Professional Documents
Culture Documents
DOC-20240713-WA0002
DOC-20240713-WA0002
3 COMPUTER HARDWARE
Hardware represents the physical and tangible components of a computer, i.e. the components
that can be seen and touched. The computer system consists of mainly four basic units:
a) Input device
b) Storage device
c) Central Processing Unit (CPU)
d) Output device
Input device
Devices used to provide data and instructions to the computer are called
Input devices. Some important input devices are:
• Key board
• Mouse
• Scanner
• MICR (magnetic ink character recognition)
• Web camera
• Microphone etc.
a) Keyboard
The Key board is used for typing text into the computer. It is also known as standard Input
device. A computer keyboard is similar to that of a type writer with additional keys. The
most commonly available computer keyboard has 104 keys. There are different types of
keys on the keyboard. The keys are categorized as:
• Alphanumeric keys , including letters & numbers
• Punctuation keys, such as colon (:), semicolon (;) Question mark (?), Single & double
quotes (‗,‖)
• Special keys such as arrow keys, control keys, function keys (F1 to F12), HOME, END
etc.
b) Mouse
It is a device that controls the movement of the cursor on a monitor. A mouse will have
2 buttons on its top. The left button is the most frequently used button. There will be a
wheel between the left and right buttons. This wheel enables us to smoothly scroll through
screens of information. As we move the mouse, the pointer on the monitor moves in the
same direction. Optical mouse is another advanced pointing device that uses a light
emitting component instead of the mouse ball. Mouse cannot be used for entering the data.
It is only useful to select the options on the screen.
c) Scanner
It is an input device that can read text or illustrations printed on paper and translate into
digital form. The main advantage of these scanners is that the data need not be entered
separately resulting in saving lot of time.
a) Memory Unit
It is also known as the primary storage or main memory. It stores data, program
instructions, internal results and final output temporarily before it is sent to an
appropriate output device. It c o n s i s t s of t h ou s a n d s of cells called ―storage locations.
These cells activate with ―off-on or binary digits (0,1) mechanism. Thus a character
either a letter or numerical digit is stored as a string of (0, 1) Binary digits (BITS). These
bits are used to store instructions and data by their combinations.
b) Control Unit
It acts as a central nervous system and ensures that the information is stored correctly
and the program instructions are followed in proper sequence as well as the data are
selected from the memory as necessary. It also coordinates all the input and output devices
of a system.
Output device
Any device that is capable of representing information on a computer is called an Output
device. Output devices receive information from the CPU and present it to the user in the
desired form. Some important Output devices are: Monitor, Printer
a) Terminal/Monitor
It is similar to TV screen- either a monochrome (black & white) or colour – and it displays
the output. It is also referred as Visual Display Unit (VDU). Several types of monitors
are in use. Some of them are Colour Graphic A d a p t e r (CGA), E n h a n c e d Graphics
Adaptor (EGA), Video Graphics Adapter (VGA) and Super Video Graphics Adapter
(SVGA). The screen sizes differ from system to system. The standard size is 24 lines by
80 characters. Most systems have provision for scrolling which helps in moving the text
vertically or horizontally on the screen.
b) Printer
A printer is used to transfer data from a computer onto paper. The paper copy obtained
from a printer is often referred as printout. The different printers and their speeds are as
follows:
1 Dot – Matrix printer Prints the character in dotted pattern through printer200/300 to 700 CPS
ribbon using either 24 pin or 9 pin
2 Ink Jet printer Work by spraying ionized ink Slow, 90 CPS
3 Laser printer Also called page printer. Uses laser beam to produce 6 to 12 PPM
an image.
4 Line printer Prints lines at a time instead of single characters. 300 to 600 LPM
Laser printer
COMPUTER MEMORY
A memory is just like a human brain. It is used to store data and instructions. Computer
memory is the storage space in the computer, where data is to be processed and instructions
required for processing are stored. The memory is divided into large number of small parts
called cells. Each location or cell has a unique address, which varies from zero to memory size
minus one. For example, if the computer has 64k words, then this memory unit has 64 * 1024
= 65536 memory locations. The address of these locations varies from 0 to 65535.
Types of memory
Memory is primarily of three types
• Cache Memory
• Primary Memory/Main Memory
• Secondary Memory
a) Cache Memory
Cache memory is a very high speed semiconductor memory which can speed up the CPU. It
acts as a buffer between the CPU and the main memory. It is used to hold those parts of data
and program which are most frequently used by the CPU. The parts of data and programs are
transferred from the disk to cache memory by the operating system, from where the CPU can
access them.
b) Secondary Memory
This type of memory is also known as external memory or non-volatile. It is slower than the
main memory. These are used for storing data/information permanently. CPU directly does not
access these memories; instead they are accessed via input-output routines. The contents of
secondary memories are first transferred to the main memory, and then the CPU can access it.
For example, Compact disk, CD-ROM, Digital Video Disk (DVD), Hard Drive Disk (HDD)
etc.
Units of memory
The computer stores a character in the storage cells with binary (0, 1) mechanism. Thus
the basic unit of memory is a bit (binary digit – 0, 1). To store a character, a computer requires
8 bits or 1 byte. This is called the word length of the storage unit. Hence the storage capacity
of the computer is measured in the number of words it can store and is expressed in terms
of bytes. The following table lists some higher storage units:
Units of memory
Unit Description
Kilobyte (KB) 1 KB = 1024 Bytes
Megabyte (MB) 1 MB = 1024 KB
GigaByte (GB) 1 GB = 1024 MB
TeraByte (TB) 1 TB = 1024 GB
PetaByte (PB) 1 PB = 1024 TB
a) Storage capacity
i) Floppy Disk
It is also referred as ―Diskette: and is made of flexible Vinyl material. It has a small hole
on one side called ―Right protect notch, which protects accidental writing/deleting
the information from the disk. There is a hole in the centre through which the spindle of
drive unit rotates the disk. The disks are available in two sizes of 5.25 and 3.5 inches
and these could be either low- density or high-density floppies. Storage capacity of
floppies is measured in kilobytes (KB) and megabytes (MB). The details about the
storage capacities of the floppies are presented below:
Storage capacities of the floppy disk
Floppy Disk Storage Capacity Size (Diameter)
Low Density 360 KB 5.25 inches
High Density 1.2 MB 5.25 inches
High Density 1.44 MB 3.5 inches
Extended 2.8 MB 3.5 inches
Characteristics of Ports
A port has the following characteristics:
• External devices are connected to a computer using cables and ports.
• Ports are slots on the motherboard into which a cable of external device is plugged in.
• Examples of external devices attached via ports are the mouse, keyboard, monitor,
microphone, speakers, etc.
b) Parallel Port
• Used for scanners and printers
• Also called printer port
• 25 pin model
• IEEE 1284-compliant Centronics port
c) PS/2 Port
• Used for old computer keyboard and mouse
• Also called mouse port
• Most of the old computers provide two PS/2 port, each for the mouse and keyboard
• IEEE 1284-compliant Centronics port
f) Power Connector
• Three-pronged plug.
• Connects to the computer's power cable that plugs into a power bar or wall socket.
g) Firewire Port
• Transfers large amount of data at very fast speed.
• Connects camcorders and video equipment to the computer.
• Data travels at 400 to 800 megabits per seconds.
• Invented by Apple.
• It has three variants: 4-Pin FireWire 400 connector, 6-Pin FireWire 400 connector, and
9-Pin FireWire 800 connector.
h) Modem Port
• Connects a PC's modem to the telephone network.
i) Ethernet Port
• Connects to a network and high speed Internet.
• Connects the network cable to a computer.
• This port resides on an Ethernet Card.
