SlideShare una empresa de Scribd logo
1 de 15
WAYS OF MISUSINGTHE
COMPUTER SYSTEM
WEEK 8
NEXT
1. HACKING
This is the theft of hardware
and software resources. It
can also include the theft of
physical cash as well as
official documents.
NEXTBACK
2. PORNOGRAPHY
This is the use of internet to
show nude pictures, thereby
abusing the mind of the
teenage.
NEXTBACK
3. CYBERWAR
This is the use of electronic
network and information on
the net to fervent trouble e.g.
the use of internet to send
provocative word.
NEXTBACK
4. FRAUD
This involves using internet
to defraud others.The
fraudsters commonly refer
to as yahoo boys, defraud
their victim of their money
and valuables.
NEXTBACK
5. PIRACY OF SOFTWARE
When people go to the
internet to copy software and
use it without permission or
authorization is referred to as
the piracy.
NEXTBACK
6. PLAGIARISM
This is the claiming the ownership of
the researched work of software
belonging to another person and get
credit or reward for it.This is possible
when existing job is pirated and
represent as new and original.
BACK NEXT
7. STEALING
This is the use of computer
to steal money (i.e.
unauthorized use or access
to other people ATM). It is
similar to fraud.
NEXTBACK
8.VIRUS ATTACK ORTHREAT
Virus is a program written by the
programmer to adversely affect the
smooth running of the computer system.
Some internet users intentionally send
virus to other internet users.The effects
of virus attack are numerous.
BACK TO CLASS QUIZ
CLASS QUIZ
1.The theft of hardware and software resources is called
………………
(a) Hacking
(b) Fraud
(c) Stealing
CLASS QUIZ
2. ………….. is the use of electronic network and information on
the net to fervent trouble
(a) Cyber war
(b) Stealing
(c) Fraud
CORRECT
NEXT QUIZ
CORRECT
HOME
WRONG
TRY AGAIN
WRONG
TRY AGAIN

Más contenido relacionado

La actualidad más candente

La actualidad más candente (20)

Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cybercrime and security
Cybercrime and securityCybercrime and security
Cybercrime and security
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
CYBER TERRORISM
     CYBER TERRORISM     CYBER TERRORISM
CYBER TERRORISM
 
Cyber Security in Society
Cyber Security in SocietyCyber Security in Society
Cyber Security in Society
 
Phishing
PhishingPhishing
Phishing
 
Final cyber crime and security
Final cyber crime and securityFinal cyber crime and security
Final cyber crime and security
 
Seminar on Cyber Crime
Seminar on Cyber CrimeSeminar on Cyber Crime
Seminar on Cyber Crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
3.2.1 computer security risks
3.2.1 computer security risks3.2.1 computer security risks
3.2.1 computer security risks
 
Full seminar report on ethical hacking
Full seminar report on ethical hackingFull seminar report on ethical hacking
Full seminar report on ethical hacking
 
Hacking
Hacking Hacking
Hacking
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime ppt new
Cyber crime ppt newCyber crime ppt new
Cyber crime ppt new
 
Cyber Safety For Educators
Cyber Safety For EducatorsCyber Safety For Educators
Cyber Safety For Educators
 

Similar a Ways of Misusing The Computer System

Lesson 2 Rules of Netiquette
Lesson 2   Rules of NetiquetteLesson 2   Rules of Netiquette
Lesson 2 Rules of NetiquetteACLC Antipolo
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & securitySohailAkbar14
 
The disadvantages of ict
The disadvantages of ictThe disadvantages of ict
The disadvantages of ictcyb1337
 
The house believes that internet acces is a human right
The house believes that internet acces is a human rightThe house believes that internet acces is a human right
The house believes that internet acces is a human rightAgustina
 
LEGAL AND ETHICAL USE OF TECHNOLOGY.pptx
LEGAL AND ETHICAL USE OF TECHNOLOGY.pptxLEGAL AND ETHICAL USE OF TECHNOLOGY.pptx
LEGAL AND ETHICAL USE OF TECHNOLOGY.pptxAnnMarieTAquinoII
 
Cyber crime in pakistan by zubair
Cyber crime in pakistan by zubairCyber crime in pakistan by zubair
Cyber crime in pakistan by zubairMuhammad Zubair
 
cyber crime and laws
cyber crime and laws cyber crime and laws
cyber crime and laws Aman Bhargava
 
Cyber forensic 1
Cyber forensic 1Cyber forensic 1
Cyber forensic 1anilinvns
 
Cyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj AhirwarCyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj AhirwarNeeraj Ahirwar
 
