Loading...
Please wait while we prepare your content
Please wait while we prepare your content
Solutions for Computer Applications, Class 9, ICSE
Explain what are computer ethics?
Computer ethics involves the code of conduct to use Information Technology in a responsible way. It fulfils the requirements of an individual user without manipulating or destroying the data of any other user. Therefore, all the computer users must follow computer ethics.
What are the major ethical issues in the field of computing?
The major ethical issues in the field of computing are as follows:
What is hacking? How does it harm a computer and an organisation?
Hacking refers to an illegal intrusion into a computer system or network.
Hacking leads to breaking passwords, stealing valuable data, installing viruses, encrypting computer hard disks and demanding ransom money. If someone hacks an organization, that individual can steal sensitive data such as documentation of business processes and trade secrets or contact information for employees and customers.
What are ethical hackers? What do they do?
The people who are involved in hacking activities with the goal of improving security are known as ethical hackers. They use ethical hacking for a good cause such as national security or to stop crimes and fraud.
Why should we control software piracy?
We should control software piracy because of the following reasons:
What are spams? How do they affect our life?
Spams are unwanted bulk emails that come from unsolicited sources.
Spam is a serious security concern as it can be used to deliver Trojan Horses, Viruses, Worms, Spyware, and organise targeted phishing attacks. Sometimes, spam attackers keep sending bulk emails till the email server is out of disk space.
Describe various types of cyber crimes prevalent these days.
Cyber crimes can be broadly classified into the following categories:
What Netiquettes do you need to follow when using a social networking site like Twitter?
We should use the following netiquettes while using a social networking site:
The term IPR stands for:
Intellectual Property Rights
Reason — The term IPR stands for Intellectual Property Rights.
IPR applies to:
All of these
Reason — The common types of Intellectual Property Rights are trademark, patent, and copyright.
Privacy of data can be breached by disclosing information pertaining to:
All of these
Reason — Privacy of data can be breached by disclosing information pertaining to personal details, healthcare records, financial transactions or status, criminal justice investigations and proceedings or business and commercial transactions.
Which of the following is not a form of software piracy?
Encrypting
Reason — Encrypting is not a form of software piracy.
The right to decide how much personal information you want to communicate with others is known as:
Privacy
Reason — Privacy is the right to control what happens with your personal information.
The unsolicited emails and attractive advertisements are collectively known as:
Spam
Reason — The unsolicited emails and attractive advertisements are collectively known as spam.
The right which is concerned with the design and algorithm of the product rather than the entire product is called:
Patent
Reason — The right which is concerned with the design and algorithm of the product rather than the entire product is called patent.
Hacking a web server or taking control of another person's website is called:
Web Hijacking
Reason — Hacking a web server or taking control of another person's website is called web hijacking.
Which one of the following is a cyber crime?
All of these
Reason — Cyberstalking, cyberespionage and cyberwarfare are cyber crimes.
............... involves an attack coupled with a demand for money to stop further attacks.
Cyber Extortion
Reason — Cyber Extortion involves an attack coupled with a demand for money to stop further attacks.
Pick the cybercrime in which the attacker harasses a victim by using the electronic communication.
Cyberstalking
Reason — Cyberstalking is a crime in which the attacker harasses a victim by using electronic communication, such as an e-mail, instant messaging, or messages posted to a website or a discussion group.