Assignment Title: Exercise: Lecturer: MR - Hemananth
Assignment Title: Exercise: Lecturer: MR - Hemananth
Assignment Title: Exercise: Lecturer: MR - Hemananth
Exercise
Lecturer:
Mr.Hemananth
Subject:
Professional Issues in IT
Subject Code:
HNDIT-2403
Name:
T.Janakan
Reg.No:
BAT/IT/2018/F/0041
(SLIATE)
1. Briefly explain the following terms related to global work force
a. Out sourcing: Phenomenon where a company pays another company to build parts
for its products or services instead of performing those tasks itself.
b. Off shoring: Offshoring is the relocation of a business process from one country to
another, typically an operational process (e.g. manufacturing) or supporting processes
(e.g. accounting).
Offshoring, on the other hand, is an entirely separate business model. In this scenario,
domestic companies willingly choose to move or expand their operations to other
parts of the world.
2. Information Technology has both positive and negative effect to the students
a. List 20 negative effect of IT to the students
1. Mobile phones encourage and maintenance
2. Social isolation
3. Security concern
4. Fake information
5. Cost of purchase and maintenance
6. Losing assignment of the students
7. Extinction of good handwriting
8. Partial to the low-income group of people
9. Difficult to deal with online courses
10. Misguided due to wrong information
11. Learners get disconnected from the real world
12. Distraction
13. Exposure to Inappropriate content
14. Health Hazard
15. Cyber Bullying
16. Accident
17. Huge expenditure
18. Insufficient Teaching Methods
19. Waste of time
20. Creates enough opportunities for cheating
IT law does not constitute a separate area of law rather it encompasses aspects of
contract, intellectual property, privacy and data protection laws. Intellectual property is
an important component of IT law, including copyright, rules on fair use, and special
rules on copy protection for digital media, and circumvention of such schemes. The
area of software patents is controversial, and still evolving in Europe and elsewhere.
The related topics of software licenses, end user license agreements, free software
licenses and open-source licenses can involve discussion of product liability,
professional liability of individual developers, warranties, contract law, trade secrets
and intellectual property.
In various countries, areas of the computing and communication industries are
regulated – often strictly – by governmental bodies.
There are rules on the uses to which computers and computer networks may be put, in
particular there are rules on unauthorized access, data privacy and spamming. There are
also limits on the use of encryption and of equipment which may be used to defeat copy
protection schemes. The export of hardware and software between certain states within
the United States is also controlled.
There are laws governing trade on the Internet, taxation, consumer protection, and
advertising.
There are laws on censorship versus freedom of expression, rules on public access to
government information, and individual access to information held on them by private
bodies. There are laws on what data must be retained for law enforcement, and what
may not be gathered or retained, for privacy reasons.
In certain circumstances and jurisdictions, computer communications may be used in
evidence, and to establish contracts. New methods of tapping and surveillance made
possible by computers have wildly differing rules on how they may be used by law
enforcement bodies and as evidence in court.
Computerized voting technology, from polling machines to internet and mobile-phone
voting, raise a host of legal issues.
Some states limit access to the Internet, by law as well as by technical means.
8. What is NIPO of Sri Lanka? Mention the responsibility of NIPO of Sri Lanka
The National Intellectual Property Office of Sri Lanka established under this law
is the government department, which is responsible for the administration of the
intellectual Property System in Sri Lanka.
Protection for
• Copy rights
• Patents
• Marks
• Industrial Designs
9. Digital technology and the internet have made copyright violation easier and cheaper.
a. Do you agree with this?
Yes
1. Musculoskeletal Problems
• This includes areas of your body such as your back, neck, chest, arms, shoulders and
feet.
• Having sore muscles and complaints of the muscles being tired are common.
• Numbness may occur in the arms and hands.
• These troubles may occur because the posture you assume when using the computer is
most likely incorrect.
• You may find that you are sitting in an uncomfortable chair, or that you have a
workstation that is not ergonomically correct for your body.
2. Vision Problems
• Computers are notorious for their bright lights, glare and flickering images that can
cause strain on your eyes.
• Finding that you constantly focusing on the screen with delays in blinking can result
in drying out your eyes.
4. Headaches
• Headaches are common and may occur because of the increased muscle tension or
from pain in the neck.
• Any vision problems, or continued strain on the eyes can also cause headaches.
5. Obesity
• Prolonged use of computers may lead to an overall sedentary lifestyle that lacks
adequate physical activity and/or exercise.
• In children prolonged use of computers, or electronics in general, is a major
contributing factor to obesity.
11. What is Computer crime, Give five examples for computer crime
2. Cracking - Breaking or deciphering codes that are being used to protect data.
3. Cyber terrorism - Hacking, threats, and blackmailing towards a business or person.
12. Give 10 techniques to protect your personal and financial information in case of online
shopping
Ex –
Digital Signature
Digital Watermarking
Copy-Move
Image Retouching
Splicing
14. Explain the term net neutrality and state the purpose of it
Net neutrality, or open Internet, is the principle that Internet service providers (ISPs) should
give consumers access to all legal content and applications on an equal basis, without
favoring some sources or blocking others.
• Purpose - It prohibits ISPs from charging content providers for speedier delivery of
their content on "fast lanes" and deliberately slowing the content from content
providers that may compete with ISPs.
15. The computer crime act 24 of 2007 specify three broad category of computer crime
briefly explain these categories
1. Computer related crimes – use computers as tools for criminal activities
2. Hacking offences – affect integrity, confidentiality of a computer system or network
3. Content related cybercrimes – to distribute illegal data