Lesson 01: Computer Lab Regulations Lab Organisation

Slides:



Advertisements
Similar presentations
Hart District Acceptable Use Policy Acceptable Use Policy.
Advertisements

Janis Gatewood EDU689 January 27, Faculty and Staff COMPUTER CRIME ACT Section of the Code of Laws of S.C. states that: 1. It is unlawful.
Welcome to our classroom
For Ms. White’s Classroom
Welcome to the Computer Lab
Chapter 1: The Context of SA&D Methods
Ten Commandments of Cyber Ethics. I. Thou shalt not use a computer to harm people Be polite when you are sending messages to people. Treat other people.
Security, Privacy, and Ethics Online Computer Crimes.
For Students. What is Copyright? “The exclusive right to produce or reproduce (copy), to perform in public, or to publish an original literary or artistic.
Instructions for Weds. Jan Get your Century 21 Jr. textbook 2.Log in to the computers 3.On page 80, read the Objectives listed under “Lesson 13:
What Is Computer Ethics?
Computers Are Your Future Twelfth Edition Spotlight 1: Ethics Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 1.
Port Byron Central School Port Byron NY Computer Ethics Presentation September 2003.
Computer Ethics – The Ten Commandments
Lead Black Slide. © 2001 Business & Information Systems 2/e2 Chapter 3 Information System Fundamentals.
THE WONDERFUL HISTORY OF COMPUTERS FROM THE BEGINNING HARDWARE, SOFTWARE,SAFTEY, AND COMPUTER ETHICS.
1.0 Computer Lab Regulations 1.1 Computer Lab Rules 1.2 User 1.3 Equipment 1.4 Data and User Security.
Computer Lab Rules No food or drink in the lab. That includes gum and candy. Obey all regular classroom rules. Treat the computer with respect: Please.
By Adam, Rachelgail & Kayla. What is internet Ethics? They are principles and guidelines to be applied whilst using the internet. Codes of ethics have.
Possible WebQuest type links  
Describe ethical considerations resulting from technological advances.
Computer Ethics.
Barren County Schools Student Technology Appropriate Use Policy (AUP) “ ”
Computer technology—a double-edged sword Social issues Environmental issues Employment issues Legal and Security issues Ethical issues.
Information Systems Today, 2/C/e ©2008 Pearson Education Canada 9-1 ACS 1803 Lecture Outline 15 ETHICS AND COMPUTER CRIME.
Computer Ethics for Computer Users
Ethical and Legal Issues v Ethical and legal issues are relevant to any project involving systems development. – privacy – professionalism – ownership.
© 2001 Business & Information Systems 2/e1 Chapter 3 Information System Fundamentals.
Lead Black Slide Powered by DeSiaMore1. 2 Chapter 3 Information System Fundamentals.
COMPUTER ETHICS Do you know the difference between right and wrong?
Use of U.T. Austin Property Computers: Security & Acceptable Use The University of Texas at Austin General Compliance Training Program.
Chapter 7: IT Ethcs Courtney Littlejohn CSCI 101 Thursday 3:30.
7-8 th Grade Family: Procedures. volume levels Level 0 – Silent (hand raised and wait to be called on). Level 0 – Silent (hand raised and wait to be called.
W E L C O M E Nevitt Computer Lab Mrs. West. E X P E C T A T I O N S Be R espectful Be R esponsible Be R eady to learn.
Computer Room Rules.
Technology Lab Rules, Procedures, Acceptable Use Policy Review Kindergarten-Second Grade This PowerPoint is meant to be used as a quick review! Students.
The Computer Labs are a valuable tool for learning at Prattville High School While in the labs, students will Follow appropriate code of conduct. Adhere.
Ethics in Computers. Top 12 Ways to Protect Your Online Privacy 1) Do not reveal personal information inadvertently 2) Turn on cookie notices in your.
Business Ethics Why should business ethics concern you?
The Ten Commandments of Computer Ethics. The 1st Commandment Thou shalt not use a computer to harm Thou shalt not use a computer to harm other people.
8/16/08Computer Ethics Institute Mae Thomas The Ten Commandments of Computer Ethics by the Computer Ethics Institute.
COMPUTER ETHICS. Computer Ethics n What is ethical behavior? n How do we make ethical decisions? n Matherial from Ethical Decision Making and Information.
The Ten Commandments of Computer Ethics Written by the Computer Ethics Institute A project of the Brookings Institution
Ethics Business Law Sunny Hills High School Mrs. Larsen.
Barren County Schools Student Technology Appropriate Use Policy (AUP) “ ”
Computer Ethics. Ten Commandments of Computer Ethics Copyright: Computer Ethics Institute Author: Dr. Ramon C. Barquin.
Secondary GCCISD Agreement for Computing and Electronic Communications.
Welcome to Mrs. Wallenfeldt’s Technology Class
1 COMPUTER LAB REGULATION
COMPUTER LAB RULES AND REGULATION
ALABAMA TECHNOLGY STANDARDS FOR TEACHERS Ethical Issues of Technology Presented by: Shirley Johnson & Keisha D. Smith.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Mrs. Jenkins Review Elective Building Guidelines.
Computer Ethics. Ethics The rules and standards governing the conduct of an individual with others.
Ethical Implications In The Age Of Information
ETHICS IN USING COMPUTER
Intro to Information Security Phil Grimes Coach / Mentor Security Consultant.
Welcome to the Technology Lab Mrs. Glenboski MCPS – St. Bede Campus Fall 2008.
 Computer Ethics  Definition  Information Ethics  Areas of Ethical Problems  Computer Ethics Issues  Computer Ethics: Academic Discipline  History.
Introduction to Information Security Module 1. Objectives Definitions of information technology and information security Fundamental Security Concepts.
Part 1 WHAT SHOULD HAVE BEEN COVERED DAY ONE Ms. T. N. Jones1.
Computer Ethics IT Fundamentals Battlefield High School.
Computers Are Your Future Twelfth Edition
Chapter 16 – Careers in Information Technology
SPOKANE PUBLIC SCHOOLS COMPUTER LAB PROCEDURES
Important Information For All Proctors
Highland Elementary School
Ethics & Privacy CSCI 101.
Rules for Computer Lab Ms. Mercer  Oak Ridge Elementary  Fall 2007 Licensed under Creative Commons (NC/SA/Attribute)
Rules for Computer Lab Ms. Mercer  Oak Ridge Elementary  Fall 2007 Licensed under Creative Commons (NC/SA/Attribute)
Presentation transcript:

Lesson 01: Computer Lab Regulations Lab Organisation Ethics in Using Computer

Learning Outcomes: At the end of the lesson, students should be able to: Showing and explaining computer lab rules in the computer lab. 2. Reporting on observation of practical lab rules using worksheets. 3. Explaining procedures for responsible care of equipment. 4. Discussing and listing appropriate ways of handling equipment. 5. Explaining the importance of password and usernames.

Computer Lab Rules and Regulations Pupils are prohibited to enter the lab unless authorised by the teacher. Scan diskettes/removable drive before using them. 3. Report all problems related to the system to the teacher. 4. Do not attempt to repair or tamper with lab equipment.

Continue… Be responsible when using equipment, software and facilities in the lab. 6. Do not move any equipment from its original position. 7. Do not remove or load any software into the computer.   Do not change the settings in the computer. Save all work in external storage device and not in the computer.

Continue… 10. Do not bring in bags, food and drink into the lab. 11. Turn off the computer accordingly after use. 12. Switch off all power supplies before leaving the lab. Internet facility is strictly for educational purposes only. 14. All users should record the use of computers in the computer log book. 15. The lab should be kept clean and tidy at all times.

Extra Information Rule One: Be nice to the computers! Clean your hands before using computer. Don’t hit or bang them. Be gentle

Rule Two: Do not share personal information online. Don't share or reveal passwords to other people.

Rule Three: Work together and help each other

Rule Four: Always try your best, and do your best work

Rule Five: Go only where the teacher sends you, and if you get lost, ask for help

Rule Six: Learn and have fun!

How do you… Ask for help? Use the rest room? Help each other? Enter the room? Go to a computer? Leave your seat?

Before you enter the lab Stand in line at the door, facing forward, hands at side or back, not touching others; Silently

When you are in the lab Sit at your place. Listen and follow to the teacher’s instructions. Raise your hand when you asking question.

