All Notes Pple

Download as pdf or txt
Download as pdf or txt
You are on page 1of 36

QUIZ- I

Subject:PPLE (HS4001)

NABANITA SHAW
2127301
AEROSPACE ENGG.

1.What is an ethical dilemma?


(a)an issue caused by not following guidelines
(b)conflict between what's right and what's wrong
(C ) same as a professional dilemma
(D) moral conflict between values

2................is the concept that describe the beliefs of an individual or culture


(a) Values
(b) Attitude
(c ) Behavior
(d ) Personality

3. The objectives of Professional Ethics in Engineering are


(a) To understand the moral values that ought to guide the Engineering profession
(b) To justify the moral judgment concerning the profession.
(c ) To resolve the moral issues in the profession
(c) All the above

4. Which of these is a factor that affects ethical and unethical behavior?


(a)Ethical dilemma
(b)Diversity
(c )Open communication
(d) Teamwork

5. Resource Crunch, Opportunities and Attitude relates to---------------


(a) Variety of legal issues
(b) Variety of moral issues
(c) Variety of business issues
(d) Variety of technical issues
6. In the right conduct for an individual is regarded as whatever directly
benefits oneself.
(a) pre-conventional
level
(b) post-conventional
level
(c) conventional level
(d)Final level

7. According to Gilligan, have tendency to over-ride the importance of


moral rules and convictions while resolving moral dilemmas;
(a) Female (b) Male (c ) adults (d) child

8. A thing is safe if its risks are judged to be with in


(a) appreciable levels
(b) realisable levels
(c) acceptable levels
(d) measurable level

9. Besides the tests, each engineering project is modified during execution, based on
(a) the periodical feedback on the progress and the lessons from other sources.
(b) expert's opinion
(c) engineer's wish
(d) Government's policy

10. We use which among the following technique in business organizations and firms
for protecting the IT assets?
(a) Ethical hacking
(b) Unethical hacking
(c) Fixing bugs
(d) Internal data-breach

11. What is true about a professional


(a) The professional has to have autonomy
(b) He cannot be supervised by the client
(c) He should not subject to political control
(d) All of the above

12. means systematically quantifying the relative importance of risks and


benefits to demonstrate the net benefits of a process to an user
(a) Risk-Benefit Analysis
(b) Risk-Benefit Tradeoffs
(c) Risk selling
(d) None of the above

13. Besides the tests, each engineering project is modified during execution, based on
(a) the periodical feedback on the progress and the lessons from other sources.
(b) expert's opinion
(c) engineer's wish
(d)Government's policy
14. You are a person with a high level of....................if you stand by your values even
if others put pressure on you to do something that is wrong or if they make fun of you.
(a)Communication
(b)Cooperation
(c )Integrity
(d)Honesty
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxXXXXXxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
QUIZ II Subject: PPLE (HS4001)

1. The law of contract is different from the law of tort in which way?
(a) It is actionable in both the civil and criminal courts
(b) It generally concerns a relationship between two parties only
( c )Contracts are always written
(d )Tort is made up predominantly of statute law

2. Consent is defined as:


(a) Two or more persons are said to consent when they agree.
(b) Two or more persons are said to consent when they agree upon
the same thing in the same sense.
(c) Two or more persons are said to consent when they understand the
same thing.
(d )Two or more persons are said to consent when they agree upon the
same thing.

3. Which one of the following element is not necessary for a contract ?


(a) Competent parties
(b) Reasonable terms and conditions.
(c) Free consent
(d) Lawful concentration .

4. An agreement enforceable by law is:


(a) A voidable contract
(b) Void
(c) A contract
(d) A void contract

5.Enviromental protection act belongs to


(a)Air pollution
(b) Water pollution
(c) Soil pollution
(d) All of the above.
6. What protects the intellectual property created by artists?

a.Copyright
b.Geographical indications
c.Patents
d. Registered designs

7. Patent in India is valid for how many years?


a.10 years
b.20 years
c.40 years
d.60 years

8. What does a trademark protect?


(a)An invention
(b )A work of art
(c )Logos, names and brands
(d )The look, shape and feel of a product

9. Digital signatures are created and verified by using


(a) Program
(b) Graphical Coding
(c) Cryptography
( d) HTML

10. Which of the following is not an intellectual property law?


(a)Copy right act, 1957.
(b )Patent Act, 1970.
(c )Design Act, 2000.
(d )Customs Act,1962.
PROFESSIONAL PRACTICE, LAW &ETHICS
SEMESTER-7TH
ASSIGNMENT 1

NAme :- Nabanita Shaw


Roll no.:- 2127301
Branch :- Aerospace Engg.

1. Define Engineering Ethics?

ANS :- Engineering ethics refers to the set of moral principles and values
that guide the ethical conduct of engineers. It involves considering the social,
environmental, and economic impacts of engineering decisions and actions,
and upholding professional integrity and responsibility.
2. Differentiate Moral and Ethics?
ANS:-
i. Morals: Morals are individual beliefs and values that determine what is
right or wrong, good or bad, for a person. They are influenced by
personal, cultural, and religious factors and guide individual behavior.
ii. Ethics: Ethics, on the other hand, refers to a broader set of principles and
standards that guide the behavior and actions of a group or profession.
Ethics provide a framework for evaluating and making decisions about
what is morally right or wrong in a particular context.
3. Where and how do Moral Problems arise in Engineering?
ANS :- Moral problems can arise in engineering in various ways, including:
 Balancing conflicting interests, such as safety versus cost or
environmental impact.
 Ensuring the welfare and safety of the public.
 Addressing issues related to professional integrity and honesty.
 Considering the social and ethical implications of technological
advancements.
 Dealing with conflicts of interest or pressure from stakeholders.
4. What are the Senses of Engineering Ethics?
ANS:- Senses of Engineering Ethics are :-
I. Descriptive: Describing the ethical behavior or misconduct observed in
engineering practice.
II. Evaluative: Evaluating the ethical aspects of engineering decisions and
actions.
III.Normative: Establishing norms, principles, and guidelines for ethical
conduct in engineering.

