SlideShare a Scribd company logo
6
Most read
9
Most read
10
Most read
COMPUTER
    LAB
MANAGEMENT
COMPUTER LAB RULES
  AND REGULATIONS
1.Students are prohibited to enter the lab
  unless authorized by the teacher
2.Scan diskettes/ thumb drive before using
  them.
3.Report all the problems related to the
  system to the teacher
4. Do not attempt to repair with lab
   equipment.
5. Be responsible when using equipment,
   software and facilities in the lab.
6. Do not move any equipment from
   original position.
7. Do not remove or load any software
   into the computer.
8. Do not change the settings in the
    computer.
9. Save all work in the external storage
    device and not in the computer.
10. Do not bring in bags, food and drink
    into the lab.
11. Turn off the computer accordingly
    after use.
12. Switch off all power supplies before
    leaving the lab.
13. Internet facilities is strictly for
    educational purposes only.
14. All users should record the use of
    computer in the computer logbook.
15. The lab should be kept clean and tidy
    at all times.
ETHICS IN USING
  COMPUTER
10 IMPORTANT INSTRUCTIONS OF
           COMPUTER ETHICS

1. You should not use a computer to harm other
   people.
2. You shall not interfere with other people’s
   computer work.
3. You shall not use a computer to steal
4. You shall not copy or use software for which
   you have not paid illegally
5. You shall not use other people’s computer
   resources without permission or proper
   compensation.
6. You shall not look around in other people’s
   computer files
7. You shall not use a computer to give false
   identity.
8. You shall not correct other people’s ideas or
   works
9. You shall think about the social effects on the
   program you are writing or the system you are
   designing.
10.You shall always use a computer in ways that
   ensure consideration and respect for your
   fellow friends.
COPYRIGHT
   Is a legal right given to the owner of a copyright to
          prevent others from copying an artistic
    works, literary, dramatic or music work. Only the
  copyright owner has the legal right to reproduce the
  work in any form and has the right to sue others who
    copy or distribute unauthorized work without the
                          copyright.
• Copyright symbol © or (c)
To reproduce the      To distribute copies of     Sufficient effort has
work                  the work to the public       been expected to
                      by sale or transfer of      make work original in
                      ownership, or by                  character
                      rental, lease, or lending

The owner of
copyright has the     To disallow other             The work has been
special right to do   persons from using the          written down,
and authorize the     work without                recorded or reduced to
following             permission                      material form


                      To carry out the work
To prepare copies
                      publicly. (copyright         The author is qualified
works based
                      protection in Malaysia is     person or the work is
upon the work
                      governed by the               made in Malaysia or
                      Copyright Act 1987. a        the work is published
                      work that is eligible is           in Malaysia
                      protected automatically
                      upon fulfillment of the
                      following conditions:-
COPYRIGHT VIOLATION
A person who does not own the copyright and without
license from the owner or does not have permission in
any of the following acts has broken the copyright law
Respect the rights and     No one should purposely
property of others by       attempt to weaken the               Respect and
 not accessing other           system security or                abide by
   member’s data                disturbed system               copyright laws
                             performance through
                                    “hacking”
 Send no obscene or
harassing messages in                                     Resources are not to be
any format in violation                                      used for business
of any applicable law.          A person that             purposes or private gain.
                               want to use any
Email messages should            copyrighted
be brief, occasional and       resources must:
                                                            Changing of system
  should indicate the
                                                           settings is not allowed
 sender’s true identity


     Downloading,                Use resources only for academic
installation, or removal      assignments and official education and
of software or hardware        research and not reproduced in any
     is not allowed                 material form to the public
PLAGIARISM
Copying or paraphrasing information from a
 source without giving credit to the owner.

