COMPUTER FUNDAMENTALS

COMPUTER ETHICS AND SECURITY

ETHICS IN COMPUTING

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
This is a destructive code that bores it way through a computer’s files. It can move from computer to computer, dropping off segments of itself as it goes.
A
Trojan Horse
B
Computer Worm
C
Spyware
D
Computer Virus
Explanation: 

Detailed explanation-1: -Trojan Horse :Trojan Horse : destructive code that gains access to a computer disguised as something such as a desirable software program. Once inside the computer, the Trojan horse can do its damage but it cannot spread from disk to disk or computer to computer.

Detailed explanation-2: -Antivirus software (antivirus program) is a security program designed to prevent, detect, search and remove viruses and other types of malware from computers, networks and other devices. Often included as part of a security package, antivirus software can also be purchased as a standalone option.

Detailed explanation-3: -Another popular example of computer ethics in practice are the Ten Commandments of Computer Ethics, created in 1992 by the Computer Ethics Institute. The commandments include: Thou shalt not use a computer to harm other people. Thou shalt not interfere with other people’s computer work.

There is 1 question to complete.