Professional Practices — Complete BSCS Notes
Introduction to Professional Practices
Definition: Professional practices are ethical rules and standards followed by computing professionals.
Purpose:
• Responsible computing
• Legal compliance
• User protection
• Responsible computing
• Legal compliance
• User protection
Example: Protecting user passwords and private data.
Computing Ethics
Definition: Moral principles that guide computer professionals.
Main Ethical Principles:
• Honesty
• Privacy
• Fairness
• Responsibility
• Honesty
• Privacy
• Fairness
• Responsibility
Example: A developer should not steal another company's code.
Case Example:
A software engineer discovers a security bug but hides it.
This is unethical because users may be harmed.
A software engineer discovers a security bug but hides it.
This is unethical because users may be harmed.
Philosophy of Ethics
Definition: Study of right and wrong behavior.
Branches:
• Meta Ethics
• Normative Ethics
• Applied Ethics
• Meta Ethics
• Normative Ethics
• Applied Ethics
Applied Ethics: Practical ethics in real-world situations.
Example: Deciding whether AI surveillance violates privacy.
Ethics and the Internet
Definition: Proper and responsible behavior online.
Issues:
• Cyberbullying
• Fake news
• Online fraud
• Privacy violations
• Cyberbullying
• Fake news
• Online fraud
• Privacy violations
Internet Safety Rules:
• Use strong passwords
• Avoid suspicious links
• Respect online privacy
• Use strong passwords
• Avoid suspicious links
• Respect online privacy
Example: Sharing someone's private data without permission is unethical.
Intellectual Copyright
Definition: Legal rights protecting original creations.
Protected Materials:
• Software
• Images
• Videos
• Books
• Software
• Images
• Videos
• Books
Software Piracy: Illegal copying of software.
Example: Downloading paid software illegally.
Simple Copyright Notice Example:
© 2026 All Rights Reserved
Accountability and Auditing
Accountability: Responsibility for actions performed in a system.
Auditing: Monitoring and checking system activities.
Audit Logs: Records of system actions.
Example: Tracking who accessed a database.
Simple Log Example:
User Login: Ali
Time: 10:30 PM
Action: Accessed Records
0 Comments