1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
scZoUnD [109]
3 years ago
7

LITERALLY PLS ANYONE!!! 90 pointsss!

Computers and Technology
2 answers:
Doss [256]3 years ago
6 0

7. Intentional Virus Setting is when you the user purposely spread computer viruses in order to do harm. It should be noted that this is highly illegal (no duh) with a sentence of up to 10 years and $250,000 in penalties assuming you are convicted under the Computer Fraud and Abuse Act of 1986 here in the States.

8. intrusion of solitude, appropriation of name or likeness, public disclosure of private facts, and false light.

9.  Intentionally creating and/or sending a virus and infecting people's computers is against the law, and can result in jail time or a fine.

10. Some examples are: Deception - Lying about how information will be used. Violation of confidentiality - Disclosing someone's personal information without consent. Intrusion - Interference in an employee's personal life. Misappropriation - Using a person's likeness to promote a product without his consent.

11. Everyone wants PRIVACY for themselves, and everyone wants ACCOUNTABILITY from others. Privacy is a basic human need, and invasion of privacy can have serious psychological and emotional consequences, including paranoia, anxiety, depression and broken trust. Invasion of privacy is both a legal and an ethical issue.

12. A cause of action for invasion of privacy entitles the plaintiff to recover damages for the harm to the particular element of his or her privacy that is invaded. Thus, one who suffers an intrusion upon his or her solitude or seclusion, may recover damages for the deprivation of his or her seclusion.

13. An acceptable use policy (AUP) is a document stipulating constraints and practices that a user must agree to for access to a corporate network or the Internet. Many businesses and educational facilities require that employees or students sign an acceptable use policy before being granted a network ID.

14. Intellectual property refers to creations of the mind: inventions; literary and artistic works; and symbols, names and images used in commerce. Intellectual property is divided into two categories: Industrial Property includes patents for inventions, trademarks, industrial designs and geographical indications.

PLEASE PLEASE PLEASE HELP WITH MY RECENT!!!!!!

btw hope this helps if it does please make brainliest :)

krok68 [10]3 years ago
4 0

Answer:

I had this same test

Explanation:

You might be interested in
Describe the difference between information poor and information rich society?​
Nadya [2.5K]

Answer:

The “Information poor” are consumers who use traditional mass media information such as television, DVDs, radios and magazines. ... On the opposite “information rich” stands for a new elite within the information society.

7 0
3 years ago
Read 2 more answers
You can use the ____ utility to zero in on the service or other program that is slowing down startup. 1. gpupdate 2. MSconfig 3.
Step2247 [10]
I'd say MSconfig, you can use that and view the 'processes' tab, but it will make you open up the task manager.
3 0
3 years ago
George suffers from pain in his neck due to continuous typing for long hours. What kind of exercise can George do for his neck?
timurjin [86]
I'm not sure if there are specific answers or wording that is needed, but I would do exercises by moving his head from side to side, rolling his shoulders to stretch, tucking his chin, and looking left and right while looking at the ceiling. Hope this helps!
4 0
3 years ago
What happen if go to setting and go to my personal account in a school computer?
aleksandrvk [35]
The public WiFi your school utilizes can see your log in activities, even if you erased the history, be careful
3 0
3 years ago
A. Arrange the steps in opening a database. Number them from 1 to 4 using the blanks
Archy [21]

Answer:

__1_Click the Microsoft Office button and choose OPEN from the menu.

_2___It will list the files that can be opened using Microsoft Access.

__4__Select the document to open and click the OPEN button when done.

__3__The Open Dialog Box will probably open the folder MY DOCUMENTS.

6 0
3 years ago
Other questions:
  • Laura would like to include additional text that is related to the document but not contained within the document.
    13·2 answers
  • When you compile your program, the compiler identifies the logic errors and suggests how to correct them?
    14·1 answer
  • In a token ring system, how quickly is the token passed around the circuit? 50 times per second millions of times per second hun
    11·1 answer
  • The content of a text is its
    8·1 answer
  • Jesse earned $420 a week, and he worked 5 days a week. what is his daily wage?
    10·2 answers
  • What are the first two models, e.g. diagrams that affect the entire system, that are built during the CoreProcess to discover an
    5·1 answer
  • Write a method called makeStars. The method receives an int parameter that is guaranteed not to be negative. The method returns
    6·1 answer
  • Can someone please explain this issue to me..?
    12·2 answers
  • Choose the correct term to complete the sentence.
    12·1 answer
  • 1. Choose in each case that it affects which of the Information security requirements (confidentiality, integrity, availability)
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!