X hits on this document

48 views

0 shares

0 downloads

0 comments

7 / 17

The features of in particular the lines, contours, colours, shape, texture of material of  the product itself or its ornamentation.

The designs for product appearance cover the whole or a part of a product resulting from the features, such as the lines, contours, colours, shape, texture or material.

For example: Apple IMAC.

TOPIC: COMPUTER ETHICS AND LEGAL ISSUES

1.2.2 PRIVACY

1.2.2.1 List ways to protect privacy.

1.2.2.2 State authentication and verification methods/ technologies.

WHAT IS PRIVACY?

•   Privacy in IT refers to data and information privacy.

Data refers to a collection of raw unprocessed facts, figures and symbols. Then computers issused to process data into information

•   In general, data includes texts, numbers, sounds, images and video.

Information privacy is described as the rights of individuals and companies to deny or restrict the collection and use of information about them.

WAYS COMPUTER TECHNOLOGY THREATEN OUR PRIVACY

How does computer technology threaten the privacy of our data? It is done through:

1) Cookies

Document info
Document views48
Page views48
Page last viewedThu Dec 08 08:12:09 UTC 2016
Pages17
Paragraphs278
Words3165

Comments