Page 44 - iPrime_V2.2_class7
P. 44

Violent Pictures and Videos

                  The Internet hosts several websites with violent videos and images, which can adversely affect
                  the mental health of children. Exposure to such content can be disturbing and harmful.
                  Wastage of Time

                  Excessive use of the Internet can lead to addiction, causing individuals to spend excessive amounts
                  of time surfing and engaging in online activities, often to the detriment of other responsibilities.

                  Virus and Spam Attacks

                  The Internet has increased the prevalence of virus attacks, which can result in the loss of data
                  and damage to programs. Additionally, spam attacks can clutter inboxes and pose security risks.
                  Loss of Personal Information

                  Sharing personal information online can expose individuals to the risk of misuse by cybercriminals.
                  Such misuse can lead to identity theft and other forms of harm.

                      COMPUTER ETHICS

                  Computer ethics are the common guidelines that we need to follow while using the computer.
                  These are also known as etiquettes, that tell us how to use the computer wisely. These guidelines

                  are becoming increasingly important due to the rise in cybercrime, software piracy, unauthorised
                  access, spamming, and hacking. Some key computer ethics include:
                      Do not use a computer to harm others.
                      Respect other people's privacy and do not interfere with their personal information.

                      Do not access or view others' documents without permission.
                      Do not steal data from other people's computers.
                      Do not copy or use proprietary software without authorisation or payment.
                      Refrain from using others' documents or resources without permission or compensation.

                      Do not claim someone else's work as your own.

                           Tech Funda



                         Proprietary software, also known as closed-source software, is non-free software for
                         which the publisher retains intellectual property rights, typically through copyright
                         or sometimes patent rights. This means that the source code is not available for
                         public use or modification.



                      INTERNET ETHICS


                  We all know that the Internet has become an important part of our day-to-day activities. We use
                  the Internet for searching for information, sending or receiving e-mails, doing online banking,
                  shopping, etc. Internet ethics are the good practices that one should follow while using the
                  Internet.

                  42     Touchpad iPRIME (Ver. 2.2)–VII
   39   40   41   42   43   44   45   46   47   48   49