5. Describe the importance of ethics in engineering.


ANS :- Importance of Ethics in Engineering are as follows :-
Protecting the public: Engineers have a responsibility to prioritize public
safety and well-being.
Professional integrity: Upholding ethical standards enhances the credibility
and reputation of the engineering profession.
Social and environmental impact: Ethical considerations help engineers
address the social and environmental consequences of their work.
Stakeholder trust: Ethics fosters trust among stakeholders, including clients,
employers, and the public.

6. Explain Variety of Moral issues.


ANS :- Variety of Moral Issues: Moral issues in engineering can include:
I. Environmental impact and sustainability.
II. Safety and risk management.
III.Confidentiality and privacy.
IV. Conflict of interest.
V. Intellectual property and plagiarism.
VI. Professional competence and responsibility.
VII. Discrimination and diversity.
7. Differentiate between micro ethics and macro ethics.
ANS :-
 Micro ethics: Micro ethics focuses on the ethical behavior of individuals
and addresses personal moral dilemmas and decisions faced by engineers
in their daily work.
 Macro ethics: Macro ethics deals with broader ethical issues that affect
society as a whole, such as the social impact of technological
advancements, distribution of resources, and environmental
sustainability.
8. What are the steps confronting Moral Dilemma?
ANS :- Steps Confronting Moral Dilemma:
 Recognizing the moral dilemma and understanding the conflicting values
or principles involved.
 Gathering relevant information and considering the potential
consequences of different actions.
 Identifying and evaluating alternative courses of action.
 Consulting with colleagues or seeking advice from ethical experts.
 Making a decision based on ethical principles, professional guidelines,
and personal values.
 Reflecting on the decision and learning from the experience.

9. What is meant by normative inquiry?


ANS :- 1. Normative inquiry refers to the process of examining and
developing ethical norms, principles, and guidelines for a particular field or
profession.
2. It involves evaluating what ought to be done based on ethical
considerations and values.

10. Explain moral dilemma with a suitable case study.


ANS:- Moral dilemma with a suitable case study are as follows :-
 The moral dilemma was between the duty to prioritize patient safety and
the fear of professional and organizational consequences.
 Eventually, the incidents were investigated, and the design flaws were
exposed, leading to improved safety protocols and system redesign.
 This case highlights the ethical challenges faced by engineers and
operators when they encounter potential harm to others, requiring them
to reconcile their professional responsibilities with potential personal
and organizational consequences.

11. Whistle blowers are necessary evils in an organization, Validate this


statement.

ANS :- Whistleblowers are necessary evils in an organization, Validate this


statement:-

a. Whistleblowers uncover unethical or illegal activities within an


organization, which can help prevent or address harm to stakeholders.
b. They serve as a check on organizational misconduct and promote
transparency and ethical behavior.
c. Whistleblowing can lead to organizational improvements and reforms
by highlighting systemic issues that need to be addressed.
d. Protecting whistleblowers can create a culture of integrity and
encourage employees to report wrongdoing without fear of retaliation.

12. Explain what is moral autonomy and how it requires an ability

to tolerate whilegiving moral judgement.


ANS:- Moral autonomy refers to an individual's ability to
independently and rationally make moral judgments and decisions
based on their own values and principles.
It requires are as follows :-
a. reflect on ethical dilemmas,
b. and tolerate diverse perspectives.
c. Tolerance is necessary because moral autonomy recognizes that
different individuals may have different moral viewpoints,
d. respecting these differences is essential in making fair and unbiased
moral judgments.
13. Briefly explain Kolberg’s Theory. What are limitations of Kohl
berg's theory?

ANS :- Lawrence Kohlberg's theory of moral development proposes that


individuals progress through different stages of moral reasoning, from a
focus on self-interest to more universal ethical principles.
Limitations of Kohlberg's theory include its heavy reliance on hypothetical
moral dilemmas, potential cultural bias, and the focus on moral reasoning
rather than actual behavior.

14. Briefly explain Carol Gilligan’s theory.

ANS:- Carol Gilligan's theory challenges Kohlberg's theory by highlighting


gender differences in moral development. Gilligan argues that women tend
to have a different moral orientation, emphasizing care, relationships, and
responsibility for others, whereas Kohlberg's theory focuses more on justice
and individual rights. Gilligan's theory suggests that moral development
should be understood in terms of both justice and care orientations.

15. What is the difference between Kohlberg’s and Giligian’s theory?

ANS:- The difference between Kohlberg's and Gilligan's theories are :-

 Kohlberg's theory focuses on the development of moral reasoning and


the progression through stages of moral thinking, with an emphasis on
justice and individual rights.
 Gilligan's theory highlights the importance of care and relationships in
moral development, particularly with regard to gender differences.

16. Differentiate between Profession and Professionalism.

ANS :- Profession refers to a specific occupation or vocation that requires


specialized knowledge, skills, and expertise. It often involves a formal
qualification, ethical standards, and a commitment to serving the public
interest.
Professionalism, on the other hand, refers to the behavior, attitudes, and
qualities expected of individuals within a profession. It involves
demonstrating competence, integrity, ethical conduct, and a commitment to
professional standards and responsibilities.
17. Why Setting Goals in Life is necessary in developing
professionalism?
ANS :- Setting goals in life is necessary in developing professionalism
because:
i. Goals provide a sense of direction and purpose, helping individuals
focus their efforts and make progress in their professional development.
ii. Goals help individuals identify areas for improvement, acquire new
skills, and strive for continuous learning and growth.
iii. Setting goals promotes motivation, determination, and a proactive
approach to career advancement and professional success.
iv. Goals provide a framework for measuring progress and evaluating one's
achievements and development in a professional context.

18. What is the need to view Engineering Projects as Experiments?


ANS :- Viewing engineering projects as experiments helps embrace a
learning-oriented approach.
1) It recognizes the inherent uncertainty and complexity involved in
engineering projects.
2) Treating projects as experiments encourages innovation and exploration
of new ideas.
3) It allows engineers to test hypotheses, gather data, and analyze results to
improve designs and processes.
4) Viewing projects as experiments promotes a systematic and iterative
approach to problem-solving.
5) It helps identify potential risks and challenges early on and enables
proactive mitigation strategies.
6) Treating projects as experiments fosters a culture of continuous
improvement and learning from both successes and failures.
7) It encourages engineers to question assumptions, seek alternative
solutions, and adapt to changing circumstances.
8) Viewing projects as experiments facilitates knowledge transfer and
sharing within the engineering community.
9) It allows for the development of best practices and lessons learned that
can be applied to future projects.
19. Describe and compare engineering experiments with standard
experiments.
ANS:- Similarities between Engineering Experiments and Standard
Experiments:
- Both involve a systematic and controlled approach to testing and data
collection.
- Both aim to answer specific research questions or validate hypotheses.
- Both rely on gathering and analyzing data to draw conclusions.

Differences between Engineering Experiments and Standard Experiments:


Engineering Experiments:
- Focus on solving practical problems or optimizing designs.
- Often conducted in real-world settings with real-world constraints.
- Involve the manipulation of variables to achieve desired outcomes.
- Emphasize the application of scientific principles and engineering
knowledge.
- Evaluate the performance, functionality, and reliability of engineering
systems or technologies.

20. Explain the term ‘learning from the past’ in engineering


experimentation.
ANS :- Learning from the past' in engineering experimentation refers to the
practice of studying and analyzing previous engineering projects,
experiences, and outcomes to identify lessons learned and improve future
designs and processes. It involves understanding successes and failures,
identifying best practices, and incorporating this knowledge into future
decision-making and problem-solving. Learning from the past helps
engineers avoid repeating mistakes, enhance efficiency, and drive
continuous improvement in engineering practice.

xxxxxxxxxxxxxxxxxxxxxxxxxxxxXXxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
Assignment---2
Subject: PPLE (HS4001)
Name :- Nabanita Shaw
Roll no:- 2127301
Branch:- Aerospace

1. What are the Senses Of Engineering Ethics?

ANS :- The Senses Of Engineering Ethics are :-


i. Professional Responsibility
ii. Global and Societal Impact
iii. Ethical Dilemmas
iv. Professional Relationships
v. Ethical Codes and Standards

2. Explain Variety of Moral issues .


ANS :- Variety of Moral Issues are :-
a) Human rights and social justice: Addressing issues such as
discrimination, inequality, poverty, and access to resources and
opportunities.
b) Environmental ethics: Dealing with the moral responsibilities towards
the environment, including sustainable practices, conservation, and
mitigating climate change.
c) Biomedical ethics: Covering ethical considerations in healthcare,
medical research, and issues like euthanasia, genetic engineering, and organ
transplantation.
d) Privacy and data ethics: Examining the ethical implications of data
collection, surveillance, privacy breaches, and the responsible use of
technology.
e) Business and corporate ethics: Considering ethical conduct in areas like
marketing, finance, supply chains, and corporate social responsibility.
f) Research ethics: Addressing the ethical considerations in conducting scientific
research, including issues of informed consent, data integrity, and animal testing
3. Explain the three Types Of Inquiry?
ANS :- Three Types of Inquiry:
a) Descriptive Inquiry: Descriptive inquiry aims to describe and understand
phenomena as they are. It involves gathering data, making observations, and
documenting facts and patterns without necessarily interpreting or
evaluating them. Descriptive inquiry is often the starting point for further
investigation and analysis.
b) Normative Inquiry: Normative inquiry focuses on evaluating and
prescribing what ought to be. It involves examining values, principles, and
norms to determine ethical standards and guidelines. Normative inquiry is
concerned with moral reasoning, ethical theories, and developing
frameworks for making ethical judgments.
c) Analytical Inquiry: Analytical inquiry involves critically analyzing and
evaluating concepts, arguments, and evidence. It seeks to identify strengths
and weaknesses, assess logical consistency, and clarify assumptions.
Analytical inquiry is used to examine and refine theories, methodologies,
and solutions.

4. Whistle blowers are necessary evils in an organization, Validate this


statement

ANS:- Whistle blowers are individuals who expose unethical or illegal


activities within organizations. Whether they are considered necessary evils
or not depends on one's perspective. the statement that whistle blowers are
necessary evils include:-

a) Promoting Accountability: Whistle blowers play a crucial role in holding


organizations accountable for their actions. By exposing wrongdoing, they
can help prevent further harm and ensure that responsible parties are held
liable.

b) Protecting the Public Interest: Whistle blowers often bring to light


information that is in the public interest, such as safety violations,
environmental hazards, or financial fraud. Their actions can help protect the
well-being of individuals and society as a whole.

c) Fostering Transparency and Integrity: Whistle blowers contribute to


creating a culture of transparency and integrity within organizations. Their
actions can encourage ethical behavior, discourage misconduct, and promote
a healthier work environment.
5. Explain what is moral autonomy and how it requires an ability
to tolerate whilegiving moral judgement.

