COMPUTER ETHICS AND SECURITY
ETHICS IN COMPUTING
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
Bob uses a survey disguised as an information form to collect Amy’s password. He uses this to access her laptop, but does not change any of the information on her system.
|
Ethical
|
|
Unethical
|
|
Either A or B
|
|
None of the above
|
Explanation:
There is 1 question to complete.