Académique Documents
Professionnel Documents
Culture Documents
« Back Print
<1>
Various paper can be loaded easily. One or more sheets can be set at a time, and paper will be fed
automatically one sheet at a time.
<2>
Cover Guide
When loading paper, align the right edge of the paper to this guide.
<3>
Receives the photo data sent from a cell phone via infrared communication.
<4>
Used when printing directly from a digital camera or a digital video camera compatible with the printer.
Inserting the optional Bluetooth unit BU-20 allows you to perform wireless printing via Bluetooth
communication.
<5>
<6>
Cassette
Load regulary-used paper here and insert this into the printer. One or more sheets can be set at a time,
and paper will be fed automatically one sheet at a time.
<7>
Paper Support
<8>
<9>
Paper Guide
When loading paper, pinch and slide this guide and ensure it just touches on the left edge of the paper.
< 10 >
Cover
< 11 >
Inner Cover
Open to set the CD-R tray, or install / remove the ink tanks or the print head.
< 12 >
Pull down the paper output tray and pull out the extension completely before printing. Printed paper
ejects here.
< 13 >
Indicator Lamp
After setting a memory card, this lamp lights. When the memory card is being read / written, this lamp
flashes.
< 14 >
Card Slot
<1>
Locks the print head into the holder. Do not raise this lever unless installing / removing the print head.
<2>
<3>
Memo:
You can check the status of each ink tank according to how its lamp lights.
- Fast flashing (at about a one-second interval): Ink tank is empty, or the printer is not ready to print due
to an error.
- Off: An error has occurred and the printer is not ready to print.
<1>
<2>
<3>
Rear Cover
<2>
Press to change the paper source between the auto sheet feeder and cassette.
<3>
When this lamp is lit, paper is fed from the auto sheet feeder.
<4>
Cassette lamp
<5>
Scroll through menu selections, and increase or decrease the number of copies.
<6>
OK button
:
Confirms the selected menu item or menu setting. Press this button to release the error once the
problem has been resolved.
<7>
LCD monitor
<8>
Trimming button
<9>
Press to enlarge or reduce the photo being displayed. Pressing this button in trimming mode allows you
to enlarge/reduce the area to be trimmed.
< 10 >
Save button
Saves data in the memory card onto the computer's hard disk. This button is used when the printer is
connected to the printer.
< 11 >
Starts the application software Easy-PhotoPrint. This button is used when the printer is connected to a
computer.
< 12 >
Alarm lamp
< 13 >
Back button
< 14 >
Menu button
< 15 >
Settings button
Allows you to set the page size, media type, print quality, etc.
< 16 >
Search button
Looks up target photos in the memory card using the shooting date as the search key.
< 17 >
Print button
< 18 >
Stop/Reset button
:
Cancels operations. Also press this button to stop printing during printing.
Submit
Canon Personal
Highlights
Products
Inkjet printers
Compact digital
cameras
Interchangeable lens
cameras
Laser printers
Supplies
Scanners
Personal camcorders
(LEGRIA)
Compact photo
printers (SELPHY)
Professional
camcorders
Fax machines
LV)
Binoculars
Network video
solutions
Promotions
Where to buy
Conditions
Terms of Service
eStore Ink
cartridges, Toners,
Papers
EOS tips
tips
PIXMA tips
Scanner tips
Canon Professional
Services
Register your
warranty
Support and
Downloads
Developer
Resources
delivery service
Contact us
About Canon
Corporate Social
Responsibility
Careers at Canon
Trainee at Canon
Notices
Social Media
For Dealer
Terms of UsePrivacy PolicyOther Canon sites in AsiaCanon GlobalCopyright © 2014 Canon Marketing
(Thailand) Co., Ltd.
blogspot.com
Liza's Corner
Ethicsdeals with placing a “value” on acts according to whether they are “good” or “bad”. Every society
has its rules about whether certain acts are ethical or not. These rules have been established as a result
of consensus in society and are often written into laws.
When computers first began to be used in society at large, the absence of ethical standards about their
use and related issues caused some problems. However, as their use became widespread in every facet
of our lives, discussions in computer ethics resulted in some kind of a consensus. Today, many of these
rules have been formulated as laws, either national or international. Computer crimes and computer
fraud are now common terms. There are laws against them, and everyone is responsible for knowing
what constitutes computer crime and computer fraud.
I ran into these Ten Commandments of Computer Ethics created by the Computer Ethics Institute while
looking for something completely different. Isn’t that so often for the case? I like them. I think they are
useful guidelines that are worth thinking about and discussing. Ethics can be complicated though. Some
complain that these rules are too simplistic and overly restrictive. This set of class notes expands on the
commandments and includes a claim that the “10 commandments contradict the hacking communities
constitution”
The Ten Commandments of Computer Ethics were first presented in Dr. Ramon C. Barquin's paper, "In
Pursuit of a 'Ten Commandments' for Computer Ethics."
To some extent the commandments are a bit simplistic but that argument can be made about most lists
of ethical practices. The proof is in the implementation and how the spirit of the commandment is
interpreted and not just in the literal words of it.
The Ten Commandments of computer ethics have been defined by the Computer Ethics Institute. Here is
some of my interpretation:
1. THOU SHALT NOT USE A COMPUTER TO HARM OTHER PEOPLE: If it is unethical to harm people by
making a bomb, for example, it is equally bad to write a program that handles the timing of the bomb.
Or, to put it more simply, if it is bad to steal and destroy other people’s books and notebooks, it is equally
bad to access and destroy their files.
2. THOU SHALT NOT INTERFERE WITH OTHER PEOPLE'S COMPUTER WORK: Computer viruses are small
programs that disrupt other people’s computer work by destroying their files, taking huge amounts of
computer time or memory, or by simply displaying annoying messages. Generating and consciously
spreading computer viruses is unethical.
3. THOU SHALT NOT SNOOP AROUND IN OTHER PEOPLE'S COMPUTER FILES: Reading other people’s e-
mail messages is as bad as opening and reading their letters: This is invading their privacy. Obtaining
other people’s non-public files should be judged the same way as breaking into their rooms and stealing
their documents. Text documents on the Internet may be protected by encryption.
4. THOU SHALT NOT USE A COMPUTER TO STEAL: Using a computer to break into the accounts of a
company or a bank and transferring money should be judged the same way as robbery. It is illegal and
there are strict laws against it.
5. THOU SHALT NOT USE A COMPUTER TO BEAR FALSE WITNESS: The Internet can spread untruth as fast
as it can spread truth. Putting out false "information" to the world is bad. For instance, spreading false
rumors about a person or false propaganda about historical events is wrong.
6. THOU SHALT NOT COPY OR USE PROPRIETARY SOFTWARE FOR WHICH YOU HAVE NOT PAID: Software
is an intellectual product. In that way, it is like a book: Obtaining illegal copies of copyrighted software is
as bad as photocopying a copyrighted book. There are laws against both. Information about the
copyright owner can be embedded by a process called watermarking into pictures in the digital format.
8. THOU SHALT NOT APPROPRIATE OTHER PEOPLE'S INTELLECTUAL OUTPUT: For example, the programs
you write for the projects assigned in this course are your own intellectual output. Copying somebody
else’s program without proper authorization is software piracy and is unethical. Intellectual property is a
form of ownership, and may be protected by copyright laws.
9. THOU SHALT THINK ABOUT THE SOCIAL CONSEQUENCES OF THE PROGRAM YOU ARE WRITING OR
THE SYSTEM YOU ARE DESIGNING: You have to think about computer issues in a more general social
framework: Can the program you write be used in a way that is harmful to society? For example, if you
are working for an animation house, and are producing animated films for children, you are responsible
for their contents. Do the animations include scenes that can be harmful to children? In the United
States, the Communications Decency Act was an attempt by lawmakers to ban certain types of content
from Internet websites to protect young children from harmful material. That law was struck down
because it violated the free speech principles in that country's constitution. The discussion, of course, is
going on.
10.
THOU SHALT ALWAYS USE A COMPUTER IN WAYS THAT INSURE CONSIDERATION AND RESPECT FOR YOUR
FELLOW HUMANS: Just like public buses or banks, people using computer communications systems may
find themselves in situations where there is some form of queuing and you have to wait for your turn
and generally be nice to other people in the environment. The fact that you cannot see the people you
are interacting with does not mean that you can be rude to them.
See http://www.ccsr.cms.dmu.ac.uk/resources/professionalism/codes/cei_command_com.html for
further comments on the ten commandments.
azil014 at 6:50 PM
Share
No comments:
Post a Comment
Home
Welcome to my Blog!
My photo
azil014
Follow
Powered by Blogger.
Email Print
Advertisement
The 10 Commandments of Computer Ethics are written in a way similar to the Decalogue from The Bible.
They use the archaic 'Thou shalt...' and 'Thou shalt not...' and show a striking similarity with the biblical
commandments.
6. Thou shalt not use or copy software for which you have not paid.
7. Thou shalt not use other people's computer resources without authorization.
9. Thou shalt think about the social consequences of the program you write.
10. Thou shalt use a computer in ways that show consideration and respect.
The Explanation
With the development and widespread use of technology, there arose a need to distinguish between the
right and wrong ways of harnessing it. Increased accessibility to information had its advantages but
unauthorized access was a threat to data security. Communication became faster. Important messages
could span huge distances within seconds but so could rumors. Advancements in technology redefined
accessibility. The line between the good and bad use of technology blurred and there was a need to
establish a code of ethics for its users. Realizing this need, the Computer Ethics Institute came up with
The Ten Commandments of Computer Ethics in 1992. Dr. Ramon C. Barquin, for the first time presented
these commandments as a part of his research paper. Their intent was to address the gray area between
the ethical and unethical use of computer technology.
Commandment 1