COMPUTER FUNDAMENTALS

COMPUTER ETHICS AND SECURITY

ETHICS IN COMPUTING

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
This is someone who uses a computer to gain illegal access to other computer systems, and files, usually through the use of telecommunications
A
Site license
B
Trojan Horse
C
Spyware
D
Computer Hacker
Explanation: 

Detailed explanation-1: -Internet harassment, also referred to as “cyberbullying”, is the term used to describe the use of the Internet to bully, harass, threaten, or maliciously embarrass. It can involve behaviours such as: Sending unsolicited and/or threatening e-mail.

Detailed explanation-2: -Rule #1: Thou shalt not use a computer to harm other people. For example, to program a robot to kill people, make viruses, or weapons of mass destruction. What this means is that computers are not an excuse to do bad things to people. The programmer is responsible for the actions of his programs.

There is 1 question to complete.