Monday, 12 December 2016

Lesson 8. Moral and Ethics

Lesson 8. Moral and Ethics
Q1. Fill in the Blanks
1.     ………………… deals with determination of what is right and wrong, and then doing the right things. Ethics
2.     ………………… principles should justify the actions of computer professionals and users. Ethical
3.     Ethical principles are based on …………………… values. moral
4.     Norms and Principles (for IT professionals) are stated under ………………………………….. code of ethics
5.     The ethical issues for computer users are ………………………………………………… software piracy and unauthorized access
6.     Accessing data without permission is called ……………………………………………… unauthorized access
7.     If a person is not authorized and if he tries to access information then it becomes ………………………………….. OR Accessing data/systems/information without proper permission is called ………………………………………….. unauthorized access
8.     Promoting integrity and confidentiality of data is maintaining ……………………………… privacy
9.     ……………….. is a legal use of copyrighted material without explicit permission from the copyright holder. Fair use
10.                        Unauthorized duplication and use of software is called ……………………………….. Software piracy
11.                        …………………………… indicates rule and regulations to be obeyed in the organization. Business ethics
12.                        An unlicensed copyrighted software is called a …………………………. software. pirated
13.                        …………………………….. is to maintain data confidentiality so as to promote integrity of data. privacy
14.                        Software which is available for limited period is known as ………………………….. shareware
15.                        …………………….. is safe copy of a program ( in anticipation of corruption of the original) Backup
16.                        A CD distributed with a magazine contains ……………………….. Type of software. shareware
17.                        The rules and laws for using software purchased (by an individual or organization) is specified in …………………………………… license agreement
18.                        …………………….. Crime refers to any activity done with criminal intend on the internet and WWW. Cyber
19.                        …………………… refers to all the legal and regulatory aspects of the internet and WWW. Cyber Law
20.                        …………. ensures that the document in electronic form originated from personal signing it and that was not tampered with after it was applied. Digital signature
Q2. State True or False
1.     Generally accepted standards of right and wrong in a society are called moral values.  True
2.     Code of ethics is a set of moral standards. True
3.     A user must install and use software as per the license agreement. True
4.     Computer professionals are expected to maintain the integrity and reliability of information system. True
5.     Students are allowed to download and use authorized copy of any software. False
6.     Digital signature as per Indian IT act 2000 gives legal recognition to any transaction carried out by e – commerce. True
Q3. Rewrite the following statements by selecting correct alternative.
1.     Generally accepted social standard of right and wrong actions is called ……………… morals
2.     To determine what is right or wrong then take the right actions is called ………………….. ethics
3.     Making an unauthorized copy of a copyrighted program is called ……………………… software piracy
4.     General norms and principles for computer professionals are stated under ………………….. Code of Ethics
5.     Cyber law is a part of …………………………….. IT Act 2000
Q4.  Rewrite the following statements by selecting two correct alternatives.
1.     The ethical issues for computer users are ………………………….. , ……………………….. software piracy , unauthorized access
2.     What steps should be taken to stop software piracy?
…………………………………………………………. , ………………………………………………………….. Purchase license software, Purchase license products from authorized seller
Q5. Answer the following questions:
1.     Define the terms 1) Moral 2) ethics
Ans: Morals: - Morals tells us whether an action is right or wrong. In ICT software piracy, unauthorized access to others private data and not respecting others' intellectual property rights are morally wrong.
Ethics: - The principles of right and wrong that are accepted by an individual or a group are known as ethics. For example, Business Ethics defines what is right or wrong in an organization.
2.     Explain Intellectual property Rights?
Ans: Intellectual property rights are the rights given to persons over the creations of their minds. They usually give the creator an exclusive right over the use of his/her creation for a certain period of time. Intellectual property rights are customarily divided into two main areas:
The rights of authors of literary and artistic works (such as books and other writings, musical compositions, paintings, sculpture, computer programs and films) are protected by copyright, for a minimum period of 50 years after the death of the author.
Also protected through copyright and related rights are the rights of performers (e.g. actors, singers and musicians), producers of phonograms and broadcasting organizations. The main social purpose of protection of copyright and related rights is to encourage and reward creative work.
3.     Explain the concept of freeware and shareware?
Ans: Software that is free to distribute, copy and use is known as Freeware.

Shareware on the other hand is free to distribute and copy, but can only be used freely for a limited period of time. After the evaluation period, usually around 30 days, if the user still wishes to use the software a donation is expected by the creator of the software.
4.     Discuss Cyber Law?
Ans: Cyber Laws are laws enacted by the Government to prevent cyber crimes like:-
1. Software Piracy
2. Unauthorized access to another person's computer and personal information
3. Spread of misinformation or other prohibited material.
4. Stealing using Computer technology.
5. blocking others use of Computers using viruses, or other malware.
6. Sending unwanted emails or Spamming.
The I. T. Act 2000 is one such Cyber Law which is in force in India.
Q6. Answer in brief
1.     Discuss ethics for a computer professional.
Ans: Computer ethics or Cyber ethics are the rules governing the use of computers. Some of the rules are as follows:
1. Do not indulge in software piracy.
2. You must not harm or spread misinformation about others.
3. You should not use the computer to steal anything including intellectual property that belongs to someone else.
4. Respect others privacy and do not try to access their information.
5. You must not do anything to block other users from using their computers or accessing the Internet.
2.     Explain IT Act 2000.
Ans: An Act to provide legal recognition for transactions carried out by means of electronic data interchange and other means of electronic communication, commonly referred to as "electronic commerce", which involve the use of alternatives to paper-based methods of communication and storage of information, to facilitate electronic filing of documents with the Government agencies. This Act may be called the Information Technology Act, 2000.It shall extend to the whole of India and, save as otherwise provided in this Act, it applies also to any offence or contravention thereunder committed outside India by any person. "access" with its grammatical variations and cognate expressions means gaining entry into, instructing or communicating with the logical, arithmetical, or memory function resources of a computer, computer system or computer network. "Addressee" means a person who is intended by the originator to receive the electronic record but does not include any intermediary. Besides having provisions to prevent misuse as detailed above, the I. T. Act 2000 encouraged the use of ecommerce and tried to protect the interests of both the buyers and the sellers. The use of digital signatures, security procedures and multi-level verification methods has resulted in lower misuse of the Internet.
3.     Discuss copyright and software piracy?
Ans: Copyright is a legal right created by the law of a country that grants the creator of an original work for its use and distribution. This is usually only for a limited time. The exclusive rights are not absolute but limited by limitations and exceptions to copyright law, including fair use.

Software piracy is the illegal copying, distribution, or use of software. It is such a profitable "business" that it has caught the attention of organized crime groups in a number of countries. According to the Business Software Alliance (BSA), about 36% of all software in current use is stolen. Software piracy causes significant lost revenue for publishers, which in turn results in higher prices for the consumer.

1 comment:

  1. This is something worth sharing.I was in search of these papers. I would love to share it with my friends too. Do you have further question and answers on the same subject?

    ReplyDelete