SOFTWARE ENGINEERING

SOFTWARE ENGINEERING ETHICS AND PROFESSIONAL PRACTICES

SOFTWARE ENGINEERING CODE OF ETHICS AND PROFESSIONAL PRACTICE

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
This is destructive code that is set to activate at a certain time or when a specific action is taken.
A
Spyware
B
Adware
C
Computer Bomb
D
Computer Virus
Explanation: 

Detailed explanation-1: -A logic bomb is a malicious piece of code that’s secretly inserted into a computer network, operating system, or software application. It lies dormant until a specific condition occurs.

Detailed explanation-2: -Internet harassment, also referred to as “cyberbullying”, is the term used to describe the use of the Internet to bully, harass, threaten, or maliciously embarrass. It can involve behaviours such as: Sending unsolicited and/or threatening e-mail.

Detailed explanation-3: -To begin with, it seems that there are four big areas of computer ethics. They are “(1) computer crime; (2) responsibility for computer failure; (3) protection of computer property, records and software; and (4) privacy of the company, workers and customers”.

There is 1 question to complete.