COMPUTER ETHICS AND SECURITY
ETHICS IN COMPUTING
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
Trojan Horse
|
|
Computer Worm
|
|
Spyware
|
|
Computer Virus
|
Detailed explanation-1: -Trojan Horse :Trojan Horse : destructive code that gains access to a computer disguised as something such as a desirable software program. Once inside the computer, the Trojan horse can do its damage but it cannot spread from disk to disk or computer to computer.
Detailed explanation-2: -Antivirus software (antivirus program) is a security program designed to prevent, detect, search and remove viruses and other types of malware from computers, networks and other devices. Often included as part of a security package, antivirus software can also be purchased as a standalone option.
Detailed explanation-3: -Another popular example of computer ethics in practice are the Ten Commandments of Computer Ethics, created in 1992 by the Computer Ethics Institute. The commandments include: Thou shalt not use a computer to harm other people. Thou shalt not interfere with other people’s computer work.