You are on page 1of 9

COMPUTER PROJECT

Submitted to University of Petroleum and Energy Studies


In the partial fulfillment of the requirement for degree of Bachelors of Law ( BA-LLB)

________________________________________________________

Supervised by: Submitted by:


Aayush Srivastava
Abhishek Jain

SAP ID-500077435
ROLL NO- R450219206

University of Petroleum and Energy Studies December 2019


ACKNOWLEDGEMENTS
On the successful of this project, we would like to thank my working supervisor
AssistantProfessor Aayush Srivastava, for helping us with research and always attending my
queries and doubts regarding the same. I sincerely thank him for all the support and
encouragement without which the completion of this project has not been possible.

I also thank our honourable Vice Chancellor, Professor VK Singh and our esteemed Registrar
Dr. Veena Dutta, for their inexplicable greatness to find time to educate us at and when they
find opportunity.

I would like to convey our gratitude towards my Friends and Batch Mates who also rendered
me their valuable time and without their help this project would have not been in its present
shape and form. No work is completed with solo endeavour, neither is ours. I thank each and
every non-teaching staff of UPES for their unconditional support and infinitum. I would also
like to convey my thanks to the Library Staff of UPES.

I am grateful to The Almighty who has given me enough strength and blessing to work hard
and make it best of my ability. Last but not the least; I thank my parents who have given me
a chance to study in the essential University a heaven for legal education
PREFACE
We feel great pleasure in presenting our semester project entitled: Computer and its application
in law’. The researcher hope that reader will find the project interesting and that the project in
its present form shall be we received by all. The project contains the detailed analysis of Types
of generation in computer and how with changing times the cyber crimes takes place with
development in technology. The project will also provide with case laws dealing with cyber
crime.

All efforts have been made to keep this project error free and if there is suggestion please
provide the needed guidelines.
Law and its application in Computer Science

1law.
1.1 What is law?
Before considering how law is interpreted and the role it plays on society we need to
be clear about what we mean when we refer to ‘law’. What is ‘law’, how do we know
it exists and how is it defined? By asking you to think about what you mean when
you use the word ‘law’, we are asking you to draw upon your own knowledge, views
and experience.
The ‘law’ is rarely out of the news and is often the focus for fictional drama. It is
something that touches our lives on a daily basis, it governs what we can and cannot
do, it is used to settle disputes, to punish and to govern. There are laws which are
widely accepted and laws which generate controversy. Laws play a central role in
social, political and economic life.1
1.2 what is meaning of law ?
a rule, usually made by a government, that is used to order the way in which
a society behaves:
There are laws against drinking in the street.
The laws governing the possession of firearms are being reviewed.
They led the fight to impose laws on smoking.
[ + -ing verb or + to infinitive ] Many doctors backed plans for a law
banning/to ban all tobacco advertising.2

1
https://www.open.edu/openlearn/ocw/mod/oucontent/view.php?id=68341§ion=1
2
https://dictionary.cambridge.org/dictionary/english/law
3
https://en.wikipedia.org/wiki/Law
2. Computer and its generations.
2.1 Definition of computer.

A computer is a machine or device that performs processes, calculations and oper.2.1 ations
based on instructions provided by a software or hardware program. It is designed to execute
applications and provides a variety of solutions by combining integrated hardware and
software components.4

2.2 What is Computer :


Computer is an electronic device that is designed to work with Information. The
term computer is derived from the Latin term ‘computare’, this means
to calculate or programmable machine. Computer can not do anything without a Program.
It represents the decimal numbers through a string of binary digits. The Word 'Computer'
usually refers to the Center Processor Unit plus Internal memory.
Charles Babbage is called the "Grand Father" of the computer. The First mechanical computer
designed by Charles Babbage was called Analytical Engine. It uses read-only memory in the
form of punch cards.
Computer is an advanced electronic device that takes raw data as input from the user and
processes these data under the control of set of instructions (called program) and gives the
result (output) and saves output for the future use. It can process both numerical and non-
numerical (arithmetic and logical) calculations.

Digital Computer Definition


The basic components of a modern digital computer are: Input Device, Output Device, Central
Processor Unit (CPU), mass storage device and memory. A Typical modern computer uses LSI
Chips. Four Functions about computer are5
2.3Generations of Computer
1.FIRST GENERATION
 Introduction:

4
https://www.techopedia.com/definition/4607/computer
5
http://ecomputernotes.com/fundamental/introduction-to-computer/what-is-computer
1. 1946-1959 is the period of first generation computer.
2. J.P.Eckert and J.W.Mauchy invented the first successful electronic computer
called ENIAC, ENIAC stands for “Electronic Numeric Integrated And
Calculator”.

