1 social / ethics ncdesk societal and ethical issues
TRANSCRIPT
![Page 1: 1 Social / Ethics NCDesk Societal and Ethical Issues](https://reader031.vdocument.in/reader031/viewer/2022020800/5516a78c550346f0208b4e9a/html5/thumbnails/1.jpg)
1 Social / Ethics
NCDesk Societal and Ethical Issues
![Page 2: 1 Social / Ethics NCDesk Societal and Ethical Issues](https://reader031.vdocument.in/reader031/viewer/2022020800/5516a78c550346f0208b4e9a/html5/thumbnails/2.jpg)
2 Social / Ethics
Computers and the Internet have a tremendous impact on society. It is important to remember some things so that you can make ethical decisions when using a computer and the internet.
![Page 3: 1 Social / Ethics NCDesk Societal and Ethical Issues](https://reader031.vdocument.in/reader031/viewer/2022020800/5516a78c550346f0208b4e9a/html5/thumbnails/3.jpg)
3 Social / Ethics
At the start of the school year, all students (along with their parents) are given the Acceptable Use Policy or AUP for computer/internet usage at school.
This agreement – that you and your parents sign – basically says that you agree to use the computers and internet resources available at school appropriately. This means doing what you are instructed to do and what is ethical.
Ethical behavior is considered “good” or “right” behavior.
![Page 4: 1 Social / Ethics NCDesk Societal and Ethical Issues](https://reader031.vdocument.in/reader031/viewer/2022020800/5516a78c550346f0208b4e9a/html5/thumbnails/4.jpg)
4 Social / Ethics
Your school network consists of all of the devices (computers and printers) in the building connected to the server which is a special computer used to store programs and files and send them to other computers.
The school network is an example of a LAN or Local Area Network.
A computer not connected to a network is called a stand alone computer.
When LAN systems are connected, they form a Wide Area Network, or WAN.
![Page 5: 1 Social / Ethics NCDesk Societal and Ethical Issues](https://reader031.vdocument.in/reader031/viewer/2022020800/5516a78c550346f0208b4e9a/html5/thumbnails/5.jpg)
5 Social / Ethics
ACCEPTABLE USE POLICY (AUP) — A set of rules and guidelines that are set up to regulate Internet use and to protect the user.
AUP PUP
![Page 6: 1 Social / Ethics NCDesk Societal and Ethical Issues](https://reader031.vdocument.in/reader031/viewer/2022020800/5516a78c550346f0208b4e9a/html5/thumbnails/6.jpg)
6 Social / Ethics
The AUP attempts to ensure that the LAN/WAN is protected from intentional damage by users.
Protect your passwordsbetter than this!
Each person has a unique username and password – NEVER let another person use your account – if they do something that is not ethical, you will be held accountable!
![Page 7: 1 Social / Ethics NCDesk Societal and Ethical Issues](https://reader031.vdocument.in/reader031/viewer/2022020800/5516a78c550346f0208b4e9a/html5/thumbnails/7.jpg)
7 Social / Ethics
Passwords should always be unique and not something that can be easily figured out by a hacker, someone who is unauthorized to access files on a computer.
A strong password should contain a combination of upper and lowercase letters, numbers, and symbols.
A firewall is computer software designed to protect your computer from hackers and some viruses.
o1f5o1MLK
![Page 8: 1 Social / Ethics NCDesk Societal and Ethical Issues](https://reader031.vdocument.in/reader031/viewer/2022020800/5516a78c550346f0208b4e9a/html5/thumbnails/8.jpg)
8 Social / Ethics
FIREWALL — Technology that prevents users from visiting
inappropriate web sites, and protects the network from unauthorized users.
![Page 9: 1 Social / Ethics NCDesk Societal and Ethical Issues](https://reader031.vdocument.in/reader031/viewer/2022020800/5516a78c550346f0208b4e9a/html5/thumbnails/9.jpg)
9 Social / Ethics
PASSWORD — A code for the security protection to allow
access to a computer or the computer programs.
sbrown1231992
s1a2n3t4a5 ro11nd22a
hot919dogs
Which password is obviously bad?
![Page 10: 1 Social / Ethics NCDesk Societal and Ethical Issues](https://reader031.vdocument.in/reader031/viewer/2022020800/5516a78c550346f0208b4e9a/html5/thumbnails/10.jpg)
10 Social / Ethics
SECURITY — Protection of computer, computer files or a
computer network from use without permission of the owner or owners.
![Page 11: 1 Social / Ethics NCDesk Societal and Ethical Issues](https://reader031.vdocument.in/reader031/viewer/2022020800/5516a78c550346f0208b4e9a/html5/thumbnails/11.jpg)
11 Social / Ethics
ANTIVIRUS SOFTWARE —An application designed to search for viruses and repair files on a computer.
