Translate

Thursday, 11 May 2017

Ten Commandments of Computer Ethics(1992)

The Ten Commandments
1 . Thou shalt not use a computer to harm
other people.
 2. Thou shalt not interfere with other
people's computer work.
3. Thou shalt not snoop around in other
people's computer files.
 4. Thou shalt not use a computer to steal.
5. Thou shalt not use a computer to bear
false witness.
6. Thou shalt not copy or use proprietary
software for which you have not paid
(without permission).
7. Thou shalt not use other people's
computer resources without
authorization or proper compensation. 8. Thou shalt not appropriate other
people's intellectual output.
9. Thou shalt think about the social
consequences of the program you are
writing or the system you are designing.
10 . Thou shalt always use a computer in
ways that ensure consideration and respect for your fellow humans.
 
Commandment 1 Simply put: Do not use the computer in
ways that may harm other people.
Explanation: This commandment says that
it is unethical to use a computer to harm
another user. It is not limited to physical
injury. It includes harming or corrupting other users' data or files. The
commandment states that it is wrong to
use a computer to steal someone's
personal information. Manipulating or
destroying files of other users is ethically
wrong. It is unethical to write programs, which on execution lead to stealing,
copying or gaining unauthorized access to
other users' data. Being involved in
practices like hacking, spamming, phishing
or cyber bullying does not conform to
computer ethics. Commandment 2 Simply put: Do not use computer
technology to cause interference in other
users' work.
Explanation: Computer software can be
used in ways that disturb other users or
disrupt their work. Viruses, for example, are programs meant to harm useful
computer programs or interfere with the
normal functioning of a computer.
Malicious software can disrupt the
functioning of computers in more ways
than one. It may overload computer memory through excessive consumption
of computer resources, thus slowing its
functioning. It may cause a computer to
function wrongly or even stop working.
Using malicious software to attack a
computer is unethical. Commandment 3 Simply put: Do not spy on another
person's computer data.
Explanation: We know it is wrong to read
someone's personal letters. On the same
lines, it is wrong to read someone else's
email messages or files. Obtaining data from another person's private files is
nothing less than breaking into someone's
room. Snooping around in another
person's files or reading someone else's
personal messages is the invasion of his
privacy. There are exceptions to this. For example, spying is necessary and cannot
be called unethical when it is done against
illegitimate use of computers. For example,
intelligence agencies working on
cybercrime cases need to spy on the
internet activity of suspects. Commandment 4 Simply put: Do not use computer
technology to steal information.
Explanation: Stealing sensitive information
or leaking confidential information is as
good as robbery. It is wrong to acquire
personal information of employees from an employee database or patient history
from a hospital database or other such
information that is meant to be confidential.
Similarly, breaking into a bank account to
collect information about the account or
account holder is wrong. Illegal electronic transfer of funds is a type of fraud. With
the use of technology, stealing of
information is much easier. Computers
can be used to store stolen information. Commandment 5 Simply put: Do not contribute to the spread
of misinformation using computer
technology.
Explanation: Spread of information has
become viral today, because of the
Internet. This also means that false news or rumors can spread speedily through
social networking sites or emails. Being
involved in the circulation of incorrect
information is unethical. Mails and pop-ups
are commonly used to spread the wrong
information or give false alerts with the only intent of selling products. Mails from
untrusted sources advertising certain
products or spreading some hard-to-
believe information, are not uncommon.
Direct or indirect involvement in the
circulation of false information is ethically wrong. Giving wrong information can hurt
other parties or organizations that are
affected on that particular theme. Commandment 6 Simply put: Refrain from copying software
or buying pirated copies. Pay for software
unless it is free.
Explanation: Like any other artistic or
literary work, software is copyrighted. A
piece of code is the original work of the individual who created it. It is copyrighted
in his/her name. In case of a developer
writing software for the organization she
works for, the organization holds the
copyright for it. Copyright holds true
unless its creators announce it is not. Obtaining illegal copies of copyrighted
software is unethical. It is not easy to do
such things and in the end it will just be
copied illegally. Commandment 7 Simply put: Do not use someone else's
computer resources unless authorized to.
Explanation: Multi-user systems have user
specific passwords. Breaking into some
other user's password, thus intruding his/
her private space is unethical. It is not ethical to hack passwords for gaining
unauthorized access to a password-
protected computer system. Accessing
data that you are not authorized to access
or gaining access to another user's
computer without her permission is not ethical. Privacy will always be applied to
such resources and were not supposed to
get exposed and hack in such ways that is
not yours. Commandment 8 Simply put: It is wrong to claim ownership
on a work which is the output of someone
else's intellect.
Explanation: Programs developed by a
software developer are her property. If he
is working with an organization, they are the organization's property. Copying them
and propagating them in one's own name
is unethical. This applies to any creative
work, program or design. Establishing
ownership on a work which is not yours is
ethically wrong. Originality of any software/programs are to be keep safe
and trying to claim ownership will cause a
viral disputes. Commandment 9 Simply put: Before developing a software,
think about the social impact it can have.
Explanation: Looking at the social
consequences that a program can have,
describes a broader perspective of
looking at technology. A computer software on release, reaches millions.
Software like video games and animations
or educational software can have a social
impact on their users. When working on
animation films or designing video games,
for example, it is the programmer's responsibility to understand his target
audience/users and the effect it may have
on them. For example, a computer game
for kids should not have content that can
influence them negatively. Similarly, writing
malicious software is ethically wrong. A software developer/development firm
should consider the influence their code
can have on the society at large. Commandment 10 Simply put: In using computers for
communication, be respectful and
courteous with the fellow members.
Explanation: The communication etiquette
we follow in the real world applies to
communication over computers as well. While communicating over the Internet,
one should treat others with respect. One
should not intrude others' private space,
use abusive language, make false
statements or pass irresponsible remarks
about others. One should be courteous while communicating over the web and
should respect others' time and
resources. Also, one should be
considerate with a novice computer user.

