COMPUTER ETHICS AND SECURITY
ETHICS IN COMPUTING
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
Fair Use
|
|
Cyberbullying
|
|
Piracy
|
|
None of the above
|
Detailed explanation-1: -What Is Cyberbullying? Cyberbullying is the use of technology to harass, threaten, embarrass, or target another person. Online threats and mean, aggressive, or rude texts, tweets, posts, or messages all count. So does posting personal information, pictures, or videos designed to hurt or embarrass someone else.
Detailed explanation-2: -cyberbullying. Which would be a responsible use of technology used by victims of cyberbullying? changing passwords and screen names regularly.
Detailed explanation-3: -Cyberbullying includes sending, posting, or sharing negative, harmful, false, or mean content about someone else. It can include sharing personal or private information about someone else causing embarrassment or humiliation. Some cyberbullying crosses the line into unlawful or criminal behavior.
Detailed explanation-4: -Make the most of privacy settings. Investigate what measures you can take to keep content private on the websites you use. Think before you post. Never forget that the internet is public. Keep personal information personal.