Beruflich Dokumente
Kultur Dokumente
ETHICS
ETHIC
- the principles and
standards that guide our
behavior toward other
people.
GOLDEN RULE
Do unto others as
you would have
them do unto you
MORAL ISSUES RELATED TO THE
DIRECT AND INDIRECT USE OF
COMPUTER RESOURCES
COMPUTER CRIMES
SAFE COMPUTING
TIPS
COMPUTER CRIMES
Stealing
Hardware
Software
Computer time
THE BIG BROTHER SYNDROME
- A fear brought about by the idea that
someone- be it in a government or other
entities – are using information stored
in computer systems for their own
intentions.
Example:
Kidnap gangs can use the information
stored in the computer systems of banks
in choosing their victims.
ROGUE SOFTWARE
- any program that
runs on a computer
without prior consent
or knowledge of the
user.
SUB-CLASSIFICATION OF ROGUE
SOFTWARE
Back Door (Trap Door)
refersto a special
password or code which is
used to bypass the normal
security measures of
computer systems.
CHAMELEONS
A chameleon program can
imitate another program in
order to gather user
information.
Example: a chameleon can
imitate a network log-in text in
order to gather the password of
different users.
LOGIC BOMBS
Program which can
destroy programs
and/or data when a
certain trigger is
encountered.
TROJAN HORSE
A rogue software that
is readily accepted by
a user because it
present itself as
something useful.
ANSI BOMBS
Programs which makes the
keyboard act in a peculiar
way.
For example, if the “A” key is
pressed, the computer will
interpret it as a different
letter.
COMPUTER VIRUS
The most popular and widely distributed rouge software.
intellectual output.
Thou shalt think about the social
consequences of the program you write.
Thou shalt use a computer in ways that
show consideration and respect.
NETIQUETTE
Netiquette is etiquette on the Internet
1.Be responsible enough not to waste other
people’s time or bandwidth by posting
unnecessarily long messages or unimportant
messages and sending large attachments
2.Be pleasant and polite.
3.Use descriptive subject lines for your
messages as a courtesy to your reader - to
help people organize and prioritize their
messages.
4.Let the recipient know who is sending the
message
NETIQUETTE
5.When forwarding messages:
Check the reliability of the source of a forwarded
message and the accuracy of the message or story
before passing it on
Clean up your messages before you forward them.
LIGHTING
o SCREEN FLICKER
- Turndown the brightness, or use a dark
background instead of a light one.
- SCREEN RESOLUTION
WORKSTATION FURNITURE AND
ARRANGEMENT
The table your system is resting
on should allow for adjustment in
the keyboard height, as well as
have adequate space for both the
monitor, system case, keyboard
and reference material.
WORKSTATION FURNITURE AND
ARRANGEMENT
Your chair should be easily
adjustable in height, and
ideally provide adjustable
lower-back support.
WORKSTATION FURNITURE AND
ARRANGEMENT
The height of your monitor should
also be adjustable with the center of
the screen being 20-30 degrees below
your ‘straight ahead’ gaze.
You should also have an adjustable
document holder which reduces the
strain on your neck while you are
typing.
KEYBOARDING GUIDELINES
*Speed and Accuracy are expected
1. Stop and relax regularly – 10
minutes in ever hour of
continuous typing.
2. Tilt head slightly down, chin
tucked in.
3. Bend elbow 90 degrees. Tuck
arms in to body.
KEYBOARDING GUIDELINES
4. Adjust back rest to support
the curve in your lower
back.
5. Use a movable chair
6. Sit with space of one hand-
width between front of seat
and back of knee.
KEYBOARDING GUIDELINES
7. Place a feet flat on floor or on a
footrest.
8. Adjust seat height for 90 degree
knee angle.
9. “Drop fingers onto keys, wrists
slightly bent, with you touch just
right – not too heavy, not too light.
KEYBOARDING GUIDELINES
10. Lower screen brightness for a
sharp image. Position screen to
avoid reflections from windows or
lights.
11. Monitor should be angled for
the best view.
12. Copyholder and screen should
be within 30 degrees viewing angle,
50-70 cm from eyes.
….END….
THANK YOU FOR
LISTENING