ANS :- Moral autonomy refers to the ability of individuals to


independently make moral judgments and decisions based on their
own values, principles, and beliefs. It involves taking responsibility for
one's actions and choices, rather than simply conforming to
externalauthority or societal norms. Moral autonomy requires the
capacity to think critically, reflect on ethical issues, and make
informed decisions.

When giving moral judgments, individuals with moral autonomy


should be able to critically assess their own beliefs and biases,
consider the perspectives of others, and make reasoned and ethical
decisions based on a well-informed understanding of the situation.
Tolerance plays a role in this process by allowing individuals to
consider alternative viewpoints and weigh different ethical
considerations before arriving at a judgment.

6. Define the term Risk and Safety. How we an engineer assess the
safety?

ANS:- Risk can be defined as the probability or likelihood of harm, damage,


or loss occurring due to a particular event, activity, or condition. It involves
the uncertainty associated with potential negative outcomes. Safety, on the
other hand, refers to the condition of being free from harm, danger, or risk.

To assess safety, engineers employ various methods and approaches,


including:

i. Risk Assessment:-

 Identify potential hazards.


 Evaluate the likelihood and severity of risks.
 Determine appropriate measures to mitigate or manage risks.
ii. Safety Standards and Regulations:
 Follow established safety standards and regulations specific to the field
of work.
 Adhere to guidelines and requirements for designing,
 operating, and maintaining systems, structures, or processes.

iii. Analysis of Failure Modes:


 Analyze potential failure modes and their consequences.
 Identify weak points or vulnerabilities in a system.
 Design appropriate safeguards or redundancy measures to prevent or
mitigate failures.

iv. Simulation and Testing:


 Utilize simulation tools to model and evaluate the performance of
systems or processes.
 Conduct testing under various conditions.
 Identify potential issues and make necessary adjustments or
improvements.

7. Give the criteria which ensure a safety design.

ANS :- Criteria for ensuring a safety design include:

 Compliance with safety standards and regulations relevant to the specific


industry or field.
 Incorporation of appropriate safeguards and protective measures to
mitigate identified risks.
 Consideration of human factors, such as ergonomics and user behavior,
to minimize the potential for human error.
 Adequate redundancy or backup systems to ensure continued
functionality in the event of failures.
 Proper documentation and labeling to provide clear instructions and
warnings to users.
 Regular maintenance and inspection procedures to identify and address
any potential safety issues.

8. What are the factors affecting safety and risk?

ANS :- Factors affecting safety and risk include:-

 Human factors: Human error, behavior, and decision-making can


significantly impact safety.
 Environmental conditions: Factors such as weather, temperature, and
natural disasters can affect safety.
 Equipment and technology: The design, condition, and reliability of
equipment and technology can influence safety.
 Organizational culture: The safety culture within an organization plays a
crucial role in managing risks.
 Regulatory requirements: Compliance with safety regulations and
standards is essential for ensuring safety.
 External factors: Economic, political, and social factors can also affect
safety and risk management.

9. Define Risk Benefit analysis. Why it is conducted? What are the


limitation of RBA?

ANS:- Risk Benefit Analysis (RBA) is the process of evaluating the


potential risks and benefits associated with a particular action or decision.

It is conducted to weigh the potential positive outcomes against the


potential negative consequences in order to make informed decisions.

The limitations of RBA include:-

i. Subjectivity: The assessment of risks and benefits can be subjective and


influenced by personal biases.
ii. Uncertainty: It can be challenging to accurately quantify and predict the
likelihood and impact of risks and benefits.
iii. Incomplete information: Conducting a comprehensive RBA requires
access to complete and reliable data, which may not always be available.
iv. Trade-offs: RBA often involves making trade-offs between different
risks and benefits, which can be complex and contentious.

10. Explain two types of risk.

ANS:- Two types of risk are:

1) Inherent Risk: Inherent risk refers to the level of risk associated with an
activity or situation without any risk mitigation measures or controls in
place. It represents the natural or inherent characteristics of the risk itself.

2) Residual Risk: Residual risk is the level of risk that remains after risk
mitigation measures have been implemented. It represents the remaining
risk that is not eliminated or reduced to an acceptable level. Residual risk
takes into account the effectiveness of risk controls and the potential for
their failure.
1. Explain the difference between an agreement and a contract giving an
example of each.
Ans: The statement "All contracts are agreements, but all agreements are
not contracts" reflects the fundamental distinction between these two legal
concepts. Let's break down the explanation along with examples:

● Agreement:
An agreement is a mutual understanding between two or more parties
about their rights and obligations. However, not all agreements are legally
binding and enforceable by law. For an agreement to be considered a
contract, it must fulfill certain legal requirements.
Example of an Agreement:
Suppose Alice agrees to help Bob paint his house next weekend, and in
return, Bob agrees to mow Alice's lawn the following week. This is an
agreement between the two parties, but if there are no legal consequences
for failing to fulfill these promises, it does not constitute a contract.

● Contract:
A contract is a specific type of agreement that meets the necessary legal
criteria, making it enforceable by law. To be enforceable, a contract
typically requires elements such as offer and acceptance, intention to create
legal relations, consideration, legality of purpose, and capacity of the
parties involved.
Example of a Contract:
If Alice agrees to sell her bicycle to Bob for $100, and Bob agrees to pay her
the amount on a specified date, and both parties intend to be legally bound
by this agreement, it becomes a contract. If Bob fails to pay as promised,
Alice may seek legal remedies for breach of contract.
2. List any six essential elements of a legally valid contract.
Ans: The six essential elements of a contract are as follows :
a)All agreements are contracts if the if they are made with the free consent
of the parties competent to contract, object of contract is lawful, for a
lawful consideration and are not declared void. All legal requirements like
contract in writing, registration of documents and signature of witnesses
needs to be complied with.
b)Competent to contract means the person(s) of legal maturity, of sound
mind and is not disqualified by any law.
c)Sound mind means the person capable of understanding the contract and
can form rational judgments about its effect on his interests.
d)Consent by two or more persons means that they agree upon something
with the same understanding on all its aspects.
e)Free consent happens when it is free of any coercion, undue influence,
fraud, misrepresentation, or mistake.
f)Coercion is committing any unlawful act forbidden by Indian penal laws.
g)Undue influence (in entering a contract) happens when one of the parties
hold such powers as to dominate the decision of the other by apparent
authority or the
other party is of weal disposition.
h)Fraud means suggesting something is true when it is not, concealing facts,
making promises with no intention of doing it or by doing anything
fraudulent.
i)Misrepresentation means positively asserting something as true when it is
not, breach of duty to gain some advantage and causing someone to make a
mistake.
j)An agreement arrived at by coercion is voidable; same is the case for fraud
and misrepresentation.
k)The agreement is also voidable if both the parties make mistake in
understanding substance of the agreement.
l)Lawful object of any agreement means that the object is not specifically
forbidden in law. (Example: agreement to supply prohibited drugs or make
forbidden weapons)

3. Explain the concept of product safety with examples


Ans: Product safety is crucial in today's world due to increased awareness.
Engineered products, if faulty, can pose risks such as electrical shocks or
environmental harm. For instance, a mobile phone with a defective battery
can explode, causing harm to individuals. Similarly, a dam, though
essential, can lead to economic loss and suffering through displacement and
environmental degradation.
It's important for engineers to consider the ethical aspect of risk
management. While dams are necessary, engineers must account for
potential risks and implement measures to mitigate them. Engineering,
especially in new product design, requires innovative thinking to anticipate
and address potential risks that might not have past experiences to learn
from. Thus, a human-centric approach to engineering design is crucial for
ensuring product safety and minimizing future risks.

4. Explain the statement: All contracts are agreements but all agreements
are not contracts.
Ans: This statement emphasizes the legal distinction between agreements
and contracts. It suggests that while every contract is fundamentally an
agreement, not every agreement qualifies as a contract in the eyes of the
law.
An agreement is a mutual understanding between two or more parties,
outlining their rights and obligations. However, for an agreement to be
legally binding and termed as a contract, it must meet certain legal
requirements, such as offer and acceptance, intention to create legal
relations, consideration, legality of purpose, and capacity of the parties
involved.
In other words, a contract is a specific and more formal type of agreement
that holds legal weight and can be enforced by law. So, while all contracts
are agreements because they involve mutual understandings between
parties, not every agreement reaches the level of a contract unless it
satisfies the necessary legal criteria.

5. Explain the meaning of the term ‘Tort’ with examples.


Ans: In the realm of law, a "tort" refers to a civil wrong committed by one
individual against another, which, although not criminal, can lead to legal
action in a civil court. The term is derived from the Latin word "tortum,"
meaning twisted or crooked. Unlike codified laws such as criminal
procedures, the law of torts is not a structured set of rules but is based on
case laws and judgments.
A classic example of a tort is defamation, where false statements harm an
individual's reputation. The law of torts serves to enforce the duties and
rights of citizens, encompassing rights such as reputation, bodily safety and
freedom, and property.
Unlike criminal law, tort law deals with private wrongs, and there are no
predefined punishments. Instead, the injured party typically seeks
monetary compensation for the harm or violation of their rights. The rights
protected by tort law include the right of reputation, bodily safety and
freedom, and property. In contrast to criminal wrongs, which are public
wrongs prosecuted by the state with predetermined punishments, tort law
focuses on private wrongs, and compensation is determined by the court
based on the specific circumstances of each case.

6. Discuss the importance of the environment for human survival.


Ans: The importance of the environment for human survival is underscored
by the field of environmental ethics, which explores the moral relationships
between human beings and the environment. The Stanford Encyclopedia of
Philosophy defines environmental ethics as a discipline that studies these
relationships and examines the values and moral status of the environment
and its non-human contents.
Environmental issues, once considered local, have now gained global
recognition due to their significant impact on Earth and human society. As
individuals, especially professionals, must be aware of their roles in
protecting the environment, some issues require global cooperation. Key
environmental issues today include anthropocentrism, conservation of
biodiversity, energy conservation, global climate change, overpopulation,
depletion of natural resources, genetic engineering, waste disposal, and
ozone depletion.
The biosphere, comprising air, water, and land, sustains life on Earth.
However, a major ethical concern arises from the anthropocentric view that
privileges human life over other elements, leading to the exploitation of the
environment for human benefit. Environmental ethics challenges this
perspective and emphasizes the need for sustainable development
Critics argue that the western philosophy of human-centered development
has caused irreversible damage to the environment, resulting in issues like
climate change and ozone depletion. Many believe that this form of
development is not sustainable in the long run.
Environmental ethics posits that protecting the environment is not merely
an aesthetic choice but an economic necessity. Recognizing the uniqueness
of the biosphere and understanding the interdependence of human life with
the environment are crucial steps toward fostering sustainable practices
and ensuring the well-being of both the planet and its inhabitants.

7. List the steps involved in EIA of a project and explain what happens in
each step.
Ans: EIA Process: The EIA process involves four steps:
•Screening
•Scoping
•Public Consultation
•Appraisal and Reporting
1.Screening: Screening is the process of initial scrutiny to decide upon
whether a full EIA report is required for the project. Scrutiny is thus
required only for category B projects. (Category A projects will
mandatorily require EC report) Based on guidelines issued by the MOEF
the project proposal is studies and the project is categorised as B1 or B2. In
the case of B1 category projects, EIA is required and in the case of category
B2 projects no EIA is required. The screening is thus limited to projects
studied at state level only or falling under the purview of SEIAA.
2.Scoping: Scoping is the process of developing Terms of Reference for the
appraisal Committee for EIA. The terms of reference will be developed to
study all the environmental issues relevant to the project.
3.Public Consultation: This can be done through local area consultation
with people affected by the project. The pollution control Boards can also
invite written response if deemed necessary.
4.Appraisal and Reporting: The expert advisory Committee, based on the
terms of reference, different data provided by the applicant and
consultation with the public and the different studies conducted by it will
submit an appraisal report to the MOEF or the SEIAA as the case may be.
The environmental clearance for the project may be given or the
application for EC rejected depending upon the report.

8. State the objectives of environmental protection act 1986.


Ans: The Environmental Protection Act of 1986 aims to:
1. Set environmental standards for air, water, and noise.
2. Regulate discharges to prevent pollution.
3. Empower central and state governments and regulatory bodies.
4. Facilitate coordination between authorities.
5. Impose penalties for violations to ensure compliance.
6. Promote public awareness and participation.
7. Introduce Environmental Impact Assessment (EIA).
8. Focus on prevention and control of pollution.
9. Encourage conservation of natural resources.
10.Support research and development for environmental protection.

9. Write briefly about different types of pollutions and the factors causing
them.
Ans: Air pollution results from the increase in solid particles, harmful
liquids, and gases in the air. In urban centers, concentrated human
activities contribute to severe air pollution, mainly from industrial and
vehicular emissions. Pollutants include solid particles like soot and asbestos,
liquids such as acid droplets, and gases like carbon oxides, nitrogen, sulfur,
methane, and benzene. Major causes encompass burning fossil fuels, mining
operations, waste disposal, construction activities, decaying organic matter,
war zones, and natural disasters. Cities in India face extreme air pollution,
affecting visibility and posing health risks, with detrimental effects on
respiratory health, eye irritation, metal corrosion, and damage to buildings.
At high levels, air pollution leads to acid rain, ozone depletion, and global
warming.
Land pollution arises from intensive agricultural practices, chemical use,
excessive waste dumping, and damage from mining activities. This results
in a reduction of virgin land, decreased fertility, ecosystem destruction, and
health hazards. Solutions include advocating for organic farming, reducing
pesticide use, encouraging waste recycling, and implementing efficient
garbage disposal methods.
Water pollution impacts water bodies and groundwater, affecting
communities. Small water bodies suffer from pesticide residues, making
them non-potable. Industrial waste, sewage leakage, and contaminants
from land pollution contribute to river pollution, with perennial rivers like
Yamuna and Ganga experiencing increased pollution levels. Oceans face
pollution from industrial and agricultural sources, sewage water, and oil
spills from sea carriers.
Addressing these pollution types requires sustainable practices, regulatory
measures, and public awareness to safeguard the environment and human
health.
3.Water Pollution
Water bodies form the lifeline of many communities in India. Ground water
is also extensively used by communities for various purposes. Many studies
have indicated that most of the small water bodies are severely polluted by
the residue pesticides washed away from land. They are not potable and
cannot even be used for other purposes. There are many cases of fluorosis in
many communities due to the presence of high levels of fluoride. Fluorosis
is present in large quantities in deep borewell water.
Water also gets contaminated by industrial waste being discharged without
treatment, and leakage of sewage water into water bodies. Arsenic
poisoning and metal contaminants have been found in many water bodies.
4.Noise Pollution
A rather recent phenomenon in our country is noise pollution. This has
become a serious issue for many people.
All our celebrations have become just din and decibels. In religious festivals,
marriages, and any other kind of celebrations, noise-making is considered
the best way to show that you are doing it well or enjoying it.

10. List the functions of the central pollution control Board.

Ans: The Central Pollution Control Board (CPCB), operating under the
Ministry of Environment and Forests, plays a pivotal role in environmental
governance. As outlined on their website, the functions of the CPCB
encompass advising the Central Government on matters pertaining to
water and air pollution, and air quality improvement. It spearheads a
nationwide program for pollution prevention, control, and abatement,
while coordinating and resolving disputes among State Boards. The CPCB
provides technical assistance, sponsors research, and offers guidance to
State Boards. Training initiatives for individuals involved in pollution
control programs are also organized.

Furthermore, the CPCB conducts mass awareness programs through media,


compiles and publishes technical data on pollution and control measures,
and develops manuals and guidelines for sewage treatment, trade effluents,
stack gas cleaning devices, stacks, and ducts. Disseminating information on
water and air pollution prevention and control is a key aspect of their role.
The CPCB establishes and modifies standards for water quality, air quality,
and other relevant parameters, consulting with State Governments when
necessary. Additionally, the board performs functions prescribed by the
Government of India to ensure comprehensive and effective pollution
control measures.

