COMPUTER LAB RULES (2).ppt

Embed Size (px)

Citation preview

  • 8/16/2019 COMPUTER LAB RULES (2).ppt

    1/23

    COMPUTER LAB RULESCOMPUTER LAB RULES

  • 8/16/2019 COMPUTER LAB RULES (2).ppt

    2/23

    DO’S IN THE COMPUTER LABDO’S IN THE COMPUTER LAB

    • STUDENTS MUST ENSURE THE SAFETY OFEQUIPMENT IN THE COMPUTER LAB AT ALLTIMES.

    • STUDENTS MUST RECORD USAGE OFCOMPUTER IN LOG BOOKS PROVIDED.

    • MAKE SURE ALL CHAIRS AND EQUIPMENTPROPERLY ARRANGED BEFORE YOU LEAVETHE LAB.

  • 8/16/2019 COMPUTER LAB RULES (2).ppt

    3/23

    DO’S IN THE COMPUTER LABDO’S IN THE COMPUTER LAB

    • KEEP QUIET AND ALWAYS LISTEN TO

    TEACHER’S INSTRUCTIONS.

    • REPORT ANY IRREGULARITIES TO THE

    TEACHER-IN-CHARGE.

  • 8/16/2019 COMPUTER LAB RULES (2).ppt

    4/23

    DONT’S IN THE COMPUTER LABDONT’S IN THE COMPUTER LAB

    • NO FOOD OR DRINKS ALLOWED.

    • DO NOT LITTER.

    • STUDENTS ARE NOT ALLOWED TO ENTERTHE LAB WITHOUT PERMISSION.

    • STUDENTS ARE NOT ALLOWED TOCHANGE THE DISPLAY AND SOFTWARESETTINGS.

  • 8/16/2019 COMPUTER LAB RULES (2).ppt

    5/23

    DONT’S IN THE COMPUTER LABDONT’S IN THE COMPUTER LAB

    • STUDENTS ARE NOT ALLOWED TO BRING OUTSIDEDISKETTES, CD-ROMS AND ANY SECONDARYSTORAGE.

    • COMPUTER LAB IS A RESTRICTED AREA.

    • NO BAGS ALLOWED.

    • DO NOT COPY ANY SOFTWARE FROM THECOMPUTER.

    • DO NOT TOUCH/DISTURB ANY WIRINGSYSTEM/CONNECTIONS.

  • 8/16/2019 COMPUTER LAB RULES (2).ppt

    6/23

    COMPUTER LAB RULES ANDCOMPUTER LAB RULES AND

    REGULATIONREGULATION

    1. STUDENTS ARE PROHIBITED TOENTER THE LAB UNLESS

     AUTHORISED BY THE TEACHER.

    . SCAN DISKETTES BEFORE USINGTHEM.

    !. REPORT ALL PROBLEMS RELATED

    TO THE SYSTEM TO THE TEACHER.". DO NOT ATTEMPT TO REPAIR OR

    TAMPER WITH LAB EQUIPMENT.

  • 8/16/2019 COMPUTER LAB RULES (2).ppt

    7/23

    COMPUTER LAB RULES ANDCOMPUTER LAB RULES AND

    REGULATIONREGULATION#. BE RESPONSIBLE WHEN USING THE

      EQUIPMENT, SOFTWARE AND

      FACILITIES IN THE LAB.

    $. DO NOT MOVE ANY EQUIPMENT  FROM ITS ORIGINAL POSITION.

    %. DO NOT REMOVE OR LOAD ANY

      SOFTWARE INTO THE COMPUTER.&. DO NOT CHANGE SETTINGS IN THE

      COMPUTER.

  • 8/16/2019 COMPUTER LAB RULES (2).ppt

    8/23

    COMPUTER LAB RULES ANDCOMPUTER LAB RULES AND

    REGULATIONREGULATION

    '. SAVE ALL WORK IN E(TERNALSTORAGE DEVICE AND NOT IN THECOMPUTER.

    1).DO NOT BRING BAGS, FOOD, ANDDRINK TO THE LAB.

