2. It is hard to estimate the extent of computer crime because most of them are undetected and those who are detected are usually not reported.
5. Intellectual property laws grant owners certain exclusive rights to a variety of intangible assets. They can apply to software because the owners of the software have right to their product and it is theirs to do whatever they want with it.
6. Different types of programs that can be used for software sabotage are viruses, worms, trojan horses, and spyware.
9. Because if they do not save it on an external device, there is always a risk that the hard drive in the system might become corrupt so it is always good to have that back up device to save it on.
No comments:
Post a Comment