Page 543 - ComputerScience_Class_11
P. 543
• Psychological manipulation: The perpetrators use intimidation, fear and psychological pressure to force victims into making
hasty decisions, which raises questions about the ethics of such coercion.
To address these ethical concerns, law enforcement agencies can:
• Ensure investigations respect the privacy of individuals by only collecting data relevant to the case and with appropriate
consent.
• Employ ethical interrogation and investigative practices that do not exploit the psychological vulnerabilities of victims or
suspects.
• Use AI and machine learning tools responsibly to detect suspicious activity without overstepping privacy boundaries.
2. How do you think the different types of software licenses (permissive vs. copyleft) influence the innovation process within the
software development community? Which model might encourage more contributions from individual developers and why?
Ans. The permissive licenses like BSD and MIT foster innovation by allowing developers to freely use and modify the software without
being bound by strict requirements. This freedom encourages integration with other projects and reduces barriers to entry,
which can lead to rapid innovation, especially in commercial and enterprise settings.
The GPL, with its copyleft requirement, might encourage more contributions from developers who are passionate about
preserving the openness of the software. By ensuring that all derivatives remain open-source, it creates a more robust
collaborative environment, though it might deter commercial entities due to the obligation to release derivative works under the
same license.
Individual developers might be more likely to contribute to projects under permissive licenses for their ease of use, but the GPL
may attract developers focused on ensuring the long-term availability of software for the community.
E. Assertion and reasoning questions.
The following questions consist of two statements – Assertion (A) and Reason (R). Answer these questions by selecting the
appropriate option given below:
a. Both A and R are true and R is the correct explanation of A.
b. Both A and R are true but R is not the correct explanation of A.
c. A is true but R is false.
d. A is false but R is true.
1. Assertion (A): Malware is a type of malicious software designed to harm or exploit computer systems.
Reason (R): Malware can cause slow performance, steal sensitive data and damage computer systems by spreading through
networks or infected files.
Ans. a. Both A and R are true and R is the correct explanation of A.
2. Assertion (A): Phishing attacks are typically carried out through fraudulent emails.
Reason (R): Phishing emails are designed to trick recipients into providing sensitive personal information by pretending to be
legitimate organisations like banks.
Ans. a. Both A and R are true and R is the correct explanation of A.
3. Assertion (A): Artificial Intelligence is widely used in face detection and recognition technologies.
Reason (R): AI algorithms enable systems to analyse facial features and accurately match them with stored data, enabling security
features like FaceID.
Ans. a. Both A and R are true and R is the correct explanation of A.
F. Case study-based questions.
A company receives an email claiming to be from their bank, requesting sensitive information such as login credentials and credit
card details. The email looks official, with the bank’s logo and the correct email address. However, the company suspects it might
be a phishing attempt and decides to investigate further.
Based on the given case, answer the following questions:
1. What should the company do to verify the authenticity of the email?
a. Call Bank b. Ignore Email
c. Click Link d. Check the Sender’s Email
Trends in Computing and Ethical Issues 541

