0% found this document useful (0 votes)
5 views

Computer Ethics

The document discusses computer ethics, emphasizing the importance of ethical standards in computer use, including respecting privacy and intellectual property rights. It covers various topics such as artificial intelligence, the internet of things, software licensing, and security threats like hacking and malware. Additionally, it highlights the significance of email etiquette and the role of organizations promoting free software.

Uploaded by

cruisetom2713
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
5 views

Computer Ethics

The document discusses computer ethics, emphasizing the importance of ethical standards in computer use, including respecting privacy and intellectual property rights. It covers various topics such as artificial intelligence, the internet of things, software licensing, and security threats like hacking and malware. Additionally, it highlights the significance of email etiquette and the role of organizations promoting free software.

Uploaded by

cruisetom2713
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

Computer Ethics

Ethics means placing a value of good or bad on acts.


When there were few people who used the computer there were no ethical standard for it. But when large number
of people began t use the computer, the absence of ethical standard about their use and related issues caused some
problem. The following points should be kept in mind
1. We should not interfere with other people computer
2. Do not try to steal the information of ant other computer to know the secret information.
3. We should not put out false information about a person.
4. We should not use or copy software for which we have not paid.
5. Do not share private information or images of other people without their consent.
6. Do not accept or forward email from unknown source.
Software Ethics
We can’t use computer hardware without the software. Software allows the computer users to complete their task
on computer. If we unauthorized copy of the software, it is illegal and violation of software ethics.

Artificial Intelligence: The main aim of this AI platform is to provide a space where students can come together
for learning and sharing experiences.

What is application of artificial intelligence?


Artificial intelligence is the simulation of human intelligence processes by machines, especially computer
systems. Specific applications of AI include expert systems, natural language processing, and speech
recognition and machine vision.

What is AI?
AI in computer science focuses on developing intelligent machines, machines that can learn and then teach
themselves. These machines, then, can process vast amounts of data than humans can, and several times faster.

What are the subjects in AI?


The main research topics in AI include: problem solving, reasoning, planning, natural language
understanding, computer vision, automatic programming, and machine learning, and so on.

What is prolog in artificial intelligence?


Prolog is a logic programming language. It has important role in artificial intelligence.

Internet of Things (IoT):


The internet of things, or IoT, is a system of interrelated computing devices, mechanical and digital machines,
objects, animals or people that are provided with unique identifiers
or
The ability to transfer data over a network without requiring human-to-human or human-to-computer interaction.

What is infringement?
Infringement refers to the unauthorized use of material that is protected under intellectual property laws.
Or
It is the action of breaking the terms of law or agreement.( an infringement refers to an unauthorized use of a
copyrighted or patented invention.)
An example of to infringe is breaking a hospital's rule of no smoking on hospital grounds.

Internet: It is a global system of interconnected computer networks to serve billions of users worldwide. It consist
of millions of private, public, academic, business and government networks that are linkedthrough network
technologies. The internet carries vast information resources and services through the world Wide Web(WWW).
Advantages:
❖ It has enabled people to learn and gain knowledge about any topics
❖ It helps in performing various task such as online shopping, booking tickets, paying bills, banking and much
more.
❖ It provides online storage facility to users.

What is public domain software?


Public domain software is any software that has no ownership, copyright or editing restrictions associated with
it. It is free and open-source software.

Intellectual property
Normally, every new information is produced with a lot of efforts, a lot of time and a lot of money. But anyone
can and share it very easily.
Intellectual property rights/laws
The major intellectual property rights are
a. Copyright: copyright prohibits the users of software program for making copies of it without the
permission of the person concerned which issues the license for the program. It is denoted by ©
b. Patents: the patent right is given to the program for an invention of a particular software. Patent law can
be used to restrict the freedom of copying, use, distribution and modification of published information.
c. Trademarks: a trademarks can be a symbol, word or phrases that identifies a company and is registered
with patent office. It is a distinctive sign or indicator used by individual. A trademark may be designated
by following symbols:
TM for an unregistered trade mark, i.e. a mark used to promote or brand goods.
SM for unrequested service mark
® for registered trademark
Difference between software copyright and software patent
1. A software copyrighted costs less than software patent
2. A software copyright lasts generally for 60 years, while a software patent will expire 10-20 years after it
is issued.
3. Parts of a software copyrighted work can be used by another person while a patented work can’t be made,
used or sold by another without permission from the software patent holder.
Software Licensing
It is the permission given to an individual or a group to use the software. It is of various type:
i. software can be used in only one machine.
ii. Software can be used in specific number of machines
Software piracy: piracy is the illegal copying of software. A purchaser / buyer does not become owner of that software.
He only becomes a licensed user of that software and does not get the right to sell/ give his copy to others.
Piracy terminology
Crack: it refers to the modification of software in order to remove encoded copy protection. Distribution of
cracked software is an illegal act of copyright.
Cloning: some software developers choose to make exact copy of application rather than crating their own.
Types of software piracy
a. It is illegal to use a single copy on multiple computers (soft lifting).
b. It is illegal to preloaded software on computer without providing the appropriate licenses.
c. It is illegal to use a key generator to generate registration key that turns into a licensed version.
d. It is illegal to post a licensed version of software on internet and make it available for downloading
(internet piracy).
Cracker/ cyber burglar: A cracker is a technical person who is an expert in breaking the password of other
system without the knowledge of that person. He is not only interested in braking the security of the system but
also steal information like password or credit card details.

