Which of the following issue involves in one of the ethical issue individual’s right to privacy?
Collecting Information
Managing information
Distributing Information
both a and b
How the hackers delete all the data from the system?
Using Trojan horses
By spamming
Through the attack sweeper
Inject some worms
Which software privacy refers to purchasing a single licensed copy of software and loading it onto several computers?
Hard disk loading
Soft lifting
Renting
Downloading
Which mechanism will prevent the unauthorized internet users from accessing intranets?
Firewall
Identification
Authentication
Authorization
What is termed as password protection?
How we ensure that the information is accurate?
Time
Concept
Value and importance
Quality
Which form of attack will hackers used to attack the computers?
Spamming
Trojan horses
Counterfeit
Both a and b
Which one is an example for white-collar crimes?
Using pirated software
Changing the passwords frequently
Installing bugs
Write protected
Which one is meant by denial of intellectual property rights to the software creator/developer?
Software privacy
Hacking
Uploading
What do you mean by unauthorized access to or from a private network?
Password protection