0% found this document useful (0 votes)
79 views31 pages

Third Term Yr 8 lesson notes

The document outlines a lesson plan for teaching Year 8 students about the Internet, covering topics such as its history, benefits, browsers, and safety measures. It includes detailed content on Internet terminology, ethics, and potential abuses, along with evaluations for each week. The plan emphasizes the importance of the Internet in modern communication and education, while also addressing the need for ethical usage and safety precautions.

Uploaded by

Grant Dimkpa
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
79 views31 pages

Third Term Yr 8 lesson notes

The document outlines a lesson plan for teaching Year 8 students about the Internet, covering topics such as its history, benefits, browsers, and safety measures. It includes detailed content on Internet terminology, ethics, and potential abuses, along with evaluations for each week. The plan emphasizes the importance of the Internet in modern communication and education, while also addressing the need for ethical usage and safety precautions.

Uploaded by

Grant Dimkpa
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 31

WEEKS TOPICS CONTENTS

0 Project:
Create an Email account on Yahoo or Gmail.

You can also send your work to dimkpagrant@ctystalbrooks.com or


dimkpagrant@mai.com
1 The Internet I. History of the Internet
II. Internet Terminologies
2 Internet Browser I. Web Browser

II. Types of Browser


3. Benefits of the Internet I. Benefits of the internet

II. Abuse of the Internet


4. Internet Environment I. Internet Environment

5. Abuse of the Internet I. Computer Crime


II. Cyber-bullying
III. Spam (electronic)
IV. Malware
6. File Sharing I. Definition
II. Computer Network
III. Types of Network
IV. Types of Network Topology
7. Computer Ethics I I. Basic Rules

II. General Rules


8. Computer Ethics II I. Ten Commandments of Computer Ethics
9. Safety Measures I. General safety measure
II. Safety Measures for Computer Users
III. Safety Rules in the Computer Laboratory
10. Revision Revision

11. Examination and Closure Examination and closure

12 Examination and Closure Examination and closure

Third Term Lesson plan Note

Lesson Note for Year 8, Week One: The


internet

The internet
Internet is defined as a global electronic
communication network. It is one of
the largest networks that link trillions of
computers all over the world. You can
access this network via communication devices and media such as
modems, cable, telephone lines and satellite.

The Internet is a global system of interconnected computer networks that


use the standard Internet protocol suite (TCP/IP) to link several billion
devices worldwide. It is a network of networks that consists of millions of
private, public, academic, business, and government networks of local to
global scope, linked by a broad array of electronic, wireless, and optical
networking technologies.
The internet offers many conveniences at your fingerprints. You can send
messages to others, meet new friends, bank, invest, shop, fill prescription,
file taxes, take online courses, play games, listen to music or watch a movie
on the internet, the advantage of the internet is that you can use it from
a computer anywhere in the world.

Success today in the business world requires knowledge of the internet.


Without it, you are missing out on a tremendous source for goods, services,
information and, communication.

Here are some of the things one can do on the internet.

 Banking called E-banking 0r Internet Banking


 Invest
 Shop for goods and services
 Watch movies
 Download and listen to music
 Access Educational material e.g. Passnownow.com
 Access source of entertainment and leisure, such as online games,
magazines or vacation planning guide
 Access other computer and exchange files, share and edit document with
other in real time
 Provide information, photographs or audio or video clips

History of the Internet

The history of the internet begin with the following

1. ARPANET: The US defense department created a project called


Advanced Research Project Agency (ARPA) in late 1960s, which was to
work as network that would allow scientist and military personnel to
exchange information in war scenario without disruption in
communications. The network was connected in a way which ensured that
if one section of the network was damage, the remaining computer on the
network would still be able to communicate with each other. This network
was called ARPANET. By 1984, ARPANET had more than 1,000
individual computers linked as hosts.
2. NSFNET: In 1986, the national science foundation (NSF) connected its
huge network of five supercomputer centre called NSFNET, to
ARPANET. They used the technology developed for ARPANET to allow
universities and schools to connect to each other. By 1987, NSFNET could
no longer handle the amount of information that was being transferred.
The national science foundation improved the network to allow more
information to be transferred. This configuration of complex came to be
known as the internet. Most of the people accessing the internet till late
1980s were scientist and researchers. In the early 1990s, many companies
started to offer access to home users. This allows anyone with a modem
and a computer to access the internet.
3. WORLD WIDE WEB: The World Wide Web was created in the early
1990s by European organization for nuclear research. The goal of WWW
was also to allow researchers to work together on projects and to make
project information easily accessible. The first publicly accessible website
was created in 1991. By the mid 1990s, over 30 million people had access
to the internet. Reach this huge market, most big companies created their
own sites on the World Wide Web or provide information about their
products. Now there are thousand companies on the web.

