Class 9 Computer Science Chapter 5 Ethics In it

Class 9 Computer Science Chapter 5 Ethics In it Question Answer, Computer Science Class 9 Solutions, NCERT Class 9 Computer Science Chapter 5 Ethics In it to each chapter is provided in the list so that you can easily browse throughout different chapters SCERT Class 9 Computer Science Chapter 5 Ethics In it and select needs one.

Class 9 Computer Science Chapter 5 Ethics In it

Join Telegram channel

Also, you can read the SCERT book online in these sections Solutions by Expert Teachers as per SCERT (CBSE) Book guidelines. NCERT Solution of Class 9 Computer Science Chapter 5 Ethics In it is part of AHSEC All Subject Solutions. Here we have given Class 9 Computer Science Chapter 5 Ethics In it Notes for All Subjects, You can practice these here in SEBA Class 9 Computer Science.

Ethics In it

Chapter – 5

COMPUTER SCIENCE

TEXTUAL QUESTIONS AND ANSWERS

OBJECTIVE TYPE QUESTIONS

1. Fill in the blanks.

(a) Directly copying text, word for word is called ______.

Ans. Plagiarism.

(b) ______ refers to attempts to gain information from otherwise undisclosed areas.

Ans. Hacking.

(c) _______ refers to the unauthorised duplication of computer software.

Ans. Piracy.

2. Choose the correct option.

(a) C in ICT stands for _____.

(1) Communication 

(2) Computer

(3) Control

(4) None of these

Ans. (1) Communication 

(b) Making illegal copies of copyrighted software is called ____.

(1) Software piracy 

(2) Browsing

(3) Collaboration 

(4) Electronic distribution

Ans. (1) Software piracy.

(c) Purchasing of only one licensed copy of a software and distributing/loading it onto multiple systems is called as _____.

(1) Softlifting

(2) Renting 

(3) Hard disk loading

(4) Patent

Ans. (3) Hard disk loading.

DESCRIPTIVE TYPE QUESTIONS

3. Short answer questions.

1. What are the main functions related to information?

Ans. The main functions related to information are :

(a) Collecting information.

(b) Storing information.

(c) Distributing information.

2. Define the term plagiarism.

Ans. Plagiarism means using someone else’s work without giving them proper credit. In academic writing, plagiarizing involves using words, ideas, or information from a source without citing it correctly.

3. Write down the major issues of security and integrity of information.

Ans. The major issues are as follows: 

(a) Confidentiality.

(b) Integrity.

(c) Availability.

4. What is software piracy? What are its common forms?

Ans. Software piracy refers to unauthorised duplication of computer software. The most common forms of software piracy are Softlifting, unauthorised downloading and uploading, hard disk loading, software counterfeiting and illegal software renting.

5. Name three types of law that can help restrict software piracy.

Ans. The following are the three types of law that can help to restrict software piracy: 

(a) Copyright. 

(b) Patent. 

(c) Trademark.

6. An extended synonym for Information Technology is ICT. So, how ICT differs from IT?

Ans. The difference between ICT and IT are: 

Sl. No.ICTIT
1ICT stands for Information and Communications Technology.IT stands for Information Technology.
2Information and Communications Technology is associated with the field of education.Information Technology is associated with the field of computers, software, networks, etc.
3Information and Communications Technology is used in academic institutions and purposes.Information Technology is used in corporate and other huge, complex companies and instructions.
4It simply uses computer to store, retrieve, transmit and process data or information.It simply transfers messages among people or machines using technology.
5It helps business in several ways such as cut costs, improve communication, streamline communication, facilitate strategic thinking, eliminate wastes, etc.It helps business in several ways such as make it easy to communicate with remote workers, fast method of communication during emergencies, one can communicate from anywhere in world, etc.

7. IT security today has become a major point of concern. What comes under IT security?

Ans. IT security is a term that is more concerned with the protection of hardware, software and a network of an organization, from the perils of disaster and external attacks through virus, hacking etc.

8. Elaborate the term software ethics.

Ans. It includes methods to avoid violating the unauthorized distribution of digital content. The core issues surrounding computer ethics are based on the use of the internet, internet privacy, copyrighted content, software, and related services, and user interaction with websites.

9. Explain the need of protecting intellectual property right.

Ans. Intellectual property rights (IPR) refers to the legal rights given to the inventor or creator to protect his invention or creation for a certain period of time. These legal rights confer an exclusive right to the inventor/creator or his assignee to fully utilize his invention/creation for a given period of time.

1 thought on “Class 9 Computer Science Chapter 5 Ethics In it”

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top