MISUSE OF ABUSE OF COMPUTER
Subject :
Computer Studies
Information Communication Technology (ICT)
Topic :
THE MISUSE AND ABUSE OF COMPUTER SYSTEM
Class :
Primary 6/ Basic 6
Term :
Third Term
Week :
Week 4
Instructional Materials :
Computer system
ATM card
Previous Knowledge :
Pupils have been taught career opportunities in computer studies
Behavioural Objectives : At the end of the lesson, the pupils should be able to
1.define abuse
2.explain computer abuse
- Mention ways computer abuse take place
Reference Materials
- Online Resource Materials
- Various Textbooks
- Lagos State Upper Primary Scheme of Work
Content :
Topics: MISUSE OF COMPUTER
SUB-Topic (s):
Area Where Computers have been Misuse
An Abuse is a violation of the rightful and legitimate use of power, system or rights
Computer misuse or abuse occur when computer systems are violated or compromised and the are illegally used for fraudulent purposes or criminal purposes
AREAS OF COMPUTER MISUSE
There are however many areas where computer has been used for wrong or negative things. These are include:
- Piracy
Piracy is a very bad things. Piracy occurs when computer softwares are used without paying the programmers that write the programme. Computer software are written by computer programmers for sale. However, a lot of users simply get copies of software from friends and colleagues for use on their system without paying for it.
- Job losses
Robots are now taking over the jobs that are traditionally done by humans. The pilot and the camera man will soon lose their jobs to drones because drones will be able to take area view from above when acting movies. Sooner or later drones will be used to deliver pizza in Nigeria. As a result of the fact that many operations are now done by the computer, people who are not literate in computer use are likely to lose their jobs. Robots are already working in Hotels, Hospitals and Schools in Advanced and more developed countries
- Invasion of privacy
With optic Fibre and the speculation of 5G, internet speed will be very fast and online transaction will be done at the speed of light. Many people now have access to the Internet and have email addresses. . It is now common to receive emails from people or companies you don’t know anything about trying to pass information or sell something to you.(Spamming)
- Fraud
Fraudsters make online transactions by buying goods on the internet. Goods and services are sold and bought on the internet. We need to know the people we deal with. Otherwise, goods or services purchased many never be delivered as it may be a fraud.
- Stealing
People can steal password and withdraw money from bank accounts through the ATM machine without our knowledge. We need to be very careful with our ATM password, pin and the four last digits written on it. We must never share our banking details with anyone on phone or through the emails. Banks will never email you or call you to ask for your ATM or banking details
Presentation
The topic is presented step by step
Step 1: The class teacher revises the previous topics
Step 2. He introduces the new topic
Step 3: The class teacher allows the pupils to give their own examples and he corrects them when the needs arise
Evaluation :
- What is an abuse
- What is computer abuse or misuse
- List three examples of Computer abuse
- Explain how you can protect your ATM card
Conclusion :
The class teacher gives a brief note and he goes round to mark
Assignment :
Read about how we can take care of Computer hardwares