Wednesday, 4 January 2012

Moral and ethical uses

The internet and technology today are great for social networking and connecting with others, but with the power of technology and the brains of the people they are able to access more than just simple sites they are able to use hacking software’s allowing them to access other computers, and are also able to upload files over the internet allowing people to download them files. I am writing to tell you some of the issues what most computers and the internet gets today.
Moral issues
Plagiarism is when someone writes text either on a program like Microsoft word or email or internet sites, there are two different types of plagiarism when there is written text on a website or email or when there is text on a screen and someone will copy every single word from that text.
Plagiarism also gives people ideas from work but they still copy off them but change it in to their own words to make it look like it wasn’t copied.
Plagiarism also consists on lies, they will copy out another person’s work and then keep it as their own work and then lie about it when it is either being checked or being marked.
File sharing
File sharing is when there is a website that has a user which people by movies or music then copies the files from off the disk then upload them files on to that website allowing other people to download that file and share it and use it for themselves.
File sharing stops the artist or the creator from earning their share of money and then more and more people are getting the movie or song for free and the artist is getting nothing.
Snooping
Snooping is like eavesdropping. Snooping is casual observation of emails, they bring anything from one computer and make it show on their computer allowing them to see what they want to see which is on your screen they can also watch what they are typing up on the screen and take their details such as bank details and passwords.
Snooping is just monitoring the victims screen without hacking or adding viruses but they are still able to see anything with important details and then they can further hack on to other things such as bank sites and use your details or spam you social networks from monitoring their passwords.

No comments:

Post a Comment