A. Fill in the blanks:
1. A Hacker is a skilled
programmer proficient in several programming languages.
2. Phishing is an e-mail fraud
method in which the perpetrator sends out legitimate-looking e-mail in an
attempt to gather personal and financial information from recipients.
3. The copyright symbol is written as @
4. Hacking is unauthorized use of
computer and network resources.
5. results in loss amount of money to the original developer or seller
of the software.
6. Ethics means moral principal
that govern or influence the conduct of human beings.
7. Illegal or unlawful duplication of programs or data is called software piracy.
8. Copy protection is a technique
to prevent illegal or unauthorized copying of a software product.
9.Privacy is a state of being Private.
10. Encryption is the process of encoding
data to prevent unauthorized access.
B. Answer the following question:
1. What do you understand by ethics in computer?
Ethics is a set of moral principles that govern the behaviors of a group or individual therefore, computer ethics is a set of moral principle that regulate the use of computers. Some common issues of computer ethics include intellectual property rights (such as copy righted electronic content), privacy concerns, and how computer effects society.
2. What is the different between spamming and phishing?
Spamming is the activity of sending unwanted e-mail or messages to
people. Some of them allure people to join inline communities or compare for
some irrelevant issues which cost the sender very little and more is borne by
recipients. Whereas,
Phishing on the other hand is an e-mail fraud method in which the sender
lets out legitimate looking e-mail in an attempt to gather personal and
financial biodata of recipients. These information ables the sender to indulge
in illegal activities or financial transaction.
3. What do yo0u understand by copy protection?
The software developer develops a lock which placed on a computer program that prevent the illegal or unauthorized copying of software products, this technique is what known as copy protections.
4. Write some common examples of Spamming?
Some common examples of spamming are:
i) sending unwanted advertisement.
ii) Invites to join various on-line communities and campaigning for some irrelevant issues.
5. What is Privacy? What do you mean by Privacy of Data?
Privacy is a state of being private. Privacy of data means that access to it is restricted.
6. What is PEM?
Privacy Enhanced Mail (PEM) is an Internet standard for e-mail systems
that use encryption techniques to ensure the privacy and security of message.
7. What is Copyright Act?
Copyright act is a legal concept enacted by governments, giving the creator the sole authority work such as text, a piece of music, a painting or a computer program.
8. How copyright symbol is written and why?
Copyright symbol (c is drawn into a circle) is written along with “All Rights Reserved” on the product to denote that only the originator has the right to make or reproduce the copies of that particular document or material.
9. What is spam?
Spam refers to the use of electronic messaging systems to send out
unrequested or unwanted messages in bulk.
OR
Spam is unsolicited Internet content that is typically sent in bulk for advertising purposes from an unknown sender.
9. Write a short note on the following:
Hacking, Copy protection, Software Piracy, Spamming, Phishing ,
Encryption, Decryption
0 Comments