Internet Terminologies
1. Cyber café: An internet café or cyber café is a place which provides
internet access to the public, usually for a fee.
2. Download: To transfer a file from a remote computer to a local
computer. In other words, it means to transfer a file from a web server to a
web client.
3. Upload: To transfer a file from a local computer to a remote computer.
In other words, it means to transfer a file from a web client to a web
server.
4. E-mail: An email is mail that is electronically transmitted by your
computer.
5. Email Address: An email address is the name of an electronic postbox
that can receive and send email messages on a network.
6. Homepage: It is the first page that appears when you visit any website.
It is also the page of a Web site that provides the introduction or content
with links.
7. HTTP: HTTP is an abbreviation for Hypertext Transfer Protocol. It is
the set of rules by which Web pages are transferred across the Internet.
8 URL: URL Stands for "Uniform Resource Locator." A URL is the
address of a specific webpage or file on the Internet.
9. World Wide Web (WWW): It is defined as part of the internet that
contains linked text, image sound, and video documents.
10. Website: A Website is a collection of World Wide Web pages or files.
Examples of website address include: www.cmpnote.blogspot.com,
www.nairaland.com, www.waeconline.org, www.facebook.com etc
11. Webpage: A Web page is a single hypertext file or a page that is part of
a Website
12. Web server: A server is a computer that delivers web content to a web
browser.

13. HTML (Hypertext Markup Language): It is the language of the web.


14. ISP (Internet Service Provider): ISP is an organization that provides
access to the internet and web hosting.
15. Browse: The term to describe a user’s movement across the web
16. Web Browser (Internet Browser): A software program used to display
web pages. It is also defined as is a software application for retrieving,
presenting, and traversing (moving through) information resources on the
World Wide Web.

Evaluation

 Mention five things you can do on the internet


 Mention five internet terminologies
 Write short note on the following:
i. Cyber café ii. URL

Lesson Note for Year 8, Week Two: Internet browser


WEB BROWSER
A web browser is a
software program that
allows you to access and
view web pages. The web
browser software is built
on the hyperlinks, which
allows users to point and
click with a mouse in
order to jump from one
document to another in
whatever order they are
desire.
TYPES OF WEB BROWSER

1. MICROSOFT INTERNET EXPLORER: Microsoft internet explorer


is the most widely used by people around the world. It was developed by
Microsoft in 1995 as a supportive package to the Microsoft windows
operating system.
2. MOZILLA FIREFOX: Mozilla fire fox is the second browser after the
internet explorer. It can be used on many different operating systems
including windows, Macintosh, OS/2 and UNIX. It supports tabbed
browsing that allows user to open multiple sites in a single window.
3. OPERA: Opera is a web browser that was developed by Opera software in
1996. It is a well known browser that is mainly used in activated mobile
phone and smart phones. It is used with many operating systems like
Linux, MAC OS and MS window.
4. NETSCAPE NAVIGATOR: Netscape navigator was developed by
Netscape Communication Corporation and was very popular in the 1990s.
it was compatible with almost every operating system.

Features of Internet Browser

An internet browser has many different parts. They include:


1. Title bar: Displays the title of the open web page
2. Menu bar: The menu bar can be used to activate commands.
Depending on the browser you are using, some contain the following: File,
edit, view, tools, Bookmark, help, etc
3. Address Bar: An address bar is a component of an Internet browser
which is used to input and show the address of a website. The web address
is generally given in lowercase letters and is case-insensitive. There are no
spaces in a webpage or website address.
4. Status Bar: Status bar displays the status of the current page
5. Scroll Bar: This provides vertical or horizontal scrolling through the
web pages.
6. Standard toolbar: Standard toolbar has many different buttons. They
are explained below.
a. Back: To go back to the previously viewed page
b. Forward: To move forward to a page which was viewed
c. Stop: To halt loading of the webpage.
d. Refresh/Reload: To refresh the contents of the currently displayed
webpage from the start
e. Home: To go to the homepage of the currently viewed website.
f. History: It displays a list of previously viewed website
g. Print: Prints the webpage with the default printer settings.

