ICT

 



UNIT 6. ICT and Cyber Law (Th.5 Marks)

 

 

1. What is ICT? Describe it with its social impacts.

 

Stands for "Information and Communication Technologies." ICT is the process of communicating using internet and technology. This includes the Internet, wireless networks, cell phones, and other communication mediums.

Social Impact of ICT:

Some of the positive impacts  of ICT:

1.       Education:

We can able to study our courses through different kinds of ICT devices like mobile, computer etc. for example : learning from zoom, YouTube etc. Thus, ICT becomes gift to the education sectors.

2.       Medicine:

Doctors can treat diseases with the help of computer system attached to medical equipment such as CT scan, Ultra sound etc.

3.       Banks:

All financial transactions are done by computer software. They provide security, speed and convenience.

 

4.       Multimedia :

Audio or video composition and editing have been made much easier by using computer. Anybody having computer or mobile devices can now enter in the filed of media production.

 

5.       Ecommerce:

One can create the business websites for selling and buying  goods as well as providing services online so that it saves money.

 

Some of the Negative impacts of ICT:

1.       Health Problem:

Computers along with any ICT enabled system decrease in physical activities affecting health in a major way.

2.        

 

 

 

 

 

 

3.       Piracy:

Piracy is the main problem nowadays which means copying the files documents, audio files, video files, software without.

 

 

4.       Pornography:

One can post the adult contents like text, images, video etc. on net and many social networking sites, which causes and disturbs the one image.

 

5.       Hacking :

Hackers are always trying to hack the important information and resources of organizations that causes the leak of information.

 

6.       Privacy:

Information about any one can be easily searched and tracked.

 

 

 

2. What is Digital Divide?

 

Digital Divide is the term used for the gap between the computer literate and illiterate people. Or it can be said that it is a division between technical and non-technical man powers in the field. IT is the modern technology and for the use of this technology, one can have sound knowledge of computers. But still there are a great number of people, who do not know the computers’ operations. They do not understand the computer related terms. This difference or gap is called digital divide. First, this term came into practice in the mid of 1990s by political speeches and news media. This division is increasing day by day in between urban area people and rural area people, educated and uneducated, rich and poor and so on. So it has become a global issue and governments are trying to bridge this gap.

 

 

 

3. What are the computer ethics or cyber ethics?

 

The computer ethics or the cyber ethics are the set of moral principles which should be strictly followed by the computer professionals. The intention of the computer or cyber ethics is to avoid the criminal activities through the use of computers. The following are some examples of computer ethics:

 

i. Do not use other’s password

 

ii. Do not steal other’s information

 

iii. Do not use computers to harm others

 

iv. Do not disclose other’s secrecy

 

v. Do not spread virus in the network

 

vi. Do not copy licensed software, which you have not paid

 

vii. Do not alter other’s data

 

viii. Do not take possession to other people’s intellectual property

 

ix. Do not misuse electronic transaction

 

x. Do not use computer to bear false witness, etc.

 

 

 

4. What is cyber crime? List out some examples of cyber crimes.

 

The act harming people  through misusing computers, Internet or other electronic media is called cyber crime. As the use of Information Technology is increasing, the act of cyber crime is also increasing day by day. The following are some examples of cyber crime:

 

i. Misuse of computers

 

ii. Spreading virus

 

iii. Stealing other’s information

 

iv. Pirating licensed software

 

v. Disclosing of other’s secrecy

 

vi. Misuse of electronic transaction and electronic media

 

vii. Rude and vulgar comments in Internet on racial, communal and others

 

viii. Alteration of other data without permission

 

ix. Spying others’ information

 

x. Cracking or hacking

 

xi. Password guessing

 

xii. Salami saving and data diddling

 

xiii. Forgery

 

xiv. DOS attack, etc.

 

 

 

 

5. What is Cyber Law? Define and write some provisions of it.

 

The law regarding the use of computers is called Cyber Law. It highly concerns with the misuse of the computers, Internet and other electronic media, which are specially used for information flow. Cyber ethics just suggest not committing computer crimes or cyber crimes but the cyber law strictly defines the punishment in case of violation of the laws or cyber principles. Actually the cyber law is in practice to support the cyber ethics. Nepal Government also has issued the Cyber Law on 11th Falgun, 2061 (18th March 2005) as “The Electronic Transaction Ordinance, 2005”.

 

It has the following provisions:

 

·       Electronic and Digital Signature Law

 

·       Intellectual Property Law

 

§  Copyright Law

 

§  Trademark Law

 

§  Semiconductor Law

 

§  Patent Law

 

·       Telecommunication Law

 

·       Data Protection and Privacy Law

 

 

 

 

6. Explain the different objectives of IT Policy of Nepal.

 

The IT policies of Nepal are:

 

·       To declare IT as a high priority sector of government and make it practical

 

·       To establish knowledge based industries to increase employment

 

·       To make public information and service delivery inclusive and effective through the philosophy of e-government

 

·       To increase the productive use of IT in social, economic and business organizations

 

·       To increase access to IT related international attempts and developments

 

·       To make Government Integrated Data Center (GIDC) effective in order to develop as an infrastructure for IT development

No comments:

Post a Comment

OOP

  UNIT 5. Object Oriented Programming (3 marks)     1. What are the programming methods or approaches of program development?   Th...

designs

designs

Pages