COMPUTER ETHICS AND SECURITY
ETHICS IN COMPUTING
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
Spyware
|
|
Adware
|
|
Computer Bomb
|
|
Computer Virus
|
Detailed explanation-1: -A logic bomb is a malicious piece of code that’s secretly inserted into a computer network, operating system, or software application. It lies dormant until a specific condition occurs.
Detailed explanation-2: -Unethical use of computers can be defined as downloading songs, movies, software’s and etc from the internet illegally. This also includes violating copyright and plagiarism; using someone else’s work as your own without giving any credit to the original author.
Detailed explanation-3: -Internet harassment, also referred to as “cyberbullying”, is the term used to describe the use of the Internet to bully, harass, threaten, or maliciously embarrass. It can involve behaviours such as: Sending unsolicited and/or threatening e-mail.