SlideShare una empresa de Scribd logo
1 de 25
Lesson 6 Computer Ethics
Computer Ethics
• Computer Ethics refers to the rules or principles
that deals with the right and wrong way of using
the computer together with the moral duty and
obligation of computer users
10 Commandments of Computer Ethics
• 1.Thou shall not use a computer to harm other
people.
it is unethical to change or mess with other
people’s file or computer system. An example is
by sending spam e-mails which can harm other
user’s account
10 Commandments of Computer Ethics
• 2. Thou shall not interfere with other people’s
computer work
Making changes to other people’s files without
their approval is unethical. Same with creating
computer viruses that would display annoying
messages, corrupt files, and erase data
10 Commandments of Computer Ethics
• 3. Thou shall not snoop around in other people’s
files
• oObtaining and looking at other’s files without
permission is not proper. Reading personal
documents, letters, and e-mail messages of
others is invading their privacy
10 Commandments of Computer Ethics
• 4. Thou shall not use a computer to steal
Breaking into bank accounts and transferring
money through the use of computers is stealing.
Some as tampering programs and computerized
equipment such as ATM to get funds
10 Commandments of Computer Ethics
• 5. Thou shall not use or copy software for which
you have not paid.
Creating duplicate copies of software and buying
and using pirated CDs.
10 Commandments of Computer Ethics
• 6. Thou shall not use a computer to bear false
witness
Spreading rumors about a person or an
organization through the Internet is against
ethical use of the computer. Giving out false
information through websites or newsgroups
and spreading black propaganda by sending emails with false information about a person, an
idea, or an organization is improper
10 Commandments of Computer Ethics
• 7. Thou shall not use other people’s computer
resources without authorization or proper
compensation
Accessing systems through unauthorized us of
ID’s usernames and passwords is hacking and it
is unethical
10 Commandments of Computer Ethics
• 8. Thou shall not appropriate other people’s
intellectual output
Using the ideas and words of others without
clearly acknowledging the author or source of
that information is unethical. Copying computer
programs and ideas without the consent of the
owner is considered as plagiarism which is
against the law. It is a violation of other people’s
intellectual property rights
Lesson 5 Virus
Computer Virus

• Computer virus is a program which reproduces
itself. It may attach to other programs which
may create copies of it. It may damage or corrupt
data, change data, or degrade the performance
of your system by utilizing resources such as
memory or disk space
History of Computer Virus
1971 – “The Creeper”
• It was developed by programmer Bob Thomas of BNN Technologies to
actively explain a mobile application on how a virus infiltrate and be
replicated throughout a localized computer network. It was never
intended for harm
1971 – “The Creeper”

•The Creeper was first detected in ARPANET, the
defense department’s precursor the global
Internet, the World Wide Web as what we now
know as today. At this point, delivered a
message, “ I’m the creeper, catch me if you can, ‘
then it would move on to another system in the
network. ‘the Reaper’ was designed to chase
down and delete the creeper
1986 – Brain Virus
• Brain virus was created by two Pakistani
brothers, Amjad and Basit Farooq Alvi. This
virus, which spread via floppy disks, was known only
to infect boot records and not computer hard drives
like most viruses today.
• The virus also known as the
Lahore, Pakistani, Pakistani Brain, Brain-A and
UIUC would occupy unused space on the floppy disk
so that it could not be used and would hide from
detection. It would also disguise itself by displaying
the uninfected boot sector on the disk
1987 – Lehigh Virus
• Lehigh Virus was discovered at Lehigh
University in the United States. The Lehigh virus
was the first memory resident file infector that
attacked executable files and took control when
a file was opened.
1987 – Jerusalem Virus
• The Jerusalem virus also appeared this year at
Hebrew University in Israel. The Jerusalem
virus was also a memory resident file infector. It
contained bugs to re-infect programs that were
already infected.
1988 – Cascade Virus
• The first anti-virus was designed to detect and remove Brain virus.
The anti-virus also immunized floppy disks to get rid of the Brain
infection. At the same time, the Cascade virus appeared in Germany.
The Cascade virus was the first encrypted virus, which was coded
and could not be changed or removed
• During the late 1980’s and the early 1990’s viruses on the loose
which infected files, disks, etc. on the computer and caused a great
deal of damage received a lot of media attention. Magazines such as
Business week, Newsweek and PC magazine began publishing
articles about these destructive viruses running wild and demanded
a solution for all these problem
1991 – Norton Anti-virus
•Symantec released the Norton Anti-virus
software. Anti-virus products from IBM,
McAfee, Digital Dispatch and Iris also became
available
2000 – ILOVEYOU virus
•The ILOVEYOU virus wreaked havoc around the
world. The virus that was created here in Philippines
and was sent through email and spread around the
world in one day infecting 10 percent of computers
connected to the Internet and causing $5.5 billion
dollars in damage. Hence, viruses are still common
and still create chaos even today. It is hard to
determine the reasons for all these actions and why
virus writers create computer viruses. Some do it for
their personal gain, for research
projects, pranks, vandalism, etc., while others want
to help make improvements in programs
Categories of Computer Viruses
• 1.Boot Sector Virus
• 2.Master Boot Record
Virus
• 3.File Infector Viruses
• 4.Macro Viruses
• 5.Resident Viruses
• 6.Worms
• 7.Trojan Horses
• 8.Directory Virus

