Class 9 Computer Science Chapter 5 Ethics In it

Join Telegram channel

Class 9 Computer Science Chapter 5 Ethics In it Question Answer, Computer Science Class 9 Solutions, NCERT Class 9 Computer Science Chapter 5 Ethics In it to each chapter is provided in the list so that you can easily browse throughout different chapters SCERT Class 9 Computer Science Chapter 5 Ethics In it and select needs one.

Class 9 Computer Science Chapter 5 Ethics In it

Also, you can read the SCERT book online in these sections Solutions by Expert Teachers as per SCERT (CBSE) Book guidelines. NCERT Solution of Class 9 Computer Science Chapter 5 Ethics In it is part of AHSEC All Subject Solutions. Here we have given Class 9 Computer Science Chapter 5 Ethics In it Notes for All Subjects, You can practice these here in SEBA Class 9 Computer Science.

Ethics In it

Chapter – 5


Important Terms (Basic Concepts)

● Ethics: Ethics promotes privacy, confidentiality of information and unauthorised access to computer networks, helping to prevent conflict and dishonesty.

● Piracy: Piracy, act of illegally reproducing or disseminating copyrighted material, such as computer programs, books, music, and films.

● Hacker: A computer hacker is a computer expert who uses their technical knowledge to achieve a goal or overcome an obstacle, within a computerised system.

● Cracker: A cracker is someone who breaks into someone else’s computer system, often on a network; bypasses passwords or licences in computer programs; or in other ways intentionally breaches computer security.



1. Fill in the blanks.

(a) Directly copying text, word for word is called ______.

Ans. Plagiarism.

(b) ______ refers to attempts to gain information from otherwise undisclosed areas.

Ans. Hacking.

(c) _______ refers to the unauthorised duplication of computer software.

Ans. Piracy.

2. Choose the correct option.

(a) C in ICT stands for _____.

(1) Communication 

(2) Computer

(3) Control

(4) None of these

Ans. (1) Communication 

(b) Making illegal copies of copyrighted software is called ____.

(1) Software piracy 

(2) Browsing

(3) Collaboration 

(4) Electronic distribution

Ans. (1) Software piracy.

(c) Purchasing of only one licensed copy of a software and distributing/loading it onto multiple systems is called as _____.

(1) Softlifting

(2) Renting 

(3) Hard disk loading

(4) Patent

Ans. (3) Hard disk loading.


3. Short answer questions.

1. What are the main functions related to information?

Ans. The main functions related to information are :

(a) Collecting information.

(b) Storing information.

(c) Distributing information.

2. Define the term plagiarism.

Ans. Plagiarism is the act of copying someone else’s work and publishing it as your own. This includes text, media, and even ideas.

3. Write down the major issues of security and integrity of information.

Ans. The major issues are as follows: 

(a) Confidentiality.

(b) Integrity.

(c) Availability.

4. What is software piracy? What are its common forms?

Ans. Software piracy refers to unauthorised duplication of computer software. The most common forms of software piracy are Softlifting, unauthorised downloading and uploading, hard disk loading, software counterfeiting and illegal software renting.

5. Name three types of law that can help restrict software piracy.

Ans. The following are the three types of law that can help to restrict software piracy: 

(a) Copyright. 

(b) Patent. 

(c) Trademark.

6. An extended synonym for Information Technology is ICT. So, how ICT differs from IT?

Ans. The difference between ICT and IT are: 

(1) ICT stands for Information and Communications Technology.(1) IT stands for Information Technology.
(2) Information and Communications Technology is associated with the field of education.(2) Information Technology is associated with the field of computers, software, networks, etc.
(3) Information and Communications Technology is used in academic institutions and purposes.(3) Information Technology is used in corporate and other huge, complex companies and instructions.

7. IT security today has become a major point of concern. What comes under IT security?

Ans. IT security is a term which is more concerned with the protection of hardware, software and a network of an organisation, from the danger of disaster and external attacks through virus, hacking etc.

8. Elaborate the term software ethics.

Ans. Software ethics refer to ensuring that the software being used is not pirated or unauthorised. These also include that the software developers should be given a fair return of their work.

9. Explain the need of protecting intellectual property right.

Ans. The intellectual property rights must be protected because protecting them: 

● encourages individuals and businesses to create new software and new software applications, as well as improving existing applications.

● ensures new ideas and technologies are widely distributed.

● promotes investment in the national economy.


1. Why do we need computer ethics?

Ans. To protect personal and commercial information such as login and password info, credit card and account information and government and commercial databases. They also prevent breach of privacy, identify theft, interference with work and unlawful use of proprietary software, among other events.

2. What is the role of ethics in information technology?

Ans. Ethics in information technology is important because it promotes privacy, confidentiality of information and unauthorised access to computer networks, helping to prevent conflict and dishonesty.

