![]() ![]() Malicious code refers to a new kind of threat, which cannot be blocked by using an antivirus software and which corrupts the system in due course of time. Install high quality antivirus programs of a reputed company in the computer to protect it against viruses.Īns. ![]() Unwanted emails offering different schemes and free gifts must not be opened.Unwanted or free software must not be downloaded.Passwords and account information must not be disclosed to others.The following precautions must be followed to protect data: How will you protect your data on the internet?Īns. Confidential documents should be protected using a password.Ģ.Unpaid software and proprietary software must not be copied or used.Secret information should not be stolen from other computers.Follow the rules and regulations while working in a computer lab.Software must not be installed or uninstalled without the permission of the owner.Some of the following ethical values are necessary to foster good relations with the concerned people, which will help to make a healthy environment. Some common issues of computer ethics include Intellectual Property Rights, Privacy concerns and how computers affect society. Ethics is a set of moral principles that govern the behaviour of a group or an individual. What do ethics mean? Mention at least five ethical values related to computers.Īns. Since cyberlaws vary by jurisdiction and country, enforcement is challenging and punishments for Cybercrimes can range from fines to imprisonment.ġ.They protect Privacy, Intellectual Property and Freedom of Speech related to the use of Internet, Cell phones, Computers (Hardware and Software).Cyberlaws prevent or reduce large scale damage from cybercriminal activities.Thus, cyberlaw is the area of law that deals with the Internet’s relationship to technological and electronic elements, including computers, hardware, software and Information Systems. The ‘Information Technology Law’ is also known as Cyber Law.the software/program that is originally developed by the person(s), becomes the intellectual property of the developers.Copyright prohibits the users of a software program from making copies of it without the permission of the person or the company concerned which issues the license for the program Intellectual property means “Ownership of Ideas” i.e. Hacking is usually done due to one of the following reasons:Īns. Hackers also merge wrong information, viruses or corrupt data in the users’ data and thus corrupt the computer systems. Hackers run publicly available programs that automate attempts to break into systems. Hackers are people who use their computer expertise to gain illegal access to confidential data in the systems. The skills and knowledge of computer systems are applied in illegal activities like breaking passwords, releasing viruses to corrupt the system or stealing valuable data. Cyber criminals can be divided into various groups on the basis of their objectives as follows: Cyber criminals take advantage of the lapses and negligence in the computer system and gain unauthorized access and retrieve data from other people’s computers. Sometimes spam may also come with virus files that corrupt the systems.Ĭrimes such as illegal copying of software, computer viruses, stealing of hardware data and other computer related crimes or online computer crimes are called Cybercrimes. Spam messages waste the valuable time of the users and also occupy memory space of the system. Such messages are called spam and they contain commercial advertising, dubious products or get-rich-quick schemes. Often, the titles of these messages are very fascinating and they compel us to read the message. Sometimes when we connect to a website and open our email account, we find that our inbox is filled with many unwanted emails. I) Licensed user duplication for unlicensed users Thus, when someone copies a software without buying the appropriate license or copyright, it is known as software piracy. However, we cannot make copies of this software and load it in other computers. When we purchase an original software, we become the licensed user and we get the right to use it. _ can be used to protect any document on the Internet. ![]() ![]() _ is a threat which corrupts the system and cannot be blocked by an antivirus software.ġ0. It is advised to have _software to protect system from viruses.Ĩ. _ is a set of moral values, which regulates the use of computers.ħ. _are the cyber criminals who crack the password to access the information from the internet.Ħ. A program which may corrupt the files/documents in your computer is known as _ĥ. The process of making duplicate copy of the original software illegally is known as _ģ. The crime committed on the internet is called _Ģ. Computing and Ethics – This chapter has been removed from the current syllabus ( 2021)ġ. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |