COMPUTER FUNDAMENTALS

COMPUTER ETHICS AND SECURITY

ETHICS IN COMPUTING

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
This is destructive code that is set to activate at a certain time or when a specific action is taken.
A
Spyware
B
Adware
C
Computer Bomb
D
Computer Virus
Explanation: 

Detailed explanation-1: -A logic bomb is a malicious piece of code that’s secretly inserted into a computer network, operating system, or software application. It lies dormant until a specific condition occurs.

Detailed explanation-2: -Unethical use of computers can be defined as downloading songs, movies, software’s and etc from the internet illegally. This also includes violating copyright and plagiarism; using someone else’s work as your own without giving any credit to the original author.

Detailed explanation-3: -Internet harassment, also referred to as “cyberbullying”, is the term used to describe the use of the Internet to bully, harass, threaten, or maliciously embarrass. It can involve behaviours such as: Sending unsolicited and/or threatening e-mail.

There is 1 question to complete.