II.
1. Software Piracy: Software piracy refers to copying of software without having proper
license/ copyright and distributing it among friends. It not only promotes immorality but
also affects the sale of original software. Whether software piracy is deliberate or
unintentional, it is illegal and punishable by law.
2. Spam: The unwanted messages/mails in the mailbox are called spam. These unwanted
mails have fascinating titles which compel the user to read the mail/message. It not only
waste the valuable time of the users but also occupy memory space. Spam may include
viruses to infect the computer system.
3. Cybercrime: An online criminal activity such as illegal copying of software, spreading
computer viruses, stealing of hardware data, etc. is known as cybercrime. In addition to
online criminal activity, the usage of computers by criminals for communication and
documentation as well as data storage is also referred as cybercrime.
4. Hacking: It is technique by which some computer experts can access the data from
confidential areas of system. It requires great skills and knowledge of computer systems.
Unfortunately, these skills are applied in illegal activities such as breaking passwords,
releasing viruses to corrupt computer system or stealing valuable data and information.
5. Software Copyright: Software copyright prohibits the users of a software program from
making copies of it without the permission of the person/company concerned which
issues the license for the program.
6. Cyber Law: Cyber law provides legal frame for the regulation of the cyber activities. The
cyber laws are contained in the IT Act 2000. The basic idea of cyber law is to bring the
people on a common platform so that they can make transactions over the internet
through credit /debit cards without being misused. This law also provides legal
infrastructure for e-commerce and validity for digital signatures.
III.
1. Ethics is a set of moral principles that govern the behavior of a group or individual.
Ethical values related computers are as follows:
1. Do not install or uninstall any software without prior permission.
2. Never move the peripherals from one place to other unnecessarily.
3. Never browse unwanted website and open the others e-mail.
4. Do not copy or use pirated software.
5. Protect confidential documents by using passwords.
2. Following points should be taken care of to protect data on the internet:
1. Do not disclose passwords to anyone.
2. Do not download unwanted software from the web.
3. Do not read unwanted mails called as spam.
4. Install high quality antivirus program to protect a computer against viruses.
3. Malicious code is the term used to describe any code in any part of a software system
that is intended to cause security breaches or damage to a system e.g. Virus, Trojan
horse, and Worms, etc.
4. Following precautions can protect computer system against malicious intent and
malicious code:
1. Use high quality antivirus on computer system.
2. Avoid the use of pirated software.
3. Avoid using others memory cards, pen drives, etc., which may be virus infected.
4. Delete unwanted e-mail without opening it.
5. Stop downloading infected software immediately.
5. Advantages of cyber laws are as follows:
1. Digital signatures have been given legal validity and sanction in the Act.
2. It allows the government to issue notifications on the web thus heralding e-
governance.
3. Companies shall now be able to carry out e-commerce using legal infrastructure
provided by Act.
4. E-mail would be a valid and legal form of communication.
5. Empower the government to accept filing, creating and retention of official
documents in the digital format.
6. Following points should be taken acre to avoid piracy:
1. Always buy software from reputed organization.
2. Make sure software comes with a license agreement, original disk and authentic
packing.
3. Avoid buying multiple software titles from different publishers on a single disk.
7. Different ways to stops spam are as follows:
1. Install good antivirus software having spam filters such as Spam Attack, Spam Hater,
etc.
2. Avoid reading unwanted e-mail messages from unknown senders and delete them.
8. Following preventive measure can be taken to stop cyber-crimes:
1. Avoid send photographs online, particularly to strangers.
2. Use the latest and updated antivirus software to guard against virus attack.
3. Never enter credit/debit card numbers on any site that is not secure.
4. Keep a back-up data to avoid loss of data in case virus attacks.
5. Avoid disclosing any information pertaining to one-self.