64 Xerox 4

Embed Size (px)

Citation preview

  • 7/28/2019 64 Xerox 4

    1/8

    1) What is electronic warfare? Electronic warfare (EW) refers to any action

    involving the use of the electromagnetic spectrum or directed energy to control

    the spectrum, attack an enemy, or impede enemy assaults via the spectrum. Thepurpose of electronic warfare is to deny the opponent the advantage of, and

    ensure friendly unimpeded access to, the EM spectrum. EW can be applied from

    air, sea, land, and space by manned and unmanned systems, and can targetcommunication, radar, or other services.[1] EW includes three major

    subdivisions: Electronic Attack (EA), Electronic Protection (EP), and Electronic

    warfare Support (ES).(2) What are the ten commandments for computer ethics? The ten

    commandments for computer ethics are following:-1. Thou shalt not use a

    computer to harm other people. 2 . Thou shalt not interfere with other peoplescomputer work. 3. Thou shalt not snoop around in other peoples files. 4. Thou

    shalt not use a computer to steal. 5. Thou shalt not use a computer to bear falsewitness. 6. Thou shalt not use of copy software for which you have not paid. 7.

    Thou shalt not use other peoples computer resources without authorization. 8.

    Thou shalt not appropriate other peoples intellectual output.9. Thou shalt thinkabout the social consequences of the program you write. 10.Thou shalt use a

    computer in ways to show consideration and respect.

    (3) List the code of ethics for IT professionals. A Professional member of theComputer Society of India (CSI) gives the following code of ethics for IT

    professionals: -1) Organize the resources available to him and optimize these in

    attaining the objectives of his organization, 2) use the codes of practice conveyedby the CSI from time to time in carrying out his tasks, 3) Not misuse his authority

    or office for personal gains, 4) comply with the Indian laws relating to the

    management of his organization particularly with regard to Privacy and Piracy,and operate within the spirit of these laws, 5) conduct his affairs so as to uphold

    project and further the image and reputation of the CSI,6) Maintain integrity in

    research and publications.

    (4) Discuss the impact of the information technology revolution on societies.The impact of information technology resolution on society are following:-

    People often the compare growth of internet to the h istoric growth of othertechnologies. Internet is just the latest technologies advance and may not single

    a revolutionary advance, but the different between the birth of internet and

    technologies that preceded it. Radio was in 38 years before 50 million peopleused it. TV took 13 years to reach the same standard and it was 16 years before

    50 million people used a PC. Once the internet was made to general public and it

    takes only 4 years for 50 millions people to go-line.

    (5) Explain with the help of historical milestones,the evolution of computer

    ethics. The computer revolution is occurring in two stages. The first stage was

    that of technology introduction in which computer technology was developedand refined. The second stage is of technological permeation in which

    technology getsincluded into everyday human activities. -In the 1940s and 1950s

    computer ethics as a field of study had its roots in the new field of research calledcybernetics? The concepts of cybernetics led Weiner to draw some remarkable

    ethical conclusions about the technology that is now called information andcommunication technology.1960s Don Parker began to examine the unethical andillegal uses of computers by computer professions. He published Rules of Ethics

    in Information Processing, and headed the development of the first code of

    professional conduct for his association of computing machinery. The 1970s sawWalter Maner present the term Computer Ethics to refer to that field of

    question dealing with ethical problems forced, transformed by computer

    technology.1980s a number of social and ethical penalty of informationtechnology were becoming public issues in America and Europe. Issues like

    compute enabled crime, disasters caused by computer failures, invasions of

    privacy.1990s sign the beginning of the second generation of computer ethics .In

    this generation we are reducing the unexpected effects of information technology

    application.

    (6) Explain the impact of internet on the economy of the country and the

    society at large. The virtual world has taken over the real one. Our society is

    increasingly relying on new information technologies and the internet to conduct

    business, manage industrial activities, connect in personal communications andperformscientific research. E-business and e-commerce are the new mantras and

    electronic transactions dominate the overall business model. While these

    technologies facilitate enormous gains in efficiency, productivity andcommunications, they also create new vulnerabilities in terms of possibilities of

    misuse. The same interconnectivity that allows us to transmit information aroundthe globe at the click of a mouse or push of a button also creates unique

    opportunities for criminals, terrorists and hostile foreign nationstates, who might

    seek to steal money or proprietary data I nvade private records etc. Digitalizationhas radically transformed the ways of accessing and using information. Technical

    convergence not only rendered increase to this process, but also as a result,

    affected positiveimpact on economics of the nations. The influence of cyber is sostriking in our day to day lives that one would discern not only in the realm of

    trade & commerce, but also in the ambit of personal communications, academic

    and scientific research, critical infrastructure and the like.(7) What are the remedies for the breach of a contract? The principal

    remedies for the breach of contract are:Damages: -The loss or damage arisingfrom the breach of contract the means which existed of remedying the problemcaused by non-performance of contract must be taken into account. It has also

    penal condition. Specific Performance of the Contract: -In certain cases,the court

    directs against the party in default for the "specific performance" of the contract.

    This means the party will be asked to perform obligations that he needs to

    perform according to the contract. The party may be direct to perform which has

    undertaken by contract that is to say specific performance. Injunction: -An

    injunction is a preventive relief and is granted at the discretion of the court. A

    further check on the discretion is the provision for correction through an appeal

    in a higher court. It is a defensive and is granted the judgment of the court. Ithas different types are:a) Temporary injunction: A temporary injunction is

    granted to continue until a specified period of time or until the time the court

    orders its continuation. b) Permanent injunction: A permanent injunction isgranted to prevent a breach of an obligation existing in favour of an applicant.

    (8) Discuss the impact of globalization on computer ethics. Computer ethics is

    fast developing into a broader and even more important field, which mightreasonably be called global information ethics. Some of the global issues being

    debated are:(a)Global laws:Over two hundred countries are already

    interconnected by the internet. Issues regarding freedom of speech, protection ofintellectual property, invasion of privacy vary from country to country. The

    outline of common laws pertaining to such issues to ensure agreement by all thecountries is one of the foremost questions being debated. (b)Global cyber

    business:Technology is growing rapidly to enable electronic privacy and

    security on theinternet to safely conduct international business transactions.Nations with a technological infrastructure already in place will enjoy

    rapideconomic growth, while rest of the world lags behind. This difference in

    levels of technology will fuel political and economic quarrel, which could furtherwiden the gap between the rich and the poor. (c)Global education:Inexpensive

    access to the global information net for the rich and the poor alike is necessary

    for everyone to have access to daily news from a free press, free texts,documents, political, eligious and social practices ofpeoples everywhere. The

    impact of this sudden and global education on different communities, cultures

    and religious practices are likely to be profound.