Cyber Law and Cyber Crime
Cyber Law and Cyber CrimeCyber Law and Cyber Crime
Cyber Law and Cyber CrimeSyangba132
 
The disadvantage of ict.pptx
The disadvantage of ict.pptxThe disadvantage of ict.pptx
The disadvantage of ict.pptxangellaclarianes1
 
The disadvantages of ICT.pptx-final [Autosaved].pptx
The disadvantages of ICT.pptx-final [Autosaved].pptxThe disadvantages of ICT.pptx-final [Autosaved].pptx
The disadvantages of ICT.pptx-final [Autosaved].pptxAnecitaLCalamohoy
 
The disadvantages of ICT.pptx-final [Autosaved].pptx
The disadvantages of ICT.pptx-final [Autosaved].pptxThe disadvantages of ICT.pptx-final [Autosaved].pptx
The disadvantages of ICT.pptx-final [Autosaved].pptxAnecitaLCalamohoy
 
Cyber crime types & laws
Cyber crime types & lawsCyber crime types & laws
Cyber crime types & lawssureshjogesh48
 
Greendeana unit 8 project cj216 copy
Greendeana unit 8 project cj216 copyGreendeana unit 8 project cj216 copy
Greendeana unit 8 project cj216 copyDee Green
 

Similar a Ways of Misusing The Computer System (20)

Lesson 2 Rules of Netiquette
Lesson 2   Rules of NetiquetteLesson 2   Rules of Netiquette
Lesson 2 Rules of Netiquette
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & security
 
The disadvantages of ict
The disadvantages of ictThe disadvantages of ict
The disadvantages of ict
 
The house believes that internet acces is a human right
The house believes that internet acces is a human rightThe house believes that internet acces is a human right
The house believes that internet acces is a human right
 
Chapter 8.legal. opportunities
Chapter 8.legal. opportunitiesChapter 8.legal. opportunities
Chapter 8.legal. opportunities
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Unit 2
Unit 2Unit 2
Unit 2
 
Unit 2
Unit 2Unit 2
Unit 2
 
LEGAL AND ETHICAL USE OF TECHNOLOGY.pptx
LEGAL AND ETHICAL USE OF TECHNOLOGY.pptxLEGAL AND ETHICAL USE OF TECHNOLOGY.pptx
LEGAL AND ETHICAL USE OF TECHNOLOGY.pptx
 
Cyber crime in pakistan by zubair
Cyber crime in pakistan by zubairCyber crime in pakistan by zubair
Cyber crime in pakistan by zubair
 
cyber crime and laws
cyber crime and laws cyber crime and laws
cyber crime and laws
 
Cyber forensic 1
Cyber forensic 1Cyber forensic 1
Cyber forensic 1
 
Cyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj AhirwarCyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj Ahirwar
 
Cyber Law and Cyber Crime
Cyber Law and Cyber CrimeCyber Law and Cyber Crime
Cyber Law and Cyber Crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
The disadvantage of ict.pptx
The disadvantage of ict.pptxThe disadvantage of ict.pptx
The disadvantage of ict.pptx
 
The disadvantages of ICT.pptx-final [Autosaved].pptx
The disadvantages of ICT.pptx-final [Autosaved].pptxThe disadvantages of ICT.pptx-final [Autosaved].pptx
The disadvantages of ICT.pptx-final [Autosaved].pptx
 
The disadvantages of ICT.pptx-final [Autosaved].pptx
The disadvantages of ICT.pptx-final [Autosaved].pptxThe disadvantages of ICT.pptx-final [Autosaved].pptx
The disadvantages of ICT.pptx-final [Autosaved].pptx
 
Cyber crime types & laws
Cyber crime types & lawsCyber crime types & laws
Cyber crime types & laws
 
Greendeana unit 8 project cj216 copy
Greendeana unit 8 project cj216 copyGreendeana unit 8 project cj216 copy
Greendeana unit 8 project cj216 copy
 

Más de Ejiro Ndifereke

Sale For E-Note and Exam Questions For Secondary Schools.pdf
Sale For E-Note and Exam Questions For Secondary Schools.pdfSale For E-Note and Exam Questions For Secondary Schools.pdf
Sale For E-Note and Exam Questions For Secondary Schools.pdfEjiro Ndifereke
 
A Presentation on Spreadsheet
A Presentation on SpreadsheetA Presentation on Spreadsheet
A Presentation on SpreadsheetEjiro Ndifereke
 
A Data Processing Presentation on Graphics
A Data Processing Presentation on GraphicsA Data Processing Presentation on Graphics
A Data Processing Presentation on GraphicsEjiro Ndifereke
 
SS2 Data Processing Examination with Test of Practicals (Third Term)
SS2 Data Processing Examination with Test of Practicals (Third Term)SS2 Data Processing Examination with Test of Practicals (Third Term)
SS2 Data Processing Examination with Test of Practicals (Third Term)Ejiro Ndifereke
 
SS1 Data Processing Examination with Test of Practical (Third Term)
SS1 Data Processing Examination with Test of Practical  (Third Term)SS1 Data Processing Examination with Test of Practical  (Third Term)
SS1 Data Processing Examination with Test of Practical (Third Term)Ejiro Ndifereke
 
JS2 Computer Studies Examination (Third Term)
JS2 Computer Studies Examination (Third Term)JS2 Computer Studies Examination (Third Term)
JS2 Computer Studies Examination (Third Term)Ejiro Ndifereke
 
Js1 computer studies examination (Third Term)
Js1 computer studies examination (Third Term)Js1 computer studies examination (Third Term)
Js1 computer studies examination (Third Term)Ejiro Ndifereke
 
SS3 DATA PROCESSING EXAMINATION (FIRST TERM)
SS3 DATA PROCESSING EXAMINATION (FIRST TERM)SS3 DATA PROCESSING EXAMINATION (FIRST TERM)
SS3 DATA PROCESSING EXAMINATION (FIRST TERM)Ejiro Ndifereke
 
SS2 DATA PROCESSING EXAMINATION (FIRST TERM)
SS2 DATA PROCESSING EXAMINATION (FIRST TERM)SS2 DATA PROCESSING EXAMINATION (FIRST TERM)
SS2 DATA PROCESSING EXAMINATION (FIRST TERM)Ejiro Ndifereke
 
SS1 DATA PROCESSING EXAMINATION (FIRST TERM)
SS1 DATA PROCESSING EXAMINATION (FIRST TERM)SS1 DATA PROCESSING EXAMINATION (FIRST TERM)
SS1 DATA PROCESSING EXAMINATION (FIRST TERM)Ejiro Ndifereke
 
JSS3 COMPUTER STUDIES EXAMINATION (FIRST TERM)
JSS3 COMPUTER STUDIES EXAMINATION (FIRST TERM)JSS3 COMPUTER STUDIES EXAMINATION (FIRST TERM)
JSS3 COMPUTER STUDIES EXAMINATION (FIRST TERM)Ejiro Ndifereke
 
JSS2 COMPUTER STUDIES EXAMINATION (FIRST TERM)
JSS2 COMPUTER STUDIES EXAMINATION (FIRST TERM)JSS2 COMPUTER STUDIES EXAMINATION (FIRST TERM)
JSS2 COMPUTER STUDIES EXAMINATION (FIRST TERM)Ejiro Ndifereke
 
JSS1 COMPUTER STUDIES EXAMINATION (FIRST TERM)
JSS1 COMPUTER STUDIES EXAMINATION (FIRST TERM)JSS1 COMPUTER STUDIES EXAMINATION (FIRST TERM)
JSS1 COMPUTER STUDIES EXAMINATION (FIRST TERM)Ejiro Ndifereke
 
SS3 DATA PROCESSING PRACTICAL EXAMINATION (FIRST TERM)
SS3 DATA PROCESSING PRACTICAL EXAMINATION (FIRST TERM)SS3 DATA PROCESSING PRACTICAL EXAMINATION (FIRST TERM)
SS3 DATA PROCESSING PRACTICAL EXAMINATION (FIRST TERM)Ejiro Ndifereke
 
SS2 DATA PROCESSING PRACTICAL EXAMINATION (FIRST TERM)
SS2 DATA PROCESSING PRACTICAL EXAMINATION (FIRST TERM)SS2 DATA PROCESSING PRACTICAL EXAMINATION (FIRST TERM)
SS2 DATA PROCESSING PRACTICAL EXAMINATION (FIRST TERM)Ejiro Ndifereke
 
SS1 DATA PROCESSING PRACTICAL EXAMINATION (FIRST TERM)
SS1 DATA PROCESSING PRACTICAL EXAMINATION (FIRST TERM)SS1 DATA PROCESSING PRACTICAL EXAMINATION (FIRST TERM)
SS1 DATA PROCESSING PRACTICAL EXAMINATION (FIRST TERM)Ejiro Ndifereke
 
