Report your findings to the principal, since this is a breech of security.
Explain to your teacher and suggest she change her password.
Use the password to change grades for friends at your school.
Pretend you didn’t see the password and do nothing.
Illegally copying computer programs
Reformatting hard drives and reselling them as new
Infecting the hard drive with a virus
Reselling used CPU’s for a profit
Having instruction manuals and documentation
Making copies and reselling them for a profit
Receiving technical support form the software developer
Having the personal satisfaction of doing the right thing
E-mail all your friends to warn them of the virus
Remove and destroy all files with the .exe extention
Disinfect your computer using antivirus software
Purchase another computer
Copyright the software
Buy a patent for the software
Lock the software
Decode the software
Use your real name and address
Lie about your age
Never agree to meet someone you do not know
Create a profile with only accurate information about yourself
You may use up to one paragraph or two sentences, whichever is less.
Plagiarism does not apply to the Internet because of all the inaccurate information you find.
Always site Internet sources in a bibliography.
Electronic information is never copyrighted.