    (9) Comment on the statement There is no nexus between cyb er space and

    real space. There is the difference between the business rules for online

    commerce and carrying business in the real space. Much of this difference comes

    from Internet's telepresence features. This feature renders thenetworktechnologically indifferent to physical location. The network is very

    insensitive to geography. It is not possible to determine the physical location of auser or a resource In real space, locating a person or entity with which business is

    interacting is much easier. In the cyberspace to know the location of the partners

    with whom we are interacting is very difficult to know. In some instances, evenan Internet address tells something only about the location of a given machine.

    There is no way to find the information about the actual user. In this sense we can

    say, There is no nexus between cyberspace and real space.(10) What is common law? How does it differ from codified law? Common

    law is the part of the law that formulated developed and administered by old

    common law courts, based originally or unwritten common custom. Common lawor uncodified law is the law flowing from judicial decisions. E.g., the process of

    dispute resolution or adjudication of liability by either village elders orpeople

    holding power through the process of issuing commands has received socialacceptance. The uncodified law governs large segment of the legal regime. The

    judgment pronounced by an organ of the higher judiciary performs at least twoimportant functionsFor the immediate parties, the judgment becomes a source,rights and duties. For the world, it becomes a source of law It happens to deal

    with a legal proposition-and to make a definite pronouncement on the subject. It

    is different from codified law because codified laws are made formally by a Lawmaking body of people, whereas common laws have their enunciations through

    decisions of courts.

    (11) Explain the different sources of law. There are three types of sources oflaw they are following: -(a)Legislation law:-It is the formal performance of law

    by the government and created by the organization. It stands in difference to

    judge made law. Legislation law also consists of written laws, as contrast with

    judge made law orcommon law. Legislation law is also stands in contrast to

    customary law. (b)Common law:-Common law comprises the body of

    principles. It is a body of law that develops and derives through legal decisions,as famous from law making act. The established judicial practice that a court

    must follow, the law put down by a decision of the higher judiciary in the

    Country or State. (c)Customer law:-Customer law is also a source law thatdenotes a usage of people, including a particular social group residing in a

    particular locality. It has become compulsory and has obtained the force of law

    with respect to place or subject matter to which is relates. The operation ofcustomer is generally restricted to a particular locality, group or family.

    (12) How is a professional code distinguished? The professional code isdivided into three types, and they are following:(a)Code of ethics:-Code of ethics

    is more aspirational (aim).They are mission statements stressed the professional

    objectives and vision. (b)Code of conduct:-Code of conduct is oriented towardsthe professionals attitude. They make clear the issues at risk in different

    specialized fields. (c)Code of practice:-Technical document on health and safety

    issue approved by government minister .It provides practical guidance on way toachieve agreement with OMC(Order Management Cycle) legislation. The

    disadvantage is that there is no direct scheme of enforcement.

    (13).Define computer ethics and give classifications of ethical issues. The termcomputer ethics was coined in the mid 1970s by Walter Manor to refer to that

    field of applied professional ethics dealing with ethical problems aggravated,transformed, or created by human technology. Computer ethics is the analysis ofthe nature and social impact of computer technology. Computer ethics is

    standards of professional practice, codes of ethics, aspects of computer law

    ,public policy, corporate ethics etc. Computer ethics examine theethical issues

    surrounding computer usage and the connection between ethics and technology.

    It includes consideration of both personal and social policies for ethical use of

    computer technology. The goal is to understand the impact of computing

  • 7/28/2019 64 Xerox 4

    2/8

    technology upon human values, minimize the damage that technology can do to

    human values, and to identify ways to use computer technology to advance

    human values. *Issues of Ethics:-There are four kinds of ethics issues, they arelisted below:(1)Privacy: Collection, storage and giving out information about

    individuals. What information about oneself should an employer is required to

    expose to others. What kind of observation can an employer use on itsemployees? What things can people keep to themselves and not be forced to

    expose to others. (2)Accuracy: Validity, commitment and accuracy of

    information collected and obtained .Who is responsible to collect information?How can we ensure that information will be proper and accurate to the users?

    How can we ensure that errors in databases, data transmissions and data

    processing are accidental and not intentional?(3) Ownership and value of information. Who owns the information? What are

    the just and fair prices for its exchange? How should one handle software piracy?Under what conditions can one use proprietary databases? Can corporate

    computers be used for private purposes? (4)Accessibility:-Right to access

    information and payment towards the same. Who is allowed to accessinformation? How much should be charged for permitting accessibility to

    information. How can accessibility are provided for employees with disability

    .Who will be provided with equipment needed for accessing information?

    14) What are the fundamental conceptions regarding the evaluation of

    individual actions. There are two fundamental conceptions regarding the

    evaluation of individual actions are:-(a) First is to examine an issue underindependently justified ethics of what one considers being right. There is

    referred to as deontological approach where one starts out with one or more

    moral principles and see how they apply to particular cases. (b) Secondly to lookfor the course of action that maximizes the good and this approach involves

    determining which action defers the best penalty measured in some standard of

    the good. This approach is referred to as teleological that involves structure

    what is good for users, and spells out, what is wrong with action that hold up withattempts to get it. Both of these approaches represent over basic accounts of

    moral thought and decision-making and need to be developed sufficient as anethical framework for the moral evaluation of individual cases and actions.

    (15) How do professional codes address issues from the view point of

    computing profession? The professional codes address issues from the viewpoint of computing professional however it has three level of professional code

    ethics needs toaddress are:-(1)First level identified is a set of ethical values, such

    as integrity and justice professionals share with other human being by virtue oftheir shared humanity. (2)Second level is that more challenging duty than those

    required at the first level. Every type of professional shares this second level of

    ethical duty. Code statements at this level express the responsibility of allprofessionals andprofessional attitudes. (3)Third level, it includes requirement

    that derive directly from elements to particular professional perform. Code

    elements at this level declare more specific responsibilities that are more closelyrelated to the state of art within the particular profession.

