Why is it unethical to share copyrighted files with your friends:
a) It is not unethical because it is legal
b) It is unethical because the files are being given for free
c) Sharing copyrighted files without permission breaks copyright laws
d) It is not unethical because the files are being given for free
e) It is not unethical - anyone can access a computer

1 Answer

Answer :

c) Sharing copyrighted files without permission breaks copyright laws

Related questions

Description : Why is it unethical to share copyrighted files withyour friends ? (A) It is notunethical, because it is legal. (B) It is unethical because thefiles arebeing given for free. (C) ... D) It is notunethical becausethe filesarebeing given for free. (E) It is notunethical-anyonecan access acomputer

Last Answer : Sharingcopyrighted files without permission breaks copyright laws

Description : Are your own personal photos and artwork automatically copyrighted upon creation even though you may not have formally gone through the copyright process?

Last Answer : Heh. Well 97% of my photos are from other people (except my Fluther Profile Pic as of late) and I think they look cool but nobody's had a problem so I would discuss it with the person if ... aren't willing report them under the terms that they are invading your privacy' or some such phrasing.

Description : Distributed processing involves a) solving computer component problems from a different computer b) solving computing problems by breaking them into smaller parts that are separately processed by different ... ) allowing users to access network resources away from the office e) None of these

Last Answer : b) solving computing problems by breaking them into smaller parts that are separately processed by different computers

Description : Which term is commonly used for copyrighted software given away free by its author? A. Freeware B. Shareware C. Open Source Software D. Public Domain Software

Last Answer : A. Freeware

Description : Do copyright laws protect professional photos from being altered?

Last Answer : Slapped a COPYRIGHT right across the picture!

Description : The process of transferring files from a computer on the internet to your computer on the internet to your computer is called: a) Downloading b) Uploading c) Sharing d) None of These

Last Answer : a) Downloading

Description : When you purchase copyrighted software, what actually are you paying for? a. The cost of the CDs, manuals, and development of the software b. The cost of the CDs, manuals, and a share of the cost of the software development c. A share of the cost of software development d. All of the above

Last Answer : d. All of the above

Description : Is it legal for anyone to close a lane or lanes on a City street without permission?

Last Answer : The government or presiding authority may close a lane or roadfor any reason they wish.A private citizen does not have the ability to close alane/road.

Description : Ethical norms in research do not involve guidelines for: (A) Thesis format (B) Copyright (C) Patenting policy (D) Data sharing policies

Last Answer : (A) Thesis format

Description : When management refuses to disclose in the financial statements noncompliance to laws and regulations which are identified by the independent auditor, the CPA may be charged with unethical conduct for ... and regulations during the prior audits. d. Reporting these activities to the audit committee.

Last Answer : Issuing a disclaimer of opinion

Description : The principle of time sharing is 1) large numbers of users direct access to the computer for problem solving 2) large number of user for file sharing 3) both of above 4) none

Last Answer : large numbers of users direct access to the computer for problem solving

Description : The principle of time sharing is 1) large numbers of users direct access to the computer for problem solving 2) large number of user for file sharing 3) both of above 4) none

Last Answer : 1) large numbers of users direct access to the computer for problem solving

Description : The principle of time sharing is 1 large numbers of users direct access to the computer for problem solving 2 large number of user for file sharing 3 both of above 4 none

Last Answer : 1 large numbers of users direct access to the computer for problem solving

Description : Does anyone worry about copyright laws?

Last Answer : I worry that they are being misused to benefit the Disney Company, which would have lost the rights to its creatures by now if it hadn’t bribed Congress to intervene.

Description : More subtle because you are not aware that you are running these macros (A) The purpose of copyright (B) Danger of macro viruses (C) Derivative works (D) computer-specific crime

Last Answer : (B) Danger of macro viruses

Description : More subtle because you are not aware that you are running these macros (the document opens and the application automatically runs); spread via email A. The purpose of copyright B. Danger of macro viruses C. Derivative works D. computer-specific crime

Last Answer : B. Danger of macro viruses

Description : __________ is a content distribution protocol enables efficient software distribution and peer-to-peer sharing of very large files by enabling users to serve as network redistribution points. A. Freeware B. BitTorrent C. CorelDraw D. None of the above.

Last Answer : B. BitTorrent

Description : Which of the following applications allows a user to access and change remote files without actual transfer? A) DNS B) FTP C) NFS D) Telnet

Last Answer : C) NFS

Description : What is an unethical, yet legal way to get rich?

Last Answer : Become a television pastor preaching the prosperity gospel.

Description : Whoever, being employed to carry or deliver any mail bag or any postal article in course of transmission by post, voluntarily withdraws from the duties of his office without permission or without having given one ... with fine which may extend to fifty rupees, or with both. d) None of the above

Last Answer : c) Punishable with imprisonment which may extend to one month, or with fine which may extend to fifty rupees, or with both.

Description : If my friends just started a new website, and I want to help them out, is it unethical to click on the weblinked ads if I'm minimally interested in what they're selling?

Last Answer : I don't see why not.

Description : If you use designer home decor items for 'inspiration', are you breaking copyright laws?

Last Answer : answer:Strange little glitch just happened, and I lost the response that I already typed out. I don't know the answer for sure, but I'm sure it's only a matter of time before someone comes along that ... shelves of stores. I doubt that you would run into any issues.. but again, I'm only guessing.

Description : What would happen if all intellectual property (copyright, patent, trademark) laws were to be abolished?

Last Answer : Studio recordings and video would vanish overnight. There are large up-front costs involved with record production, and without copyright protection, it's difficult to impossible to recoup those costs. Musicians ... cheaper to print-on-demand rather than buying. This is still a few years off yet.

