cyberbullying
topology
Technology Ethical/legal issues
Technology Ethical/legal issues and sole proprietorship
sole proprietorship part two and all together
100

what is cyberbullying

Cyberbullying is a form of harassment or bullying that takes place over digital devices such as computers, smartphones, and tablets. It involves the use of technology and social media platforms to target, intimidate, or embarrass individuals.

100

what is a network topology

Network topology  is nodes and connections within a network. It defines how different devices, such as computers, routers, and switches, are interconnected and communicate with each other.  

100

what is Personal Privacy

It is an important aspect of ethical issues in information technology. IT facilitates the users having their own hardware, operating system and software tools to access the servers that are connected to each other and to the users by a network.

100

what is Trade Secrets

Trade secrets is also a significant ethical issue in information technology. A trade secret secures something of value and usefulness.

100

what is a corporation

A corporation is a legal entity that is separate and distinct from its owners. Under the law, corporations possess many of the same rights and responsibilities as individuals.

200

what is a  empathizer

an empathizer is someone who offers support, understanding, and compassion to those who have been targeted by online harassment.

200

What is Mesh Topology

mesh topology is when all computers are content

200

what is Access Right

The second aspect of ethical issues in information technology is access right. Access right becomes a high priority issue for the IT and cyberspace with the great advancement in technology.

200

what is Liability

One should be aware of the liability issue in making ethical decisions. Software developer makes promises and assertions to the user about the nature and quality of the product that can be restricted as an express warranty.

200

what is niche 


a comfortable or suitable position in life or employment.

300

what is a upstander

An upstander in the context of cyberbullying is someone who takes action to support and defend a person being targeted online. Unlike a bystander who may witness cyberbullying but remains passive, an upstander actively intervenes in positive ways.

300

what is a star topology

A star topology is a type of network configuration in which each device, or node, is connected to a central hub or switch.

300

what is Harmful Actions

Harmful actions in the computer ethics refers to the damage or negative consequences to the IT such as loss of important information, loss of property, loss of ownership, destruction of property and undesirable substantial impacts.

300

what is Piracy

Piracy is an activity in which the creation of illegal copy of the software is made. It is entirely up to the owner of the software as to whether or not users can make backup copies of their software.

300

what is a ceo

the highest-ranking individual in a company.

400

what is a bystander

 a bystander refers to an individual who witnesses or becomes aware of online harassment or bullying but is not directly involved as either the victim or the perpetrator.

400

what is ring topology

Ring topology is a network configuration where each device is connected to two other devices,.

400

what is a Patent

It is more difficult to deal with these types of ethical issues. A patent can preserve the unique and secret aspect of an idea. Obtaining a patent is very difficult as compared with obtaining a copyright.

400

what is sole proprietor

A sole proprietor is someone who owns an unincorporated business by himself or herself.

400

who has more power the owner are the CEO in the company 

owner

500

what is a example of cyberbullying 

example: John slap little man and big Steve records it and post it in the internet 

500

which topology  has a central hub

star

500

what is Copyright

The information security specialists are to be familiar with necessary concept of the copyright law. Copyright law works as a very powerful legal tool in protecting computer software, both before a security breach and surely after a security breach.

500

what is limited liability

A limited liability company (LLC) is a business structure in the U.S. that protects its owners from personal responsibility for its debts or liabilities.

500

what is percentage of how many people are cyberbullied 

41%  

M
e
n
u