• Using images, audio or video without
  permission or without giving credit is also
  plagiarism.
EFFECT OF PLAGIARISM

 Plagiarism is a serious academic offence for students.
  Any use of another person’s work or ideas must be
acknowledged. If you fail to do this, you may fail in the
 examination or your name maybe removed from the
                         pass list
HOW TO AVOID
                                    PLAGIARISM




  Take good notes. Write down                             Put away your source before
                                     Put quotation       you begin to write. Read your
   the tittle, the name of the
                                    marks around any      source, and then write from
  source, the author, the page
                                      language you       your memory. After you write,
number(s), and the date for any
                                        reproduce             you can recheck your
language you copy or adapt and
                                    directly from the   paraphrase or summary against
for each of piece of information
                                          source            the original for accuracy
            you record

More Related Content

PPTX
Computer lab rules and regulations
DOC
Computer laboratory rules
PPT
Health And Safety
PPTX
Introduction to software
PPT
Computer lab etiquette
DOCX
Chs nc2 reviewer - with oral questioning
PPT
Basic 50 linus command
PPT
Computer Laboratory Rules
Computer lab rules and regulations
Computer laboratory rules
Health And Safety
Introduction to software
Computer lab etiquette
Chs nc2 reviewer - with oral questioning
Basic 50 linus command
Computer Laboratory Rules

What's hot (20)

PDF
How to Work with Dev-C++
PDF
Dos & donts in ict 1
DOC
Lesson Plan : Input Devices
PPTX
Step for installing linux server
PPTX
LESSON-1-INSTALL-OPERATING-SYSTEM-AND-DRIVERS-FOR-PERIPHERALS-1.pptx
PPTX
File permission in linux
PPT
History of c++
PPTX
Windows operating system
PPTX
Computer specifications
PPTX
How to install windows 7 operating system
PPT
Computer Laboratory Rules
PPT
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 1 - Introdu...
PDF
Computer maintenance-and-repair
PPTX
Installing Windows-10
PDF
Dos & donts in ict 2
PPT
Digital Citizenship
PDF
SYSTEM ADMINISTRATION AND MAINTENANCE NOTES PERIYAR UNIVERSITY
PPTX
Installing Operating System
PPTX
Compiler vs interpreter
PPT
How to install windows 10
How to Work with Dev-C++
Dos & donts in ict 1
Lesson Plan : Input Devices
Step for installing linux server
LESSON-1-INSTALL-OPERATING-SYSTEM-AND-DRIVERS-FOR-PERIPHERALS-1.pptx
File permission in linux
History of c++
Windows operating system
Computer specifications
How to install windows 7 operating system
Computer Laboratory Rules
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 1 - Introdu...
Computer maintenance-and-repair
Installing Windows-10
Dos & donts in ict 2
Digital Citizenship
SYSTEM ADMINISTRATION AND MAINTENANCE NOTES PERIYAR UNIVERSITY
Installing Operating System
Compiler vs interpreter
How to install windows 10
Ad

Viewers also liked (12)

PPTX
Classroom Management in the Computer Lab
PDF
Welcome To Your Computer Lab Ppt
PPS
Impact of ICT
PPS
Laboratory Rules And Safety Guidelines For Students
PPTX
Computer laboratory rules
PPTX
Computer maintenance
PPT
Computer Lab Rules
PPT
ICT:Classroom rules and expectations
DOC
COMPUTER GRAPHICS LAB MANUAL
PPT
Impact Of Ict In Society
PDF
Computer Laboratory Rules and Guidelines
DOC
Lab management
Classroom Management in the Computer Lab
Welcome To Your Computer Lab Ppt
Impact of ICT
Laboratory Rules And Safety Guidelines For Students
Computer laboratory rules
Computer maintenance
Computer Lab Rules
ICT:Classroom rules and expectations
COMPUTER GRAPHICS LAB MANUAL
Impact Of Ict In Society
Computer Laboratory Rules and Guidelines
Lab management
Ad

Similar to Computer Lab Management and Ethics in Using Computer (20)

PPTX
Copyright and Fair Use in the Classroom for Impact Grant
PPTX
Patrick's Powerpoint
PPTX
Patrick's powerpoint
PPTX
How good are your internet manners proj. slideshare project this one
PPTX
Internet manners
PPTX
Internet manners
PPTX
Internet manners
PPTX
Internet manners
PPTX
Copyright for high school
PPTX
The rules of the internet
PPT
Computer ethics
PPTX
How good are your internet manners proj.
PPTX
Internet manners
PPTX
Nakyra hill proper netiquette 9 18-12
PPTX
Netiquette, Copyright, and Plagiarism
PPTX
Digital citizenship 1
PPTX
Mora, Cindy P. (Intellectual Property Rights on the Development of Use of Dig...
PPTX
MIL_Q1_M6_Intellectual-Property-Guidelines.pptx
PPTX
PPTX
AMD LAW Library presentation regarding copyright protection
Copyright and Fair Use in the Classroom for Impact Grant
Patrick's Powerpoint
Patrick's powerpoint
How good are your internet manners proj. slideshare project this one
Internet manners
Internet manners
Internet manners
Internet manners
Copyright for high school
The rules of the internet
Computer ethics
How good are your internet manners proj.
Internet manners
Nakyra hill proper netiquette 9 18-12
Netiquette, Copyright, and Plagiarism
Digital citizenship 1
Mora, Cindy P. (Intellectual Property Rights on the Development of Use of Dig...
MIL_Q1_M6_Intellectual-Property-Guidelines.pptx
AMD LAW Library presentation regarding copyright protection

More from Nur Azlina (14)

PPTX
Presentation untuk calon sekolah kluster 2013
PPT
Plant and elevations
PPT
Earth as a sphere 9.4
PPT
Bearing map
PPTX
Sejarah krs
PPTX
System unit
PPTX
Peripherals
PPTX
Input, output, storage device
PPTX
Evolution and Types of the Computer
PPTX
Computer system
PPTX
Introduction
PPTX
Internet applications
PPTX
Introduction to the internet
PPTX
SMK (P) Bandaraya
Presentation untuk calon sekolah kluster 2013
Plant and elevations
Earth as a sphere 9.4
Bearing map
Sejarah krs
System unit
Peripherals
Input, output, storage device
Evolution and Types of the Computer
Computer system
Introduction
Internet applications
Introduction to the internet
SMK (P) Bandaraya

Recently uploaded (20)

PPTX
UNIT III MENTAL HEALTH NURSING ASSESSMENT
PDF
احياء السادس العلمي - الفصل الثالث (التكاثر) منهج متميزين/كلية بغداد/موهوبين
PDF
LNK 2025 (2).pdf MWEHEHEHEHEHEHEHEHEHEHE
PDF
1_English_Language_Set_2.pdf probationary
PPTX
Introduction-to-Literarature-and-Literary-Studies-week-Prelim-coverage.pptx
PDF
Complications of Minimal Access Surgery at WLH
PDF
Weekly quiz Compilation Jan -July 25.pdf
PPTX
Tissue processing ( HISTOPATHOLOGICAL TECHNIQUE
PDF
advance database management system book.pdf
PDF
Empowerment Technology for Senior High School Guide
PDF
ChatGPT for Dummies - Pam Baker Ccesa007.pdf
PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
PPTX
Onco Emergencies - Spinal cord compression Superior vena cava syndrome Febr...
PDF
Chinmaya Tiranga quiz Grand Finale.pdf
PDF
SOIL: Factor, Horizon, Process, Classification, Degradation, Conservation
PDF
What if we spent less time fighting change, and more time building what’s rig...
PPTX
Cell Types and Its function , kingdom of life
PDF
Paper A Mock Exam 9_ Attempt review.pdf.
PDF
Computing-Curriculum for Schools in Ghana
PPTX
CHAPTER IV. MAN AND BIOSPHERE AND ITS TOTALITY.pptx
UNIT III MENTAL HEALTH NURSING ASSESSMENT
احياء السادس العلمي - الفصل الثالث (التكاثر) منهج متميزين/كلية بغداد/موهوبين
LNK 2025 (2).pdf MWEHEHEHEHEHEHEHEHEHEHE
1_English_Language_Set_2.pdf probationary
Introduction-to-Literarature-and-Literary-Studies-week-Prelim-coverage.pptx
Complications of Minimal Access Surgery at WLH
Weekly quiz Compilation Jan -July 25.pdf
Tissue processing ( HISTOPATHOLOGICAL TECHNIQUE
advance database management system book.pdf
Empowerment Technology for Senior High School Guide
ChatGPT for Dummies - Pam Baker Ccesa007.pdf
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
Onco Emergencies - Spinal cord compression Superior vena cava syndrome Febr...
Chinmaya Tiranga quiz Grand Finale.pdf
SOIL: Factor, Horizon, Process, Classification, Degradation, Conservation
What if we spent less time fighting change, and more time building what’s rig...
Cell Types and Its function , kingdom of life
Paper A Mock Exam 9_ Attempt review.pdf.
Computing-Curriculum for Schools in Ghana
CHAPTER IV. MAN AND BIOSPHERE AND ITS TOTALITY.pptx

Computer Lab Management and Ethics in Using Computer

  • 1. COMPUTER LAB MANAGEMENT
  • 2. COMPUTER LAB RULES AND REGULATIONS
  • 3. 1.Students are prohibited to enter the lab unless authorized by the teacher 2.Scan diskettes/ thumb drive before using them. 3.Report all the problems related to the system to the teacher
  • 4. 4. Do not attempt to repair with lab equipment. 5. Be responsible when using equipment, software and facilities in the lab. 6. Do not move any equipment from original position. 7. Do not remove or load any software into the computer.
  • 5. 8. Do not change the settings in the computer. 9. Save all work in the external storage device and not in the computer. 10. Do not bring in bags, food and drink into the lab. 11. Turn off the computer accordingly after use.
  • 6. 12. Switch off all power supplies before leaving the lab. 13. Internet facilities is strictly for educational purposes only. 14. All users should record the use of computer in the computer logbook. 15. The lab should be kept clean and tidy at all times.
  • 7. ETHICS IN USING COMPUTER
  • 8. 10 IMPORTANT INSTRUCTIONS OF COMPUTER ETHICS 1. You should not use a computer to harm other people. 2. You shall not interfere with other people’s computer work. 3. You shall not use a computer to steal 4. You shall not copy or use software for which you have not paid illegally 5. You shall not use other people’s computer resources without permission or proper compensation.
  • 9. 6. You shall not look around in other people’s computer files 7. You shall not use a computer to give false identity. 8. You shall not correct other people’s ideas or works 9. You shall think about the social effects on the program you are writing or the system you are designing. 10.You shall always use a computer in ways that ensure consideration and respect for your fellow friends.
  • 10. COPYRIGHT Is a legal right given to the owner of a copyright to prevent others from copying an artistic works, literary, dramatic or music work. Only the copyright owner has the legal right to reproduce the work in any form and has the right to sue others who copy or distribute unauthorized work without the copyright. • Copyright symbol © or (c)
  • 11. To reproduce the To distribute copies of Sufficient effort has work the work to the public been expected to by sale or transfer of make work original in ownership, or by character rental, lease, or lending The owner of copyright has the To disallow other The work has been special right to do persons from using the written down, and authorize the work without recorded or reduced to following permission material form To carry out the work To prepare copies publicly. (copyright The author is qualified works based protection in Malaysia is person or the work is upon the work governed by the made in Malaysia or Copyright Act 1987. a the work is published work that is eligible is in Malaysia protected automatically upon fulfillment of the following conditions:-
  • 12. COPYRIGHT VIOLATION A person who does not own the copyright and without license from the owner or does not have permission in any of the following acts has broken the copyright law
  • 13. Respect the rights and No one should purposely property of others by attempt to weaken the Respect and not accessing other system security or abide by member’s data disturbed system copyright laws performance through “hacking” Send no obscene or harassing messages in Resources are not to be any format in violation used for business of any applicable law. A person that purposes or private gain. want to use any Email messages should copyrighted be brief, occasional and resources must: Changing of system should indicate the settings is not allowed sender’s true identity Downloading, Use resources only for academic installation, or removal assignments and official education and of software or hardware research and not reproduced in any is not allowed material form to the public
  • 14. PLAGIARISM Copying or paraphrasing information from a source without giving credit to the owner. • Using images, audio or video without permission or without giving credit is also plagiarism.
  • 15. EFFECT OF PLAGIARISM Plagiarism is a serious academic offence for students. Any use of another person’s work or ideas must be acknowledged. If you fail to do this, you may fail in the examination or your name maybe removed from the pass list
  • 16. HOW TO AVOID PLAGIARISM Take good notes. Write down Put away your source before Put quotation you begin to write. Read your the tittle, the name of the marks around any source, and then write from source, the author, the page language you your memory. After you write, number(s), and the date for any reproduce you can recheck your language you copy or adapt and directly from the paraphrase or summary against for each of piece of information source the original for accuracy you record