You are on page 1of 2

K u v e m p u U n i v e r s i t y

Assignments for B.Sc.(IT) & M.Sc.(IT) Courses


Subject Computer !t"ics #n$ Cyber %#b
Subject Co$e BSIT & '(
Assignment TA (Compu)sory)
1. Why is computer ethics defined? Explain its evolution. What is computer crime? Explain
different computer crimes.
2. What are the professional responsibilities? Discus the impact of Globalization on
computer ethics.
3. What do you mean by rofessional ethics? Explain the code of ethics. What are the
basic features of !nternet? What is "yber crime? What is an Electronic Warfare?
#. Brief the evolution of Computer Ethics. What are the three levels of computer ethics. Explain
$. What are the code of ethics? Compare its significance with present day scenario
%. State and Discuss primary assumptions of a legal system. What are the basic features of nternet?
Explain
Assignment TB (Compu)sory)
PART - A
Answer all questions:
!. Explain the four classifications of ethical issues.
". Explain the social and ethical issues arising out of the presence of computers in
the wor#place.
$. What are the fundamental conceptions regarding the evaluation of individual
actions?
%. &ow is a professional code distinguished ?
'. Describe the nature and features of internet.
PART - B
Answer any FIVE full questions:
!. a( Explain the different sources of law.
b( Discuss the significance of legislation.
". a( Explain how )custom* is a source of law.
b( State and discuss the primary assumptions of a legal system.
$. a( Discuss the current forms of computer crimes.
b( Discuss the classifications of crimes under the + act ",,,.
%. a( Discuss the essentials of valid contract.
b( What are the remedies for the breach of the contract?
'. a( Explain digital signature. What is a digital signature certificate?
b( Discuss the ad-udicatory processes incorporated in the act.
.. Explain principles of computer ethics.
/. a( What are the amendments to the ndian penal code?
b( Explain how computer ethics is related with internet.
8. Write short note on :
a( Electronic governance
b( Cyber crimes
c( Cyber privacy.

You might also like