COMPUTER ETHICS AND SECURITY
ETHICS IN COMPUTING
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
Someone who uses technology to harm or harass other people.
|
Cyber Predator
|
|
Open Source
|
|
Cyber Bullying
|
|
None of the above
|
Explanation:
Detailed explanation-1: -Cyberbullying includes sending, posting, or sharing negative, harmful, false, or mean content about someone else. It can include sharing personal or private information about someone else causing embarrassment or humiliation. Some cyberbullying crosses the line into unlawful or criminal behavior.
Detailed explanation-2: -cyberbullying. Which would be a responsible use of technology used by victims of cyberbullying? changing passwords and screen names regularly.
Detailed explanation-3: -Stephanie Fredrick can speak to the media about bullying and cyberbullying, child and adolescent mental health, and school social support, school climate and intervention.
There is 1 question to complete.