Short Questions on Ethical and Social Issues in ICT
1) What is ICT: Write the advantages of ICT?
Ans: ICT is the combination of information and technology.
OR
ICT is the combination of different technologies like, networks, the internet, smartphones, computer systems, software, and social media to transfer data in digital form.
The following are the advantages of ICT.
i)
Fast means of communication.
ii)
Globalization
iii)
Bridging the cultural gap
iv)
Creations of new jobs
v)
Access to remote learning resources
2) List the demerits of ICT.
Ans:
Demerits of ICT are as here under.
i)
Lack of privacy and security.
ii)
Reliance on Technology
iii)
Expansive
iv)
Cyber bullying or harassment through the networks
v)
Unemployment
3) What are the different ethical issues in ICT
Ans: The following are the ethical issues:
i) Plagiarism
ii) Software piracy
iii) Hacker
iv) Cracker
v) Cybercrime
vi) Malicious code
vii) Cyberbullying
viii) Cyber pornography
4) What is computer ethics? List the commandments of computer
ethics.
Ans: It
is a branch of practical principles that deals with how computer experts
should make decisions regarding social and professional behavior.
Following
are the commandments of Computer Ethics
i)
Never use pirated software.
ii)
Follow up on the social reputation.
iii)
Never harm the public website.
iv)
Never give misguided information.
v)
Never steal information online for reproduction.
vi)
Never create false evidence using ICT
vii)
Do not use computers and the internet to harm other people.
viii)
Do not use other computer resources without permission.
ix)
Do not use the computer to steal.
x)
You shall use a computer in ways that show consideration and respect
5) What is the importance of computer ethics?
Ans:
The importance of computer ethics is as follows.
i.
To protect personal & commercial information such as login & password
info, credit card and account information, and government and commercial
databases. It also controls unwanted internet mail and ads (Spam).
ii.
To control plagiarism, student identity fraud, the use of copyrighted
material, etc.
iii. To suppress dishonest business practices and to protect and encourage fair competition
iv.
To promote moral and social values in society
6) What do you mean by digital citizenship?
Ans: Digital citizenship can be defined as creating
an upright standing in the digital world by following the basic rules of cyber and the internet to work with the digital world.
7) Why teaching digital citizenship to students is very important
in today’s ICT age?
Ans: Schools are now shifting to BYOD (Bring Your Own Device) as a main move for tech
integration in the classroom. Here are a few
crucial reasons why schools should make teaching digital citizenship to
their students the first step in the tech integration process.
i. Students are in touch with technology
even after the surveillance of teachers i.e. after school. Therefore, there is a
need to teach them digital citizenship.
ii.
Today, with digitalization, employers judge prospective students or employees
for their social media profiles. So, it is important to teach students how to
create online personas that project positive and constructive images.
iii. We can only
prevent cyberbullying by educating students about digital citizenship. Lack of
awareness about digital citizenship can lead to cyber-bullying which has
grave consequences at times.
iv.
Information Search and Analysis is an important aspect of Digital
Citizenship. There are lots of resources available over the Internet and
not all is authentic. Digital citizenship teaches students how to look out,
select, and streamline information and how to choose a real and authentic
source of information.
8) What is digital
footprint? List its types.
Ans: A digital footprint is a trail
of data you create while using the Internet. It includes
the websites you visit, emails you send, and information
you submit to online services.
Digital footprints can be classified into two broad categories:
i) Active Digital Footprints
ii) Passive Digital Footprints
9) Define active digital footprint. Give some examples.
Ans:
Active digital footprints consist of the data you leave when you make
deliberate choices on the internet.
Following are some examples of active digital footprints.
i) Posting on Facebook, Instagram, Snapchat, Twitter, and other social
media platforms.
ii) Fill out online forms, such as when signing up to receive
emails or texts.
iii) Agree to install cookies on your devices when prompted by
the browser.
10) What are passive digital footprints? List some examples of digital footprints.
Ans: Passive
digital footprints are those you leave behind without intending to or, in some
cases, without knowing it.
Following
are a few examples of passive digital footprints.
i)
Websites that install cookies on your device without disclosing it to you
ii)
Apps and websites that use relocation to pinpoint your location
iii)
Social media news channels and advertisers that use your likes, shares, and
comments to profile you and to serve up advertisements based on your interests
11) Write the importance of digital citizenship.
