Académique Documents
Professionnel Documents
Culture Documents
Individual Task:
Ethics in general
Unethical
Computer ethics
2. The United States Institute of Computer Ethics has come out with the Ten
Commandments of Computer Ethics. These principles consider the effective
code of conducts for the proper use of information technology. The Ten
commandments of computer ethics are :
1
0
a)
b)
c)
d)
e)
a)
b)
c)
a)
b)
c)
Learning Module – ICT Form 4
Individual Task:
a) b)
c) d)
e) f)
g)
6. What is spam?
Cookies
Electronic Profile
Spyware
a)
b)
c)
d)
Learning Module – ICT Form 4
11. State four utilities software that can protect our data privacy
13. There are two commonly used authentication methods, which are
biometric device and callback system. Define the methods.
Biometric device
Callback system
a) e)
b) f)
c) g)
d)
17. There are two methods commonly used in verification, which are
user identification and processed object. Match the right statement.