Google Form Report Presentation Fatin Kamilia Mohd Arif Natasha Zaireen Zubir Anis Marjan Azmimurad Nurakhma Shabani Jasni.

Slides:



Advertisements
Similar presentations
The IT Workplace Kaye Burton & Karen Le Rossignol Communication in an IT Environment (2000)
Advertisements

Unit 6 Digital Literacy Study S3 Obj 1
UNIT 6 DIGITAL LITERACY STUDY S3 OBJ 1 VIRUSES & DESTRUCTIVE PROGRAMS.
COMP6005 An Introduction to Computing Session One: An Introduction to Computing Security Issues.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Higher Computing Computer Systems S. McCrossan Higher Grade Computing Studies 6. Using Networks 1 Network Hardware - Hub Hub - A hub is used when you have.
Safe IT – Protect your computer and Family from unwanted programs viruses and websites.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Security, Privacy, and Ethics Online Computer Crimes.
Presented by: Luke Speed Computer Security. Why is computer security important! Intruders hack into computers to steal personal information that the user.
Security strategy. What is security strategy? How an organisation plans to protect and respond to security attacks on their information technology assets.
By Connie Lopez. Main Points 1. Computer Technology Arises Concerns 2. Computer Ethics & Guidelines that Govern the morally acceptable use of Computers.
9 99 CHAPTER Privacy and Security. 9 © The McGraw-Hill Companies, Inc Objectives 1.Privacy 2.Security 3.Ergonomics 4.Environment.
Instructions for Weds. Jan Get your Century 21 Jr. textbook 2.Log in to the computers 3.On page 80, read the Objectives listed under “Lesson 13:
Principles of Information Technology
By Mrs. Smith DATA INTEGRITY AND SECURITY. Accurate Complete Valid Data Integrity.
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
Computer Viruses By Patsy Speer What is a Virus? Malicious programs that cause damage to your computer, files and information They slow down the internet.
THE WONDERFUL HISTORY OF COMPUTERS FROM THE BEGINNING HARDWARE, SOFTWARE,SAFTEY, AND COMPUTER ETHICS.
Lesson 46: Using Information From the Web copy and paste information from a Web site print a Web page download information from a Web site customize Web.
TEST REFLECTION CHAPTER 9 & 10. QUESTION 1 A spreadsheet is an application program you can use for working with numbers and doing math. False Look up.
Internet safety By Lydia Snowden.
R. FRANK NIMS MIDDLE SCHOOL A BRIEF INTRODUCTION TO VIRUSES.
Course: Introduction to Computers Lecture: 6.  Commercial software is covered by Copyrights.  You have to pay for it and register to have the license.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Protecting ICT Systems
Digital Citizenship By Web Design.  It is a system to teach students and teachers the way to use technology correctly. As new technology appears we all.
Course ILT Computers and society Unit objectives Identify the main uses of computers in daily life, and identify the benefits of using Describe.
Networks and Hackers Copyright © Texas Education Agency, All rights reserved. 1.
PC Maintenance How to keep your computer healthy.
Microsoft Internet Explorer and the Internet Using Microsoft Explorer 5.
Files are at risk from loss if your computer breaks or if you get a virus. Files can also become corrupted. Solutions: Make regular back ups of files Use.
Chapter 5: General Computer Topics Department of Computer Science Foundation Year Program Umm Alqura University, Makkah Computer Skills /1436.
Ethics in Computers. Top 12 Ways to Protect Your Online Privacy 1) Do not reveal personal information inadvertently 2) Turn on cookie notices in your.
Chapter 18 Technology in the Workplace Section 18.2 Internet Basics.
Computer Defining denial of service, worm, virus and hoax. Examples of negligence or incompetence that leads to crime. CI R M E By: Megan Price.
C OMPUTER V IRUSES Julia White. W HAT ARE COMPUTER VIRUSES ? Computer viruses are small software programs that are designed to spread from one computer.
Computer Crimes Career & Technology Education Department.
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
Workshop site:
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Internet Safety Internet Safety LPM
Computer Ethics. Computer Virus  A Virus is a computer program written to alter the way a computer operates, without the permission or knowledge of the.
We are here to tell you how to keep you’re computer clear of all bad things. Without a doubt it will help a true Brownie will take all this on board!
By Liam Wright Manga comic group Japan SAFETY on your computer.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Security and Ethics Safeguards and Codes of Conduct.
Virus Assignment JESS D. How viruses affect people and businesses  What is a virus? A computer virus is a code or a program that is loaded onto your.
Onguardonline.gov By Austin Kellogg. Main ideas  Protect your personal information  Know who your dealing with  Use security software that updates.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Security Issues and Ethics in Education Chapter 8 Brooke Blanscet, Morgan Chatman, Lynsey Turner, Bryan Howerton.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Security, Ethics and the Law. Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright.
Computer Security Keeping you and your computer safe in the digital world.
Philip J. Beyer, Information Security Officer John P. Skaarup, Sr. Security Engineer Texas Education Agency Information Security.
Applications Software. Is a software used to carry out a particular task e.g. a game or word processor.
SOFTWARE PIRACY & WORKPLACE ETHICS. What Is Software Piracy? Unauthorized copying/installation/use Unauthorized distribution or sale.
Acceptable Use Policy (Draft)
Managing Windows Security
Jeopardy—CH 8 Security Risks Ethics- Health Emerging Technology
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Call AVG Antivirus Support | Fix Your PC
Computer Ethics.
CHAPTER 2: OPERATING SYSTEMS (Part 2) COMPUTER SKILLS.
Stay Safe While Using The Internet
Part 3.
Unit 4 IT Security Kerris Davies.
The Issues with Technology in education
Principles of Information Technology
Presentation transcript:

