Professional Documents
Culture Documents
X A, X B, X C, X D, X e - Computer - 63758 - 1
X A, X B, X C, X D, X e - Computer - 63758 - 1
Cyber Ethics
Exercise:-
Answer the following questions:-
1. What is cyber ethics?
Ans: Cyber ethics involve the code of conduct to use Information Technology
in a responsible way.
2. Define netiquettes. List some precautions you should follow while chatting.
Ans: Net etiquette is defined as a special set of rules that governs the behavior
of a user communicating online. The communication can be via e-mails,
forums, blogs, and social networking sites, etc.
Guidelines to follow while communicating online:
a) Use proper salutation and signature
b) Include subject line
c) Keep your message concise
d) Be respectful, avoid sarcasm
e) Respect other’s privacy
f) Obey copyright laws
g) Do not indulge spamming
h) Use appropriate language
i) Do not reveal sensitive information online
3. Define E-commerce.
1|P a g e
5. Why should an e-commerce website have a privacy policy?
Ans:
Ans: The critical issue in maintaining data privacy is to share data while
protecting personal information.
Successful security solutions require a convergence of three components,
i.e., Technology, People, and Processes.
a. People
➢ Do not share your sensitive financial information like credit card
numbers, personal verification details, OTP, etc, with anyone, especially
on the phone.
b. Processes
➢ Check the privacy policies of online merchants before signing up or
making financial transactions online.
➢ Select the privacy clauses that restrict online retailers to share your
personal information with other businesses.
➢ Read the reviews of the online customers of the site before making any
purchases.
c. Technology
➢ Always set strong Password
➢ Check if the website URL has https: and a padlock icon next to it,
indicating that it is a secure website, before entering payment details
into any site.
2|P a g e
➢ Update the operating system and regularly install safety patches to
safeguard your computing devices from malicious software, illegal
access to bank account numbers and credit card details.
➢ Never use open connections for communication. Use secure wi-fi or
mobile data connections for making any online transactions.
Ans: Intellectual property rights are the rights of the owner of information to
decide how much information is to be exchanged, shared, or distributed.
Also, it gives the owner a right to decide the price for doing so.
To protect one’s intellectual property rights one can, get information
copyrighted or patented or use trademarks.
Ans: The four types of IPR to protect our ideas are as follows:
S. No IPR Example
1 Trade Secrets It protects secret information. New invention, Coke
formula
3|P a g e
2 Trademarks A logo or symbol that is Our school logo, apple
printed on business items to for cell phone
make it exclusive, is known as
trademark.
3 Copyrights Copyright is a right that is Books, movies,
granted by law to the creator drawings, music, novels,
or inventor for his original etc.
work.
4 Patents Patent is a legal document that Swipe feature or iPhone
gives the inventor sole rights design
to make, sell or use an
invention.
4|P a g e