Vous êtes sur la page 1sur 6

Learning Module – ICT Form 4

Learning Area: ICT And Society


Topic: Computer Ethics

Individual Task:

1. Define the terms below

Ethics in general

Unethical

Computer ethics

2. The United States Institute of Computer Ethics has come out with the Ten
Commandments of Computer Ethics. These principles consider the effective
code of conducts for the proper use of information technology. The Ten
commandments of computer ethics are :

1
0

3. Give some examples of unethical computer code of conducts.


Learning Module – ICT Form 4

a)

b)

c)

d)

e)

4. Give some examples about ethical computer code of conduct.

a)

b)

c)

5. Why do we need ethics in in our life?

6. What do you understand about Intellectual Property?

7. Give some examples of intellectual property product.

a)

b)

c)
Learning Module – ICT Form 4

Learning Area: ICT And Society


Topic: Computer Ethics and Legal Issues

Individual Task:

1. Intellectual property can be defined as

2. What is intellectual property law?

3. State the inventions protected by intellectual property law.

a) b)
c) d)
e) f)
g)

4. They are patents for invention, trademarks for brand identity,


designs for product appearance and copyright for material. Match the
types of Intellectual Property protection with the right statement.

Literary and artistic material,


music, films, sound recordings
Patents for inventions and roadcasts, including
software and multimedia.

Design for product Words, names, symbols, devices


appearance and images that represent
products, goods or services
The features of, in particular,the
lines, contours, colours,shape,
Copyright for material texture or material of the
product itself or its
ornamentation.

Trademarks for brand Utility, design or plant patents


identity that protect inventions and
improvements to
existing inventions
Learning Module – ICT Form 4

5. What is information privacy?

6. What is spam?

7. Computer technology threatens our privacy through electronic


profiling. Describe how does computer technology threaten the privacy
of our data?

Cookies

Electronic Profile

Spyware

8. We need privacy for ________________ and ________________.

9. Privacy can be protected by _____________ and ______________

10. The privacy laws in Malaysia emphasizes on:

a)
b)
c)
d)
Learning Module – ICT Form 4

11. State four utilities software that can protect our data privacy

12. Define what is Authentication?

13. There are two commonly used authentication methods, which are
biometric device and callback system. Define the methods.

Biometric device

Callback system

14. State the examples of biometric device.

a) e)
b) f)
c) g)
d)

15. Why is authentication so important in online transaction?

16. What is verification?

17. There are two methods commonly used in verification, which are
user identification and processed object. Match the right statement.

User identification something the user has such as


identification card, security token
and cell phone.
Processed object verify whether the user is valid
or invalid user
the process of validating the user
Learning Module – ICT Form 4

Vous aimerez peut-être aussi