Uses of the Internet


1. The Internet is used for communication to any part of the world
2. The internet is used to search for information on the web through
search engines
3. It is used in sending and receiving messages.
4. It is used for chatting
5. It can be used in the planning of trips. E,g. GPS.
6. It can be used for advertisement and marketing. Etc
Evaluation

1. There are numerous web browsers, mention 3 others that you know
2. Mention three features of an internet browser
3. Define a web browser

Lesson Note for Year 8, Week Three: Benefits of the internet

The benefits of the internet are as follows:

1. INFORMATION: The internet gives you access to information on any


subjects of your interest. This makes the internet a valuable research tool.
Most sources such as news paper and magazines have websites and a
number of them only exist online.
2. RESEARCH: You can make use of the internet search facilities to
research just about any topic you can think of. This information can help
you with a school project, or a presentation at work. You can search for
the data you need, or go to specific research sites.
3. E-MAIL (electronic mail): Electronic mails enable us to exchange
message with people around the world, including friends, family members,
colleagues, customers and even people you meet on the internet. E-mail is
an exciting feature of the internet as we can send and receive message over
long distances. It is also fast, easy and inexpensive.
4. ENTERTAINMENT: The internet offer many different forms of
entertainment, such as radio and television broadcast, video and music.
You can find picture from the latest film, watch live interview of your
favorite celebrities and listen to music before it is available in stores.
5. PROGRAM: You can find thousands of programs that can be used on
your computer, such as word processors, drawing programs, games and
accounting programs.
6. ONLINE SHOPPING: You can order for products on the internet,
while sitting at home. You can purchase items such as books,
flowers, music, CDs, pizzas, stock and used cars.
7. CHATTING: Chat features allow you to exchange typed message with
another person on the internet. The message you send will instantly appear
on the other person’s computer. You can chat with a person or a group at
the same time.
8. BANKING: You can use the internet to find financial sites that enables
you to do your banking and investing online. Banking online is much more
convenient and much less time consuming than doing it in person. Online
banking is extremely secure because all modern browsers support
robust security protocol which ensures that your financial data remains
safe.
9. E-LEARNING: E-learning is a training or education program by
electronic means. E-learning involves the use of computer or an electronic
device (GSM handset) to provide training on educational technology as a
tool for learning . Distant education can be done by e-learning.

Benefits
a. It enables us to share resources globally.
b. The Internet allows access to information in a very fast manner.
c. It is cost-effective.
d. It allows online banking transactions.
e. E-education
f. E-friends
g. E-entertainment
h. E-commerce
Abuse of the Internet
1. It is used by imposters to defraud people
2. Piracy of software
3. Pornography
4. Hacking
5. Plagiarism
6. Computer virus

Evaluation
1. As a student, mention five benefits of the internet to you?
2. State five abuses of the internet

Lesson Note for Year 8, Week Four: Internet Environment

An internet is a logical collection of networks supported by gateways,


routers, bridges, hosts, and various layers of protocols. An internet
permits different physical networks to function as a single, large, virtual
network, and permits dissimilar computers to communicate with each
other, regardless of their physical connections. Processes within gateways,
routers, and hosts originate and receive packet information. Protocols
specify a set of rules and formats required to exchange these packets of
information.

Protocols are used to accomplish different tasks in TCP/IP software. To


understand TCP/IP, you should be familiar with the following terms and
relationships.

A client is a computer or process that requests services on the network.


A server is a computer or process that responds to a request for service
from a client. A user accesses a service, which allows the use of data or
some other resource.
A datagram is a basic unit of information, consisting of one or
more data packets that are passed across an internet at the transport level.

A gateway is a functional unit that connects two computer networks of


different network architectures. A router is a device that connects
networks at the ISO Network Layer. A router is protocol-dependent and
connects only networks operating the same protocol. Routers do more
than transmit data; they also select the best transmission paths and
optimum sizes for packets. A bridge is a router that connects two or more
networks and forwards packets among them. The operations carried out by
a bridge are done at the physical layer and are transparent to TCP/IP and
TCP/IP routing.

