COMPUTER FUNDAMENTALS

COMPUTER ETHICS AND SECURITY

ETHICS IN COMPUTING

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Example of an unethical behavior regarding technology.
A
George sees someone’s phone unlocked and decides to lock it.
B
Lizzy is using her phone during her lunch break.
C
A student tells his teacher that his friend is cheating on the test.
D
A college student decides to humiliate a former friend by posting embarrassing photos on social media.
Explanation: 

Detailed explanation-1: -Manipulation and endangered individuality are examples of unethical uses of technology by businesses to change consumer and market trends. This is accomplished by targeting consumers using aggregated customer information.

Detailed explanation-2: -Do not use computers to harm other users. Do not use computers to steal others information. Do not access files without the permission of the owner. Do not copy copyrighted software without the author’s permission.

There is 1 question to complete.