Computing and Ethics

Software ethics refers to ensuring that the software being used is not pirated or unauthorized. Avoid using unauthorized copy of software by using public domain software or shareware. The major ethical issues include Individual’s Right to Privacy, Intellectual Property Rights and Accuracy of Information. Individual Right to Privacy involves issues like what information must be revealed to others under what conditions and with what safeguards. Issues pertaining to Individual’s Right to Privacy are collecting information, storing information and distributing information. Intellectual Property Rights are the rights of the owner to decide pricing, exchanging, sharing or distribution of his property. The ethical issues involved with Intellectual Property Rights are that the information must not be exchanged without the consent of the owner and the owner has every right to ensure that the information given to him is authentic, authorized and accurate. It is the responsibility of the owner to ensure the security of information, material or things after purchasing them.

Two major threats to security of software and information sources are hacking and software piracy. Hacking is an attempt to gain information from undisclosed areas. Hackers hack systems with malicious intent and to damage some important system information. Software piracy is the unauthorized duplication of computer software. It refers to the denial of the intellectual property rights to the software developer. Common forms of software piracy include softlifting, uploading and downloading, software counterfeiting, hard disk loading and renting. The issues involved with software piracy are copyright, patent and trademark. Cyber crime involves a computer and a network. Cyber crime is an unlawful act where in the computer is either a tool or a target or both. Cyber law describes legal issues related to use of internetworked information technology.

To Access the full content, Please Purchase

  • Q1

    Sending of bulk mail by an identified or unidentified source is known as

    Marks:1
    Answer:

    spam.

    Explanation:
    Spamming refers to sending of bulk mail by an identified or unidentified source. In non-malicious form, advertising mails in bulk are sent to many accounts. In malicious form, the attackers keep on sending bulk mail until the mail server runs out of disk space.
    View Answer
  • Q2

    A set of moral principles that regulate the use of computers is known as

    Marks:1
    Answer:

    computer ethics.

    Explanation:
    Ethics is a set of moral principles that govern the behaviour of a group or individual. Therefore, computer ethics is set of moral principles that regulate the use of computers. Some common issues of computer ethics include intellectual property rights (such as copyrighted electronic content), privacy concerns and how computers affect the society.
    View Answer
  • Q3

    A person who breaks into computer system/network as a part of computer security program is known as a

    Marks:1
    Answer:

    hacker.

    Explanation:
    Hacker is the person who enjoys in exploring the details of programmable system. They are more interested in gaining knowledge about computer systems and possibly use this knowledge for playful pranks.
    View Answer
  • Q4

    The advantage of online backup is that it saves our data from

    Marks:1
    Answer:

    catastrophic failures.

    Explanation:

    Online backup is a type of off-site backup. It stores your data at different locations in different countries. So, there is no risk of losing the data due to natural disasters.

    View Answer
  • Q5

    Software that spies on your computer activities is

    Marks:1
    Answer:

    spyware.

    Explanation:
    Spyware refers to programs that use your internet connection to send information from your personal computer to some other computer normally without your knowledge or permission.
    View Answer