SlideShare una empresa de Scribd logo
1 de 10
A New Paradigm  In Education INFORMATION Shima Mohd - Master In Instructional Technology – Faculty Of Education, University Of Malaya COMMUNICATION TECHNOLOGY AND 1
6. Computer Ethic Shima Mohd - Master In Instructional Technology – Faculty Of Education, University Of Malaya Review for last topic ,[object Object],[object Object],[object Object],2
[object Object],[object Object],6. Computer Ethic Shima Mohd - Master In Instructional Technology – Faculty Of Education, University Of Malaya i. What is computer ethic 3
[object Object],6. Computer Ethic Shima Mohd - Master In Instructional Technology – Faculty Of Education, University Of Malaya ii. Computer Ethics 4
[object Object],[object Object],6. Computer Ethic Shima Mohd - Master In Instructional Technology – Faculty Of Education, University Of Malaya iii. Computer Law 5
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],6. Computer Ethic Shima Mohd - Master In Instructional Technology – Faculty Of Education, University Of Malaya iii. Differences between computer e thic and law ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],6
[object Object],[object Object],6. Computer Ethic Shima Mohd - Master In Instructional Technology – Faculty Of Education, University Of Malaya iv. Intellectual Property Rights 7
[object Object],[object Object],[object Object],[object Object],[object Object],6. Computer Ethic Shima Mohd - Master In Instructional Technology – Faculty Of Education, University Of Malaya v. Intellectual Property Protection 8
[object Object],[object Object],[object Object],[object Object],6. Computer Ethic Shima Mohd - Master In Instructional Technology – Faculty Of Education, University Of Malaya Homework / Group work 9
A New Paradigm  In Education Shima Mohd - Master In Instructional Technology – Faculty Of Education, University Of Malaya Let continue … our lesson for today ,[object Object],[object Object],[object Object],10

Más contenido relacionado

La actualidad más candente

La actualidad más candente (18)

Introduction to information technology
Introduction to information technologyIntroduction to information technology
Introduction to information technology
 
LEGAL ANND ETHICAL USE OF TECHNOLOGY
LEGAL ANND ETHICAL USE OF TECHNOLOGYLEGAL ANND ETHICAL USE OF TECHNOLOGY
LEGAL ANND ETHICAL USE OF TECHNOLOGY
 
Educational Technology Chapter 8
Educational Technology Chapter 8Educational Technology Chapter 8
Educational Technology Chapter 8
 
Introduction to ict
Introduction to ictIntroduction to ict
Introduction to ict
 
ICT Presentation - Std 10th C
ICT Presentation - Std 10th CICT Presentation - Std 10th C
ICT Presentation - Std 10th C
 
La1 powerpoint
La1 powerpointLa1 powerpoint
La1 powerpoint
 
Introduction of ICT and legal research :
Introduction of ICT and legal research :Introduction of ICT and legal research :
Introduction of ICT and legal research :
 
La3 Intranet
La3 IntranetLa3 Intranet
La3 Intranet
 
Ipt
IptIpt
Ipt
 
Introduction to Internet
Introduction to InternetIntroduction to Internet
Introduction to Internet
 
Module 1 : Introduction to Internet
Module 1 : Introduction to Internet Module 1 : Introduction to Internet
Module 1 : Introduction to Internet
 
Ch 2 internet aplications1
Ch 2 internet aplications1Ch 2 internet aplications1
Ch 2 internet aplications1
 
Nfwordle
NfwordleNfwordle
Nfwordle
 
Ochedikwu onche cv
Ochedikwu onche cvOchedikwu onche cv
Ochedikwu onche cv
 
Empowerment Technologies Lecture 1 (Philippines SHS)
Empowerment Technologies Lecture 1 (Philippines SHS)Empowerment Technologies Lecture 1 (Philippines SHS)
Empowerment Technologies Lecture 1 (Philippines SHS)
 
Prof cvochedikwu
Prof cvochedikwuProf cvochedikwu
Prof cvochedikwu
 
ICT & Legal Research
ICT  & Legal ResearchICT  & Legal Research
ICT & Legal Research
 
Basics of information technology
Basics of information technologyBasics of information technology
Basics of information technology
 

Destacado

Max Hachenburg
Max HachenburgMax Hachenburg
Max HachenburgMsSchool
 
PresentacióN Tema IX
PresentacióN Tema  IXPresentacióN Tema  IX
PresentacióN Tema IXmivicacesan
 
Urok tolerantnosti
Urok tolerantnostiUrok tolerantnosti
Urok tolerantnostiritari68
 
Social Media Class Baarn - 151112
Social Media Class Baarn - 151112Social Media Class Baarn - 151112
Social Media Class Baarn - 151112Peter Wiegman
 
Web 2.0 Session introduction
Web 2.0 Session introductionWeb 2.0 Session introduction
Web 2.0 Session introductionCindy Kendall
 
Florida Keys Sales Mission Presentation June 2007[1]
Florida  Keys    Sales  Mission  Presentation  June 2007[1]Florida  Keys    Sales  Mission  Presentation  June 2007[1]
Florida Keys Sales Mission Presentation June 2007[1]guest4a1b1c
 
La2 Motherboard
La2 MotherboardLa2 Motherboard
La2 MotherboardCma Mohd
 
Martin karlssons vykortssamling st olof
Martin karlssons vykortssamling   st olofMartin karlssons vykortssamling   st olof
Martin karlssons vykortssamling st olofhembygdsigtuna
 
Lou tulga's president obama's foreclosure relief program outline 2012
Lou tulga's president obama's  foreclosure relief program outline 2012Lou tulga's president obama's  foreclosure relief program outline 2012
Lou tulga's president obama's foreclosure relief program outline 2012Professional Education Services
 
Optimalizace datového a hlasového řešení
Optimalizace datového a hlasového řešeníOptimalizace datového a hlasového řešení
Optimalizace datového a hlasového řešeníEquica
 

Destacado (20)

Max Hachenburg
Max HachenburgMax Hachenburg
Max Hachenburg
 
PresentacióN Tema IX
PresentacióN Tema  IXPresentacióN Tema  IX
PresentacióN Tema IX
 
Dialog
DialogDialog
Dialog
 
Visie Nieuwe Media Saxion 27 Mei 2008
Visie Nieuwe Media Saxion 27 Mei 2008Visie Nieuwe Media Saxion 27 Mei 2008
Visie Nieuwe Media Saxion 27 Mei 2008
 
Urok tolerantnosti
Urok tolerantnostiUrok tolerantnosti
Urok tolerantnosti
 
Social Media Class Baarn - 151112
Social Media Class Baarn - 151112Social Media Class Baarn - 151112
Social Media Class Baarn - 151112
 
Handpaintings
HandpaintingsHandpaintings
Handpaintings
 
Web 2.0 Session introduction
Web 2.0 Session introductionWeb 2.0 Session introduction
Web 2.0 Session introduction
 
Why Gerund
Why GerundWhy Gerund
Why Gerund
 
Software1
Software1Software1
Software1
 
Florida Keys Sales Mission Presentation June 2007[1]
Florida  Keys    Sales  Mission  Presentation  June 2007[1]Florida  Keys    Sales  Mission  Presentation  June 2007[1]
Florida Keys Sales Mission Presentation June 2007[1]
 
La2 Motherboard
La2 MotherboardLa2 Motherboard
La2 Motherboard
 
KM Postcards
KM PostcardsKM Postcards
KM Postcards
 
Martin karlssons vykortssamling st olof
Martin karlssons vykortssamling   st olofMartin karlssons vykortssamling   st olof
Martin karlssons vykortssamling st olof
 