Description : If I post a photo of a candy bar on my website, with brand and other text clearly legible, would I be violating any copyright laws?

Last Answer : You’re fine. This would fall under “fair use” – showing a copyrighted product in an editorial context.

Description : Don't people who make videos about different movies or games break copyright laws ? Tell the details ?

Last Answer : Everyone has a desire for something or other. Yes. They make videos on the game by re-acting that money, but if they make J videos, it is wrong if it has a bad effect on any subject. And that is breaking the law.

Description : Basic Audio Copyright Laws?

Last Answer : Audio copyright laws are some of the most interesting in the world of general copyright law because there are some things about them that are different when compared to other types of law. First off, ... used in the music world to create more music. People will take fifteen seconds of many differen

Description : A System in which a transaction access and updates a file quickly enough to affect the original decision making is called 1) Real time system 2) time sharing system 3) both of above 4) None of above

Last Answer : 1) Real time system

Description : A System in which a transaction access and updates a file quickly enough to affect the original decision making is called 1 Real time system 2 time sharing system 3 both of above 4 None of above

Last Answer : 1 Real time system

Description : A college student desires to get elected to the municipal council of his city. The validity of his nomination would depend on the important condition, among others, that? (1) He obtains permission from ... the voter's list. (4) He files a declaration owing allegiance to the constitution of India.

Last Answer : (3) His name figures in the voter's list. Explanation: The validity of nomination of a person to get elected to the municipal council would depend on the condition that his name should be figured in the voter's list.

Description : What is the legal protection afforded an expression of an idea, such as a song, video game, and some types of proprietary documents? a. Ethics b. Intellectual property c. Copyright d. Fair Use Doctrine

Last Answer : c. Copyright

Description : What is the legal protection afforded an expression of an idea, such as a song, video game, and some types of proprietary documents? a. Ethics b. Intellectual property c. Copyright d. Fair Use Doctrine

Last Answer : c. Copyright

Description : Which of following are Unethical norms for Investigator? A. Uphold any relevant evidence. B. Declare any confidential matters or knowledge. C. Distort or falsify education, training, credentials. D. All of above E. None of above

Last Answer : D. All of above

Description : You can check out your couple's Instagram or fbja. Leave your phone free or plug it in.

Last Answer : I'll handle her email for administration. Anyway, I trust you don't have to pay attention to your Facebook page ...

Description : 0. Leaking your company data to the outside network without prior permission of senior authority is a crime. a) True b) False

Last Answer : a) True

Description : . Leaking your company data to the outside network without prior permission of senior authority is a crime. a) True b) False

Last Answer : a) True

Description : . What is the ethics behind training how to hack a system? a) To think like hackers and know how to defend such attacks b) To hack a system without the permission c) To hack a network that is vulnerable d) To corrupt software or service using malware

Last Answer : a) To think like hackers and know how to defend such attacks

Description : Leaking your company data to the outside network without prior permission of senior authority is a crime. a) True b) False

Last Answer : a) True

Description : What is the ethics behind training how to hack a system? a) To think like hackers and know how to defend such attacks b) To hack a system without the permission c) To hack a network that is vulnerable d) To corrupt software or service using malware

Last Answer : a) To think like hackers and know how to defend such attacks

Description : Leaking your company data to the outside network without prior permission of senior authority is a crime. a) True b) False

Last Answer : a) True

Description : What is the ethics behind training how to hack a system? a) To think like hackers and know how to defend such attacks b) To hack a system without the permission c) To hack a network that is vulnerable d) To corrupt software or service using malware

Last Answer : a) To think like hackers and know how to defend such attacks

Description : Leaking your company data to the outside network without prior permission of senior authority is a crime. a) True b) False

Last Answer : a) True

Description : What is the ethics behind training how to hack a system? a) To think like hackers and know how to defend such attacks b) To hack a system without the permission c) To hack a network that is vulnerable d) To corrupt software or service using malware

Last Answer : a) To think like hackers and know how to defend such attacks

Description : Prior to the invention of time-sharing, the prevalent method of computer access was ____________ a) batch processing b) telecommunication c) remote access d) all of the mentioned

Last Answer : a) batch processing

Description : Am I responsible for the dentist bill if my son accidentally causes an injury to his friend's tooth while playing with an air soft gun? The other boy had permission to play and did not have a the proper mouth guard.

Last Answer : I think it might depend on 1. whose supervision they were under 2. if the boy was told to wear a mouth guard 3. the parent/guardian of that child new that their child was not equipped with the proper protection and still allowed it.

Description : Which of the Following is not true of immediate processing: a) It is often used in real time applications b) It can be used in an airline reservation system c) It can occur with either sequential or direct access files d) None of The Above

Last Answer : c) It can occur with either sequential or direct access files

Description : Is it legal for an employer to allow only lunch after five hours and no other breaks at all?

Last Answer : Employers are required to provide break periods of at least 30 minutes for minors ages 14 through 17 who work five or more consecutive hours. Employers are not required to give breaks for employees ... and it lasts more than 20 minutes. A collective bargaining agreement may also govern this issue.

Description : Which of following is a not unethical norm for Digital Forensics Investigation? A. Uphold any relevant evidence. B. Declare any confidential matters or knowledge. C. Distort or falsify education, training, credentials. D. To respect the privacy of others.

Last Answer : D. To respect the privacy of others.

Description : ____________ is the technique used in business organizations and firms to protect IT assets. a) Ethical hacking b) Unethical hacking c) Fixing bugs d) Internal data-breach

Last Answer : a) Ethical hacking

Description : ___________ has now evolved to be one of the most popular automated tools for unethical hacking. a) Automated apps b) Database software c) Malware d) Worms

Last Answer : c) Malware