0% found this document useful (0 votes)
11 views

computing and ethics

The document discusses various aspects of computing and ethics, including definitions and applications of artificial intelligence, the Internet of Things, virtual and augmented reality, and the importance of computer ethics. It also covers issues related to software rights, intellectual property, hacking, software piracy, and computer security threats like viruses and spam. Additionally, it explains concepts such as authorization and authentication in the context of network security.
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
11 views

computing and ethics

The document discusses various aspects of computing and ethics, including definitions and applications of artificial intelligence, the Internet of Things, virtual and augmented reality, and the importance of computer ethics. It also covers issues related to software rights, intellectual property, hacking, software piracy, and computer security threats like viruses and spam. Additionally, it explains concepts such as authorization and authentication in the context of network security.
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

Computing and Ethics

1. Artificial intelligence (AI) is the simulation of human intelligence processes by machines,


especially computer systems. It refers to the ability of a machine to think , act and learn like
humans. Specific applications of AI include expert systems, natural language processing (NLP),
speech recognition and machine vision.
2. Internet of things (TOI) allows computing devices to transfer data over network without
requiring human to human or human to computer interaction. Applications : health and fitness,
security, shopping etc.
3. Virtual Reality (VR) Virtual Reality (VR) is the use of computer technology to create a simulated
environment. Made possibl;e with devices like VR headset, VR gloves, VR bodysuit etc.
4. Augmented Reality (AR) Augmented reality (AR) is an interactive experience of a real-world
environment where the objects that reside in the real world are enhanced by computer-
generated perceptual information. AR devices: AR glasses, AR contact lenses, mobile devices
etc.
5. Augmented Reality is a mix of real world and the virtual world and Virtual reality creates an
entire virtual world. AR requires smartphone. VR require a helmet with goggles.
6. Phishing: illegal process of attempting to get information like username , password, credit or
debit card information, account no. etc using authentic looking e-mail or duplicate website.
7. Firewall: System designed to prevent unauthorized access to or form a private network.
8. Free Software “Free software” means that the users have the freedom to run, copy, distribute,
study, change and improve the software without paying any amount.
9. Open Source Software: In Open source software its authors make its source code available to
others who would like to view that code, copy it, learn from it, alter it, or share it, but for further
support and development company may receive payments.
10. Public Domain software is a software that has been placed in the public domain with absolutely
no ownership without any copyright, trademark or patent.
11. Infringement is a offense that involves breaking a rul or law that may result in legal penalties.
12. Prolog meaning Programming Logic is a high level programming language based on formal
logic.It is used for artificial intelligence applications.
13. Java Application Programming Interface (API) An application program interface (API) is a set of
routines, protocols, and tools for building software applications. It is a list of all classes that are
part of Java Development Kit (JDK) It include all Java packages, classes, interfaces, methods,
fields and constructors.
14. Computer Ethics guides the decisions and actions of computer users in situations and helps in
deciding what is good/bad and what is right and wrong.
15. Software Ethics ensures that the software being used is not pirated (Illegally copied) or
unauthorized.
16. Individual’s Right to Privacy: in computing and information relates to collection of information,
storing information and distributing information. This involves that one should not use
computers to collect, store or distribute information that is owned by someone else.
17. Intellectual Property: Intellectual properties are original creations of persons, created with a lot
of efforts, time and money.
18. Intellectual Property Rights are the rights given to people for their original creations, to decide
how much information is to be exchanged, shared and distributed, and gives a right to decide
the price.

19. To protect one’s intellectual property rights one can get information copyrighted, patented or use
trademarks. Advantages: This encourages the creator to create new software, and improving
existing software. It ensures new ideas and technologies are widely distributed.
20. Difference between Patent and Copyright:Copyright is used to prevent copying and patents are
used to protect the underlying processes or working of the program.
21. TRADEMARKS: these are words, logos or pictures which identify the source and quality of the goods
and services. Unlike patents and copyrights they have an indefinite duration as long as they are
used.
22. HACKING? Hacking is a technique by which some computer experts (HACKERS) reach to any
private or confidential area of the computer system and steal the information available on the
system.
23. Software Piracy? Software piracy means illegal copying or duplicating of software programs.
24. What is Internet Piracy? Internet piracy refers to the use of internet for illegal copying and
distributing unauthorized software.
25. Spam? Spam also known as unsolicited commercial e-mails are unwanted emails which are
received by you without asking for them.
26. Spamming? When ever we get e-mails from such people who are trying to sell their products in
which you have no interest, this means that they are spamming you i.e. they are trying to sell their
products and sending you unwanted e-mails which you have not asked for.
27. Computer Viruses: Computer viruses are programs that cause damage to data files on a system.
Viruses can attack any part of a computer’s software like boot block, operating system, system
areas, data files and application files and auto-executable files. Worm: A worm is a self-replicating
program which keeps on creating its copies until all the disk space or memory is filled. Trojan Horse:
A Trojan horse is a program which appears harmless but actually performs harmful functions like
deleting or damaging files. Sweeper: It is also a harmful program that deletes all the data from the
system.
28. What are Cookies? A cookie is a small file that is created and installed on your system hard disk by a
web site that wants to collect information about your interaction with the site.
29. Authorization: is performed by asking a legal login-id, if a legal ID is provided then the person is an
authorized user.
30. Authentication: is performed by asking the correct password, if a valid password is provided then
the person is an authentic user.
31. Firewall: It is a system designed to prevent unauthorized access to or from a private network.
Firewalls are mechanism to prevent unauthorized internet users from accessing private networks
connected to the internet, mainly intranets.

You might also like