MISUSE OF ABUSE OF COMPUTER

Subject :

Computer Studies

Information Communication Technology (ICT)

Topic :

THE MISUSE AND ABUSE OF COMPUTER SYSTEM

Class :

Primary 6/ Basic 6

Term :

Third Term

Week :

Week 4

Instructional Materials :

Computer system

ATM card

Previous Knowledge :

Pupils have been taught career opportunities in computer studies

Behavioural Objectives :  At the end of the lesson, the pupils should be able to

1.define abuse

2.explain computer abuse

  1. Mention ways computer abuse take place

Reference Materials 

  • Online Resource Materials
  • Various Textbooks
  • Lagos State Upper Primary Scheme of Work

 

Content :

Topics: MISUSE OF COMPUTER

 

SUB-Topic (s):

Area Where Computers have been Misuse

An Abuse is a violation of the rightful and legitimate use of power, system or rights

 

Computer misuse or abuse occur when computer systems are violated or compromised and the are illegally used for fraudulent purposes or criminal purposes

AREAS OF COMPUTER MISUSE

There are however many areas where computer has been used for wrong or negative things. These are include:

  1. Piracy

Piracy is a very bad things. Piracy occurs when computer softwares are used without paying the programmers that write the programme. Computer software are written by computer programmers for sale. However, a lot of users simply get copies of software from friends and colleagues for use on their system without paying for it.

 

  1. Job losses

Robots are now taking over the jobs that are traditionally done by humans. The pilot and the camera man will soon lose their jobs to drones because drones will be able to take area view from above when acting movies. Sooner or later drones will be used to deliver pizza in Nigeria. As a result of the fact that many operations are now done by the computer, people who are not literate in computer use are likely to lose their jobs. Robots are already working in Hotels, Hospitals and Schools in Advanced and more developed countries

 

  1. Invasion of privacy

With optic Fibre and the speculation of 5G, internet speed will be very fast and online transaction will be done at the speed of light. Many people now have access to the Internet and have email addresses. . It is now common to receive emails from people or companies you don’t know anything about trying to pass information or sell something to you.(Spamming)

 

  1. Fraud

Fraudsters make online transactions by buying goods on the internet. Goods and services are sold and bought on the internet. We need to know the people we deal with. Otherwise, goods or services purchased many never be delivered as it may be a fraud.

 

  1. Stealing

People can steal password and withdraw money from bank accounts through the ATM machine without our knowledge. We need to be very careful with our ATM password, pin and the four last digits written on it. We must never share our banking details with anyone on phone or through the emails. Banks will never email you or call you to ask for your ATM or banking details

 

 

 

Presentation

The topic is presented step by step

 

Step 1: The class teacher revises the previous topics

 

Step 2. He introduces the new topic

 

Step 3: The class teacher allows the pupils to give their own examples and he corrects them when the needs arise

 

Evaluation :

  1. What is an abuse
  2. What is computer abuse or misuse
  3. List three examples of Computer abuse
  4. Explain how you can protect your ATM card

 

Conclusion :

 

The class teacher gives a brief note and he goes round to mark

 

Assignment :

Read about how we can take care of Computer hardwares