WWF Advertising
WWF AdvertisingWWF Advertising
WWF Advertising
 
Key to success
Key to successKey to success
Key to success
 
Kavir
KavirKavir
Kavir
 
Lou tulga's president obama's foreclosure relief program outline 2012
Lou tulga's president obama's  foreclosure relief program outline 2012Lou tulga's president obama's  foreclosure relief program outline 2012
Lou tulga's president obama's foreclosure relief program outline 2012
 
Flex mobile for JUG
Flex mobile for JUGFlex mobile for JUG
Flex mobile for JUG
 
Optimalizace datového a hlasového řešení
Optimalizace datového a hlasového řešeníOptimalizace datového a hlasového řešení
Optimalizace datového a hlasového řešení
 

Similar a La1 Comp Ethic

Ethics Part-2-new1.pptx
Ethics Part-2-new1.pptxEthics Part-2-new1.pptx
Ethics Part-2-new1.pptxMohammedAish
 
Professional Practice Course Outline
Professional Practice Course OutlineProfessional Practice Course Outline
Professional Practice Course OutlineSaqib Raza
 
Web 2.0 and IPR
Web 2.0 and IPRWeb 2.0 and IPR
Web 2.0 and IPRNeil Witt
 
Ethics in using computer
Ethics in using computerEthics in using computer
Ethics in using computerFatin Izzaty
 
Course Syllabus Society and Professionalism.docx
Course Syllabus Society and Professionalism.docxCourse Syllabus Society and Professionalism.docx
Course Syllabus Society and Professionalism.docxReneeRosePaunil1
 
Legal and ethical issues associated with modern technologies
Legal and ethical issues associated with modern technologiesLegal and ethical issues associated with modern technologies
Legal and ethical issues associated with modern technologiesChantial
 
What Is Computer Ethics Written By James H. Moor
What Is Computer Ethics Written By James H. MoorWhat Is Computer Ethics Written By James H. Moor
What Is Computer Ethics Written By James H. MoorHelp With Papers Menifee
 
Stallings ch18 privacy
Stallings ch18 privacyStallings ch18 privacy
Stallings ch18 privacysalehnia
 
Computer ethics cyber security and technology of it
Computer ethics cyber security and technology of itComputer ethics cyber security and technology of it
Computer ethics cyber security and technology of itsr24production
 
Ethical perspectives (it focus)
Ethical perspectives (it focus)Ethical perspectives (it focus)
Ethical perspectives (it focus)wtidwell
 
CR 23 - Legal & Ethical Aspects.ppt
CR 23 - Legal & Ethical Aspects.pptCR 23 - Legal & Ethical Aspects.ppt
CR 23 - Legal & Ethical Aspects.pptssuseraaf866
 
Ethics assignment.docx
Ethics assignment.docxEthics assignment.docx
Ethics assignment.docxBestMan28
 
3999779.ppt
3999779.ppt3999779.ppt
3999779.pptpixvilx
 

Similar a La1 Comp Ethic (20)

Ethics Part-2-new1.pptx
Ethics Part-2-new1.pptxEthics Part-2-new1.pptx
Ethics Part-2-new1.pptx
 
Ethical Implications of IT
Ethical Implications of ITEthical Implications of IT
Ethical Implications of IT
 
Gr 3 ethical implication of it
Gr 3   ethical implication of itGr 3   ethical implication of it
Gr 3 ethical implication of it
 
Professional Practice Course Outline
Professional Practice Course OutlineProfessional Practice Course Outline
Professional Practice Course Outline
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
 
Cyber Laws
Cyber LawsCyber Laws
Cyber Laws
 
Web 2.0 and IPR
Web 2.0 and IPRWeb 2.0 and IPR
Web 2.0 and IPR
 
Ethics in using computer
Ethics in using computerEthics in using computer
Ethics in using computer
 
Course Syllabus Society and Professionalism.docx
Course Syllabus Society and Professionalism.docxCourse Syllabus Society and Professionalism.docx
Course Syllabus Society and Professionalism.docx
 
Legal and ethical issues associated with modern technologies
Legal and ethical issues associated with modern technologiesLegal and ethical issues associated with modern technologies
Legal and ethical issues associated with modern technologies
 