• Data travels at 10 megabits to 1000 megabits per seconds depending upon the network
bandwidth
j) Game Port
• Connect a joystick to a PC
• Now replaced by USB
l) Sockets
• Sockets connect the microphone and speakers to the sound card of the computer.
COMPUTER SOFTWARE
Software is a set of programs, which is designed to perform a well-defined function. A program
is a sequence of instructions written to solve a particular problem. The basic difference
between the Hardware and Software is just the same as that exists between TV and TV
studio. Without TV studio (software) from where the programs are telecast, the TV
(Hardware) is a dead machine.
Types of software
There are two types of software:
• System Software
• Application Software
System Software
The system software is a collection of programs designed to operate, control, and extend the
processing capabilities of the computer itself. System software is generally prepared by the
computer manufacturers. These software products comprise of programs written in low-level
languages, which interact with the hardware at a very basic level. System software serves as the
interface between the hardware and the end users. System software contributes to control and
performance of a computer system. System software acts behind the scenes to manage resources
and operations of a computer system. System software interfaces between computer hardware
and the application software. An example of system software is the Operating System (OS).
GUI: The system can be operated with mouse and keyboard. Ex: Windows 95, Windows
XP etc
• Disk Operating System (DOS): It was developed as early as 1980 by Bill Gates at the
age of 19. It is suited for personal computers. Dos is a single user and single task
operating system
• WINDOWS: It works with DOS and it supports single user and multitask system.
It requires a powerful PC with a minimum RAM of 8 MB.
• UNIX AND XENIX: It is suited for multi-user and multi-task system
Application Software/programs
Application software products are designed to satisfy a particular need of a particular
environment. All software applications prepared in the computer lab can come under the
category of Application software. Application software may consist of a single program, such
as Microsoft's notepad for writing and editing a simple text. It may also consist of a collection
of programs, often called a software package, which work together to accomplish a task.
Examples of Application software are the following:
DATABASES
What is a Database?
It is an organised collection of data with minimum duplication to service many applications at
the same time by storing and managing data so that they appear to be in one location. When a
transaction occurs, e.g. a withdrawal in a bank, some data would be stored. All the data that
completely describe a transaction is called a record. E.g.
Withdrawal record
The database management system acts as the interface between the application programmes
and the data. Database management system is special software used to create and maintain a
database and enable individual business applications to extract the data they need without
having to create separate files or data definitions in their computer programmes.
Advantages of Databases
• Data redundancy is reduced considerably thereby solving problems of excessive
memory requirements and inconsistencies.
• Response time is faster since they can directly interact with the Database Management
System
• Databases offer a wide variety of security and privacy feature for organizational
confidential data.
COMPUTER NETWORKS
a) Network Cables
Network cables are used to connect computers. The most commonly used cable is Category
5 cable RJ-45.
b) Distributors
A computer can be connected to another one via a serial port but if we need to connect many
computers to produce a network, this serial connection will not work. The solution is to use a
central body to which other computers, printers, scanners, etc. can be connected and then this
body will manage or distribute network traffic.
c) Router
A router is a type of device which acts as the central point among computers and other devices
that are a part of the network. It is equipped with holes called ports. Computers and other
devices are connected to a router using network cables. Now-a-days router comes in wireless
modes using which computers can be connected without any physical cable.
d) Network Card
Network card is a necessary component of a computer without which a computer cannot be
connected over a network. It is also known as the network adapter or Network Interface Card
(NIC). Most branded computers have network card pre-installed. Network cards are of two
types: Internal and External Network Cards.
NETWORK TOPOLOGIES
Network topologies can be classified as follows:
a) BUS Topology
Bus topology is a network type in which every computer and network device is connected to
single cable. When it has exactly two endpoints, then it is called Linear Bus topology.
Features of bus topology
In the bus topology, each node (computer, server, peripheral etc.) attaches directly to a common
cable.
• This topology most often serves as the backbone for a network.
