3.7 - Best Practices for Ethical Computing
Enroll to start learning
You’ve not yet enrolled in this course. Please enroll for free to listen to audio lessons, classroom podcasts and take practice test.
Practice Questions
Test your understanding with targeted questions
What is a strong password?
💡 Hint: Think about the features that make a password robust.
Why is it important to protect confidential information?
💡 Hint: What risks are associated with sharing personal details?
4 more questions available
Interactive Quizzes
Quick quizzes to reinforce your learning
Why should you use strong passwords?
💡 Hint: Think about what happens if someone guesses your password.
Citing sources can help you avoid ___?
💡 Hint: What is the consequence of using someone else's work without credit?
2 more questions available
Challenge Problems
Push your limits with advanced challenges
You are given a scenario where a friend asks for your password to log into a game. Discuss the ethical implications of sharing passwords and potential consequences.
💡 Hint: Consider the risks that can occur if others misuse your access.
You find an interesting article online that you wish to include in your research paper. How do you ethically incorporate this information while avoiding plagiarism?
💡 Hint: Think about how you would want to be credited if someone used your work.
Get performance evaluation
Reference links
Supplementary resources to enhance your learning experience.