Class 9 ETHICS IN IT CHAPTER 5 (1)


        CHAPTER -5

        ETHIS IN IT

      1. Fill in the blanks:

      1. Directly copying text, word is called Plagiarism.

      2. Hacking refers to attempts to gain information from otherwise undisclosed areas.

      3. Counterfeiting refers to unauthorize duplication of computer software.

       

      2. Multi choice Questions:

      1. C is ICT stand for Communication

      2. Making illegal copies of copyrighted software is called Software piracy

      3. Purchasing of only one licensed copy of a software and distribution/loading it into multiple system is called as – Soft lifting

       

      3. Answer the following:

      1. What are the main functions related to information?

      In different section Information Technology define by Information Technology Association of America (ITAA) as “the study, design, development, implementation, support or management of computer-based information systems, particularly software applications and computer hardware.” In today’s world it has huge effect in human life, everything that is done has been electronically such as making notes, report making, record of daily transaction etc. Not only in business sector but in day-to-day life it has an adverse effect.

      2. Define the term plagiarism.

      Plagiarism is the act of stealing someone’s ideas or works and passing them off as your own. This includes text, media, and even ideas.

      3. What is software piracy? What are its common forms?

      Software piracy is the act of stealing software that legally protected. This stealing includes copying, distributing, modifying, or selling the software.

      Software Piracy’s common form are:

      i) Softlifting

      ii) Hard disk loading

      iii) Counterfeiting

      iv) Renting

      v) End use piracy

      4. Write down the major issues of security and integrity of information.

      Integrity means that data is protected from unauthorized changes to ensure that it is reliable and correct. The major issues are:

      Computer Virus

      Virus and Worms are malicious software programs (malware) aimed at destroying an organization’s systems, data and network. A computer virus is a malicious code that replicates by copying itself to another program system or host file.

      Phishing attacks

      Phishing attacks are a type of information security threat that employs social engineering to trick user into breaking normal security practices and gup confidential information.

      Cyber Crime

      Cybercrime is criminal activity that either targets or uses a computer, a computer network or a network device.

      Software piracy

      Software piracy is the act of stealing software that is legally protected. This stealing includes copying, distributing, modifying or selling the software

      5. Name three types of law that can help restrict software piracy.

      The types of law are:

      i) Copyright

      ii) Trademark

      iii) Patent

      6. An extended synonym for Information Technology is ICT. So how ICT differs from IT?

      Information and communication technology used to handle telecommunications, broadcast media, intelligent building management system, audio visual processing and transmission system, and network-based control and monitoring functions. Although ICT is often considered an extended synonym for information technology (IT), its scope is broader.

      Information Technology (IT) is the use of the computer to store, retrieve, transmit, and manipulate data, or information, often in the context of a business or other enterprise.

      7. IT security today has become a major point of concern. What comes under IT security?

      NETWORK SECURITY

      Network security is the security provided to a network from unauthorized access and risks.

      FIREWALLS     

      A firewall is a network security system that manage and regulates the network traffic based on some protocols.

      INTERNET SECURITY
      Internet security deals largely with the transit of information.

      ANTIVIRUS

      It is used to remove harmful software from the computer

      PASSWORD SECURITY

      Passwords provide the first line of defense against unauthorized access to your computer and personal information.

      8. Elaborate the term software ethics.

      In a nut shell, the objectives of computer ethic are to ensure the privacy and safety of computer users, to helps people use the computer in right way and to guarantee that the works that done by someone did not declare by other people.

      Therefore, we must follow all the ways to improve our ethics in order to achieve all the objectives as this issue really important in our daily life which are to protect our privacy, maintain our security and to respect others.

      9. Explain the need of protecting intellectual property right.

      Intellectual property is defined as any work that is creative and include inventions, literary works, images, and symbols. With the introduction of the internet, laws surrounding intellectual properties have changed significantly. In other words, these are the rights of the owner of information to decide how much information is to be exchanged, shared or distributed. The three types of law that protect intellectual property are copyrights, trademarks, and patents.

       

      Table of Content