COMPUTER FUNDAMENTALS

COMPUTER ETHICS AND SECURITY

ETHICS IN COMPUTING

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Entering a computer system or obtaining data from it to be able to commit another crime.
A
Unauthorised access to computer material
B
Unauthorised access with the intent to commit a further crime
C
Unauthorised modification of data
D
Making, supplying or obtaining anything which can be used for computer misuse
Explanation: 

Detailed explanation-1: -Crimes in which the computer is the target include the theft of intellectual property or marketing information, blackmail, or sabotage of operating systems and programs. In all of these crimes, the offender uses the computer to obtain information or to damage operating programs.

Detailed explanation-2: -Hacking: Hacking is usually understood to be the unauthorized access of a computer system and networks.

Detailed explanation-3: -"Unauthorized access” entails approaching, trespassing within, communicating with, storing data in, retrieving data from, or otherwise intercepting and changing computer resources without consent. These laws relate to these and other actions that interfere with computers, systems, programs or networks.

There is 1 question to complete.