![Page 12: 1 Social / Ethics NCDesk Societal and Ethical Issues](https://reader031.vdocument.in/reader031/viewer/2022020800/5516a78c550346f0208b4e9a/html5/thumbnails/12.jpg)
12 Social / Ethics
A Virus or Worm can damage computer files and possibly a network. Be careful when opening email –If you don’t know who sent it or recognize the subject – BE CAREFUL!
![Page 13: 1 Social / Ethics NCDesk Societal and Ethical Issues](https://reader031.vdocument.in/reader031/viewer/2022020800/5516a78c550346f0208b4e9a/html5/thumbnails/13.jpg)
13 Social / Ethics
TROJAN HORSE — Type of computer virus that is disguised as a useful
application.
VIRUS — A computer program designed to damage computer files.
WORM — A computer file designed to do damage that goes through a computer and
possibly a network.
![Page 14: 1 Social / Ethics NCDesk Societal and Ethical Issues](https://reader031.vdocument.in/reader031/viewer/2022020800/5516a78c550346f0208b4e9a/html5/thumbnails/14.jpg)
14 Social / Ethics
SPAM is unwanted and unrequested e-mail. Sometimes SPAM may look like something you want.
If an e-mail asks you for personal information such as passwords, social security numbers, bank or credit card information, be careful. This is called phishing (someone is “fishing” for information for unauthorized use)
![Page 15: 1 Social / Ethics NCDesk Societal and Ethical Issues](https://reader031.vdocument.in/reader031/viewer/2022020800/5516a78c550346f0208b4e9a/html5/thumbnails/15.jpg)
15 Social / Ethics
When you use information found on the internet (or in a book, on television…) you must remember to give credit where credit is due. If you use an image or other information, you must document your source.
Abraham Lincoln Birthplace National Historic Site. 11 Feb. 2003.
National Park Service. 13 Feb. 2003. <http://www.nps.gov/abli/>.
![Page 16: 1 Social / Ethics NCDesk Societal and Ethical Issues](https://reader031.vdocument.in/reader031/viewer/2022020800/5516a78c550346f0208b4e9a/html5/thumbnails/16.jpg)
16 Social / Ethics
COMPUTER VANDALISM — The intentional act of destroying computer
files or computer networks.
![Page 17: 1 Social / Ethics NCDesk Societal and Ethical Issues](https://reader031.vdocument.in/reader031/viewer/2022020800/5516a78c550346f0208b4e9a/html5/thumbnails/17.jpg)
17 Social / Ethics
HACKER — An unauthorized person who secretly gains access
to computer files.
![Page 18: 1 Social / Ethics NCDesk Societal and Ethical Issues](https://reader031.vdocument.in/reader031/viewer/2022020800/5516a78c550346f0208b4e9a/html5/thumbnails/18.jpg)
18 Social / Ethics
COPYRIGHT — Law granting a legal right to a copyright
holder or author which requires their permission to make non-archival copies of
the work in question.
![Page 19: 1 Social / Ethics NCDesk Societal and Ethical Issues](https://reader031.vdocument.in/reader031/viewer/2022020800/5516a78c550346f0208b4e9a/html5/thumbnails/19.jpg)
19 Social / Ethics
ONLINE SAFETY — Precautions taken to protect personal
information and images from being misused by others.
![Page 20: 1 Social / Ethics NCDesk Societal and Ethical Issues](https://reader031.vdocument.in/reader031/viewer/2022020800/5516a78c550346f0208b4e9a/html5/thumbnails/20.jpg)
20 Social / Ethics
FAIR USE AND MULTIMEDIA GUIDELINES — The fair use doctrine provides educators with the right to make reasonable copies of copyrighted materials without specific consent of the author for purposes of criticism, comment, news reporting, teaching, scholarship, or research. The guidelines permit the use of copyrighted works in teaching, if certain factors are considered, including: the purpose and character of the use (commercial vs. educational), the nature of the copyrighted work, the amount of the work copied in relation to the work as a whole, the effect of use on the potential market for or value of the work.
![Page 21: 1 Social / Ethics NCDesk Societal and Ethical Issues](https://reader031.vdocument.in/reader031/viewer/2022020800/5516a78c550346f0208b4e9a/html5/thumbnails/21.jpg)
21 Social / Ethics
EMERGING TECHNOLOGIES —Technologies that are new and in the
developmental stages; not in widespread use
![Page 22: 1 Social / Ethics NCDesk Societal and Ethical Issues](https://reader031.vdocument.in/reader031/viewer/2022020800/5516a78c550346f0208b4e9a/html5/thumbnails/22.jpg)
22 Social / Ethics
SOFTWARE/APPLICATIONS — Programs that allow you to accomplish
certain tasks such as write letters, analyze numbers, sort files, manage finances, draw
pictures, and play games.