What Is Computer Ethics Written By James H. Moor
What Is Computer Ethics Written By James H. MoorWhat Is Computer Ethics Written By James H. Moor
What Is Computer Ethics Written By James H. Moor
 
Stallings ch18 privacy
Stallings ch18 privacyStallings ch18 privacy
Stallings ch18 privacy
 
Computer Engineering Ethics
Computer Engineering EthicsComputer Engineering Ethics
Computer Engineering Ethics
 
Computer ethics cyber security and technology of it
Computer ethics cyber security and technology of itComputer ethics cyber security and technology of it
Computer ethics cyber security and technology of it
 
EC358-CH8.ppt
EC358-CH8.pptEC358-CH8.ppt
EC358-CH8.ppt
 
Ethical perspectives (it focus)
Ethical perspectives (it focus)Ethical perspectives (it focus)
Ethical perspectives (it focus)
 
CR 23 - Legal & Ethical Aspects.ppt
CR 23 - Legal & Ethical Aspects.pptCR 23 - Legal & Ethical Aspects.ppt
CR 23 - Legal & Ethical Aspects.ppt
 
Corporate ethics
Corporate ethicsCorporate ethics
Corporate ethics
 
Ethics assignment.docx
Ethics assignment.docxEthics assignment.docx
Ethics assignment.docx
 
3999779.ppt
3999779.ppt3999779.ppt
3999779.ppt
 

Más de Cma Mohd

La 5 Programming2
La 5   Programming2La 5   Programming2
La 5 Programming2Cma Mohd
 
La 5 Programming1
La 5   Programming1La 5   Programming1
La 5 Programming1Cma Mohd
 
La5 Programming688
La5 Programming688La5 Programming688
La5 Programming688Cma Mohd
 
La5 Program Phases
La5 Program PhasesLa5 Program Phases
La5 Program PhasesCma Mohd
 
La5 Basicelement
La5 BasicelementLa5 Basicelement
La5 BasicelementCma Mohd
 
La 5 Pl Translator
La 5   Pl TranslatorLa 5   Pl Translator
La 5 Pl TranslatorCma Mohd
 
LA5_PL Approach
LA5_PL ApproachLA5_PL Approach
LA5_PL ApproachCma Mohd
 
LA5_Generation of Programming Languages
LA5_Generation of Programming LanguagesLA5_Generation of Programming Languages
LA5_Generation of Programming LanguagesCma Mohd
 
Summary of LA5
Summary of LA5Summary of LA5
Summary of LA5Cma Mohd
 
Basic Programming Concept
Basic Programming ConceptBasic Programming Concept
Basic Programming ConceptCma Mohd
 
hardware, editing software, authoring tools
hardware, editing software, authoring toolshardware, editing software, authoring tools
hardware, editing software, authoring toolsCma Mohd
 
introduction of ict
introduction of ictintroduction of ict
introduction of ictCma Mohd
 
La4 Multimedia Elements
La4 Multimedia ElementsLa4 Multimedia Elements
La4 Multimedia ElementsCma Mohd
 
La4 Multimedia Elements
La4 Multimedia ElementsLa4 Multimedia Elements
La4 Multimedia ElementsCma Mohd
 
Multimedia01
Multimedia01Multimedia01
Multimedia01Cma Mohd
 
La3 Mediumnetwork
La3 MediumnetworkLa3 Mediumnetwork
La3 MediumnetworkCma Mohd
 
La3 Hardware
La3 HardwareLa3 Hardware
La3 HardwareCma Mohd
 
Wireless Transmission
Wireless TransmissionWireless Transmission
Wireless TransmissionCma Mohd
 

Más de Cma Mohd (20)