    11. TURN OFF THE COMPUTER

     ACCORDINGLY AFTER USE.1.SWITCH OFF ALL POWER SUPPLIES

    BEFORE LEAVING THE LAB.

  • 8/16/2019 COMPUTER LAB RULES (2).ppt

    9/23

    COMPUTER LAB RULES ANDCOMPUTER LAB RULES AND

    REGULATIONREGULATION1!. INTERNET FACILITY IS STRICTLY FOR

    EDUCATIONAL PURPOSES ONLY.

    1". TEACHERS SHOULD RECORD THE USE OF

    COMPUTER LAB IN THE LAB LOG BOOK.1#. ALL USERS SHOULD RECORD THE USE OF

    COMPUTERS IN THE COMPUTER LOG

    BOOK.1$. THE LAB SHOULD BE KEPT CLEAN AND

    TIDY AT ALL TIMES

  • 8/16/2019 COMPUTER LAB RULES (2).ppt

    10/23

    DATA AND USER SECURITYDATA AND USER SECURITY

    • DEFINITION OF PASSWORD

     A *+0 + 2324 0 56782,

    + 3785+45 9 4:2 4, 4:+4 764 82

    4;*20 5 4:2

  • 8/16/2019 COMPUTER LAB RULES (2).ppt

    11/23

    DATA AND USER SECURITYDATA AND USER SECURITY

    • DEFINITION OF USERNAME > U5?62 3785+45 9 3:++342 4:+4

    025492 62 

     > P+0 *@+423785+45 93:++342 +3+4204: 4:2 62 5+72

    4:+4 + +3324 37*6422632

  • 8/16/2019 COMPUTER LAB RULES (2).ppt

    12/23

    THE IMPORTANCE OF DATATHE IMPORTANCE OF DATA

    AND USER SECURITYAND USER SECURITY

    • TO PREVENT ANY UNAUTHORIED

     ACCESS TO THE COMPUTER

     > HACKERS, COMPUTER THEFTS, ETC.

    • TO PREVENT YOUR DATA FROM BEING

    COPIED, REMOVED, DELETED ANDDESTROYED BY UNAUTHORIED

    USERS

  • 8/16/2019 COMPUTER LAB RULES (2).ppt

    13/23

    ORGANISATION CHARTORGANISATION CHART

    •  AN ORGANIATION CHART IS USED TOILLUSTRATE HIERACHICALRELATIONSHIPS SUCH AS

    DEPARTMENT MANAGERS ANDEMPLOYEES WITHIN ACOMPANY/ORGANIATION.

    • OTHER E(AMPLEOTHER E(AMPLE CLASSORGANISATION CHART

  • 8/16/2019 COMPUTER LAB RULES (2).ppt

    14/23

    CHAIRPERSON

    (PN. NOLIAH BT. OTHMAN)

    DEPUTY CHAIRPERSON(PN. MASITA BT. HARUN)

    VICE CHAIPERSONS

    (TN. HJ. ZAKARIA B. ISMAIL,

    CIK HJH. SITI ASIAH BT. HITAM)

    SECRETARY

    (PN. NORMA HAZURA BT. MOHD. ZULKAFLI)

    ASSISTANT SECRETARY

    (PN. KURSIAH BT. KUSHAIRI,

    PN. NORAISHAH BT. SAFIEI)

    COMMITEES PANEL HEAD OF SUBJECTS

  • 8/16/2019 COMPUTER LAB RULES (2).ppt

    15/23

    LOG BOOKLOG BOOK

    • TYPES OF LOG BOOKS

    1.COMPUTER LOG BOOK

    .COMPUTER LAB LOG

    BOOK

  • 8/16/2019 COMPUTER LAB RULES (2).ppt

    16/23

    THE USAGE OF LOG BOOKTHE USAGE OF LOG BOOK

    • TO RECORD!

     >USER

     >TIME USED

     >CLASS

     >SUBECT

     >PURPOSE >TEACHER-IN-CHARGE

     >SIGNATURE

  • 8/16/2019 COMPUTER LAB RULES (2).ppt

    17/23

    ETHICS IN USING COMPUTERETHICS IN USING COMPUTER

    • E"#$%& $& ' *'+ #$+&#- #/*/ '

    /*&0 '/& ' &/%$2$% *'+ %#$%/

    '03 &"$%& " $".

    • O0 "#/ "#/* #'03, /"#$%& $0 %4"$05

    /'0& *'+ 54$3/+$0/& " */2/* "

    #/0 4&$05 "#/ %4"/* '03

    %4"/* 0/"*&. T#$& $0%+43/& "#/I0"/*0/".

  • 8/16/2019 COMPUTER LAB RULES (2).ppt

    18/23

  • 8/16/2019 COMPUTER LAB RULES (2).ppt

    19/23

    ETHICAL ORETHICAL OR

    UNETHICAL?UNETHICAL?Stealing personal information from a friend’sStealing personal information from a friend’scomputercomputer

    Getting permission to use the information in an articleGetting permission to use the information in an articleon the Interneton the Internet

    Installing a virus on someone’s computerInstalling a virus on someone’s computer

    Sending business advertisements to other computerSending business advertisements to other computerusers via email without their permissionusers via email without their permission

    Imitating the unique name of certain productsImitating the unique name of certain products

    Modifying certain part of articles without permissionModifying certain part of articles without permission

    from the original authorfrom the original authorUsing some graphics from the Internet in anUsing some graphics from the Internet in anadvertisement with the consent of the owneradvertisement with the consent of the owner

    Sending warning email to other computer users on theSending warning email to other computer users on thewidespread of viruswidespread of virus

  • 8/16/2019 COMPUTER LAB RULES (2).ppt

    20/23

    COPYRIGHTCOPYRIGHT

    • I0"/++/%"4'+ P*/*"-I0"/++/%"4'+ P*/*"- L'& 3@2 02+, 5@2545,42+; 32+45, 65?62 5+72, 8652 702,5064+ *322, 37*642 *=+7 302 +5072.

    • I5@2545 4:+4 +2 *423420 8; 4:2 I5422346+ P*24;L+ 53605= 4+027+

  • 8/16/2019 COMPUTER LAB RULES (2).ppt

    21/23

    WHY DO WE NEED ETHICSWHY DO WE NEED ETHICS

    AND LAW IN COMPUTING6AND LAW IN COMPUTING6

    • W2 764 2*234 52:* 8; 54 42+5= 4:2 *2*2’

    < 24:2 8; 06*3+45= 048645= 4.• D6*3+45= +50 048645= 3*2 9 +60 4+*2, @02 4+*2,

    +50 37*642 *=+7 4:64 *275 +50 +64:+45

    97 4:2 50@06+ 37*+5; 4:+4 32+420 4:2 *=+7 +2

    77+ +50 2=+.

  • 8/16/2019 COMPUTER LAB RULES (2).ppt

    22/23

    • W2 :60 2*234 4:2 *2*2’ *@+3; +50 3590254+4; 8;

    29+55= 62@2 97 2+05= 4:2 7+ 92 4:644:2 *275.

    • I9 2 0 , 4 350220 + @+45= +5 50@06+’ =:4 4

    *@+3; +50 3590254+4;.

    WHY DO WE NEED ETHICSWHY DO WE NEED ETHICS

    AND LAW IN COMPUTING6AND LAW IN COMPUTING6

  • 8/16/2019 COMPUTER LAB RULES (2).ppt

    23/23

    • P*24; :22 72+5 52:*.

    • S532 +5 50@06+ 0+4+ +50 597+45 +2

    350220 + **24;, 4:2292, +5 +34 9

    4+7*25= +50 3:+5=5= 223453 597+45

    350220 + @+50+7 +50 02*234 9 4:2

    *2*2’ **24;.

    WHY DO WE NEED ETHICSWHY DO WE NEED ETHICS

    AND LAW IN COMPUTING6AND LAW IN COMPUTING6