    (16) State and explain the primary assumptions of legal system. Any legalsystem is premised upon the following primary assumptions as a foundation: -(a)Sovereignty:-Law making power is a matter of sovereign prerogative. As a

    result, the writ of sovereign authority runs throughout wherever sovereign power

    exercises authority. Beyond its authority, the sovereign cannot regulate a subjectmatter through legal intervention. (b)Territorial Enforcement:-Any law in real

    world context can only be subjected to predetermined territorial enforcements.

    There are some exceptions to this. The sovereign authority could join extraterritorial jurisdiction in case of criminal law. This indicates that the sovereign

    authority can initiate prosecution, even if the crime is committed beyond the

    limits of the territory. (c)Notion of property:-The obtaining premise of the legal

    response considers 'property' as tangible and physical. In the cyber context,

    'property' in the form of digitized services or goods poses serious challenges to

    this legal understanding. (d)Paper-based transaction:-Obtaining legal responseconsiders and encourages people to create and constitute legally binding

    relationships on the basis of paper-based transactions. Although the word

    document under law takes within its fold material other than paper also. Sincein cyber context, digital orelectronic record forms the basis of electronic

    transactions. Hence, the transactions are on the basis of electronic records.

    (e)Real relationships:-Legal response considers relationships quite often. In viewof connectivity, pace and accuracy as to transmission, in the cyber context, these

    relationships acquire unique distinction of virtual character. In case oftrade andcommerce, commercial transaction in the form of contracts constitutes the

    foundation of legal relationship.

    (17) Discuss the classification of crimes under the IT Act 2000. Theclassification of crimes under the IT Act, 2000 are following:-Securing access to

    computer, computer system, computer network. Introducing any computer virus

    or impurity in the computer system or network. Damaging the computer,computer system or network. Disrupting the working of the computer, computer

    system or network. Disrupting the access of the computer, computer system or

    network of an authorized user. Providing assistance to ensure unauthorizedaccess to the c/s or network. Tempering with computer source documents.

    Hacking with c/s; publishing of information which is absence in electronic form.Breach of confidentiality and privacy.Publishing Digital certificate that arefalse in certain particulars.

    (18) Explain the policy approaches to privacy issues. The policy approaches to

    privacy issues are:-(1)Market approach:A technique used in appraising

    property which compares recently sold comparableproperties in arriving a

    conclusion as to fear market value. (2)Human rights approach:It recognizes

    right to information and related attribute of privacy as human right. (3)Contract

    approach:A conscious decision to create a non-governmental structure. A

    conscious decision not to convene a global conference. In h is model premise on

    the ground that is a given context the privacy concern are letter and protect iftreated as term and conditions of constrict.

    (19) What are the moral rules on the internet? Discuss the types of

    problematic behavior. Moral rules can be notable into two types governingonline behavior. (1)The first type of moral rules identifies our moral obligations

    online. Examples of such rules are netiquette rules and Codes of conduct

    examples of which are be polite in e-mail correspondence, always tell theclient the truth. (2)The second type of moral rules or recognition rules allows

    us to identify what is moral and what is not. Examples of recognition rules are

    read the signs, follow the instructions. **There are three type of problematicbehavior, they are listed below:(a)First type of problematic behavior involves

    individuals and their actions are broadly referred to as hacking. It also includedintentionally sending viruses or worms on the net that damage the computer

    systems. Hacking is unethical and has rightly been made illegal. (b)The second

    category of problematic behavior is the criminal actions involving theft (robbery)and extortion. Falling in the scope of criminal actions include stealing of

    electronic funds, cyber stalking etc. (c)The third category of problematic

    behavior involves issues whether specific laws need to be framed to make suchbehavior illegal. This is known as netiquette. Netiquette promotes ethical

    behavior and thus is an important tool for shaping the behavior on the net.

    (20) Describe computer Hacking.The term computer hacking usuallydescribes the penetration of damage but for the pleasure of overcoming the

    technical security measures. In practice, this kind of offence can be normally

    found. As far as the damage of these cases is concerned, a separation is essential:In numerous cases, the penetrated computer user is not actually harmed, but only

    endangered. However, in these cases, too, the formal sphere of secrecy or the

    integrity of the concerned computer systems is violated. Contrary to this,

    considerable damages occur in other cases especially when the perpetrators lateruse their knowledge for committing espionage, damage or fraud.

    (21) What is cyber privacy? Explain.

    Cyber privacy is necessary for the authorities to indulge in

    surveillance in order to keep cybercrime in control. Thesame surveillance affects the privacy of millions of the people who

    use the Internet every day. However, privacy is

    extremely important to all individuals, organizations, and nations.The Indian judiciary has not laid down specific laws regarding cyber

    privacy. Currently, the judiciary can only

    interpret privacy in accordance with the existing regulations. As perArticle 21 of the Indian constitution, the right to

    privacy is an integral part of the fundamental right to life. The

    Information Technology Bill of 1999 has ignored theissue of privacy except for section 71, which says that any person who

    secures access to any electronic record, book,register, correspondence, information, document, or other material

    without the consent of the concerned persons

    and discloses the same to any other person will be punished for upto

    two years of imprisonment, or fined upto Rs. 1lac, or both. Internet users are asked to volunteer information, they

    must be told how and why the collected

    information will be used, what type of information will be shared withwhom, and what type of information will not

    be shared. All websites that collect information must protect it by

    using all means possible.

    (22) Explain principles of computer ethics.

    Ans: There are eight types of computer ethics principles:

    1) PUBLIC: Software engineers shall act consistently with the publicinterest. In particular, software engineers

    Shall accept full responsibility for own work. Moderate the interests

    of the software engineer, the employer, theclient and the users with the public good.

    2) CLIENT and EMPLOYEE: Software engineers shall act in a

    manner that is in the best interests of their clientand employer, consistent with the public interest. Provide service in

    their areas of competence, being honest andforthright about any limitations of their experience and education.

    3) PRODUCT: Software engineers shall ensure that their products

    and related modifications meet the highestprofessional standards possible.

    4) JUDGMENT: Software engineers shall maintain integrity and

    independence in their professional judgment. Inparticular, software engineers shall; Temper all technical judgments

    by the need to support and maintain human

    values. Only endorse documents either prepared under theirsupervision or within their areas of competence and

    with which they are in agreement.5) MANAGEMENT: Software engineering managers and leaders

    shall subscribe to and promote an ethical

    approach to the management of software development and

    maintenance. In particular, those managing or leading

    software engineers shall ensure good management for any project on

    which they work, including effective

    procedures for promotion of quality and reduction of risk.

