Describe the threat of viruses to computer/ network. Illustrate the methods for avoiding attacks. Explain the consequences of social, illegal, and unethical uses of technology (e.g., piracy; illegal downloading; licensing infringement; inappropriate uses of software, hardware, and mobile devices in the work environment). 5. Discuss legal issues and the terms of use related to copyright laws, fair use laws, and ethics pertaining to downloading of images, photographs, documents, video, sounds, music, trademarks, and other elements for personal use. Describe ethical and legal practices of safeguarding the confidentiality of business-records. Objective Describe the threat of viruses to computer/ network. Illustrate the methods for avoiding attacks. Compare some options for dealing with a virus attack |
51 Views
29 Downloads
Resource Details