Page 543 - ComputerScience_Class_11
P. 543

•    Psychological manipulation: The perpetrators use intimidation, fear and psychological pressure to force victims into making
                         hasty decisions, which raises questions about the ethics of such coercion.
                       To address these ethical concerns, law enforcement agencies can:
                       •    Ensure investigations respect the privacy of individuals by only collecting data relevant to the case and with appropriate
                         consent.
                       •    Employ ethical interrogation and investigative practices that do not exploit the psychological vulnerabilities of victims or
                         suspects.
                       •    Use AI and machine learning tools responsibly to detect suspicious activity without overstepping privacy boundaries.
                    2.   How do you think the different types of software licenses (permissive vs. copyleft) influence the innovation process within the
                       software development community? Which model might encourage more contributions from individual developers and why?
                   Ans.  The permissive licenses like BSD and MIT foster innovation by allowing developers to freely use and modify the software without
                       being bound by strict requirements. This freedom encourages integration with other projects and reduces barriers to entry,
                       which can lead to rapid innovation, especially in commercial and enterprise settings.
                       The  GPL,  with its copyleft requirement,  might  encourage  more  contributions  from developers who are  passionate  about
                       preserving  the openness  of  the software. By ensuring  that all  derivatives remain  open-source,  it  creates a more robust
                       collaborative environment, though it might deter commercial entities due to the obligation to release derivative works under the
                       same license.
                        Individual developers might be more likely to contribute to projects under permissive licenses for their ease of use, but the GPL
                       may attract developers focused on ensuring the long-term availability of software for the community.

                 E.  Assertion and reasoning questions.
                     The  following  questions  consist of  two  statements – Assertion  (A) and  Reason  (R).  Answer these questions  by selecting the
                     appropriate option given below:
                     a.   Both A and R are true and R is the correct explanation of A.
                     b.   Both A and R are true but R is not the correct explanation of A.
                     c.   A is true but R is false.
                     d.  A is false but R is true.
                     1.  Assertion (A): Malware is a type of malicious software designed to harm or exploit computer systems.
                        Reason (R): Malware can cause slow performance, steal sensitive data and damage computer systems by spreading through
                        networks or infected files.
                   Ans.   a.  Both A and R are true and R is the correct explanation of A.
                    2.   Assertion (A): Phishing attacks are typically carried out through fraudulent emails.
                        Reason (R): Phishing emails are designed to trick recipients into providing sensitive personal information by pretending to be
                       legitimate organisations like banks.
                   Ans.   a.  Both A and R are true and R is the correct explanation of A.
                    3.  Assertion (A): Artificial Intelligence is widely used in face detection and recognition technologies.
                        Reason (R): AI algorithms enable systems to analyse facial features and accurately match them with stored data, enabling security
                       features like FaceID.
                   Ans.  a.  Both A and R are true and R is the correct explanation of A.

                 F.  Case study-based questions.
                         A company receives an email claiming to be from their bank, requesting sensitive information such as login credentials and credit
                       card details. The email looks official, with the bank’s logo and the correct email address. However, the company suspects it might
                       be a phishing attempt and decides to investigate further.
                       Based on the given case, answer the following questions:
                    1.  What should the company do to verify the authenticity of the email?
                       a.  Call Bank                                   b.  Ignore Email
                       c.  Click Link                                  d.  Check the Sender’s Email



                                                                                 Trends in Computing and Ethical Issues   541
   538   539   540   541   542   543   544   545   546   547   548