The document discusses ethics in computing, highlighting five ethical values such as respecting proprietary software and protecting personal information. It outlines the advantages and disadvantages of the Internet, including its role in research and the risks of cyberbullying and hacking. Additionally, it provides guidelines for avoiding software piracy, protecting minors online, and the importance of firewalls in network security.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
28 views6 pages
Class 7 Ch-4 Question Answer
The document discusses ethics in computing, highlighting five ethical values such as respecting proprietary software and protecting personal information. It outlines the advantages and disadvantages of the Internet, including its role in research and the risks of cyberbullying and hacking. Additionally, it provides guidelines for avoiding software piracy, protecting minors online, and the importance of firewalls in network security.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6
CH:-4 Ethics and safety measures in computer
Page no:-68 Long question answer
Question 1
What do you understand by Ethics? Mention at least five
ethical values related to computers.
Answer
Ethics is a set of moral principles that govern the behaviour of a
group or individual. Computer ethics regulate the use of computers.
Five ethical values related to computers are as follows:
1. While accessing Internet, always work in a healthy
environment so that the objective is fulfilled. 2. Do not copy or use proprietary software for which we have not paid. 3. Do not try to steal the secret information of any other computer. 4. we must protect our document by using password and note it in a diary in case you forget it. 5. If we are working on Internet, we should not browse any unwanted website which is not safe.
Question 2
What are the advantages of using Internet? Explain.
Answer
The advantages of using Internet are as follows:
1. Internet can be used for searching any information through various search engines. 2. The messages can be sent and received through e-mail on internet. 3. It plays a significant role in research and development work. 4. It also allows video conversation with the relatives or friends through social media. 5. It promotes 24 X 7 online shopping.
Question 3
What is cyberbullying? Explain how some internet users carry
it out.
Answer
Cyberbullying is a form of bullying using digital technology such
as internet, emails, social networking sites, mobile phones, personal computers, etc. Some of the common ways through which cyber bullying takes place are:
1. Threatening messages by email, text or through comments
on a social networking page. 2. Trapping someone and then sharing personal information widely with others. 3. Spreading embarrassing rumours, secrets or gossip about another person through social networking sites, email or texts. 4. Posting an embarrassing picture or video of someone to others without their knowledge or permission.
Question 4
What do you understand by Intellectual Property Rights?
Explain. Answer
Intellectual property means 'Ownership of Ideas' which is created
by using skills and mental ability of the person. Intellectual property rights are the rights given to persons over the creations of their minds. They usually give the creator an exclusive right over the use of his/her creation for a certain period of time. These rights can be exercised in the form of software patents, software copyright or trademark.
Question 5
Enlist some parental assistance for minors while accessing
Internet.
Answer
Some parental assistance for minors while accessing Internet are
as follows:
1. By viewing age appropriate web sites.
2. By using strong password that cannot be cracked so easily. 3. By not sharing password with any person. 4. On frequent changing password. 5. Responding to known email messages or attachments only. 6. By protecting computer with antivirus software. The antivirus must be latest such as 'Quick Heal' or 'Firewall' that recognizes most of the viruses.
Question 6
What are the different ways to stop Spam?
Answer
The different ways to stop Spam are as follows:
1. Installing good antivirus software in our computer system and update regularly. 2. Avoid reading unwanted email messages and delete them to keep inbox empty
Question 7
What are the disadvantages of using the Internet? Explain.
Answer
The disadvantages of using the Internet are:
1. Internet is a place to offer so much to its users and hence
becomes the biggest factor in distracting one from his/her task. 2. People actively using internet can face cases of internet bullying and crimes. 3. Hacking of personal profile and account has become another cause of concern. 4. Safety of personal data and information also worries the users. 5. Attack of viruses is also a threat of using internet.
Question 8
How will you avoid Software Piracy? Explain.
Answer
Some guidelines to avoid software piracy are as follows:
1. Always buy a software from a reputed organization.
2. We should Make sure that our software comes with a license agreement, original disk and authentic packaging with copyright. 3. Avoid buying of multiple software titles from different publishers on a single disk. 4. If the seller provides the direction to obtain a serial number, it indicates that the software is not authentic.
Question 9
What are the different steps must be taken to avoid hacking?
Answer
The following measures must be taken to avoid hacking:
1. Don't share your personal information with unknown or
suspicious sources. 2. Don't create a password based on your personal information like last name, telephone number, etc. 3. Don't share your password with anyone even although he/she is your close friend.
Don't access and download material from illegitimate sites.
4. Don't try to open and download unknown software and
email attachments that may contain viruses. 5. Use strong antivirus software for your computer.
Question 10
Explain how firewall protects a computer system.
Answer
Firewall is defined as a network security device that allows or
rejects network access between an untrusted zone (such as the internet) and a trusted zone (a private network). It is designed to filter incoming traffic and to protect unauthorised access from an unknown network.