Presentation is loading. Please wait.

Presentation is loading. Please wait.

Computer Ethics, Viruses, and Copyrights Ethical Computer Use Using computers for positive purposes Using computers for positive purposes  New technologies.

Similar presentations


Presentation on theme: "Computer Ethics, Viruses, and Copyrights Ethical Computer Use Using computers for positive purposes Using computers for positive purposes  New technologies."— Presentation transcript:

1

2 Computer Ethics, Viruses, and Copyrights

3 Ethical Computer Use Using computers for positive purposes Using computers for positive purposes  New technologies  Medical cures  Increased knowledge

4 Unethical Computer Use Using computers for negative purposes Using computers for negative purposes  Stealing information  Creating viruses  Pirating videos, music, and software

5 Computer Viruses Designed to cause harm to computers Designed to cause harm to computers Three categories of viruses Three categories of viruses  Worms  Hoaxes  Malicious Programs

6 Worms Usually copy themselves automatically Usually copy themselves automatically Spread through e-mail and networks Spread through e-mail and networks  Often designed to jam networks Typically do not damage the computer Typically do not damage the computer  Usually an annoyance

7 Hoaxes Usually spread through e-mail Usually spread through e-mail Instructions to delete a file that is not harmful and supposed to be on your computer Instructions to delete a file that is not harmful and supposed to be on your computer

8 Malicious Programs Cause damage to the computer Cause damage to the computer May delete files, erase hard drive, make computer unusable May delete files, erase hard drive, make computer unusable

9 Virus Protection Many available virus protection programs Many available virus protection programs  Norton and MacAfee are most popular Regular updates and scanning necessary to protect computer Regular updates and scanning necessary to protect computer Never open e-mail attachments that look suspicious or are from an unknown sender Never open e-mail attachments that look suspicious or are from an unknown sender

10 Copyright Law Denotes that someone is owner of the item Denotes that someone is owner of the item Applies to books, artwork, music, software, movies, and other original creations Applies to books, artwork, music, software, movies, and other original creations Provides for “fair use” Provides for “fair use”

11 Software Protected by Copyright Law Protected by Copyright Law Must have license for each computer Must have license for each computer  Site licenses and multi-user licenses available for reduced rates Specifics outlined in the End User License Agreement (EULA) Specifics outlined in the End User License Agreement (EULA)

12 Software (cont.) Copying for re-sale is illegal Copying for re-sale is illegal Backup copying permitted by some companies Backup copying permitted by some companies Downloading through file-sharing programs is illegal Downloading through file-sharing programs is illegal

13 Sources Computer Concepts BASICS, Second Edition by Wells and Ambrose. 2004 Course Technology. Computer Concepts BASICS, Second Edition by Wells and Ambrose. 2004 Course Technology.


Download ppt "Computer Ethics, Viruses, and Copyrights Ethical Computer Use Using computers for positive purposes Using computers for positive purposes  New technologies."

Similar presentations


Ads by Google