3. What are the different types of plagiarism?

Ans. There are four common types of plagiarism: 

Direct Plagiarism: That happens when you copy and paste complete sentences or paragraphs written by someone else, without attributing them or including quotation marks.

Mosaic Plagiarism: This form of Plagiarism occurs when their synonyms to maintain the original structure and meaning of the text.

Self-Plagiarism: This form of Plagiarism is more rampant in research-focused settings. Where a student submits a term paper or thesis by using his previous works in bits and pieces, and without getting permission from all the professors involved.

Accidental Plagiarism: As the name suggests, this form of Plagiarism happens by accident. For example, if you forget to cite or misquote your sources, or paraphrase a full section from another magazine without attributing it, you have committed plagiarism.

4. List the guidelines to avoid plagiarism.

Ans. The guidelines to avoid plagiarism are: 

(a) To avoid plagiarism, instead of copying the language of the book as it is, try to put it in your own language/words.

(b) One should have a clear understanding of plagiarism and its consequences, so that no one can perform it unintentionally.

(c) If copying someone else’s work in our task, word for word, then do not forget enclosing it in quotes and also mention its source. 

(d) Another way is to credit the author has write which was useful for your task and not taking credit for it yourself.

5. Which three laws are formulated in order to stop software piracy?

Ans. In order to stop software piracy, three types of laws are formulated as follows: 

● Copying is an exclusive right of the developer or author, to protect their works which is granted by law.

● Patent is the special power of monopoly granted by the law. The work cannot be used or reproduced without obtaining a licence from patent holder.

● Trademark is the registered word or text/logo depicting the identity of a product, work or company.

6. List the various forms of software piracy.

Ans. The following are forms of software piracy: 

● Software counterfeiting: Counterfeiting means producing fake copies of a software, making it look authentic. This involves providing the box, CDs, and manuals, all designed to look as much like the original product as possible.

● Softlifting: Purchasing only one licensed copy of a software and distributing and loading it onto multiple systems is called Softlifting.

● Renting: Selling of a software illegally for temporary use as on rent basis is called renting.

● Hard disk loading: Installing an illegal copy of software on the hard disk of a personal computer is called hard disk loading.

● Uploading and downloading: Creating duplicate copies of the licensed software or uploading and downloading it from the Internet.

7. Define network security. How to protect network resources.

Ans. Network security is the security provided to a network from unauthorised access and risks.

Computer networks that are involved in regular transactions and communication within the government, individuals, or business require security. The most common and simple way of protecting a network resource is by assigning it a unique name and a corresponding password.

8. What does a firewall do?

Ans. A firewall manages the secure in-flow and out-flow of data in a device. It monitors the network traffic and acts as a barrier between the trusted and untrusted network.

9. What is the difference between firewall and antivirus?

Ans. The difference between firewall and antivirus are: 

(1) A firewall is a security network designed to protect computer systems and networks from malicious attacks.(1) Antivirus is a software utility program designed to protect a system from internal attacks from viruses, trojan horse, spyware etc.
(2) The main purpose of a firewall is to monitor network traffic and restrict any unauthorised entry.(2) The main function of an antivirus is to scan, detect, prevent and remove any existential threat to the computer system.
(3) A firewall works at a network protocol level to safeguard against any unwanted intrusion.(3) An antivirus will only scan for any harmful programs that are present in the system such as viruses, worms, Trojans etc.

10. How is a hacker different from cracker?

Ans. The difference between hacker and cracker are: 

(1) The good people who hack for knowledge purposes.(1) The evil person who breaks into a system for benefits.
(2) They are skilled and have a advance knowledge of computers OS and programming. languages.(2) They may or may not be skilled; some of crackers just knows a few tricks to steal data.
(3) Hackers are the ethical professionals.(3) Crackers are unethical and want to benefit themselves from illegal tasks.

11. What is cyber safety?

Ans. Cyber safety is the safe and responsible use of information and communication technology. It is about keeping information safe and secure, but also about being responsible with that information, being respectful to other people online, and using good Internet etiquette.

12. Define cybercrime.

Ans. Cybercrime is criminal activity that either targets or uses a computer, a computer network or a networked device. Most, but not all, cybercrime is committed by cybercriminals or hackers who want to make money.

The most common cyber threats include: Hacking – including of social media and email passwords. Phishing – bogus emails asking for security information and personal details.

13. What is the role of ethics in information technology?

Ans. Ethics in information technology is important because it creates a culture of trust, responsibility, integrity and excellence in the use of resources. Ethics also promotes privacy, confidentiality of information and unauthorised access to computer networks, helping to prevent conflict and dishonesty.

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top