You are on page 1of 7

Assignment:

Free open software

Lecture:
Mr. Hemanand

Subject:
Professional Issues in It

Subject Code:
HNDIT2403

Name:
Ameenul Aslam

Reg.No:
BAT/IT/2017/F/0031
1) Briefly explain the following terms related to global work force?
a) Out sourcing
IT outsourcing is the practice of using an external service provider to deliver some or all of the IT functions
required by a business including managing infrastructure, directing strategy and running the service desk

b) Off sourcing
Offshoring is the relocation of a business process from one country to another—typically an operational
process, such as manufacturing, or supporting processes, such as accounting. Typically this refers to a
company business, although state governments may also employ offshoring.

2) Information Technology has both positive and negative effect to the student
a) List 20 negative effect of It to the student
 Huge Expenditure
 Insufficient Teaching Methods
 Waste of Time
 Misguided due to Wrong Information
 Major Source of Distraction
 EBooks Replacing Physical Books Final Summary
 Partial to the Low Income Group of People
 Extinction of Good Handwriting
 Difficult to Deal with the Online Courses
 Losing Assignment of the Students
 Learners Get Disconnected from the Real World
 Creates Enough Opportunities for Cheating
 Kills creativity in students
 Distractions
 Misinformation
 Promotes Laziness

b) 20 positive effect of it to the student


 New job opportunities
 Distance learning
 Electronic books
 Collaborative learning
 Provide medium of research
 Online studies
 Get the new information
 Ability to communication
 Face the challenging work
 interactive multi-media
 Flexible and mobile working
 Create quality project
 Intellectual development
 Student are more in control of their learning
 Incredibly improves performance in all subject
 Discovery learning
 Individual learning
 Motivates learning
 Accessibility
3) Briefly explain the different between low and ethics?
 The law is defined as the systematic body of rules that governs the whole society and the actions of its
individual members. Ethics means the science of a standard human conduct.
 The law consists of a set of rules and regulations, whereas Ethics comprises of guidelines and principles
that inform people about how to live or how to behave in a particular situation.
 The law is created by the Government, which may be local, regional, national or international. On the
other hand, ethics are governed by an individual, legal or professional norms, i.e. workplace ethics,
environmental ethics and so on.
 The law is expressed in the constitution in a written form. As opposed to ethics, it cannot be found in
writing form.
 The breach of law may result in punishment or penalty, or both which is not in the case of breach of
ethics.
 The objective of the law is to maintain social order and peace within the nation and protection to all the
citizens. Unlike, ethics that are the code of conduct that helps a person to decide what is right or wrong
and how to act.
 The law creates a legal binding, but ethics has no such binding on the people.

4) Briefly explain 3 categories of ethical views ?


Deontological: Ethical theory concerned with duties and rights. How
people accomplish their goals is usually (or always) more important than what people accomplish.
Utilitarianism: A system of ethics according to which the rightness or wrongness of an action should be judged
by its consequences. The goal of utilitarian ethics is to promote the greatest happiness for the greatest number. The
notorious example is where there are 10 people on a boat and everyone will die unless one gets thrown off. A
utilitarian would throw someone off the boat - probably the weakest/oldest one
Natural rights: Theory of universal rights that are seen as inherent in the nature of people and not dependent on
human actions or beliefs.

5) Briefly explain the following terms in relative to computer data?


a) Invisible information gathering
Invisible information gathering. Define collection of personal information about someone without the
person's knowledge. Describe: whenever information has been collected through unauthorized software,
Cookies, ISP providers, and supermarket cards without someone knowing. Depending on the use this can be
illegal.

b) Secondary use
Secondary use: The use in research of information or human biological materials originally collected for a
purpose other than the current research purpose.

c) Computer matching
Computer matching refers to the computerized comparison of records for the purpose of establishing or
verifying eligibility for a federal benefit program or for recouping payments or delinquent debts under such
programs.

d) Computer profiling
Computer profiling, a record system (or record systems) is searched for a specified combination of data
elements, i.e., the profile. Profiling involves the use of inductive logic to determine indicators of
characteristics and or behavior patterns that are related to the occurrence of certain be- havior.
6) Explain the way the consent of computer hacking change over time from early 1960 up to today?
The 1960’s-1970’s Hackers
Essentially the term “hack” has always meant a shortcut that doesn’t necessarily solve a problem well or in a good
way.In the 1960’s, a group of computer science students used the term “hacking” that they took from model train
lovers who altered or “hacked” switches and tracks to make them run better. These new hackers were learning
ways to change computer software and hardware to make it faster. The worst crimes committed during this period
were free long-distance phone calls. It was discovered that by blowing a particular high-pitch whistle tone into the
phone, 2600-hertz, AT&T’s long-distance switching system could be accessed. This became so popular that
hackers were engineering special boxes with a whistle that came free in cereal boxes to make free calls. The FBI
eventually caught on and started cracking down on wire fraud.

