Chapter-9: Cyber Ethics
Keywords.
1. Ethics
2. Plagiarism
3. Cyberbullying
4. Phishing
5. Hacking
6. Crackers
7. Spamming
8. Piracy
9. Patent
10. Copyright
11. Trademark
12. Digital Dossier/ Footprints
13. Clickjacking
14. Vishing
15. Cyberspionage
A. Fill in the blanks.
1. Computer Ethics
2. Citation
3. Cyber bullying
4. Hacking
5. Intellectual property
B. Write T for True and F for False.
1. True
2. False
3. False
4. True
5. False
C. Application-based questions.
1. If the e-mail is a spam mail, it cannot include genuine e-mail address in the TO: or CC: fields
or it may contain offensive language or links to websites with inappropriate content.
2. The URL of a secured website starts with https//: and your browser displays an icon of the
closed lock.
D. Select the correct option.
1. a) Spams 2. b) Cookie 3. b) Patent 4. b) Encryption 5. a) Phishing
E. Answer the following questions.
Ans.: 1. The common ethical guidelines which should be followed while using a computer: • Do
not use computer technology to steal information or to cause disruption or interference in
another users' work. • Do not spy on another person's computer data. • Do not contribute to
the spread of wrong information using computer technology. • Do not use someone else's
computer resources without an authorization.
Ans.: 2. Plagiarism is the usage or imitation of the language and thoughts of another person and
projected as one's own original work. Students should be encouraged to present their original
and innovative ideas. However, if material has to be taken from other sources, Citation is the
best way to avoid plagiarism. Material should be paraphrased and direct quotes should be
presented in quotation marks.
Ans.: 3. Some measures to protect intellectual property rights are, Patent your Inventions,
Copyright your Art and Publications, Register your Trademarks.
4. Write short notes on:
Ans.: a. Spamming-Spams are unwanted bulk e-mails that come from strange sources. Spams
are generally sent in large numbers for commercial advertising. Spam is a serious security
concern as it can be used to deliver Trojan Horses, Viruses, Worms, Spyware, and organise
targeted phishing attacks.
Ans.: b. Cracker: These are technical people, who are experts in breaking into systems, to steal
important data, such as financial details, or passwords, etc. Sometimes, they use key loggers for
this purpose.
Ans.: c. Digital footprint: It is an impression or information about a person that exists on the
internet because of his online activity.
Ans.: d. Software Piracy: When a software is copied and distributed illegally, it is called software
piracy.
Ans.: e. Hacking: It refers to an illegal intrusion into a computer system or network. It can cause
harm to computers by destroying data. Apart from this, they disturb applications by spreading
malwares and changing program logics and outputs
Ans.: f. Phishing: It is an act of sending an e-mail to a user, misleading him to believe that it is
from a trusted person or organisation, in an attempt to obtain sensitive information for
malicious purposes