Google Form Report Presentation Fatin Kamilia Mohd Arif Natasha Zaireen Zubir Anis Marjan Azmimurad Nurakhma Shabani Jasni

Original software basically means a provider of software testing products and services while licensed software means software that allows an individual or group to use it Original, Licensed Software

Computer security are software that focuses on protecting information, hardware and software from unauthorized use. Internet security is a tree branch of computer security specifically related to the internet, often involving browser security and network security. Internet & Computer Security

The benefits of using original and licensed software are; ●Avoiding piracy as running pirated software is a crime. ●The software itself is virus-free as there would be any attached virus along with the software. ●Your data too, is secured as it is protected by the system. ●It comes with warranty, if anything happens during the warranty time, the company is responsible to fix it. ●It is also beneficial as you are eligible to get special offers by the company. Benefits

The benefits of running computer and internet security; ●Avoiding hackers from stealing your data. ●Helps computer being virus free, thus escape the torture of lagged data and data loss. ●To secure personal data.

1) To observe university students’ awareness regarding Computer and Internet Security and Original and Licensed Software for these elements are ubiquitous nowadays. 2) To observe university students’ knowledge regarding Computer and Internet Security and Original and Licensed Software for these elements are ubiquitous nowadays. Objectives

3)To see how respondents’ effort in protecting their information and property and take safety measurements while they are on the Net. 4) To see respondents views on computer ethics including copyright law and software piracy.

Participants : The participants involved in this survey consists of 41 students from different background. Majority of them are UKM students taking TESL and Special Education. Research Methodology

Data Collection Method: With the help of Google Forms, we had created an online survey consisting of 19 questions to measure the students’ awareness of original and licensed software and internet and computer security.

Throughout the data collection, we are able to identify 3 primary privacy issues which is closely related to accuracy, property and access. Findings

Discussions

14 out of 37 respondents stated Internet is the source that they use to obtain new software 13 people prefer to get new software directly at computer store or the store where they bought their laptop. 10 respondents choose to get suggestion from others; people with more knowledge about computer or experts. Only two respondents stated that they have never installed new software, so they probably use the applications that have been installed when they bought their laptops. -15 respondents answered that they own pirated software,10 respondents did not use pirated software -10 of the respondents who own pirated software said their reason is because the original ones are too expensive 2 of them said that the pirated ones are free one respondents told that the pirated versions are easy to get; we can obtain them from the Web.

When you buy your computer or softwares, make sure there is proper documentation to make sure that its originality. Install antivirus in both your browser and computer. This way, your data will be secured. As students, we should be aware of this. This is because having antivirus and using original softwares will help protecting your data as students and at the same time will ensure that your assignments will be send on time without any problem such as virus in your pendrive that may delete all your files. You also have to make sure you have back up data in online storage or hard disk. Conclusion