Saturday, 6 May 2017

The History of Nigeria(Summary)

The first inhabitants of what is now
Federal Republic of Nigeria are the Nok
people who reigned between 500BC
and 200AD.The hausa,kanuri and
fulani migrated there later.
The yoruba kingdoms of Ife and Oyo in southwestern Nigeria were prominent in
the 12th and 14th
centuries,respectively.
In the 16th century,Spanish and
Portuguese explorers were the first
Europeans to begin significant direct trade with peoples of modern-day
Nigeria,at the port named Lagos and in
calabar.Coastal trade with European
also marked the beginnings of the
Atlantic Slave Trade.
The fulani empire ruled the region from the beginning of the 19th century until
the British annexed Lagos in 1851 and
seized control of the region by 1886.It
formally became colony and
protectorate of Nigera in 1914.
On oct. 1,1960,Nigeria gained independence,becoming a member of
the Commonwealth of Nations and
joining the united nations.Today
Nigeria is the most populous country in
africa with more than 190million
people. The country which our founding fathers founded is at the brink of
collapse.The rights of those at the
grassroots level are been abused
everday.Domestic production rate of
goods and services is declining daily.It is
now in grass from grace. After all this story,what we want us to
realise is that we all own Nigeria and
deserve to enjoy her.We should let our
knowledge unite us and not separate
us.We should all remember the saying
"There is no place like home". We must not let the few differences between us
overcome the numerous commonalities
among us.
You should know that;We spend the
same currency,We speak languages with
same grammar,We share the same history,We share the same
race,We live in the same geograpically
region,We share same foods and
culture,We believe in the same God but
we worship him in the way we choose
and so many other commonalities. We pray that Nigeria unifies
linguistically.