A host is a computer, connected to a network, that provides an access


point to that network. A host can be a client, a server, or a client and server
simultaneously. In a communication network, computers are both the
sources and destinations of the packets. The local host is the computer to
which a user’s terminal is directly connected without the use of an internet.
A foreign host is any machine on a network that can be
interconnected. A remote host is any machine on a network that requires a
physical link to interconnect with the network.

An internet address is a unique address identifying each node in an


internet. Internet addresses are used to route packets through the network.
Currently, there are two versions used for internet addressing: Internet
Protocol version 4 (IPv4) and Internet Protocol version 6
(IPv6). Mapping relates internet addresses to physical hardware addresses
in the network. For example, in IPv4, the Address Resolution Protocol
(ARP) is used to map internet addresses to Token-Ring or Ethernet
physical hardware addresses. In IPv6, Internet Control Message Protocol
Version 6 (ICMPv6) is used to map internet addresses to physical hardware
addresses.

A network is the combination of two or more nodes and the connecting


branches among them. A physical network is the hardware that makes up
a network. A logical network is the abstract organization overlaid on one
or more physical networks. An internet is an example of a logical network.

Packet refers to the unit or block of data of one transaction between a


host and its network. A packet usually contains a network header, at least
one high-level protocol header, and data blocks. Generally, the format of
the data blocks does not affect how packets are handled. Packets are the
exchange medium used at the internetwork layer to send and
receive data through the network.

A port is an end point for communication between applications, generally


referring to a logical connection. A port provides queues for sending and
receiving data. Each port has a port number for identification. When the
port number is combined with an internet address, a socket address
results.

Protocol refers to a set of rules for achieving communication on a


network.

Characteristics of the Internet

The characteristics of the Internet that are clearly of importance in cyber


world proceedings are:

 its global nature


 interactivity
 its potential to shift the balance of power in the offline world
 accessibility
 anonymity
 its facilitation of republication
 the prominence of intermediaries
 its reliance on hyperlinks/hypertext
 its long-term impact — the use of permanent archives
 its multimedia character
 its temporal indeterminacy
Lesson Note for Year 8, Week Five: Abuse of the Internet

Internet abuse refers to improper use of the internet and may include:
 Computer Crime – or cybercrime, is any crime that involves
a computer and a network. Use of computers for criminal activity.
 Cyber-bullying – Use of the internet to bully and intimidate. The use of
information technology to repeatedly harm or harass other people in a
deliberate manner.
 Spam (electronic) – Is the use of electronic messaging systems to send
unsolicited messages (spam), especially advertising, as well as sending
messages repeatedly on the same site. Sending of unwanted advertising
messages.
 Malware – Software designed to harm a user’s computer,
including computer viruses. Malware, short for malicious software, is any
software used to disrupt computer operation, gather sensitive information,
or gain access to private computer systems. Malware is defined by its
malicious intent, acting against the requirements of the computer user, and
does not include software that causes unintentional harm due to some
deficiency.

Other ways of Abuse include:

1. You can get harassing/threatening messages from people or from


stalkers.
2. It is very easy to find sites that
promote hatred, violence, drug, sex, and
other things not appropriate for
children.
3. There is no restriction
on marketing products, such as alcohol,
tobacco to children on the internet.
4. Request for personal information for contests, survey e.t.c are used in
unauthorized way.
5. Pornographic sites are easily found on the internet instead of it being
restricted.
EVALUATION:

1. List different ways by which the internet can be abused


2. What is internet abuse

Lesson Note for Year 8, Week Six: File sharing

File sharing is the practice of sharing or offering access to digital


information or resources, including documents, multimedia (audio/video),
graphics, computer programs, images and e-books. It is the private or
public distribution of data or resources in a network with different levels of
sharing privileges.

File sharing can be done using several methods. The most common
techniques for file storage, distribution and transmission include the
following:

 Removable storage devices


 Centralized file hosting server installations on networks
 World Wide Web-oriented hyperlinked documents
 Distributed peer-to-peer networks

Computer Network

A network consists of two


or more computers that
are linked in order to
share resources (such as
printers and CDs),
exchange files, or allow
electronic
communications. The
computers on a network
may be linked through cables, telephone
lines, radio waves, satellites, or infrared
light beams. A network is defined as a group of two or
more computer systems linked together.
Computer networks allow you to share information with friends, family,
coworkers and customers. Network file sharing is the process of
copying data files from one computer to another using a live network
connection.

