Chapter 10
Computing and Ethics
A Tick (√) the correct option.
1. The term Computer Ethics is also referred as:
a. Cyberethics b. Information ethics
c. Global information ethics d. All of these
Ans. d. All of these
2. Name the categories used to specify Intellectual Property
Rights.
a. Copyright b. Industrial Property
c. Both a and b d. None of these
Ans. c. Both a and b
3. Right to privacy is part of which article of the Indian
Constitution?
a. Article 12 b. Article 19
c. Article 21 d. Article 31
Ans. c. Article 21
4. What is the term used to refer to sending unwanted bulk
messages, especially advertising,
indiscriminately?
a. Phising b. Spamming
c. Virus d. Malware
Ans. b. Spamming
5. What is the right given to freedom from intrusion by the
public, especially as a right called?
a. Right to Privacy b. Copyright
c. Intellectual Property Rights d. None of these
Ans. a. Right to Privacy
6. Name the term that refers to a technique used to gain
unauthorized access to a computer
system or network and in some cases even making
unauthorized use of this access.
a. Virus b. Antivirus
c. Malware d. Hacking
Ans. d. Hacking
7. Name the type of Malware that prevents the user from
using the system, and may destroy files
that were open at the time of the attack.
a. Denial of Service (DoS) Attacks b. Access Violations
c. Both a and b d. None of these
Ans. a. Denial of Service (DoS) Attacks
8. Where does Malicious Code Hide?
a. Email b. Web Content
c. Legitimate Sites d. All of these
Ans. d. All of these
9. Name the program that contains hidden malicious
functions but look like something funny or
useful such as a game or utility, but harms the system
when executed.
a. Trojans b. Virus
c. Spyware d. All of these
Ans. a. Trojans
10. Name the program that secretly gather information
from the computer it has infected and
transmit the information to a different location.
a. Trojans b. Virus
c. Spyware d. All of these
Ans. c. Spyware
B. Fill in the blanks.
1. Thus Intellectual property rights may be defined as the
rights given to persons over the creations
of their minds.
2. Right to privacy refers to the freedom from intrusion by
the public, especially as a right.
3. Spamming refers to the use of electronic messaging
systems to send unwanted bulk messages,
especially advertising, indiscriminately.
4. The term Piracy refer to unauthorized copying of
software.
5. Cybercrime is a term which is used to refer to criminal
activity performed using computers and
the Internet.
6. Worms are programs that do not depend upon another
program to replicate it but takes the
power of networking to spread itself and also executes
independently.
7. Adware comes bundled with some commercial software
or freeware, which when installed,
installs packages that download advertising materials and
display them.
8. Hijack This is a malicious program that hijacks your
browser.
9. Spyware programs secretly gather information from the
computer it has infected and transmit
the information to a different location.
10. Commercial programs that are made available to the
public illegally are often called warez.
C. State whether the following statements are True (T)
or False (F).
1. Buying legal software from reputed retailers or
organizations is a way to
stop Software Piracy. T
2. Spamming refers to the use of electronic messaging
systems to send unwanted
bulk messages especially advertising, indiscriminately. T
3. Copyright refers to the freedom from intrusion by the
public, especially as a right. F
4. Right to Privacy are given to authors of literary and
artistic works such as books and
other writings, musical compositions, paintings, sculpture,
computer programs and films. F
5. Copyright is a one area of Intellectual Property Rights. T
6. Quarantine is used when certain virus may be too
difficult to be removed completely,
this virus are disabled and kept in a safe place so that it
cannot infect other files. T
7. Spyware is a software that is used to remove viruses and
other malware programs
from your computer. F
8. Push technology enables news and other content
providers to automatically supply
subscribers with information by downloading content to
the user’s desktop. T
9. Denial of Service (DoS) attacks steal away login names
and passwords,
credit card/debit card numbers, files, or other confidential
data. F
10. Creating and distributing viruses and/or malicious
code on other computers or posting
confidential business information on the Internet are also
part of cybercrime. T
SECTION A
Answer the following Questions.
1. What is Computer Ethics?
Ans. Computer ethics deals with the procedures, values
and practices that govern the process of
consuming computing technology and its related
disciplines without damaging or violating the
moral values and beliefs of any individual, organization or
entity.
2. What is Software Piracy? How does shareware deal
with software piracy?
Ans. Software piracy is used to describe the act of illegally
using, copying or distributing software without ownership
or legal rights. Shareware is a good way to market software.
It allows consumers to evaluate an application prior to
making a purchase decision. They can easily determine if it
meets their business or personal needs, which usually
results to a satisfied customer.
3. Why do you think in developing countries like India,
it is difficult to stop software piracy?
Ans. Software piracy is hard to stop for several reasons:
a. It’s not a violent crime, so eliminating the criminals by
killing them is not really an option. As such, the only
remaining option is a legal approach - charging them with a
crime and threatening them with prison if they don’t quickly
agree to a guilty plea.
b. Software piracy is very easy. If you want your software to
work without internet connection,
then you need to put the entire code and all the data into
the hands of a users; consequently,
any anti-piracy measures have to be in their hands as well,
making it possible for smart coders to reverse-engineer
your code, find the part which performs verification of
“license to use”, and remove or twist that part so that the
software works without a license.
c. Sharing cracked software is ludicrously easy and hard to
detect.
d. There are millions of people involved in this. Quite
literally, not only your prisons, but your court-rooms as
well are not big enough to realistically charge everyone. So
you have to prioritize who you will go after.
e. Experts still can’t agree to what extent is piracy harmful.
There were numerous cases where a pirated version of
something was instrumental in making it popular, which
not only later led people to buy a legal copy, but generated
interest in a sequel, which then became massive hit.
f. People who can afford buying movies and games
generally do so; people who cannot afford it will either
pirate them, or not get them at all.
g. The price tag associated with a legal software is generally
high.
4. What are the different ways of stopping Software
Piracy?
Ans. The different ways to stop software piracy are:
• Educate your staff on the licensing requirements of your
software purchases
• Conduct a self-audit of your software licenses
• Acquire any licenses needed for full compliance
• The most widely used method is the license key; code that
is built into an application to require a valid key to unlock
the software.
5. How does Spamming affect economically?
Ans. Spamming remains economically viable because
advertisers have very little or sometimes no operating costs
beyond the management of their mailing lists, and it is
almost impossible to hold senders accountable for their
mass mailings. On the other hand it costs huge to the sender
and may sometime even get dubbed.
6. Discuss two main areas of Industrial Property.
Ans. Copyright and Trademark.
7. How can spamming be reduced?
Ans. By using these precautions you can greatly mitigate
what spam you do receive and prevent most spam from
ever happening.
• Be careful where you enter your email at.
• Create or use disposable email addresses for websites you
do not trust.
• Never open spam when you receive it.
• Keep your computer virus and malware free.
• If your friends are sending you emails sent to a large
recipient list, request that they use BCC instead of TO or
CC, so that other recipients cannot see your email address;
or request they stop including you if you do not want to
receive the emails.
• Do not list your email address on your website or
anywhere the public can access it.
8. How is phishing and pharming performed to perform
Cybercrime?
Ans. Phishing is a fraudulent practice of sending emails
purporting to be from reputable companies in order to
induce individuals to reveal personal information, such as
passwords and credit card numbers. Pharming is the
fraudulent practice of directing Internet users to a bogus
website that mimics the appearance of a legitimate one, in
order to obtain personal information such as passwords,
account numbers, etc.
9. What are the different types of Cybercrimes?
Ans. The different types of cyber crime are:
• Financial fraud crimes
• Cyberterrorism
• Cyberextortion
• Cyberwarfare
• Computer as a target
• Computer as a tool
10. How are Hackers different from Crackers?
Ans. Hackers are those computers experts which breaks into
computers to check any vulnerably so that no one can
misuse the services. These are really intelligent and smart
persons who use there ability to protect the community from
cyber crimes and computer thefts. Whereas, Crackers are
those peoples who use there knowledge to do computer
crimes for gaining popularity among peoples and to earn fast
money. They break into computer networks for their
enjoyment and cause harm to them. These persons does not
have real knowledge and know something about using the
particular software to break into computers.