SOFTWARE ENGINEERING

SOFTWARE ENGINEERING ETHICS AND PROFESSIONAL PRACTICES

SOFTWARE ENGINEERING CODE OF ETHICS AND PROFESSIONAL PRACTICE

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
This is a destructive code that bores it way through a computer’s files. It can move from computer to computer, dropping off segments of itself as it goes.
A
Trojan Horse
B
Computer Worm
C
Spyware
D
Computer Virus
Explanation: 

Detailed explanation-1: -Computer Worm: destructive code that bores it way through a computer’s files. It can move from computer to computer, dropping off segments of itself as it goes. Computer Bomb: destructive code that is set to activate at a certain time or when a specific action is taken.

Detailed explanation-2: -Another popular example of computer ethics in practice are the Ten Commandments of Computer Ethics, created in 1992 by the Computer Ethics Institute. The commandments include: Thou shalt not use a computer to harm other people. Thou shalt not interfere with other people’s computer work.

Detailed explanation-3: -A cookie is a small text file which contains a unique ID tag and is placed on your computer by our website. Our website saves a complimentary file with an ID tag that matches the file we placed on your computer.

There is 1 question to complete.