Вы находитесь на странице: 1из 25

COMPUTER PROJECT

COMPUTING & ETHICS MADE BY : MOHIT SHAH CLASS:9E ROLL NO.:15

ACKNOWLEDGEMENT.
I am thankful to our computer teacher who gave us this opportunity to make such a wonderful project. I am even thankful to our principal who gave standard 9 such a lovely subject & topic to work upon. Really working on this project will help us learn new things & will be useful in our future.

THANKING YOU!!!!

INTRODUCTION
With the advancement of Information Technology (IT), the world is witnessing a vast change. While enjoying these fruits of Information Technology, we should ensure that the information is not misused or technology is not used to the disadvantage of the society.

ETHINICAL VALUES.
The computers have become an integral part of our lives. It is a highly sophisticated machine. So one must follow certain ethical values while working with them. Some of the ethical values are: One should always work in a healthy environment to fulfill the objective. Do not install or uninstall any software without any prior permission. Never try to detect an error of a computer system or to correct it even, if a problem comes across at the time of working.

ETHINICAL VALUES contd.


Do not connect multimedia system to listen

music in a computer room. If at all it is to be listened use a headphone. While working in the computer lab one should maintain rules & regulations of the lab. Do not try to steal the secret information of any other computer. One must protect his/her document by using password & noting it down incase he/she forgets.

ETHINICAL VALUES contd.


Do not copy or use proprietary software for

which you have not paid. While working on the internet, one must not open unwanted sites & open the mails of others. One must consult the supervisor, if any problem arises while working in the computer lab.

INTELLECTUAL PROPERTY RIGHT


Intellectual Property means ownership of ideas which is created by using skills & mental ability of the person. The software/program originally developed by the person becomes intellectual property of the developers. Intellectual software has the following properties: SOFTWARE PATENTS: The patent right is given to the programmer for an invention of a particular software. Patent Laws can be used to restrict the freedom of copying, use, distribution & modification of published information.

INTELLECTUAL PROPERTY RIGHT contd.


SOFTWARE COPY RIGHT: Copy Right prohibits the
users of a software program for making copies of it without the permission of the person/company concerned which issues the license for the program. TRADEMARK: Trademark is an identity to preserve the software. A trademark becomes the business of selling of an image of an identity rather than a product.

DATA PROTECTION ON INTERNET


The main threat to data is in the form of viruses, which enter through either unwanted e-mails or while accessing some hot & exiting websites. Data Protection can be defined as the security or protection of data or information on the internet from computer viruses, hackers. In this regard the Data Protection Act (DPA) 1998 plays an important role. One must take care of the followings to protect data: Do not disclose your password to your friends. They may open the site & misuse your account.

DATA PROTECTION ON INTERNET contd.


Do not download unwanted/free software from the

site which you are not concerned with. It may corrupt your system. Sometimes, one must come across some unwanted email, which offers you different schemes or free gifts. Do not read such unwanted e-mails, as they may corrupt your system It is advised that you should install the high quality anti-virus of the reputed company to protect viruses of the computer.

SPAM.
When you connect & open your mail, you find that number of unwanted mails have come into your inbox from different parts of the world organizations. Some times the titles of these messages are very fascinating for the youths. These unwanted messages of mailbox are called Spam. These unwanted messages not only waste the valuable time of the user but also occupy the memory space of the system. They also send viruses through these messages & try to corrupt the system.

WAYS TO STOP SPAM.


As one knows that the spam may cause serious
problems to our system. However, we can stop spam by installing good anti-virus software in our computer system. As far as possible, try to avoid reading unwanted email messages & delete them to keep inbox empty.

SOFTWARE PIRACY
When you purchase Original Software then you become a licensed user & you have the right to use the software in a single computer but you cannot put copies on other computers or pass that software among your colleagues. When someone copies software without buying the appropriate license or copyright it known as Software Piracy. The biggest problem in todays world is to check making duplicate copy of the original software & using it illegally. It not only promotes immorality but also affects the sale of the original software. The users prefer these softwares as they are cheap in comparison to the original software. Whether software piracy is

SOFTWARE PIRACY contd.


deliberate or unintentional, it is illegal & punishable by law. The piracy comes in many forms: Licensed user duplication for unlicensed users: Copying of software without having proper license & distributing among friends. Illegal Internet Distribution: When one orders software over the Internet, make sure that they are the authorized distributors. There are websites, which distribute the software illegally. However, there is no guarantee that the software is secure or will work properly when installed.

Ways to avoid piracy.


