COMPUTER ETHICS AND SECURITY
ETHICS IN COMPUTING
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
A network of encrypted content that allows users to engage in untraceable activity.
|
|
Content is owned by a copyright holder.
|
|
Employees using their company’s internet connection for personal use on company time.
|
|
An area of computer science that focused on intelligent machines.
|
Detailed explanation-1: -The rights of authors of literary and artistic works (such as books and other writings, musical compositions, paintings, sculpture, computer programs and films) are protected by copyright, for a minimum period of 50 years after the death of the author.
Detailed explanation-2: -The general rule is that the creator of the work is the owner of all copyright interests in the work. However, where two or more parties create a work together, copyright ownership becomes a more difficult issue.
Detailed explanation-3: -’ It essentially allows content creators to use the work of others as long as they use the identical copyright terms that were adopted by the original creator of the work.
Detailed explanation-4: -Copyright refers to the legal right of the owner of intellectual property. In simpler terms, copyright is the right to copy. This means that the original creators of products and anyone they give authorization to are the only ones with the exclusive right to reproduce the work.