COMPUTER FUNDAMENTALS

COMPUTER ETHICS AND SECURITY

ETHICS IN COMPUTING

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
A students uses the copy and paste commands to place large parts of an electronic encyclopedia article into an assigned paper. They turn the paper in as their own work.
A
Ethical
B
Unethical
C
Either A or B
D
None of the above
Explanation: 

Detailed explanation-1: -2) Thou shalt not interfere with other people’s computer work: Computer viruses are small programs that disrupt other people’s computer work by destroying their files, taking huge amounts of computer time or memory, or by simply displaying annoying messages.

Detailed explanation-2: -Hacking a system to break and bypass the authorization is unethical. Thou shalt not use other people’s computer resources without authorization.

Detailed explanation-3: -Thou shalt not use a computer to harm other people. Thou shalt not interfere with other people’s computer work. Thou shalt not snoop around in other people’s computer files. Thou shalt not use a computer to steal. Thou shalt not use a computer to bear false witness. More items

There is 1 question to complete.