The ways to avoid piracy are given below: Always buy your software from a reputed organization. When in doubt, contact piracy@adobe.com for guidance. Make sure that your software comes with a licensed agreement , original disk & authentic packing. Avoid buying of multiple software titles from different publishers on a single disk. If the seller provides the direction how to obtain a serial number indicates that the software is not authentic.

CYBER CRIME.
Crime is playing a vital role in the field of computers. Although, the types of computer related crimes are numerous & widespread, a few categories of on-line criminal activities continue to attract & try to affect the computer system. The on-line activities include the illegal copying of software, computer viruses, steeling of hardware data, etc. Thus, on-line crime in a computer system is known as Cyber Crime. In addition to cyber crime, there is also Computer Supported Crime which covers the use of computers by criminals for communication & data storage.

CYBER LAWS
With the invention of the internet, the world has come on a common platform where the people can communicate with each other through Cyber Space. It is a revolutionary step for humanity but also poses a significant need for the regulation of Cyber activities. India became 21st nation in the world to adopt a Cyber law regime during 2000. The countrys Cyber laws are contained in the information Technology Act 2000. The Act came into effect after getting clearance from both the houses of the Parliament in May 2000.The bill received the assent of the President of India in August 2000 as IT Act 2000.

ADVANTAGES OF CYBER LAWS


The IT Act 2000 attempts to change outdated laws & provides ways to deal with Cyber Crimes. The basic ideal of this law is to bring the people on the common platform so that they can make the transaction over the Net through credit cards without being misused. From the perspective of e-commerce in India, the IT Act 2000 & its provisions contained many positive aspects. Firstly, the implications of these provisions for the e-business would be that e-mail would now be a valid & legal form of communication in our country that can be duly produced & approved in a court of law. Companies shall now be able to carry out the electronic commerce using the legal infrastructure provided by the Act.

ADVANTAGES OF CYBER LAWS contd.


Digital signature have been given legal validity & sanction in the Act. The Act throws open the doors for the entry of corporate companies in the business of being certifying Authorities for issuing Digital Signature Certificates. The Act now allows Government to issue the notification on the web thus heralding e-governance. The Act enables the companies to file any form, application or any other document with any office, authority, body or agency owned or controlled by the appropriate Govt. in electronic forms by means of such electric forms which may be prescribed by the appropriate Govt.

NEED TO PROTECT THE INTERNET FROM CHILDREN.


There is a need to protect the Internet from children who may wish to find ways to exploit it. The best way to prevent the children from participating in Cyber Crime is to define Cyber Crime, the consequences of Cyber Crime & educate them with a positive thinking. It has been found that majority of Cyber Crimes are committed by children (teenagers). Hence, it is high time to protect the children from these Crimes because they are the future of our country.

HACKING.
The word Hacking originally refers to act requiring great skill & knowledge of computer systems. Unfortunately, these skills are applied in illegal activities like breaking password, releasing viruses to corrupt the computer system or stealing valuable data & information. Infact it is a technique by which some computer can access the data from confidential areas of the system. The people who are involved in this crime are called Hackers. Hackers also merge wrong information, viruses or corrupt data in the users data & thus make computer system a failure.

MALICIOUS CODE & MALICIOUS INTENT.


It is a new kind of threat, which cannot be blocked by using anti-virus software & corrupts the system in due course. By the time, it is noticed, it becomes too late like cancer. Usually, the victim is ignorant of malicious code attack, making it virtually impossible to recognize. Malicious code can attack institutions at either server or the client level. It can also attack into the infrastructure of a system. Malicious code may hide in different forms: While working on e-mail. At the time of web surfing. Downloading of files/documents/softwares.

PROTECTION AGAINST MALICIOUS CODE & MALICIOUS INTENT.


Prevention is better than Cure. So, one can protect his/her computer system by using it in a systematic way. The following precautions can protect ones computer system:
One should use high quality anti-virus on his/her computer system. If one has started downloading the software that you suspect to be malicious then stop the down loading immediately. One should avoid the pirated software or unauthorized software, which may cause a great damage to your system in due course.

PROTECTION AGAINST MALICIOUS CODE & MALICIOUS INTENT contd.


If you find any e-mail coming from unknown sources then do not open, rather delete it from your computer system. One should avoid the use of floppies & CDs of others which may be virus infected. If at all they are to be used then scan first as a safety measure & use them.

BIBLIOGRAPHY.
Really working on this project was a great pleasure for me. In making this marvellous project successful I was greatly helped by my computer teacher at all times. I have got all the information from our computer textbook & pictures from the internet. I would for once and for all thank everybody who helped me out to make this project successful.

Вам также может понравиться