The content is just an excerpt from the complete note for JSS2 Second Term Internet and Communication Technology (ICT) Lesson Note – Misuse Of Computer And Internet. Check below to download the complete DOCUMENT
WEEK 3
TOPIC: COMPUTER ETHICS
SUB TOPIC: MISUSE OF COMPUTER AND INTERNET
CONTENTS
- Misuse of computer and the internet
INTRODUCTION
The needs to protect and keep data or information save from loss, damage or mis-use it’s of utmost importance. Here are some several ways in which people misuse computers and the internet, namely:
SUB-TOPIC 2: MISUSE/ABUSE OF COMPUTER AND THE INTERNET
- INVASION OF PRIVACY/HACKING: This is an illegal access gained by an unauthorized person or someone into confidential files, documents and computer programs without permission. Such unauthorized access is known as hacking. Hackers can also access computers to collect private information about individuals or delete important information.
- COMPUTER VIRUS: These are programs deliberately written to damage data by copying or replicating itself. People can introduce a virus into a computer system or network via fictitious e-mails, infected diskettes e.t.c without one’s knowledge.
To gain full access to the note: DOWNLOAD FILE