Ans: Following
are the importance of digital citizenship.
i)
Digital access ii)Digital commerce iii) Digital communication iv) Digital
literacy
v)
Digital security vi) Digital rights and responsibilities
12) List any four goals of the Information and
Communication Technology Policy.
Ans: The goals of the Information and Communication Technology Policy are as here under.
i) Nepal will be placed in the international ICT development index and e-government ranking in 2020.
ii) By the end of 2020 at least 75% population will have digital literacy
iii) G2G implementation would be promoted with a view to achieving complete automation of the operations of land administration, revenue administration, and management
iv)
By 2020, the entire population of Nepal will have access to the internet
v)
80% of all citizen-facing government services would be offered online by 2020.
13) Highlight any four missions of Information and Communication
Technology Policy.
Ans: Following
are the missions of Information and Communication Technology Policy.
i) To facilitate Nepal's participation in the global knowledge society.
ii) To promote ICT to further productivity among the sectors that is key drivers of the national economy.
iii)
To promote the use of free and open source software as
well as open standard in software development for government agencies
iv)
To create an
innovative, market-responsive, highly
competitive, and well-regulated ICT industry
v)
To promote a stable, fair, and competitive investment climate to facilitate the
development of e-trade and E-Commerce activities in the country.
vi)
To conserve natural resources and safeguard Nepal's heritage using ICT tools.
vii)
To improve communication systems across the country, especially in areas of
touristic interest to support tourism development in the country
14) List the different members of the National Information and
Communication Technology Policy.
Ans: The following are the members of the National Information and Communication Technology Policy.
Hon. Minister, Ministry
of Information and Communication Technology Chairperson
Member,
National Planning
Commission Member
Secretary,
Ministry of
Education Member
Secretary,
Ministry of
Health Member
Secretary,
Ministry of
Agriculture Member
Secretary, Ministry
of Finance Member
Secretary,
Ministry of Local Development Member
Secretary,
Ministry of Information and
Communication Member
Chairman,
Nepal Telecommunications
Authority Member
Representative
Private Sector /
Domain Expert 2 Members
Joint-Secretary
(Policy
and Programme) Member
Ministry
of Information and Communication Member-Secretary
15) Write the objectives of the
Electronic Transaction Act 2063
Ana: The following are the objectives of the Electronic Transaction Act 2063.
i)
To make legal provisions for authentication and regulation of electronic data.
ii)
To make a reliable date generation, communication, and transmission.
iii)
To make a secure and authentic means of electronic communication.
iv)
To regulate all the matters of electronic transactions.
16) List the Scopes of the
Electronic Transaction Act 2063
Ans: Scope
of Electronic Transaction Act is as here under.
i)
Creation and use of digital signature
ii)
Control cyber/computer-related crimes.
iii)
Protection of intellectual property.
iv)
Protection of confidentiality
17) Highlight the major provisions of the Electronic Transaction
Act 2063.
Ans:
The following are the provisions of the Electronic Transaction Act 2063.
i)
It has a provision relating to electronic records and digital signatures.
ii)
It has a provision relating to dispatch, and receiving an acknowledgment of
electronic records.
iii)
It has a provision relating to computer-related crimes and punishments.
iv)
It has a provision relating to the computer network and network services
18) What is cybercrime? Give
some examples of cybercrime.
Ans: Cybercrime is
a crime committed by using cyber means/computer technology. Cybercrime is
also known as computer-related crime.
Following
are some examples of cybercrime.
i)
Creating fake documents
ii)
Blackmailing/social media abuse
iii)
Distribution of pornography materials
iv)
Misuse of electronic cards
v)
Piracy of intellectual properties
vi)
Spreading computer viruses/malware
19) Write the different safety
measures for computer crime.
Ans: Following are the some measures of safety
from computer crime.
i)
Backup your computer regularly.
ii)
Use the latest antivirus software.
iii)
Use a password system on your computer.
iv)
Time to time change the password
v)
Protect your computer from power-related problems.
20) What is social media? List its examples.
Ans: Social
media is a collection of Internet-based communities that allow users to
interact with each other online. This includes web forums, wikis, and User
Generated Content (UGC) websites.
Following are the examples of social media.
i)
Facebook ii) Twitter ii) LinkedIn iv) YouTube v)
WhatsApp vi) Tik-Tok
21) List the different opportunities in Social Media.
Ans: The following are the different opportunities in social media.
i)
Helps in Building Communities
ii)
Improves Business Reputation
iii)
Helps Government and Agencies Fight with Crime
iv)
Awareness
v)
Promotion
vi)
Education
22) What are the threats in social media?