  • 7/28/2019 64 Xerox 4

    3/8

    6) PROFESSION: Software engineers shall advance the integrity and

    reputation of the profession consistent with

    the public interest. In particular, software engineers shall; Helpdevelop an organizational environment favorable to

    acting ethically. Promote public knowledge of software engineering.

    7) COLLEAGUES: Software engineers shall be fair to andsupportive of their colleagues. In particular, software

    Engineers shall; Encourage colleagues to adhere to this Code. Assist

    colleagues in professional development8)SELF: Software engineers shall participate in lifelong learning

    regarding the practice of their profession and

    shall promote an ethical approach to the practice of the profession. Inparticular, software engineers shall

    continually endeavor to: Further their knowledge of developments inthe analysis, specification, design,

    development, maintenance and testing of software and related

    documents, together with the management of thedevelopment process

    (23) What is meant by unauthorized access to a computer?

    Explain.The IT Act defines unauthorized access by any person as acts done

    without the permission of the owner, which

    includes:Solved By:- Nishant & Amlesh

    Page 8 of 20

    Accessing or securing access to such computer, computer system or

    computer network

    Downloading, copying or extracting any data or information for suchcomputer, computer system or

    computer network including information or data held or stored on anyremovable storage medium

    Introducing any computer virus or contaminant in the computer,computer system or network

    Damaging the computer, computer system or network

    Disrupting the working of the computer, computer system or network

    Disrupting the access of the computer, computer system or network to

    an authorized user

    Providing assistance to ensure unauthorized access to the computer,

    computer system or network

    The penalty to be paid by the person for unauthorized access by way

    of compensation not exceeding one

    crore rupees to the affected person.

    (24) What are the amendments to the Indian Penal Code?

    Ans: The Indian Panel Code (IPC) detail actions that constitute a

    crime and the punishment prescribed for suchaction. It elaborately classifier crimes based on interests that are

    intended to be protected the classification

    includes:1) Offences against body.

    2) Offences against property.

    3) Offences against marriage.4) Offences against public tranquility.

    5) Offences against state.

    As the definition of crime world includes a practice act or deliberate

    cyber transaction using the equivalent

    of a document needs protection under law.

    To facilitate enforcement of law to cover cyber transaction, the IPChas been assented to cover cyber

    transaction.

    The important changes in IPC include prevision regarding documents

    and signature.

    As electronic records have replaced documents in the IT Act, the IPC

    have been amended to read also the

    expression electronic records where the term document appears inthe act.

    (25) Define computer ethics and give classifications of ethicalissues.

    The term computer ethics was coined in the mid 1970s by Walter

    Manor to refer to that field of applied professional

    ethics dealing with ethical problems aggravated, transformed, or

    created by human technology. Computer ethics is

    the analysis of the nature and social impact of computer technology.

    Computer ethics is standards of professional

    practice, codes of ethics, aspects of computer law, public policy,

    corporate ethics etc. Computer ethics examine the

    ethical issues surrounding computer usage and the connectionbetween ethics and technology. It includes

    consideration of both personal and social policies for ethical use of

    computer technology. The goal is to understandthe impact of computing technology upon human values, minimize the

    damage that technology can do to human

    values, and to identify ways to use computer technology to advancehuman values.

    Issues of Ethics: There are four kinds of ethics issues, they are listed

    below:1) Privacy: Collection, storage and giving out information about

    individuals. What information about oneselfshould an employer is required to expose to others. What kind of

    observation can an employer use on its

    employees? What things can people keep to themselves and not beforced to expose to others.

    2) Accuracy: Validity, commitment and accuracy of information

    collected and obtained. Who is responsible tocollect information? How can we ensure that information will be

    proper and accurate to the users? How can

    Solved By:- Nishant & AmleshPage 9 of 20

    we ensure that errors in databases, data transmissions and data

    processing are accidental and notintentional?

    3) Property: Ownership and value of information. Who owns the

    information? What are the just and fair prices

    for its exchange? How should one handle software piracy? Underwhat conditions can one use proprietary

    databases? Can corporate computers be used for private purposes?4) Accessibility: Right to access information and payment towards

    the same. Who is allowed to access

    information? How much should be charged for permittingaccessibility to information. How can accessibility

    are provided for employees with disability. Who will be provided with

    equipment needed for accessinginformation?

    (26) Explain the different sources of law.

    There are three types of sources of law they are following: -a) Legislation law: - It is the formal performance of law by the

    government and created by the organization. It

    stands in difference to judge made law. Legislation law also consistsof written laws, as contrast with judge

    made law or common law. Legislation law is also stands in contrast tocustomary law.

    b) b) Common law: - Common law comprises the body of principles.

    It is a body of law that develops and derives

    through legal decisions, as famous from lawmaking act. Theestablished judicial practice that a court must

    follow, the law put down by a decision of the higher judiciary in the

    Country or State.c) c) Customer law: - Customer law is also a source law that denotes

    a usage of people, including a particular

    social group residing in a particular locality. It has become

    compulsory and has obtained the force of law with

    respect to place or subject matter to which is relates. The operation of

    customer is generally restricted to aparticular locality, group or family.

    (27) How is a professional code distinguished.

    The professional code is divided into three types, and they are:a) Code of ethics: Code of ethics is more aspirational (aim). They are

    mission statements stressed the professional

    objectives and vision. b) Code of conduct: Code of conduct isoriented towards the professionals attitude. They

    make clear the issues at risk in different specialized fields. c) Code ofpractice: Technical document on health and

    safety issue approved by government minister. It provides practical

    guidance on way to achieve agreement withOMC (Order Management Cycle) legislation. The disadvantage is that

    there is no direct scheme of enforcement.

    (28) Explain with the help of historical milestones, the evolution of

    computer ethics.

    The computer revolution is occurring in two stages.

    The first stage was that of technology introduction in which

    computer technology was developed andrefined.

    The second stage is of technological permeation in which

    technology gets included into everyday human

    activities.

