CHAPTER -5
ETHIS IN IT
1. Fill in the blanks:
1. Directly copying text, word is called Plagiarism.
2. Hacking refers to attempts to gain information from otherwise
undisclosed areas.
3. Counterfeiting refers to unauthorize duplication of computer
software.
2. Multi choice Questions:
1. C is ICT stand for Communication
2. Making illegal copies of copyrighted software is called Software piracy
3. Purchasing of only one licensed copy of a software and
distribution/loading it into multiple system is called as – Soft lifting
3. Answer the following:
1. What are the main functions related to information?
In different section Information Technology define by Information Technology Association of America (ITAA) as “the study, design, development, implementation, support or management of computer-based information systems, particularly software applications and computer hardware.” In today’s world it has huge effect in human life, everything that is done has been electronically such as making notes, report making, record of daily transaction etc. Not only in business sector but in day-to-day life it has an adverse effect.
2. Define the term plagiarism.
Plagiarism is the act of stealing someone’s ideas or works and passing them off as your own. This includes text, media, and even ideas.
3. What is software piracy? What are its common forms?
Software piracy is the act of stealing software that legally protected. This
stealing includes copying, distributing, modifying, or selling the software.
Software
Piracy’s common form are:
i) Softlifting
ii) Hard disk loading
iii) Counterfeiting
iv) Renting
v) End use piracy
4. Write down the major issues of security and integrity of information.
Integrity means that data is protected from unauthorized changes to
ensure that it is reliable and correct. The major issues are:
Computer
Virus
Virus and Worms are malicious software programs (malware) aimed at destroying an organization’s systems, data and network. A computer virus is a malicious code that replicates by copying itself to another program system or host file.
Phishing
attacks
Phishing attacks are a type of information security threat that employs social engineering to trick user into breaking normal security practices and gup confidential information.
Cyber
Crime
Cybercrime is criminal activity that either targets or uses a computer, a computer network or a network device.
Software
piracy
Software piracy is the act of stealing software that is legally protected. This stealing includes copying, distributing, modifying or selling the software
5. Name three types of law that can help restrict software piracy.
The
types of law are:
i) Copyright
ii) Trademark
iii) Patent
6. An extended synonym for Information Technology is ICT. So how ICT
differs from IT?
Information and communication technology used to handle telecommunications, broadcast media, intelligent building management system, audio visual processing and transmission system, and network-based control and monitoring functions. Although ICT is often considered an extended synonym for information technology (IT), its scope is broader.
Information Technology (IT) is the use of the computer to store, retrieve, transmit, and manipulate data, or information, often in the context of a business or other enterprise.
7. IT security today has become a major point of concern. What comes
under IT security?
NETWORK
SECURITY
Network security is the security provided to a network from unauthorized
access and risks.
FIREWALLS
A firewall is a network security system that manage and regulates the
network traffic based on some protocols.
INTERNET
SECURITY
Internet security deals largely with the
transit of information.
ANTIVIRUS
It is used to remove harmful software from the computer
PASSWORD
SECURITY
Passwords provide the first line of defense against unauthorized access to your computer and personal information.
8. Elaborate the term software ethics.
In a nut shell, the objectives of computer ethic are to ensure the privacy
and safety of computer users, to helps people use the computer in right way and
to guarantee that the works that done by someone did not declare by other
people.
Therefore, we must follow all the ways to improve our ethics in order to achieve all the objectives as this issue really important in our daily life which are to protect our privacy, maintain our security and to respect others.
9. Explain the need of protecting intellectual property right.
Intellectual property is defined as any work that is creative and
include inventions, literary works, images, and symbols. With the introduction
of the internet, laws surrounding intellectual properties have changed
significantly. In other words, these are the rights of the owner of information
to decide how much information is to be exchanged, shared or distributed. The three
types of law that protect intellectual property are copyrights, trademarks, and
patents.
Table of Content
0 Comments