Cyber Law and Ethics


Cyber Law and Ethics
Answer the following questions.
a. What is cyber space? Who used this term for the first time?
=                 Cyber space is the virtual space created by computer networks internet and telecommunication.
  The term cyber space was used by cyberpunk science fiction author william Gibson for the first time.

b. What are the areas covered by Cyberspace?
=  Cyberspace covers the following areas including computer, network. Internet, websites, Email, Data. Software, programs, storage devices, electronic devices,(cell phones, Atm machines) etc.

 c. Define computer crime/cyber crime with examples.
 =                It is a crime or illegal activities committed by people through the use  of computer and internet related services .
  The Following are the common types of cyber crimes.
                    i.Hacking                                ii.Pornography
                    iii.Harrassment                        iv.Privacy etc

  d. What is cyber law? When was cyber law of Nepal introduced for first time?
 =                The necessary laws, rules or procedures formed and adopted by government or concerned authorities to control and above cyber crime is known as cyber law.
 Cyber law of Nepal was introduces on 30th Bhadra 2061 BS [15th september 2004 A.D] after approving by council of ministers for the first time.



e. Write the importance of cyber law for any countries.
=                 The cyber law is very much important to control cyber crime legalize the transaction electronically, control electronic frauds and punish the cyber criminals legally.

 f. List any Four provisions made in the cyber law of Nepal 2061 B.S?
  =  The following are the provisions made in the cyber law of Nepal 2061 B.S.
               i.   Provision for necessary punishment against cyber crimes.
               ii.  Provision about the duty and responsibilities of user and
               iii. Provision of digital signature, electronic data processing etc.
               iv. Provision of legal hearing of cyber related problems through IT tribunal  and Appellate Tribunal.

g.    What are the areas covered by cyber law?
 =   The areas covered by cyber law are:
                i. Computer crime and electronic frauds.
                ii. Telecommunication laws
                iii. Digital signature and data protection law.
                iv. Intellectual property law.
                v.  Copyright and patent right law etc.

h.    List the international cyber law.
=            International cyber law was basically started from 1970 A.D .some of laws are:
                i.  Fair credit reporting act-1970 A.D.
                ii. Freedom of information act-1970 A.D.
                iii. Federal privacy act-1974 A.D.
                iv.  Video privacy protection act-1998 A.D
                v.  Computer matching and privacy protection-1988 A.D.
                vi. Copyright act-1992 A.D.

  i. List the different effect of cyber crime in society.
    =  The effects of Cyber crime are:
                i. Physical theft of the computer and other equipment.
               ii. Altering the original web page.
               iii. The privacy of the compute ca be lost due to unauthorized access.
                iv. Security problem may be occurred.
                v. New types of virus can attack software or programs.

  j. What is hacking? Who does this activity?
 =                The Hacking is the process of internationally going unauthorized access to an information to an information system. The person who does this activity is a hacker.
               
a.    What do you mean by digital signature?
=                 A digital signature is the digital identity of sender that uniquely identities the particular sender electronically which is based on public key and private key.
  
b.    What is public key infrastructure?
=                 IT is a security management system including hardware ,software, people and politics, dedicated to the management of digital certificate for the purpose to exchange of electronic message.

 M. What is Harassment?
=                 Harassment is the process of irritating the defendant by sending obscurities and insulting comments focusing on gender, caste, religion.
 N. Define hacker and cracker.
 =                Hacker is a person who uses a computer to gain an unauthorized access.
 =                Cracker is a computer user who attempts a break into copyright software or an information system.

o. Define computer ethnics.
 =                IT is a branch of practical principle or general behavior that deals with how the computer experts and users should make decision in regard to the social while using the computer and electronic system.
                
Q. What are the issues relating to computer ethics?
 =  Following are the issues relating with computer ethics:
                   i.Copyright         
   ii. Privacy and piracy        
   iii. Harassment
                   iv.Internet pornography  etc.
                
 r. List the ethical points that the computer user should be remembered.
                =  They are:
                i. Not to use computer to steal data.
                ii. Not to disclose the secrecy of computer.
                iii. Not to use the computer to harm other people
                iv. Not to use password of other.
                v.  Not to spread the illegal information.

                 

 Write short notes on.
 a. Salami Saving:
                            It is a type of computer crime in which a programmer/criminal alters a program so that it subtracts a very small amount of money from each accounts and diverts the fund to the required account.

 b. Data Diddling:
                           It is also a type of cyber crime in which criminals alters the regular account and insides modify data therefore it is difficult to  know that they have stolen or transferred fund.
                
 c. Software Privacy:
                            It is the act of illegally, copying or distributing software without purchasing or having legal right of the software.

d. Plagiarism.
                It is the act of tacking other persons, writing, conservation song or even idea and passing it off as own.

 e. Pornography:
                            IT is the representation of human body or human sexual behavior for the purpose of sexual stimulation which is distributed through internet to the computer user.
    
 




State whether the following is True or False:
                
a.     Computer ethnics gives awareness to the users in computing field [True]
b.    Cyber law of Nepal was introduced in 2060 B.S.[Fasle]
c.     Cyber law covers those places including ICT's and the places where  more computer are connected.[True]
d.    Software piracy is a cyber crime.[True]
e.     The term "cyber space" was used by charles Babbage in 1984. [Fasle]
f.      Cyber law covers those area related to ICT's .[True]
g.    A hacker is a person who performs the constructive work in the field of cyber space.[Fasle]


 Choose the correct answer from the following
  a. When was cyber law introduced in Nepal for the first time?
                 =  2004 A.D

  b. Which of the following is computer crime?
                 =  All of above

  c. Cyber ethics is'
                 =  Moral laws
                
   d. Which of the following is not computer crime?
                 =  Authentication



   e. Which of following steals the confidential data,acquire free access to the
                    program the malicious distraction of files?
                 =  Cracker

    f. Which of the following is included in cyber law?
                 =  All of the above

     g. When was the term'cyber space" used for first time?
                 =  1984 A.D.
 

 Write the suitable technical term of the following.
a. Internationally getting unauthorized access to an information system.
                  = Hacking

 b. The laws related to the internet and cyber space.
                  = cyber law
                
 c. The branch of practical that deals with how the computer experts should make decision in regard to social and professional behavior.
                  = Computer ethics
   
 d. The concept of keeping users data confidential, such as stored files and email, which cannot be examined by anyone else without users permission.
                 = Privacy


e. A security mechanism used on the internet the relies on two keys, one  public and on private.
                 =  Digital signature.

 f. Virtual space created by computer networks, internet to make communication.
                 =  Cyber space
  g. A person who uses a computer to gain an unauthorized access.
                 =  Hacker
  h. A computer user who attempts to break into copy right protected or an information system.
                 =  Cracker

  i. The process of encoding information in a such way that it is in readable to all.
                 =  Encryption

  j. The process of restoring encrypted data on its original form.
                 =  Decryption

   k. The rules and regulation to systematic the computer related to technology.
                 =  Cyber law

    l. Moral rules to be followed by computer and other professionals.
                 =  Cyber space

    n. The misdeed carried out by using the computer and IT based media.
                 =  Cyber Crime.
       
        
   o. An illegal activity to harm computer user and their assets.
                 =  Cyber crime
1.               Choose the correct answer:
a)               When was cyber law introduced in Nepal first time(in A.D.)?
i.                  2002 A.D.               iii. 2003 A.D.
ii.              2004 A.D.               iv.2005 A.D.

b)              Which of the following is computer crime?
i.                  Hacking          iii. Pornography
ii.              Harassment             iv. All of the above

c)               Cyber ethics is
i.                  Moral laws             iii. Data protection laws
ii.              Copy right laws      iv. None of the above

d)              Which of the following is not computer crime?
i.                  Forgery                   iii. Password guessing
ii.              Authentication               iv. Data diddling

e)               Which of the following steals the confidential data, acquire free access to perform the malicious destruction of files.
i.                  Hacker                    iii. Marker
ii.              Cracker                  iv. Buster



f)                Which of the following is included in cyber law?
i.                  Trademark law               iii. Copyright law
ii.              Patent law                       iv. All of the above

g)              When was The term ‘  cyber space’ used for first time?
i.                  1884 A.D.                       iii. 1984 A.D.
ii.              1985 A.D.                       iv. 1885 A.D.



********************Jaya Ganeshya***********************

Comments

Popular posts from this blog

File Handling Important questions and Solutions

Multimedia And IT's Applications

DBMS