Chapter 2

 Cyber Law and Ethics
Q.1  Fill in the blanks:
1.      Moral refers to the generally accepted standards of right and wrong in a society.
2.      Moral is a standard of rightness or wrongness.
3.      Ethics builds trust and teamwork.
4.      Ethics deals with the determination of what is right or wrong and then doing the right thing.
5.      Moral value guide us how to behave in society.
6.      Access control list is used to restrict to an unauthorized access.
7.      Software which is available for limited period, is known as shareware.
8.      Ethics gives justice to each person according to individual effort.
9.      Ethics in business cultivate strong teamwork and productivity.
10.  Ethical principles are based on moral values.
11.  Software piracy is exact copy of a program in seconds.
12.  Software piracy includes downloading software illegally from internet.
13.  Cyber crime refers to all the activities done with criminal intent in cyberspace.
14.  Cyber law refers to all the legal and regularly aspects of internet and the World Wide Web.
15.  Any subscriber makes authenticate an electronic record by affixing his digital signature.
16.  Digital Signature certificate is issued to subscriber.
17.  Digital Signature is used for authentication of electronic record.
18.  Linux is an example of freeware software.
19.  Addressee means a person who is intended by the originator to receive the electronic record.
20.  Certifying Authority means a person who has been granted a licence to issue a Digital Signature Certificate under section 24.
21.  Moral theory is divided into three parts, moral standards, moral value, and moral judgment.
22.  Public key is used to verify digital signature.
23.  ARPANET super network was born in the year 1996.
24.  Conversion of data into a very secured format is called encryption.
25.  Copyright is a protection that covers the original work.
26.  Public domain is software that is not copyrighted.
27.  Moral Standard is criteria used to decide what is right or wrong.
28.  Software piracy is not a victimless crime.
29.  Data means a representation of information, knowledge, facts, concepts or instructions.
30.  Digital Signature means authentication of any electronic record by a subscriber by means of an electronic method.
31.  Electronic gazette means the official gazette published in the electronic form.
32.  Originator is person who sends or transmits an electronic message.
33.  Secure System means computer hardware, software and procedure that are reasonably secure from unauthorized access and misuse.
34.  Copyright is an intellectual property right attached to original works in which the right exists with originator or creator.
35.  The Internet is Fourth mode of communication.
36.  Moral judgment is a statement about the rightness or wrongness of particular actions.
37.  Privacy is concerned with the publication of true account of private life of individual, medical confidentiality etc.
38.  Private Key pair is used to create digital signature.
39.  Copying of a limited amount of material permission is called as fair use.
40.  Justice indicates the “fairness in distribution.”
Q.2. True or false:
1.      Ethics was invented by bill gates.(False)
2.      There are 10 commandments of computing proposed by computer ethics institute.(True)
3.      Accessing of data without permission is called authorized access.(False)
4.      Accessing of  data without permission is called authorized access.(False)
5.      Bugs indicate various types of software errors. .(True)
6.      Thorough freeware is available at no cost, it is copyrighted. .(True)
7.      gaining access without users permission is termed as unauthorized access.(True)
8.      Ethical principal are based on law value. (False)
9.      Software piracy includes installing and selling unauthorized copies of software. .(True)
10.  Programs can be copyrighted under ‘literacy work ‘heading. .(True)
11.  Cyber crime refers to all the legal aspects of internet and www. (False)
12.  The rules for computing are called commandments. .(True)
13.  Linux is the public domain software. (False)
14.  Unauthorized access is one of the ethics for computer user. (False)
15.  Linux is a example of shareware software. . (False)
16.  Piracy is duplication original licence copy.(True)
17.  IT Act deals with copyright and patents. . (False)
18.  Patents is an intellectual property right.(True).
19.  Cyber law gives legal permission to carry out transaction using EDI and electronic media.(True)
20.  Private key is used to verify a digital signature(False)
21.  Information includes data, text, images, sound, voice etc.(True)
22.  Law indicates rules and regulations to be obeyed in the organisation.(True)
23.  Right things does not depend upon moral principles.(False)
24.  Moral theory is a set of moral principles, which systematically links moral beliefs to one other.(True)
25.  Information includes data, text, image, sound and voice etc.(True)
26.  The code of ethics is a combination of Do’s and Don’ts.(True)
27.  Ethics  guidelines are based in information technique, privacy and fair share of resources.(True)
28.  with pirated software ,consumer can enjoy full benefit.(False)
29.  As per IT act cheques cannot be in electronic form.(True)
30.  Through  freeware is available at no cost, it is copyrighted.(True)
31.  Copyright is an exact copy of a program in seconds.(False)
32.  Licence means a licence granted by operator.(False)
33.  Computer user should purchase only legitimate software products.(True)
34.  Programmers should not obey international law while developing software.(False)
35.  Freeware software can be distributed freely for trial period.(False)
Q.3. Multiple Choice Questions (Single Answer)
1.      Generally an accepted standard of right and wrong in a society is called as _______.
a)      moral                    b) ethics                       c)guideline                  d) code of standard
2.      To determine what is right and wrong and then doing the right things is called as_______.
a)      moral                     b) ethics                      c) law              d) patent
3.      ___________ is a criterion used to decide what is right or wrong.
a)      moral standards  b) moral principle           c) moral                                            d) ethics
4.      Morals are ____________________.
a)      laws of governing bodies      b)  set of standards              c) Set of things to be done.   
b)      d) set of standards which decide right or wrong
5.      ______________ indicates rules and regulations to be obeyed in the organization.
a)      ethics                     b) law              c) moral                       d)privacy
6.      Ethics was invented by_______________.
a)      Immanuel Kant                           c)Bill gates
b)      Team Patterson                             d)Denis Ritche
7.      Moral ____________ is a statement about the rightness and wrongness of the particular section.
a)      Judgement           b)Principal                   c)Standard                  d)Value
8.      Pirated software means_______________.
a) Software with license                     c) duplicate software
b) Software without license              d) copied software
9.      To make the exact copy of a program is termed as___________
a)      copyright   b)Software piracy     c)fair use         d)law
10.  International damage to equipment, software or  data of other users is termed as_____________
a)      copyright                                       c)unauthorized access
b)      fair use                                                      d) intellectual property right
11.  When a software is pirated, it harms ____________.
a)      management          b) operator                   c)people                       d)Software Developers
12.  Accessing data without permission is known as ______________
a)      illegal Access                                            c) unauthorized Access
b)      legal Access                                              d)without permission
13.  ________________ gives the protection to original work.
a)      accesses     b)addressee     c)user               d)copyright
14.  As per  It act __________ cannot be in electronic form.
a)      form                      b)license                      c) cheques                   d)records
15.  Norms and principles are stated under _________.
a)      IT Act, 2000         c)codes of ethics         c)  cyber law                            d) morals
16.  The legal and regulatory aspects of internet refers to _________
a)      Cyber law            b) Cyber crime                        c)Criminal law d)IT Act
17.  Promoting data integrity means____________.
a)      encouraging data minimization
b)      ensuring the accuracy, reliability, completeness of personal information
c)      establishing privacy policy
d)     none of these
18.  Licence is __________
a)      granted by owner                                      c) granted by operator
b)      granted to a certifying authority            d) none of above
19.   _________________ is a person who is intended for the originator to receive the electronic record.
a)Access                      b)Addressee               c)user               d)System analyst
20.   _____________ is a contract between the purchaser and publisher of software
a)      license                   b)copyright                  c) cyber law     d)IT Act
21.    ___________ means a representation of information, knowledge, facts, concept or instruction.
a)      data                       b) signature                 c)access                       d)program
22.  ___________means the official gazette published in electronic form.
a)      Electronic record  b)Electronic form        c)Electronic gazette   d)all
23.  _______________ means the key of a pair key used to verify a digital signature and listed in digital signature certificate.
a)      Private key                        b)Public key               c)License         d)Security key
24.  _____________key means the key of key pair used to create a digital signature.
a)      Private                              b)Public                                   c)a and b         d) Security key
25.   Shareware is software ____________.
a)      That can be distributed freely to use on permanent basis.
b)      That can be shared with the user without license.
c)      That can be distributed freely for trial period.
d)     That cannot be copyrighted.
26.  Free software is software __________.
a)      That can be copied with license.           b) That everyone is free to copy ,redistribute and modify.
b)      That can be modified with license.       d) That is not copyrighted software.
27.  Linux is __________ software.
a)      freeware   b)Public domain                      c)shareware     d)Hardware.
28.  ____________ allows copying a limited amount of material without permission from the copyright owner when the use is reasonable.
a)      copyright   b)cyber law                 c)fair use                    d)cyber crime
29.  ____________ laws grant the creator the exclusive rights to reproduce, perform, distribute and display the work publicly.
a)      copyright             b) fair use         c) cyber law           d) cyber crime
30.  __________ software allows user to use , copy  and distribute it with modification free of cost ,but copyright is with author.
a)      Freeware  b) public domain S/W   c) Shareware d) Non-freeware
31.  When the software is free to copy is known as__________
a)      Freeware  b) Shareware               c) Useware      d)Liveware
     32. _________is a program which is offered at no cost.
      a) Freeware                     b) Saveware                c) Copyright                d)Preware
     33. Hacking bank account related information is an example of _________
       a)Software Piracy            b)Unauthorised access   c)Cyber law                       d)fair use
     34._________ act deals with tradematics and patterns.
        a) IT                                b) Cyber                      c) Intellectual property         d) fair use.
Q.4. Multiple Choice Questions (Two Answer)
1.      Ethics in business cultivate strong _____________ and ___________.
a)      Productivity         b)finance        c)market          d)teamwork     d)copyright
2.      Cyber law is mainly highlighted for____________.
a)      Copyright production in Cyber World
b)      Individual Protection.
c)      Legal remedies against Cyber Squatting.
d)     Power of Attorney
e)      Copyright production in Cyber Crime.
3.      Ethical issue for computer user are _____________.
a)      Professional standard        c)Software piracy
b)      Professional liability     d) unauthorized access    e)authorized access
4.      Steps to stop software piracy ____________.
a)      installing licensed software        
b)     Purchase software with licence 
c)      installed duplicate software
d)     purchase software without licence
e)      installing pirated software

5.      _____________ are the remedies for stopping software piracy.
a)      Copying distribution of software.
b)     Purchasing legitimate licensed product.
c)      Purchasing licensed product from the authorized seller.
d)     Software without license.
e)      all the above
6.      Intellectual property act includes following
a)      Digital signature    b)fair use                    c)Data d)Acknowledgement
7.      The terms defined in IT Act are
a)      Access                               b) License                   c)Rules            d)Query
8.      Computer professional uses following ethics in their profession.
a)      Professional standards                            c)Unauthorized access
b)      Software piracy                                         d) Professional responsibility
9.      Following terms are defined in IT Act 2000.
a)      Data  b) Digital Signature  c) Inspection  d)Information technology   
10.  Programmers liabilities are
a)      Aware of defects in the program                       c)Data inspection
b)      Good intention of developing solution   d)Stop data misuse
11.  Bad effects of unauthorized access are.
a)      Loss and jobs                    c)Loss of copyrighted material
b)      Loss of taxes                     d)Data confidentiality
Q.5. Multiple Choice Questions (Three Answer)
1.      Ethics for computer professionals categorized as __________.
a)      Professionals standards                          c)professional privacy
b)      professional responsibility                      d)programmers liability
2.      Security is _______________.
a)      Unauthorization                b) Availability                         c)Integrity
d) Access control                   e) Data Confidentiality         f) Inconsistent
3.      Generally code of ethics for computer professionals and user are.
a) Fair treatment                   b) Pirated                                c) communication
d) System integrity                e) information access
4.      Intellectual property rights are related with __________.
a) Copyright                          b) attribution and acknowledgement
c) Digital signature                  d) fairuse
5.      Pirated software means ________________.
a) Software without license                            b) copied software
c) Unauthorized duplicate software   d) software with license
    6. Generally code and guidelines of ethics are:
        a)Honesty  b)Respect  c)communication  d)Unauthorised  access
    7.Copyright law is useful for.....
          a)authorship determination               
          b)duration of protection
          c)requirement for transfer of right to others.
          d)geographical indication
  8.The distribution of software can be categorized into.
  a)Shareware b)Freeware c)Public Domain Software  d)copyright
9. The ethics for Information Services are:
      a)Users vigilance/monitoring       
      b)Ensuring accuracy and authenticity
      c) Information provided should be complete without ambiguity
      d) Providing proper security from unauthorized access
10. Security technologies are used to manage access and prevent unauthorized access.
     a) firewalls            b)intrusion Detection Systems   c)Virus and content scanners.      d)Hacking financial
Q.7 Write the question Answer of the following.
Q.1 Define the Terms of Moral, Ethics, Law.
Ans:-Moral :-moral refers to the generally to the accepted standards of right      and wrong in a society. Moral refers to the standards of right conduct of the judgement of particular actions or right or wrong by those standards.
    Ethics:- Ethics deals with the determination of what is right or wrong and then doing right thing. Ethics include the fundamental ground rules, which we follow in our life.
Ethics states that allow each person to take free and autonomous choice which is unaffected by outside authority. Ethics gives justices to each person according to individual effort.
  Law:- Law indicates rules and regulations to be obeyed in organization. Once the law is implemented in the organization, then it is binding to the employees to follow it.
Q.2. Discuss ethics of computer users.
Ans:-All computer users have the responsibility to use computer system with an effective, efficient and lawful manner. Responsibility of computer user towards the profession, organization and society is discussed by considering following points:
1. Software Piracy:
            -Software piracy is an unauthorised duplication, distribution and use of computer software .Foe Ex. Making more copies of software than the license copy or installing licensed for one computer and copied software on other machines. When software is pirated, consumers and software developers are harmed. Consumers have the risk for viruses, having computed diskettes and defective software. With the pirated software, consumers cannot enjoy full benefit of software following are the some ex. Of software piracy.
i)                    Making more copies of software than the license copy.
ii)                  Installing licensed software for one computer and copied that software on other machines.
iii)                Illegally copied software from disks and passed to the friends.
2. Unauthorized Access:-
Many people when not authorizes, try to access information becomes unauthorized access. In Information Technology, everyone has right to access the data but up to limited extent and from authentic source. Unauthorized access can be categorized as-
·         International damage to equipment. Software or data of other users.
·         Unauthorized monitoring of electronic communication,
·         Unauthorized copying of copyrighted material,
·         Unauthorized use of computer accounts or user-id,
·         Attempt to guess or break another users password.
·         Change private files.
·         Unauthorized Change of Software.
·         Attempt to log-in computers external to its network.
Unauthorized access can be overcome by:-
·         Users vigilance/monitoring
·         Updating installed software regularly with proper permission and certification.
·         Installing patches regularly released by Software Company.
Q.3. Discuss ethics for computer users.
Ans:-  Ethics for computer users:-
1.      All computer users have the responsibility to use computer system with an effective efficient, ethical and lawful manner.
2.      Responsibility of computer user towards the profession, organization and society is discussed by considering following points:
a)      Software Piracy    b)Unauthorized Access
Q.4.Unauthorized Access OR short note on Unauthorized Access.
Ans:- Many people when not authorized try to access information becomes information becomes unauthorized access. In Information technology, everyone has right access the data but up to limited extent and from authentic source. Unauthorized access can be categorized as-
i)        International damage to equipment, software or data of other users.
ii)      Unauthorized monitoring of electronic communication.
iii)    Unauthorized copying of copyright material.
iv)    Unauthorized use of computer accounts or user-id.
v)      Attempts to guess or break another user’s password.
vi)    Change private files
vii)  Unauthorized change of software.
Q.5.List do’s and don’ts for the ethics culture of the computer professional.
Ans:-This age of Technology and ethics for the computer users are considered with “Do’s and Don’ts on the road of the Internet”.
Do’s:-
i)        Use the Internet to help the work required for knowledge base. The Internet is a source of great volumes of Information.
ii)      Use the Internet to “visit” the places i.e. web sites required for enriching the knowledge base.
iii)    Use the Internet to communicate the messages.
iv)    Be careful about talking to “Strangers” on a computer network.
v)      Respect the privacy of other users on the Internet, just as you expect your privacy to be respected.
vi)    Be careful when you “download” programs from the Internet.
vii)  Use a virus scan program before loading it on your computer.
Do not’s:-
i)        Don’t give your password to anyone. Passwords are intended to [protect your computer and your files.
ii)      Don’t answer messages that make you feel uncomfortable because they seem improper indecent or threatening.
iii)    Don’t arrange to meet any unauthorized person met on the Internet.
iv)    Don’t give any personal information, such as your family’s address, phone numbers, credit card or calling card numbers, to anyone on a computer that you don’t personally know.
v)      Don’t try to break into computers. Computers often contain sensititive information.
vi)     Don’t steal copyrighted computer programs (“software”) by copying it from the Internet.
vii)  Don’t make duplication of any copyrighted material, like books, magazines, without permission of the author, publisher, etc.
Q.6.Enlist the definition of IT Act. OR
            Define the following terms as mentioned in the IT Act 2000.
Ans:-
Ø  Access:- Access  with its grammatical variations and cognate expressions means gaining entry into, instructing or communicating with the logical,arithmetical,or memory function resource of a computer ,computer system or computer network.
Ø  Addressee: - Means a person who is intended by the originator to receive the electronic record but does not include any intermediary.
Ø  Data:-Means a representation of information, knowledge, facts, concepts or instructions which are being prepared or have been prepared in a formalized manner, and is intended to be processed or has been processed in a computer system or computer network, and may be any form (including computer printouts, magnetic or optical storage media, punched cards, punched tapes) or stored internally in the memory of the computer.
Ø  Digital Signature: - Means authentication of any electronic record by a subscriber by means of an electronic method, magnetic, optical, computer memory, microfilm, and computer generated micro fiche or similar device.
Ø  Electronic Gazette: - Means the Official Gazette published in the electronic form.
Ø  Electronic record: - Means data, record or data generated, image or sound stored, received or sent in an electronic form or microfilm or computer generated micro fiche.
Ø  Function: - In relation to a computer includes logic, control arithmetical process, deletion, storage and retrieval.
Ø  Information: - Includes data, text images, sound, voice, codes, computer programmes, software and databases.
Ø  License: - Means a licence granted to a certifying Authority under Section 24.
Ø  Private Key: - Means the key of a key pair used to create a digital signature.
Ø  Public Key: - It means the key of a key pair used to verify a digital signature.
Ø  Secure system:- It means computer hardware, software and procedure that
a.      Are reasonably secure from unauthorized access and misuse.
b.      Provide a reasonable level of reliability and correct operation.
c.       Are reasonably suited to performing the intended functions and
d.      Adhere to generally accepted security procedures.

Q.7. list any four responsibilities of computer professionals.
Ans:-
1.       Use the Internet to help the work required for knowledge base. The Internet is a source of great volumes of information.
2.      Use the Internet to “visit” the places i.e. web sites required for enriching the knowledge base.
3.      Use the Internet to communicate the messages.
4.      Be careful about talking to “strangers” on a computer network.
5.      Respect the privacy of other users on the Internet, just as you except your privacy to be represented.
6.      Use the Internet to learn more and more.
Q.8. what are the ethics that computer professional should follow? List and explain in details. OR
                        Explain ethics for software professional OR
Mention and explain any two ethics for computer professional.
Ans:-  Computer professionals are engaged in developing software systems. So they must follow following ethics in their behaviour:
                                                       I.            Professional standards.
                                                    II.            Professional responsibility.
                                                 III.            Programmer’s liability.
v  Professional standards. :-
1.      Contribute to society and human welfare.
2.      Computer professionals try to maintain the excepted standards in their software.
3.      Computer professionals must prove and test the standards practically.
4.      Avoid harm to other.
5.      They should be honest and trust worthly.
6.      Honour property rights including copyrights and patent.
v  Professional responsibility.:-
1.      Privacy:-  Computer professionals must strive continuously to honour the rights to the privacy of all individuals. They should try to protect the data from unauthorized access.
2.      Data Confidentiality:-  Computer professionals should hold the responsibility of trust. Contents of information must be disclosed only to the concerned authority.
3.      Stop data misuse:- Computer Professionals should not use personal information obtained for one purpose to another purpose without informed consent.
4.      Promote data integrity:- Computer professionals should ensure accuracy, reliability and completeness of personal information.
5.      Allow data inspection:- Computer professionals should follow standard methods of record-keeping practices and data use.
6.      To achive highest quality in the product:- The computer professionals must strive to achive the best quality in their work.
7.      Know and respect existing laws:-Programmers must obey local, national and international laws while developing their software.
v  Programmer’s liability. :-
1.      A programmer should be aware of defects in the program.
2.      A programmer should have good intention of development of program for solution of a problem.
3.      If required, programmer should seek help from appropriate experts at appropriate times.
Q.9. Define the term cyber law. Why the need of cyber law arises?  OR      What is cyber law?
Ans:-1) Cyber law refers to all the legal and regulatory aspects of internet and the World Wide Web.
            2) Cyber –space is governed by a system of law and regulations called cyber-law.
v  Need of cyber law:-
1.      Today millions of people are using the Internet all over the world.
2.      Because of global communication, Internet is misused for criminal activities, which requires regulation. Today many disturbing and unethical things are happening in the cyber space called cyber crimes.
3.      People with intelligence and having bad intention are misusing the aspects of the Internet.
Q.10. Differentiate between shareware, freeware and public domain software. Or what do you mean by shareware, freeware and public domain software?
Ans:-[A] Shareware:-
1.      Shareware programs can be freely distributed and freely tested.
2.      This program can be shared with other user with owner permission.
3.      A trial period is given to test those programs. After this trial period, the user who wants to keep using the programs has to register.
4.      The software which are made available with magazines are normally of this type.
            [B] Freeware:-
1.      Freeware is termed as free software that allow everyone to copy, redistribute and modify it with free of cost.
2.      But still its copyright is hold by authors.
3.      Freeware is programming that is offered at no cost.
4.      Linux is an example of freeware.
[C] Public Domain Software:-
1.      Public domain software is software that is not copyrighted .It implies the authors have waived copying over the software.
2.      Anybody can copy them. Modify them or use in any manner they want.

3.      Public domain programs can be freely incorporated into new works without paying revolties for the original material.