La 5 Programming2
La 5   Programming2La 5   Programming2
La 5 Programming2
 
La 5 Programming1
La 5   Programming1La 5   Programming1
La 5 Programming1
 
La5 Quiz
La5 QuizLa5 Quiz
La5 Quiz
 
La5 Programming688
La5 Programming688La5 Programming688
La5 Programming688
 
La5 Program Phases
La5 Program PhasesLa5 Program Phases
La5 Program Phases
 
La5 Basicelement
La5 BasicelementLa5 Basicelement
La5 Basicelement
 
La 5 Pl Translator
La 5   Pl TranslatorLa 5   Pl Translator
La 5 Pl Translator
 
LA5_PL Approach
LA5_PL ApproachLA5_PL Approach
LA5_PL Approach
 
LA5_Generation of Programming Languages
LA5_Generation of Programming LanguagesLA5_Generation of Programming Languages
LA5_Generation of Programming Languages
 
Summary of LA5
Summary of LA5Summary of LA5
Summary of LA5
 
Basic Programming Concept
Basic Programming ConceptBasic Programming Concept
Basic Programming Concept
 
hardware, editing software, authoring tools
hardware, editing software, authoring toolshardware, editing software, authoring tools
hardware, editing software, authoring tools
 
introduction of ict
introduction of ictintroduction of ict
introduction of ict
 
La4 Multimedia Elements
La4 Multimedia ElementsLa4 Multimedia Elements
La4 Multimedia Elements
 
La4 Multimedia Elements
La4 Multimedia ElementsLa4 Multimedia Elements
La4 Multimedia Elements
 
Multimedia01
Multimedia01Multimedia01
Multimedia01
 
La3 Mediumnetwork
La3 MediumnetworkLa3 Mediumnetwork
La3 Mediumnetwork
 
Nos
NosNos
Nos
 
La3 Hardware
La3 HardwareLa3 Hardware
La3 Hardware
 
Wireless Transmission
Wireless TransmissionWireless Transmission
Wireless Transmission
 

Último

AI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarAI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarPrecisely
 
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Will Schroeder
 
9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding TeamAdam Moalla
 
Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Commit University
 
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfIaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfDaniel Santiago Silva Capera
 
20230202 - Introduction to tis-py
20230202 - Introduction to tis-py20230202 - Introduction to tis-py
20230202 - Introduction to tis-pyJamie (Taka) Wang
 
Cybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxCybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxGDSC PJATK
 
OpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureOpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureEric D. Schabell
 
UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8DianaGray10
 
Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Adtran
 
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1DianaGray10
 
UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6DianaGray10
 
VoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXVoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXTarek Kalaji
 
Nanopower In Semiconductor Industry.pdf
Nanopower  In Semiconductor Industry.pdfNanopower  In Semiconductor Industry.pdf
Nanopower In Semiconductor Industry.pdfPedro Manuel
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsSeth Reyes
 
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...DianaGray10
 
UiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPathCommunity
 
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration WorkflowsIgniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration WorkflowsSafe Software
 
Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfMachine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfAijun Zhang
 
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online CollaborationCOMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online Collaborationbruanjhuli
 

Último (20)

AI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarAI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity Webinar
 
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
 
9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team
 
Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)
 
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfIaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
 
20230202 - Introduction to tis-py
20230202 - Introduction to tis-py20230202 - Introduction to tis-py
20230202 - Introduction to tis-py
 
Cybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxCybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptx
 
OpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureOpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability Adventure
 
UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8
 
Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™
 
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
 
UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6
 
VoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXVoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBX
 
Nanopower In Semiconductor Industry.pdf
Nanopower  In Semiconductor Industry.pdfNanopower  In Semiconductor Industry.pdf
Nanopower In Semiconductor Industry.pdf
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and Hazards
 
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
 
UiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation Developers
 
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration WorkflowsIgniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
 
Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfMachine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdf
 
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online CollaborationCOMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
 

La1 Comp Ethic

  • 1. A New Paradigm In Education INFORMATION Shima Mohd - Master In Instructional Technology – Faculty Of Education, University Of Malaya COMMUNICATION TECHNOLOGY AND 1
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.