• In some instances, such as in classrooms or labs, a bus will connect small workgroups.
• It is the simplest method of networking computers.
• It consists of a single cable known as a trunk, backbone or segment that connects all the
computers in the network.
• Each system is directly attached to a common communication channel. Signal that is
transmitted over the channel makes up the messages.
• In a bus topology only one computer can send data at a time, therefore the more
computers in a bus the slower data transmission in the network
b) RING Topology
It is called ring topology because it forms a ring as each computer is connected to another
computer, with the last one connected to the first.
ii) Disadvantages
• Failure of one node result into entire network failure
• Detection of fault is very difficult in ring topology
• Isolation of fault is not easy in this topology
c) STAR Topology
In this type of topology all the computers are connected to a single hub through a cable. This
hub is the central node and all others nodes are connected to the central node.
d) MESH Topology
It is a point-to-point connection to other nodes or devices. All the network nodes are connected
to each other. Mesh has n(n-1)/2 physical channels to link n devices. There are two techniques
to transmit data over the Mesh topology, they are:
• Routing
• Flooding
e) TREE Topology
It has a root node and all other nodes are connected to it forming a hierarchy. It is also called
hierarchical topology. It should at least have three levels to the hierarchy.
INTERNET
4.1 INTRODUCTION
In the present age of information Technology, use of Internet is becoming quite popular for
accessing information on any topic of your interest. It also provides tremendous opportunities
to students, researchers and professionals for getting information on matters related to academic
and professional topics and lot more. In the present world, most of the people who have
computers around themselves use Internet to access information from the World Wide Web,
exchange messages & documents and e-services.
INTERNET
The Internet is a global system of interconnected computer networks that use the standard
Internet protocol suite (TCP/ IP) to serve billions of users worldwide. It is a network of networks
that consists of millions of private, public, academic, business, and government networks, of
local to global scope, that are linked by a broad array of electronic, wireless and optical
networking technologies. The Internet carries a vast range of information resources and
services, such as the interlinked hypertext documents of the World Wide Web (WWW) and the
infrastructure to support electronic mail. To access the Internet, an existing network need to pay
a small registration fee and agree to certain standards based on the TCP/IP (Transmission
Control Protocol/Internet Protocol). TCP "converts messages into streams of packets at the
source, and they are reassembled back into messages at the destination. IP handles the
addressing, and makes sure that a packet reaches its destination through multiple nodes and
even across multiple networks with multiple standards.
Internet terminology
Below are some of the terminologies used in the internet
a) Browser
A piece of software such as Mozilla Firefox and Internet Explorer that allows a computer to
access and display documents, view pictures, hear sound, and view video clips from the World
Wide Web.
b) E-mail
This is a mail that is electronically transmitted by your computer. As opposed to snail mail, e-
mail sends messages instantaneously, anywhere in the world. It has the capability to send
messages at any time and to anyone.
c) File Transfer Protocol (FTP)
The standard method for downloading and uploading files over the Internet. With FTP, you
can login to a server and transfer files (meaning you can "send" or "receive" files).
d) Homepage
This is the first page that is viewed when the browser starts. It is also the page of a Web site
that provides the introduction or content with links.
i) Web Page
This is a single hypertext file or a page that is part of a Web site.
j) Website
This is a collection of World Wide Web pages or files.
Uses of Internet
Internet has been the most useful technology of the modern times which helps us not only in
our daily lives, but also our personal and professional lives developments. The internet helps
us achieve this in several different ways. For the students and educational purposes the internet
is widely used to gather information so as to do the research or add to the knowledge of various
subjects. Even the business professionals and the professionals like doctors, access the internet
to filter the necessary information for their use. The internet is, therefore, the largest guide for
everyone, in all age categories. The internet has also served to be more useful in maintaining
contacts with friends and relatives who live abroad permanently. Some of the uses of the
internet include:
a) E-mail: Email is now an essential communication tools in business. With e-mail one
can send and receive instant electronic messages, which work like writing letters. The
messages are delivered instantly to people anywhere in the world, unlike traditional
mail that takes a lot of time. Email is free, fast and very cheap when compared to
telephone, fax and postal services.
