COMPUTER FUNDAMENTALS

COMPUTER ETHICS AND SECURITY

ETHICS IN COMPUTING

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Bob uses a survey disguised as an information form to collect Amy’s password. He uses this to access her laptop, but does not change any of the information on her system.
A
Ethical
B
Unethical
C
Either A or B
D
None of the above
Explanation: 
There is 1 question to complete.