COMPUTER FUNDAMENTALS

COMPUTER ETHICS AND SECURITY

TYPES OF THREATS AND ATTACKS

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Not quoting or forwarding personal e-mail without the original author’s permission.
A
NETIQUETTE
B
UNETIQUETTE
C
Either A or B
D
None of the above
Explanation: 

Detailed explanation-1: -E-mails should always contain a subject ("Subject") that clearly points to the content of the e-mail. Your recipient will appreciate a unique subject when he has to scan dozens of e-mails a day and immediately know what they are doing when he looks at the subject. Announce long e-mails in the subject line!

Detailed explanation-2: -Respect People’s Privacy Don’t forward information sent to you without checking with the original sender first; doing this behind their back can create mistrust if they find out. This includes copying and pasting texts or sending screenshots.

Detailed explanation-3: -Netiquette parameters need to be followed so the intended recipient does not misinterpret your communications sent by email correspondence. Even more important for you to consider is that the person on the receiving end has feelings more or less like you.

Detailed explanation-4: -Rule 1: Remember the Human. Rule 2: Adhere to the same standards of behavior online that you follow in real life. Rule 3: Know where you are in cyberspace. Rule 4: Respect other people’s time and bandwidth. Rule 5: Make yourself look good online. Rule 6: Share expert knowledge. More items

There is 1 question to complete.