Lesson 8. Moral
and Ethics
Q1. Fill in the Blanks
1.
………………… deals with determination of what is right and wrong, and then
doing the right things. Ethics
2.
………………… principles should justify the actions of computer professionals
and users. Ethical
3.
Ethical principles are based on …………………… values. moral
4.
Norms and Principles (for IT professionals) are stated under
………………………………….. code of ethics
5.
The ethical issues for computer users are ………………………………………………… software piracy and unauthorized access
6.
Accessing data without permission is called ……………………………………………… unauthorized access
7.
If a person is not authorized and if he tries to access information then
it becomes ………………………………….. OR Accessing data/systems/information without proper
permission is called ………………………………………….. unauthorized
access
8.
Promoting integrity and confidentiality of data is maintaining
……………………………… privacy
9.
……………….. is a legal use of copyrighted material without explicit
permission from the copyright holder. Fair
use
10.
Unauthorized duplication and use of software is called ……………………………….. Software piracy
11.
…………………………… indicates rule and regulations to be obeyed in the
organization. Business ethics
12.
An unlicensed copyrighted software is called a …………………………. software. pirated
13.
…………………………….. is to maintain data confidentiality so as to promote
integrity of data. privacy
14.
Software which is available for limited period is known as ………………………….. shareware
15.
…………………….. is safe copy of a program (
in anticipation of corruption of the original) Backup
16.
A CD distributed with a magazine contains ……………………….. Type of software. shareware
17.
The rules and laws for using software purchased (by an individual or
organization) is specified in …………………………………… license agreement
18.
…………………….. Crime refers to any activity done with criminal intend on the
internet and WWW. Cyber
19.
…………………… refers to all the legal and regulatory aspects of the internet
and WWW. Cyber Law
20.
…………. ensures that the document in electronic form originated from
personal signing it and that was not tampered with after it was applied. Digital signature
Q2. State True or False
1.
Generally accepted standards of right and wrong in a society are called
moral values. True
2.
Code of ethics is a set of moral standards. True
3.
A user must install and use software as per the license agreement. True
4.
Computer professionals are expected to maintain the integrity and
reliability of information system. True
5.
Students are allowed to download and use authorized copy of any
software. False
6.
Digital signature as per Indian IT act 2000 gives legal recognition to
any transaction carried out by e – commerce. True
Q3. Rewrite the following statements by
selecting correct alternative.
1.
Generally accepted social standard of right and wrong actions is called
……………… morals
2.
To determine what is right or wrong then take the right actions is
called ………………….. ethics
3.
Making an unauthorized copy of a copyrighted program is called ………………………
software piracy
4.
General norms and principles for computer professionals are stated under
………………….. Code of Ethics
5.
Cyber law is a part of …………………………….. IT Act 2000
Q4.
Rewrite the following statements by selecting two correct alternatives.
1.
The ethical issues for computer users are ………………………….. , ……………………….. software piracy , unauthorized access
2.
What steps should be taken to stop software piracy?
………………………………………………………….
, ………………………………………………………….. Purchase
license software, Purchase license products from authorized seller
Q5. Answer the following questions:
1.
Define
the terms 1) Moral 2) ethics
Ans: Morals: - Morals tells us whether an action is right or wrong. In ICT software
piracy, unauthorized access to others private data and not respecting others'
intellectual property rights are morally wrong.
Ethics: - The principles of right and wrong that are accepted by an individual or a group are known as ethics. For example, Business Ethics defines what is right or wrong in an organization.
Ethics: - The principles of right and wrong that are accepted by an individual or a group are known as ethics. For example, Business Ethics defines what is right or wrong in an organization.
2.
Explain
Intellectual property Rights?
Ans: Intellectual
property rights are the rights given to persons over the creations of their
minds. They usually give the creator an exclusive right over the use of his/her
creation for a certain period of time. Intellectual property rights are
customarily divided into two main areas:
The rights
of authors of literary and artistic works (such as books and other writings,
musical compositions, paintings, sculpture, computer programs and films) are
protected by copyright, for a minimum period of 50 years after the death of
the author.
