Você está na página 1de 23

COMPUTER LAB RULES

DOS IN THE COMPUTER LAB

STUDENTS MUST ENSURE THE SAFETY OF


EQUIPMENT IN THE COMPUTER LAB AT ALL
TIMES.

STUDENTS MUST RECORD USAGE OF


COMPUTER IN LOG BOOKS PROVIDED.

MAKE SURE ALL CHAIRS AND EQUIPMENT


PROPERLY ARRANGED BEFORE YOU LEAVE
THE LAB.

DOS IN THE COMPUTER LAB


KEEP QUIET AND ALWAYS LISTEN TO
TEACHERS INSTRUCTIONS.
REPORT ANY IRREGULARITIES TO THE
TEACHER-IN-CHARGE.

DONTS IN THE COMPUTER LAB

NO FOOD OR DRINKS ALLOWED.

DO NOT LITTER.

STUDENTS ARE NOT ALLOWED TO ENTER


THE LAB WITHOUT PERMISSION.

STUDENTS ARE NOT ALLOWED TO


CHANGE THE DISPLAY AND SOFTWARE
SETTINGS.

DONTS IN THE COMPUTER LAB


STUDENTS ARE NOT ALLOWED TO BRING OUTSIDE
DISKETTES, CD-ROMS AND ANY SECONDARY
STORAGE.
COMPUTER LAB IS A RESTRICTED AREA.
NO BAGS ALLOWED.
DO NOT COPY ANY SOFTWARE FROM THE
COMPUTER.
DO NOT TOUCH/DISTURB ANY WIRING
SYSTEM/CONNECTIONS.

COMPUTER LAB RULES AND


REGULATION
1. STUDENTS ARE PROHIBITED TO
ENTER THE LAB UNLESS
AUTHORISED BY THE TEACHER.
2. SCAN DISKETTES BEFORE USING
THEM.
3. REPORT ALL PROBLEMS RELATED
TO THE SYSTEM TO THE TEACHER.
4. DO NOT ATTEMPT TO REPAIR OR
TAMPER WITH LAB EQUIPMENT.

COMPUTER LAB RULES AND


REGULATION
5. BE RESPONSIBLE WHEN USING THE
EQUIPMENT, SOFTWARE AND
FACILITIES IN THE LAB.
6. DO NOT MOVE ANY EQUIPMENT
FROM ITS ORIGINAL POSITION.
7. DO NOT REMOVE OR LOAD ANY
SOFTWARE INTO THE COMPUTER.
8. DO NOT CHANGE SETTINGS IN THE
COMPUTER.

COMPUTER LAB RULES AND


REGULATION
9. SAVE ALL WORK IN EXTERNAL
STORAGE DEVICE AND NOT IN THE
COMPUTER.
10. DO NOT BRING BAGS, FOOD, AND
DRINK TO THE LAB.
11. TURN OFF THE COMPUTER
ACCORDINGLY AFTER USE.
12. SWITCH OFF ALL POWER SUPPLIES
BEFORE LEAVING THE LAB.

COMPUTER LAB RULES AND


REGULATION
13. INTERNET FACILITY IS STRICTLY FOR
EDUCATIONAL PURPOSES ONLY.
14. TEACHERS SHOULD RECORD THE USE OF
COMPUTER LAB IN THE LAB LOG BOOK.
15. ALL USERS SHOULD RECORD THE USE OF
COMPUTERS IN THE COMPUTER LOG
BOOK.
16. THE LAB SHOULD BE KEPT CLEAN AND
TIDY AT ALL TIMES

DATA AND USER SECURITY

DEFINITION OF PASSWORD
A password is a secret word or number,
or a combination of the two, that must be
typed on the keyboard to gain access to
a computer system.

DATA AND USER SECURITY


DEFINITION OF USERNAME
Unique combination of characters that
identifies user
Password is private
combination of
characters associated
with the user name
that allows access
to computer
resources

THE IMPORTANCE OF DATA


AND USER SECURITY
TO PREVENT ANY UNAUTHORIZED
ACCESS TO THE COMPUTER
HACKERS, COMPUTER THEFTS, ETC.

TO PREVENT YOUR DATA FROM BEING


COPIED, REMOVED, DELETED AND
DESTROYED BY UNAUTHORIZED
USERS

ORGANISATION CHART
AN ORGANIZATION CHART IS USED TO
ILLUSTRATE HIERACHICAL
RELATIONSHIPS SUCH AS
DEPARTMENT MANAGERS AND
EMPLOYEES WITHIN A
COMPANY/ORGANIZATION.
OTHER EXAMPLE:
EXAMPLE CLASS
ORGANISATION CHART

CHAIRPERSON
(PN. NOLIAH BT. OTHMAN)
DEPUTY CHAIRPERSON
(PN. MASITA BT. HARUN)
VICE CHAIPERSONS
(TN. HJ. ZAKARIA B. ISMAIL,
CIK HJH. SITI ASIAH BT. HITAM)
SECRETARY
(PN. NORMA HAZURA BT. MOHD. ZULKAFLI)
ASSISTANT SECRETARY
(PN. KURSIAH BT. KUSHAIRI,
PN. NORAISHAH BT. SAFIEI)

COMMITEES

PANEL HEAD OF SUBJECTS

LOG BOOK

TYPES OF LOG BOOKS


1. COMPUTER LOG BOOK
2. COMPUTER LAB LOG
BOOK

THE USAGE OF LOG BOOK


TO RECORD:
USER
TIME USED
CLASS
SUBJECT
PURPOSE
TEACHER-IN-CHARGE
SIGNATURE

ETHICS IN USING COMPUTER


Ethics is a moral philosophy where a
person makes a specific moral choice
and sticks to it.
On the other hand, ethics in computing
means moral guidelines to refer to
when using the computer and
computer networks. This includes the
Internet.

ETHICAL OR
UNETHICAL?
Stealing personal information from a friends
computer

Getting permission to use the information in an article


on the Internet
Installing a virus on someones computer
Sending business advertisements to other computer
users via email without their permission
Imitating the unique name of certain products
Modifying certain part of articles without permission
from the original author
Using some graphics from the Internet in an
advertisement with the consent of the owner
Sending warning email to other computer users on the
widespread of virus

COPYRIGHT
Intellectual Property Laws cover ideas, inventions,
literary creations, unique names, business models,
industrial processes, computer program codes and
more.
Invention that are protected by the Intellectual Property
Law including trademark, service marks, trade/company
names, domain names, geographical indications,
copyrights, and patents.
Copyright gives the holder some exclusive rights to
control some reproduction of works of authorship, such
as books and music, for a certain period of time.

WHY DO WE NEED ETHICS


AND LAW IN COMPUTING?
We must respect ownership by not stealing other peoples
work either by duplicating or distributing it.
Duplicating and distributing copies of audio tapes, video tapes,
and computer programs without permission and authorization
from the individual or company that created the program are
immoral and illegal.

WHY DO WE NEED ETHICS


AND LAW IN COMPUTING?
We should respect other peoples privacy and confidentiality by
refraining ourselves from reading their mails or files without
their permission.
If we do so, it is considered as violating an individuals right to
privacy and confidentiality.

WHY DO WE NEED ETHICS


AND LAW IN COMPUTING?
Property here means ownership.
Since an individual data and information are
considered as property, therefore, an act of
tampering and changing electronic information is
considered as vandalism and disrespect for other
peoples property.

Você também pode gostar