Computer for SEE and NEB

It is a complete SEE and NEB solution for computer science. It includes Computer Fundamentals, Database (SQL), Programming in C QBASIC, CSS, JavaScript, and PHP for beginners.

Breaking

Post Top Ad

Your Ad Spot

Tuesday, February 8, 2022

Short Questions and Answer on Ethical and Social Issue in ICT for SEE and grade 10

 

Short Questions on Ethical and Social Issues in ICT






1) What is ICT: Write the advantages of ICT?

Ans: ICT is the combination of information and technology.

OR

ICT is the combination of different technologies like, networks, the internet, smartphones, computer systems, software, and social media to transfer data in digital form.

The following are the advantages of ICT.

i) Fast means of communication.

ii) Globalization

iii) Bridging the cultural gap

iv) Creations of new jobs

v) Access to remote learning resources

 

2)  List the demerits of ICT.

Ans: Demerits of ICT are as here under.

i) Lack of privacy and security.

ii) Reliance on Technology 

iii) Expansive

iv) Cyber bullying or harassment through the networks

v) Unemployment

 

3) What are the different ethical issues in ICT

Ans: The following are the ethical issues:

i) Plagiarism  

ii) Software piracy  

iii)  Hacker 

iv)  Cracker  

v) Cybercrime  

vi)   Malicious code 

vii) Cyberbullying 

 viii)  Cyber pornography

 

4) What is computer ethics? List the commandments of computer ethics.

Ans: It is a branch of practical principles that deals with how computer experts should make decisions regarding social and professional behavior.

Following are the commandments of Computer Ethics

i) Never use pirated software.

ii) Follow up on the social reputation.

iii) Never harm the public website.

iv) Never give misguided information.

v) Never steal information online for reproduction.

vi) Never create false evidence using ICT

vii) Do not use computers and the internet to harm other people.

viii) Do not use other computer resources without permission.

ix) Do not use the computer to steal.

x) You shall use a computer in ways that show consideration and respect

 

5)  What is the importance of computer ethics?

Ans: The importance of computer ethics is as follows.

i. To protect personal & commercial information such as login & password info, credit card and account information, and government and commercial databases.  It also controls unwanted internet mail and ads (Spam).

ii. To control plagiarism, student identity fraud, the use of copyrighted material, etc.

iii. To suppress dishonest business practices and to protect and encourage fair competition

iv. To promote moral and social values in society

 

6)  What do you mean by digital citizenship?

Ans: Digital citizenship can be defined as creating an upright standing in the digital world by following the basic rules of cyber and the internet to work with the digital world. 

 

7) Why teaching digital citizenship to students is very important in today’s ICT age?

Ans:    Schools are now shifting to BYOD (Bring Your Own Device) as a main move for tech integration in the classroom.  Here are a few crucial reasons why schools should make teaching digital citizenship to their students the first step in the tech integration process. 

i.  Students are in touch with technology even after the surveillance of teachers i.e. after school. Therefore, there is a need to teach them digital citizenship.

ii. Today, with digitalization, employers judge prospective students or employees for their social media profiles. So, it is important to teach students how to create online personas that project positive and constructive images.

iii. We can only prevent cyberbullying by educating students about digital citizenship. Lack of awareness about digital citizenship can lead to cyber-bullying which has grave consequences at times.

iv. Information Search and Analysis is an important aspect of Digital Citizenship. There are lots of resources available over the Internet and not all is authentic. Digital citizenship teaches students how to look out, select, and streamline information and how to choose a real and authentic source of information.

 

8) What is digital footprint? List its types.

Ans: A digital footprint is a trail of data you create while using the Internet. It includes the websites you visit, emails you send, and information you submit to online services.

Digital footprints can be classified into two broad categories:

i) Active Digital Footprints

ii) Passive Digital Footprints

 

9) Define active digital footprint. Give some examples.

Ans: Active digital footprints consist of the data you leave when you make deliberate choices on the internet.

Following are some examples of active digital footprints.

i) Posting on Facebook, Instagram, Snapchat, Twitter, and other social media platforms.

ii) Fill out online forms, such as when signing up to receive emails or texts.

iii) Agree to install cookies on your devices when prompted by the browser.

 

10)  What are passive digital footprints? List some examples of digital footprints.

Ans:  Passive digital footprints are those you leave behind without intending to or, in some cases, without knowing it.

Following are a few examples of passive digital footprints.

i) Websites that install cookies on your device without disclosing it to you

ii) Apps and websites that use relocation to pinpoint your location

iii) Social media news channels and advertisers that use your likes, shares, and comments to profile you and to serve up advertisements based on your interests

 

11)  Write the importance of digital citizenship.

