Monday, April 27, 2009

Definition of perpetrator-to be guilty of,or responsible of the crime etc; to commit
Source.(en.wiktionary.org/wiki/perpetrate)

Definition of cyber criminal-

Computer crime issues have become high-profile, particularly those surrounding hacking, copyright infringement through warez, child pornography, and child grooming. There are also problems of privacy when confidential information is lost or intercepted, lawfully or otherwise.


Definition of cyber terrorist-hacker: a programmer who breaks into computer systems in order to steal or change or destroy information as a form of cyber-terrorism
wordnet.princeton.edu/perl/webwn

Monday, April 20, 2009

"Are Information Technology Workers Professional"
Yes! Information technology workers are professional because how can they perform-sub duties in information system technology while enrolled as a junior in n accredited four year college studying Computer Science, Information Technology.Student Professionally worker Information Technology is distinguished from the Student Information Technology by the incumbents advance educational training and knowledge.Incumbent assist information technology professional and technical staff in the day to day operation within an information system environment they are expected to exercise progressively developing skill and knowledge for the information technology area in which they are assigned,while enhancing with practical experience their preparation for working for a full time or professional bases in information technology.

Wednesday, April 15, 2009

The Ten Commandments of Computer Ethics



Written by the Computer Ethics Institute
by the Computer Ethics Institute
  1. Thou shalt not use a computer to harm other people.
  2. Thou shalt not interfere with other people's computer work.
  3. Thou shalt not snoop around in other people's computer files.
  4. Thou shalt not use a computer to steal.
  5. Thou shalt not use a computer to bear false witness.
  6. Thou shalt not copy or use proprietary software for which you have not paid.
  7. Thou shalt not use other people's computer resources without authorization or proper compensation.
  8. Thou shalt not appropriate other people's intellectual output.
  9. Thou shalt think about the social consequences of the program you are writing or the system you are designing.
  10. Thou shalt always use a computer in ways that ensure consideration and respect for your fellow humans.




a href="http://www.glitter-graphics.com/myspace/text_generator.php" target=_blank>



Followers

About Me

kidapawan, 12, Philippines
silentkiller jejeje