Q. What do you mean by ethics? What is it necessary?
Ans: Ethics is the classical sense, refers to the rules and standards governing the conduct of an individual with others. In order to keep healthy environment in computer room, to make good relation co-workers and to improve the working efficiency some basic ethics are necessary.
Q. What is Spam?
Ans. Spam are unwanted e-mail which are business related and sent to the e-mail account in bulk.
Q. what is Hacking?
Ans. Hacking is a technique by which some computers experts reach to any private or confidential area of the computer and steal information available on the computer.
Q. What do you know about computer viruses?
Ans. Computer Viruses are generally developed with a definite intention to change computer files or cause inconvenience and annoyance to computer users.
Q. Do computers have an impact in our daily lives. Give examples to support your argument.
Ans. Yes. Computers prevail every aspect of modern life.
Q. What do you understand by ‘Intellectual Property Rights’?
Ans. Intellectual property rights are the rights given to people for the original creations of their minds. They usually give the creator an exclusive rights over the use of his/her creation for a certain period of time.
Q. Name the types of intellectual property rights.
Ans. The types of intellectual property protection rights are Copyright. Patents and Trademarks.
Q. Complete the following abbreviation: NASSCOM, HOLMES, DPA.
Ans. NASSCOM: National Association of Software and Service Companies. HOLMES: Home Office Large Major Enquiry System. DPA : Data Protection Act.
Q. What should a user had do to protect the database from being changed or misused by other internet users.
Ans: User should have to change his/her password very frequently.
Q. What do you know about software copyright law?
Ans. Computer software is covered by the laws, which covers a wide range of intellectual property such as music, literature and software. The main provisions of the act is to make illegal to:(i) Copy software.(ii) Run pirated software.(iii) Transmit software over a telecommunication line, thereby creating a copy.
Q. List the measure taken by an individual to protect his/her rights to privacy.
Ans.(i) Avoid being added to mailing lists.(ii) Make online purchase only through secure websites.(iii) Never assume that your e-mail is private.(iv) Be careful when posting to newsgroups.(v) Do not make online argument.
Q. What is the difference between Junk and Junk e-mails.
Ans. Junk faxes: The unsolicited and unwanted messages receive from unnamed senders, are junk faxes. junk e-mails: The unwanted messages from various senders in an electronic mail box are junk e-mail.
Q. What is spoofing?
Ans. Spoofing enables the junk e-mail to hide his or her identity from the recipient spoofing the sender places a false return address on the junk message.
Q. What do you understand by Malicious code?
Ans. Malicious code can be defined as “software which interferes with the normal operation of a computer system”
Q. Name the types of malicious code?
Ans. There are three types of malicious code: (i) Virus (ii) Worm (iii) Trojan.
Q. What is worm?
Ans. A program which copies itself into nodes in a network, without permission is called a worm.
Q. What is Trojan?
Ans. A program which masquerades as a legitimate program, but does something other than what was intended.
Q. What is viruses?
Ans. Viruses are generally developed with a definite intention to damage files or cause inconvenience and annoyance to computer users.
Q. What a short note on Cyber Crime.
Ans. Cyber Crime: Cyber crime is that crime which is done through internet. The Cyber act 2000, was now enforced by Indian government to punish the cyber Criminals.
The points of cyber act 2000 are as follows. (i) The documents transferred through internet are legally valid and can be produced in court of law. (ii) The digital signatures are described on Authentic documents. (iii) Cyber crime is defined and provision of giving punishment to the cyber criminals. (iv) A plan is made to investigate the cyber crime and to take action on the criminal activities in cyber field.
Q. The illegal use of computer system is sometimes known as computer related crimes. (i) Give three distinct examples of computer related crimes. (ii) Give three steps can be computers related crimes are:
Ans: (a) Hacking: Hacking is defined as unauthorized access to data held on computer system. Hacking is often caused by employees of a company who have inside knowledge of particular users and passwords. The ability of such hackers to carry out illegal actions without being detected is hampered by the audit and monitor software that comes with operating systems. The motive behind hacking can often be mischievous, computing student who are learning about operating system may take delight in penetrating a school’s security system to prove that it can be done.
(b) Viruses: Viruses are generally developed with a definite intention to damage computer files or, cause inconvenience and annoyance to computer user. The virus usually overwrites the first few instructions of a particular program on an infected disk and relies on a user choosing to execute that program. When an infected program is executed the virus spreads by first series of instructions. In most cases the viruses first action is to copy itself from the diskette into the PC and hide within obscure files. The virus can than proceed to perform any of the tasks ranging from irritating to disaster such as reformatting the hard disk. Some viruses lie sleeping waiting to be particular event or date the ‘Friday 13th virus’ being a well-known one. The virus then infect other diskettes or spreads through e-mail to other system.