Ans: Following are the importance of digital citizenship.

i) Digital access ii)Digital commerce iii) Digital communication iv) Digital literacy   

v) Digital security vi) Digital rights and responsibilities

 

12)   List any four goals of the Information and Communication Technology Policy.

Ans: The goals of the Information and Communication Technology Policy are as here under.

i) Nepal will be placed in the international ICT development index and e-government ranking in 2020.

ii) By the end of 2020 at least 75% population will have digital literacy

 iii) G2G implementation would be promoted with a view to achieving complete automation of the operations of land administration, revenue administration, and management

iv) By 2020, the entire population of Nepal will have access to the internet

v) 80% of all citizen-facing government services would be offered online by 2020.

 

13) Highlight any four missions of Information and Communication Technology Policy.

Ans: Following are the missions of Information and Communication Technology Policy.

i) To facilitate Nepal's participation in the global knowledge society.

ii) To promote ICT to further productivity among the sectors that is key drivers of the national economy.

iii) To promote the use  of free  and open source software as well as open standard in software development for government agencies

iv) To  create  an innovative,  market-responsive,  highly competitive, and well-regulated ICT industry

v) To promote a stable, fair, and competitive investment climate to facilitate the development of e-trade and E-Commerce activities in the country.

vi) To conserve natural resources and safeguard Nepal's heritage using ICT tools.

vii) To improve communication systems across the country, especially in areas of touristic interest to support tourism development in the country

 

14) List the different members of the National Information and Communication Technology Policy.

Ans: The following are the members of the National Information and Communication Technology Policy.

Hon. Minister, Ministry of Information and Communication Technology Chairperson

Member, National Planning Commission Member

Secretary, Ministry  of Education  Member

Secretary, Ministry  of Health Member

 Secretary, Ministry  of Agriculture  Member

 Secretary,      Ministry of    Finance  Member

Secretary, Ministry  of Local Development  Member

Secretary, Ministry  of Information and Communication Member

Chairman, Nepal Telecommunications Authority  Member

Representative Private Sector / Domain   Expert 2 Members

Joint-Secretary (Policy and  Programme) Member

Ministry of Information and Communication Member-Secretary

 

15) Write the objectives of the Electronic Transaction Act 2063

Ana: The following are the objectives of the Electronic Transaction Act 2063.

i) To make legal provisions for authentication and regulation of electronic data.

ii) To make a reliable date generation, communication, and transmission.

iii) To make a secure and authentic means of electronic communication.

iv) To regulate all the matters of electronic transactions.

 

16)   List the Scopes of the Electronic Transaction Act 2063

Ans:    Scope of Electronic Transaction Act is as here under.

i) Creation and use of digital signature

 ii) Control cyber/computer-related crimes.

iii) Protection of intellectual property.

iv) Protection of confidentiality

 

17) Highlight the major provisions of the Electronic Transaction Act 2063.

Ans: The following are the provisions of the Electronic Transaction Act 2063.

i) It has a provision relating to electronic records and digital signatures.

ii) It has a provision relating to dispatch, and receiving an acknowledgment of electronic records.

iii) It has a provision relating to computer-related crimes and punishments.

iv) It has a provision relating to the computer network and network services

 

18)  What is cybercrime? Give some examples of cybercrime.

Ans: Cybercrime is a crime committed by using cyber means/computer technology. Cybercrime is also known as computer-related crime.

Following are some examples of cybercrime.

i) Creating fake documents

ii) Blackmailing/social media abuse

iii) Distribution  of pornography materials

iv) Misuse of electronic cards

v) Piracy of intellectual properties

vi) Spreading computer viruses/malware

 

19) Write the different safety measures for computer crime.

Ans:    Following are the some measures of safety from computer crime.

i) Backup your computer regularly.

ii) Use the latest antivirus software.

iii) Use a password system on your computer.

iv) Time to time change the password

v) Protect your computer from power-related problems.

 

20) What is social media? List its examples.

Ans: Social media is a collection of Internet-based communities that allow users to interact with each other online. This includes web forums, wikis, and User Generated Content (UGC) websites.

Following are the examples of social media.

i) Facebook ii) Twitter  ii) LinkedIn   iv) YouTube v) WhatsApp vi) Tik-Tok

 

21) List the different opportunities in Social Media.

Ans: The following are the different opportunities in social media.

i) Helps in Building Communities

ii) Improves Business Reputation

iii) Helps Government and Agencies Fight with Crime

iv) Awareness

v) Promotion

vi) Education

 

22) What are the threats in social media?