![Page 23: 1 Social / Ethics NCDesk Societal and Ethical Issues](https://reader031.vdocument.in/reader031/viewer/2022020800/5516a78c550346f0208b4e9a/html5/thumbnails/23.jpg)
23 Social / Ethics
PUBLIC DOMAIN — Software written and then donated to the public. Anyone can use and copy public
domain software free of charge, but it is not always the same quality as commercial
software.
![Page 24: 1 Social / Ethics NCDesk Societal and Ethical Issues](https://reader031.vdocument.in/reader031/viewer/2022020800/5516a78c550346f0208b4e9a/html5/thumbnails/24.jpg)
24 Social / Ethics
SHAREWARE — Software that can be tried before you purchase.
![Page 25: 1 Social / Ethics NCDesk Societal and Ethical Issues](https://reader031.vdocument.in/reader031/viewer/2022020800/5516a78c550346f0208b4e9a/html5/thumbnails/25.jpg)
25 Social / Ethics
FREEWARE — Software written and then donated to the
public, so anyone is free to copy it and share it with their friends. This is not the same as shareware or commercial software, which is
supposed to be paid for.
![Page 26: 1 Social / Ethics NCDesk Societal and Ethical Issues](https://reader031.vdocument.in/reader031/viewer/2022020800/5516a78c550346f0208b4e9a/html5/thumbnails/26.jpg)
26 Social / Ethics
Commercial Software — Copyrighted software that must be
purchased before being installed on a machine: examples are Microsoft Windows,
Office or Math Blaster
![Page 27: 1 Social / Ethics NCDesk Societal and Ethical Issues](https://reader031.vdocument.in/reader031/viewer/2022020800/5516a78c550346f0208b4e9a/html5/thumbnails/27.jpg)
27 Social / Ethics
Blog — A web log; a web page that serves as an
electronic journal
![Page 28: 1 Social / Ethics NCDesk Societal and Ethical Issues](https://reader031.vdocument.in/reader031/viewer/2022020800/5516a78c550346f0208b4e9a/html5/thumbnails/28.jpg)
28 Social / Ethics
IM / Chat — Programs used to communicate with other
users over the Internet
![Page 29: 1 Social / Ethics NCDesk Societal and Ethical Issues](https://reader031.vdocument.in/reader031/viewer/2022020800/5516a78c550346f0208b4e9a/html5/thumbnails/29.jpg)
29 Social / Ethics
Profile — A web page containing information about a user of “buddy sites” and IMs. No personal
information should ever be posted
![Page 30: 1 Social / Ethics NCDesk Societal and Ethical Issues](https://reader031.vdocument.in/reader031/viewer/2022020800/5516a78c550346f0208b4e9a/html5/thumbnails/30.jpg)
30 Social / Ethics
MP3 —Type of digital music file mainly used in file
sharing over the Internet
![Page 31: 1 Social / Ethics NCDesk Societal and Ethical Issues](https://reader031.vdocument.in/reader031/viewer/2022020800/5516a78c550346f0208b4e9a/html5/thumbnails/31.jpg)
31 Social / Ethics
![Page 32: 1 Social / Ethics NCDesk Societal and Ethical Issues](https://reader031.vdocument.in/reader031/viewer/2022020800/5516a78c550346f0208b4e9a/html5/thumbnails/32.jpg)
32 Social / Ethics
![Page 33: 1 Social / Ethics NCDesk Societal and Ethical Issues](https://reader031.vdocument.in/reader031/viewer/2022020800/5516a78c550346f0208b4e9a/html5/thumbnails/33.jpg)
33 Social / Ethics
![Page 34: 1 Social / Ethics NCDesk Societal and Ethical Issues](https://reader031.vdocument.in/reader031/viewer/2022020800/5516a78c550346f0208b4e9a/html5/thumbnails/34.jpg)
34 Social / Ethics
![Page 35: 1 Social / Ethics NCDesk Societal and Ethical Issues](https://reader031.vdocument.in/reader031/viewer/2022020800/5516a78c550346f0208b4e9a/html5/thumbnails/35.jpg)
35 Social / Ethics
![Page 36: 1 Social / Ethics NCDesk Societal and Ethical Issues](https://reader031.vdocument.in/reader031/viewer/2022020800/5516a78c550346f0208b4e9a/html5/thumbnails/36.jpg)
36 Social / Ethics
![Page 37: 1 Social / Ethics NCDesk Societal and Ethical Issues](https://reader031.vdocument.in/reader031/viewer/2022020800/5516a78c550346f0208b4e9a/html5/thumbnails/37.jpg)
37 Social / Ethics
![Page 38: 1 Social / Ethics NCDesk Societal and Ethical Issues](https://reader031.vdocument.in/reader031/viewer/2022020800/5516a78c550346f0208b4e9a/html5/thumbnails/38.jpg)
38 Social / Ethics