Identify at least two good values that you have as a COMPUTER USER then explain on how you live out or practice it in your life as a student.
Home
/
Identify at least two good values that you have as a COMPUTER USER then explain on how you live out or practice
Verified answer
Answer:
Computer Ethics
Ethics is a collection of moral rules that regulate an individual's or a group's behavior. The application of moral ideas to the usage of computers and the Internet is known as computer ethics. Intellectual property rights, privacy policies, and internet etiquette, or "netiquette," are just a few examples.
Digital content is easy to replicate and share thanks to computers. It is, nonetheless, ethical to follow copyright guidelines. It is critical to understand and obey the license agreement, or SLA, when utilizing the software. Piracy is defined as the use of commercial software without paying for a license, and it is a violation of computer ethics. Hacking, or getting illegal access to a computer system, is another unethical computer practice.
Computers and the Internet are having a growing impact on society as technology improves. As a result, anytime new technologies are developed, computer ethics must be discussed. Artificial intelligence's impact on existing jobs and human communication is a recent example. When computer ethics is discussed, it helps to ensure that emerging technologies have a positive impact on society.
Integrity
The guarantee that digital information is uncorrupted and may only be accessed or updated by those who are allowed to do so is known as data integrity. Integrity refers to the consistency, accuracy, and reliability of data throughout its lifecycle.
It must not be changed in transit to retain integrity, and measures must be taken to ensure that data cannot be manipulated by an unauthorized person or program. To avoid erroneous changes or inadvertent deletion by authorized users, such procedures include installing user access controls and version control. Integrity can also be verified through the use of checksums and cryptographic checksums.
Confidentiality
When we talk about information confidentiality, we're talking about preventing data from being exposed to an unauthorized party as a result of a data breach or an insider threat. 'Preserving restrictions on access to your data is crucial because it secures your proprietary information and maintains your privacy,' according to the federal statute 44 U.S.C., Sec. 3542.
Nobody likes to deal with the consequences of a data breach, which is why you should prioritize document security, set up security controls for important files, and create explicit information security standards for devices.
Confidentiality refers to a set of access restrictions and safeguards that keep your information safe from unauthorized access. Implementing protections is the best approach to keep your data private and avoid a data breach.
To know more about Computer Ethics, click here
https://brainly.ph/question/3298574
Hope this helps! :)
#BRAINLYFAST