Monday, April 27, 2009

"The meaning of the word:"
1.Cyberterrorist-a programmer who breaks into computer system inorder to steal or change or destroy information as a form of cyberterrorism.
2.Perpetrator-The entity from the external environment that is taken to be the cause of a risk.An entity in the external environment that perform and attacks in hacker.
3.CyberCriminal-are persons that committed crime using a computer anf the internet to steal a persons identity or sell contraband or stalk victims or disrupt operations with malevolent programs.
Sourses-http://thefreed dictionary.nom,
www.tsl.state.tx.us/Id/pubs/compsecurity
/glossary.htm,

Wednesday, April 15, 2009

"ARE INFORMATION TECHNOLOGY WORKERS ARE PROFESSIONALS?"


Yes!Information Technology workers are professional because most of the Information Teghnology Workers must have knowledge or knoledgeable and know how to identify and dessiminate trustworthy statisstics on information technology workers,review the supply of persons w\ appropriate academic degrees and furnish data on the employment of foreign-origin workers in it jobs.To be sure,there have been ups and downs in supply and demands as normal business cycles of boom and recession affected general levels of employment and as demographic trends influenced supplies of newly traind workers.this is because IT products and services -and the workers who provide them-are found throughout the economy,as well as growing demand contributes the employers.And know how to hold their job.And also they are priorities all the people who finished their degree courses....

Tuesday, April 14, 2009

"The ten Commandments of Computer Ethics"

1.Thou shalt not a computer to harm other people.

2.Thou shalt not interfere with other people's computer work.

3.Thou shalt not snoop around in other people's files.

4.Thou shalt not use a computer to use.

5.Thou shalt not use a computer to bear false witness.

6.Thou shalt not use or copy software for which you have not paid.

7.Thou shalt not use other people's computer resources without authorization.

8.Thou shalt not appropriate other people's intellectual output.

9.Thou shalt think about the social consequences of the program you write.

10.Thou shalt use a computer in ways that show consideration and respect.