computer ethics class 8



    A. Fill in the blanks:

    1. A Hacker is a skilled programmer proficient in several programming languages.

    2. Phishing is an e-mail fraud method in which the perpetrator sends out legitimate-looking e-mail in an attempt to gather personal and financial information from recipients.

    3. The copyright symbol is written as @

    4. Hacking is unauthorized use of computer and network resources.

    5. results in loss amount of money to the original developer or seller of the software.

    6. Ethics means moral principal that govern or influence the conduct of human beings.

    7. Illegal or unlawful duplication of programs or data is called software piracy.

    8. Copy protection is a technique to prevent illegal or unauthorized copying of a software product.

    9.Privacy is a state of being Private.

    10. Encryption is the process of encoding data to prevent unauthorized access.


    Click To Top

    B. Answer the following question:

    1. What do you understand by ethics in computer?

    Ethics is a set of moral principles that govern the behaviors of a group or individual therefore, computer ethics is a set of moral principle that regulate the use of computers. Some common issues of computer ethics include intellectual property rights (such as copy righted electronic content), privacy concerns, and how computer effects society.

    2. What is the different between spamming and phishing?

    Spamming is the activity of sending unwanted e-mail or messages to people. Some of them allure people to join inline communities or compare for some irrelevant issues which cost the sender very little and more is borne by recipients. Whereas,

    Phishing on the other hand is an e-mail fraud method in which the sender lets out legitimate looking e-mail in an attempt to gather personal and financial biodata of recipients. These information ables the sender to indulge in illegal activities or financial transaction.

     

    3. What do yo0u understand by copy protection?

    The software developer develops a lock which placed on a computer program that prevent the illegal or unauthorized copying of software products, this technique is what known as copy protections.

    4. Write some common examples of Spamming?

    Some common examples of spamming are:

    i) sending unwanted advertisement.

    ii) Invites to join various on-line communities and campaigning for some irrelevant issues.

    5. What is Privacy? What do you mean by Privacy of Data?

    Privacy is a state of being private. Privacy of data means that access to it is restricted.

    6. What is PEM?

    Privacy Enhanced Mail (PEM) is an Internet standard for e-mail systems that use encryption techniques to ensure the privacy and security of message.

     

    7. What is Copyright Act?

    Copyright act is a legal concept enacted by governments, giving the creator the sole authority work such as text, a piece of music, a painting or a computer program.

    8. How copyright symbol is written and why?

    Copyright symbol (c is drawn into a circle) is written along with “All Rights Reserved” on the product to denote that only the originator has the right to make or reproduce the copies of that particular document or material.

    9. What is spam?

    Spam refers to the use of electronic messaging systems to send out unrequested or unwanted messages in bulk.

    OR

    Spam is unsolicited Internet content that is typically sent in bulk for advertising purposes from an unknown sender. 

    9. Write a short note on the following:

    Hacking, Copy protection, Software Piracy, Spamming, Phishing , Encryption, Decryption

    Short Note 

    Click the button 
    Button for short note

    Click To Top