Spyware is a security risk because it usually compromises data confidentiality. Davidshould be concerned that information about his computer usage will be sent to anoutside party.CONCEPTNetwork Security3Select the scenario that demonstrates plagiarism.Savasha uses open source software to develop a new web design manual for her salescompany.In a blog post, Katriana paraphrases portions of an interview about her favorite author,and includes a hyperlink to the interview.Carissa downloads an entire album of music from a file-sharing website.In his essay, James rewords a paragraph about an idea that he got from another author,without naming the author.RATIONALEIn his essay, James reworded a paragraph about an idea he got from an author withoutnaming that author. This is plagiarism, because James took the work or idea of anotherand presented it as his own.By paraphrasing and including a link to the interview, Katriana did not plagiarize.By downloading an entire album of music from a file-sharing website, Clarissa is usingworks protected by copyright law without permission. This is a form of copyrightinfringement, but it is not plagiarism.Open source software can be used and shared freely, so Savasha is not guilty ofcopyright infringement.CONCEPTEthical Behavior in the Digital World4Genevieve is a student who attends classes at a campus downtown. She likesto study in the college's coffee shop, where she often accesses the Internetthrough the college's wireless network.