11. Briefly state the new provisions in the consumer protection Act 2019
Ans: Under the provisions of the Consumer Protection Act, 2019, the
Central Consumer Protection Authority (CCPA) was established effective
from July 24, 2020. The primary purpose of the CCPA is to regulate various
matters, including addressing false or misleading advertisements that could
be detrimental to the interests of the public and consumers as a whole. The
authority has the mandate to take action against misleading
advertisements and false claims, ensuring that consumers are provided with
accurate information and promoting fair trade practices in the marketplace.

12. Explain the concept of product safety with examples.

Ans:- Consumer is entitled to receive a safe product that does not cause
any harm during use. Safety has already been highlighted in the earlier
discussion as well. An electrical product like an iron or washing machine
that gives an electrical shock to the user is an unsafe product. Similarly,
many children’s toys need to be so designed as to be safe for the type of use
those children generally do. No toxic material should be used in making the
product. Even if the children bite or press the toy on their face, no harm
should result. Depending upon the type of product, many safety
considerations should go into the design of the product. Consumers can also
ask for certification that ensures quality and safety. Many goods are
purchased for use over a long period of time. The product must be able to
give reasonably good and safe service over the expected use by the
consumer.
PPLE Assignment-4 - Assignment

NAME:- NABANITA SHAW


ROLL NO:- 2127301
BRANCH :- AEROSPACE ENGG.

y
Q1) Enlist some salient features the amendment bill IT Act 2008.
Ans)
The IT Act 2000 of India was the result of a Model electronic commerce
law passed by the UN General Assembly in1997 leading to the UNCITRAL
Model Law of E Commerce. India was the 12th nation to pass a law on E
commerce based on the UN initiative. IT Act 2008 is amendment to the IT
Act 2000 and is more focused on Security and data protection. The IT act
can be read in the web site of the Ministry of IT. Some very basic features
only are given below. The IT act 2008 is in 90 sections dealing with many
aspects. Some of the important elements are as follows:
• Electronic and digital signatures
• Electronic governance
• Attribution, acknowledgement, and dispatch of data
• Security concerns and provisions
• Certifying authorities
• Electronic signature certificates
• Revocation, breach of contract
• Penalties and punishment
In the preamble, the act states the purpose as "to provide legal
recognition for the transactions carried out by means of electronic data
interchange and other means of electronic communication, commonly
referred to as "Electronic Commerce", which involve the use of
alternatives to paper based methods of communication and storage of
information , to facilitate electronic filings of documents with the
Government agencies and further to amend the Indian Penal Code, Indian
Evidence Act, 1872, The Bankers' Books Evidence Act, 1891, and the
Reserve Bank of India Act, 1934 and for matters connected therewith or
incidental thereto.”

Q2) Define the term cyber space and enlist the security
concerns in cyber space.
Ans)
"Cyber Security" means protecting information, equipment, devices,
computer, computer resource, communication device and information
stored therein from unauthorized access, use, disclosure, disruption,
modification, or destruction.
With more and more people gaining access to the internet through mobile
phones and laptops, the cyber space has become crowded with more and
more people accessing and uploading information, doing transactions,
gaining access to entertainment, and communicating with multiple friends
or colleagues. With so much activity going on in this space, it is natural
that people intending to commit fraud and earn quick money also are on
the prowl. The fraudulent activities going on in this space is called
cybercrime. Sometimes it is just for fun, sometimes for adventure and
testing one’s capabilities and sometimes with intention to defraud.
Computer may be a target of attack by hacking into it for information,
introducing many types of malwares to disable the system. Computer may
also be used as a weapon for credit card fraud, pornography, to
fraudulently access personal data, to send hate messages, to defame
someone etc. Cyber security involves protecting information and devices
from unauthorised access and destruction or misuse.
Cybercrimes are of many types and for many purposes.
1. Data Security: Data security is very important for organisations and
individuals. Corporate data security is very important particularly for
organisations that deal with sensitive information of their customers.
2. Technical Privacy in Cyber space: Privacy is the ability or right of an
individual or group to keep themselves in anonymity and any information
about the individual or group is made known by them at their discretion.

Q3) Define the term data and security issues concerned with it.
Ans)
Data security is very important for organisations and individuals.
Corporate data security is very important particularly for organisations
that deal with sensitive information of their customers. Hackers constantly
are on the prowl to breach into security systems of corporate entities to
steal data for personal gain. Data can be made inaccessible to genuine
users and can be also corrupted. Customer data of bank accounts or card
payment systems need very high level of security. Data can be public,
private, or limited access. Private or limited access data needs to be
secured by various means to secure the data and prevent its misuse.
Data security may be lost because of
• Weak safety systems
• Unsafe or careless handling of data
• Carelessness on the part of individual customers
• Hackers specifically targeting data for personal gains
For corporates, data breach can result in
• Financial loss
• Loss of customer trust
• Damage to reputation
• Customer rights lawsuits resulting in heavy legal costs and settlements
Survival of businesses in the modern digital world depends heavily on
data security of its key assets
and personal data of customers. Many countries are introducing stringent
regulations on data privacy
and any breach of data can evoke customer right legal action.
Data security risks can come from:
• Accidental exposure of data by employees who share critical information
with others
• Phishing is a kind of message sent by attackers who pose as a legitimate
source and prompt the user to click on a link to share sensitive
information; many times, the attackers take advantage of greed of people
to make quick money.
• Ransomware is a malicious software that infects a corporate computer
system and encrypts the data making it unavailable for legitimate use.
The data can be used only with a decryption key which is provided on
payment of ransom amount.
• Weak security systems which can be easily hacked and entered.

Q4) State the objectives of environmental impact assessment.


