IkarosSakurai
14.11.2019 •
Computers and Technology
Literally pls ! 90 pointsss!
7. what is intentional virus setting? describe some examples.
8. what are the effects of intentional virus setting?
9. what are the possible consequences of intentional virus setting?
10. what is invasion of privacy? describe some examples.
11. what are the effects of invasion of privacy?
12. what are the possible consequences of invasion of privacy?
13. what is an acceptable use policy and what is the purpose of the acceptable use policy
14. what is intellectual property and how can you use it?
Solved
Show answers
More tips
- L Leisure and Entertainment When will Maslenitsa start?...
- F Food and Cooking Discovering the Mysterious Fruit of Feijoa...
- B Business and Finance How to Open an Online Store? A Detailed Guide for Beginners...
- W Work and Career How to Write a Resume That Catches the Employer s Attention?...
- C Computers and Internet Е-head: How it Simplifies Life for Users?...
- F Family and Home How to Choose the Best Diapers for Your Baby?...
- F Family and Home Parquet or laminate, which is better?...
- L Leisure and Entertainment How to Properly Wind Fishing Line onto a Reel?...
- L Leisure and Entertainment How to Make a Paper Boat in Simple Steps...
- T Travel and tourism Maldives Adventures: What is the Best Season to Visit the Luxurious Beaches?...
Answers on questions: Computers and Technology
- C Computers and Technology Which quality is likely to ensure consistent career growth in the computer field? a) learning to create financial statements accurately b) upgrading computer skills...
- C Computers and Technology David is selling his art work. he wants to figure out how much he should charge for each painting to make a 20 percent profit. in one to two sentences, describe what...
- E English In this activity, you’ll analyze the structural elements of an informational text. Choose one of these two texts to analyze closely: “Types of Shakespearean Dramas”...
- C Chemistry What appears on the product side of the equation in the net ionic equation for the reaction between Ca(C2H3O2)2(aq) and HCl(aq)...
- H History Select all the correct answers. What two things did former British prime minister Winston Churchill affirm in his Iron Curtain speech? D his wish to side with the United...
- C Chemistry How many valance electrons does co2 have....
- E English Please anyone who knows….....
- S Social Studies Have gun will travel be not forgetful of strangers...
- M Mathematics Thomas is transferring files from his computer into his flash drive. The size of the files on the drive D (megabytes) as a function of time t (sec) is modeled with the...
- M Mathematics Determine whether an equation written with one operation can be rewritten as an equivalent equation using a different operation. Choose True or False for each statement....
Ответ:
7. Intentional Virus Setting is when you the user purposely spread computer viruses in order to do harm. It should be noted that this is highly illegal (no duh) with a sentence of up to 10 years and $250,000 in penalties assuming you are convicted under the Computer Fraud and Abuse Act of 1986 here in the States.
8. intrusion of solitude, appropriation of name or likeness, public disclosure of private facts, and false light.
9. Intentionally creating and/or sending a virus and infecting people's computers is against the law, and can result in jail time or a fine.
10. Some examples are: Deception - Lying about how information will be used. Violation of confidentiality - Disclosing someone's personal information without consent. Intrusion - Interference in an employee's personal life. Misappropriation - Using a person's likeness to promote a product without his consent.
11. Everyone wants PRIVACY for themselves, and everyone wants ACCOUNTABILITY from others. Privacy is a basic human need, and invasion of privacy can have serious psychological and emotional consequences, including paranoia, anxiety, depression and broken trust. Invasion of privacy is both a legal and an ethical issue.
12. A cause of action for invasion of privacy entitles the plaintiff to recover damages for the harm to the particular element of his or her privacy that is invaded. Thus, one who suffers an intrusion upon his or her solitude or seclusion, may recover damages for the deprivation of his or her seclusion.
13. An acceptable use policy (AUP) is a document stipulating constraints and practices that a user must agree to for access to a corporate network or the Internet. Many businesses and educational facilities require that employees or students sign an acceptable use policy before being granted a network ID.
14. Intellectual property refers to creations of the mind: inventions; literary and artistic works; and symbols, names and images used in commerce. Intellectual property is divided into two categories: Industrial Property includes patents for inventions, trademarks, industrial designs and geographical indications.
PLEASE PLEASE PLEASE HELP WITH MY RECENT
btw hope this helps if it does please make brainliest :)
Ответ: