1.
|
What do you mean by privacy?
|
Privacy is unethical to infringe in the privacy of other people without
the consent of the person.
|
|
2.
|
Define the term ethics.
|
Ethics and beliefs are rules. These
rules state what is right and what is wrong.
|
|
3.
|
Name the different forms of
piracy.
|
End-User Piracy, Internet Piracy, Pre-Installed Software Piracy,
Counterfeiting, Online Auction Piracy are the various forms of piracy.
|
|
4.
|
What are the limitations of pirated
software?
|
·
No warranty protection
·
Contain viruses
|
|
5.
|
What does a copyright symbol
indicate?
|
Copyright means All Rights Reserved.
This symbol shows the sole property of the owner. It is unlawful and unethical to use them
without the permission of the owner.
|
|
6.
|
Explain the importance of
ethics.
|
·
Satisfying Basic
Human Needs
·
Creating Credibility
·
Uniting People and
Leadership
·
Improving Decision
Making
·
Long Term Gains
·
Securing the Society
|
|
7.
|
What are intellectual property
rights?
|
The rights related to literary or artistic work, inventions,
discoveries, etc. are called Intellectual Property Rights.
|
|
8.
|
What is software piracy?
|
Software piracy is the illegal reproduction and distribution of
software applications.
|
|
9.
|
Explain software breaches in
computer.
|
Hardware breaches: can be
both intentional and accidental. Cables,
modems, phone lines are often vulnerable to security breaches.
Software breaches: include
computer viruses, password cracking.
Network breaches: are used
to transmit data and information, they may be trapped by unethical people to
access information about a company.
Natural disasters: like
hurricanes, earthquakes, floods are security breaches.
Computer security controls
are established and implemented to reduce security breaches.
|
|
10.
|
What is the difference between
hacker and cracker?
|
A hacker is a person who
breaks into a computer system to get illegal access to the information stored
there. Hacker may not cause any harm
to the system or organization.
A cracker is a person who
breaks into a computer system just like a hacker, with the intention to steal
passwords, files or programs for unauthorized use. They may sell the information to some other
people for money.
|
|
11.
|
What do you mean by referencing?
|
If some material is downloaded, we must acknowledge the author
sincerely. This is called referencing.
for extra reading: http://www.managementstudyguide.com/importance-of-ethics.htm |
Monday, February 4, 2013
Std - 8 - Chapter 8
Subscribe to:
Post Comments (Atom)
Std 7 - Chapter - 7 More on Internet
Chapter - 7 More on Internet 1. What is World Wide Web? The World Wide Web (abbreviated as WWW...
-
Chapter - 5 Computer Virus 1. What are the symptoms of a computer virus? Symptoms of a virus include com...
-
Chapter - 2 More on MS Windows 7 1. What is the use of Select all option? Select all option is used to selec...
-
MS Access 2007: Queries, Forms and Reports 1. When do you use a Form? Form is a graphical representation of a table. Forms are use...
No comments:
Post a Comment