    In the 1940s and 1950s computer ethics as a field of study had its

    roots in the new field of research called

  • 7/28/2019 64 Xerox 4

    4/8

    cybernetics? The concepts of cybernetics led Weiner to draw some

    remarkable ethical conclusions about the

    technology that is now called information and communicationtechnology. 1960s Don Parker began to examine the

    unethical and illegal uses of computers by computer professions. He

    published Rules of Ethics in InformationProcessing and headed the development of the first code of

    professional conduct for his association of computing

    machinery. The 1970s saw Walter Maner present the term ComputerEthics to refer to that field of question

    dealing with ethical problems forced, transformed by computer

    technology. 1980s a number of social and ethicalpenalty of information technology were becoming public issues in

    America and Europe. Issues like computerSolved By:- Nishant & Amlesh

    Page 10 of 20

    enabled crime, disasters caused by computer failures, invasions ofprivacy. 1990s sign the beginning of the second

    generation of computer ethics. In this generation we are reducing

    the unexpected effects of information technologyapplication.

    (29) Explain the impact of internet on the economy of the country

    and the society at large.The virtual world has taken over the real one. Our society is

    increasingly relying on new information technologies

    and the internet to conduct business, manage industrial activities,connect in personal communications and perform

    scientific research. E-business and e-commerce are the new mantras

    and electronic transactions dominate the

    overall business model. While these technologies facilitate enormousgains in efficiency, productivity and

    communications, they also create new vulnerabilities in terms ofpossibilities of misuse. The same interconnectivity

    that allows us to transmit information around the globe at the click of

    a mouse or push of a button also createsunique opportunities for criminals, terrorists and hostile foreign nation

    states, who might seek to steal money or

    proprietary data, invade private records etc. Digitalization hasradically transformed the ways of accessing and using

    information. Technical convergence not only rendered increase to this

    process, but also as a result, affected positiveimpact on economics of the nations. The influence of cyber is so

    striking in our day to day lives that one would

    discern not only in the realm of trade & commerce, but also in theambit of personal communications, academic and

    scientific research, critical infrastructure and the like.(30) How do professional codes address issues from the view point

    of computing profession?

    The professional codes address issues from the view point of

    computing professional however it has three level ofprofessional code ethics needs to address are:

    1) First level identified is a set of ethical values, such as integrity and

    justice professionals share with other humanbeing by virtue of their shared humanity. 2) Second level is that more

    challenging duty than those required at the

    first level. Every type of professional shares this second level of

    ethical duty. Code statements at this level express

    the responsibility of all professionals and professional attitudes. 3)

    Third level, it includes requirement that derivedirectly from elements to particular professional perform. Code

    elements at this level declare more specific

    responsibilities that are more closely related to the state of art withinthe particular profession.

    (31) Comment on the statement There is no nexus between cyber

    space and real space.There is the difference between the business rules for online

    commerce and carrying business in the real space.Much of this difference comes from Internet's telepresence features.

    This feature renders the network

    technologically indifferent to physical location. The network is veryinsensitive to geography. It is not possible to

    determine the physical location of a user or a resource. In real space,

    locating a person or entity with which businessis interacting is much easier. In the cyberspace to know the location of

    the partners with whom you are interacting is

    very difficult to know. In some instances, even an Internet addresstells something only about the location of a given

    machine. There is no way to find the information about the actualuser. In this sense we can say,

    There is no nexus between cyberspace and real space.

    (32) State and explain the primary assumptions of legal system.

    Any legal system is premised upon the following primary assumptions

    as a foundation: -

    a) Sovereignty: Law making power is a matter of sovereign

    prerogative. As a result, the writ of sovereign authority

    runs throughout wherever sovereign power exercises authority.

    Beyond its authority, the sovereign cannot regulate

    a subject matter through legal intervention. b) TerritorialEnforcement: Any law in real world context can only be

    subjected to predetermined territorial enforcements. There are some

    exceptions to this. The sovereign authoritycould join extra territorial jurisdiction in case of criminal law. This

    indicates that the sovereign authority can initiate

    Solved By:- Nishant & AmleshPage 11 of 20

    prosecution, even if the crime is committed beyond the limits of the

    territory. c) Notion of property: The obtainingpremise of the legal response considers 'property' as tangible and

    physical. In the cyber context, 'property' in theform of digitized services or goods poses serious challenges to this

    legal understanding. d) Paper-based transaction:

    Obtaining legal response considers and encourages people to createand constitute legally binding relationships on

    the basis of paper- based transactions. Although the word document

    under law takes within its fold material otherthan paper also. Since in cyber context, digital or electronic record

    forms the basis of electronic transactions. Hence,

    the transactions are on the basis of electronic records. e) Realrelationships: Legal response considers relationships

    quite often. In view of connectivity, pace and accuracy as to

    transmission, in the cyber context, these relationshipsacquire unique distinction of virtual character. In case of trade and

    commerce, commercial transaction in the form

    of contracts constitutes the foundation of legal relationship.

    (33) What are the remedies for the breach of a contract?Ans: The principal remedies for the breach of contract are:

    a) Damages: -

    The loss or damage arising from the breach of contract the means

    which existed of remedying the problemcaused by non-performance of contract must be taken into account.

    It has also penal condition.b) Specific Performance of the Contract: -

    In certain cases, the court directs against the party in default for the"specific performance" of the contract.

    This means the party will be asked to perform obligations that heneeds to perform according to the

    contract.

    The party may be direct to perform which has undertaken by contract

    that is to say specific performance.

    c) Injunction: -

    An injunction is a preventive relief and is granted at the discretion of

    the court.

    A further check on the discretion is the provision for correction

    through an appeal in a higher court.

    It is a defensive and is granted the judgment of the court.

    It has different types are:

    a) Temporary injunction: A temporary injunction is granted to

    continue until a specifiedperiod of time or until the time the court orders its continuation.

    b) Permanent injunction: A permanent injunction is granted to

    prevent a breach of anobligation existing in favor of an applicant.

    (34) Explain the policy approaches to privacy issues.The policy approaches to privacy issues are: -

    1) Market approach:

    A technique used in appraising property which compares recently sold

    comparable properties in arriving a

    conclusion as to fear market value.2) Human rights approach:

    It recognizes right to information and related attribute of privacy ashuman right.

    3) Contract approach:

    A conscious decision to create a non-governmental structure.

    Solved By:- Nishant & Amlesh

    Page 12 of 20

    A conscious decision not to convene a global conference.

  • 7/28/2019 64 Xerox 4

    5/8

    In his model premise on the ground that is a given context the privacy

    concern are letter and protect if

    treated as term and conditions of constrict.

    (35) Explain the process of encryption and decryption of data.