The 1980’s Golden Age of Hacking


The 1980’s were considered the “Golden Age” of hacking because of the increase in sales of home personal
computers that were able to talk to one another via the phone network. Kids were breaking into any computer
system they could, often just to be able to say they did and to explore. Low-grade “crimes” were committed like
printing out lots of paper at a business. Hackers were meeting up on digital hangouts to share passwords and
advice on breaking into systems. After WarGames premiered, the FBI went on high alert and caught six
Milwaukee teens who actually hacked into a nuclear weapon research facility.

The 1990’S Hackers


Riding on the coattails of the big changes that occurred in the 1980s, the 1990s were when hacking really began to
achieve notoriety. The term hacker was tarnished by an ever increasing number of cyber crimes perpetrated by
“crackers” (or malicious hackers) and the high-profile arrests that followed.

Kevin Mitnick, Kevin Poulsen, Robert Morris and Vladimir Levin were some of the more notable crackers to
come out of the decade, having been arrested and convicted for the likes of stealing propriety software from big
name corporations, duping radio stations to win luxury cars, launching the first computer worm, and leading the
first digital bank heist.

The once close-knit hacking community also saw its breakdown in this decade. In an effort to crack down on
computer crime, the Secret Service launched sting investigations, conducted early morning raids and arrested a
number of hackers. Trying to avoid conviction, members in the hacking community began to inform on each other
in exchange for immunity.

Today’s Dangerous Hackers

As the Internet evolved and systems became more sophisticated, so did the hackers. No longer are they curious
and playing games, they are out for blood and extremely dangerous. Major companies have had security breaches,
exposing credit card information, social security numbers and e-mail addresses of millions. This information is
sold to the highest bidder on the black market. Computer viruses are used by the government to diffuse their
enemies’ nuclear programs. The White House has been hacked, Russia used hackers to coordinate their attack on
Georgia in 2008, and one of America’s largest insurance companies, Anthem was hacked into, affecting over 80
million customers. Today’s hackers are the most dangerous kind and one has to wonder what the future holds as
we go more and more digital every day.

7) Briefly the forming laws for the field of information communication technology?
 The last decade has seen the introduction of computers and information technology at many levels of human
transaction. Information technology (IT) is now used for data collation, in daily commercial transactions like
transfer of funds, conclusion of contract, and complex diagnostic purposes in fields such as law, medicine and
transport. The use of IT has expanded rapidly with the introduction of multimedia and the Internet. Any new
technology inevitably raises a number of questions ranging from the legal to the ethical and the social.
Information & Communications Technology Law covers topics such as: the implications of IT for legal
processes and legal decision-making and related ethical and social issues. (Publisher:-Carfax Publishers,
Publication type :-Journals, ISSN:-13600834,Coverage:-1992-1995, 2009-ongoing, Country United
Kingdom:- SIR Ranking of United Kingdom)
8) What is NIPO in Sri Lanka? Mention the responsibility of NIPO Sri Lanka?
The National Intellectual Property Office of Sri Lanka established under the Intellectual Property Act No 36 of
2003 is mandated with the administration of the intellectual Property System in Sri Lanka.
 Administration of Intellectual Property including registration of trademarks, patents, industrial designs and
registration and administration of collective management societies.

9) Digital technology and the internet has make copyright validation easier and cheaper
a. Do you agree with this
b. Give the reason to prove your answer
10) Mention five possible health problems rise you due to it industry , briefly explain how those problems can be
avoided?

 Vision Problems
o Computers are notorious for their bright lights, glare and flickering images that can cause strain on your
eyes. Finding that you constantly focusing on the screen with delays in blinking can result in drying out
your eyes.

 Repetitive Stress Injuries


o You may notice pain in your neck, shoulders, or really anywhere from the shoulders to your fingers
related to repetitive muscle use.
Using the computer may cause you to use your muscles in an odd way that may cause increased stiffness,
pain, or swelling in any of those areas.
One of the most common conditions related to repetitive use of your muscles when using the computer is
carpal tunnel syndrome.

 Headaches
o Headaches are common and may occur because of the increased muscle tension or from pain in the neck.
Any vision problems, or continued strain on the eyes can also cause headaches.

 Obesity
o Prolonged use of computers may lead to an overall sedentary lifestyle that lacks adequate physical activity
and/or exercise.
In children prolonged use of computers, or electronics in general, is a major contributing factor to obesity.

 Hearing Loss From Headphones


o At times you may be required to use headphones in order to better concentrate on something or maybe
because the background noise level is too high. Frequently individuals will turn the volume up very high,
when actually it would not even need to be close to that volume to hear the audio effectively. Listening to
audio with headphones on a consistent basis and using a volume that is too high can result in hearing
impairment.

 Increased Risk of Blood Clots


o Being immobile and not allowing your blood a chance to get moving around your extremities may cause it
to pool, creating build-up of blood cells that will eventually clot (or stick together) due to not being able to
be circulated around.
Blood clots can be life-threatening if they break away from where they are lodged and travel to another
area, such as your lungs.
Sitting in one position for too long (especially if your legs are crossed), generally over a period of over 4
hours, can greatly increase your risk for this

 Sleeping Problems
o Artificial lighting that is given off from computer screens can actually trick your brain and suppress its
release of melatonin – the substance that assists your sleeping patterns.
11) What is computer crime? Give 5 examples computer crime?
 Computer crime is an act performed by a knowledgeable computer user, sometimes referred to as a hacker
that illegally browses or steals a company's or individual's private information. In some cases, this person or
group of individuals may be malicious and destroy or otherwise corrupt the computer or data files.

Example:-
o Copyright violation - Stealing or using another person's Copyrighted material without permission.
o Cracking - Breaking or deciphering codes that are being used to protect data.
o Cyber terrorism - Hacking, threats, and blackmailing towards a business or person.
o Cyberbully or Cyberstalking - Harassing or stalking others online.
o Cybersquatting - Setting up a domain of another person or company with the sole intentions of selling
it to them later at a premium price.
o Creating Malware - Writing, creating, or distributing malware (e.g., viruses and spyware.)
o Espionage - Spying on a person or business.
o Fraud - Manipulating data, e.g., changing banking records to transfer money to an account or
participating in credit card fraud.
o Harvesting - Collect account or other account related information on other people.
o Human trafficking - Participating in the illegal act of buying or selling other humans.
o Identity theft - Pretending to be someone you are not.
o Illegal sales - Buying or selling illicit goods online including drugs, guns, and psychotropic
substances.
o Phishing - Deceiving individuals to gain private or personal information about that person.
o Child pornography - Making or distributing child pornography.

12) Give to technique to protect your personal & financial informal to online shopping
 Skip the Debit Card. When shopping online it's best to stick to credit cards or payment services like
PayPal
 Shop Secure Sites Only
 Update Your Software
 Outsmart Email Scams
 Just Say No to Clicking Links
 Beef Up Your Passwords
 Never Give More Info Than Needed
 Don't Go Public(don’t use public or open hotspot or WIFI for online shopping

13) What is digital forgery 5 examples?


 Digital forgery (or digital tampering) is the process of manipulating documents or images for the intent of
financial, social or political gain. This paper provides a brief introduction to the digital forgery
Example
o Creating a fake copy or imitation of a document
o forging a signature
o faking a masterpiece
o creating a cheap replica of an expensive original device to faking government documents like a
license, birth certicate etc.
(All of these fakes can be called as forgeries Digital forgery involves creating the same fakes in
electronic form.)
14) Explain the term net neutrality and state the purpose of it?

 Network neutrality or “net neutrality” is often used as a broad label in public policy and regulatory
discussions concerning these issues. Net neutrality, however, is a wide-ranging term that can mean
different things depending on one’s point of view. Discussions about net neutrally, for example, often
touch on concerns about freedom of expression, competition of service and user choice, impact on
innovation, nondiscriminatory traffic management practices, pricing, and overall business models.

 It is the principle that Internet service providers (ISPs) should give consumers access to all legal content
and applications on an equal basis, without favoring some sources or blocking others.
It prohibits ISPs from charging content providers for speedier delivery of their content on "fast lanes" and
deliberately slowing the content from content providers that may compete with ISPs.
The Federal Communications Commission (FCC) in USA passed new net neutrality regulations designed
to protect the free flow of content on the Internet.

15) The computer crime hack 24 2007 specify three broad category of computer crime?
briefly explain these categories?

 Computer related Crimes – Computers used as a tool for criminal activity such as theft, fraud etc.

 Hacking – Affects integrity, availability and confidentiality of a computer system or network (also
includes viruses, worms etc.)

 Content related Cyber Crime – Computers with internet used to distribute illegal data. E.g.: Internet
based pornography, criminal copyright violation.

You might also like