jhoanne
Thursday, May 21, 2009
Thursday, May 14, 2009
Intellectual
What is intellectual property?
These are legal property rights over creations of the mind, both artistic and commercial, and the corresponding fields of law.[1] Under intellectual property law, owners are granted certain exclusive rights to a variety of intangible assets, such as musical, literary, and artistic works; ideas, discoveries and inventions; and words, phrases, symbols, and designs. Common types of intellectual property include copyrights, trademarks, patents, industrial design rights and trade secrets.
The majority of intellectual property rights provide creators of original works economic incentive to develop and share ideas through a form of temporary monopoly.
Although many of the legal principles governing intellectual property have evolved over centuries, it was not until the late 20th century that the term intellectual property began to be used as a unifying concept. [2]
What are intellectual property rights?
Intellectual property rights are the rights given to persons over the creations of their minds. They usually give the creator an exclusive right over the use of his/her creation for a certain period of time.
Sunday, May 3, 2009
THE THREE WORDS:
:Meaning of the Word :
1.cyber terrorist -a programmer who breaks into computer systems in order to steal or change or destroy information as a form of cyber-terrorism.
2.perpetrator - The entity from the external environment that is taken to be the cause of a risk. An entity in the external environment that performs an attack, ie hacker.
3. cyber criminal - are persons that committed crime using a computer and the internet to steal a person's identity or sell contraband or stalk victims or disrupt operations with malevolent programs.
Sources: http://thefreedictionary.com, www.tsl.state.tx.us/ld/pubs/compsecurity/glossary.html,
1.cyber terrorist -a programmer who breaks into computer systems in order to steal or change or destroy information as a form of cyber-terrorism.
2.perpetrator - The entity from the external environment that is taken to be the cause of a risk. An entity in the external environment that performs an attack, ie hacker.
3. cyber criminal - are persons that committed crime using a computer and the internet to steal a person's identity or sell contraband or stalk victims or disrupt operations with malevolent programs.
Sources: http://thefreedictionary.com, www.tsl.state.tx.us/ld/pubs/compsecurity/glossary.html,
Wednesday, April 15, 2009
Are Information Technology(IT)Workers Professionals?
Yes,as of now the all computer networks or information technology that discribes any technology
that helps to produce,manipulate and most of all communicate ,because when we talk or discuss about information technology means that computer is important and it is very useful for every one of us.And all your problem can be answer by computer.But now as what we can see computer is not use in good,especially in children that give hasle in her/his study because of computer games.
that helps to produce,manipulate and most of all communicate ,because when we talk or discuss about information technology means that computer is important and it is very useful for every one of us.And all your problem can be answer by computer.But now as what we can see computer is not use in good,especially in children that give hasle in her/his study because of computer games.
Tuesday, April 14, 2009
Joan Rules:
THE TEN COMMANDMENTS OF COMPUTER ETHICS:
1.Thou shalt not use a computer to harm other people.
2.Thou shalt not interfere w/ other people's computer work.
3.Thou shalt not snoop around in other's people's computer files.
4.Thou shalt not use computer to steal.
5.Thou shalt not use computer to bear false witness.
6.Thou shalt not copy or use software for which you have not paid.
7.Thou shalt not use other computer resources w/out authorization or proper compensation.
8.Thou shalt not appropriate other people intellectual output.
9.Thou shalt not think about the social consequences of the program you are writing or the system you are designing.
10.Thou shalt always use a computer in ways that ensure consideration and respect for you follows towards.
1.Thou shalt not use a computer to harm other people.
2.Thou shalt not interfere w/ other people's computer work.
3.Thou shalt not snoop around in other's people's computer files.
4.Thou shalt not use computer to steal.
5.Thou shalt not use computer to bear false witness.
6.Thou shalt not copy or use software for which you have not paid.
7.Thou shalt not use other computer resources w/out authorization or proper compensation.
8.Thou shalt not appropriate other people intellectual output.
9.Thou shalt not think about the social consequences of the program you are writing or the system you are designing.
10.Thou shalt always use a computer in ways that ensure consideration and respect for you follows towards.
Subscribe to:
Posts (Atom)