Ans: The following are the threats in social media.

i) Spreading spam and malware

ii) Celebrity name misuse

iii) Cheating and Relationship Issues

iv) Security Issues

v) Fraud and Scams

vi) Addiction

 

23) Why Cyber Law is necessary?

Ans: Cyberlaw is necessary due to the following reasons.
i) To reduce cyber crime.
ii) To solve the problems related to e-business problems.
iii)) To maintain social norms.

24) What do you mean by Digital signature?
Ans: A digital signature is the digital identity of the sender that uniquely identifies the particular sender electrically. It is used in the internet for security measures.

25) What do you mean by virtual identity?
Ans: In online virtual communities, such as online chat rooms or in online games, a virtual identity is one created by the human user that acts as an interface between the physical person and the virtual person other users see on their computer screens.


26) What do you mean by copyright?
Ans: Copyright is a legal right, existing in many countries, that grants the creator of an original work exclusive rights to determine whether, and under what conditions, this original work may be used by others.

27) How may ICT change social behavior negatively?
Ans: Excessive use of the Internet has changed the social behavior of the people in our society. It has negative effects on sleep, work, and academic achievement of the students. It has also been observed that most of the employees in the workplace use the Internet for non-productive work. Usages of unethical sites have increased negative behaviors and crimes in society.

28) What is computer ethics? Write any two of them. (Specification Grd 2077)
Ans: Computer ethics is the application of moral principles or characteristics to the use of the internet, computers, and cyberspace.
The following are the ethical points:
i) Do not use a computer to harm other people.
ii) Do not use or copy software for which you have not paid.


26) Write any two advantages and disadvantages of social media. (SEE 2078)
Ans: The following are the advantages and disadvantages of social media.
Advantages:
i) We have the opportunity to connect with others and share information through social media.
ii) You can build a relationship with your customers that makes them more likely to use your services.

Disadvantages:
i) Social media can spread false or unreliable information quickly.
ii) Chance of cyber bullying.


27) Define cyber law and cybercrime. (SEE 2079)
Ans: Cyberlaw: Cyberlaw refers to the legal framework that governs the use of the internet, computers, and related technologies.
Cybercrime: Cybercrime refers to illegal activities committed using computers or the internet, such as hacking, identity theft, and cyberstalking.

28) Why is cyber law needed?
Ans: Here are some reasons why cyber law is needed:
i) To protect individuals and businesses from cybercrime.
ii) To regulate the use of the Internet and electronic communication.
iii) To protect intellectual property rights in the digital age.
iv) To ensure the privacy of personal information online.
v) To set standards for the development and use of new technologies.


29) What is the main purpose of a digital signature?
Ans: The main purpose of a digital signature is to provide authenticity, integrity, and non-repudiation for digital documents. It verifies the identity of the sender, ensures the document hasn't been tampered with, and prevents the signer from denying their involvement.


30) What are intellectual property right?
Ans: Intellectual property rights (IPRs) are legal rights that protect creations of the human intellect. They include copyrights for creative works, patents for inventions, trademarks for brand identification, industrial designs for product aesthetics, and trade secrets for confidential information.



31) What is computer ethics? Write down any two ethics of it. (SEE grade promotion exam 2079)

Ans: Computer ethics refers to the moral principles and guidelines that govern the use of computers and technology.
Two computer ethics are as here under.
i) Computer users should respect the privacy and property of others.
ii) Practicing respectful behavior and responsible sharing on social media platforms to maintain a positive online environment.


32) What is computer security? Write any two hardware security measures. (SEE grade promotion exam 2078)
Ans: Computer security principally is the protection of computer systems and information from detriment, theft, and unauthorized use.
Following are the two hardware security measures.
i) Power protection

ii) Insurance


33) List four ways to stay safe on social networks. (Npabosn SEE pre-qualifying exam 2080)

Ans: Four ways to stay safe on social networks are as follows:
i) Create unique and complex passwords
ii) Avoid clicking on suspicious links
iii) Keep your social media apps and devices updated
iv) Accept friend requests only from people you know


34) What is computer ethics? Write down any two ethics of it. (Pabon SEE pre-qualifying exam 2080)
Ans: Computer ethics are the moral values that stop you from doing anything that isn't legal and that doesn't harm or damage anyone's work.
Following are the two ethical points.
i) Do not use the computer to steal other data.
ii) Do not use pirated software



You may also read:

SEE model question 2079 computer with answers



1 comment:

  1. My friend mentioned to me your blog, so I thought I’d read it for myself. Very interesting insights, will be back for more!
    digital identity

    ReplyDelete

Post Top Ad

Your Ad Spot

Pages