COMPUTER FUNDAMENTALS

COMPUTER ETHICS AND SECURITY

ETHICS IN COMPUTING

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Ali uses his friend’s computer without his permission.Which of the following area of computer ethics involved in the situation above?
A
Codes of conduct
B
Information privacy
C
Information theft
D
Hardware theft.
Explanation: 

Detailed explanation-1: -Theft, altering, or modifying the operations of any technology equipment. Inspecting, modifying, downloading, copying, or sharing data or programs from any source without authorization from the owner. Attempting to penetrate or alter computer security mechanisms or gain access to information.

Detailed explanation-2: -Thou shalt not use a computer to harm other people. Thou shalt not interfere with other people’s computer work. Thou shalt not snoop around in other people’s computer files. Thou shalt not use a computer to steal. Thou shalt not use a computer to bear false witness. More items

There is 1 question to complete.