Friday, 5 May 2017

Jamb possible questions 2017 UTME

1. Tayo’s mother died on her way to___
_? (a)Abuja
(b)oxford (c)Lagos (b)Benin 2. where did
ike work? (a)In a bar (b)in the ministry of
education (c)as a British council
(d)as a business man 3. which word akin’s uncle have a
penchant for? (a)Come nearer (b)you
follow (c)Yowa
(d)left out 4. who told Tayo his mother
was dead? (a)His friend
(b)ike (c)modupe (d)Miriam 5. what game did
akin’s uncle start with
his friends? (a)Football
(b)Tennis (c)Ayo (d)Ludo 6. what is the
name of akin’s uncle
boss? (a)John Lee (b)Lugard (c)Lord lugard (d)Fred 7. whom
did Tayo think of whenever he
was with Helene? (a)Christine (b)
Vanessa (c)Modupe
(d)his mother 8. what was written on
kemi’s snoopy night dress? (a)Love is the whole world (b)Rock my
style
(c)Love my style love me
(d)kiss my ass 9. where did ajayis always
fly to for the summer holidays? (a)Abuja
(b)Hong Kong (c)Lagos (d)England 10. in what year did uncle kayode get
married to Helene? (a)1975
(b)1964
(c)1987 (d)1974 11. how old was Miriam’s
pregnancy as
at the time they visited the yelwa club? (a)5weeks
(b)3 months (c)5months (d)3weeks 12.
who called out on greetings as Tayo
and his family entered the lounge in
yelwa club? (a)Abraham (b)Ibrahim (c)
Vanessa (d)Christine 13. what was the name of
Tayo’s
daughter? (a)Kardashian
(b)lily (c)kemi (d)funke 14. who phoned
Tayo last week to
congratulate him on his manuscript? (a) His friends
(b)his friends
(c)his colleagues (d)his publisher’s 15.
what was the name of salamatou’s son?
(a)Suleiman (b)Abubakar
(c)David (d)ike 16. when was tayo’s family house
normally quiet? (a)Monday morning
(b)Friday morning (c)Sunday morning (d)
Saturday evening 17. what did Tayo and
Vanessa order
when they got to the restaurant in Lagos? (a)Rice and beans
(b)Rice and stew (c)Rice and plantains
(d)coffee 18. what was the name of
Tayo’s
neighborhood drunk in his home town in
ibadan? (a)Jimoh (b)micheal (c)Dele (d)Fred 19. who was
the most successful trader
along the west African coast?. (a)Tayo’s
Auntie (b)Tayo’s mother (c)Tayo’s sister
(d)Tayo’s mother in Law 20. what was the
name of Oxford finest hotel? (a)Royal Hotel (b)The Randolph
Hotel (c)Super motion hotel
(d)Oxford Hotel and suit 21. what was the
name of Yusuf’s
current girlfriend? (a)Amina
(b)yemi (c)Joyce (d)femi 22. What did tunde refuse to have at the
party in his house? (a)wordly music
(b)smooching (c)drinks (d)dance 23.
Tunde’s room was designed to be
what? (a)Hotel (b)A lounge (c)a slf con
(d)a mansion 24.The name of Tayo’s cousin was? (a)Bayo
(b)Tumi (c)Tunde (d)jumoke 25. where
did Tayo accompany tunde to? (a)The
club (b)the bakery (c)the
restaurant
(d)Vanessa’s house 26. where was Yusuf working at? (a)The bakery
(b)At the clinic (c)At the hospital (d)At the
bank 27. what did Tayo aspire to be in
the
future!
(a)A teacher (b)an accountant (c)a drunk
(d)an entrepreneur 28. what is the name
of Vanessa’s father! (a)Michael
(b)Olamide (c)Jonathan. (d)buhari 29.
who drove to fetch uncle tony from
station when he arrived France?. (a) Tunde
(b)Tayo (c)Jane (d)kemi 30. who was
never asking but
announcing? (a)Nancy Mordovia
(b)Nancy Morx (c)Nancy mordoch (d)
Nancy Bradford AFTER READING OUR SUMMARY OF THE NOVEL HERE
(CLICK HERE TO DOWNLOAD NOVEL IN
PDF), CANDIDATES SHOULD BE ABLE
TO ANSWER THE FOLLOWING
QUESTIONS 31. A simile embroidered to
qualify Mr. Ajayi’s silver car was ? Answer: *It was
glistened like a fresh river fish* 32.
Before Tayo’s travel, He presumed
that Uncle Bola held ? Answer:*the
secret to a woman’s heart* 33. In the last
sentence of Mr. Ajayi’s letter to his son was their family’s motto
which states ? Answer:*In all things
moderation, with exception of study*
Share this Questions and Answers with
friends, Pls use the share button below
thanks

How to make the perfect “Amala”

f you are from the western region of Nigeria
or you live within the area, chances are you
have a deep love for Amala. A popular
Nigerian delicacy made out of yam flour and/or
cassava flour, it is difficult to visit any of the
local bukkas in such cities as Ibadan and Lagos without finding the meal on the menu.
Usually eaten alongside soups such as ewedu,
gbegiri, okra and more, it is lightweight and
makes for an easy swallow. The great thing about Amala is that it is quick
and easy to prepare, but then, if you are not
careful you may end up with lumps that will
make its consumption less than appetizing. To
ensure you get the smoothest results, we at
JumiaTravel have put together the key stages to follow. Amala STEP 1
Pour the quantity of water you want to use in a
pot and heat to a boiling point STEP 2
Once the water is boiled, turn out the fire and
gradually begin to add the yam flour. Ensure
you do not add the yam flour to the water while
still on the fire, that way it does not form lumps. STEP 3
Turn the yam flour with a wooden stick for a
while, add little water and put it back on the fire
to cook on low heat for about 5 minutes so as
to make it cook properly. STEP 4
You can use one of your clean fingers to feel it
while still on fire to be sure it is neither too soft
nor too hard. If it is too soft you can add more
Yam flour, and if too hard add some hot water. STEP 5
Stir well until it is very smooth . Once your Amala is prepared and ready, you
can wrap it in nylon and put it in a cooler, so as
to keep it warm.