1. It is the act of bypassing ones account or database and hacking involves stealing of identity and use it in his/her own interest. Answer: Computer Hacking
2. Who is the computer ethicist that defines computer hacker as an individual working with computers who was technically gifted and skilled? Answer: Duncan Langford
3. It is considered as an act of trespassing, it is an unauthorized viewing of someone’s computer private or confidential documents. Answer: Computer Hacking/Hacking
4. It is a program in which malicious or harmful code is disguised inside some apparently harmless programming or data. Answer: Trojan Horse/s
5. This is a standalone malware computer program that replicates itself in order to spread to other computers. Answer: Worm
6. This are programs triggered to act when they detect a certain sequence of events or after a particular period of time has elapsed. Answer: Time or Logic Bombs
7. This is another tool in which a server, hosting a particular website, will be targeted with a massive volume of fake traffics. Answer: Denial-of-service
8-11. Give the four destructive or malicious computer programs.
Answer: Trojan Horses, Worms, Time or Logic Bombs, and Denial-of-service
12-17. Enumerate the motives behind computer hacking.
Answer: Vandalism, Public Interest, Reveal Wrongdoing, Financial Gain, As a Protest, and The Challenge (fun).
18-20. Define Computer Hacking.
Answer: Computer Hacking it is the act of bypassing ones account or database and hacking involves stealing of identity and use it in his/her own interest.
PREPARED BY: GROUP II
Computer Hacking – it is the act of bypassing ones account or database and hacking involves stealing of identity and use it in his/her own interest. Computer Hacking in 1960’s up to 1970’s – an individual working with computers who were...
Please join StudyMode to read the full document