answersLogoWhite

0

What else can I help you with?

Related Questions

What does unethical use of online resources mean?

what does unethical use of computer mean


What is consider ethical use of the government email system?

Ethical use of the government email system is use that is agreed upon as acceptable. For example, government employees are often asked not to use their work email for personal business so it would be seen as unethical to not follow this policy. An example of unethical and likely illegal behavior would be hacking into steal personal data.


What are two examples of computer cracking?

Example One: A Hacker getting your computer's password by use of a brute-force attack. Example Two: A Hacking gaining access to a database by cracking the encrypted password.


Is computer literacy concerned with the ethical implications of computer technology?

No, a person can be computer literate and totally unethical in its use.


What is the unauthorized use of a computer called?

It is called hacking


List out various unethical use of computers?

Putting it simply, people get hurt and computers can be destroyed. For example, if someone uses the computer to cyberbully, post personal information about someone (including phone numbers), hack accounts or scam, people can get hurt. If someone spreads a virus on computers, they can at the least harm the computer and can sometimes destroy computers.


Which of these is a crime the computer has been used for?

Cyberstalking, hacking, and identity theft are crimes that involve the use of a computer.


What does hacking mean and how does it effect your computer?

it is a person that goes on to your computer and lets say he wants your back details and then use it to get money?


Does wpe pro effect your computer?

If it hacking mini planet uh it does mine is muffed


Is it ethical to have a computer as jury?

It is ethical to have a computer as a jury. However, it is not ethical to use it to research anything about the case. Also, it is unethical if the judge has specifically instructed jurors not to use computers at all.


Why hacking as defined in the law is not sufficient to cover other improper use and or access of computer and internet technology?

Because 'hacking' is just one type of unauthorised computer access. Other methods are:- key loggers, theft & cloning.


How Hacking computers?

Hacking a computer is possible through the use of primitive computer programs. Machine to another, rapidly infecting hundreds of computers in a short time.