Unit 7: Computer Ethics

It worker suffering data loss
This activity demo would go so much better if you create an account and log in :)
Basic activities (computer-graded)

Reading Activity: The 10 Commandments of Computer Ethics

Students will be able to correctly answer true/false questions after reading and listening to topical short articles and dialogs featuring topical vocabulary.

Ethics is a branch of philosophy that deals with determining what is right and wrong. Listed below are 10 commandments to help you understand computer ethics. Anyone working in the field of IT is going to encounter a lot of ethical problems. Why? Because computers are very powerful and IT professionals are like wizards controlling this technology. We all know from watching Harry Potter movies that… Continue

Multiple Choice Activity

Students will be able to select the best match between unit terms and their definitions.

You must sign in to try this activity.

Login to view the Listening Activity

Listening Comprehension Activity

Students will be able to listen to short audio clips in English and then spell them correctly.

You must sign in to try this activity.

Login to see the Spelling Activity

Spelling and Recognition

Students will be able to identify and spell a vocabulary term correctly given only the definition.

You must sign in to try this activity.

Advanced activities (optionally teacher-graded)
Login to see the Speaking Activity

Speaking Practice Activity

Students will be able to speak and record 5 example sentences from the unit vocabulary and then submit them for grading by the classroom teacher. If no teacher is available or desired, then the students will be shown good examples of other students' work.

US
UK
The Norbert Wiener Award for Social and Professional Responsibility is awarded annually by CPSR.
US
UK
The man thought his bank was asking him to change his password, but it was actually a phishing scam trying to trick him into revealing it.
US
UK
The US government routinely tries to expand and restrict Internet privacy laws.
US
UK
The hacker used social engineering methods to trick a bank teller into giving out another user's password.
US
UK
The software utility was dependent on a specific architecture of CPU in order to run at optimal speed.

You must sign in to try this activity.

Login to see the Writing Activity

Writing Practice Activity

Students will write a short essay to be graded by the teacher. If no teacher is available or desired, then the student is shown previous examples of other writings by students.

  • Do you believe in studying computer ethics, or do you think it is a waste of time? Do you really think that IT people are like wizards who must decide whether to be good or evil? Is it okay to program a computer to do bad things just to make money?
  • In commandment #6 it says that piracy is dangerous and unethical. In your opinion, how is it dangerous and unethical?
  • You must sign in to try this activity.