Information Communication Technology and Cyber Law
1. What is ICT? Write its
positive and negative impacts.
ICT is applied area of computer science, electronics, telecommunication,
business and of every fields that deal with processing, storing and
transmitting information.
Positive impacts:
a. Education
b. Medicine
c. Banks
d. Business
e. Communication
f. Multimedia
g. Employment
h. Productivity
i.
Ecommerce
j.
Entertainment
Negative impacts:
a. Health
problem
b. Piracy
c. Pornography
d. Computer
viruses
e. Hacking
f. Privacy
g. Cost
h. Less
employment
i.
Loss of information
j.
Digital socialization
2.
What do you mean by
digital divide? Why is it implemented? Or write its main objectives.
The digital divide refers to the gap between the peoples
who have got and haven’t got computer education, internet access, access to
information and ecommerce.
Conceptualization:
a. Means
of connectivity or how individuals and their associates are connecting and to
what like infrastructure, location, and network availability.
b. Intensity
of connectivity, or how sophisticated are the usage like mere access,
retrieval, interactivity, innovative contributions.
c. Purpose
of connectivity or why individuals and their associates are connecting like the
reasons why individuals are online and use the internet and ICT.
d. Lack
of connectivity which means that why individuals and their associates are not
connecting.
3.
What is computer ethics? Write its commandments.
It is the moral principle or code of conduct which are
to be followed by all computer users.
Commandments:
a. Do
not use a computer to harm other people
b. Do
not interfere with other people’s computer work
c. Do
not snoop or view around in other people’s files
d. Do
not use a computer to steal
e. Do
not use or copy software for which you have not paid
f. Do
not use other people’s computer resources without authorization
g. Think
about the social consequences of the program you write
h. Use
a computer in ways that show consideration and respect
4.
Define intellectual
property, anonymity and privacy.
Intellectual property (IP) refers to creations of the
mind: inventions, literacy and artistic works, and symbols, names, images, and
designs used in commerce. IP is divided into two categories: industrial
property and copyright.
Anonymity means that the person does
not expose his or her identity. It means outsiders cannot trace, link or
observe the contents of the messages.
Privacy is the interest that the
individuals have in sustaining a personal space, free from interference by
other people and organizations.
5.
What is cyber law? Write its field or area.
The rule which is passed through the ordinance of
governance to legalize the transaction which are held by means of electronic
appliance using internet and prevent and punish the related is called cyber
law.
a. Electronic
and digital signature
b. Computer
crime
c. Intellectual
property
d. Data
protection and privacy
e. Telecommunication
law
6.
What is cyber law of
Nepal? Write in details.
Nepal cannot be isolated from
emerging technology and the problems raised by the technology. The cyber law is
on the process of development. Nepal passed the Electronic Transaction and
Digital Signature Act 2004, also known as Cyber law.
The main laws are:
a. The
law covers most of the issues related with cyber activities and is supposed to
forecast to be landmark legislation for development of IT industry in Nepal.
b. Conducts
such as hacking, deleting data, stealing e-document, software piracy and
posting offensive information are capable of criminal and civil sanctioning
under the new cyber law.
c. The
government can punish cyber offenders with up to 5 years of imprisonment and
/or fine of up to Rs. 50,000. However, much depends on the harshness of the
crime.
d. The
law has tightened the security for banking transactions through electronics
means, which should boost the economic activities across the internet via
Nepal.
e. It
gives legal status to information posted on the websites of government offices,
government run corporations and local bodies.
f. It
has also granted legal status to digital signatures sent through the electronic
media like e-banking, e-commerce, etc.
g. The
law has also made a new judicial body to listen to complaints, cases and
matters concerning cyber crime.
7.
What is computer crime?
Write its different forms.
Computer crime has been defined
broadly as a criminal act that has been committed using a computer as the
primary tool.
Forms of computer crime:
a. The
theft of money, for example, the transfer of payments to the wrong accounts
b. The
theft of information, for example, by tapping into data transmission lines or
databases at no cost.
c. The
theft of goods by their diversion to the wrong destination
d. The
theft of computer time, for example, use of an employee’s computer resources
for personal work. Besides of these, computer crime
can also take form of hacking, cracking, harm and blackmail.
8.
What are the IT
policies? List out.
The policies of IT are the action
adopted for the implementation of strategies to achieve goals and fulfill the
objectives. Some of the policies of IT are as follows:
a. To
declare information technology sectors a prioritized sector.
b. To
provide internet facilities to all village development committees.
c. To
render assistance to educational institutions and encourage native and foreign
training.
d. To
computerize the records of each governmental office.
e. To
increase the use of computers in the private sector.
f. To
develop physical and virtual information technology park.
g. To
use information-technology to promote e-commerce, e-education, e-health, among
others.
h. To
establish National Information Technology Centre.
i.
To establish a national level fund by mobilizing the
resources.
j.
To establish Nepal in the global market through the use
of information technology.
Q12)
Describe computer crime and its various forms.
Answer:
Computer crimes: Computer crime, or Cyber crime, refers to
any crime that involves a computer and a network using electronic appliance
using internet.
Forms
of Cyber Crime
Cyber
Crime has various forms which may include
hacking
(illegal intrusion into a computer system without the
permission of owner),
phishing (pulling out the
confidential information from the bank or financial institutional account
holders by unreliable means),
Spooling (getting one computer
on a network to pretend to have the identity of another computer in order to
gain access to the network),
cyber stalking (following the
victim by sending e-mails or entering the chat rooms frequently),
threatening (sending
threatening e-mails to victim),
salami attacks (making
insignificant changes which go unnoticed by the victim),
net extortion,
pornography (transmitting lascivious
material),
software piracy (illegal copying
of the genuine software), email bombing,
virus
dissemination (sending malicious
software which attaches itself to other software),
IPR theft, identity theft, data theft, etc.
0 comments:
Post a Comment