COMPUTER ETHICS AND SECURITY
ETHICS IN COMPUTING
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
Ethical hacker
|
|
cracker
|
|
scammers
|
|
Dynamic Denial of Service
|
Detailed explanation-1: -hacker. The antiquated phrase computer cracker is not used anymore. It was originally proposed as an antonym, or the opposite, of the term hacker. Hacker initially applied to only those who used their computing skills without malicious intent–they broke into systems to identify or solve technical issues.
Detailed explanation-2: -Thompson writes the first version of UNICS in one month on a machine with 4KB of 18 bit words. UNICS is later renamed ‘UNIX’. 1969 – MIT becomes home to the first computer hackers, who begin altering software and hardware to make it work better and/or faster. 1969 – Linus Torvalds born in Helsinki.
Detailed explanation-3: -Black hat hackers are criminals who break into computer networks with malicious intent. They may also release malware that destroys files, holds computers hostage, or steals passwords, credit card numbers, and other personal information.