COMPUTER FUNDAMENTALS

COMPUTER ETHICS AND SECURITY

ETHICS IN COMPUTING

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Adult Internet user who uses social networking sites, chat rooms or other cyberspace to approach and eventually hurt other people, usually for sexual or other abusive purposes
A
Online Predator
B
Piracy
C
Computer Virus
D
None of the above
Explanation: 

Detailed explanation-1: -A botnet is a collection of internet-connected devices, which may include personal computers (PCs), servers, mobile devices and internet of things (IoT) devices, that are infected and controlled by a common type of malware, often unbeknownst to their owner.

Detailed explanation-2: -Phishing. One of the more common ways to accomplish identity theft is via a technique called phishing, which is the process of trying to induce the target to provide you with personal information.

There is 1 question to complete.