Short essay on use and misuse of computer.
Types of computer misuse Misuse of computers and communications systems comes in several forms: Hacking. Hacking is where an unauthorised person uses a network, internet or modem. connection to.
Unfortunately, the wrong and corrupt use of internet has also made it a great curse and nuisance. Many people use internet for vulgar chatting, nude films and immoral programs, in Pakistan, there is a mushroom growth of Net-Cafes and computer-centers where in specially designed private cabins along with young boys and girls, elderly people and small children too are seen busy in doing vulgar.
Computer Misuse Act You need to be familiar with the following ideas about data(data: information without context, eg a list of students with numbers beside their names is data, when it's made clear that those numbers represent their placing in a 100 metre race, the data becomes information) and computer misuse: that data.
Internet Essay 1 (100 words) Internet is the invention of modern and high technology science. It provides us amazing facility of searching any information from any corner of the world by anyone. We can connect more than one computer to each other using this internet in order to easily access information from any connected computer from one place.
The types of computer misuse and how to prevent computer misuse CONCLUSION in a world that’s increasingly run on technology, it is so true that every home will have at least one computer parents should play their role in teaching their children in a proper way MAIN POINT 1: Types.
The uses and misuses of mobile phones have grown considerably in Hindi with the addition of new users every minute. Misuses of them include workers spending too much time on their phones and a.
Introduction The growth of computer use over recent years has resulted in many operations becoming computerised, both in the work place and in everyday life. This reliance has resulted in the need for an effective legislation over them, to control crime and misuse, leading to the creation of the Computer misuse act 1990.