COMPUTER FUNDAMENTALS

COMPUTER ETHICS AND SECURITY

ETHICS IN COMPUTING

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Choose 1 examples of IT codes of conduct
A
Avoid sending or posting flames, which are abusive or insulting messages. Do not participate in flame wars, which are exchange of flames
B
Use emoticons and emojis to express emotion
C
Employees may not meddle in other’s files
D
None of the above
Explanation: 

Detailed explanation-1: -3) Thou shalt not snoop around in other people’s files: Reading other people’s e-mail messages is as bad as opening and reading their letters: This is invading their privacy. Obtaining other people’s non-public files should be judged the same way as breaking into their rooms and stealing their documents.

Detailed explanation-2: -Rule #1: Thou shalt not use a computer to harm other people. For example, to program a robot to kill people, make viruses, or weapons of mass destruction. What this means is that computers are not an excuse to do bad things to people. The programmer is responsible for the actions of his programs.

Detailed explanation-3: -Thou shalt not use a computer to harm other people. Thou shalt not interfere with other people’s computer work. Thou shalt not snoop around in other people’s computer files. Thou shalt not use a computer to steal. Thou shalt not use a computer to bear false witness. More items

There is 1 question to complete.