S3 DATA PROCESSING FIRST TERM PRE-WAEC (2ND HALF EXAMINATION)
S3 DATA PROCESSING FIRST TERM PRE-WAEC (2ND HALF EXAMINATION)S3 DATA PROCESSING FIRST TERM PRE-WAEC (2ND HALF EXAMINATION)
S3 DATA PROCESSING FIRST TERM PRE-WAEC (2ND HALF EXAMINATION)Ejiro Ndifereke
 
S2 DATA PROCESSING FIRST TERM C.A 2
S2 DATA PROCESSING FIRST TERM C.A 2S2 DATA PROCESSING FIRST TERM C.A 2
S2 DATA PROCESSING FIRST TERM C.A 2Ejiro Ndifereke
 
S1 DATA PROCESSING FIRST TERM C.A 2
S1 DATA PROCESSING FIRST TERM C.A 2S1 DATA PROCESSING FIRST TERM C.A 2
S1 DATA PROCESSING FIRST TERM C.A 2Ejiro Ndifereke
 
JS3 COMPUTER STUDIES FIRST TERM C.A 2
JS3 COMPUTER STUDIES FIRST TERM C.A 2JS3 COMPUTER STUDIES FIRST TERM C.A 2
JS3 COMPUTER STUDIES FIRST TERM C.A 2Ejiro Ndifereke
 

Más de Ejiro Ndifereke (20)

Sale For E-Note and Exam Questions For Secondary Schools.pdf
Sale For E-Note and Exam Questions For Secondary Schools.pdfSale For E-Note and Exam Questions For Secondary Schools.pdf
Sale For E-Note and Exam Questions For Secondary Schools.pdf
 
A Presentation on Spreadsheet
A Presentation on SpreadsheetA Presentation on Spreadsheet
A Presentation on Spreadsheet
 
A Data Processing Presentation on Graphics
A Data Processing Presentation on GraphicsA Data Processing Presentation on Graphics
A Data Processing Presentation on Graphics
 
SS2 Data Processing Examination with Test of Practicals (Third Term)
SS2 Data Processing Examination with Test of Practicals (Third Term)SS2 Data Processing Examination with Test of Practicals (Third Term)
SS2 Data Processing Examination with Test of Practicals (Third Term)
 
SS1 Data Processing Examination with Test of Practical (Third Term)
SS1 Data Processing Examination with Test of Practical  (Third Term)SS1 Data Processing Examination with Test of Practical  (Third Term)
SS1 Data Processing Examination with Test of Practical (Third Term)
 
JS2 Computer Studies Examination (Third Term)
JS2 Computer Studies Examination (Third Term)JS2 Computer Studies Examination (Third Term)
JS2 Computer Studies Examination (Third Term)
 
Js1 computer studies examination (Third Term)
Js1 computer studies examination (Third Term)Js1 computer studies examination (Third Term)
Js1 computer studies examination (Third Term)
 
SS3 DATA PROCESSING EXAMINATION (FIRST TERM)
SS3 DATA PROCESSING EXAMINATION (FIRST TERM)SS3 DATA PROCESSING EXAMINATION (FIRST TERM)
SS3 DATA PROCESSING EXAMINATION (FIRST TERM)
 
SS2 DATA PROCESSING EXAMINATION (FIRST TERM)
SS2 DATA PROCESSING EXAMINATION (FIRST TERM)SS2 DATA PROCESSING EXAMINATION (FIRST TERM)
SS2 DATA PROCESSING EXAMINATION (FIRST TERM)
 
SS1 DATA PROCESSING EXAMINATION (FIRST TERM)
SS1 DATA PROCESSING EXAMINATION (FIRST TERM)SS1 DATA PROCESSING EXAMINATION (FIRST TERM)
SS1 DATA PROCESSING EXAMINATION (FIRST TERM)
 
JSS3 COMPUTER STUDIES EXAMINATION (FIRST TERM)
JSS3 COMPUTER STUDIES EXAMINATION (FIRST TERM)JSS3 COMPUTER STUDIES EXAMINATION (FIRST TERM)
JSS3 COMPUTER STUDIES EXAMINATION (FIRST TERM)
 
JSS2 COMPUTER STUDIES EXAMINATION (FIRST TERM)
JSS2 COMPUTER STUDIES EXAMINATION (FIRST TERM)JSS2 COMPUTER STUDIES EXAMINATION (FIRST TERM)
JSS2 COMPUTER STUDIES EXAMINATION (FIRST TERM)
 
JSS1 COMPUTER STUDIES EXAMINATION (FIRST TERM)
JSS1 COMPUTER STUDIES EXAMINATION (FIRST TERM)JSS1 COMPUTER STUDIES EXAMINATION (FIRST TERM)
JSS1 COMPUTER STUDIES EXAMINATION (FIRST TERM)
 
SS3 DATA PROCESSING PRACTICAL EXAMINATION (FIRST TERM)
SS3 DATA PROCESSING PRACTICAL EXAMINATION (FIRST TERM)SS3 DATA PROCESSING PRACTICAL EXAMINATION (FIRST TERM)
SS3 DATA PROCESSING PRACTICAL EXAMINATION (FIRST TERM)
 
SS2 DATA PROCESSING PRACTICAL EXAMINATION (FIRST TERM)
SS2 DATA PROCESSING PRACTICAL EXAMINATION (FIRST TERM)SS2 DATA PROCESSING PRACTICAL EXAMINATION (FIRST TERM)
SS2 DATA PROCESSING PRACTICAL EXAMINATION (FIRST TERM)
 
SS1 DATA PROCESSING PRACTICAL EXAMINATION (FIRST TERM)
SS1 DATA PROCESSING PRACTICAL EXAMINATION (FIRST TERM)SS1 DATA PROCESSING PRACTICAL EXAMINATION (FIRST TERM)
SS1 DATA PROCESSING PRACTICAL EXAMINATION (FIRST TERM)
 
S3 DATA PROCESSING FIRST TERM PRE-WAEC (2ND HALF EXAMINATION)
S3 DATA PROCESSING FIRST TERM PRE-WAEC (2ND HALF EXAMINATION)S3 DATA PROCESSING FIRST TERM PRE-WAEC (2ND HALF EXAMINATION)
S3 DATA PROCESSING FIRST TERM PRE-WAEC (2ND HALF EXAMINATION)
 
S2 DATA PROCESSING FIRST TERM C.A 2
S2 DATA PROCESSING FIRST TERM C.A 2S2 DATA PROCESSING FIRST TERM C.A 2
S2 DATA PROCESSING FIRST TERM C.A 2
 
S1 DATA PROCESSING FIRST TERM C.A 2
S1 DATA PROCESSING FIRST TERM C.A 2S1 DATA PROCESSING FIRST TERM C.A 2
S1 DATA PROCESSING FIRST TERM C.A 2
 
JS3 COMPUTER STUDIES FIRST TERM C.A 2
JS3 COMPUTER STUDIES FIRST TERM C.A 2JS3 COMPUTER STUDIES FIRST TERM C.A 2
JS3 COMPUTER STUDIES FIRST TERM C.A 2
 

Último

PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docxPoojaSen20
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxnegromaestrong
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxVishalSingh1417
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docxPoojaSen20
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Shubhangi Sonawane
 

Último (20)

INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 

Ways of Misusing The Computer System

  • 1. WAYS OF MISUSINGTHE COMPUTER SYSTEM WEEK 8 NEXT
  • 2. 1. HACKING This is the theft of hardware and software resources. It can also include the theft of physical cash as well as official documents. NEXTBACK
  • 3. 2. PORNOGRAPHY This is the use of internet to show nude pictures, thereby abusing the mind of the teenage. NEXTBACK
  • 4. 3. CYBERWAR This is the use of electronic network and information on the net to fervent trouble e.g. the use of internet to send provocative word. NEXTBACK
  • 5. 4. FRAUD This involves using internet to defraud others.The fraudsters commonly refer to as yahoo boys, defraud their victim of their money and valuables. NEXTBACK
  • 6. 5. PIRACY OF SOFTWARE When people go to the internet to copy software and use it without permission or authorization is referred to as the piracy. NEXTBACK
  • 7. 6. PLAGIARISM This is the claiming the ownership of the researched work of software belonging to another person and get credit or reward for it.This is possible when existing job is pirated and represent as new and original. BACK NEXT
  • 8. 7. STEALING This is the use of computer to steal money (i.e. unauthorized use or access to other people ATM). It is similar to fraud. NEXTBACK
  • 9. 8.VIRUS ATTACK ORTHREAT Virus is a program written by the programmer to adversely affect the smooth running of the computer system. Some internet users intentionally send virus to other internet users.The effects of virus attack are numerous. BACK TO CLASS QUIZ
  • 10. CLASS QUIZ 1.The theft of hardware and software resources is called ……………… (a) Hacking (b) Fraud (c) Stealing
  • 11. CLASS QUIZ 2. ………….. is the use of electronic network and information on the net to fervent trouble (a) Cyber war (b) Stealing (c) Fraud