    Or what are the evidentiary presumptions of a secured electronic

    document? Explain the process of encryption

    and decryption of data

    The science of Cryptography deals with the encryption of datameans the process of making information

    meaningless to the unauthorized reader. Encryption translates the data

    into a secret code. Decryptionthe processof making the information readable once again completes the

    cryptography process. The sending of documents inan encrypted form is the basis of the digital signature system.

    There are two types of Cryptographic systems symmetric and

    asymmetric. The Symmetric Crypto system alsoknown as single key system being a simpler system consists of both

    the sender and the receiver having access and

    sharing a common Key to encrypt or decrypt a message. Thedrawback of this system is the security of the Key

    itself and the breakdown of an intermediary to verify the creation of

    an electronic document. The AsymmetricCrypto system also known as Public key system is a more secure

    system and overcomes the drawbacks of the single

    key system. This system uses two keys means a key pair generated bythe asymmetric Crypto system. The originator

    of the documents who creates the key pair keeps one key which is

    known as the Private Key and the other key is

    sent to the person who is a recipient of a secured message from theoriginator. When the recipient uses the public

    key to decrypt the sent message he is said to have affixed his digitalsignature. Thus the combination of Public Key

    and Private Key provide both confidentiality and authentication which

    are key enablers for secure electronictransmission. The intermediary plays an important role of identifying

    the originator of the document and to check if

    the Public Key matches with the Private Key. The intermediary wouldalso have to certify that the recipient of the

    public key is the person authorized to use the Public Key. The

    intermediary tends to assign the public key to aparticular entity and thus becomes a Certifying Authority.

    (36)List the code of ethics for IT professionals.

    A Professional member of the Computer Society of India (CSI) givesthe following code of ethics for IT professionals: -

    1) Organize the resources available to him and optimize these inattaining the objectives of his organization,

    2) use the codes of practice conveyed by the CSI from time to time in

    carrying out his tasks,

    3)Not misuse his authority or office for personal gains,4) comply with the Indian laws relating to the management of his

    organization particularly with regard to Privacy

    and Piracy, and operate within the spirit of these laws,5) conduct his affairs so as to uphold project and further the image

    and reputation of the CSI,

    6) Maintain integrity in research and publications.

    (37)Explain the social and ethical issues arising out of the

    presence of computers in the workplace.

    See answer of question 25Solved By:- Nishant & Amlesh

    Page 13 of 20

    (38) Discuss the significance of legislation.Ans: Legislature can legislate in advance. Legislature can make a low

    on any subject, but judges can deal with a

    subject only when the point arises before them. Legislature canoverride the law on the particular point. Legislature

    is the most fruitful source of law and subject limitation flowing fromthe constitutional doctrine that matter of policy

    cant be delegated. Legislature can vest a subordinate authority with

    the power to make rules, order etc, but a courtpronouncing a judgment do so. A Legislature performance is not

    subject to appeal.

    (40) Discuss the adjudicatory processes incorporated in the act.Ad judicatory Process: A reasonable opportunity is given to the

    person being charged with contravention of the Act

    by the adjudicating officer. When the adjudicating Officer is satisfiedthat there had been a contravention of the Act,

    he imposes such penalty or award compensation in accordance withthe provisions of that section. While adjudging

    the quantum of compensation under this section the adjudicating

    officer shall take into consideration the amount of

    gain of unfair advantage wherever quantifiable made as a result of the

    default, the amount of loss caused to any

    person as a result of the default and the repetitive nature of the default.

    The adjudicating officer also has the

    powers of the Civil Court, which are conferred on the Cyber Appellate

    Tribunal.

    (42) What are the moral rules on the internet? Discuss the types of

    problematic behaviour .

    Moral rules can be notable into two types governing online behavior.

    1) The first type of moral rules identifies our moral obligations online.Examples of such rules are netiquette rules

    and Codes of conduct examples of which are be polite in e-mail

    correspondence,always tell the client the truth.2) The second type of moral rules or recognition rules allows us to

    identify what is moral and what is not. Examples

    of recognition rules are read the signs, follow the instructions.There are three type ofproblematic behavior, they are listed below:

    a) First type of problematic behavior involves individuals and theiractions are broadly referred to as hacking. It

    also included intentionally sending viruses or worms on the net that

    damage the computer systems. Hacking isunethical and has rightly been made illegal.

    b) The second category of problematic behavior is the criminal

    actions involving theft (robbery) and extortion.Falling in the scope of criminal actions include stealing of electronic

    funds, cyber stalking etc.

    c) The third category of problematic behavior involves issueswhether specific laws need to be framed to make such

    behavior illegal. This is known as netiquette. Netiquette promotes

    ethical behavior and thus is an important tool forshaping the behavior on the net.

    (43)Describe computer Hacking.

    The term computer hacking usually describes the penetration of

    damage but for the pleasure of overcoming thetechnical security measures. In practice, this kind of offence can be

    normally found. As far as the damage of thesecases is concerned, a separation is essential: In numerous cases, the

    penetrated computer user is not actually

    harmed, but only endangered. However, in these cases, too, theformal sphere of secrecy or the integrity of the

    concerned computer systems is violated. Contrary to this, considerable

    damages occur in other cases especiallywhen the perpetrators later use their knowledge for committing

    espionage, damage or fraud.

    Solved By:- Nishant & AmleshPage 14 of 20

    (44)How is information privacy, violated? Discuss the privacy

    policy guidelines for database.Information privacy is violated when the individual:

    a) Does not know what information is being collected about themb) Cannot limit access to what is being collectedc) Cannot control the use and distribution of this information

    d) Cannot correct erroneous data and out-of-date information.

    The privacy policy guidelines for database are following:

    1) Data collection:o

    Data should be collected on individuals only for the purpose ofachieve a legitimate business

    objective.

    o

    Data should be enough, related and not too much related to the

    business objective.

    oIndividuals must give their permission before data pertaining to them

    can be gathered.

    2) Data Accuracy:o

    Sensitive data gathered on individuals should be verified before it is

    entered into the database.o

    Data should be accurate and where and when necessary kept current.o

    If there is disagreement about the accuracy of the data, the

    individuals version should be notedand included with any disclosure of the file.

    3) Data confidentiality:

    oComputer security procedures should be implemented to provide

    reasonable assurance against.

    oThird parties should not be given access to data without the

    individuals knowledge or permission.oDisclosures of data, other than the most routine, should be noted and

    maintained for as long as the

    data is maintained

    o

    Data should not be disclosed for reasons incompatible with the

    business objective.

