What are the components of the "hacker ethic" described in the text?

What will be an ideal response?

1."All Information Should Be Free"-Information sharing is a powerful positive good because it is not possible to make good decisions if important information is hidden. It is the ethical duty of hackers to facilitate access to information wherever possible.2."Mistrust Authority-Promote Decentralization"-The rules and hierarchical management structures that characterize government and corporate bureaucracies mostly serve to prevent people from getting things done, rather than solving problems. Each hacker should act individually (or in very small groups) to do what he or she thinks is best, and ignore the rules.

Computer Science & Information Technology

You might also like to view...

You can filter by format and value by using ________

Fill in the blank(s) with correct word

Computer Science & Information Technology

The ___________________ instruction can be used to test the value of an object's property.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology