FUNDAMENTALS OF COMPUTER

COMPUTER THREATS SECURITY

COMPUTER SECURITY POLICIES EXAMPLES

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
If you don’t own the network you can do what you want on it including breaking the law.
A
False
B
True
C
Either A or B
D
None of the above
Explanation: 

Detailed explanation-1: -Illegal access is defined to include only computer hacking, theft, robbery, burglary and bribery.

Detailed explanation-2: -5) Thou shalt not use a computer to bear false witness: This means that if you give false information through a computer, this is unethical. For example, obtaining somebody elses computer login name and password and using it is unethical.

There is 1 question to complete.