Also protected through copyright
and related rights are the rights of performers (e.g. actors, singers and
musicians), producers of phonograms and broadcasting organizations. The main
social purpose of protection of copyright and related rights is to encourage
and reward creative work.
3.
Explain the concept of freeware
and shareware?
Ans:
Software that is free to distribute, copy and use is known as Freeware.
Shareware on the other hand is free to distribute and copy, but can only be used freely for a limited period of time. After the evaluation period, usually around 30 days, if the user still wishes to use the software a donation is expected by the creator of the software.
Shareware on the other hand is free to distribute and copy, but can only be used freely for a limited period of time. After the evaluation period, usually around 30 days, if the user still wishes to use the software a donation is expected by the creator of the software.
4.
Discuss Cyber
Law?
Ans: Cyber Laws are laws enacted by the Government to prevent cyber crimes
like:-
1. Software Piracy
2. Unauthorized access to another person's computer and personal information
3. Spread of misinformation or other prohibited material.
4. Stealing using Computer technology.
5. blocking others use of Computers using viruses, or other malware.
6. Sending unwanted emails or Spamming.
The I. T. Act 2000 is one such Cyber Law which is in force in India.
1. Software Piracy
2. Unauthorized access to another person's computer and personal information
3. Spread of misinformation or other prohibited material.
4. Stealing using Computer technology.
5. blocking others use of Computers using viruses, or other malware.
6. Sending unwanted emails or Spamming.
The I. T. Act 2000 is one such Cyber Law which is in force in India.
Q6. Answer in brief
1.
Discuss ethics
for a computer professional.
Ans: Computer
ethics or Cyber ethics are the rules governing the use of computers. Some of
the rules are as follows:
1. Do not indulge in software piracy.
2. You must not harm or spread misinformation about others.
3. You should not use the computer to steal anything including intellectual property that belongs to someone else.
4. Respect others privacy and do not try to access their information.
5. You must not do anything to block other users from using their computers or accessing the Internet.
1. Do not indulge in software piracy.
2. You must not harm or spread misinformation about others.
3. You should not use the computer to steal anything including intellectual property that belongs to someone else.
4. Respect others privacy and do not try to access their information.
5. You must not do anything to block other users from using their computers or accessing the Internet.
2.
Explain IT Act
2000.
Ans: An Act to provide legal recognition
for transactions carried out by means of electronic data interchange and other
means of electronic communication, commonly referred to as "electronic
commerce", which involve the use of alternatives to paper-based methods of
communication and storage of information, to facilitate electronic filing of
documents with the Government agencies. This Act may be called the Information
Technology Act, 2000.It shall extend to the whole of India and, save as
otherwise provided in this Act, it applies also to any offence or contravention
thereunder committed outside India by any person. "access" with its
grammatical variations and cognate expressions means gaining entry into,
instructing or communicating with the logical, arithmetical, or memory function
resources of a computer, computer system or computer network.
"Addressee" means a person who is intended by the originator to
receive the electronic record but does not include any intermediary. Besides having provisions to prevent misuse as
detailed above, the I. T. Act 2000 encouraged the use of ecommerce and tried to
protect the interests of both the buyers and the sellers. The use of digital
signatures, security procedures and multi-level verification methods has
resulted in lower misuse of the Internet.
3.
Discuss
copyright and software piracy?
Ans: Copyright is a legal right
created by the law of a country that grants the creator of an original work for its use and distribution. This is
usually only for a limited time. The exclusive rights are not absolute but limited
by limitations and exceptions to copyright law, including fair
use.
Software piracy is the illegal copying,
distribution, or use of software. It is such a profitable "business"
that it has caught the attention of organized crime groups in a number of
countries. According to the Business Software Alliance (BSA), about 36% of all
software in current use is stolen. Software piracy causes significant lost
revenue for publishers, which in turn results in higher prices for the consumer.