•
•
•
•
•
•

9. Overwrite Viruses
10. Polymorphic Virus
11. Logic Bombs
12. FAT Virus
13. Multipartite Virus
14. Web Scripting
Virus
• 14. Direct Action Virus
Signs of Computer Infection
•A computer virus is usually
hard to detect if it’s
disguised as a harmless
file, in the case of a Trojan
horse virus. This type of
virus doesn't replicate
itself like most viruses, but
instead opens your
computer up to malicious
imposters
• –Your computer functions
slower than normal
• –Your computer responds

•
•
•
•

slowly and freezes often
–Your computer restarts
itself often
–You see uncommon error
messages, distorted
menus, and dialog boxes
–You notice applications
on your computer fail to
work correctly
–You fail to print correctly
Virus Removal Tools
• It is a software for removing specific viruses
from infected computers. Unlike complete
antivirus scanners, they are usually not intended
to detect and remove an extensive list of viruses;
rather they are designed to remove specific
viruses, usually more effectively than normal
antivirus software
COmPuter

Más contenido relacionado

La actualidad más candente

Project 3 2 ismaeel mashi
Project 3 2 ismaeel mashiProject 3 2 ismaeel mashi
Project 3 2 ismaeel mashiIsmaeelMashi
 
Internet security
Internet securityInternet security
Internet securityrfukunaga
 
Internet Threats
Internet ThreatsInternet Threats
Internet ThreatsRonalyn_Cao
 
Security on the internet volosyanko
Security on the internet volosyankoSecurity on the internet volosyanko
Security on the internet volosyankoSergiy Sydoriv
 
SECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURESSECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURESShyam Kumar Singh
 
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATSJazzyNF
 
Cyber crime among students
Cyber crime among studentsCyber crime among students
Cyber crime among studentsjune21harsh
 
Online Safety and Security
Online Safety and Security Online Safety and Security
Online Safety and Security Arah Louise
 
Ethics in IT and System Usage
Ethics in IT and System UsageEthics in IT and System Usage
Ethics in IT and System Usagetushki92
 
Cyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-ProCyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-ProRonald Soh
 
Computer Malware and its types
Computer Malware and its typesComputer Malware and its types
Computer Malware and its typesJatin Kumar
 
Internet Threats
Internet ThreatsInternet Threats
Internet ThreatsLeelet1121
 
Security and ethical challenges
Security and ethical challengesSecurity and ethical challenges
Security and ethical challengesVishakha Joshi
 
Cyber Crime 101: The Impact of Cyber Crime on Higher Education in South Africa
Cyber Crime 101:  The Impact of Cyber Crime on Higher Education in South AfricaCyber Crime 101:  The Impact of Cyber Crime on Higher Education in South Africa
Cyber Crime 101: The Impact of Cyber Crime on Higher Education in South AfricaJacqueline Fick
 
Safe and Responsible Use of ICT
Safe and Responsible Use of ICTSafe and Responsible Use of ICT
Safe and Responsible Use of ICTRolly Franco
 
