The features of in particular the lines, contours, colours, shape, texture of material of the product itself or its ornamentation.
The designs for product appearance cover the whole or a part of a product resulting from the features, such as the lines, contours, colours, shape, texture or material.
For example: Apple IMAC.
TOPIC: COMPUTER ETHICS AND LEGAL ISSUES
126.96.36.199 List ways to protect privacy.
188.8.131.52 State authentication and verification methods/ technologies.
WHAT IS PRIVACY?
• Privacy in IT refers to data and information privacy.
•Data refers to a collection of raw unprocessed facts, figures and symbols. Then computers issused to process data into information
• In general, data includes texts, numbers, sounds, images and video.
•Information privacy is described as the rights of individuals and companies to deny or restrict the collection and use of information about them.
WAYS COMPUTER TECHNOLOGY THREATEN OUR PRIVACY
•How does computer technology threaten the privacy of our data? It is done through: