Upload
priyasri-harikrishnan
View
226
Download
0
Embed Size (px)
Citation preview
8/16/2019 COMPUTER LAB RULES (2).ppt
1/23
COMPUTER LAB RULESCOMPUTER LAB RULES
8/16/2019 COMPUTER LAB RULES (2).ppt
2/23
DO’S IN THE COMPUTER LABDO’S IN THE COMPUTER LAB
• STUDENTS MUST ENSURE THE SAFETY OFEQUIPMENT IN THE COMPUTER LAB AT ALLTIMES.
• STUDENTS MUST RECORD USAGE OFCOMPUTER IN LOG BOOKS PROVIDED.
• MAKE SURE ALL CHAIRS AND EQUIPMENTPROPERLY ARRANGED BEFORE YOU LEAVETHE LAB.
8/16/2019 COMPUTER LAB RULES (2).ppt
3/23
DO’S IN THE COMPUTER LABDO’S IN THE COMPUTER LAB
• KEEP QUIET AND ALWAYS LISTEN TO
TEACHER’S INSTRUCTIONS.
• REPORT ANY IRREGULARITIES TO THE
TEACHER-IN-CHARGE.
8/16/2019 COMPUTER LAB RULES (2).ppt
4/23
DONT’S IN THE COMPUTER LABDONT’S IN THE COMPUTER LAB
• NO FOOD OR DRINKS ALLOWED.
• DO NOT LITTER.
• STUDENTS ARE NOT ALLOWED TO ENTERTHE LAB WITHOUT PERMISSION.
• STUDENTS ARE NOT ALLOWED TOCHANGE THE DISPLAY AND SOFTWARESETTINGS.
8/16/2019 COMPUTER LAB RULES (2).ppt
5/23
DONT’S IN THE COMPUTER LABDONT’S IN THE COMPUTER LAB
• STUDENTS ARE NOT ALLOWED TO BRING OUTSIDEDISKETTES, CD-ROMS AND ANY SECONDARYSTORAGE.
• COMPUTER LAB IS A RESTRICTED AREA.
• NO BAGS ALLOWED.
• DO NOT COPY ANY SOFTWARE FROM THECOMPUTER.
• DO NOT TOUCH/DISTURB ANY WIRINGSYSTEM/CONNECTIONS.
8/16/2019 COMPUTER LAB RULES (2).ppt
6/23
COMPUTER LAB RULES ANDCOMPUTER LAB RULES AND
REGULATIONREGULATION
1. STUDENTS ARE PROHIBITED TOENTER THE LAB UNLESS
AUTHORISED BY THE TEACHER.
. SCAN DISKETTES BEFORE USINGTHEM.
!. REPORT ALL PROBLEMS RELATED
TO THE SYSTEM TO THE TEACHER.". DO NOT ATTEMPT TO REPAIR OR
TAMPER WITH LAB EQUIPMENT.
8/16/2019 COMPUTER LAB RULES (2).ppt
7/23
COMPUTER LAB RULES ANDCOMPUTER LAB RULES AND
REGULATIONREGULATION#. BE RESPONSIBLE WHEN USING THE
EQUIPMENT, SOFTWARE AND
FACILITIES IN THE LAB.
$. DO NOT MOVE ANY EQUIPMENT FROM ITS ORIGINAL POSITION.
%. DO NOT REMOVE OR LOAD ANY
SOFTWARE INTO THE COMPUTER.&. DO NOT CHANGE SETTINGS IN THE
COMPUTER.
8/16/2019 COMPUTER LAB RULES (2).ppt
8/23
COMPUTER LAB RULES ANDCOMPUTER LAB RULES AND
REGULATIONREGULATION
'. SAVE ALL WORK IN E(TERNALSTORAGE DEVICE AND NOT IN THECOMPUTER.
1).DO NOT BRING BAGS, FOOD, ANDDRINK TO THE LAB.
11. TURN OFF THE COMPUTER
ACCORDINGLY AFTER USE.1.SWITCH OFF ALL POWER SUPPLIES
BEFORE LEAVING THE LAB.
8/16/2019 COMPUTER LAB RULES (2).ppt
9/23
COMPUTER LAB RULES ANDCOMPUTER LAB RULES AND
REGULATIONREGULATION1!. INTERNET FACILITY IS STRICTLY FOR
EDUCATIONAL PURPOSES ONLY.
1". TEACHERS SHOULD RECORD THE USE OF
COMPUTER LAB IN THE LAB LOG BOOK.1#. ALL USERS SHOULD RECORD THE USE OF
COMPUTERS IN THE COMPUTER LOG
BOOK.1$. THE LAB SHOULD BE KEPT CLEAN AND
TIDY AT ALL TIMES
8/16/2019 COMPUTER LAB RULES (2).ppt
10/23
DATA AND USER SECURITYDATA AND USER SECURITY
• DEFINITION OF PASSWORD
A *+0 + 2324 0 56782,
+ 3785+45 9 4:2 4, 4:+4 764 82
4;*20 5 4:2
8/16/2019 COMPUTER LAB RULES (2).ppt
11/23
DATA AND USER SECURITYDATA AND USER SECURITY
• DEFINITION OF USERNAME > U5?62 3785+45 9 3:++342 4:+4
025492 62
> P+0 *@+423785+45 93:++342 +3+4204: 4:2 62 5+72
4:+4 + +3324 37*6422632
8/16/2019 COMPUTER LAB RULES (2).ppt
12/23
THE IMPORTANCE OF DATATHE IMPORTANCE OF DATA
AND USER SECURITYAND USER SECURITY
• TO PREVENT ANY UNAUTHORIED
ACCESS TO THE COMPUTER
> HACKERS, COMPUTER THEFTS, ETC.
• TO PREVENT YOUR DATA FROM BEING
COPIED, REMOVED, DELETED ANDDESTROYED BY UNAUTHORIED
USERS
8/16/2019 COMPUTER LAB RULES (2).ppt
13/23
ORGANISATION CHARTORGANISATION CHART
• AN ORGANIATION CHART IS USED TOILLUSTRATE HIERACHICALRELATIONSHIPS SUCH AS
DEPARTMENT MANAGERS ANDEMPLOYEES WITHIN ACOMPANY/ORGANIATION.
• OTHER E(AMPLEOTHER E(AMPLE CLASSORGANISATION CHART
8/16/2019 COMPUTER LAB RULES (2).ppt
14/23
CHAIRPERSON
(PN. NOLIAH BT. OTHMAN)
DEPUTY CHAIRPERSON(PN. MASITA BT. HARUN)
VICE CHAIPERSONS
(TN. HJ. ZAKARIA B. ISMAIL,
CIK HJH. SITI ASIAH BT. HITAM)
SECRETARY
(PN. NORMA HAZURA BT. MOHD. ZULKAFLI)
ASSISTANT SECRETARY
(PN. KURSIAH BT. KUSHAIRI,
PN. NORAISHAH BT. SAFIEI)
COMMITEES PANEL HEAD OF SUBJECTS
8/16/2019 COMPUTER LAB RULES (2).ppt
15/23
LOG BOOKLOG BOOK
• TYPES OF LOG BOOKS
1.COMPUTER LOG BOOK
.COMPUTER LAB LOG
BOOK
8/16/2019 COMPUTER LAB RULES (2).ppt
16/23
THE USAGE OF LOG BOOKTHE USAGE OF LOG BOOK
• TO RECORD!
>USER
>TIME USED
>CLASS
>SUBECT
>PURPOSE >TEACHER-IN-CHARGE
>SIGNATURE
8/16/2019 COMPUTER LAB RULES (2).ppt
17/23
ETHICS IN USING COMPUTERETHICS IN USING COMPUTER
• E"#$%& $& ' *'+ #$+&#- #/*/ '
/*&0 '/& ' &/%$2$% *'+ %#$%/
'03 &"$%& " $".
• O0 "#/ "#/* #'03, /"#$%& $0 %4"$05
/'0& *'+ 54$3/+$0/& " */2/* "
#/0 4&$05 "#/ %4"/* '03
%4"/* 0/"*&. T#$& $0%+43/& "#/I0"/*0/".
8/16/2019 COMPUTER LAB RULES (2).ppt
18/23
8/16/2019 COMPUTER LAB RULES (2).ppt
19/23
ETHICAL ORETHICAL OR
UNETHICAL?UNETHICAL?Stealing personal information from a friend’sStealing personal information from a friend’scomputercomputer
Getting permission to use the information in an articleGetting permission to use the information in an articleon the Interneton the Internet
Installing a virus on someone’s computerInstalling a virus on someone’s computer
Sending business advertisements to other computerSending business advertisements to other computerusers via email without their permissionusers via email without their permission
Imitating the unique name of certain productsImitating the unique name of certain products
Modifying certain part of articles without permissionModifying certain part of articles without permission
from the original authorfrom the original authorUsing some graphics from the Internet in anUsing some graphics from the Internet in anadvertisement with the consent of the owneradvertisement with the consent of the owner
Sending warning email to other computer users on theSending warning email to other computer users on thewidespread of viruswidespread of virus
8/16/2019 COMPUTER LAB RULES (2).ppt
20/23
COPYRIGHTCOPYRIGHT
• I0"/++/%"4'+ P*/*"-I0"/++/%"4'+ P*/*"- L'& 3@2 02+, 5@2545,42+; 32+45, 65?62 5+72, 8652 702,5064+ *322, 37*642 *=+7 302 +5072.
• I5@2545 4:+4 +2 *423420 8; 4:2 I5422346+ P*24;L+ 53605= 4+027+
8/16/2019 COMPUTER LAB RULES (2).ppt
21/23
WHY DO WE NEED ETHICSWHY DO WE NEED ETHICS
AND LAW IN COMPUTING6AND LAW IN COMPUTING6
• W2 764 2*234 52:* 8; 54 42+5= 4:2 *2*2’
< 24:2 8; 06*3+45= 048645= 4.• D6*3+45= +50 048645= 3*2 9 +60 4+*2, @02 4+*2,
+50 37*642 *=+7 4:64 *275 +50 +64:+45
97 4:2 50@06+ 37*+5; 4:+4 32+420 4:2 *=+7 +2
77+ +50 2=+.
8/16/2019 COMPUTER LAB RULES (2).ppt
22/23
• W2 :60 2*234 4:2 *2*2’ *@+3; +50 3590254+4; 8;
29+55= 62@2 97 2+05= 4:2 7+ 92 4:644:2 *275.
• I9 2 0 , 4 350220 + @+45= +5 50@06+’ =:4 4
*@+3; +50 3590254+4;.
WHY DO WE NEED ETHICSWHY DO WE NEED ETHICS
AND LAW IN COMPUTING6AND LAW IN COMPUTING6
8/16/2019 COMPUTER LAB RULES (2).ppt
23/23
• P*24; :22 72+5 52:*.
• S532 +5 50@06+ 0+4+ +50 597+45 +2
350220 + **24;, 4:2292, +5 +34 9
4+7*25= +50 3:+5=5= 223453 597+45
350220 + @+50+7 +50 02*234 9 4:2
*2*2’ **24;.
WHY DO WE NEED ETHICSWHY DO WE NEED ETHICS
AND LAW IN COMPUTING6AND LAW IN COMPUTING6