COMPUTER ETHICS AND SECURITY
ETHICS IN COMPUTING
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
two times
|
|
three times
|
|
four times
|
|
five times
|
Detailed explanation-1: -15% of young cyberbullying victims would prefer to keep the issue a secret. Students are almost twice as likely to attempt suicide if they have been cyberbullied. 80% of teens say that others cyberbully because they think it is funny. 37% of bullying victims develop social anxiety.
Detailed explanation-2: -Cyber-bullying is defined as inflicting psychological harm on another person using. Phone or internet. Kimberly Young’s test for internet addiction is based on the diagnosis of. pathological gambling. How many Americans are victims of identity theft each year.
Detailed explanation-3: -What is the Harm Principle I described in On Liberty? “The only purpose for which power can be rightfully exercised over any member of a civilized community, against his will, is to prevent harm to others.
Detailed explanation-4: -Copyright is a legal term describing ownership of control of the rights to the use and distribution of certain works of creative expression, including books, video, motion pictures, musical compositions and computer programs.