b) 24 hours a day - 7 days a week: Internet is available, 24x7 days for usage.
c) Information: Information is probably the biggest advantage internet is offering. There
is a huge amount of information available on the internet for just about every subject,
ranging from government services, trade fairs and conferences, market information,
new ideas and technical support. Users of the internet can almost find any type of data
on almost any kind of subject that they are looking for by using search engines like
Google, yahoo, msn, etc.
d) Online Chat: internet users can access many ‘chat rooms’ on the web that can be used
to meet new people, make new friends, as well as to stay in touch with old friends.
People can chat in MSN and yahoo websites.
e) Services: Many services are provided on the internet like internet banking, job
searching, purchasing tickets, hotel reservations, guidance services on array of topics
engulfing every aspect of life.
f) Communities: Communities of all types have sprung up on the internet. It is a great way
to meet up with people of similar interest and discuss common issues.
g) E-commerce: Along with getting information on the Internet facilitate online shopping.
There are many online stores and sites that can be used to look for products as well as
buy them using credit card. Users of the internet do not need to leave their houses; they
can do all their shopping from the convenience of their home. It has got a real amazing
and wide range of products from household needs, electronics to entertainment.
h) Entertainment: Internet provides facility to access wide range of Audio/Video songs,
plays films. Many of which can be downloaded. One such popular website is YouTube.
Software Downloads: internet users can freely download innumerable, software like
utilities, games, music, videos, movies, etc from the Internet.
Limitations of Internet
a) Theft of Personal information: Electronic messages sent over the Internet can be easily
snooped and tracked, revealing who is talking to whom and what they are talking about.
If you use the Internet, your personal information such as your name, address, credit
card, bank details and other information can be accessed by unauthorized persons. If
you use a credit card or internet banking for online shopping, then your details can also
be ‘stolen’.
b) Negative effects on family communication: It is generally observed that due to more
time spent on Internet, there is a decrease in communication and feeling of togetherness
among the family members.
c) Internet addiction: There is some controversy over whether it is possible to actually be
addicted to the Internet or not. Some researchers claim that it is simply people trying to
escape their problems in an online world. Children using the Internet have become a
big concern.
d) Virus threat: Today, not only are humans getting viruses, but computers are also.
Computers are mainly getting these viruses from the Internet. Virus is a program which
disrupts the normal functioning of your computer systems. Computers attached to
internet are more prone to virus attacks and they can end up into crashing your whole
hard disk.
e) Spamming: It is often viewed as the act of sending unsolicited email. This multiple or
vast emailing is often compared to mass junk mailings. It needlessly obstructs the entire
system. Most spam is commercial advertising, often for dubious products, get-rich-
quick schemes, or quasi-legal services. Spam costs the sender very little to send — most
of the costs are paid for by the recipient or the carriers rather than by the sender
Information browsing
If one will go onto the internet and type the herald’s website address www.herald.co.zw he will
be able to read the latest version of the paper on the internet. It would allow one to open any
one edition of the herald. www.herald.co.zw is referred to as the URL (Uniform Resource
Location), which helps the Internet browser to locate a user’s requested page. Information
browsing also includes the use of search engines e.g. www.google.com, on which a user type
some keywords specifying a search criteria and click search for the browser to search the whole
internet for the occurrence of the keyword.
Search
Services of internet
E-mail, FTP, Telnet Email, discussion groups, long-distance computing, and file transfers are
some of the important services provided by the Internet.
a) Email- e-mail is an Internet facility that allows individuals to write each other mail and
send them through the internet to the recipient. Typically for one to send or receive e-
mail, you must be logged on to your account. One’s messages are stored in his mailbox
(which is itself made up of the inbox, bulk box and the sent box). E-mail has added
features of being able to forward, save, delete and compose message. Format of e-mail
is like Format of e-mail is like
susan@yahoo.com indicate the service provide
Account holder
This means that Susan has an e-mail account with a company called Yahoo.
b) FTP (File Transfer Protocol) File Transfer Protocol, is an Internet utility software used
to uploaded and download files. It gives access to directories or folders on remote
computers and allows software, data and text files to be transferred between different
kinds of computers. FTP works on the basis of same principle as that of Client/ Server.
FTP “Client” is a program running on your computer that enables you to communicate
with remote computers. The FTP client takes FTP command and sends these as requests
for information from the remote computer known as FTP servers. To access remote FTP
server it is required, but not necessary to have an account in the FTP server. When the
FTP client gets connected, FTP server asks for the identification in terms of User Login
name and password of the FTP client. If one does not have an account in the remote
FTP server, still he can connect to the server using anonymous login.
c) Telnet (Remote Computing) Telnet or remote computing is telecommunication utility
software, which uses available telecommunication facility and allows you to become a
user on a remote computer.
d) Newsgroups; When one has one an e-mail, he may specify his areas of interest e.g.
recreational, sport, food, science and technology such that should anyone have any news
he will convey it to the news group.
Task
1. Explain the five types of internet connections listed above
2. State the advantages and disadvantages of each type of internet connection.
Requirements for one to connect to the Internet
You have to subscribe to the Internet Service Provider like mweb, zarnet, ecoweb. These give
one a username and a password he can use to derive Internet benefits. When accessing the
Internet, your computer will dial the Internet Service provider’s number. The ISP will also have
a server that hosts and screens (against viruses) your e-mail messages. When you call to a up
for an Internet account, make sure you get the following information:
• User name
• Password
One also needs to have a modern Internet browser like Opera, Microsoft Internet Explorer or
Netscape loaded on the computer. Above all, the computer must be at least a Pentium I machine
with a speed from 166MHz. The telephone line and a modem are other requirements. The
modem converts a computer’s electronic digital data into analog signals that can be transported
through a telephone line when information is being sent into the Internet and vice versa when
receiving. The telephone line is the transmission media, which links the computer to the Internet
service provider. Your operating system should compatible with the Internet browser and
modern GUI operating systems support Internet
For large organizations, it’s ideal that they network their computers, hence more requirements.
One would need a server-based network to effect networks security and to use one connection
as a gateway to the Internet.
INTRODUCTION
Information Technology resources (hardware, software, and data) form a vital strategic resource
of any establishment which must be jealously guarded to ensure its safety, reliability, accuracy
and integrity. Ethics refer to the expected code of conduct within an organization both on the
use of computer resources and human resources. Hence, ethics direct an employee‘s mind
towards profit through sanctioned means, ensure that managers do not engage in fraud and
abuse of funds nor convert the company’s clients for personal motive. At the same time, data
in the organization must be used for its intended purpose which itself should be legitimate.
Hacking Hacking is when an illegal user tries to access private On such preventative measure, is the use of a Firewall which is a program used to
information that they are not entitled to access. closely monitor precisely what information passes in and out of a computer or
information system. These programs can be set to keep other users out of to
prevent information from leaving the computer or information system.
Identify theft Identity theft occurs, when someone possesses or uses a Detecting identity theft is very difficult and prosecuting it can often be even more
person’s name, address, Social Security number, bank or credit difficult. The best solution to identity theft is prevention. Keeping ones personal
card account number, or other identifying information without information close and guarding it well is the best solution to this problem.
a person’s knowledge with the intent to commit fraud or other
crimes.
Administrative controls
They cover company code of practice/conduct and can be implemented through written policies
and procedures; division of functions and supervision
A Code of Practice is a set of standards that a business would expect its employees to conform to.
It is not legally binding but the business would ask an employee to agree to it before being employed
and would be grounds for dismissal if they were not obeyed.
