Short Answer -Class 10- Computer Science-Chapter 3: Cyber ethics
Q1. What is the responsibility of e-commerce merchant to ensure before getting user’s consent about his/her details’ usage ?
Ans. Before getting user’s consent about his/her details’ usage, the e-commerce merchant must ensure the following:
The merchant must clearly state about how the user data will be used, in the terms and conditions of its site.
The merchant must ensure that the user has gone through the terms and conditions given on its site prior to making any transactions.
The merchant must assure the user about data safety by implementing proper data safety and security measures such as https protocol and other security mechanism so that users’ data is safe from hackers too.
Q2. What is online fraud ? Give some examples.
Ans: Fraud committed using the Internet is called Online fraud. Online fraud may occur in many forms such as :
Non-delivered goods
Non-existent companies
Stealing information
Fraudulent payments
Some examples of online fraud are:
Credit card fraud where credit card details are stolen from a user’s online activities and the money is used without the user’s knowledge.
Using someone’s credentials to watch an online show or movie.
Non-delivery of goods after payment is another example. On investigation, a user may find that the company or website was fraud.
Q3. What measures can you take to curb online frauds ?
Ans. The measures that can be taken to curb online frauds are as follows:
A monitoring official body that ensures the authenticity of e-commerce company and delivery of goods/services as promised.
Strong security mechanism by the e-commerce site and payment gateways to prevent stealing of crucial information.
Official guidelines and safeguards on the selling of users’ data to third parties.
Q4. What is safe data transmission ? How can you ensure secure data transmission ?
Ans: Secure data transmission means applying enough technical safeguards so that data travels safely to its target, without being compromised or eavesdropped.
To ensure secure data transmission, following techniques are applied:
SSL secure data transmission — SSL (Secure Sockets Layer) is a standard security protocol which ensures data security by establishing encrypted online links between a web server and a browser.
Data encryption — Encrypted data when sent over Internet is hard to steal and hence is safer.
Using Safe protocols — such as for files, secure FTP protocol.
Q5. What is intellectual property ? What do you understand by intellectual property rights ?
Ans. Any piece of information is produced or created with a lot of efforts and it consumes a lot of time. Creative creations of mind such as patents, literary and creative arts, copyrights, trademarks etc. are known as intellectual property.
Intellectual property rights are the rights of the owner of information to decide how much information is to be exchanged, shared or distributed. Also it gives the owner a right to decide the price for doing so.
Q6. What is plagiarism ? How can you avoid plagiarism while referring to someone’s else’s creation ?
Ans: Plagiarism is stealing someone else’s intellectual work, such as an idea, literary work or academic work etc., and representing it as our own work without giving credit to creator or without citing the source of information.
To avoid plagiarism while referring to someone else’s creation, we must give credit whenever we use:
Another person’s idea, opinion, or theory;
Quotations of another person’s actual spoken or written words; or
Paraphrase of another person’s spoken or written words
Q7. What is digital property ? What are the threats to digital properties ?
Answer
Digital property (or digital assets) refers to any information about us or created by us that exists in digital form, either online or on an electronic storage device.
For example, any online personal accounts such as email, personal websites and blogs, domain names registered in our name, intellectual properties etc.
The common threats to digital properties are as follows:
Digital software penetration tools — There are many software penetration tools such as cracks and keygens which enable unauthorized users to freely access a software without actually paying for it.
Stealing and plagiarizing codes of digital properties — Other developers may steal a software’s source code and use it to build their own versions of it, and then sell it under their own company name.
Q8. How can you protect your digital properties ?
Ans: The following ways to ensure protection of your digital properties:
Anti-Tamper Solutions — They use a host of advanced technologies to prevent hacking, reverse-engineering or manipulating digital properties such as utility tools, software, apps, video games and so forth.
Legal Clauses — There must be a transparent clause in the software’s Terms of Service that prohibits the scraping of the software’s source code for reuse.
Limit the sharing of software code — One should share software code only with trusted individuals who are part of development team. Digital Rights Management (DRM) solution can protect a software from being scraped for source code using decompilers etc.
Q9. Expand the terms:
OSI, FLOSS, FSF, GNU, GPL, W3C, OSS
Ans
OSI — Open Source Initiative.
FLOSS — Free Libre/Livre and Open Source Software.
FSF — Free Software Foundation.
GNU — GNU is Not Unix.
GPL — General Public Licence.
W3C — World Wide Web Consortium.
OSS — Open Source Software.
Q10. What is GPL software license ? How is it different from LGPL software license ?
Ans: General Public Licence (GPL) grants and guarantees a wide range of rights to developers who work on open-source projects. With GPL, users can do the following:
Copy the software as many times as needed.
Distribute the software in any way
Charge a fee to distribute the software after modifying it but the software should still be under GNU GPL.
Make any type of modifications to the software
The LGPL and GPL licenses differ with one major exception. With LGPL the requirement that you have to release software extensions in open GPL has been removed.