Podcast
Questions and Answers
According to the 'Ten Commandments of Computer Ethics', which commandment states that one should consider the social consequences of the programs they write or the systems they design?
According to the 'Ten Commandments of Computer Ethics', which commandment states that one should consider the social consequences of the programs they write or the systems they design?
What is the key responsibility of data collectors according to the 'Issues in Computer Ethics' section?
What is the key responsibility of data collectors according to the 'Issues in Computer Ethics' section?
Which of the 'Ten Commandments of Computer Ethics' states that one should not use other people's computer resources without authorization or proper compensation?
Which of the 'Ten Commandments of Computer Ethics' states that one should not use other people's computer resources without authorization or proper compensation?
What is the key responsibility of data collectors according to the 'Issues in Computer Ethics' section?
What is the key responsibility of data collectors according to the 'Issues in Computer Ethics' section?
Signup and view all the answers
According to the 'Ten Commandments of Computer Ethics', which commandment states that one should not copy or use proprietary software for which they have not paid?
According to the 'Ten Commandments of Computer Ethics', which commandment states that one should not copy or use proprietary software for which they have not paid?
Signup and view all the answers
What is the key responsibility of data collectors according to the 'Issues in Computer Ethics' section?
What is the key responsibility of data collectors according to the 'Issues in Computer Ethics' section?
Signup and view all the answers
What was the first computer virus in the Philippines?
What was the first computer virus in the Philippines?
Signup and view all the answers
Who is considered the theoretical father of computer virology?
Who is considered the theoretical father of computer virology?
Signup and view all the answers
What is a common measure to protect computer files from viruses?
What is a common measure to protect computer files from viruses?
Signup and view all the answers
Which operating system is used for Smart TVs?
Which operating system is used for Smart TVs?
Signup and view all the answers
What type of program is a worm in the context of computer viruses?
What type of program is a worm in the context of computer viruses?
Signup and view all the answers
What did John Von Neumann give lectures about at the University of Illinois in 1949?
What did John Von Neumann give lectures about at the University of Illinois in 1949?
Signup and view all the answers
Which of the following is NOT recommended to avoid logging into public networks?
Which of the following is NOT recommended to avoid logging into public networks?
Signup and view all the answers
Which of the following is NOT a recommendation to avoid copyright infringement?
Which of the following is NOT a recommendation to avoid copyright infringement?
Signup and view all the answers
Which of the following is NOT one of the 'Ten Commandments of Computer Ethics' listed in the text?
Which of the following is NOT one of the 'Ten Commandments of Computer Ethics' listed in the text?
Signup and view all the answers
Which of the following is a recommended way to protect your privacy online?
Which of the following is a recommended way to protect your privacy online?
Signup and view all the answers
What is the main purpose of the 'Ten Commandments of Computer Ethics' listed in the text?
What is the main purpose of the 'Ten Commandments of Computer Ethics' listed in the text?
Signup and view all the answers
Study Notes
Computer Ethics
- Thou shall not use a computer to bear false witness
- Thou shall not copy or use proprietary software for which you have not paid
- Thou shall not use other people's computer resources without authorization or proper compensation
- Thou shall not appropriate other people's intellectual output
- Thou shall not think about the social consequences of the program you write and or the system you design
- Thou shall use a computer in ways that show consideration and respect for your fellow humans
Issues in Computer Ethics
- Privacy: responsibility to protect data about individuals
- Accuracy: responsibility of data collectors to authenticate information and ensure its accuracy
- Property: who owns information and software and how can they be sold and exchanged
- Access: responsibility of data collectors to control access and determine what information a person has the right to obtain about others and how the information can be used
Computer Security
- Refers to protecting computer systems and information they contain against unwanted access, modification, or destruction
- Measures to protect computer files:
- Change Passwords frequently
- Make Backup copies of files
- Use anti-virus software
- Encrypt Data
Computer Viruses
- A computer program that can replicate itself and spread from one computer to another
- The term "VIRUS" is also commonly, but erroneously, used to refer to other types of malware, including but not limited to adware and spyware programs that do not have a reproductive ability
- John Von Neumann is considered the theoretical father of computer virology
- The ILOVEYOU Virus by Onel De Guzman on May 5, 2000, caused $10 billion in total damage and affected 45 million individuals
Common Types of Computer Virus
- Worms: a type of virus that can spread itself and cause damage without the need for a host application or file
Tips to Avoid Copyright Infringement
- Understand: Copyright protects literary works, photographs, paintings, drawings, films, music, and sculptures
- Be Responsible: Be responsible enough to know if something has a copyright
- Be Creative: Ask yourself whether what you are making is something that came from you or something made from somebody else's creativity
- Know the Law: There are provisions for "Fair Use" which means that intellectual property may be used without consent as long as it is used in commentaries, criticisms, search engines, parodies, news reports, research, library archiving, teaching, and education
Ten Commandments of Computer Ethics
-
- Thou shall not use a computer to harm other people
-
- Thou shall not interfere with other people's computer work
-
- Thou shall not snoop around in other people's files
-
- Thou shall not use a computer to steal
-
- ... (and five more)
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Description
Test your knowledge of computer ethics with these commandments. See if you can identify the dos and don'ts when it comes to using technology responsibly.