Beruflich Dokumente
Kultur Dokumente
Ans:
become universal tools that can in principleperform any task and hence pose
a threat to jobs. They are far more efficient than humans inperforming many
tasks. Therefore, economic incentives to replace humans with
computerizeddevices are very high. In the industrialized world, many workers
doing jobs as bank tellers,autoworkers, telephone operators, typists etc have
already been replaced by computers.. On theother hand, the computer
industry has generated a wide range of new jobs in the form of hardware
engineers, software engineers, system analysts, webmasters, information
technologyteachers, and computer sales clerks. Even when a job is not
eliminated by computers, the jobprofile could be radically altered. So, job
gains and losses are to be viewed in the context of thesociety we live
in.ii)Health and Safety: Another workplace issue concerns health and safety.
Often radiation frommachines, repetitive injuries, and posture related
problems are common at computer dominatedworkplaces. Another concern is
poisonous non biodegradable computer waste, which is causinga major threat
to the environment. The advent of stress in the workplace due to the
introductionof computers is becoming more and more evident.iii)Employee
Monitoring: Another major concern is the employee monitoring or
surveillance bythe organizations using sophisticated computer driven
technology. Some amount of monitoringmay be vital for protecting the
interest of the employer and to increase productivity, but excessof such
surveillance can becomes unethical.
4. How is a professional code distinguished?
Ans:
Professional code is divided into three groups of code:
Code of Ethics:- Code of ethicsis more aspirational (aim). They are mission
statements stressed the professional objectives andvision.
Code of Conduct:-Code of conduct are more oriented towards the
professionals attitude.They make clear the issues at risk in the different
specialized fields.
Code of Practice:- Technical document on health and safety issue approved by
the government minister. It provides particular guideline on way to achieve
agreement with OMC legislation.
5. Explain the different sources of law.
Ans:
Following are the different source of law:
a) Legislation:- It is the formal enactment of law by the legislature created or
: Internet communications has much broader scope and reach. This feature
of internet do things to one another demonstrates the great amount of power
when connected to theinternet. It also enables individuals apart from
fraternizing with one another to disrupt, steal,damage, snoop, harass, stalk,
and defame from great distance.ii)
Anonymity
: This feature of internet provides a certain kind of anonymity means it
givesindividuals a senses if invisibility that allows them to engage in behavior
that they might nototherwise engage in. The positive aspect of anonymity is
that it might allow individuals to get afree and equal treatment irrespective of
their race, color or creed. It enables their participation inactivities where
individuals might otherwise reluctant. It also leads a serious problem
foraccountability and integrity of information.iii)
Reproducibility:
Electronic information exists in the form that makes it easy to copywithout
any loss of originality or value in the process of reproduction.
Reproducibilityexacerbates the problem arising by global scope and
anonymity. It also adds to the problems of accountability and integrity of
information arising out of anonymity.All these three features of
communication lead directly or indirectly to a wide range of ethical issues.
3. What are the ten commandments for computer ethics?
Ans:Commandments for computer ethics:- i) Thou shalt not use a computer
to harm otherpeople.
ii) Thou shalt not interfere with other peoples computer work.
iii) Thou shalt not snoop around in other peoples files.
iv) Thou shalt not use a computer to steal.v) Thou shalt not use a computer
to bear false witness.vi) Thou shalt not use of copy software for which you
have not paid.
vii) Thou shalt not use other peoples computer resources without
authorization.
viii) Thou shalt not appropriate other peoples in
tellectual output.ix) Thou shalt think about the social consequences of the
program u write.x) Thou shalt use a computer in ways to show consideration
and respect.
4. Discuss the classification of crimes under the IT Act 2000.
Ans:
The following acts are cyber crime in the I.T. Act 2000:-Without permission of
the authorized useri) Accessing or securing access to computer system or
network.ii) Downloading, coping or extracting any data or information.iii)
Introducing any computer, virus or contaminant in the computer.iv)
Disrupting the working of the computer.v) Disrupting the access of the
computer of an authorized user.vi) Providing assistance to ensure
unauthorized access to the computer.vii) Tampering with computer source
documents.viii) Hacking of computer system.ix) Carring on activities that are
not in compliance with the provisions of the Act.
x) Failure to extend all facilities and technical assistance to the Controller to
decrypt anyinformation necessary for the security of the nation.xi) Publishing
Digital Certificate that are false in certain particular.xii) Misrepresenting or
suppressing any material fact from the Controller or Certifying Authorityfor
obtaining any license or Digital Signature Certificate.
