Lesson Notes By Weeks and Term - Senior Secondary 1

Computer ethics

Term: 2nd Term

Week: 6

Class: Senior Secondary School 1

Age: 15 years

Duration: 40 minutes of 2 periods each

Date:       

Subject:      Data Processing

Topic:-       Computer ethics

SPECIFIC OBJECTIVES: At the end of the lesson, pupils should be able to

  1. Define computer ethics
  2. Explain the rules guiding the use of the computer laboratory

INSTRUCTIONAL TECHNIQUES: Identification, explanation, questions and answers, demonstration, videos from source

INSTRUCTIONAL MATERIALS: Videos, loud speaker, pictures, Data Processing for senior Secondary Education by Hiit Plc, WAPB Computer Studies for Senior Secondary I by Adekunle et al, On-line Materials.

INSTRUCTIONAL PROCEDURES

PERIOD 1-2

PRESENTATION

TEACHER’S ACTIVITY

STUDENT’S ACTIVITY

STEP 1

INTRODUCTION

The teacher reviews the previous lesson on the medium of information transmission

Students pay attention

STEP 2

EXPLANATION

He explains the meaning of computer ethics

 

 

Students pay attention and participates

STEP 3

DEMONSTRATION

He further highlights the rules and regulations guiding the use of the computer laboratory

 

Students pay attention and participate

STEP 4

NOTE TAKING

The teacher writes a summarized note on the board

The students copy the note in their books

 

NOTE

COMPUTER ETHICS

Computer ethics are the moral principles that guide the use of the computer.

There are four areas of computer ethics

  1. Privacy – responsibility to protect data about individuals
    2. Accuracy – responsibility of data collectors to authenticate information and ensure its accuracy
    3. Property – who owns information and software and how can they be sold and exchanged
    4. Access responsibility of data collectors to control access and determine what information a person has the right to obtain about others and how the information can be used


Ten Commandments of Computer Ethics

Some common computer crimes include
1. Piracy- it is an act of illegal copying, distribution, or use of software.
2. Softlifting: Borrowing and installing a copy of a software application from a colleague.
3. Client-server overuse: Abusing the amount of possible installation of a licensed product
4. Hard-disk loading: Installing and selling unauthorized copies of software on refurbished or new computers.
5. Counterfeiting: selling pirated softwares
6. Online piracy: download illegal software that has been cracked by using peer-to-peer network, or some other download clients.

  1. Hacking: This is an illegal access to peoples’ e-information

Some common computer ethics

  1. Do not use a computer to harm other people
  2. Do not use a computer to spy or sneak up on people
  3. Do not use the computer to steal
  4. You are not allowed to use proprietary software you did not pay for
  5. You are not allowed to use or sell other people’s intellectual property without their permission or compensation
  6. For every software program you develop, thoughtful considerations should be given to both its positive effects and consequences especially if it endangers human life

 

EVALUATION:   1. Define computer ethics

  1. Enumerate and explain common computer crimes
  2. Discuss some common computer ethics

CLASSWORK: As in evaluation

CONCLUSION: The teacher commends the students positively