Cyber Law and Ethics
Q.1 Fill in
the blanks:
1. Moral refers
to the generally accepted standards of right and wrong in a society.
2. Moral
is a standard of rightness or wrongness.
3. Ethics builds
trust and teamwork.
4. Ethics deals
with the determination of what is right or wrong and then doing the right
thing.
5. Moral value
guide us how to behave in society.
6. Access control list
is used to restrict to an unauthorized access.
7. Software
which is available for limited period, is known as shareware.
8. Ethics gives
justice to each person according to individual effort.
9. Ethics in
business cultivate strong teamwork and productivity.
10. Ethical
principles are based on moral values.
11. Software piracy
is exact copy of a program in seconds.
12. Software piracy
includes downloading software illegally from internet.
13. Cyber crime refers
to all the activities done with criminal intent in cyberspace.
14. Cyber law refers
to all the legal and regularly aspects of internet and the World Wide Web.
15. Any
subscriber makes authenticate an electronic record by affixing his digital signature.
16. Digital
Signature certificate is issued to subscriber.
17. Digital Signature
is used for authentication of electronic record.
18. Linux
is an example of freeware software.
19. Addressee means
a person who is intended by the originator to receive the electronic record.
20. Certifying Authority means
a person who has been granted a licence to issue a Digital Signature
Certificate under section 24.
21. Moral
theory is divided into three parts, moral standards, moral value, and moral judgment.
22. Public
key is used to verify digital signature.
23. ARPANET super
network was born in the year 1996.
24. Conversion
of data into a very secured format is called encryption.
25. Copyright is
a protection that covers the original work.
26. Public domain is
software that is not copyrighted.
27. Moral Standard is
criteria used to decide what is right or wrong.
28. Software piracy is
not a victimless crime.
29. Data means
a representation of information, knowledge, facts, concepts or instructions.
30. Digital Signature means
authentication of any electronic record by a subscriber by means of an
electronic method.
31. Electronic gazette means
the official gazette published in the electronic form.
32. Originator is
person who sends or transmits an electronic message.
33. Secure System means
computer hardware, software and procedure that are reasonably secure from
unauthorized access and misuse.
34. Copyright is
an intellectual property right attached to original works in which the right
exists with originator or creator.
35. The
Internet is Fourth mode of communication.
36. Moral judgment
is a statement about the rightness or wrongness of particular actions.
37. Privacy is
concerned with the publication of true account of private life of individual,
medical confidentiality etc.
38. Private
Key pair is used to create digital
signature.
39. Copying
of a limited amount of material permission is called as fair use.
40. Justice indicates
the “fairness in distribution.”
Q.2. True or false:
1.
Ethics was invented by
bill gates.(False)
2.
There are 10
commandments of computing proposed by computer ethics institute.(True)
3.
Accessing of data
without permission is called authorized access.(False)
4.
Accessing of data without permission is called authorized
access.(False)
5.
Bugs indicate various
types of software errors. .(True)
6.
Thorough freeware is
available at no cost, it is copyrighted. .(True)
7.
gaining access without
users permission is termed as unauthorized access.(True)
8.
Ethical principal are
based on law value. (False)
9.
Software piracy
includes installing and selling unauthorized copies of software. .(True)
10.
Programs can be
copyrighted under ‘literacy work ‘heading. .(True)
12.
The rules for computing
are called commandments. .(True)
13.
Linux is the public
domain software. (False)
14.
Unauthorized access is
one of the ethics for computer user.
(False)
15.
Linux is a example of
shareware software. . (False)
16.
Piracy is duplication
original licence copy.(True)
17.
IT Act deals with
copyright and patents. . (False)
18.
Patents is an
intellectual property right.(True).
19.
Cyber law gives legal
permission to carry out transaction using EDI and electronic media.(True)
20.
Private key is used to
verify a digital signature(False)
21.
Information includes
data, text, images, sound, voice etc.(True)
22.
Law indicates rules and
regulations to be obeyed in the organisation.(True)
23.
Right things does not
depend upon moral principles.(False)
24.
Moral theory is a set
of moral principles, which systematically links moral beliefs to one other.(True)
25.
Information includes
data, text, image, sound and voice etc.(True)
26.
The code of ethics is a
combination of Do’s and Don’ts.(True)
27.
Ethics guidelines are based in information technique,
privacy and fair share of resources.(True)
28.
with pirated software
,consumer can enjoy full benefit.(False)
29.
As per IT act cheques
cannot be in electronic form.(True)
30.
Through freeware is available at no cost, it is
copyrighted.(True)
31.
Copyright is an exact
copy of a program in seconds.(False)
32.
Licence means a licence
granted by operator.(False)
33.
Computer user should
purchase only legitimate software products.(True)
34.
Programmers should not
obey international law while developing software.(False)
35.
Freeware software can
be distributed freely for trial period.(False)
Q.3. Multiple Choice
Questions (Single Answer)
1.
Generally an accepted
standard of right and wrong in a society is called as _______.
a)
moral
b) ethics c)guideline d) code of standard
2.
To determine what is
right and wrong and then doing the right things is called as_______.
a) moral b) ethics c)
law d) patent
3.
___________ is a
criterion used to decide what is right or wrong.
a) moral standards b) moral principle c) moral d) ethics
4.
Morals are
____________________.
a) laws
of governing bodies b) set of standards c) Set of things to be done.
b) d) set of standards
which decide right or wrong
5.
______________
indicates rules and regulations to be obeyed in the organization.
a) ethics b) law c) moral d)privacy
6.
Ethics was invented
by_______________.
a) Immanuel Kant c)Bill gates
b) Team
Patterson d)Denis
Ritche
7.
Moral ____________ is a
statement about the rightness and wrongness of the particular section.
a) Judgement b)Principal c)Standard d)Value
8.
Pirated software
means_______________.
a) Software with
license c) duplicate
software
b)
Software without license d) copied software
9.
To make the exact copy
of a program is termed as___________
a) copyright b)Software
piracy c)fair use d)law
10.
International damage to
equipment, software or data of other
users is termed as_____________
a) copyright c)unauthorized access
b) fair
use d)
intellectual property right
11.
When a software is
pirated, it harms ____________.
a) management b) operator c)people d)Software Developers
12.
Accessing data without
permission is known as ______________
a) illegal
Access c)
unauthorized Access
b) legal
Access d)without
permission
13.
________________ gives
the protection to original work.
a) accesses b)addressee c)user d)copyright
14.
As per It act __________ cannot be in electronic
form.
a) form b)license c) cheques d)records
15.
Norms and principles
are stated under _________.
a) IT Act, 2000 c)codes
of ethics c) cyber law d)
morals
16.
The legal and
regulatory aspects of internet refers to _________
a) Cyber law b) Cyber crime c)Criminal law d)IT Act
17.
Promoting data
integrity means____________.
a) encouraging
data minimization
b) ensuring
the accuracy, reliability, completeness of personal information
c)
establishing
privacy policy
d) none
of these
18.
Licence is __________
a) granted
by owner c)
granted by operator
b) granted to a certifying
authority d)
none of above
19.
_________________ is a person who is intended
for the originator to receive the electronic record.
a)Access b)Addressee c)user d)System analyst
20.
_____________ is a contract between the
purchaser and publisher of software
a) license b)copyright c) cyber law d)IT
Act
21.
___________ means a representation of
information, knowledge, facts, concept or instruction.
a) data b) signature c)access d)program
22.
___________means the
official gazette published in electronic form.
a) Electronic
record b)Electronic form c)Electronic
gazette d)all
23.
_______________ means
the key of a pair key used to verify a digital signature and listed in digital
signature certificate.
a) Private
key b)Public key c)License d)Security
key
24.
_____________key means
the key of key pair used to create a digital signature.
a)
Private b)Public c)a and b d) Security key
25.
Shareware is software ____________.
a) That
can be distributed freely to use on permanent basis.
b) That
can be shared with the user without license.
c)
That
can be distributed freely for trial period.
d) That
cannot be copyrighted.
26.
Free software is
software __________.
a)
That can be copied with
license. b) That everyone is free to copy ,redistribute
and modify.
b) That
can be modified with license. d) That
is not copyrighted software.
27.
Linux is __________
software.
a) freeware b)Public domain c)shareware d)Hardware.
28.
____________ allows
copying a limited amount of material without permission from the copyright
owner when the use is reasonable.
a) copyright b)cyber law c)fair
use d)cyber crime
29.
____________ laws grant
the creator the exclusive rights to reproduce, perform, distribute and display
the work publicly.
a) copyright
b) fair use c) cyber law
d) cyber crime
30.
__________ software
allows user to use , copy and distribute
it with modification free of cost ,but copyright is with author.
a) Freeware b) public domain S/W c) Shareware d)
Non-freeware
31.
When the software is
free to copy is known as__________
a) Freeware b) Shareware c)
Useware d)Liveware
32. _________is a program which is
offered at no cost.
a) Freeware b) Saveware c) Copyright d)Preware
33.
Hacking bank account related information is an example of _________
a)Software Piracy b)Unauthorised
access c)Cyber law d)fair use
34._________
act deals with tradematics and patterns.
a) IT b) Cyber c)
Intellectual property d) fair
use.
Q.4. Multiple Choice
Questions (Two Answer)
1.
Ethics in business
cultivate strong _____________ and ___________.
a)
Productivity b)finance c)market d)teamwork d)copyright
2.
Cyber law is mainly
highlighted for____________.
a)
Copyright
production in Cyber World
b) Individual
Protection.
c)
Legal
remedies against Cyber Squatting.
d) Power
of Attorney
e) Copyright
production in Cyber Crime.
3.
Ethical issue for
computer user are _____________.
a) Professional
standard c)Software piracy
b) Professional
liability d) unauthorized access e)authorized
access
4.
Steps to stop software
piracy ____________.
a)
installing
licensed software
b)
Purchase
software with licence
c) installed
duplicate software
d) purchase
software without licence
e) installing
pirated software
5.
_____________ are the
remedies for stopping software piracy.
a) Copying
distribution of software.
b)
Purchasing
legitimate licensed product.
c)
Purchasing
licensed product from the authorized seller.
d) Software
without license.
e) all
the above
6.
Intellectual property
act includes following
a) Digital
signature b)fair use c)Data d)Acknowledgement
7.
The terms defined in IT
Act are
a)
Access b) License c)Rules d)Query
8.
Computer professional
uses following ethics in their profession.
a) Professional standards c)Unauthorized access
b) Software
piracy d) Professional responsibility
9.
Following terms are
defined in IT Act 2000.
a)
Data b) Digital Signature c) Inspection
d)Information technology
10.
Programmers liabilities
are
a) Aware of defects in the
program c)Data
inspection
b) Good intention of
developing solution d)Stop data misuse
11.
Bad effects of
unauthorized access are.
a) Loss
and jobs c)Loss of copyrighted material
b) Loss
of taxes d)Data confidentiality
Q.5. Multiple Choice
Questions (Three Answer)
1.
Ethics for computer
professionals categorized as __________.
a) Professionals standards c)professional privacy
b) professional
responsibility d)programmers liability
2.
Security is
_______________.
a) Unauthorization b) Availability c)Integrity
d)
Access control e) Data Confidentiality f) Inconsistent
3.
Generally code of
ethics for computer professionals and user are.
a)
Fair treatment b)
Pirated c) communication
d)
System integrity e)
information access
4.
Intellectual property
rights are related with __________.
a)
Copyright b)
attribution and acknowledgement
c) Digital signature d)
fairuse
5.
Pirated software means
________________.
a) Software without
license b)
copied software
c) Unauthorized
duplicate software d) software with
license
6. Generally code and guidelines of ethics
are:
a)Honesty
b)Respect c)communication d)Unauthorised access
7.Copyright law is useful for.....
a)authorship determination
b)duration of protection
c)requirement for transfer of right
to others.
d)geographical
indication
8.The distribution of software can be
categorized into.
a)Shareware b)Freeware c)Public
Domain Software
d)copyright
9.
The ethics for Information Services are:
a)Users vigilance/monitoring
b)Ensuring accuracy and
authenticity
c) Information provided
should be complete without ambiguity
d) Providing proper
security from unauthorized access
10.
Security technologies are used to manage access and prevent unauthorized
access.
a)
firewalls b)intrusion Detection Systems c)Virus and content scanners. d)Hacking
financial
Q.7 Write the question Answer of the following.
Q.1 Define the Terms of Moral, Ethics, Law.
Ans:-Moral :-moral
refers to the generally to the accepted standards of right and wrong in a society. Moral refers to
the standards of right conduct of the judgement of particular actions or right
or wrong by those standards.
Ethics:- Ethics deals with the
determination of what is right or wrong and then doing right thing. Ethics
include the fundamental ground rules, which we follow in our life.
Ethics
states that allow each person to take free and autonomous choice which is
unaffected by outside authority. Ethics gives justices to each person according
to individual effort.
Law:- Law indicates rules and
regulations to be obeyed in organization. Once the law is implemented in the
organization, then it is binding to the employees to follow it.
Q.2. Discuss ethics of computer users.
