Introducing
Your new presentation assistant.
Refine, enhance, and tailor your content, source relevant images, and edit visuals quicker than ever before.
Trending searches
Plagiarism
This is the way of documenting someone else's work word for word that they have done and stealing it without citing where you got it.
Recourses
http://www.ask.com/world-view/unethical-use-computers-b32c71887831ed3d
http://www.ehow.com/info_7806377_five-unethical-uses-computers.html
http://computernetworksecurityhowtostaysafe.wikispaces.com/Unethical+computers+activity
http://integratedbusinessapplications.weebly.com/topic-a3---computer-abuse-and-unethical-uses-of-computer-and-networks.html
Cheating
Using the computer/internet to look up answers for test or anything you need answers for that you aren't suppose to look up on the computer.
An unauthorized way of reproducing a copy righted book, recording, television program, patented invention, trademarked product, etc.
This is becoming a growing problem in our society
Hacking is invading someone's personal information and files.
Hacking can also be figuring out people's usernames and passwords to social media and faking to be that person.
The act of harassing someone through any social media calling them names,making threats, starting rumours, etc.
Cyber Bullying can lead to serious consequences or can result into the victims suicide.
This is also an idea of stealing someone else's personal information and files.
These thieves use stolen Social Security cards, ID's, etc. to make fake accounts such as bank accounts, credit/debit cards, and also buying things online.