis, ganglion cysts, de Quervain’s disease, lateral epicondylitis, and carpal tunnel syndrome are different types of CTDs caused by computer use. Symptoms of CTDs are pain, numbness, tingling...
Words: 4687 - Pages: 19
...skill for a job in computers. I am also a calm and patient person. Being calm and patient makes me good for these careers since I will have to wait and know how to keep my cool. Also, I am a practical thinker. This means that I do what I know will work not what is just an idea or theory. Therefore, I am would consider myself responsible. Since I am responsible, I can be trusted to complete and take care of things. Some activities I do to get better at my chosen careers are watch videos on coding, and join programs based on coding to learn as much as I can. For example, I would watch videos learning the basics of coding and what everything means. Whenever I get the chance to go on the internet on a...
Words: 2039 - Pages: 9
...JANE B. CASIL BSCS-III THE TEN COMMANDMENTS OF COMPUTER ETHICS 1. Thou shalt not use computer to harm other people. -Oftentimes we use computers for so many reasons to discover new things, meet other people and etc. But sometimes we didn’t care anymore the important of using our computers if it is doing the right thing or not. So that, in order to avoid this kind of computer ethics we should know our limitations in using our computers because other people might have the tendency to become more rude and there’s a possibility that may affect in one’s life if we didn’t look for a better solution on this. 2. Thou shalt not interfere with other peoples computer work. -There are people who truly satisfied with their work, who patiently trying their best and to work hard but sometimes there are reasons why people interfere other work maybe because it is easy to them to look for others work. They actually don’t mind that if this action is good or bad. 3. Thou shalt not snoop in other peoples files. -We should always mind in ourselves that we are free to let our choices for an easy task but avoid snooping files with other people. 4. Thou shalt not use a computer to steal. -Computer is use for doing the right thing and we should know this in every single way. We should avoid using the computer in just order to steal any kind of software. Because stealing is a sin. 5. Thou shalt not use a computer to bear false witness. -In every action we do, several...
Words: 902 - Pages: 4
...What is Computer : Computer is an electronic device that is designed to work with Information.The term computer is derived from the Latin term ‘computare’, this means to calculate.Computer can not do anything without a Program.it represents the decimal numbers through a string of binary digits. The Word 'Computer'usually refers to the Center Processor Unit plus Internal memory. Computer is an advanced electronic device that takes raw data as input from the user and processes these data under the control of set of instructions (called program) and gives the result (output) and saves output for the future use. It can process both numerical and non-numerical (arithmetic and logical) calculations.The basic components of a modern digital computer are: Input Device,Output Device,Central Processor. A Typical modern computer uses LSI Chips. Charles Babbage is called the "Grand Father" of the computer.The First mechanical computer designed by charles Babbage was called Analytical Engine. It uses read-only memory in the form of punch cards. Four Functions about computer are: accepts data | Input | processes data | Processing | produces output | Output | stores results | Storage | Input (Data): Input is the raw information entered into a computer from the input devices. It is the collection of letters, numbers, images etc. Process: Process is the operation of data as per given instruction. It is totally internal process of the computer system. Output: Output...
Words: 1953 - Pages: 8
...Introduction To Computers Computer - is an electronic device, operating under the control of instruction stored in its own memory, that can accept data, process the data according to specified rules, produce result, and store the result for future use. Data & Information Data- is a collection of unprocessed items, which can include text, numbers, images, audio, and video. Information- conveys meaning and is useful to people. Computer process data (Input) into information (output). Computer carries out processes using Instructions, which are the steps that tell the computer how to perform a particular task. A collection of related instructions organized for common purposes is referred to as software. Some people refer to the series of input, process, output, and storage activities as the information processing cycle. Advantages of using Computers Speed- when data, instruction, and information flow along electronic circuits in a computer, they travel at incredibly speed. Reliability- The electronic components in modem computers are dependable and reliable because they rarely break or fail. Consistency- Given the same input and processes, a computer will produce the same results. Storage- A computer can transfer data quickly from storage to memory, process it, and then store it again for future use. Communication- the capability to share and communicate with other computers. Disadvantages of using computers Health Risk- Prolonged or improper computer use can lead...
Words: 1694 - Pages: 7
...Carrboro Cybrary | Chapel Hill Public Library | Durham County Public Library COMPUTER BASICS GETTING STARTED Class Overview What You Will Learn BASIC COMPUTER SKILLS Anatomy of a Computer How Computers Work Turning the Computer On and Logging On The Desktop THE KEYBOARD AND MOUSE Keyboard Commands The Mouse Left-Clicking, Double-Clicking, and Right-Clicking OPERATING SYSTEMS AND SOFTWARE The Operating System The Start Menu Managing Windows Buying a Computer Other Programs and Software SHUTTING DOWN THE COMPUTER Logging Off vs. Shutting Down Finding More Help Vocabulary to Know PAGE 02 PAGE 03 PAGE 08 PAGE 11 PAGE 16 View our full schedule, handouts, and additional tutorials on our website: www.lib.unc.edu/cws Last updated May 2012 2 GETTING STARTED Class Overview This is a class for very beginning computer users. You are not expected to have ANY experience with computers. If you’ve never touched a computer before, this is the right place for you. We will be using PC laptop computers running the Microsoft Windows operating system. You may have heard these words before, but if not, don’t worry. We’ll cover their meanings later in class. Don’t get discouraged! Remember: Practice makes perfect and everyone starts out as a beginner. Using the keyboard and mouse may be challenging at first, but it will become easier the more you use them. Note: The mouse is intended for you to use with your right hand, regardless of whether or not you are right-handed. This...
