Tuesday, April 28, 2009

__☺♥My assignmEnt♥☺__

1. What is perpetrator?

- According to my research, perpetrator is an act done with a person who commits or perpetrate a crime. They are the one who execute or do an action in a poor or tasteless manner.
http://dictionary.reference.com/browse/perpetrator

2. What is cyber-criminal?

- When we say cyber-criminal, it's generally refers to criminal where a computer or networks is the source, tool, target, or place of a crime. These categories are not exclusive and many activities can be characterized as falling in one or more. Additionally, although the term cyber criminal are more properly restricted to describing criminal activity in which the computer or network is a necessary part of the crime, these terms are also sometimes used to include traditional crimes, such as fraud, theft, blackmail, forgery, and embezzlement, in which computers or networks are used. As the use of computers has grown, computer crime has become more important.
http://en.wikipedia.org/wiki/cybercrime

3. What is cyber-terrorist?

- Cyber-terrorist refers to a person or a programmer who breaks into computer systems in order to steal or change or destroy information as a form of cyber-terrorism.
http://www.thefreedictionary.com/cyber-terrorist

Monday, April 20, 2009

Are Information Technology (I.T) workers professional?

Yes, I.T workers are professional because they finish their degree. They can't work if they don't have any proof that they graduated for the said course. I.T workers are the one who help our society improve and discover more technology. They contribute a lot of help in today's generation because as the time pass by, another discovery is formed. I.T professionals perform a variety of duties that range from installing applications to designing complex computer network and information databases. A few of the duties that I.T professionals perform may include data management, networking, engineering computer hardware, database and software design, as well as the management and administration of entire systems. I can say that they are really professional because of what they done. Technologies can't easily be made without study and understanding and because of the patience and determination of the I.T. workers to make and discover new technologies, their sacrifices brought them to success. And that computers, gadgets and many more technologies that we are using are the products of their success. So all I can say to all I.T workers, I'm very proud of you...!!

Thursday, April 16, 2009

....>",FriEndsHip!!

Friends are the flowers in the garden of life
They help you through times of trouble and strife

There's nothing like friends to make a heart sing
True friends will share with you most everything

They will not abandon you in times of need
They aren't overcome by envy of greed

Friends are the icing on life's great big cake
Real friends will give and allow you to take

I don't know how I would survive without friends
They applaud my beginnings and mourn my sad ends

Tell me, please tell me, what would I do
If I didn't have a garden full of friends just like YOU!




!!I LoVe you",<
my friend



Wednesday, April 15, 2009

..the ten commandments of computer ethics...",<



  1. Thou shalt not use a computer to harm other people.
  2. Thou shalt not interfere with other people's computer work.
  3. Thou shalt not snoop around in other people's computer files.
  4. Thou shalt not use a computer to steal.
  5. Thou shalt not use a computer to bear false witness.
  6. Thou shalt not copy or use proprietary software for which you have not paid.
  7. Thou shalt not use other people's computer resources without authorization or proper compensation.
  8. Thou shalt not appropriate other people's intellectual output.
  9. Thou shalt think about the social consequences of the program you are writing or the system you are designing.
  10. Thou shalt always use a computer in ways that ensure consideration and respect for your fellow humans.
by: Computer Ethics Institute

Contact: Stuart Allen
sallen (at) computerethicsinstitute.org
This page last updated on August 11, 2008 by Webmaster.
Created by cjohnson
Last modified May 06, 2005 06:40 AM