5. Discuss the essential of a valid contract.
Ans:
The general law of contracts is contained in the Indian Contract Act 1872. The
Act defines
contract as an agreement enforced by law. The essentials of a valid
contract are:
-i) Intention to be bound:- The intention to create a contract should be clear
otherwise, it will betreated as invalid.ii) Offer and acceptance:-It is an
essential ingredient of a contract that there must be an offer andits
acceptance. If there is no offer then there is no contract. But if one party offer
but another onedoes not accept it then also no contract will be formediii)
Concept of offer:- An offer is not defined by statue. It is generally understood
as denoting theexpression, by words or conduct, of a willingness to enter into
a legally binding contract. Itexpressly indicates that it is to become binding
on the offer or as soon as it has been accepted.iv) Offer by and whom: An
offer must be made by a person legally competent to contract or onhis behalf
by someone authorized by him to make the offer. If there is no particular
individuals to
whom that offer a contract then that contract become a unilateral contract.
So, there must be
two parties to made contract.vi) Statements which are not offer: Every
statement of intention is not an offer. A statementmust be made with the
intention that it will be accepted and will constitute a binding contract.
The 1970s saw Walter Manor coin the term Computer Ethics to refer to that
field of inquiry
dealing with ethical problems aggravated, transformed by computer
technology. He disseminatedhis starter Kit in computer ethics, which contain
curriculum materials and guideline to developand teach computer ethics.In
1980s a number of social and ethical consequences of information technology
werebecoming public issues in America and Europe. Issues like computer
enabled crime, disasterscaused by computer failure; invasions of privacy
through computer database etc become theorder of the day.The 1990s
heralded the beginning of the second generation of computer ethics.
8. How is information privacy, violated? Discuss the privacy policy guidelines
for database.
Ans:
Information privacy violated, when the individual:i) Does not know what
information is being collected about them.ii) Cannot limit access to what is
being collected.iii) Cannot control the use and distribution of this
information.iv) Cannot correct erroneous data and out-of-date information.
The privacy policy guidelines for database include guideline for following
:
a)Data Collection
breach is entitled toreceive compensation from the party who broken the
contract for any loss or damage caused byhim. Such compensation is not to
be given for any remote and indirect loss or damage sustainedby reason of
the breach.
ii)Penal Stipulations:- If a sum is named in the contract or if the contract
contains any otherstipulation by way of penalty, the party complaining of the
breach is entitled to receivereasonable compensation from party who broken
the contract, whether or not actual damage orloss is proved to have been
caused thereby.iii) Specific performance:- In certain cases the court may
direct against the party in default
specific performance of the contract means that party may be directed to
perform the very
obligation which he has undertaken by the contract.iv) Injunction:- An
injunction is a preventive relief and is granted at the discretion of the
court.The discretion of court is not arbitrary but is guided by judicial
principles. A further check on thediscretion is the provision for correction
through an appeal in a higher court.
13. Discuss the impact of globalization on computer ethics.
Ans:
The impact of globalization on computer ethics led to the discussion of the
followingissues:-i) Global Laws: Over 200 countries are already
interconnected by the Internet. Given thissituation, what is the effect and
impact of the law of one particular country on the rest of theworld? Issues
regarding freedom of speech, protection of intellectual property, invasion of
privacy vary from country to country. The framing of common laws pertaining
to such issues toensure compliance by all the countries is one of the foremost
questions being debated.ii) Global Cyber Business: Technology is growing
rapidly to enable electronic privacy andsecurity on the Internet to safely
conduct international business transactions. With such advancedtechnology
in place, there will be a rapid expansion of global cyber business. Nations
with atechnological infrastructure already in place will enjoy rapid economic
growth, while the rest of the world will lag behind. This disparity in levels of
technology will fuel political and economicfallout, which could further widen
the gap between the rich and the poor.iii) Global Education: Inexpensive
access to the global information net for the rich and the pooralike is
necessary for everyone. However the impact of this sudden and global
education ondifferent communities, cultures, and religious practices is likely
to be profound. The impact onlesser known universities would be felt as older
well-established universities begin offeringdegrees and knowledge modules
over the Internet.
stolen and then sold to interested parties. Every day,individual users have to
deal with the nuisance of dealing with unsolicited e-mail. All the entitiesIndividuals, organizations, and the government need to contribute in the
fight to curb cybercrime and at the same time respect the privacy.The NIF
privacy principals deal with three fundamental concern including information
privacy,information integrity and information quality. The government and the
judiciary need to framecomprehensive laws related to privacy immediately.
18. What is meant by unauthorized access to a computer? Explain.
Ans:
Unauthorized access of computer means using any computer without their
ownerpermission. It includes following activities: i) Accessing or securing
access to computer systemor network.ii) Downloading, coping or extracting
any data or information.
iii) Introducing any computer, virus or contaminant in the computer.iv)
Disrupting the working of the computer.v) Disrupting the access of the
computer of an authorized user.vi) Providing assistance to ensure
unauthorized access to the computer.
