COMPUTER ETHICS AND SECURITY
ETHICS IN COMPUTING
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
There are 3 steps in strategy for Approaching Cyberethics Issues. which one is true?
|
Step 1:Identify, Step 2:Analyze, Step 3:Deliberate
|
|
Step 1:Research, Step 2:Analyze, Step 3:Elobrate
|
|
Step 1:Identify, Step 2:Marking, Step 3:Apply
|
|
Step 1:Assess, Step 2:Clarifying, Step 3:Deliberate
|
Explanation:
Detailed explanation-1: -Do not access any data, systems or networks without authority or permission. Do not spread computer viruses or malicious codes, or conduct any hacking activities on other computers. Respect all other Internet users. Do not threaten, harass, stalk or abuse anyone.
Detailed explanation-2: -Cyber ethics have four phase, phase 1 the technology is Stand-alone machines, phase 2 the technology is minicomputer & Pcs privately, phase 3 the technology is world wide web & internet, and phase 4 the technology is nanotechnology & genomic research.
There is 1 question to complete.