12. Commandment 3
It is unethical to read
someone's email
messages or having
unauthorised access
to someone's
computer to obtain
files or data as it is a
direct invasion of
their privacy.
16. Commandment 4
Stealing sensitive
information such as
personal information
about employees or
breaking into bank
accounts is treated
as robbery in some
countries. This can
be classed as fraud.
17. Commandment 5
Thou shalt not use a computer to bear false
_______.
a) Information
b) stories
c) witness
25. Commandment 7
Important
information on a
network can be
accessed with
specific Ids and
passwords. It is
unethical to hack
into password
protected
systems.
29. Commandment 8
Pretending someone's
work is your own is
considered unethical
and is known as
plagiarism. You
should always get
permission from
artist and give credit.
30. Commandment 9
Thou shalt think about the _____
consequences of the program you write.
a) fantastic
b) social
c) negative
32. Commandment 9
When designing
software or a
computer system, we
must consider it's
affect on certain
sections of society so
it doesn't not offend
anyone.
33. Commandment 10
Thou shalt use a computer in ways that show
consideration and _____.
a)honour
b) mercy
c) respect