Before the Internet and home networks became popular, data files were
often shared using floppy disks. Nowadays, some people still use CD-
ROM / DVD-ROM disks and USB sticks for transferring their photos and
videos, but networks give you more flexible options.

Types of Network

 Personal Area Network – The smallest and most basic type of network, a
PAN is made up of a wireless modem, a computer or two, phones,
printers, tablets, etc., and revolves around one person in one building.
These types of networks are typically found in small offices or residences,
and are managed by one person or organization from a single device. Often
used at home, this network is more on connections between
a computer and another gadget such as a telephone or a modem.
 Local Area Network – A connection that’s used for groups of computers.
This is common in small offices and internet cafes. This is where everyone
can share files basically, and is also known to be a good way to connect
between computers whenever they want to share an internet connection, or
whenever they want to play games with each other.
 Metropolitan Area Network – A more powerful version of the local area
network where it can cover up the whole city in terms of connection. A
huge server is usually used for this type of connection.
 Wide Area Network – This is a common type of network nowadays that’s
made possible by wireless technology. As the term implies, a WAN spans a
large physical distance. The Internet is the largest WAN, spanning the
Earth. Usually, a credential or service from a certain company is needed to
enter a connection in this type of network, but there are others that can be
used for free. This is good for internet connection. The internet is a well-
known version of this one. A WAN is a geographically-dispersed
collection of LANs. A network device called a router connects LANs to a
WAN. In IP networking, the router maintains both a LAN address and a
WAN address.
 Storage Area Network – A type of network that specializes in file sharing
and other matters in storing various software within a group of computers.
 Enterprise Private Network – This is a software network that’s often
used in businesses so that they can have privacy over files and interactions
between computers.
 Virtual Private Network – This is a software that’s capable of setting up a
network where everyone registered in the network using a credential will be
able to access each other through other registered computers.
 Wireless Personal Area Network (WPAN) which is virtually a synonym
since almost any personal area network would need to function wirelessly.
Conceptually, the difference between a PAN ( personal area network) and a
wireless LAN ( Local Area Network) is that the former tends to be
centered around one person Network while the latter is a local area
network (LAN) that is connected without wires Network and serving
multiple users.Wireless Networks • The fastest growing segment of
the computer industry is the mobile computers such as
notebook computers and personal digital assistant (PDAs).

 The wireless networks are becoming increasingly important because the


wired connection is not possible in cars or airplanes.
 Wireless networks can have many applications. A very common example is
the portable office
 People traveling on road often want to make use of their portable
electronic equipment for telephone calls, e-mails, faxes, read remote files
etc.
 Wireless networks can exist on trucks, buses, taxies, aero planes etc. They
are used where the telephone systems are destroyed in the event of
disasters such as. fires, floods and earthquakes etc.
 The wireless networks are important for military.
 Wireless networks and mobile computing are related but they are not
identical because portable computers are sometimes wired and some
wireless computers are not portable.
Types of Network Topology

A topology for the network is known to be a layout for the connected


devices. This is important because this is used to provide a proper flow
of data within the said network. Here are the various topologies:

 Bus – This is the type of structure that uses a single medium to connect
the computer.
 Ring – Each computer is connected to another
neighboring computer for data transfer. One failed network can cause all
networks to turn off.
 Star – This is a structure that’s common in homes. It uses a certain hub or
a router to make the network possible.
 Tree – This is a complicated structure that connects the star into multiple
buses. This is common for internet cafes and offices.
 Mesh – this is a connection that leads to various data transmissions which
are perfect for routing huge networks.

Bus Network Topology Ring Network Topology

Star Network Topology Tree Network Topology


Mesh Network Topology

Evaluation

1. Mention four types of networks

2. Name three types of Network

3. What is network topology?

4. With the aid diagram, explain four types network topology

Lesson Note For Year Eight, Week Seven: Computer ethics

COMPUTER ETHICS

Computer ethics are rules that govern the use of


a computer system. Ethics deals with placing a “value” on acts according
to whether they are “good” or “bad”. Every society has its rules about
whether certain acts are ethical or not. These rules have been established as
a result of consensus in society and are often written into
laws. Computer ethics are increasingly becoming important because of the
rising number of cyber crime issues, including software piracy,
unauthorized access, pornography, spamming, target marketing, and
hacking. The widespread popularity and use of the Internet has given rise
to a number of cybercrime issues and concerns about user privacy. Various
computing applications are tampered with to invade into other’s privacy.
Malware, spyware, freeware, and browser cookie exploits are some of the
notorious computing applications that have spurred the debate of
importance of ethical behavior in technology. Some of the rules you should
follow while using computer are:

BASIC RULES

 Check your email regularly


 Avoid liquid and moist from dropping into the computer system
 Protect the system from power fluctuation
 Unplug the system when not in use
 Respond to email promptly and politely
 Use dust cover or proof to cover the system after use

GENERAL RULES

 Any restricted files stardom the computer should not be accessed


 You should not give your user name and password to any one
 You should not alter any information on the system except your own
 Be polite to others on the net
 Be careful not to use rude or bad language online
 Do not break any laws
 Be patients with new comers
 Your message should be simple on the point.

Responsible use of Computer and Internet

The following are the basic security measures taken to prevent damage to
the computer system.
1. There must be adequate ventilation.
2. Adequate space must be allowed between each system unit.
3. Avoid dust by using a cover.
4. Avoid moisture.
5. Provision of air conditioners and fans or other cooling machines.
6. Provision of UPS (Uninterruptible Power Supply) and other electrical
appliances to avoid loss of information and electrical damage to the system.

7. Adequate care must be taken with storage devices like diskettes, flash
drives, CD/DVD writer drives, etc.
8. Disallow an unauthorized user from having access to your computer.
9. Ensure maximum security of files and information on the computer.
10. Provide computer with anti-virus program to avoid viruses.
11. Avoiding food particles dropping into the system.
12. Unplug the system when not in use for a long.
13. Check your email regularly.
14. Give prompt and polite responses to emails.

Reasons for Taking Care of the Computer


a. To avoid damage to files
b. To protect the system
c. To prolong the life of the system
d. To make the user comfortable for maximum efficiency.
Areas of Misusing the Computer

The following are areas in which computers can be misused.

1. Invasion of privacy (hacking):A lot of information can be passed to


several places and among people through the internet. To this end, the
privacy of information cannot be guaranteed; hence someone can have
access to another person’s information. People who gain unauthorized
access to a computer system or data belonging to somebody else are called
hackers. They invade computer databases to steal the identities of other
people by obtaining private information about them

2. Computer virus: This can affect the computer through the internet
where unsolicited information is sent to destroy files in other computers. A
computer virus can also occur when diskettes, CDs, DVDs, and flash
drives that have been corrupted are used in another computer. It is,
therefore, necessary that anti-virus programs are installed on our
computers to detect and clean any virus that may want to attack our
computers.

3. Fraud: Through the internet and computer networks a lot of deception


and scams can be perpetrated by dubious people.

4. Stealing: people can steal very important documents, information and


money through the misuse of computers and the internet.

5. Pornography: Children and adults misuse the computer by watching


pornographic films and pictures on the internet. These are pictures of nude
people and obscene sexual acts on the internet.

6. Cyberwar: this is the use of computers and the internet in conducting


warfare in cyberspace. The type of attacks includes web vandalism,
propaganda, where political messages can be spread through or to anyone
with access to the internet, equipment destruction, where military activities
that use computers and satellites for coordination are at risk and their
communications and orders intercepted or replaced thereby putting a
soldier at risk.

8. Software piracy: This is the situation where programs written by people


are used without their permission.

9. Plagiarism: This is the situation where the original works of people


especially books and other works are copied verbatim (word for word).
Without due acknowledgement of the owner. All this can happen on the
internet.

Evaluation
1. Define computer ethics
2. State five basic rules you should follow while using computer
3. Mention five responsible use of the internet
4. Give four reasons for taking care of the computer
5. Mention five areas of misusing the Computer

Lesson Note for Year Eight, Week Eight: Ten Commandments of


Computer Ethics

The Ten Commandments of Computer Ethics were created in 1992 by


the Computer Ethics Institute. The Ten Commandments is “a set of
standards to guide and instruct people in the ethical use of computers.”