Ans:-All computer
users have the responsibility to use computer system with an effective,
efficient and lawful manner. Responsibility of computer user towards the
profession, organization and society is discussed by considering following
points:
1. Software Piracy:
-Software piracy is an unauthorised
duplication, distribution and use of computer software .Foe Ex. Making more
copies of software than the license copy or installing licensed for one
computer and copied software on other machines. When software is pirated,
consumers and software developers are harmed. Consumers have the risk for
viruses, having computed diskettes and defective software. With the pirated
software, consumers cannot enjoy full benefit of software following are the
some ex. Of software piracy.
i)
Making more copies of
software than the license copy.
ii)
Installing licensed
software for one computer and copied that software on other machines.
iii)
Illegally copied
software from disks and passed to the friends.
2. Unauthorized Access:-
Many
people when not authorizes, try to access information becomes unauthorized
access. In Information Technology, everyone has right to access the data but up
to limited extent and from authentic source. Unauthorized access can be categorized
as-
·
International damage to
equipment. Software or data of other users.
·
Unauthorized monitoring
of electronic communication,
·
Unauthorized copying of
copyrighted material,
·
Unauthorized use of
computer accounts or user-id,
·
Attempt to guess or
break another users password.
·
Change private files.
·
Unauthorized Change of
Software.
·
Attempt to log-in
computers external to its network.
Unauthorized
access can be overcome by:-
·
Users
vigilance/monitoring
·
Updating installed
software regularly with proper permission and certification.
·
Installing patches
regularly released by Software Company.
Q.3. Discuss ethics for computer users.
Ans:- Ethics
for computer users:-
1.
All computer users have
the responsibility to use computer system with an effective efficient, ethical
and lawful manner.
2.
Responsibility of
computer user towards the profession, organization and society is discussed by
considering following points:
a) Software
Piracy b)Unauthorized Access
Q.4.Unauthorized Access OR short note on
Unauthorized Access.
Ans:-
Many people when not authorized try to access information becomes information
becomes unauthorized access. In Information technology, everyone has right
access the data but up to limited extent and from authentic source.
Unauthorized access can be categorized as-
i)
International damage to
equipment, software or data of other users.
ii) Unauthorized
monitoring of electronic communication.
iii) Unauthorized
copying of copyright material.
iv) Unauthorized
use of computer accounts or user-id.
v) Attempts
to guess or break another user’s password.
vi) Change
private files
vii) Unauthorized
change of software.
Q.5.List do’s and don’ts for the ethics culture of
the computer professional.
Ans:-This
age of Technology and ethics for the computer users are considered with “Do’s
and Don’ts on the road of the Internet”.
Do’s:-
i)
Use the Internet to
help the work required for knowledge base. The Internet is a source of great
volumes of Information.
ii) Use
the Internet to “visit” the places i.e. web sites required for enriching the
knowledge base.
iii) Use
the Internet to communicate the messages.
iv) Be
careful about talking to “Strangers” on a computer network.
v) Respect
the privacy of other users on the Internet, just as you expect your privacy to
be respected.
vi) Be
careful when you “download” programs from the Internet.
vii) Use
a virus scan program before loading it on your computer.
Do not’s:-
i)
Don’t give your
password to anyone. Passwords are intended to [protect your computer and your
files.
ii) Don’t
answer messages that make you feel uncomfortable because they seem improper
indecent or threatening.
iii) Don’t
arrange to meet any unauthorized person met on the Internet.
iv) Don’t
give any personal information, such as your family’s address, phone numbers,
credit card or calling card numbers, to anyone on a computer that you don’t personally
know.
v) Don’t
try to break into computers. Computers often contain sensititive information.
vi) Don’t steal copyrighted computer programs
(“software”) by copying it from the Internet.
vii) Don’t
make duplication of any copyrighted material, like books, magazines, without
permission of the author, publisher, etc.
Q.6.Enlist the definition of IT Act. OR
Define
the following terms as mentioned in the IT Act 2000.
Ans:-
Ø Access:- Access with its grammatical variations and cognate
expressions means gaining entry into, instructing or communicating with the
logical,arithmetical,or memory function resource of a computer ,computer system
or computer network.
Ø Addressee: - Means
a person who is intended by the originator to receive the electronic record but
does not include any intermediary.
Ø Data:-Means
a representation of information, knowledge, facts, concepts or instructions
which are being prepared or have been prepared in a formalized manner, and is
intended to be processed or has been processed in a computer system or computer
network, and may be any form (including computer printouts, magnetic or optical
storage media, punched cards, punched tapes) or stored internally in the memory
of the computer.
Ø Digital Signature:
- Means authentication of any electronic record by a subscriber by means of an
electronic method, magnetic, optical, computer memory, microfilm, and computer
generated micro fiche or similar device.
Ø Electronic Gazette: - Means
the Official Gazette published in the electronic form.
