Computer Crime Web Investigation
A computer crime web investigation.
- 1. Explain the difference between a computer virus, a worm, and a trojan horse. Go to HowStuffWorks.com for your answer.
- 2. Using the same web page, determine how these viruses, worms, and trojan horses spread.
- 3. Continuing to use HowStuffWorks.com, discover two ways to keep your computer safer from viruses.
- 4. What is a “hoax”? Go to FreeDictionary.org.
- 5. Have you ever received a computer hoax by e-mail? What did it suggest that you do, or how did it affect you?
- 6. You’ve probably heard about copyright, but did you know that you already have produced copyright work of your own? Read through the Copyright Basics page.
- 7. Pretend that you are writing poetry in Language Arts class today. When will the poem that you write today enter public domain? (Use information from the copyright basics page.)
- 8. Why is the date, March 1, 1989, an important day in copyright history?
- 9. What types of works are protected by copyright?
- 10. Are there any works that are not copyright protected? If the answer is yes, describe these things.
- 11. What is the “fair use” doctrine?
- 12. Describe a situation where YOU might need to request permission to use a copyrighted work.
- 13. Read “The Ten Commandments for Computer Ethics.” While these commandments may seem simple, some of these rules summarize complicated laws that are in place in the United States. Others simply remind computer users of what is right and wrong.
- After reading the Ten Commandments for Computer Ethics, discuss with your computer buddy which of the commandments that you believe many people disregard. Do you believe that one of these commandments is more important, or more serious than the other? If so, which one(s)?
Click on the Link To finish with a four paragraph ending. http://www.wmms.net/walters/webquests/computer_crime4.htm