19. Discuss the impact of the information technology revolution on society.
Ans:
The amazing growth of information technology has implications for every
aspect of society. So far there is little research that reveals how technology
has and will continue to changethe dynamics of society and the nonprofit
sector. Following point elaborate how informationtechnology affects various
sections of society:i) The nonprofit sector is experiencing an organizational
version of the digital divide-thetechnology gap between large and small
nonprofits. Hardware, software, and technical assistanceare not enough to
close the divide; strategic planning and staff time are also essential.ii) The
true impact the Internet will have on society is in building community,
bringingtogether groups of citizens, who are united by shared values working
for the public good, oftenspanning international lines. Organizations that use
technology well are usually marked bystrong support from the executive
director, support from the board, and the presence of a keyuser staff
person.iii) The Internet enables an organization to strengthen relationships
with its current audiences asit enables targeted, fast, and consistent
communication. It can also enable nonprofits to reach outto new audiences
through effective use of search engines and viral marketing.
20. Discuss the adjudicatory processes incorporated in the act.
Ans:
The first fiveaspects deal with (a) who is collecting this data? (b) Exactly what
information is being collected?(c) for what purposes? (d) which information is
being shared with others? (e) who are theserecipients? The remaining four
aspects focus on the sites internal privacy policies. They include(a) can users
make changes in how their data is used? (b) how are disputes resolved? (c)
what isthe policy for retaining data? (d) and where can be detailed policies
found in human readableform?P3P is software to negotiate privacy
agreements between websites and online visitors. It is a kindof social
technology that involves not merely technology but also active participation
of humanbeings.
23. What are the evidentiary presumptions of a secured electronic
document?
Ans:An electronic document is said to be secure where any security
procedure has been appliedto the electronic document at a specific point of
time. Such a document is deemed to be securetill the time of verification. But
there is no presumption about the integrity and authenticity of theelectronic
record. To create a legally bound electronic document is technologically
complex. Alegally enforceable electronic document must pass the test of
authentication, non-repudiation,confidentiality, and information integrity
during transmission or storage. The key element in theauthentication of a
paper-based document is the signature of the contracting persons. Likewise
anelectronic signature is the key in an electronic record.The combination of
the Public Key and the Private Key provide both confidentiality
andauthentication, which enables for secure electronic transmission.
24. Explain the process of encryption and decryption of data.
Ans:The process of making the information unintelligible to the unauthorized
reader is knownas encryption of data. The process of making the information
readable once again is known asdecryption of data. The science of
Cryptography is made up of encryption and decryption. Thereare two types of
Cryptographic systems symmetric and asymmetric. The symmetric
Cryptosystem consists of both the sender and the receiver having access and
sharing a common Key toencrypt or decrypt a message. The asymmetric
Crypto system is a more a secure system. Thissystem uses two keys. The
originator of the document keeps one of the keys known as thePrivate Key
and the other key is sent to the recipient of the message. The recipient
affixes thedigital signature when the public key to open the message sent to
him.
25. E-Commerce is the new mantra of business. Explain.
Ans:
E-Commerce is the use of the Internet to buy and sell goods and services. ECommerce ischanging the way in which organizations do business, resulting
in streamlined purchasingprocesses and lowering the cost of transacting
business for both large and small companies.E-Business helps in improving
the way the business is conducted with the government,customers, and other
businesses.E-mail can be used in businesses to communicate with suppliers.
It can also be used forresponding and receiving the customer queries. For
example, e-mail can be used to accept ordersfrom the customers. The
customers can also make the payments online and get the
informationregarding the products available along with their price.Internet
can also be used by businesses for managing their records and they can
make use of electronic bookkeeping. An on-line banking service is another
area, which can be used by thebusinesses. These services can be used for
funds transfer, payroll management, and electronicbill payment
26. Write short notes on:
a) Source of law
Ans:
Our legal system is based on the foundations of common law conceived and
shaped byBritish rulers and jurists. In this system there are three main
sources of law:-a) Legislation:- It is the formal enactment of law by the
legislature created or authorized by theconstitution. It stands in contrasted
with judge made law. Legislation consists of written laws, ascontrasted with
judge made law or common law.b) Common Law:- It comprises the body of
principle, which derive their authority solely fromthe decisions of courts. It is
a body of law that develops and derives through judicial decisionsdifferent
from legislative enactments. Its principals do not derive their validity from
formal lawmaking by anybody, but from their enunciation through decisions
of courts.c) Custom:Custom denotes a usage or practice of the people (including a particular
social
group or a group residing in a particular locality) which by common adoption
and acquiescencehas become compulsory and has acquired the force of law
with respect to the place or subjectmatter to which it relates
b) Cyber crimes
Ans:
The illegal use of computer or computer related information is referred as
cyber crime. Ine-commerce, every transaction depends on safe systems for
money transaction in computer