0% found this document useful (0 votes)
41 views2 pages

Chapter 5

Chapter 5 of the document discusses ethics in IT, covering key concepts such as plagiarism, hacking, and software piracy. It outlines the main functions related to information, issues of security and integrity, and the importance of protecting intellectual property rights. Additionally, it differentiates between Information and Communications Technology (ICT) and Information Technology (IT), and highlights the significance of software ethics.

Uploaded by

somaranasaha1982
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
41 views2 pages

Chapter 5

Chapter 5 of the document discusses ethics in IT, covering key concepts such as plagiarism, hacking, and software piracy. It outlines the main functions related to information, issues of security and integrity, and the importance of protecting intellectual property rights. Additionally, it differentiates between Information and Communications Technology (ICT) and Information Technology (IT), and highlights the significance of software ethics.

Uploaded by

somaranasaha1982
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

ETHICS IN IT

CHAPTER 5

OBJECTIVE TYPE QUESTIONS


1. Fill in the blanks.
(a) Directly copying text, word for word is called ______. Ans. Plagiarism.
(b) ______ refers to attempts to gain information from otherwise undisclosed areas. Ans. Hacking.
(c) _______ refers to the unauthorised duplication of computer software. Ans. Piracy.

2. Choose the correct option.


(a) C in ICT stands for _____.
(1) Communication (2) Computer (3) Control (4) None of these Ans. (1) Communication
(b) Making illegal copies of copyrighted software is called ____.
(1) Software piracy (2) Browsing (3) Collaboration (4) Electronic distribution
Ans. (1) Software piracy.
(c) Purchasing of only one licensed copy of a software and distributing/loading it onto multiple systems is called
as _____.
(1) Softlifting (2) Renting (3) Hard disk loading (4) Patent Ans. (3) Hard disk loading.

DESCRIPTIVE TYPE QUESTIONS

3. Short answer questions.


1. What are the main functions related to information?
Ans. The main functions related to information are :
(a) Collecting information.
(b) Storing information.
(c) Distributing information.
2. Define the term plagiarism.
Ans. Plagiarism means using someone else’s work without giving them proper credit. In academic writing,
plagiarizing involves using words, ideas, or information from a source without citing it correctly.
3. Write down the major issues of security and integrity of information.
Ans. The major issues are as follows:
(a) Confidentiality.
(b) Integrity.
(c) Availability.
4. What is software piracy? What are its common forms?
Ans. Software piracy refers to unauthorised duplication of computer software. The most common forms of
software piracy are Softlifting, unauthorised downloading and uploading, hard disk loading, software
counterfeiting and illegal software renting.
5. Name three types of law that can help restrict software piracy.
Ans. The following are the three types of law that can help to restrict software piracy:
(a) Copyright.
(b) Patent.
(c) Trademark.
6. An extended synonym for Information Technology is ICT. So, how ICT differs from IT?
Ans. The difference between ICT and IT are:
Sl.
ICT IT
No.

ICT stands for Information and


1 IT stands for Information Technology.
Communications Technology.

Information and Communications Information Technology is associated


2 Technology is associated with the with the field of computers, software,
field of education. networks, etc.

Information and Communications Information Technology is used in


3 Technology is used in academic corporate and other huge, complex
institutions and purposes. companies and instructions.

It simply uses computer to store,


It simply transfers messages among
4 retrieve, transmit and process data or
people or machines using technology.
information.

It helps business in several ways such as


It helps business in several ways
make it easy to communicate with remote
such as cut costs, improve
workers, fast method of communication
5 communication, streamline
during emergencies, one can
communication, facilitate strategic
communicate from anywhere in world,
thinking, eliminate wastes, etc.
etc.
7. IT security today has become a major point of concern. What comes under IT security?
Ans. IT security is a term that is more concerned with the protection of hardware, software and a network of an
organization, from the perils of disaster and external attacks through virus, hacking etc.
8. Elaborate the term software ethics.
Ans. It includes methods to avoid violating the unauthorized distribution of digital content. The core issues
surrounding computer ethics are based on the use of the internet, internet privacy, copyrighted content,
software, and related services, and user interaction with websites.
9. Explain the need of protecting intellectual property right.
Ans. Intellectual property rights (IPR) refers to the legal rights given to the inventor or creator to protect his
invention or creation for a certain period of time. These legal rights confer an exclusive right to the
inventor/creator or his assignee to fully utilize his invention/creation for a given period of time.

You might also like