You are on page 1of 3

1. What is technology ethics?

Define the following terms


Technology ethics are the moral guidelines that govern the use of computers,
information system and related technologies.
a. Intellectual Property Rights
Intellectual Property Rights are the rights to which creators are entitled for their
work.
b. Codes of Conduct
A written guidelines that helps determine whether a specification is
ethical/unethical or allowed/not allowed.
c. Green Computing
It involves reducing the electricity and environmental waste while using a
computer.

2. Nowadays, more and more computers are becoming infected with different
types of malicious programme.
a. Describe the following malicious programmes:
 Virus
It is a potentially damaging programme that affects, or infects, a computer or
mobile device negatively by altering the way the computer or device works
without the user’s knowledge or permission.

 Worm
A programme that copies itself repeatedly, for example in memory or on a
network. Using up resources and possibly shutting down the computer, device or
network.

 Trojan horse
A programme that hides within or looks like a legitimate programme. It does not
replicate itself to other computers and mobile devices.
b. Suggest and discuss any THREE (3) methods that can protect computers
from such malicious programmes.
- Use antivirus software
- An antivirus software protects a computer against viruses by identifying and
removing any computer viruses found in memory, on storage media or on
incoming files.

- Implement firewall solution. A firewall is a hardware or software that protects


a network’s resources from intrusion by users on another network, such as the
Internet.
- Back up regularly. You should back up your files regularly and run the restore
tools by returning the files to their original forms when your computer is
affected by malicious software.

3. Irene is worried about security risks such as virus attack and unauthorised
access if she were to implement a networking system in her shops.
a. Assess how virus attack and unauthorised access can bring damage to
computerised system.
Virus is a potentially damaging programmes that affects or infects a computer or
mobile device negatively by altering the way the computer or device works
without the user’s knowledge and permission.
Example: If the computerised system is infected by virus, it will cause data lost,
slows down response time and other damages.

Unauthorised access is the use of a computer or network without permission.


Example: An employee from the boutique shop may send messages or email to
other organisations like bank to perform unauthorised transfer or gain access to
customer’s details for personal gain.
b. Suggest and discuss ONE (1) method that can be used to protect against the
security risks mentioned in Q3a.
For virus attack, you should install and run antivirus software.

For protecting the computer from unauthorised access, access control method
should be implemented.

4. Are passphrases more secure than passwords? Why or why not?


Basically, some organisations use passphrases to authenticate users. Since a
passphrase is a private combination of words, it is often containing mixed
capitalisation and punctuation that makes it even harder to break/guess compared
to password.

Passphrases can be up to 100 characters in length is easier to remember because


they contain words.
Example: In the online banking website of the banking institution.
Password Passphrase
Refer to note A private combination of symbols, words,
punctuations and does not have to be a
proper sentence or grammatically correct.
Do not have space Have spaces
Longer than any random string of letters
(100 characters)
Easier to remember because they contain
words.

You might also like