  • 7/28/2019 64 Xerox 4

    6/8

    (45)Discuss the different forms of computer crime.Cyber Crime is capable of causing huge damage both in financial

    terms and also in terms of user confidence, the Acthas given severe fine for such infractions. The different form of

    computer crimes are: -

    a) Infringements of privacy: -

    The protection of privacy within the data processing area also had to

    consider the mass of private computersystem.

    It establishes a difficult balance of interest between the privacyinterest of data subjects concerned and the

    economic freedom of the holder of personal data.b) Economic offences: -

    Computer manipulations were the starting point of discussion aboutcomputer related economic offences.

    It is the core center of computer economic offences.

    Hacking has increasingly become a basic offence which is used to

    commits act of computer fraud.c) Computer Hacking: -

    It describes the penetration of damage but in the case, the formalsubject of secrecy is debased.

    j)

    Computer espionage: -

    Its appearing in official data represents a special danger compared

    with traditional economic aptitude.ii) Software piracy and other form of product piracy: -

    Solved By:- Nishant & Amlesh

    Page 15 of 20

    The unauthorized coping and use of computer programs is called

    software piracy.iii) Computer sabotage and computer Extortion: -

    The objects of computer sabotage are the physical computer facilitiesas well as the vague data containing

    computer programs.

    iv) Computer Fraud: -

    In this case, invoice manipulation concerning the payment of bells andspicy of industrial account balance

    and balance sheet at banks.

    v) Legal and harmful contents: -

    Internet is not only made difficult by the fact that these perpetrators

    are acting from abroad and that the

    international mechanisms of co- operation are often weak and slow.d) Other Offences: Along with the advance of information

    technology, new areas of live computers can be used for

    almost all offences.

    i) Attacks on life: Computer manipulations described above did not

    only serve the purpose of gaining pecuniary

    benefits, but were also used for attacks on life -as in the case of themanipulation of a flight control system or of a

    hospital computer.

    ii) Organized Crime: It is clear that the powerful tools of moderncomputer and communication systems to store,

    manage and transfer data are also used by organized crime groups in

    many areas. Organized crime is especiallyinvolved in sophisticated computer fraud, credit card fraud, and

    telephone fraud and software and product piracy.iii) Electronic Warfare: the possibilities of computer manipulations

    have also been recognized in the military sector.

    Strategic Information Warfare has become a form of potentialwarfare of its own. This type of warfare is primarily

    directed to paralyze or manipulate the adversarys computer systems.

    (46)Explain the role of E-commerce in the present business

    scenario.

    E-Commerce is the use of the Internet to buy and sell goods and

    services. E-Commerce is changing the way in whichorganizations do business, resulting in streamlined purchasing

    processes and lowering the cost of transactingbusiness for both large and small companies.

    It also corporate communication, interface design are also found on

    internet.

    E-business has been added as the latest domain in business and has

    become highly competitive technology

    driven open market.

    The most important features of E-commerce is that help businessmove on the international scene at

    minimal cost but with maximum efficiency.

    E-commerce gives us business opportunity to open its portal to the

    global market and become a part of the

    global business community.

    E-commerce includes: Supply chain management, customer service

    customer relationship and Inventory andservice management integration. The internet to conduct business,

    manages industrial activities, engage inpersonal communication and perform scientific research. It also

    corporate communication, interface design

    are also found on internet.

    (47)Explain how proposed amendments to the IT Act 2000

    overcomes the drawbacks in the present Act.

    The Indian Evidence act states the actions for the recording support bythe courts. Evidence plays a key part in the

    trail of a case; it gives an opportunity to the contesting parties to the

    suit to confirm their respective claims. The verification guide by the parties maybe either verbal evidence or documentary evidence or both. Amendment to

    Solved By:- Nishant & Amlesh

    Page 16 of 20the Indian Evidence Act, 1872 make easy the recording of evidence

    keeping in view the new laws underIT Act 2000.

    It recognizes electronic records as documentary evidence as per 3rd

    section of the Indian Evidence Act. The amendedIT Act also recognizes terms like Electronic Records, Certifying

    Authority, Digital Signature, Digital SignatureAuthority, Electronic Form, Electronic Records, Information, Secure

    Electronic Record, Secure Digital Signature and

    Subscriber as valid terms for the purposes of the Act.

    The modified sections are:

    Section 17: Substitution of words oral or documentary or containedin electronic form

    Section 22A: Oral admissions as to the contents of electronic recordsare not relevant

    Section 34: Entries in the book of Section 35Records

    Section 39: What evidence to be given when statement forms part of aconversation, document, electronic

    record, book or series of letters or papers

    Section 59: Content of documents would mean to include contents ofelectronic records.

    Section 65A: Special provisions as to evidence relating to new

    Section 65B:New sectionAdmissibility of electronic records

    Section 67A:New sectionProof as to digital signature

    Section 73A: New section Proof as to verification of digitalsignature

    (48)What are the responsibilities of professionals?

    The professional codes address issues from the view point ofcomputing professional however it has three level of

    professional code ethics needs to address are:

    1) First level identified is a set of ethical values, such as integrity andjustice professionals share with other human

    being by virtue of their shared humanity.2) Second level is that more challenging duty than those required at

    the first level. Every type of professional shares

    this second level of ethical duty. Code statements at this level expressthe responsibility of all professionals and

    professional attitudes.

    3) Third level, it includes requirement that derive directly fromelements to particular professional perform. Code

    elements at this level declare more specific responsibilities that are

    more closely related to the state of art withinthe particular profession.

    (49)What are the ten commandments for computer ethics?There are Ten Commandments for computer ethics; they are listed

    below:

    1. You shall not use a computer to harm other people.

    2. You shall not interfere with other peoples computer work.

    3. You shall not snoop around in other peoples files.

    4. You shall not use a computer to steal.

    5. You shall not use a computer to bear false witness.

  • 7/28/2019 64 Xerox 4

    7/8

    6. You shall not use of copy software for which you have not paid.

    Solved By:- Nishant & Amlesh

    Page 17 of 207. You shall not use other peoples computer resources without

    authorization.

    8. You shall not appropriate other peoples inte llectual output.9. You shall think about the social consequences of the program you

    write.

