THE TEN COMMANDMENTS OF

3. THOU SHALT NOT SNOOP AROUND IN OTHER PEOPLE'S COMPUTER FILES.
4. THOU SHALT NOT USE A COMPUTER TO STEAL.


7. THOU SHALT NOT USE OTHER PEOPLE'S COMPUTER RESOURCES WITHOUT AUTHORIZATION OR PROPER COMPENSATION.
9. THOU SHALT THINK ABOUT THE SOCIAL CONSEQUENCES
OF THE PROGRAM YOU ARE

WRITING OR THE SYSTEM YOU ARE DESIGNING.
Walang komento:
Mag-post ng isang Komento