Page 43 - iPro_trackGPT_V5_Class7
P. 43
Wastage of Time
Excessive Internet use can be a major time-waster, leading to addiction and spending too much
time surfing online.
Virus and Spam Attacks
The Internet has increased the risk of virus attacks, which can result in the loss of data and
programs.
Loss of Personal Information
Sharing personal information online can be risky, as cyber criminals might misuse it to cause
harm.
COMPUTER ETHICS
Computer Ethics are guidelines for using computers responsibly and wisely. They are also known
as Etiquettes and are becoming increasingly important due to rising issues like cybercrime,
software piracy, unauthorised access, spamming, and hacking.
Here are some key ethics to follow while using a computer:
Do not use a computer to harm others.
Respect other people's privacy and do not access their personal information.
Do not view or use someone else’s documents without their permission.
Avoid stealing data from others' computers.
Do not copy or use software without proper authorisation if you haven’t paid for it.
Do not claim other people’s work as your own.
Tech Tweak
Proprietary software, or closed-source software, is computer software that is not freely
available. The publisher or a designated person retains the intellectual property rights,
typically holding the copyright to the source code and sometimes patent rights.
WHAT ARE INTERNET ETHICS?
The Internet has become a crucial part of our daily lives, used for searching information, sending
emails, online banking, shopping, and more. Internet ethics are guidelines for responsible online
behaviour. Here are some key Internet ethics to follow:
Do not deceive others by hiding your identity online.
Avoid using rude or offensive language in emails, blogs, or on social media.
Do not share personal information with strangers.
Refrain from visiting inappropriate websites.
Do not use someone else's username and password to access their email.
Ethics and Safety Measures in Computing 41

