This is how Commandment states, Discussion board reply help

User Generated

anerap75

Computer Science

Description

you need to give a comment about discussion and you should use the words why and ho

Unformatted Attachment Preview

....o 1klick 3:15 PM 1 24% Strategy (IST.7100.HYB.B2W03.SU20 17) Hello Everyone, START HERE Announcements The Ten Commandments of Computer Syllabus Ethics from the Compute Ethics has given the detailed Week 1: July 3 - July 9 Week 2: July 10 - July 16 information on how should the computer be used in an Discussion Board Grading Rubrics My Grades ethical manner without causing any sort of harm to others. Among the Ten Commandments the one which got my attention was we shall not use a computer for the sake of harming other people. This gives us an explanation that harming can be of any manner whether it might be a physical Faculty Contact Tools Email APA Resources Library or even a mental one. The main idea of this commandment is Strategy Resources Blackboard Help to say not right for the purpose of stealing information of Online Tutoring others using the help of a computer. The article which I found with this exact violation was published on March 25th, 2017 in The New York Times. The article provides the clear scenarios of the hacking that took place in the Yahoo mail. This whole operation was conducted by the two hackers whose origins are from the Russia where they serve for the government. On Dec 14th, 2016 Yahoo was victim of the one of the worst cyber attack that resulted in the hacking of more than billion accounts. Te hackers took the help of cookies and used those forged cookies whose main purpose is to prevent the user from login into the page every time they visit the website. Once the users enter their credentials in that login the hackers used those cookies for the gaining of the accounts without the use of password of the user by misleading the website. A lot of personal information of the users was stolen during this hacking process. If I were in the similar position, I would have ordered for full hands on investigation by the top intelligence agencies who work mostly on this type of cases for the purpose of knowing the intent and tracking of the hackers who involve in this type of actions. Reference Russian Agents Were Behind Yahoo Hack, U.S. Says - The
Purchase answer to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Attached.

This is how Commandment states that it is why wrong to use a computer to steal someone’s personal
information. Manipulating or destroying files of other users is ethically wrong. It is unethical to write programs,
which on why execution lead to stealing, copying or gaining unauthorized access to other user’s data. Being
involved in practices like hacking, spamming, phishing or cyber bullying does not confirm to computer ethics.
Do not use computer technology to cause interference in other users' work.
Do not use the computer in ways that may harm other people.
Explanation: This commandment says that it is unethical to use a computer to harm another user. It is not
limited to physical injury. It includes harming or corrupting othe...


Anonymous
Just what I needed. Studypool is a lifesaver!

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Similar Content

Related Tags