Ans)
All economic, developmental activities which create wealth, provide jobs,
and make available goods and services for the community have
necessarily some adverse effects as well.
The main aims of EIA are to:
• All projects are scrutinised in the very early stages for any impact on the
environment and health
• Alternatives are studied to arrive at the best project profile which is
environment friendly and cost effective
• Identify and predict the way the project impacts the environment
• Take steps to evaluate the mitigate any adverse environmental impact
• Ensure that economic objectives do not dominate decision making

Q5) State the provisions in the IT act for authentication of


electronic records.
Ans)
Authentication of Electronic Records (IT Act 2008)
(1) Subject to the provisions of this section any subscriber may
authenticate an electronic record by affixing his Digital Signature
(2) The authentication of the electronic record shall be affected by the use
of asymmetric crypto system and hash function which envelop and
transform the initial electronic record into another electronic record.
3A Electronic Signature (Inserted vide ITAA 2006)
(1) Notwithstanding anything contained in section 3, but subject to the
provisions of sub-section (2), a subscriber may authenticate any electronic
record by such electronic signature or electronic authentication technique
which-
(a) is considered reliable; and
(b) may be specified in the Second Schedule
(2) For the purposes of this section any electronic signature or electronic
authentication technique shall be considered reliable if-
(a) the signature creation data or the authentication data are, within the
context in which they are used, linked to the signatory or as the case may
be, the authenticator and of no other person;
(b) the signature creation data or the authentication data were, at the
time of signing, under the control of the signatory or, as the case may be,
the authenticator and of no other person;
(c) any alteration to the electronic signature made after affixing such
signature is detectable
(d) any alteration to the information made after its authentication by
electronic signature is detectable;
and
(e) it fulfils such other conditions which may be prescribed.
Secure Electronic Record
Where any security procedure has been applied to an electronic record at
a specific point of time, then such record shall be deemed to be a secure
electronic record from such point of time to the time of verification.
Secure Electronic Signature (Substituted vide ITAA 2008)
An electronic signature shall be deemed to be a secure electronic
signature if-
(i) the signature creation data, at the time of affixing signature, was under
the exclusive control of signatory and no other person; and
(ii) the signature creation data was stored and affixed in such exclusive
manner as may be prescribed
Explanation- In case of digital signature, the "signature creation data"
means the private key of the subscriber
Security procedures and Practices (Amended vide ITAA 2008)
The Central Government may for the purposes of sections 14 and 15
prescribe the security procedures and practices provided that in
prescribing such security procedures and practices, the Central
Government shall have regard to the commercial circumstances, nature of
transactions and such other related factors as it may consider appropriate.

Q6) What is meant by Intellectual Property?


Ans)
Intellectual property means the legal rights which result from intellectual
activity in the industrial, scientific, literary, and artistic fields.

Q7) State the objectives of environmental protection act 1986.


Ans)
The main aim of the act can be stated as:
• To initiate actions as per decisions taken in the Stockholm convention
• Enacting laws as per need to protect the environment
• Create an institutional authority and structure to regulate industry and
act for any violation
• Coordinate activities by different agencies under existing laws for
prevention and control of pollution
• Set standards for emission by different industries
• Enforcing the environmental protection act and impose penalties for
violation
• Attain the right to life in a healthy environment to every citizen of the
country as assured in the constitution

Q8) List the differences between electronic and digital


signatures.
Ans)
"Electronic signature" means authentication of any electronic record by a
subscriber by means of the electronic technique specified in the second
schedule and includes digital signature while "Digital Signature" means
authentication of any electronic record by a subscriber by means of an
electronic method or procedure in accordance with the provisions of
section 3.

Q9) List out the subject matter for patent protection and what
inventions cannot be protected?
Ans)
A Patent is a kind of intellectual property right granted for technical
inventions that are novel and have inventive steps. Patents are granted to
new inventions, they are invaluable, useful, and play an important role in
everyday life. It is granted to reward ideas that help in development of
new technologies and encourage research.

There are certain types of invention that cannot be patented. These


include:

• literary, dramatic, musical, or artistic works


• a way of doing business, playing a game, or thinking
• a method of medical treatment or diagnosis
• a discovery, scientific theory, or mathematical method
• the way information is presented
• some computer programs or mobile apps
• ‘Essentially biological’ processes, such as cross-breeding plants, and
plant or animal varieties

Q10) Enumerate the Salient features of the Design Act, 2000.

Ans)

To attain the protection under Indian law, a design must:


1. Be non-obvious,

2. Associate with shape, pattern, ornamentation, or configuration of any


product

3. Satisfy novelty and originality condition, it should not be had been


published or used anywhere earlier

4. Be non-contrary, i.e., does not hurt the feelings of anyone.

5. Capable of applying to articles

Q11) Write a short note on Utility Models?


Ans)
Utility models are a kind of protection granted to inventions which are like
patents rights. These rights are usually granted to small inventions. There
are no International Treaty obligations to implement Utility Model system
under their National Laws. Though several countries offer Utility model
protection, India does not offer and it has not enacted any Laws on it. A
utility patent is an exclusive right granted for an invention, which allows
the right holder to prevent others from commercially using the protected
invention without his authorization for a limited period. These are also
known as 'petty patents' or 'innovation patents' or 'minor patents' or
'small patents'.
In some countries, Utility models can be granted for products that are
eligible for grant of patents, however, the subject matter varies from
country to country. As there are no International Treaty obligations on
Utility Models, there is no uniformity in approach for granting Utility Model
Patents. The advantages of going in for utility patents is the less stringent
requirements, though the novelty, non-obviousness and utility
components are essential for the grant of utility patents. They may be set
at a standard lower than the need for a Patent.

You might also like