Bct 2 01 Terms
Bct 2 01 TermsBct 2 01 Terms
Bct 2 01 Terms02jgodsey
 
COMPED9 Module 5 Security and Ethics
COMPED9 Module 5 Security and EthicsCOMPED9 Module 5 Security and Ethics
COMPED9 Module 5 Security and EthicsJeremy Flores
 

La actualidad más candente (20)

Project 3 2 ismaeel mashi
Project 3 2 ismaeel mashiProject 3 2 ismaeel mashi
Project 3 2 ismaeel mashi
 
Internet security
Internet securityInternet security
Internet security
 
Internet Threats
Internet ThreatsInternet Threats
Internet Threats
 
Security on the internet volosyanko
Security on the internet volosyankoSecurity on the internet volosyanko
Security on the internet volosyanko
 
Viruses and Spyware
Viruses and SpywareViruses and Spyware
Viruses and Spyware
 
SECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURESSECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURES
 
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
 
Cyber crime among students
Cyber crime among studentsCyber crime among students
Cyber crime among students
 
Online Safety and Security
Online Safety and Security Online Safety and Security
Online Safety and Security
 
Ethics in IT and System Usage
Ethics in IT and System UsageEthics in IT and System Usage
Ethics in IT and System Usage
 
Cyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-ProCyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-Pro
 
Computer Malware and its types
Computer Malware and its typesComputer Malware and its types
Computer Malware and its types
 
Malwares
MalwaresMalwares
Malwares
 
Internet Threats
Internet ThreatsInternet Threats
Internet Threats
 
Presentation1
Presentation1Presentation1
Presentation1
 
Security and ethical challenges
Security and ethical challengesSecurity and ethical challenges
Security and ethical challenges
 
Cyber Crime 101: The Impact of Cyber Crime on Higher Education in South Africa
Cyber Crime 101:  The Impact of Cyber Crime on Higher Education in South AfricaCyber Crime 101:  The Impact of Cyber Crime on Higher Education in South Africa
Cyber Crime 101: The Impact of Cyber Crime on Higher Education in South Africa
 
Safe and Responsible Use of ICT
Safe and Responsible Use of ICTSafe and Responsible Use of ICT
Safe and Responsible Use of ICT
 
Bct 2 01 Terms
Bct 2 01 TermsBct 2 01 Terms
Bct 2 01 Terms
 
COMPED9 Module 5 Security and Ethics
COMPED9 Module 5 Security and EthicsCOMPED9 Module 5 Security and Ethics
COMPED9 Module 5 Security and Ethics
 

Similar a COmPuter

Information security and privacy
Information security and privacyInformation security and privacy
Information security and privacyJoy Chakraborty
 
Information security and privacy
Information security and privacyInformation security and privacy
Information security and privacyJoy Chakraborty
 
Computer Ethics
Computer EthicsComputer Ethics
Computer EthicsRamki M
 
Information Technology - System Threats
Information Technology - System ThreatsInformation Technology - System Threats
Information Technology - System ThreatsDrishti Bhalla
 
Online reputation
Online reputationOnline reputation
Online reputationesl2m
 
Securing The Computer From Viruses ...
Securing The Computer From Viruses ...Securing The Computer From Viruses ...
Securing The Computer From Viruses ...Rahman_Hussain
 
TLE ICT 10 Q3 - VIRUS and its Types.pptx
TLE ICT 10 Q3 - VIRUS and its Types.pptxTLE ICT 10 Q3 - VIRUS and its Types.pptx
TLE ICT 10 Q3 - VIRUS and its Types.pptxglainAE
 
Virus and malware presentation
Virus and malware presentationVirus and malware presentation
Virus and malware presentationAmjad Bhutto
 
lecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptxlecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptxZarwashgulrez
 
Introduction to ethics
Introduction to ethicsIntroduction to ethics
Introduction to ethicsSaqib Raza
 
Virus trojanworm
Virus trojanwormVirus trojanworm
Virus trojanwormJenMorri
 
Copy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptxCopy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptxMdRuga
 
Security threats and safety measures
Security threats and safety measuresSecurity threats and safety measures
Security threats and safety measuresDnyaneshwar Beedkar
 
why ethics computer ethics 10 commandments.pptx
why ethics computer ethics 10 commandments.pptxwhy ethics computer ethics 10 commandments.pptx
why ethics computer ethics 10 commandments.pptxjennyJey2
 
