Friday, 7 July 2017

computer ethics

Ch-2
Computer ethics
class 8
Short answer type questions:-
Q1. What do you mean by computer ethics?
Ans1. Computer ethics refer to the rules and standards one need to follow while using the computer and internet.
_______________________________________________________________________________________________________

Q2. What is end- user piracy?
Ans2. When someone copies software without the appropriate license for each copy, it is called end-user piracy.
_______________________________________________________________________________________________________

Q3. What is plagiarism?
Ans3. Plagiarism is an act of fraud. It involves both stealing – someone else’s work and lying out it afterwards.
_______________________________________________________________________________________________________

Q4. Write a short note on ‘copyright’
Ans4. It means all rights reserved. Copyright prohibits the user of a software program for making copies of it without the permission of the company/ person concerned.
_______________________________________________________________________________________________________

Q5. Give a list of essential components of a personal code of computer ethics.
Ans5. Seven essential components of a personal code of computer ethics are:-
1.       Honesty                                               5. responsibility
2.       Respect                                              6. communication
3.       Professionalism                                7. Obeying the law.
4.       confidentiality 
_______________________________________________________________________________________________________

Long answer type questions:-
Q1. Define hacker and cracker.
Ans1. Hacker is a person who is extremely interested in exploring the things and who uses computers to gain unauthorized access to data. Most often a hacker is the expert programmer and also called ethical hacker or white hat hacker.
Cracker is a person who breaks into a computer system just like a hacker, with the intention to steal password, files or programs to sell the information. Cracker is also called black hat hackers or cheaters or simply criminals.
Q2. What is internet piracy?
Ans2. We can download various softwares from the internet. We must make sure that the downloads available on internet are authorized by the owner or publisher for distribution. But there are many sites that offer software illegally over the internet. Unauthorized copies downloaded over the internet falls under internet piracy.
Q3. Write a note on ‘intellectual property rights’.
Ans3. Intellectual property rights mean “ownership of ideas” which is produced or created by using skills and
mental ability of the person. The software or program originally developed by the person(s), become the intellectual
property of the developers.
Q4. What do you mean by privacy?
Ans4. Software privacy is a concept which is applied to an individual. It is absolute right of an individual to decide  information/software/program  he/she wishes to share with others or is willing to accept from others.
Q5. What is counterfeiting?
Ans5. This is the process of making and distributing illegal copies of software packages that reproduce the
developer’s packages. People make duplicate CD’s of original software and sell them at low price.
Q6. Write down any five basic Netiquette of using internet.
 Ans6.  The Netiquette of using internet are:-
1.       Do not share your personal information on internet.
2.       Do not respond to any message that makes you uncomfortable.
3.       Try to be brief while writing message and always read it before sending.
4.       Don’t send abusive mails to anyone through net.
5.       Be courteous and respectful to others while sending an email.
Q7. Write down any five commandments for computer ethics.
Ans7. The commandments are given below:
1.       We shall not use computer to harm other people.
2.       We shall not interfere with other people’s computer work.
3.       We shall not snoop around in other people’s files.
4.       We shall not use a computer to steal.


5.       We shall not use a computer to bear false witness.

4 comments: