Ethics and Safety Measures in Computing

Quick Check

Fill in the blanks.

  1. The Internet is often referred to as a global network of computers that connects millions of computers and computer networks.
  2. E-banking, also known as online banking, allows customers to conduct financial transactions on a secure website.
  3. Plagiarism refers to the use of other persons ideas or a part of their copyrighted work and pretending that it is your own.
  4. Software piracy is the most common form of computer crime, where illegal copying of software is done for the purpose of distribution or sale.
  5. Intellectual Property Rights include copyrights, patents and trademarks and they protect the rights of creative people to stop unauthorized or illegal reproduction of their work by others.

Choose True or False for the following statements.

  1. Making regular backups of your data is not necessary as data loss rarely occurs. False
  2. Keeping your antivirus updated in your system is an important security measure. True
  3. A firewall is a network security system that controls incoming and outgoing network traffic based on predetermined security rules. True
  4. An active digital footprint includes data that you intentionally submit online. True

Time to Perform

A Fill in the blanks.

  1. The Internet is also called global network of computers.
  2. A search engine helps to access the desired information from the Internet.
  3. E-commerce refers to buying and selling of various products online.
  4. E-banking allows customers to conduct financial transactions on a secure website.
  5. Most of the service providers offer e-mail accounts free of cost.

B State whether the following statements are true or false.

  1. www.google.com does not offer e-mail service. False
  2. You need to register, choose an e-mail ID and create a password to access an e-mail service. True
  3. E-commerce is available only during the day. False
  4. The Internet and games played on it can become very addictive. True
  5. Ethics are required to maintain the system security. True

C Name the following.

  1. Use of other persons’ copyright work and pretend that it is your own. Plagiarism
  2. Cybercrime where an e-mail is sent to a person misguiding him to believe that it is from the trusted organization. Phishing
  3. Getting into someone else’s computer system illegally without their permission. Hacking
  4. Hacking done for a good cause. Ethical Hacking
  5. Illegal copying of software. Software Piracy

D Match the columns.

  1. Trademark→ten years validity→used by companies.
  2. Copyright→more than seventy years validity→protects the rights of creative people.
  3. Patents→twenty years time period→granted to inventor.
  4. Intellectual Property Rights→protects the information from getting copied, pirated→enforced by a court.
  5. Plagiarism→prevented by citation→to acknowledge the original writer.

E Answer the following questions.

  1. Enlist the benefits of e-mail.
    a. It can contain text, pictures and sound.
    b. It is the fastest means of communication.
    c. It is the cheapest means of communication.
  2. Describe the unethical practices on the Internet.
    a. Plagiarism: the use of other persons’ ideas and pretend that it is their own.
    b. Cyberbullying: use of the Internet tools to make the other person angry, sad, or scared.
    c. Phishing: a misguiding e-mail is sent to make people believe that it is from a trusted organization.
    d. Hacking: getting unauthorized access into someone’s computer without their permission.
    e. Spamming: sending unwanted e-mails in bulk from unknown sources.
    f. Software Piracy: illegal copying of software for the purpose of distribution or sale.
  3. Write a note on intellectual property rights and the measures to protect them.
    Intellectual Property Rights refer to the exclusive rights of an individual/company to use its own plans or ideas without the worry of someone else stealing the credit for it. The measures to protect IPR are:
    a. Patents: rights given to the inventors to make, use and sell their inventions for a fixed duration of time.
    b. Copyright: protects the rights of creative people to stop illegal reproduction of their work.
    c. Trademark: name or symbol used by a company that can’t be used by another company.
  4. Enlist the guidelines to prevent the following:
    a. Software piracy: Always use a licensed software.
    b. Hacking: keeping your antivirus updated.
    c. Spamming: do not reply to spams.
    d. Phishing: always use official banking websites.
    e. Plagiarism: by using citations (acknowledging the original writer from where the content has been taken).
    f. Cyberbullying: never reveal our personal information to an unknown person.
  5. Explain digital footprint and its types.
    Digital Footprints are the information about a person on the Internet due to his/her online activity. They are of two types:
    a. Active Digital Footprint: includes data that we intentionally submit online.
    b. Passive Digital Footprint: data left by a user unintentionally.

Extra Questions

  1. Online education is also called e-learning.
  2. The first India Copyright Act was passed in the year 1914.
  3. Backup means creating duplicate copies of important data and software on a storage device.
  4. E-commerce is available 24 × 7. True/False
  5. Name few websites that offer e-mail service.
    www.gmail.com
    www.yahoomail.com
    www.rediffmail.com
  6. What are the disadvantages of using the Internet?
    a. Easy to hide one’s identity
    b. Addictive and leads to wastage of time.
    c. Prone to identity theft.
    d. Spam and advertising.
    e. Health issues and obesity.
    f. Virus threat.
  7. List some of the computer ethics to be followed by the users.
    a. Avoid spying on other people’s computer.
    b. Avoid using someone’s computer without his/her consent.
    c. Avoid using pirated software.
    d. Be respectful.
    e. Do not steal anyone’s information.
    f. Do not spread fake message.

Leave a Reply

Your email address will not be published. Required fields are marked *