Rajul computer presentation
Rajul computer presentationRajul computer presentation
Rajul computer presentationNeetu Jain
 

Similar a COmPuter (20)

Information security and privacy
Information security and privacyInformation security and privacy
Information security and privacy
 
Information security and privacy
Information security and privacyInformation security and privacy
Information security and privacy
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Online reputation
Online reputationOnline reputation
Online reputation
 
Information Technology - System Threats
Information Technology - System ThreatsInformation Technology - System Threats
Information Technology - System Threats
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Online reputation
Online reputationOnline reputation
Online reputation
 
Securing The Computer From Viruses ...
Securing The Computer From Viruses ...Securing The Computer From Viruses ...
Securing The Computer From Viruses ...
 
TLE ICT 10 Q3 - VIRUS and its Types.pptx
TLE ICT 10 Q3 - VIRUS and its Types.pptxTLE ICT 10 Q3 - VIRUS and its Types.pptx
TLE ICT 10 Q3 - VIRUS and its Types.pptx
 
Virus and malware presentation
Virus and malware presentationVirus and malware presentation
Virus and malware presentation
 
lecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptxlecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptx
 
anti_virus
anti_virusanti_virus
anti_virus
 
Introduction to ethics
Introduction to ethicsIntroduction to ethics
Introduction to ethics
 
Virus trojanworm
Virus trojanwormVirus trojanworm
Virus trojanworm
 
Viruses & worms
Viruses & wormsViruses & worms
Viruses & worms
 
Copy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptxCopy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptx
 
Fundamentals of Computing Chapter 9
Fundamentals of Computing Chapter 9Fundamentals of Computing Chapter 9
Fundamentals of Computing Chapter 9
 
Security threats and safety measures
Security threats and safety measuresSecurity threats and safety measures
Security threats and safety measures
 
why ethics computer ethics 10 commandments.pptx
why ethics computer ethics 10 commandments.pptxwhy ethics computer ethics 10 commandments.pptx
why ethics computer ethics 10 commandments.pptx
 
Rajul computer presentation
Rajul computer presentationRajul computer presentation
Rajul computer presentation
 

Último

ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptxmary850239
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Seán Kennedy
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management SystemChristalin Nelson
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17Celine George
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parentsnavabharathschool99
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxVanesaIglesias10
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptshraddhaparab530
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management systemChristalin Nelson
 

Último (20)

ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management System
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parents
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptx
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.ppt
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management system
 

COmPuter

  • 2. Computer Ethics • Computer Ethics refers to the rules or principles that deals with the right and wrong way of using the computer together with the moral duty and obligation of computer users
  • 3. 10 Commandments of Computer Ethics • 1.Thou shall not use a computer to harm other people. it is unethical to change or mess with other people’s file or computer system. An example is by sending spam e-mails which can harm other user’s account
  • 4. 10 Commandments of Computer Ethics • 2. Thou shall not interfere with other people’s computer work Making changes to other people’s files without their approval is unethical. Same with creating computer viruses that would display annoying messages, corrupt files, and erase data
  • 5. 10 Commandments of Computer Ethics • 3. Thou shall not snoop around in other people’s files • oObtaining and looking at other’s files without permission is not proper. Reading personal documents, letters, and e-mail messages of others is invading their privacy
  • 6. 10 Commandments of Computer Ethics • 4. Thou shall not use a computer to steal Breaking into bank accounts and transferring money through the use of computers is stealing. Some as tampering programs and computerized equipment such as ATM to get funds
  • 7. 10 Commandments of Computer Ethics • 5. Thou shall not use or copy software for which you have not paid. Creating duplicate copies of software and buying and using pirated CDs.
  • 8. 10 Commandments of Computer Ethics • 6. Thou shall not use a computer to bear false witness Spreading rumors about a person or an organization through the Internet is against ethical use of the computer. Giving out false information through websites or newsgroups and spreading black propaganda by sending emails with false information about a person, an idea, or an organization is improper
  • 9. 10 Commandments of Computer Ethics • 7. Thou shall not use other people’s computer resources without authorization or proper compensation Accessing systems through unauthorized us of ID’s usernames and passwords is hacking and it is unethical
  • 10. 10 Commandments of Computer Ethics • 8. Thou shall not appropriate other people’s intellectual output Using the ideas and words of others without clearly acknowledging the author or source of that information is unethical. Copying computer programs and ideas without the consent of the owner is considered as plagiarism which is against the law. It is a violation of other people’s intellectual property rights
  • 12. Computer Virus • Computer virus is a program which reproduces itself. It may attach to other programs which may create copies of it. It may damage or corrupt data, change data, or degrade the performance of your system by utilizing resources such as memory or disk space
  • 14. 1971 – “The Creeper” • It was developed by programmer Bob Thomas of BNN Technologies to actively explain a mobile application on how a virus infiltrate and be replicated throughout a localized computer network. It was never intended for harm
  • 15. 1971 – “The Creeper” •The Creeper was first detected in ARPANET, the defense department’s precursor the global Internet, the World Wide Web as what we now know as today. At this point, delivered a message, “ I’m the creeper, catch me if you can, ‘ then it would move on to another system in the network. ‘the Reaper’ was designed to chase down and delete the creeper
  • 16. 1986 – Brain Virus • Brain virus was created by two Pakistani brothers, Amjad and Basit Farooq Alvi. This virus, which spread via floppy disks, was known only to infect boot records and not computer hard drives like most viruses today. • The virus also known as the Lahore, Pakistani, Pakistani Brain, Brain-A and UIUC would occupy unused space on the floppy disk so that it could not be used and would hide from detection. It would also disguise itself by displaying the uninfected boot sector on the disk
  • 17. 1987 – Lehigh Virus • Lehigh Virus was discovered at Lehigh University in the United States. The Lehigh virus was the first memory resident file infector that attacked executable files and took control when a file was opened.
  • 18. 1987 – Jerusalem Virus • The Jerusalem virus also appeared this year at Hebrew University in Israel. The Jerusalem virus was also a memory resident file infector. It contained bugs to re-infect programs that were already infected.
  • 19. 1988 – Cascade Virus • The first anti-virus was designed to detect and remove Brain virus. The anti-virus also immunized floppy disks to get rid of the Brain infection. At the same time, the Cascade virus appeared in Germany. The Cascade virus was the first encrypted virus, which was coded and could not be changed or removed • During the late 1980’s and the early 1990’s viruses on the loose which infected files, disks, etc. on the computer and caused a great deal of damage received a lot of media attention. Magazines such as Business week, Newsweek and PC magazine began publishing articles about these destructive viruses running wild and demanded a solution for all these problem
  • 20. 1991 – Norton Anti-virus •Symantec released the Norton Anti-virus software. Anti-virus products from IBM, McAfee, Digital Dispatch and Iris also became available
  • 21. 2000 – ILOVEYOU virus •The ILOVEYOU virus wreaked havoc around the world. The virus that was created here in Philippines and was sent through email and spread around the world in one day infecting 10 percent of computers connected to the Internet and causing $5.5 billion dollars in damage. Hence, viruses are still common and still create chaos even today. It is hard to determine the reasons for all these actions and why virus writers create computer viruses. Some do it for their personal gain, for research projects, pranks, vandalism, etc., while others want to help make improvements in programs
  • 22. Categories of Computer Viruses • 1.Boot Sector Virus • 2.Master Boot Record Virus • 3.File Infector Viruses • 4.Macro Viruses • 5.Resident Viruses • 6.Worms • 7.Trojan Horses • 8.Directory Virus • • • • • • 9. Overwrite Viruses 10. Polymorphic Virus 11. Logic Bombs 12. FAT Virus 13. Multipartite Virus 14. Web Scripting Virus • 14. Direct Action Virus
  • 23. Signs of Computer Infection •A computer virus is usually hard to detect if it’s disguised as a harmless file, in the case of a Trojan horse virus. This type of virus doesn't replicate itself like most viruses, but instead opens your computer up to malicious imposters • –Your computer functions slower than normal • –Your computer responds • • • • slowly and freezes often –Your computer restarts itself often –You see uncommon error messages, distorted menus, and dialog boxes –You notice applications on your computer fail to work correctly –You fail to print correctly
  • 24. Virus Removal Tools • It is a software for removing specific viruses from infected computers. Unlike complete antivirus scanners, they are usually not intended to detect and remove an extensive list of viruses; rather they are designed to remove specific viruses, usually more effectively than normal antivirus software