1. Thou shalt not use a computer to harm other people.


2. Thou shalt not interfere with other people’s computer work.
3. Thou shalt not snoop around in other people’s computer files.
4. Thou shalt not use a computer to steal.
5. Thou shalt not use a computer to bear false witness
6. Thou shalt not copy or use proprietary software for which you have not
paid.
7. Thou shalt not use other people’s computer resources without
authorization or proper compensation.
8. Thou shalt not appropriate other people’s intellectual output.
9. Thou shalt think about the social consequences of the program you are
writing or the system you are designing.
10. Thou shalt always use a computer in ways that ensure consideration
and respect for your fellow humans.

EXPLANATION:
 Commandment 1

Simply put: Do not use the computer in ways that may harm other people.

Explanation: It is unethical to use a computer to harm


another computer user. It is not limited to physical injury. It includes
harming or corrupting other users’ data or files. The commandment states
that it is wrong to use a computer to steal someone’s personal information.
Manipulating or destroying files of other users is ethically wrong. It is
unethical to write programs, which on execution leads to stealing, copying
or gaining unauthorized access to other users’ data. Being involved in
practices like hacking, spamming, phishing or cyber bullying does not
conform to computer ethics.

 Commandment 2

Simply put: Do not use computer technology to cause interference in other


users’ work.

Explanation: Computer software can be used in ways that disturb other


users or disrupt their work. Viruses, for example, are programs meant to
harm useful computer programs or interfere with the normal functioning
of a computer or delete files on a computer. Malicious software can disrupt
the functioning of computers in so many ways. It may
overload computer memory through excessive consumption
of computer resources, thus slowing its functioning. It may cause
a computer to function wrongly or even stop working. Using malicious
software to attack a computer is unethical.

 Commandment 3

Simply put: Do not spy on another person’s computer data.

Explanation: We know it is wrong to read someone’s personal letters. On


the same lines, it is wrong to read someone else’s email messages or files or
documents. Obtaining data from another person’s private files is nothing
less than breaking into someone’s room. Snooping around in another
person’s files or reading someone else’s personal messages is the invasion
of his privacy. There are exceptions to this. For example, spying is
necessary and cannot be called unethical when it is done against illegitimate
use of computers. For example, intelligence agencies working on cyber-
crime cases need to spy on the internet activity of suspects.

 Commandment 4

Simply put: Do not use computer technology to steal information.

Explanation: Stealing sensitive information or leaking confidential


information is as good as robbery. It is wrong to acquire personal
information of employees from an employee database or
patient history from a hospital database or other such information that is
meant to be confidential. Similarly, breaking into a bank account to collect
information about the account or account holder is wrong. Illegal
electronic transfer of funds is a type of fraud.

 Commandment 5

Simply put: Do not contribute to the spread of misinformation


using computer technology.

Explanation: Spread of information has become viral today, because of the


Internet. This also means that false news or rumors can spread speedily
through social networking sites or emails. Being involved in the circulation
of incorrect information is unethical. Mails and pop-ups are commonly
used to spread the wrong information or give false alerts with the only
intent of selling products.

 Commandment 6

Simply put: Refrain from copying software or buying pirated copies. Pay
for software unless it is free.

Explanation: Like any other artistic or literary work, software is


copyrighted. A piece of code is the original work of the individual who
created it. It is copyrighted in his name. In case of a developer writing
software for the organization he works for, the organization holds the
copyright for it. Copyright holds true unless its creators announce it is not.
Obtaining illegal copies of copyrighted software is unethical.

 Commandment 7

Simply put: Do not use someone else’s computer resources unless


authorized to.

Explanation: Multi-user systems have user specific passwords. Breaking


into some other user’s password, thus intruding his private space is
unethical. It is not ethical to hack passwords for gaining unauthorized
access to a password-protected computer system. Accessing data that you
are not authorized to access or gaining access to another
user’s computer without his permission is not ethical.

 Commandment 8

Simply put: It is wrong to claim ownership on a work which is the output


of someone else’s intellect.

Explanation: Programs developed by a software developer are his/her


property. If he is working with an organization, they are the organization’s
property. Copying them and propagating them in one’s own name is
unethical. This applies to any creative work, program or design.
Establishing ownership on a work which is not yours is ethically wrong.

 Commandment 9

Simply put: Before developing a software, think about the social impact it
can have.

Explanation: Looking at the social consequences that a program can have,


describes a broader perspective of looking at technology.
A computer software on release, reaches millions. Software like video
games and animations or educational software can have a social impact on
their users. When working on animation films or designing video games,
for example, it is the programmer’s responsibility to understand his target
audience/users and the effect it may have on them. For example,
a computer game for kids should not have content that can influence them
negatively. Similarly, writing malicious software is ethically wrong. A
software developer/development firm should consider the influence their
code can have on the society at large.

