Computer for SEE and NEB

It is a complete SEE and NEB solution for computer science. It includes Computer Fundamentals, Database (SQL), Programming in C QBASIC, CSS, JavaScript, and PHP for beginners.

Breaking

Post Top Ad

Your Ad Spot

Tuesday, March 5, 2024

Single technical term questions for SEE and grade 10 on the topic of Ethical and Social Issues in ICT

Single technical term questions for SEE and grade 10 on the topic of Ethical and Social Issues in ICT        


Single technical term questions for SEE and grade 10 on the topic of Ethical and Social Issues in ICT


Write the single technical term for the following

1.      Set of moral principles that regulate the use of computers.

2.      It is the act of copying someone else's work and publishing it as your own.

3.      A person who uses a computer to gain unauthorized access.

4.      A computer user who attempts to break into copyright-protected software or an information system.

5.      The code causing damage to a computer or system.

6.      It is the use of digital technologies with the intent to offend, humiliate, threaten, harass, or abuse somebody.

7.      It is a collection of Internet-based communities that allow users to interact with each other online.

8.      Transactions of electronic records data by using any types of electronic means.

9.      It is a trail of data you create while using the Internet.

10.  It refers to the responsible use of technology by anyone who uses computers, the Internet, and digital devices

11.  Criminal activity done using computers and the Internet. 

12.  It refers to technologies that provide access to information through telecommunications.

13.  A computer program that affects the normal functioning of the computer.

14.  The computer program used to detect and eliminate computer viruses.

15.  Harmful software that contains viruses, worms, and Trojan horses.

16.  A program that copies itself automatically without needing to be part of another program.

17.  Traces left behind when browsing the internet.

18.  An electronic form of a signature that can be used to authenticate the identity of the sender of a message.

19.  Individuals who utilize electronic devices like computers, smartphones, or the internet.

20.  Unethical acquisition of personal information, like usernames and passwords, by masquerading as a trustworthy entity in digital communication?

21.  The term describes unwanted or unsolicited emails sent in bulk?

22.  Term refers to the rights creators have over their original works, including control over reproduction, distribution, and adaptation.

23.  Unauthorized use or reproduction of another's work.

24.  The term for software that collects information about a user's browsing habits without their knowledge.

25.  The gap between demographics and regions that have access to modern information and communications technology, and those that don't or have restricted access.

26.  The concept of using technology in ways that ensure fairness, accountability, and transparency.

27.  Psychological manipulation techniques are used to trick individuals into revealing personal information, clicking malicious links, or granting access to systems.

28.  Identifying individuals based on their unique biological characteristics such as fingerprints, facial recognition, or iris scans.

29.  The study of ethical principles and guidelines for developing and using AI systems to ensure fairness, transparency, accountability, and non-discrimination.

30.  The right of individuals and organizations to control who accesses and uses their personal information and communication data.

Answer Key

No comments:

Post a Comment

Post Top Ad

Your Ad Spot

Pages