10 Questions
It is equally bad to write a program that handles the timing of a bomb as it is to make a bomb.
True
Computer viruses that disrupt other people's work are considered ethical.
False
Reading someone's e-mail messages is considered an invasion of privacy.
True
Using a computer to break into a company's accounts and transfer money is legal.
False
Spreading false information on the internet is considered unethical.
True
It is unethical to hack a system in order to bypass authorization and access computer resources without proper permission.
True
Watermarking is a process used to embed information about the copyright owner into pictures in a digital format.
True
Copying someone else's program without proper authorization is considered ethical and encouraged according to intellectual property laws.
False
The Communications Decency Act in the United States was passed to promote freedom of speech on the internet.
False
Using other people's computer resources without authorization is acceptable as long as you compensate them properly.
False
Study Notes
The Ten Commandments of Computer Ethics
Respect for Others
- Do not use computers to harm people, e.g., writing a program to handle bomb timing or accessing and destroying others' files.
- Do not interfere with others' computer work, e.g., generating and spreading computer viruses.
Privacy and Property
- Do not snoop around in others' computer files, e.g., reading e-mail messages or accessing non-public files.
- Do not use computers to steal, e.g., breaking into company or bank accounts and transferring money.
Truth and Integrity
- Do not use computers to bear false witness, e.g., spreading false rumors or propaganda about historical events.
Intellectual Property
- Do not copy or use proprietary software without paying for it, e.g., obtaining illegal copies of copyrighted software.
- Software is an intellectual product, like a book, and is protected by copyright laws.
Authorization and Compensation
- Do not use others' computer resources without authorization or proper compensation, e.g., bypassing multiuser system authorization.
Original Work
- Do not appropriate others' intellectual output, e.g., copying somebody else's program without authorization.
- Intellectual property is a form of ownership and may be protected by copyright laws.
Social Responsibility
- Consider the social consequences of the programs you write or the systems you design, e.g., ensuring your animations do not harm children.
Respect for Humanity
- Always use computers in ways that ensure consideration and respect for fellow humans, e.g., respecting others in computer communications systems.
Test your knowledge on the ethical guidelines of computer usage with this quiz focused on the Ten Commandments of Computer Ethics. Explore scenarios related to harming other people or interfering with their work using computers.
Make Your Own Quizzes and Flashcards
Convert your notes into interactive study material.
Get started for free