Words: 4461 - Pages: 18
...How RAM Works 0 Page 1 2 3 4 Computer Hardware Image Gallery MORE ON RAM * RAM Quiz * Does adding RAM make your computer faster? * How to Add RAM to Your Desktop * How to Add RAM to Your Laptop Random access memory (RAM) is the best known form of computer memory. RAM is considered "random access" because you can access any memory cell directly if you know the row and column that intersect at that cell. The opposite of RAM is serial access memory (SAM). SAM stores data as a series of memory cells that can only be accessed sequentially (like a cassette tape). If the data is not in the current location, each memory cell is checked until the needed data is found. SAM works very well for memory buffers, where the data is normally stored in the order in which it will be used (a good example is the texture buffer memory on a video card). RAM data, on the other hand, can be accessed in any order. Similar to a microprocessor, a memory chip is an integrated circuit(IC) made of millions of transistors and capacitors. In the most common form of computer memory, dynamic random access memory (DRAM), a transistor and a capacitor are paired to create amemory cell, which represents a single bit of data. The capacitor holds the bit of information -- a 0 or a 1 (see How Bits and Bytes Work for information on bits). The transistor acts as a switch that lets the control circuitry on the memory chip read the capacitor or change its state. A capacitor is like a...
Words: 3957 - Pages: 16
...Computer Literacy Skills for Computer Studies Teachers in Secondary Schools Zeszotarski (2000)75 described computer literacy as the ability to use e-mail, graphical interfaces such as Netscape, online publishing and the ability to evaluate the content of online materials. Morell, Mayhorn, and Bennett (2000)68 emphasized that computer literacy facilitates teacher’s and students’ better teaching and learning and serves as a monitor to students that have been disillusioned with education and also makes teaching and learning more flexible. Furthermore, Information and Communication Technology enhances easy and convenient teaching; sparks students’ interest and promotes holistic, collaborative and integrated learning, promotes the quality of curriculum...
Words: 1512 - Pages: 7
...1. Thou shall not use a computer in ways that may harm people. The commandment of Computer Ethics states that it is dishonest to use a computer or other smart devices in practices like hacking, spamming, phishing, piracy or cyber bullying. It is unethical to use computer for accessing private files in order to steal information and use it in harmful matters. Similarly, it is unethical to design programs or applications that lead to unsolicited and unauthorized access to personal data. Designing harmful programs and using applications to manipulate and destroy information is wrong and, in many cases, illegal. Nowadays, almost everyone is accessible online, constantly inputting and downloading information. Facebook, Tweeter and Instagram are perfect examples of people sharing everyday data about their lives and exposing themselves to others. With ease of finding information, we are all widely exposed to fraud, cyber-stocking and cyber-bulling. Unfortunately, such exposure may lead not only to mental, but also physical pain, resulting in suicidal or bullied teenagers, silly prank makers and sexual criminal charges of a promising Texas college student. In my opinion, people should get educated on how to use a computer and protect themselves online. Just like it is not a common practice to leave an unlocked car parked on a busy street with a ”key inside” note on a window, it shouldn’t be that easy to record personal information online for everyone to see, share, misuse or judge...
Words: 1524 - Pages: 7
... Date Computers have become an important part of our life. We use them in our home, workplace, and at schools. Unfortunately almost every computer user encounters some type of problem. It could be the disaster of your hard drive crashing or even a forgotten password. The increased use of computers has created a high demand for computer technicians to provide help to users, day-to-day administration, maintenance, and maintenance of computer systems and networks. This is why I have chosen Computer Information Science as my major. Computer and information systems managers coordinate the work of systems analysts, computer programmers, support specialists, and other computer-related workers. They plan and coordinate activities such as installation and upgrading of hardware and software, programming and systems design, and the development of computer networks. They are becoming more involved with the upkeep, maintenance, and security of networks. They analyze the computer and information needs of their companies and determine the immediate and long-range personnel and equipment requirements. They also assign and review the work of their subordinates and stay up to date with the latest technology to make sure the company does not lag behind competitors. Computer and information systems managers usually spend most of their time in an office environment. They typically work at least 40 hours a week and possibly work evenings and weekends to meet deadlines...
Words: 636 - Pages: 3
...not use a computer to harm other people. Example: A person should do something which could cause any type of harm to others like cyber bullying, publishing false information about a person, harassment, etc. 2. Thou shall not interfere with other people's computer work. Example: I believe this could mean two things - the first one being that one should not develop programs or systems which could cause damage to a persons computer and disable it from fully functioning, such as malicious viruses and spreading them. Secondly, this commandment could mean that a person should not modify a persons work and shouldn't snoop around in it. 3. Thou shall not snoop around in other people's computer files. Example: If a person is logged into a website and you happen to be using the computer, it would be polite to log out. Also, one should never browse through a persons email, data and/or files (pictures, documents, etc.) without exclusive permission from the other person whom it belongs to. 4. Thou shall not use a computer to steal. Example: Although unethical, it is also unlawful to steal in any way shape, form or fashion. This would include, computer-hacking with the intent of secretly collecting personal information or running scams in order to benefit while conning the victim. Piracy is also a form of stealing which should be avoid. 5. Thou shall not use a computer to bear false witness. Example: To “bear false witness” is to lie, so a person should not use a computer...
Words: 654 - Pages: 3