You are on page 1of 3

UNIVERSITY OF SAINT ANTHONY

(Dr. Santiago G. Ortega Memorial)


City of Iriga

COMPUTER 10

NAME: Valenzuela, Adrian T Section: Aquamarine

ENUMERATION: Write your answer on the space provided.


1 Three (3) Basic Aspects of Responsible Act of a Computer User
a. Copyright and Intellectual Property
b. Day to Day Ethics
c. Netiquette
2 Five (5) Unethical Manners in Using Computer
a. Software Privacy
b. Plagiarism
c. Hacking
d. Data Forgery and Fraud
e. Illegal Access
3. Ten (10) Code of Ethics For Computer Professionals
a. Maintain the highest standard of professional behavior.
b. Avoid situations that create a conflict of interest.
c. Do not violate the confidentiality of your employer or those you service.
d. Continue to learn so your knowledge keeps pace with the technology.
e. Never misrepresent or withhold information that is germane to a problem or situation
of public concern.
f. Use information judiciously and maintain system integrity at all times.
g. Do not violate the rights or privacy of others.
h. Take appropriate action when exposed to unethical or illegal practices.
i. Do not exploit the shortcomings of an employer’s computer system for personal gain.
j. Accomplish each task to the best of your ability.
UNIVERSITY OF SAINT ANTHONY
(Dr. Santiago G. Ortega Memorial)
City of Iriga

COMPUTER 10

4. Ten (10) Cybercrime Offenses


a. Illegal Access
b. Data Interference
c. Illegal Interception
d. Misuse of Devices
e. Cyber Squatting
f. Computer related Forgery
g. Computer related Fraud
h. Computer related identity Theft
i. Cybersex
j. Child Pornography

IDENTIFICATION: Identify the answer to the following questions. Write the answer on
the space provided.
ILOVEYOU 1. It is a worm did damage on the infected local machine, overwriting
image files, and sent a copy of itself to the first 50 addresses in the Windows Address
Book used by Microsoft Outlook.
Child Pornography 2. The unlawful or prohibited acts defined and punishable by
Republic Act No. 9775
Cyber Squatting 3. It is an acquisition of a domain name over the internet in bad faith
to profit, mislead, destroy P6- reputation, and deprive others from registering the same
(with conditions).
Computer related Forgery 4. An intention of the violator to input, alters, or erases
any computer data without permission resulting to in authenticity of the data involved.
Computer Related Fraud 5. The intentional alteration or reckless hindering or
interference with the functioning of a computer or computer network by inputting,
transmitting, damaging, deleting program
CYBERSEX 6. The willful engagement, maintenance, control, or operation, directly or
indirectly, of any lascivious exhibition of sexual organs or sexual activity, with the aid of
a computer system.
NETIQUETTE 7. The basic laws and principles that abound with online communications
with people through use of electronic devices such as mobile phone and computer.
UNIVERSITY OF SAINT ANTHONY
(Dr. Santiago G. Ortega Memorial)
City of Iriga

COMPUTER 10

Illegal Interception 8. The interception made by technical means without right of


any non-public transmission of computer data to from, or within a computer system
including electromagnetic emissions from a computer system carrying such computer
data.
Data Interference 9. The intentional or reckless alteration, damaging, deletion or
deterioration of computer data, electronic document, or electronic data message,
without right, including the introduction or transmission of viruses.
Computer Ethics 10.1t is a set of moral standards that regulate the use of a
computer.

You might also like