Sri Lanka Institute of Advanced Technological Education (Sliate)

Download as pdf or txt
Download as pdf or txt
You are on page 1of 12

Sri Lanka Institute of Advanced

Technological Education
(SLIATE)

Higher National Diploma in Information Technology

Assignment Title
Professional Issues In IT

Lecturer Name
Mr Hemananth

Subject
Professional Issues In IT

Subject Code :
HNDIT 2403

HNDIT – 2018 (ATI Batticaloa)


Name
S.Aathinan

Reg.No :
BAT/IT/2018/FT/0028
1 Briefly explain the following terms related to global
workforce

1) Out sourcing

Outsourcing is a practice usually undertaken by companies as a cost-cutting


measure. As such, it can affect a wide range of jobs, ranging from customer
support to manufacturing to the back office

2) Off Shoring

Offshoring is the relocation of a business process from one country to another—


typically an operational process, such as manufacturing, or supporting processes,
such as accounting. 2. Information Technology has both positive and negative
effect to the students

2 Information technology as or positive and negative to the


students

A- List 20 negative effect of IT to the students


1. Internet Addiction
2. Lack Of Face To Face Communication
3. Lack Of Creativity
4. Cyber Bullying
5. Waste Of Time
6. Abandonment Of Family
7. Privacy Disrupted
8. Insomnia disorder
9. Cheating habits
10. Moral Corruption
11. Illegal Activities
12. Unwanted multimedia accessing
13. Video games addiction
14. More chatting
15. Virtualization
16. Psychological problems
17. Mental disorder
18. Hearing damage
19. Obesity
20. Negative thoughts

B- List 20 positive effect of IT to the students

1. Individual learning
2. Student are more in control of their learning
3. Incredibly improves performance in all subject
4. Discovery learning
5. Create quality project
6. Motivates learning
7. Intellectual development
8. Collaborative learning
9. Provide medium of research
10.Online studies
11.Access to a huge informational background
12.Absence of geographical and political boundaries in social networks.
13.High degree of visibility
14.Distance Education
15.Students are able to check themselves
16.Students are able to find and learn so many things related to their
academics and interests as PPTs, YouTube Videos, PDFs etc.
17.Students are able to build their programming knowledge so well using
websites like W3 Schools, Cpdecademy, Codewars, khan Academy
etc.,
18.Students learn their passion via Google
19.So many UG and PG students are now interested in Stocks and e-
Commerce.

20. Online Shopping


3 Briefly Explain the different between law and ethics

 Law is a collection of rules and regulation whereas ethics are collection


of social guidelines based on moral principals and values.

 Law is a set of universal rules, but ethics need not be universal.

 Disobeying law is liable for penalties and punishments, but not adhering
to the principles of ethics is not liable for punishment.

 Law is published; it has to be in written form, whereas ethics need not be


published.

 The law of the land should be obeyed, and

4 Briefly explain three categorize of ethical views

 Applied ethics
Applied ethics is the branch of ethics which consists of the analysis of
specific, controversial moral issues such as abortion, animal rights, or
euthanasia. In recent years applied ethical issues have been subdivided
into convenient groups such as medical ethics, business ethics.
 Meta-ethics,
The term "meta" means after or beyond, and, consequently, the notion of
Meta ethics involves a removed, or bird's eye view of the entire project of
ethics. We may define Meta ethics as the study of the origin and meaning
of ethical concepts. When compared to normative ethics and applied
ethics, the field of Meta ethics is the least precisely defined area of moral
philosophy. It covers issues from moral semantics to moral epistemology.
3. Normative ethics

Normative ethics involves arriving at moral standards that regulate right


and wrong conduct. In a sense, it is a search for an ideal litmus test of
proper behavior. The key assumption in normative ethics is that there is
only one ultimate criterion of moral conduct, whether it is a single rule
or a set of principles.
5 Briefly explain the following terms in relation to computer
data

a. Invisible information gathering - collection of personal information


about someone without the person’s knowledge

b. Secondary use - use of personal information for a purpose other than


the one it was provided for a purpose other than the current research
purpose.

c. Computer matching - combining and comparing information from


different. Matches performed for statistical, research, law
enforcement, tax, and certain other purposes are not subject to such
regulation.

d. Computer profiling - analyzing data in computer files to determine


characteristics of people most likely to engage in certain behavior.

6 Explain the way the concept of computer hacking change


over time from early 1960 up to today.
Hacking – currently defined as to gain illegal or unauthorized access to a
file, computer, or network
The term has changed over time
• 1: early 1960s to 1970s
– It was a positive term
– A "hacker" was a creative programmer who wrote elegant or clever
code
– A "hack" was an especially clever piece of code
• 2: 1970s to mid 1990s
– Hacking took on negative connotations
– Breaking into computers for which the hacker does not have
authorized access
– Still primarily individuals
– Includes the spreading of computer worms and viruses
– Companies began using hackers to analyze and improve security
• 3: beginning with the mid 1990s
– The growth of the Web changed hacking; viruses and worms could
be spread rapidly
– Political hacking (Hacktivism) surfaced
– Denial-of-service (DoS) attacks used to shut down Web sites
– Large scale theft of personal and financial information
Now computer hacking is the important concept in the world because it is
increasing every day.

7 Briefly describe forming laws for the field of information


and communication technology.

IT law does not constitute a separate area of law rather it encompasses


aspects of contract, intellectual property, privacy and data protection laws.
Intellectual property is an important component of IT law, including
copyright, rules on fair use, and special rules on copy protection for digital
media, and circumvention of such schemes.

The software licenses, end user license agreements, free software licenses
and open-source licenses can involve discussion of product liability,
professional liability of individual developers, warranties, contract law,
trade secrets and intellectual property.
There are rules on the uses to which computers and computer networks
may be put, in particular there are rules on unauthorized access, data
privacy and spamming. There are also limits on the use of encryption and
of equipment which may be used to defeat copy protection schemes.

There are laws governing trade on the Internet, consumer protection, and
advertising, rules on public access to government information, and
individual access to information held on them by private bodies and what
data must be retained for law enforcement.

8 What is NIPO Srilanka ? Mention the responsibility of


NIPO in srilanka?
 The National Intellectual Property Office of Sri Lanka established
under this law is the government department, which is responsible for
the administration of the intellectual Property System in Sri Lanka.

Protection for
 Copy rights
 Patents
 Marks
 Industrial Designs

9 Digital technology and the internet has made copyright


violations easier and cheaper .
A- Do you agree with this ?
Yes ,I agree with this statement
B- Give the reason to prove your answer.

 Duration Copyright in Sri Lanka is generally protected during the life


of the author and 70 years after his death.
 Digital rights management system can be used to protect property rights
and the business of distributing copyrighted material, specifically e-
commerce and mobile commerce.
 Protection is accorded (granted) without any formality such as

registration in Sri Lanka.

10 Mention five possible health problems arise due to IT


industry . Briefly explain how those problem can be available .

1. Musculoskeletal Problems

 This includes areas of your body such as your back, neck, chest, arms,
shoulders and feet.
 Having sore muscles and complaints of the muscles being tired are
common.
 Numbness may occur in the arms and hands.
 These troubles may occur because the posture you assume when using the
computer is most likely incorrect.
 You may find that you are sitting in an uncomfortable chair, or that you
have a workstation that is not ergonomically correct for your body.

2. Vision Problems

 Computers are notorious for their bright lights, glare and flickering
images that can cause strain on your eyes.
 Finding that you constantly focusing on the screen with delays in blinking
can result in drying out your eyes.

3. Repetitive Stress Injuries

 You may notice pain in your neck, shoulders, or really anywhere from the
shoulders to your fingers related to repetitive muscle use.
 Using the computer may cause you to use your muscles in an odd way
that may cause increased stiffness, pain, or swelling in any of those areas.
 One of the most common conditions related to repetitive use of your
muscles when using the computer is carpal tunnel syndrome.

4. Headaches
 Headaches are common and may occur because of the increased muscle
tension or from pain in the neck.
 Any vision problems, or continued strain on the eyes can also cause
headaches.

5. Obesity

 Prolonged use of computers may lead to an overall sedentary lifestyle that


lacks adequate physical activity and/or exercise.
 In children prolonged use of computers, or electronics in general, is a
major contributing factor to obesity

11 What is computer crime ? Give five examples the computer


crime?
Alternatively referred to as cyber crime, e-crime, electronic crime,
or hi-tech crime. Computer crime is an act performed by a
knowledgeable computer user, sometimes referred to as a hacker that
illegally browses or steals a company's or individual's private
information. In some cases, this person or group of individuals may be
malicious and destroy or otherwise corrupt the computer or data files.

1. Copyright violation - Stealing or using another


person's Copyrighted material without permission.

2.Cracking - Breaking or deciphering codes that are being used to protect


data.
3.Cyber terrorism - Hacking, threats, and blackmailing towards a
business or person.

4.Cyberbully or Cyber stalking - Harassing or stalking others online.

5.Cybersquatting - Setting up a domain of another person or company


with the sole intentions of selling it to them later at a premium price.

6.Creating Malware - Writing, creating, or distributing malware


(e.g., viruses and spyware.)
7.Denial of Service attack - Overloading a system with so many requests
it cannot serve normal requests.

8.Espionage - Spying on a person or business.

9. Fraud - Manipulating data, e.g., changing banking records to transfer


money to an account or participating in credit card fraud.

12.Give ten techniques to protect your personal and financial


information in case of online Shopping.

 Use Strong Passwords and PINs and Keep Them Secret.

 Maintain Your Computer Security.

 Use Your Own Computer

 Log Out Completely

 Be Prudent When Using Wireless Connections

 Use Apps Wisely

 Check for Secure Websites

 Secure Your Confidential Documents

 Don't Respond to Emails Requesting Personal Information

 Read Your Statements

12 What is digital forgery give five Examples ?


Digital Forgery involves a false document, signature, or other imitation of an
object of value used with the intent to deceive another. Those who commit forgery
are often charged with the crime of fraud.

• Changing original of a document as true copies.


• Digital signature forgery
• Digital image forgery
13 Explain the term net neutrality and state the purpose it?

Net neutrality is the idea that internet service providers like Comcast and
Verizon should treat all content flowing through their cables and cell towers
equally. That means they shouldn't be able to slide some data into “fast lanes”
while blocking or otherwise discriminating against other material.

• Promotes competition for Internet services.


• Upholds standardization of Internet data transmission.

14 The computer crime act 24 at 2007 specify three broad


category of computer crime .Briefly explain the category.

1. Crimes against People


These crimes include cyber harassment and stalking, distribution
of child pornography, credit card fraud, human trafficking,
spoofing, identity theft, and online libel or slander.
2. Crimes against Property
Some online crimes occur against property, such as a computer
or server. These crimes include DDOS attacks, hacking, virus
transmission, cyber and typo squatting, computer vandalism,
copyright infringement, and IPR violations.
3. Crimes against Government
When a cybercrime is committed against the government, it is
considered an attack on that nation's sovereignty. Cybercrimes
against the government include hacking, accessing confidential
information, cyber warfare, cyber terrorism, and pirated
software.

You might also like