Академический Документы
Профессиональный Документы
Культура Документы
ACKNOWLEDGEMENT.
I am thankful to our computer teacher who gave us this opportunity to make such a wonderful project. I am even thankful to our principal who gave standard 9 such a lovely subject & topic to work upon. Really working on this project will help us learn new things & will be useful in our future.
THANKING YOU!!!!
INTRODUCTION
With the advancement of Information Technology (IT), the world is witnessing a vast change. While enjoying these fruits of Information Technology, we should ensure that the information is not misused or technology is not used to the disadvantage of the society.
ETHINICAL VALUES.
The computers have become an integral part of our lives. It is a highly sophisticated machine. So one must follow certain ethical values while working with them. Some of the ethical values are: One should always work in a healthy environment to fulfill the objective. Do not install or uninstall any software without any prior permission. Never try to detect an error of a computer system or to correct it even, if a problem comes across at the time of working.
site which you are not concerned with. It may corrupt your system. Sometimes, one must come across some unwanted email, which offers you different schemes or free gifts. Do not read such unwanted e-mails, as they may corrupt your system It is advised that you should install the high quality anti-virus of the reputed company to protect viruses of the computer.
SPAM.
When you connect & open your mail, you find that number of unwanted mails have come into your inbox from different parts of the world organizations. Some times the titles of these messages are very fascinating for the youths. These unwanted messages of mailbox are called Spam. These unwanted messages not only waste the valuable time of the user but also occupy the memory space of the system. They also send viruses through these messages & try to corrupt the system.
SOFTWARE PIRACY
When you purchase Original Software then you become a licensed user & you have the right to use the software in a single computer but you cannot put copies on other computers or pass that software among your colleagues. When someone copies software without buying the appropriate license or copyright it known as Software Piracy. The biggest problem in todays world is to check making duplicate copy of the original software & using it illegally. It not only promotes immorality but also affects the sale of the original software. The users prefer these softwares as they are cheap in comparison to the original software. Whether software piracy is
CYBER CRIME.
Crime is playing a vital role in the field of computers. Although, the types of computer related crimes are numerous & widespread, a few categories of on-line criminal activities continue to attract & try to affect the computer system. The on-line activities include the illegal copying of software, computer viruses, steeling of hardware data, etc. Thus, on-line crime in a computer system is known as Cyber Crime. In addition to cyber crime, there is also Computer Supported Crime which covers the use of computers by criminals for communication & data storage.
CYBER LAWS
With the invention of the internet, the world has come on a common platform where the people can communicate with each other through Cyber Space. It is a revolutionary step for humanity but also poses a significant need for the regulation of Cyber activities. India became 21st nation in the world to adopt a Cyber law regime during 2000. The countrys Cyber laws are contained in the information Technology Act 2000. The Act came into effect after getting clearance from both the houses of the Parliament in May 2000.The bill received the assent of the President of India in August 2000 as IT Act 2000.
Digital signature have been given legal validity & sanction in the Act. The Act throws open the doors for the entry of corporate companies in the business of being certifying Authorities for issuing Digital Signature Certificates. The Act now allows Government to issue the notification on the web thus heralding e-governance. The Act enables the companies to file any form, application or any other document with any office, authority, body or agency owned or controlled by the appropriate Govt. in electronic forms by means of such electric forms which may be prescribed by the appropriate Govt.
HACKING.
The word Hacking originally refers to act requiring great skill & knowledge of computer systems. Unfortunately, these skills are applied in illegal activities like breaking password, releasing viruses to corrupt the computer system or stealing valuable data & information. Infact it is a technique by which some computer can access the data from confidential areas of the system. The people who are involved in this crime are called Hackers. Hackers also merge wrong information, viruses or corrupt data in the users data & thus make computer system a failure.
BIBLIOGRAPHY.
Really working on this project was a great pleasure for me. In making this marvellous project successful I was greatly helped by my computer teacher at all times. I have got all the information from our computer textbook & pictures from the internet. I would for once and for all thank everybody who helped me out to make this project successful.