Presentation is loading. Please wait.

Presentation is loading. Please wait.

Electronic Communications

Similar presentations


Presentation on theme: "Electronic Communications"— Presentation transcript:

1 Electronic Communications
Objective 3

2 Uses of Computing Pros Cons
Made tasks such as clerical work and computing easier and faster Buying, banking, and paying bills can be done from home Easy access to useful information New forms of entertainment Cons Computers are still quite expensive Developing software is time consuming and expensive Once developed, it is difficult to make changes to software Excessive use of the computer has changed our society and relationships.

3 Computers – Work Place Used in every job
Payroll, accounts, bookkeeping Operations Communications

4 Computers - Social Cell phones iPads Skype Social media
Teleconferencing Twitter

5 Computers - Government
Tracking Gov’t websites Affordable Care Act! Yeah! Military Computers got their start in the military Surveillance equipment Administrative purposes Data repositories

6 Computers - Entertainment
Netflix/Amazon/Hulu Gaming Social interaction Youtube/videos

7 What is Ethics? Principals that guide behavior
Is it illegal to be unethical? What is the relationship between law and ethics?

8 Using Computers Safely, Ethically, and Legally
Rules Not usually illegal In writing Consequences are specific to the entity that made the rules Laws Illegal Consequences more severe from fines to jail time Ethics Not usually illegal, but can be Set by the society you live in About “doing the right thing” Consequences change the person you are

9 Ethics Law Rule 1. Don’t smoke in front of children
2. Don’t fill your mind with images you can’t erase 3. Don’t steal work resources, even if you won’t get caught 4. Don’t use the internet to bully, intimidate, or destroy the reputation of yourself or others0 5. Don’t share copyrighted material you have purchased with others Ethics 1. Don’t smoke in public buildings 2. Don’t look at child pornography 3. Don’t use work resources to make money for someone else 4. Don’t use slander or libel against others in the public domain 5. Don’t post copyrighted pictures on the internet or published works Law 1. Don’t smoke in the house 2. Don’t look at inappropriate images on the internet 3. Don’t use work computers for personal stuff 4. Don’t post compromising pictures of yourself on the internet 5. Don’t use a copyrighted picture without permission for personal projects Rule

10 Protecting your Identity
Malware – Software that is intended to damage or disable computers and computer systems Virus - piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data. Spyware – Software that enables a user to obtain covert information about another’s computer activities by transmitting data covertly from another hard drive. Adware – Software that automatically displays or downloads advertising material (often unwanted) when a user is online Trojan Horse – a hacking program that is non self-replicating, which appears to perform a desirable function but instead causes harm.

11 Protecting your Identity
Cookies – a small piece of data sent from a website and stored in a user’s web browser while the user is browsing the website. Not necessarily malicious. Can store passwords and user information You can clear out your cookies periodically. Sometimes required to run certain websites Firewall – Establishes a barrier between a trusted, secure internal network and another network that is not necessarily secure or trusted. Virus Protection Software – Software designed to seek out and destroy computer viruses. Must be updated each year or it will not find new viruses. Cannot guarantee to work every time.

12 Tips for Securing your Identity
Choose good passwords and pins Don’t use passwords that are too long or too short Don’t include any personal info (name, birthdate, family names, nickname) Use punctuation and upper and lowercase letters Use made up words or words made up from a line from your favorite song Keep your virus protection up to date Beware of scams Don’t give out identity details Never answer unsolicited or unwanted s (spam)

13 Ergonomics The study of people’s efficiency in their working environment Invest in a good office chair Move regularly Position monitor correctly Position keyboard correctly Organize and clean your office or area

14 Joe Vs. The Volcano Having an unhealthy office environment can be dangerous to workers. Nerve damage, spinal injury, and illness. Watch this video and look for things that are unhealthy in the work environment. Watch Video


Download ppt "Electronic Communications"

Similar presentations


Ads by Google