FUNDAMENTALS OF COMPUTER

BASIC COMPUTER CONCEPTS

IMPACT OF COMPUTERS ON WORK ENVIRONMENTS

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Which level and description most accurately fits this contravention of the Computer Misuse Act? “Falling appointments at a hair salon were traced back to ex-employee Marion Harrington continuing to access registrations on the company email account months later.”
A
Level 1-Unauthorised access to computer material
B
Level 2-Unauthorised access with intent to commit or facilitate commission of further offences
C
Level 3-Unauthorised acts with intent to impair, or with recklessness as to impairing, operation of computer, etc
D
All of the above
Explanation: 

Detailed explanation-1: -What is not an offence under the Computer Misuse Act? Copying software and trying to sell it to someone for a profit is not an offence under the Computer Misuse Act.

Detailed explanation-2: -The Computer Misuse Act 1990 was created to deal with the issue of accessing or modifying data without permission. Unauthorised access to computer material. You watch your friend enter their username and password. You remember their login details and without their permission, later login and read all their messages.

Detailed explanation-3: -you shoulder surf as your friend enters their username and password, you remem-ber their login details, login to their account and read all their messages. Your friend leaves his tablet on the couch. Without his permission you access his amazon account and order a new computer console.

Detailed explanation-4: -The Act began as Computer Misuse Bill No. 23, introduced by the Uganda Law Reform Commission in 2008 to “enable the utilisation of the opportunities emanating from the rise in the use of Information and Communication Technologies in the country” and “create a conducive environment that was free of abuse and misuse.”

There is 1 question to complete.