0% found this document useful (0 votes)
34 views12 pages

Ethics and Safety Measures in Computing

The document discusses computer ethics, emphasizing the importance of following rules to prevent fraud and crime. It covers unethical practices such as plagiarism, cyber bullying, identity theft, and spamming, along with strategies to avoid them. Additionally, it highlights safety measures for internet use, including protecting personal information and maintaining antivirus software.

Uploaded by

kavya
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
34 views12 pages

Ethics and Safety Measures in Computing

The document discusses computer ethics, emphasizing the importance of following rules to prevent fraud and crime. It covers unethical practices such as plagiarism, cyber bullying, identity theft, and spamming, along with strategies to avoid them. Additionally, it highlights safety measures for internet use, including protecting personal information and maintaining antivirus software.

Uploaded by

kavya
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 12

ETHICS AND SAFETY MEASURES

IN COMPUTING

By Kavya Goenka
Class 7 A
Roll no. 18
INTRODUCTION
What are computer ethics?
Computer ethics deals with the rules and
practices you should follow while working on
computers. It is important for everyone to
know these rules to prevent fraud and crime
related to the use of computers.
UNETHICAL PRACTICES
PLAGIARISM
People have access to a vast amount of
information on the Internet. Some of them
use another person’s ideas or work and
pretend that it is their own. This act is called
plagiarism.
HOW CAN WE AVOID PLAGARISM?

We can avoid plagiarism by rephrasing the


original content and idea in our own words
and by giving the reference of the content at
the end of your work.
CYBER BULLYING
Harassing, threatening or embarrassing
someone on the Internet is known as cyber
bullying. The people who perform cyber
bullying are known as cyber bullies. Cyber
bullies use cell phones, instant messaging,
email, chat rooms or social networking
websites to harass other people.
HOW CAN WE PREVENT CYBER BULLYING?

We can prevent cyber bullying by educating


ourselves and logging out of our accounts
properly while using the Internet.
IDENTITY THEFT
In identity theft, people use the Internet to steal
someone’s personal information such as
phone number, passwords, credit card number
and other such information. The stolen
information is then used for personal gain,
such as obtaining new mobile connections, for
online shopping and for accessing bank
accounts.
HOW CAN WE PREVENT IDENTITY THEFT?

We can prevent identity theft by securing our


network using a firewall and anti-malware
software, using strong passwords, changing
our passwords frequently and saving our data
on the storage devices carefully.
SPAMMING
Spam is an unsolicited, unwanted email sent to
many people. It may contain advertisements
or may spread malware such as virus or may
divert us to a website to steal our personal
information.
HOW CAN WE STOP SPAMMING?
We can stop spams by not sharing our email id
on the websites where it is visible to general
public, use different accounts for personal and
public use, not respond to and not buy from
spam advertised websites.
SAFETY MEASURES WHILE USING THE
INTERNET
PERSONAL INFORMATION
We should never respond to an email that asks
for our personal information.
ANTIVIRUS
We should install and update our antivirus
software regularly. We should also scan our
computer on a regular basis.

You might also like