Ans: The following are the threats in social media.
i)
Spreading spam and malware
ii)
Celebrity name misuse
iii)
Cheating and Relationship Issues
iv)
Security Issues
v)
Fraud and Scams
vi)
Addiction
23) Why Cyber Law is necessary?
Ans: Cyberlaw is necessary due to the following reasons.i) To reduce cyber crime.
ii) To solve the problems related to e-business problems.
iii)) To maintain social norms.
24) What do you mean by Digital signature?
Ans: A digital signature is the digital identity of the sender that uniquely identifies the particular sender electrically. It is used in the internet for security measures.
25) What do you mean by virtual identity?
Ans: In online virtual communities, such as online chat rooms or in online games, a virtual identity is one created by the human user that acts as an interface between the physical person and the virtual person other users see on their computer screens.
26) What do you mean by copyright?
Ans: Copyright is a legal right, existing in many countries, that grants the creator of an original work exclusive rights to determine whether, and under what conditions, this original work may be used by others.
27) How may ICT change social behavior negatively?
Ans: Excessive use of the Internet has changed the social behavior of the people in our society. It has negative effects on sleep, work, and academic achievement of the students. It has also been observed that most of the employees in the workplace use the Internet for non-productive work. Usages of unethical sites have increased negative behaviors and crimes in society.
28) What is computer ethics? Write any two of them. (Specification Grd 2077)
Ans: Computer ethics is the application of moral principles or characteristics to the use of the internet, computers, and cyberspace.
The following are the ethical points:
i) Do not use a computer to harm other people.
ii) Do not use or copy software for which you have not paid.
26) Write any two advantages and disadvantages of social media. (SEE 2078)
Ans: The following are the advantages and disadvantages of social media.
Advantages:
i) We have the opportunity to connect with others and share information through social media.
ii) You can build a relationship with your customers that makes them more likely to use your services.
Disadvantages:
i) Social media can spread false or unreliable information quickly.
ii) Chance of cyber bullying.
27) Define cyber law and cybercrime. (SEE 2079)
Ans: Cyberlaw: Cyberlaw refers to the legal framework that governs the use of the internet, computers, and related technologies.
Cybercrime: Cybercrime refers to illegal activities committed using computers or the internet, such as hacking, identity theft, and cyberstalking.
28) Why is cyber law needed?
Ans: Here are some reasons why cyber law is needed:
i) To protect individuals and businesses from cybercrime.
ii) To regulate the use of the Internet and electronic communication.
iii) To protect intellectual property rights in the digital age.
iv) To ensure the privacy of personal information online.
v) To set standards for the development and use of new technologies.
29) What is the main purpose of a digital signature?
Ans: The main purpose of a digital signature is to provide authenticity, integrity, and non-repudiation for digital documents. It verifies the identity of the sender, ensures the document hasn't been tampered with, and prevents the signer from denying their involvement.
30) What are intellectual property right?
Ans: Intellectual property rights (IPRs) are legal rights that protect creations of the human intellect. They include copyrights for creative works, patents for inventions, trademarks for brand identification, industrial designs for product aesthetics, and trade secrets for confidential information.
31) What is computer ethics? Write down any two ethics of it. (SEE grade promotion exam 2079)
Two computer ethics are as here under.
i) Computer users should respect the privacy and property of others.
ii) Practicing respectful behavior and responsible sharing on social media platforms to maintain a positive online environment.
32) What is computer security? Write any two hardware security measures. (SEE grade promotion exam 2078)
Ans: Computer security principally is the protection of computer systems and information from detriment, theft, and unauthorized use.
Following are the two hardware security measures.
i) Power protection
ii) Insurance
33) List four ways to stay safe on social networks. (Npabosn SEE pre-qualifying exam 2080)
Ans: Four ways to stay safe on social networks are as follows:i) Create unique and complex passwords
ii) Avoid clicking on suspicious links
iii) Keep your social media apps and devices updated
iv) Accept friend requests only from people you know
34) What is computer ethics? Write down any two ethics of it. (Pabon SEE pre-qualifying exam 2080)
Ans: Computer ethics are the moral values that stop you from doing anything that isn't legal and that doesn't harm or damage anyone's work.
Following are the two ethical points.
i) Do not use the computer to steal other data.
ii) Do not use pirated software
You may also read:
My friend mentioned to me your blog, so I thought I’d read it for myself. Very interesting insights, will be back for more!
ReplyDeletedigital identity