2. SECOND GENERATION
 Introduction:
1. 1959-1965 is the period of second-generation computer.
2. 3.Second generation computers were based on Transistor instead of vacuum
tubes.
3. THIRD GENERATION
 Introduction:
1. 1965-1971 is the period of third generation computer.
2. These computers were based on Integrated circuits.
3. IC was invented by Robert Noyce and Jack Kilby In 1958-1959.
4. IC was a single component containing number of transistors.
4. FOURTH GENERATION
 Introduction:
1. 1971-1980 is the period of fourth generation computer.
2. This technology is based on Microprocessor.
3. A microprocessor is used in a computer for any logical and arithmetic function
to be performed in any program.
4. Graphics User Interface (GUI) technology was exploited to offer more comfort
to users.
5. FIFTH GENERATION
 Introduction:
1. The period of the fifth generation in 1980-onwards.
2. This generation is based on artificial intelligence.
3. The aim of the fifth generation is to make a device which could respond to
natural language input and are capable of learning and self-organization.
4. This generation is based on ULSI(Ultra Large Scale Integration) technology
resulting in the production of microprocessor chips having ten million electronic
component.6
3.Computers and its daily applications which are governed by
Law

Electronic governance or e-governance is the application of information and


communication technology (ICT) for delivering government services, exchange of
information, communication transactions, integration of various stand-alone systems
and services between government-to-citizen (G2C), government-to-business (G2B),
government-to-government (G2G), government-to-employees (G2E) as well
as back-office processes and interactions within the entire government
framework.[1] Through e-governance, government services are made available to

6
https://www.geeksforgeeks.org/generations-of-computer/
citizens in a convenient, efficient, and transparent manner. The three main target
groups that can be distinguished in governance concepts are government, citizens,
and businesses/interest groups. In e-governance, there are no distinct boundaries.[2]7

3.Cyber law
Updated: 06/22/2018 by Computer Hope

Cyber law is the part of the overall legal system that deals
with the Internet, cyberspace, and their respective legal
issues. Cyber law covers a fairly broad area, encompassing
several subtopics including freedom of expression, access
to and usage of the Internet, and online privacy.
Generically, cyber law is referred to as the Law of the
Internet.

Why are cyber laws needed?

Like any law, a cyber law is created to help protect people


and organizations on the Internet from malicious people
on the Internet and help maintain order. If someone breaks
a cyber law or rule, it allows another person or
organization to take action against that person or have
them sentenced to a punishment.

 See our computer crime term for an example of

crimes cyber laws help prevent.

7
https://en.wikipedia.org/wiki/E-governance
What happens if you break a cyber law?

There are different forms of punishment depending on the


type of cyber law you broke, who you offended, where
you broke the law, and where you live. In many situations,
breaking the rules on a website will result in your account
becoming suspended or banned and your IP
addressed blocked. To determine the consequences of your
action for minor offenses, we recommend reviewing the
companies terms of service or rules.

If you've committed a more serious offense such as hacking, attacking another person or
website, or causing another person or company distress, additional action may be taken

against you. 8

4 .Privacy Issues
Privacy is the ability of an individual or groups to secluded themselves or information about
their personal affairs. Supreme Court in the landmark judgement of K.S. Puttaswamy [Retd.]
and Anr V. Union of India9 which holds right to privacy protected under Article 14, 19 and
21 of the Constitution India. This case can also be linked to use of internet via. Computer,
laptop, mobile etc. can be used in wrong way so there is a need of strict laws which look at
the wide aspect

5 .Conclusion
Computers and laws are integral part of daily life. They can be used in different forms so as
to make our life comfortable. Law must be important concept where to follow then in certain
way of regulation on the other hand computer provides us with different functions with
special features have internet connectivity which bring all world in common platforms.

8
https://www.computerhope.com/jargon/c/cyber-law.htm
9
2018
The world with law and computer brings a strong feature to all of us but as coins has two side
considering the benefits there are some negative such as leak of information peoples are not
secure about their rights to maintain the balance we need a strict law to look the proper
functioning so that better balance can be created so that if can fulfill people needs and satisfy
them.

You might also like