Ø Electronic record: -
Means data, record or data generated, image or sound stored, received or sent
in an electronic form or microfilm or computer generated micro fiche.
Ø Function: - In
relation to a computer includes logic, control arithmetical process, deletion,
storage and retrieval.
Ø Information:
- Includes data, text images, sound, voice, codes, computer programmes,
software and databases.
Ø License: - Means
a licence granted to a certifying Authority under Section 24.
Ø Private Key: - Means
the key of a key pair used to create a digital signature.
Ø Public Key: - It
means the key of a key pair used to verify a digital signature.
Ø Secure system:-
It means computer hardware, software and procedure that
a.
Are reasonably secure
from unauthorized access and misuse.
b.
Provide a reasonable level
of reliability and correct operation.
c.
Are reasonably suited
to performing the intended functions and
d.
Adhere to generally
accepted security procedures.
Q.7. list any four responsibilities of computer
professionals.
Ans:-
1.
Use the Internet
to help the work required for knowledge base. The Internet is a source of great
volumes of information.
2.
Use the Internet to
“visit” the places i.e. web sites required for enriching the knowledge base.
3.
Use the Internet to
communicate the messages.
4.
Be careful about talking
to “strangers” on a computer network.
5.
Respect the privacy of
other users on the Internet, just as you except your privacy to be represented.
6.
Use the Internet to
learn more and more.
Q.8.
what are the ethics that computer
professional should follow? List and explain in details. OR
Explain
ethics for software professional OR
Mention and explain any two ethics for computer
professional.
Ans:- Computer
professionals are engaged in developing software systems. So they must follow
following ethics in their behaviour:
I.
Professional standards.
II.
Professional
responsibility.
III.
Programmer’s liability.
v Professional standards.
:-
1. Contribute
to society and human welfare.
2. Computer
professionals try to maintain the excepted standards in their software.
3. Computer
professionals must prove and test the standards practically.
4. Avoid
harm to other.
5. They
should be honest and trust worthly.
6. Honour
property rights including copyrights and patent.
v Professional
responsibility.:-
1.
Privacy:- Computer
professionals must strive continuously to honour the rights to the privacy of
all individuals. They should try to protect the data from unauthorized access.
2. Data
Confidentiality:- Computer
professionals should hold the responsibility of trust. Contents of information
must be disclosed only to the concerned authority.
3. Stop data misuse:-
Computer Professionals should not use personal information obtained for one
purpose to another purpose without informed consent.
4. Promote data integrity:-
Computer professionals should ensure accuracy, reliability and completeness of
personal information.
5. Allow data inspection:-
Computer professionals should follow standard methods of record-keeping
practices and data use.
6. To achive highest
quality in the product:- The computer
professionals must strive to achive the best quality in their work.
7. Know and respect
existing laws:-Programmers must obey
local, national and international laws while developing their software.
v Programmer’s liability.
:-
1. A
programmer should be aware of defects in the program.
2. A
programmer should have good intention of development of program for solution of
a problem.
3. If
required, programmer should seek help from appropriate experts at appropriate
times.
Q.9. Define the term cyber law. Why the need of
cyber law arises? OR What is cyber law?
Ans:-1) Cyber
law refers to all the legal and regulatory aspects of internet and the World
Wide Web.
2) Cyber –space is governed by a
system of law and regulations called cyber-law.
v Need of cyber law:-
1. Today
millions of people are using the Internet all over the world.
2. Because
of global communication, Internet is misused for criminal activities, which
requires regulation. Today many disturbing and unethical things are happening
in the cyber space called cyber crimes.
3. People
with intelligence and having bad intention are misusing the aspects of the
Internet.
Q.10. Differentiate between shareware, freeware and
public domain software. Or what do you mean by shareware, freeware and public
domain software?
Ans:-[A] Shareware:-
1. Shareware
programs can be freely distributed and freely tested.
2. This
program can be shared with other user with owner permission.
3. A
trial period is given to test those programs. After this trial period, the user
who wants to keep using the programs has to register.
4. The
software which are made available with magazines are normally of this type.
[B] Freeware:-
1. Freeware
is termed as free software that allow everyone to copy, redistribute and modify
it with free of cost.
2. But
still its copyright is hold by authors.
3. Freeware
is programming that is offered at no cost.
4. Linux
is an example of freeware.
[C]
Public Domain Software:-
1. Public
domain software is software that is not copyrighted .It implies the authors
have waived copying over the software.
2. Anybody
can copy them. Modify them or use in any manner they want.
3. Public
domain programs can be freely incorporated into new works without paying
revolties for the original material.