COMPUTER ETHICS 1: ICT: CLASS: JSS2

COMPUTER ETHICS 1: ICT: CLASS: JSS2

WEEK:  EIGHT

DATE: 13TH – 17TH June, 2022

CLASS: JSS2

SUBJECT: INFORMATION TECHNOLOGY

LESSON TITLE:  COMPUTER ETHICS 1

SUBTITLE (IF ANY):  Responsible Use of the Internet

PERIOD: 1&2

DURATION: 80 minutes

COMPUTER ETHICS 1: ICT: CLASS: JSS2

LEARNING OBJECTIVES: By the end of the lesson, students should be able to:

List responsible ways of using computers and the Internet.

KEY VOCABULARY WORDS: Computer users, computer professionals

RESOURCES AND MATERIALS: Computer laboratory and internet facilities.  Pictures/ charts of an ideal computer room/laboratory.

BUILDING BACKGROUND/ CONNECTION TO KNOWLEDGE: Students are familiar with the benefits and abuse of the internet

CONTENT:  RESPONSIBLE USE OF THE INTERNET

The computer system is a valuable and expensive piece of equipment that requires caution in order to get maximum performance from it. The following rules should be adhered to :

Avoid liquid from coming in contact with the computer system.

Cover the computer system with transparent covers when not in use to prevent dust from entering them.

The UPS (Uninterruptible Power Supply) should be charged overnight for maximum performance.  Ensure that computer systems are connected to properly charged UPS systems to prevent them from damage caused due to power surges or failures.

Unplug the computer system from the power source and all electrical gadgets before leaving the office at the end of the day.

Food particles should not be allowed to penetrate the keyboard.

The computer should be connected to the UPS to avoid a system breakdown.

Make use of surge protectors to prevent electric surges from damaging the computers.

Responsible Use of the Internet

Always endeavor to check your e-mail regularly.

The content of your messages may be received by another person, so be mindful of your words and write responsibly.

The subject of e-mails should be short, meaningful, and descriptive.

Always spell-check your messages before they are sent.

Be mindful of the websites you visit, some sites are very dubious waiting for victims; others are pornographic in nature and can infect the computer system with viruses.

Install an anti-virus on your computer and avoid file attachments from unknown sources to prevent virus attack

While chatting, be mindful of how you exchange information about yourself.

COMPUTER ETHICS 1: ICT: CLASS: JSS2:

Areas Of Misuse Of Computers And The Internet

Computers and the Internet are misused by users in the following areas:

Hacking:

Hacking is an act of gaining unauthorized access to computers. Anyone who does this act is called a Hacker. Hackers write programs that steal passwords allowing them to gain access to people’s privacy illegally.

Computer virus:

Viruses are programs that damage our files. A lot of viruses are contracted through the internet by infected CDs, Flash drives, fictitious emails, etc.

COMPUTER ETHICS 1: ICT: CLASS: JSS2

Fraud:

Scam letters and false information are sent through e-mails and mailing lists to fraudulently collect money and other valuable items from innocent/ignorant persons.

 

Stealing(or Phishing):

Internet criminals engage in stealing vital information from victims’ websites, emails, and even Personal Computers. Information-stealing software is used to achieve this purpose. Examples of information they steal include ATM card PINs, email passwords, usernames, etc. The act of using the internet to get personal, vital, or financial information is known as phishing (pronounced fishing).

 

Pornography:

The internet is a medium for the distribution of pornographic materials, so be careful and sensitive to the websites you visit.

Cyber War:

Cyberwar is the use of computers, the internet, and other devices to attack the enemies of information systems. Cyber warriors use technological means to launch a variety of attacks which can be used to shut down the websites of their enemies thereby potentially disrupting their government and industries’ computer systems.

 

Piracy:

This is a very common area of misusing the internet and even computers. People duplicate other people’s work illegally especially CDs, DVDs, tapes, films, software,, etc.

 

Plagiarism:

This entails copying another person’s work such as music, books, etc., without prior written permission and presenting it as one’s work.

COMPUTER ETHICS 1: ICT: CLASS: JSS2

STRATEGIES AND ACTIVITIES:

Activity I: The teacher leads by asking the students to define and explain computer ethics.

 

Activity II: The teacher explains the meaning of computer ethics.

 

Activity III: The teacher leads by explaining the key vocabulary in the class such as areas of misuse of computers and the internet.

 

Activity IV: The teacher leads by mentioning and explaining areas of misuse of computers and the internet.

 

Activity V: The teacher will summarize the topic and make the necessary corrections to the learner’s discussion.

 

ASSESSMENT (EVALUATION) & WRAP-UP (CONCLUSION):

 

Learners will provide answers to this question to check their understanding of the topic.

 

ASSIGNMENTS: What is a safety measure?    

 

HOD/VP’S COMMENTS AND ENDORSEMENT:

If you find this interesting and valuable you can click here for more free Computer E-Notes 

 Thanks. 

Shopping Cart
error: Content is protected !!
Scroll to Top