Phising/ spoofing: it is an attempt to criminally and fraudulently acquire sensitive information such as user name,
password, and credit card details by masquerading as a trustworthy person. It is a common form of internet piracy.
The appearance of links in the message is also an attempt at physing.example:
http:/[email protected]. the user may receive a message saying that they have to verify
their account by following a link.
The free software foundation (FSF): it is nonprofit organization that supports the free software movement,
which promotes the freedom to create, distribute and modify software with the creator’s permission.
Open Source Software (OSS): it is computer software whose source code is open to all. Any person can read,
debug, modify and can sometimes distribute the open-source software.
Cyberbullying: Cyberbullying is using aggressive behaviors to hurt or frighten someone over a period of time
and often forcing them to do something that they do not want to do.
Hacking: it refers to the unauthorized use of computer and network. A hacker is an expert programmer who
breaks into someone’s computer system without permission and steal data or information.
Email etiquette
Etiquette means good manners. As a responsible citizen we should maintain certain email etiquettes:
Should not do over the email
i. Ask others email password
ii. Open / read other’s email account
iii. Forward false news
Should do over the email
i. Help new users
ii. Use cc in case a mail has to be sent.
iii. Remember that an alphabets in upper case indicates loudly spoken words.

Spamming or email bombing: we have noticed that a lot of junk emails re coming in INBOX, which are fake
and meaningless. This will takes a lot of memory space in computer and make it slow.
Or
It refers to the sending of bulk mail by an identified or unidentified source.
Spyware:
Spyware is a software which is installed on computer without the user's knowledge. It steals sensitive information
and internet usage data, and reports this data to someone else.
Some security threats are/ controlling access to system
Firewalls: A combination of hardware and software that provide a security system, usually to prevent
unauthorized access from outside to an internal network. A firewall is also called a security edge gateway.
Various security threats
Authorization: It is performed by asking the user legal-id. If the user able to provide a legal login-id, he/she is
considered an authorized user.
Authentication: it is also term as password-protection as the authorized user is asked to provide valid password,
and if he/she is able to do this, he/she is considered to be an authentic user.
Virus: it stands for Vital Information Resource under Siege. It is a small self-replicating program that multiplies
by copying itself and infects a computer. Its common sign that gives unusual message on screen, decrease system
performance, missing data and inability to access drives. If we notice any of these problem immediately run virus
scanner software.
Malware: it is derived from the word malicious & software. It is a software that infects or damage a computer
system, delete files and steal sensitive information.
Spam: when we connect a website and open mail, we find that number of unwanted mails have come into inbox
from different parts of the world organization. Sometimes, the title of these messages are very attractive or
fascinating, that compel us read these messages. These unwanted massages not only waste time but also occupy
memory space.
Worms: a worm is computer code that spread without attaching itself to files or programs. It lives in computer
memory, does not damage or alter the hard drive.
Trojan horse: it is a program that appears harmless (such as text editor, utility program) but actually performs
malicious functions such as deleting / damaging files.
Sweeper: it is another malicious program used by hackers to delete all the data from the system.
Snooping: snooping is unauthorized access to someone else’s data, e-mail etc.
Define Augmented Reality (AR).
It is a technology that transforms the view of physical real world with superimposed a computer-generated
image, thus changing the perception of reality.
Virtual Reality
Virtual reality (VR) refers to images created by a computer that appear to surround the person looking at them
and seem almost real or imaginary. Or
It also could be created using photography, videography, computer animation, or a combination of the three.
W3C: it stands for The World Wide Web Consortium. It is responsible for producing the software standards for
World Wide Web. Its product are freely available to all.
Intrusion detection system: An intrusion detection system (IDS) is a device or software that monitors a
network when a system or network is being used by unauthorized person.

You might also like