    10. You shall use a computer in ways to show consideration andrespect.

    (50)Explain the essentials of privacy preferences project (p3p)

    platform.The Platform for Privacy Preferences Project (P3P) developed by the

    World Wide Web Consortium (W3C). Its aim toproviding a simple, automated way for users to gain more control over

    the use of personal information on web sites

    they browse. P3P is a standardized set of multiple choice questions,covering all the major aspects of a web sites

    privacy policies. P3P enabled browsers can read this snapshot

    automatically and compare it to the consumers ownset of privacy preferences. P3P is the most promising solution to

    cyberspace privacy. P3P will help responsible online

    businesses empower users to choose the privacy relationship best forthem. P3P is nothing but software to

    negotiate privacy agreements between web sites and online visitors.

    P3P user machines readable description todescribe the collation and use of data. Browser can help the users to

    understand those privacy practices with smart

    interface. Mostly browser can develop a predictable behavior when

    blocking content like cookies and E-commercesites to behave in privacy as an effected way.

    (51)What are the evidentiary presumptions of a secured electronic

    document?

    The science of Cryptography deals with the encryption of data

    means the process of making informationmeaningless to the unauthorized reader. Encryption translates the data

    into a secret code. Decryptionthe process

    of making the information readable once again completes thecryptography process. The sending of documents in

    an encrypted form is the basis of the digital signature system.

    There are two types of Cryptographic systems symmetric andasymmetric. The Symmetric Crypto system also

    known as single key system being a simpler system consists of both

    the sender and the receiver having access andsharing a common Key to encrypt or decrypt a message. The

    drawback of this system is the security of the Keyitself and the breakdown of an intermediary to verify the creation of

    an electronic document. The Asymmetric

    Crypto system also known as Public key system is a more secure

    system and overcomes the drawbacks of the singlekey system. This system uses two keys means a key pair generated by

    the asymmetric Crypto system. The originator

    of the documents who creates the key pair keeps one key which isknown as the Private Key and the other key is

    sent to the person who is a recipient of a secured message from the

    originator. When the recipient uses the public

    key to decrypt the sent message he is said to have affixed his digital

    signature. Thus the combination of Public Key

    and Private Key provide both confidentiality and authentication whichare key enablers for secure electronic

    transmission. The intermediary plays an important role of identifying

    the originator of the document and to check ifthe Public Key matches with the Private Key. The intermediary would

    also have to certify that the recipient of the

    public key is the person authorized to use the Public Key. Theintermediary tends to assign the public key to a

    particular entity and thus becomes a Certifying Authority.

    Q Write the notes on given topics: -EDUCOM:- : A guide to the ethical and legal use of software for

    members of the academic community, it is acatalog produced as a service to the academic community by the

    Educational Uses of Information Technology

    Program (EUIT) of EDUCOM, and the Information TechnologyAssociation of America (ITAA). EDUCOM is a non-profit

    Solved By:- Nishant & Amlesh

    Page 18 of 20group of colleges and universities committed to the use and

    management of information technology in highereducation. ITAA is an industry association for companies which

    create and market products and services associated

    with computers, communications and data.

    Information Technology Act 2000 :- The Information Technology

    Act, 2000 (I.T. Act, 2000) contains provisions on

    how a contract can be formed electronically. The Act acts in

    conjunction with the Indian contract Act, 1872. To

    provide legal recognition for transactions carried out by means of

    electronic data interchange and other means of

    electronic communication, commonly referred to as electroniccommerce, which involve the use of alternatives to

    paper based methods of communication and storage of information, to

    facilitate electronic filling of documents withthe Government agencies and further to amend the Indian Penal Code,

    the Indian Evidence Act, 1872, the Bankers

    Book Evidence Act, 1891 and the Reserve Bank of India Act, 1934and for matters connected therewith or incidental

    thereto.

    Cyber regulations appellate tribunal. :- : Cyber RegulationsAppellate Tribunal shall be an appellate body where

    appeals against the orders passed by the adjudicating officers shall bepreferred. The said Tribunal shall not be

    bound by the principles of the code of civil procedure but shall follow

    the principles of natural justice and shall havethe same powers as those are vested in a civil court. Against an order

    or decision of the cyber appellate Tribunal, an

    appeal shall lie to the high court.Electronic governance : - The Information Technology Act, 2000,

    deals in his 3rd Chapter propos Electronic

    governance.Electronic Governance provides information or any other matter

    which is in writing or in the typewritten or printed

    form.Such requirement shall be deemed to have been satisfied if such

    information or matter is:

    Rendered or made available in an electronic form;

    Accessible so as to be usable for a subsequent reference.

    In the field of electronic governance we survey with following:1. Legal recognition of electronic records

    2. Legal recognition of digital signatures3. Use of electronic records and digital signatures in Government and

    its agencies.

    4. Retention of electronic records5. Publication of rule, regulation in Electronic Gazette

    6. Power to make rules by Central Government in respect of digital

    signatureIntellectual property :- Intellectual property is the physical property

    created by individuals or corporations, which

    is protected under trade secret, patent and copyright laws. Theintellectual property rights connected with software

    ownership. Ownership is a complex issue; there are three differenttypes of ownership: Copyrights, trade secrets

    and patents.

    A trade secret is intellectual work, such as a business plan that is acompany secret and is not public

    information.

    A patent is a document that grants the holder exclusive rights on an

    invention for a fixed period of time.

    Copyright is a statutory grant that provides the creators of intellectual

    property with ownership of it also

    for a fixed period of time which generally extends till the life of thecreator of the work plus sixty years.

    Owners are entitled to collect fees from anyone who wants to copy the

    property.Computer software is granted copyright protection as well as patent

    protection. Patent laws differ from country to

    country. India is determined by the Patents Act, 1970.Solved By:- Nishant & Amlesh

    Page 19 of 20P3P :- - The Platform for Privacy Preferences Project (P3P)

    developed by the World Wide Web Consortium (W3C).

    Its aim to providing a simple, automated way for users to gain morecontrol over the use of personal information on

    web sites they browse. P3P is a standardized set of multiple choice

    questions, covering all the major aspects of aweb sites privacy policies. P3P enabled browsers can read this

    snapshot automatically and compare it to the

    consumers own set of privacy preferences. P3P is the mostpromisingsolution to cyberspace privacy. P3P will help

    responsible online businesses empower users to choose the privacyrelationship best for them. P3P is nothing but

    software to negotiate privacy agreements between web sites and

    online visitors. P3P user machines readable

    description to describe the collation and use of data. Browser can help

    the users to understand those privacy

    practices with smart interface. Mostly browser can develop a

    predictable behavior when blocking content like

  • 7/28/2019 64 Xerox 4

    8/8