computing and ethics
computing and ethics
19. To protect one’s intellectual property rights one can get information copyrighted, patented or use
trademarks. Advantages: This encourages the creator to create new software, and improving
existing software. It ensures new ideas and technologies are widely distributed.
20. Difference between Patent and Copyright:Copyright is used to prevent copying and patents are
used to protect the underlying processes or working of the program.
21. TRADEMARKS: these are words, logos or pictures which identify the source and quality of the goods
and services. Unlike patents and copyrights they have an indefinite duration as long as they are
used.
22. HACKING? Hacking is a technique by which some computer experts (HACKERS) reach to any
private or confidential area of the computer system and steal the information available on the
system.
23. Software Piracy? Software piracy means illegal copying or duplicating of software programs.
24. What is Internet Piracy? Internet piracy refers to the use of internet for illegal copying and
distributing unauthorized software.
25. Spam? Spam also known as unsolicited commercial e-mails are unwanted emails which are
received by you without asking for them.
26. Spamming? When ever we get e-mails from such people who are trying to sell their products in
which you have no interest, this means that they are spamming you i.e. they are trying to sell their
products and sending you unwanted e-mails which you have not asked for.
27. Computer Viruses: Computer viruses are programs that cause damage to data files on a system.
Viruses can attack any part of a computer’s software like boot block, operating system, system
areas, data files and application files and auto-executable files. Worm: A worm is a self-replicating
program which keeps on creating its copies until all the disk space or memory is filled. Trojan Horse:
A Trojan horse is a program which appears harmless but actually performs harmful functions like
deleting or damaging files. Sweeper: It is also a harmful program that deletes all the data from the
system.
28. What are Cookies? A cookie is a small file that is created and installed on your system hard disk by a
web site that wants to collect information about your interaction with the site.
29. Authorization: is performed by asking a legal login-id, if a legal ID is provided then the person is an
authorized user.
30. Authentication: is performed by asking the correct password, if a valid password is provided then
the person is an authentic user.
31. Firewall: It is a system designed to prevent unauthorized access to or from a private network.
Firewalls are mechanism to prevent unauthorized internet users from accessing private networks
connected to the internet, mainly intranets.