It is always in the best interest of a business to treat its customers fairly and with due consideration
- or they will go elsewhere.
It ensures consistency of practice. All employees would conduct their business in a similar way.
Through division of functions can be whereby where the Information system designers are not part
of the end-users that operate a computer system.
Input Controls
They aim to ensure proper data entry by the intended personnel, through the use of passwords so
that only the holder can benefit from the computer resources, formatted input screens and audible
error signals so that data is entered correctly. Computers should have software that verifies
correctness of the data typed (validation).
Storage controls
There should be a control mechanism so that no everyone can access stored data. Thus documents
can be access through passwords.
Stored data may need to be stored in a separate backup copy so that, in case of that storage device
failing data can be recovered from the backup copy. Stored data can also be encrypted so that,
should the wrong person accesses it, he won’t make sense out of it. Firewall are computers that
protect networked computers from intrusion, hence they also ensure safe storage of data.
Physical protection
Security guards, buglar bars on windows video surveillance cameras, alarms, and building
computer centers above flood levels are some of the many moves to ensure physical safety of
computers.
b) Access Right
The second aspect of ethical issues in information technology is access right. Access right
becomes a high priority issue for the IT and cyberspace with the great advancement in
technology. E-commerce and Electronic payment systems evolution on the internet heightened
this issue for various corporate organizations and government agencies. Network on the
internet cannot be made secure from unauthorized access. Generally, the intrusion detection
system is used to determine whether the user is an intruder or an appropriate user.
c) Harmful Actions
Harmful actions in the computer ethics refers to the damage or negative consequences to the
IT such as loss of important information, loss of property, loss of ownership, destruction of
property and undesirable substantial impacts. This principle of ethical conduct restricts any
outsiders from the use of information technology in manner which leads to any loss to any of
the users, employees, employers and the general public. Typically, these actions comprise of
the intentional destruction or alteration of files and program which drives a serious loss of
resources. To recover from the harmful actions extra time and efforts are required to remove
the viruses from the computer systems.
d) Patents
It is more difficult to deal with these types of ethical issues. A patent can preserve the unique
and secret aspect of an idea. Obtaining a patent is very difficult as compared with obtaining a
copyright. A thorough disclosure is required with the software. The patent holder has to reveal
the full details of a program to a proficient programmer for building a program.
e) Copyright
The information security specialists are to be familiar with necessary concept of the copyright
law. Copyright law works as a very powerful legal tool in protecting computer software, both
before a security breach and surely after a security breach. This type of breach could be the
mishandling and misuse of data, computer programs, documentation and similar material. In
many countries, copyright legislation is amended or revised to provide explicit laws to protect
computer programs.
f) Trade Secrets
Trade secrets are also a significant ethical issue in information technology. A trade secret
secures something of value and usefulness. This law protects the private aspects of ideas which
are known only to the discovery or his confidants. Once disclosed, trade secret is lost as such
and is only protected by the law for trade secrets. The application of trade secret law is very
broad in the computer range, where even a slight head start in the advancement of software or
hardware can provide a significant competitive influence.
g) Liability
One should be aware of the liability issue in making ethical decisions. Software developer
makes promises and assertions to the user about the nature and quality of the product that can
be restricted as an express warranty. Programmers or retailers possess the legitimate to
determine the express warranties. Thus they have to be practical when they define any claims
and predictions about the capacities, quality and nature of their software or hardware. Every
word they say about their product may be as legally valid as stated in written. All agreements
should be in writing to protect against liability. A disclaimer of express warranties can free a
supplier from being held responsible of informal, speculative statements or forecasting made
during the agreement stages.
h) Piracy
Piracy is an activity in which the creation of illegal copy of the software is made. It is
entirely up to the owner of the software as to whether or not users can make backup copies
of their software. As laws made for copyright protection are evolving, also legislation that
would stop unauthorized duplication of software is in consideration.