COMPUTER FUNDAMENTALS

COMPUTER ETHICS AND SECURITY

ETHICS IN COMPUTING

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
The 3 terms of this law are:Unauthorised access to computer material, Unauthorised modification of computer material and Unauthorised access to computer system with intent to commit another offence.
A
Computer Misuse Act
B
Information Commissioners Office
C
Copyright, Designs and Patents Act
D
Equality Act
E
Freedom of Information Act
Explanation: 

Detailed explanation-1: -Unauthorised modification of computer material This offence includes the deliberate deletion or corruption of programmes or data. It also includes the introduction of viruses etc., where these result in the modification or destruction of data.

Detailed explanation-2: -Cyber-bullying, hacking, identity theft, and even using a work PC for personal business are all examples of computer abuse. While not always enforced, acts that constitute computer abuse was codified in the 1984 Computer Fraud and Abuse Act (CFAA) which is enforceable at the federal level.

There is 1 question to complete.