 Commandment 10

Simply put: In using computers for communication, be respectful and


courteous with the fellow members.

Explanation: The communication etiquette we follow in the real world


applies to communication over computers as well. While communicating
over the Internet, one should treat others with respect. One should not
intrude others’ private space, use abusive language, make false statements
or pass irresponsible remarks about others. One should be courteous while
communicating over the web and should respect others’ time and
resources. Also, one should be considerate with a
novice computer user.

EVALUATION:

1. List and explain five Commandments of Computer Ethics

Lesson Note for Year Eight, Week Nine: Safety Measures


The computer lab is a place where students learn practical uses of
a computer, such as programming, how to use a spreadsheet program etc.
There are safety rules that need to be applied in a computer lab that protect
students and the computers themselves.

Protecting a computer consists of the following:


 Unwanted programs from installation.
 Unauthorized users from spying on private data and accidental visits to
dangerous networks that contain viruses and spyware.

In a nutshell, safety measures of computer are about keeping computers


from things that can render it useless.

SAFETY MEASURES FOR COMPUTER USERS

Due to ever increasing usage of computers, it is important


for computer users to protect themselves against any hazard.

Safety measures are measures that the users of computers need to take to
enjoy the use of computers. These are measures put in place to protect the
users (you and I) while using the computer.

The following are safety measures that will safeguard the computer users:

1. Blink your eyebrows to reduce dryness.


2. The top of your eyebrows should be leveled with the top of the screen.
3. Adjust the chair setting to adapt your body for the proper height and
lumbar support.
4. Shake your hands periodically when typing for a long periods of time.
5. Reduce the need to reach for items by moving frequently used things such
as telephones and files closer.
6. Take frequent short breaks when performing repetitive tasks.
7. Good Sitting Posture: The sitting posture of the user of the computer
should be comfortable so that backache, neck pains, wrist injuries and eye
strain will be reduced to the barest level. The sitting posture should allow
one to sit with both feet on the floor, and thighs at right angles to the
body. The chair should be adjustable to support the lower back while the
forearms should be kept parallel to the floor. The eye level should be
straight to the screen while keeping the wrist and hands relaxed as one
types on the keyboard.
8. Use of Anti-glare Protector: The use of an anti-glare protector helps
protect the eyes against radioactive rays coming from the computer
monitor. It is important to keep a distance of two feet between the eyes
and the monitor when working on the computer. It is also very important
to blink the eye regularly if one is working on a colour monitor.
9. Proper Positioning of Monitor Base: The monitor should be well
positioned for it to stand very well and also to give room for it to be
adjusted sideways, up or down while it is being used.
10. Illuminating the Computer Room: The computer room should be well
lit with fluorescent light. This is to enable one to see very well the things
that are been done on the computer. It will also remove eye strains from
the user on the computer monitor.
11. Maintaining a Dust-free Environment: Computers are very sensitive
electronic machines. They can easily get damaged by dust, moisture and
temperature, hence the need to ensure that the environment where the
computer is kept and used is dust-free. Computer laboratory floors should
be made with floor tiles and not a rug. The window should be airtight and
air-conditioned.
12. Keep Liquid away from Computers: Liquids of any type and food
droplets can cause a lot of physical damage to the computer hardware. This
is why it is important to keep all liquids away from the computer.
EVALUATION

1. Define safety measures.


2. State any four safety measures for computer users.

SAFETY RULES IN THE COMPUTER LABORATORY

1. Surge Protectors: A surge protector is used to protect computer from


electrical surges that can damage components and destroy important
information.
2. Static Mat: Place every laboratory computer on static mat.
3. Moving Equipment: When moving components within the lab, be sure to
look out for cables on the floor to avoid tripping.
4. Liquids: Keep all liquids Away from computers and electrical equipment
in the lab.
5. Personal Information: A computer laboratory is not the place for
students to enter their personal information on websites.

GENERAL EVALUATION
1. What are computer safety measures?
2. Why safety measures for computers (why is it important)?
3. Mention five ways to protect computer users.
4. List and explain four safety rules in the computer laboratory.

Week Ten: Revision

You might also like