(c) Spamming: Spam are unwanted e-mail which are business related and sent to the e-mail account in bulk. This fills the e-mail storage capacity and wastes user time because the subject are shown very attractive like- ‘Some one is waiting for you’, ‘Get a car free’, ‘Give answer and be millionaire’ etc., and users could not resist themselves from reading it. Some times they get many links on that e-mail and visit on different web sites. Thus it is clear that spams are unwanted e-mail which waste our time, efforts and cover the memory space Sometimes they send virus too. (ii) The three steps that can be taken to help in preventing computer related crimes are:
(a) In Cyber act 2000 there are various sections in which hackers can be pushed. In section 43 and 44 punishment are very hard so it is very difficult to courage to hack the system. According to section 43 of Cyber act 2000 t he hacker can be fined upto Rs. One crore.
(b) To protect the computer from virus users must have a latest powerful anti virus software which can scan all types of virus and kill them if encountered.
(c) To protect the computer against spam, there are some tools know as filter. The filters are software which control the flow of e-mail, Spam Cide Spam Hater, Spam Attack Pro and Spam EX are example of such filters.
Q. Describe four separate measure that can be taken to prevent accidental or deliberate misuse of date on a stand- alone computer system.
Ans:- Measure that can betaken include:
(i) Physical restrictions to the computer departments. Most organizations require all employees to wear an ID badge. The computer rooms are commonly protected from access by a locked door, which can only be opened by authorized personnel.
(ii) While using a computer terminal, people are require to sign on with a user-ID and password, Password must not be written down must not be composed of common names, word or dates and must be changed frequently.
(iii) Restrictions are placed on the location and time at which computer can be used to access data. So that for example a user in the production department will not be able to access records.
(iv) Special software can be installed on a computer system which will maintain an ‘audit’ of who has logged on from which computer terminal and for how much time. This will enable any unusual activity to be spotted and investigations made.
Q. What do you understand by Internal and External threats to a computer system.
Ans:- Internal Threats: Data and programs within a computer system are vulnerable to deliberate and accidental destruction both from within an organization and from outside it. When it is floppy disk, Which after months of the project loading without complaint. comes up with a message, disk unreliable, then it is termed as Internal Threat to the system.
External Threats: Criminals hacking into major banks computer system can steal millions or rupees i.e., by transferring money to phony accounts or making fund credit and purchased. This phenomenon is called as External Threat to the system.
Q. Describes some Internal Threats to the system.
Ans. Internal Threats to the System.
Some Internal Threats to the System are as follows.
(i) Hardware Failure:- A disk head crash for example can make the contents of a hard disk unreadable.
(ii) Faulty Procedures:- A careless employees who makes entries into an accounts system can cause havoc.
(iii) Natural Disasters:- Fire flood hurricanes and earthquakes can destroy a building taking every last customer record with it.
(iv) Dishonest staff:- Computer systems are vulnerable fraud and theft of data both from inside and outside the organization.
Q. Mention some External Threats to the systems.
Ans: External Threats to the Systems.
(i) Hackers gaining entry to company databases and stealing or corrupting data or using the information gained to carry out fraudulent transctions.
(ii) Viruses being downloaded from the internet.
Unless system are perceived to be secure organization many suffer from a lack of confidence by the customers. Bank are generally reluctant to disclose how much money they have lost through insecure systems. Many people are unwilling to give credit card numbers while making purchased through the Internet.
Q. What do you understand by the word Privacy ? Why does many companies routinely monitor their purchase through the Internet.
Ans. Privacy:- Privacy includes the person’s private information such as address, phone number social security number and so on.
Many companies routinely monitor their employees communications due to several compelling reasons:-
(i) To protect trade secrets.
(ii) To prevent the distribution of libelous or slanderous messages.
(iii) To prevent the system’s users from downloading or copying data that is illegal pornographic or infected by computer viruses.
(iv) To ensure that organizational resources are not being wasted or abused.
Q. What are software ethics?
Ans:-Software ethics refer to ensuring that the software being used is not pirated or unauthorized. These also include developers should be given a fair return of their work.
Q. What are individual’s right to privacy?
Ans:- The right to privacy also involves the decisions pertaining to question like what information about one’s self or one’s associations must a person reveal to other under what conditions and with what safeguards? What things can people keep to them and not be forced to reveal to others?
Q. What are intellectual property rights?
Ans:- Intellectual property rights are the rights of the owners of information to decide how much information is to be exchanged shared or distributed. Also it given the owners a rights to decide the price for doing (exchanging/ sharing/ distributing) so.
Q. Explain in Brief “Software Piracy”?
Ans: The biggest illegal issue affecting the computer industry is Software Piracy. Software Piracy is the illegal copying of programs. it is a crime that effects the sale of original software and encourage illegal work of theft of the effort of the original software makers. Software’s are pirated in many ways. The simplest method is to copy the software from its original floppy disk or CD disk. The piracy is painful for users also because the buyer’s does not take any responsibility, if any action is taken against users by police or software manufacturer.