Sie sind auf Seite 1von 2

Kuvempu University Assignments for B.Sc.(IT) & M.Sc.

(IT) Courses Subject: Computer Ethics and Cyber Lab Subject Code: BSIT 64 Assignment: TA (Compulsory) 1. Why is computer ethics defined? Explain its evolution. What is computer crime? Explain different computer crimes. 2. What are the professional responsibilities? Discus the impact of Globalization on computer ethics. 3. What do you mean by Professional ethics? Explain the code of ethics. What are the basic features of Internet? What is Cyber crime? What is an Electronic Warfare? 4. Brief the evolution of Computer Ethics. What are the three levels of computer ethics. Explain 5. What are the code of ethics? Compare its significance with present day scenario 6. State and Discuss primary assumptions of a legal system. What are the basic features of Internet? Explain

Assignment : TB (Compulsory)

PART - A
Answer all questions: 1. Explain the four classifications of ethical issues. 2. Explain the social and ethical issues arising out of the presence of computers in the workplace. 3. What are the fundamental conceptions regarding the evaluation of individual actions? 4. How is a professional code distinguished ? 5. Describe the nature and features of internet. PART - B Answer any FIVE full questions: 1. a) Explain the different sources of law. b) Discuss the significance of legislation. 2. a) Explain how custom is a source of law. b) State and discuss the primary assumptions of a legal system. 3. a) Discuss the current forms of computer crimes. b) Discuss the classifications of crimes under the IT act 2000. 4. a) Discuss the essentials of valid contract. b) What are the remedies for the breach of the contract? 5. a) Explain digital signature. What is a digital signature certificate?

b) Discuss the adjudicatory processes incorporated in the act. 6. Explain principles of computer ethics. 7. a) What are the amendments to the Indian penal code? b) Explain how computer ethics is related with internet. 8. Write short note on : a) Electronic governance b) Cyber crimes c) Cyber privacy.

Das könnte Ihnen auch gefallen