Computing and Ethics


Available Answers

  1. 1.

    Fill in the blanks:

    1. The crime committed on the Internet is called ____________.
    2. The process of making duplicate copy of the original software illegally is known as ____________.
    3. Unwanted e-mails are called ____________.
    4. A program which may corrupt the files/documents in your computer is known as ____________.
    5. ____________ are the cyber criminals who crack the password to access the information from the net.
    6. ____________ is a set of moral values, which regulates the use of computers.
    7. It is advised to have ____________ software to protect system from viruses.
    8. Cyber criminals are punished under ____________.
    9. ____________ is a threat which corrupts the system and cannot be blocked by antivirus software.
    10. ____________ can be used to protect any document on the Internet.
  2. 2.

    Write a short note on Software Piracy.

  3. 3.

    Write a short note on Spam.

  4. 4.

    Write a short note on Cyber Crime.

  5. 5.

    Write a short note on Hacking.

  6. 6.

    Write a short note on IT Act-2000.

13 more answer(s) available.

Comments
Very nice
14 Jan 2022Krishna s.
Please login to post your comments.