COMPUTER FUNDAMENTALS

COMPUTER ETHICS AND SECURITY

ETHICS IN COMPUTING

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Josh has been sending malicious text messages to one of his classmates & writing negative comments on Facebook about this person. Which of the following describes Josh’s behavior?
A
sexting
B
cyberbullying
C
piracy
D
plagiarism
Explanation: 

Detailed explanation-1: -Impersonating a person and sending inappropriate messages to others via the Internet or cell phone is an example of cyberbullying. The recommended approach to put an end to cyberstalking is to insist that the cyberstalker meet face-to-face with the victim to talk things out.

Detailed explanation-2: -Copyright is a legal term describing ownership of control of the rights to the use and distribution of certain works of creative expression, including books, video, motion pictures, musical compositions and computer programs.

There is 1 question to complete.