Nonmalicious virus

Assignment Help Basic Computer Science
Reference no: EM133245586

Suppose you wrote a nonmalicious virus, just to see if you could do it; it only displays a box on the screen saying it has been installed successfully, and then deletes itself. Is that ethical behavior? Justify your answer with principles of ethics, not just your own opinions. Now suppose that to try out your virus you inform a friend, attempt to pass the virus to her, and succeed. Is that ethical behavior? Justify your answer, again based on principles of ethics. Now suppose you release the virus without warning to a larger set of people. Is that ethical behavior? Justify our answer, again based on principles of ethics. At what point does your behavior change from ethical to unethical? Is the pint based on size? Number of affected systems? Effect of virus? Something else?

Reference no: EM133245586

Questions Cloud

Mitigation technique : Describe at least three ways you could mitigate TCP SYN denial of service attacks against a system.
Space remains from text file storage on the drive : Which contains a Windows 10 Operating System and an 15,128 byte text file , how much slack space remains from the text file's storage on the drive?
Explain why successful attack on collision resistance : Explain why a successful attack on collision resistance does not imply a successful attack on second pre-image resistance.
Organizations conducting this activity : Their operations are smaller and less complicated, but we still see a small percentage of these organizations conducting this activity.
Nonmalicious virus : Suppose you wrote a nonmalicious virus, just to see if you could do it; it only displays a box on the screen saying it has been installed successfully,
Establishing a chain of custody during an investigation : Discuss the importance of maintaining an evidence form and establishing a Chain of Custody during an investigation.
Collecting mobile device issues : What are some good ways an examiner can speak with the device owner to get the device unlocked if it is locked,
Explain in detail network interface card : Explain in detail how wireless networking works. Explain in detail the Network Interface Card (NIC) and the MAC address.
Knowledge of technology influence access to cloud storage : Who has access to Cloud Storage? How does the cost of computers, access to the internet, and knowledge of technology influence access to Cloud Storage?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  How does the total emissivity vary with temperature

For materials A and B, whose spectral emissivities vary with wavelength as shown below, how does the total emissivity vary with temperature? Explain briefly.

  How many different ways can the three summer outfits

Sara has eight new summer outfits. She plans to pack three of the new summer outfits in her trip to Tokyo.

  Privacy on a desktop application

How does data privacy on a mobile device differ from privacy on a desktop application?

  Cultural change and project sponsorship

Examine the primary reasons why project management causes a cultural change and the impact of that change on integrative information technology.

  Database administration

You are the new DBA for the XYZ company, you have been asked to research best practices for security policies and procedures. Specifically, what information can you provide regarding controls related to each of the following?

  Explain why a transaction may have many cursors.

C Also, how is it possible that a transaction may have more than one cursor on a given table?

  Do research on service-oriented architecture

Do research on service-oriented architecture (SOA) and find three different images/diagram that represents its functions and features.

  Does this design satisfy the given specifications

Choose M = 31 so that there are two samples in the transition band. Using a raised-cosine transition obtain the filter impulse response. Provide a plot of the log-magnitude and impulse responses. Does this design satisfy the given specifications?

  Can we find a joint pdf if we know autocorrelation function

Can we find a joint PDF if we know the autocorrelation function?

  Determine the depth from the ground surface

One of which is to measure groundwater table or in other words they are used to determine the depth from the ground surface to groundwater surface.

  Basic web site elements

For this Individual Project assignment, you will create your first Web page in HTML5 code with the following basic Web site elements:

  Problem regarding the constant-growth model

From the constant-growth model, the amount of internally-funded growth is 12.5% and a maximum P/E ratio of 20 would be paid for Merck under these circumstances.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd