Computer Ethics

0.0(0)
studied byStudied by 18 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/15

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

16 Terms

1
New cards

What are Ethics

A set of rules of personal behavior determined by society. Think of this as your code of conduct

2
New cards

What are Morals

A person’s standards of behavior or beliefs concerning what is and is not acceptable for them to do. Your moral compass is what is right from wrong

3
New cards

What are Values

Attitudes and beliefs about things we think are important in life. Including family time, religion, education, independence, and honesty.

4
New cards

What is computer ethics

the code of conduct that governs how you interact with computers

5
New cards

What is Intellectual Property

any invention or work that is the result of originality, such as a manuscript or a design, to which the creator has rights and for which creator may apply for a patent, copyright, trademark, etc.

6
New cards

What are the two main categories of Intellectual Property

  1. Industrial Property: inventions, trademarks, industrial designs, geographic locations, etc.

  2. Copyrights: a legal concept enacted by most governments, giving a creator of an original work exclusive rights

7
New cards

What is Netiquette

the correct or acceptable way of communication on the Internet. This deals with proper ways in which to use a network also, the reliability of information on the internet.

8
New cards

What is cyber bullying

bullying that takes place over digital devices

9
New cards

10 commandments of computer ethics

  1. Thou shalt not use a computer to harm other people

  2. Thou shalt not interfere with other people’s computer work

  3. Thou shalt not snoop around in other people’s computers files

  4. Thou shalt not use a computer to steal

  5. Thou shalt not use a computer to bear false witness

  6. Thou shalt not copy or use proprietary software for which you have not paid

  7. Thou shalt not use other people’s computer resources without authorization or proper compensation

  8. Thou shalt not appropriate other people’s intellectual output

  9. Thou shalt think about the social consequences of the program you are writing

  10. Thou shalt always use a computer in ways that ensure consideration and respect for your fellow humans

10
New cards

What is privacy

the ability of an individual or group to seclude themselves or information about themselves, and thereby express themselves selectively

11
New cards

What is Piracy

the unauthorized use or reproduction of another’s work

12
New cards

What is software piracy

the illegal copying, distribution, or use of software. It is such a profitable “business” that it has caught the attention of organized crime groups in a number of countries.

13
New cards

Who is a hacker

a person who uses computers to grain unauthorized access to data. This may be used to commit crimes such as credit card fraud, computer fraud, identity theft. etc

14
New cards

Ten types of hackers

  1. White hat

  2. black hat

  3. gray hat

  4. script kiddies

  5. green hat

  6. blue hat

  7. red hat

  8. state/nation sponsored

  9. hacktivist

  10. malicious insider/whistleblower

15
New cards

what is black hat vs white hat

white hat are good guys that protect your information

black hats are people who steal your personal data for personal gain

16
New cards

What is cyber Security

the body of technologies, processes, and practices designed to protect networks, computers, programs, and data from attack, damage, or unauthorized access.