Have you ever been offered a free virus alert program

Assignment Help Computer Engineering
Reference no: EM131669148

Discussion

Everyone should worry about getting a computer virus that will corrupt or destroy files. Some suggest that software developers may be taking advantage of this fear by sending out misleading or fake virus alerts. One reported scam encourages users to download a free virus detection program. This free download begins by actually installing a virus onto the user's computer. It then performs a bogus scan, locating the virus and then offering to remove the virus for a fee. Obviously, this is unethical, not to mention illegal. How can you and legitimate antivirus manufacturers protect themselves against viruses and unethical software developers? Read the attached document titled Discussion 2-Ethics.pdf and the suggested articles below, then respond to the following questions.

1. Have you ever been offered a free virus alert program? If so, describe the offer and whether you accepted the offer.

2. Almost all legitimate antivirus software manufacturers issue new virus alerts. Do you think these alerts are motivated by greed or by good consumer service? Why or why not?

3. Is this an ethical issue for antivirus software manufacturers? If so, create some ethical guidelines for antivirus software manufacturers to follow when issuing virus alerts.

4. What can users do to protect themselves against antivirusscams and against unethical manufacturers of antivirusprograms? Be specific and defend your suggestions.

Articles

1. Your PC is Infected Phone Scam by Mary Landesman.

2. How to Identify and Avoid One of the Internet's Biggest Threats-Fake Antivirus Software.

Reference no: EM131669148

Questions Cloud

Discuss about the vision for the clinical nurse leader : The vision for the Clinical Nurse Leader(CNL) role began in response to the quality and safety reports of the Institute of Medicine (IOM).
Identify the influence of empiricism : Identify the influence of empiricism on quantitative research methodology. Discuss its applicability to evidenced-based practice projects.
Increasing the amount paid on a loan : How borrowers can save interest expense by increasing the amount paid on a loan.
Roles of individual in the society : Describe the production - distribution and consumption of goods and services of that region and roles of individual in the society
Have you ever been offered a free virus alert program : Have you ever been offered a free virus alert program? If so, describe the offer and whether you accepted the offer.
Discuss and debate the topic the article presents : Read the article: Jim Harris "The UnAtomic Age" in your textbook. Discuss and debate the topic the article presents
Calculate the demand-weighted distance : Ted would like to find the location to hold the wedding that minimizes the demand-weighted distance, where demand is the number of relatives at each location.
Explain a scenario where would apply access control measures : Explain a scenario where you would apply one of the four access control measures. Why would you select one over the others?
Discuss about the horizontal and vertical organizations : Review of the literature related to the concept that the group selects (current best practices, positive or negative impact on leadership ).

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd