1. Give any two examples of computer crime.
2. Name the different forms of software piracy.
Fill in the blanks
1. Software piracy is the illegal.
and ........
... of software.
2. Computer security includes the
and
that are designed to protect the computer system.
3. It is ........
to infringe the privacy of other people without their consent.
4. When someone copies software without appropriate license of each copy it is called
Answers
1. Examples
- The fraud did by manipulating computer network
- Unauthorized access to or modification of data or application.
2. There Are six Main Types of Software Piracy
- Counterfeiting
This type of piracy is the illegal duplication, distribution, or sale of copyrighted material with the intent of imitating the copyrighted product. In the case of packaged software, it is common to find counterfeit copies of the compact discs incorporating the software programs, as well as related packaging, manuals, license agreements, labels, registration cards, and security features.
- Internet Piracy
This occurs when unauthorized software is downloaded from the Internet. The same purchasing rules apply to on-line software purchases as for those bought in compact disc format. Common Internet piracy techniques are:
Websites that make software available for free download or in exchange for others
Internet auction sites that offer counterfeit or out-of-channel software
Peer-to-peer networks that enable unauthorized transfer of copyrighted programs
- End User Piracy
This occurs when an individual reproduces copies of software without authorization. These include:
Using one licensed copy to install a program on multiple computers
- Copying discs for installation or distribution
Taking advantage of upgrade offers without having a legal copy of te version to be upgraded
Acquiring academic or other restricted or non-retail softare without a proper license
Sapping discs in or outside the workplace
- Client-Server Overuse
This type of piracy occurs when too many users on a network are using a central copy of a program at the same time. If you have a local-area network and install programs on the server for several people to use, you have to be sure your license entitles you to do so. If you have more users than allowed by the license, that's "overuse".
- Hard-Disk Loading
This occurs when a business sells new computers with illegal copies of software loaded onto the hard disks to make the purchase of the machines more attractive.
Fill in the blanks÷
1. punishable
2. user education and computer generated password
3. illegal
4. software piracy
Hope this helps you
Please mark as brainliest