CLASS X CYBER ETHICS

 

Computer ethics

Computer ethics are a set of moral standards that govern the use of computers. It is society’s views about the use of computers, both hardware and software. Privacy concerns, intellectual property rights and effects on the society are some of the common issues of computer ethics.

Expand the terms:

1.   OSI — Open Source Initiative.

2.   FLOSS — Free Libre/Livre and Open Source Software.

3.   FSF — Free Software Foundation.

4.   GNU — GNU is Not Unix.

5.   GPL — General Public License

6.   W3C — World Wide Web Consortium.

7.   OSS — Open Source Software.

 

Q1. What is online fraud ? Give some examples.

Answer

Fraud committed using the Internet is called Online fraud. Online fraud may occur in many forms such as :

  1. Non-delivered goods
  2. Non-existent companies
  3. Stealing information
  4. Fraudulent payments

Some examples of online fraud are:

  1. Credit card fraud where credit card details are stolen from a user's online activities and the money is used without the user's knowledge.
  2. Using someone's credentials to watch an online show or movie.
  3. Non-delivery of goods after payment is another example. On investigation, a user may find that the company or website was fraud.

Q2. What is intellectual property ? What do you understand by intellectual property rights ?

Ans- Intellectual property rights are the rights of the owner of information to decide how much information is to be exchanged, shared or distributed. Also it gives the owner a right to decide the price for doing so.

These are the rights granted to individuals over their original creative works such as inventions, literary and artistic work, designs etc. These legal rights are granted through patents, copyrights, trademarks, geographical indications etc. for a specified time period. 

 

 

Q3. What is plagiarism ? How can you avoid plagiarism while referring to someone's else's creation ?

     Answer

Plagiarism is stealing someone else's intellectual work, such as an idea, literary work or academic work etc., and representing it as our own work without giving credit to creator or without citing the source of information.

To avoid plagiarism while referring to someone else's creation, we must give credit whenever we use:

  1. Another person's idea, opinion, or theory;
  2. Quotations of another person's actual spoken or written words; or
  3. Paraphrase of another person's spoken or written words

Q4. What is digital property? What are the threats to digital properties ?

Answer

Digital property (or digital assets) refers to any information about us or created by us that exists in digital form, either online or on an electronic storage device.

For example, any online personal accounts such as email, personal websites and blogs, domain names registered in our name, intellectual properties etc.

The common threats to digital properties are as follows:

1.   Digital software penetration tools — There are many software penetration tools such as cracks and keygens which enable unauthorized users to freely access a software without actually paying for it.

2.   Stealing and plagiarizing codes of digital properties — Other developers may steal a software's source code and use it to build their own versions of it, and then sell it under their own company name.

Q5. How can you protect your digital properties ?

Answer

The following ways to ensure protection of your digital properties:

1.   Anti-Tamper Solutions — They use a host of advanced technologies to prevent hacking, reverse-engineering or manipulating digital properties such as utility tools, software, apps, video games and so forth.

2.   Legal Clauses — There must be a transparent clause in the software's Terms of Service that prohibits the scraping of the software's source code for reuse.

3.   Limit the sharing of software code — One should share software code only with trusted individuals who are part of development team. Digital Rights Management (DRM) solution can protect a software from being scraped for source code using decompilers etc.

Q6. What are open source based software ?

Answer

Open source software is the software whose source code is available and which can be copied, modified and redistributed as well. There may or may not be charges payable for open source software.

In open source software, the source code is freely available to the customer. For example, Linux.

 

 

Q7. What is free software?

Free software is the software which is free of cost, which can be copied, modified and redistributed as well and whose source code is available. No charges are payable for free software.

Q8. What is freeware and shareware?

The term freeware is generally used for software, which is available free of cost and which allows copying and further distribution, but not modification and whose source code is not available. The right to use the software is limited to certain types of users for instance, for private and non-commercial purposes.

Shareware is a software which is made available with the right to redistribute copies, but it is stipulated that if one intends to use the software, often after a certain period of time then a license fee should be paid. The source code of shareware is not available and modifications to the software are not allowed.

Q9. What is GPL software license ? How is it different from LGPL software license ?

Ans9. General Public Licence (GPL) grants and guarantees a wide range of rights to developers who work on open-source projects. With GPL, users can do the following:

1.   Copy the software as many times as needed.

2.   Distribute the software in any way

3.   Charge a fee to distribute the software after modifying it but the software should still be under GNU GPL.

4.   Make any type of modifications to the software

The LGPL and GPL licenses differ with one major exception. With LGPL the requirement that you have to release software extensions in open GPL has been removed

Q10. What are the major factors behind digital divide ?

Answer-

The major factors behind digital divide are:

1.   Technology reach — Technological reach is not the same all across India, especially in rural and remote areas.

2.   Digital Literacy — The rate of digital literacy is far less in rural areas as compared to urban areas. People in remote areas and rural areas are picking up with digital literacy, now.

 

Q11. What is safe data transmission ? How can you ensure secure data transmission ?

Ans- Answer

Secure data transmission means applying enough technical safeguards so that data travels safely to its target, without being compromised or eavesdropped.
To ensure secure data transmission, following techniques are applied:

1.   SSL secure data transmission — SSL (Secure Sockets Layer) is a standard security protocol which ensures data security by establishing encrypted online links between a web server and a browser.

2.   Data encryption — Encrypted data when sent over Internet is hard to steal and hence is safer.

3.   Using Safe protocols — such as for files, secure FTP protocol.

Q12. Write any one application each of e-Governance and e-commerce.

Answer

An application of e-Governance is filing of online application forms for Aadhaar card, passport, etc.

An application of e-commerce is that we can do online shopping.

 

 

 

Comments

Popular posts from this blog

CLASS 8 PRACTICAL PAPER

HTML FORMS

Organising and enhancing Webpages CLASS VIII