Вы находитесь на странице: 1из 2

COMPUTER

“What is Computer Ethics?” - prize-winning essay by


Lesson 1: Wired to the World Professor James H. Moor of Dartmouth University:
Computer ethics is analysis of the nature and social impact
Internet - virtually connects every person on the planet of computer technology and the corresponding formulation
- worldwide network of computers made up and justification of policies for the ethical use of technology.
of many different networks
Anonymous - names, identities, and/or sources do not have
Global connectivity - different parts of the world becoming to be made known.
connected through the internet
Ten Commandment of Computer Ethics by Dr. Ramon
Cloud computing - internet-based development and use of C. Barquin (1992):
computer technology; another way to think about the
internet I. Thou shalt not use a computer to harm other people.
Term “cloud” - internet is symbolized in most diagrams II/ Thou shalt not interfere with other people’s computer
work.
Examples of cloud software: III. Thou shalt not snoop around in other people computer’s
-Facebook files.
-Google Apps IV. Thou shalt not use a computer to steal.
-Skype V. Thou shalt not use a computer to bear flase witness.
-Twitter VI. Thou shalt not copy or use proprietary software for
-Youtube which you have not paid.
VII. Thou shalt not use other people’s resources without
Computers are commonly used in offices. authorization or proper compensation.
VIII. Thou shalt not appropriate other people’s intellectual
Local area network - computers within a company or output.
vicinity are connected to each other IX. Thou shalt think about the social consequences of the
program you are writing or the system you are designing.
Laptops and netbooks - portable computers that allow X. Thou shalt always use a computer in ways that insure
people to both carry the information they need electronically consideration and respect for your fellow humans.

Tablet computers and smartphones - handheld devices Some other popular ways to group people:
that extend the portability of laptops and netbooks. Hacker - someone who find ways to defeat computer
security measures or go around them.
Personal computers - helps you do research, provide
recipes for your mother and so. Script kiddie - immature cracker who reuses scripts and
programs developed by other hackers to break through
E-mail - an online communication through the internet security systems in the internet.

Magnetic Resonance Imaging (MRI) - imaging technique Hacktivist - hacks into computer systems or networks for
that produces high quality images of the human’s body’s political or social reasons.
internal organs.
Web defacer - someone who accesses websites with poor
Ultrasound machine - helps detect pregnancy problems for security controls and manipulate their contents.
the mother or abnormalities in the unborn baby as early as
possible. Cracker - hacker who has malicious or criminal intentions.
Also called as black-hat hackers.
Examples of optical storage devices:
-CDs Warez - cracked software
-DVDs
-Blu-ray discs Pirate - one who copies or distributes copyrighted software
illegally.
Online banking - transferring funds electronically, buy and
sell stocks, make balance inquiries, pay bills using credit Troll - someone who posts inflammatory, extraneous, or off-
card topic messages in an online community with an intent of
provoking.
Automated teller machines - machine used to deposit and
withdraw money Softlifting - sharing a software program with others.

Smart card technology - stores information on a magnetic Hard-disk loading - unauthorized copies of software to
strip at the back of the card. entice buyers

Lesson 2: Doing Right with Computers Counterfeiting - software is copied onto storage media and
sold; if made available online: online piracy
Computer Ethics - First used by Walter Maner (1978);
trace it from a study by Professor Norbert Wiener (1940s)
Lesson 3: Personalized for You

Personal computer - computer designed for use of an


individual

Desktop - computer that has greater power, storage, and


versatility; has a minitower central processing unit

Basic input devices:


- mouse
- keyboard

Basic output device:


- monitor
\
iMac - a desktop that integrates the monitor and CPU into
one unit

Laptop - combines all the components of a personal


computer into one package that is easy to carry around.
- weighs at least 8 pounds and are less than 3
inches thick.
- more expensive than desktop

Port replicator - allows a user to attach a laptop to a


number of peripherals through a single plug

Notebook computers - lighter than laptops but with the


same processing power and features.

Netbook - small notebook computers that weighs less than


three pounds

Smartphone - essentially a very powerful cellphone

Flash memory - small printed circuit board that holds large


amounts of data in storage

E-book reader - similar to a tablet but its main purpose is


for reading digital books

Apple iPod touch - portable digital media player

Вам также может понравиться