Page 44 - Trackpad_ipro 4.1_Class7
P. 44

Violent Pictures and Videos

                  The Internet hosts several websites with violent videos and images, which can adversely affect
                  the mental health of children. Exposure to such content can be disturbing and harmful.
                  Wastage of Time

                  Excessive use of the Internet can lead to addiction, causing individuals to spend excessive amounts
                  of time surfing and engaging in online activities, often to the detriment of other responsibilities.

                  Virus and Spam Attacks

                  The Internet has increased the prevalence of virus attacks, which can result in the loss of data
                  and damage to programs. Additionally, spam attacks can clutter inboxes and pose security risks.
                  Loss of Personal Information

                  Sharing personal information online can expose individuals to the risk of misuse by cybercriminals.
                  Such misuse can lead to identity theft and other forms of harm.

                      COMPUTER ETHICS

                  Computer ethics are the common guidelines that we need to follow while using the computer.
                  These are also known as etiquettes, that tell us how to use the computer wisely. These guidelines
                  are becoming increasingly important due to the rise in cybercrime, software piracy, unauthorised

                  access, spamming, and hacking. Some key computer ethics include:
                     Do not use a computer to harm others.
                     Respect other people's privacy and do not interfere with their personal information.

                     Do not access or view others' documents without permission.
                     Do not steal data from other people's computers.
                     Do not copy or use proprietary software without authorisation or payment.
                     Refrain from using others' documents or resources without permission or compensation.
                     Do not claim someone else's work as your own.


                   Tech


                     Funda
                                   Proprietary software, also known as closed-source software, is non-free
                                   computer software for which the publisher or another person retains intellectual
                                   property rights—usually copyright of the source code but sometimes patent
                                   rights.



                      INTERNET ETHICS

                  We all know that the Internet has become an important part of our day-to-day activities. We use the
                  Internet for searching for information, sending or receiving e-mails, doing online banking, shopping,
                  etc. Internet ethics are the good practices that one should follow while using the Internet.




                    42     iPro (Ver. 4.1)-VII
   39   40   41   42   43   44   45   46   47   48   49