FUNDAMENTALS OF COMPUTER

COMPUTER THREATS SECURITY

WHAT IS A HACKER

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
You receive a desperate plea for help from a friend who says they are stuck overseas and all their money has been stolen. You should:
A
reply to the email
B
delete the email
C
send some money
D
forward the email to a mutual friend
Explanation: 

Detailed explanation-1: -Cyber-bullying, hacking, identity theft, and even using a work PC for personal business are all examples of computer abuse. While not always enforced, acts that constitute computer abuse was codified in the 1984 Computer Fraud and Abuse Act (CFAA) which is enforceable at the federal level.

Detailed explanation-2: -Computer crime-illegal acts in which computers are the primary tool-costs the world economy many billions of dollars annually. Computer abuse does not rise to the level of crime, yet it involves unethical use of a computer.

Detailed explanation-3: -Cybercriminals are individuals or teams of people who use technology to commit malicious activities on digital systems or networks with the intention of stealing sensitive company information or personal data, and generating profit.

There is 1 question to complete.