When you are going to computers Wait until you are dismissed; Go to the computer the teacher assigns you; Do not turn on the monitor until you are ask to do so.

When you are working Raise your hand if you have questions; Keep working while waiting; Follow directions, and the rules.

What is an emergency? Blood; A fight is starting; You are about to go to the bathroom now; You see fire.

Helpers Let teacher select them. Helpers use words. Helpers not allowed to touch the keyboard.

Leaving class Listen and follow directions; Stand in line by the door, facing forward, hands at side or back, not touching others, silently.

Organisation Chart

Organisation Chart of A Computer Lab

Organisation Chart of A Computer Lab

The Responsibilities of a Computer Lab Coordinator • Install currently used software on all computers in a timely and efficient manner. • Periodically examine software to insure accuracy and reliability and correct or reinstall software as necessary. • Secure all software against theft or illegal usage. • Assist in maintaining a disturbance-free environment that is conducive to learning.

The Responsibilities of a Computer Lab Coordinator • Assist students as quickly as possible with learning process and with hardware and software problems. • Assist subject teacher class as needed and substitute for class as needed. • Make sure the lab is open and ready for the students and/or instructors’ use at the beginning of all regularly scheduled class days. • Participate in professional development to keep current with technology.

Timetable

Sample of Timetables There are four (4) sample timetables to implement ICTL programme. Sample A - Single session secondary school class timetable for ICTL programme

Sample B - Single session secondary school computer lab timetable for ICTL programme

Sample C - Double session secondary school class timetable for ICTL programme (form 1 or form 2). ICTL class start before afternoon session school begin.

Sample D - A double session secondary school computer lab timetable for ICTL programme. Form 1 and form 2 classes for the afternoon session attend their ICTL lessons in the morning session timetable.

Log Book

Types of Log Books Two types of logbook must be provided in the lab to monitor the use of lab and computers. Computer Lab Log Book Computer Log Book.

Usage of A Log Book Computer Lab Log Book Every user who enters the lab has to record the details of lab usage in the Computer Lab Log Book.

Usage of A Log Book Computer Log Book. It is provided on each computer table for the user to record computer usage.

Computer Ethics

Computer Ethics Computer ethics are the moral guidelines in using the computers.

Ethics of Computer Usage. You shall not use a computer to harm other people. You shall not interfere with other people’s computer files. You shall not snoop around in other people’s computer files You shall not use a computer to steal. You shall not use a computer to bear false witness.

Ethics of Computer Usage. 6. You shall not copy or use proprietary software for which you not paid. 7. You shall not use other people’s computer resources without authorization or proper compensation. 8. You shall not appropriate other people’s intellectual output.

Ethics of Computer Usage. 9. You shall think about the social consequences of the program you are writing or the system you are designing 10. You shall always use a computer in ways that ensure consideration and respect for your fellow humans.

Meaning of Copyright. Copyright is the legal right to be the only producer or seller of a book, song and film. Copyright is a form of intellectual property that gives the author of an original work exclusive right for a certain time period in relation to that work, including its publication, distribution and adaptation, after which time the work is said to enter the public domain.

Effects of copyright violation Illegal copy or reproduction of copyrights material by the black market group. Selling pirated software. Piracy – Is a crime of illegally copying and selling books, tapes, videos and computer programs.

Unethical Use of Computers modifying certain information on the Internet, affecting the accuracy of the information. selling information to other parties without the owner’s permission. using information without authorization. involvement in stealing software. invasion of privacy.

Unethical Use of Computers. 1) Piracy – example : replicating original CDs and selling them as pirated software.

Unethical Use of Computers. 2) Invasion of privacy, because a) We need privacy for anonymity. For example, the Internet creates an elaborate trail of data detailing a person surfing on the Web because all information is stored inside cookies. We do not want our trail to be detected.

Effects of Unethical Use of Computers. b) We also need privacy for confidentiality. For example, online information generated in the course of a business transaction is routinely used for a variety of other purposes without the individual’s knowledge or consent. We do not want our private lives and habits exposed to third parties.

Unethical Use of Computers. 3) Stealing – computer are being used to steal moneys, goods, information and resources. 4) Hacking – Unauthorized access to the computer system by hackers.