COMPUTER ETHICS 1

COMPUTER ETHICS  WEEK:  EIGHT

DATE: 13TH – 17TH June, 2022

CLASS: JSS2

SUBJECT: INFORMATION TECHNOLOGY

LESSON TITLE:  COMPUTER ETHICS 1

SUBTITLE (IF ANY):  Responsible Use of the Internet

PERIOD: 1&2

DURATION: 80 minutes

LEARNING OBJECTIVES: By the end of the lesson, students should be able to:

List responsible ways of using computers and the Internet.

KEY VOCABULARY WORDS: computer users, computer professionals

RESOURCES AND MATERIALS: Computer laboratory and internet facilities.  Pictures/ charts of an ideal computer room/laboratory.

BUILDING BACKGROUND/ CONNECTION TO KNOWLEDGE: Students are familiar with the benefits and abuse of the internet

CONTENT:  RESPONSIBLE USE OF THE INTERNET

The computer system is a valuable and expensive piece of equipment that requires caution in order to get maximum performance from it. Therefore, the following rules should be adhered to :

Avoid liquid from coming in contact with the computer system.

Cover the computer system with transparent covers when not in use to prevent dust from entering them.

The UPS (Uninterruptible Power Supply) should be charged overnight for maximum performance.  Ensure that computer systems are connected to properly charged UPS systems to prevent them from damage caused due to power surges or failures.

Unplug the computer system from the power source and all electrical gadgets before leaving the office at the end of the day.

Food particles should not be allowed to penetrate the keyboard.

RESPONSIBLE USE OF THE INTERNET

The computer should be connected to the UPS to avoid a system breakdown.

Make use of surge protectors to prevent the electric surges from damaging the computers.

Responsible Use of the Internet

Always endeavor to check your e-mail regularly.

The content of your messages may be received by another person, so be mindful of your words and write responsibly.

The subject of e-mails should be short, meaningful, and descriptive.

Always spell-check your messages before they are sent.

Be mindful of the websites you visit, some sites are very dubious waiting for victims; others are pornographic in nature and can infect the computer system with viruses.

Install an anti-virus on your computer and avoid file attachments from unknown sources to prevent virus attack

While chatting, be mindful of how you exchange information about yourself.

Areas of Misuse of Computers and the Internet

Hacking: Hacking is an act of gaining unauthorized access to computers. Anyone who does this act is called a Hacker. Hackers write programs that steal passwords allowing them to gain access to people’s privacy illegally.

Computer virus: Viruses are programs that damage our files. A lot of viruses are contracted through the internet by infected CDs, Flashes drives, fictitious emails, etc.

Fraud: Scam letters and false information are sent through e-mails and mailing lists to fraudulently collect money and other valuable items from innocent/ignorant persons.

Stealing(or Phishing): Internet criminals engage in stealing vital information from victims’ websites, emails, and even Personal Computers. Information-stealing software is used to achieve this purpose. Examples of information they steal include ATM card Pin, email passwords, usernames, etc. The act of using the internet to get personal, vital, or financial information is known as phishing (pronounced fishing).

Pornography: The internet is medium for the distribution of pornographic materials, so be careful and be sensitive to the websites you visit.

Computers and the Internet are misused by users in the following areas:

Cyber War: Cyberwar is the use of computers, the internet, and other devices to attack the enemies of information systems. Cyber warriors use technological means to launch a variety of attacks which can be used to shut down the websites of their enemies thereby potentially disrupting their government and industries’ computer systems.

Piracy: This is a very common area of misusing the internet and even computers. People duplicate other people’s work illegally especially CDs, DVD, tapes, films, software, etc.

Plagiarism: This entails copying another person’s work such as music, books, etc, without prior written permission and presenting it as one’s work.

STRATEGIES AND ACTIVITIES:

Student Activity I: The student leads by asking the student to define and explain computer ethics.

 Activity II: The teacher explains the meaning of computer ethics.

Student Activity  III: The teacher leads by explaining the key vocabulary in the class such as areas of misuse of computers and the internet.

Activity IV: Teacher leads by mentioning and explaining areas of misuse of computers and the internet.

Activity V: Teacher will summarize the topic and make the necessary correction to the learner’s discussion.

ASSESSMENT (EVALUATION) & WRAP-UP (CONCLUSION):

Learners will provide answers to this question to check their understanding of the topic.

ASSIGNMENTS: What is a safety measure?    

HOD/VP’S COMMENTS AND ENDORSEMENT:

Here is a safety measure complete lesson note 

 

NETWORK GROUPS

Shopping Cart
error: Content is protected !!
Scroll to Top