Sunday, December 29, 2019

Grade-12 (ICT and Cyber Law)


Information Communication Technology and Cyber Law

1.  What is ICT? Write its positive and negative impacts.
ICT is applied area of computer science, electronics, telecommunication, business and of every fields that deal with processing, storing and transmitting information.
Positive impacts:
a.       Education
b.      Medicine
c.       Banks
d.      Business
e.       Communication
f.       Multimedia
g.      Employment
h.      Productivity
i.        Ecommerce
j.        Entertainment
Negative impacts:
a.       Health problem
b.      Piracy
c.       Pornography
d.      Computer viruses
e.       Hacking
f.       Privacy
g.      Cost
h.      Less employment
i.        Loss of information
j.        Digital socialization

2.      What do you mean by digital divide? Why is it implemented? Or write its main objectives.
The digital divide refers to the gap between the peoples who have got and haven’t got computer education, internet access, access to information and ecommerce.
Conceptualization:
a.       Means of connectivity or how individuals and their associates are connecting and to what like infrastructure, location, and network availability.
b.      Intensity of connectivity, or how sophisticated are the usage like mere access, retrieval, interactivity, innovative contributions.
c.       Purpose of connectivity or why individuals and their associates are connecting like the reasons why individuals are online and use the internet and ICT.
d.      Lack of connectivity which means that why individuals and their associates are not connecting.

3.      What is computer ethics? Write its commandments.
It is the moral principle or code of conduct which are to be followed by all computer users.
Commandments:
a.       Do not use a computer to harm other people
b.      Do not interfere with other people’s computer work
c.       Do not snoop or view around in other people’s files
d.      Do not use a computer to steal
e.       Do not use or copy software for which you have not paid
f.       Do not use other people’s computer resources without authorization
g.      Think about the social consequences of the program you write
h.      Use a computer in ways that show consideration and respect
4.      Define intellectual property, anonymity and privacy.
Intellectual property (IP) refers to creations of the mind: inventions, literacy and artistic works, and symbols, names, images, and designs used in commerce. IP is divided into two categories: industrial property and copyright.

Anonymity means that the person does not expose his or her identity. It means outsiders cannot trace, link or observe the contents of the messages.
Privacy is the interest that the individuals have in sustaining a personal space, free from interference by other people and organizations.

5.      What is cyber law? Write its field or area.
The rule which is passed through the ordinance of governance to legalize the transaction which are held by means of electronic appliance using internet and prevent and punish the related is called cyber law.
a.       Electronic and digital signature
b.      Computer crime
c.       Intellectual property
d.      Data protection and privacy
e.       Telecommunication law
6.      What is cyber law of Nepal? Write in details.
            Nepal cannot be isolated from emerging technology and the problems raised by the                              technology. The cyber law is on the process of development. Nepal passed the Electronic                    Transaction and Digital Signature Act 2004, also known as Cyber law.
            The main laws are:
a.       The law covers most of the issues related with cyber activities and is supposed to forecast to be landmark legislation for development of IT industry in Nepal.
b.      Conducts such as hacking, deleting data, stealing e-document, software piracy and posting offensive information are capable of criminal and civil sanctioning under the new cyber law.
c.       The government can punish cyber offenders with up to 5 years of imprisonment and /or fine of up to Rs. 50,000. However, much depends on the harshness of the crime.
d.      The law has tightened the security for banking transactions through electronics means, which should boost the economic activities across the internet via Nepal.
e.       It gives legal status to information posted on the websites of government offices, government run corporations and local bodies.
f.       It has also granted legal status to digital signatures sent through the electronic media like e-banking, e-commerce, etc.
g.      The law has also made a new judicial body to listen to complaints, cases and matters concerning cyber crime.
7.      What is computer crime? Write its different forms.
            Computer crime has been defined broadly as a criminal act that has been committed using a                computer as the primary tool.
       Forms of computer crime:
a.       The theft of money, for example, the transfer of payments to the wrong accounts
b.      The theft of information, for example, by tapping into data transmission lines or databases at no cost.
c.       The theft of goods by their diversion to the wrong destination
d.      The theft of computer time, for example, use of an employee’s computer resources for personal work. Besides of these, computer crime can also take form of hacking, cracking, harm and blackmail.
8.      What are the IT policies? List out.
            The policies of IT are the action adopted for the implementation of strategies to achieve goals              and fulfill the objectives. Some of the policies of IT are as follows:
a.       To declare information technology sectors a prioritized sector.
b.      To provide internet facilities to all village development committees.
c.       To render assistance to educational institutions and encourage native and foreign training.
d.      To computerize the records of each governmental office.
e.       To increase the use of computers in the private sector.
f.       To develop physical and virtual information technology park.
g.      To use information-technology to promote e-commerce, e-education, e-health, among others.
h.      To establish National Information Technology Centre.
i.        To establish a national level fund by mobilizing the resources.
j.        To establish Nepal in the global market through the use of information technology.
Q12) Describe computer crime and its various forms.
Answer:
 Computer crimes:  Computer crime, or Cyber crime, refers to any crime that involves a computer and a network using electronic appliance using internet.
Forms of Cyber Crime
Cyber Crime has various forms which may include
hacking (illegal intrusion into a computer system without the permission of owner),
phishing (pulling out the confidential information from the bank or financial institutional account holders by unreliable means),
Spooling (getting one computer on a network to pretend to have the identity of another computer in order to gain access to the network),
cyber stalking (following the victim by sending e-mails or entering the chat rooms frequently),
threatening (sending threatening e-mails to victim),
 salami attacks (making insignificant changes which go unnoticed by the victim),
net extortion,
pornography (transmitting lascivious material),
software piracy (illegal copying of the genuine software), email bombing,
virus dissemination (sending malicious software which attaches itself to other software),
IPR theft, identity theft, data theft, etc.

0 comments:

Post a Comment