Skip to main content

Popular

Create a Free .com.np Website In Nepal 2021

Create A Free .com.np Website In Nepal If you are looking for a free, easy and step-by-step guide on how to start a lifetime free .com.np blog then, you have come to the right place. I will try my best to guide you through this procedure. This article has been enormously helpful for viewers. Take a look! Everybody wishes to have their own website especially students(ICT), online researchers, gamers, etc but what comes in between us and our own website(blog) is the expensive price of the domain name and web hosting service. So today, I am here to teach you, how to create a website for free with .com.np domain and host it using free web hosting services . There are a number of online companies providing free websites (domain name with web hosting) like WordPress, Blogger, Wix, etc but with something fishy going on. Owning your own domain name looks far more professional than having your site on someone else’s domain (like www.yourdomain.freewebsite.com), and it’s super

Cyber Law and Computer Ethics

Cyber Law

In order to maintain harmony and co-existence of people in cyberspace, there is a need for a legal regime called as Cyber Law. Cyber Law is a term used to describe the legal issues related to the information technology, particularly Cyberspace. The growth of Cyberspace has resulted in the development of a new and highly specialized branch of law called cyber laws. Cyber Laws are the basic laws of a society and hence have implications on every aspect of the Cyber Society such as Governance, Business, Crimes, Entertainment, Information Delivery, Education etc. 

The Cyber Law includes rules and regulations established to govern, prevent and resolve disputes that arise from the use of computers and the Internet. Cyber Law includes an ample variety of political and legal issues related to the Internet and other communication technology, intellectual property, privacy, freedom of expression and public access to information. Proper cyber law must govern all the cyber activities.

Following are the areas covered by cyber law.
▪ Digital Signature Law:
A digital signature is the security mechanism system in the cyber space. It is a digital identity of the sender that uniquely identifies particular sender electronically. Digital signature is used in the Internet for the secure transaction. Digital signature using two different keys for authentication; one for creating a digital signature or transforming data into a seemingly unintelligible form (private key) and another key is used for verifying a digital signature or returning a message to its original form (public key).

▪ Copyright Law:
The copyright act prevents the unauthorized copy off of work of authorship. However only the copying of work is prohibited but anyone can copy the ideas contained within the work. For example: a copyright could cover the written description of the machine but actual machine itself is not covered. Thus no one could copy the written description, while anyone could use the description to build a described machine.

Copyright can be registered in copyright office but newly created work does not need to be registered. However, the copyright act does provide additional benefits to those who registered with the copyright office. But the copyright registration and the use of copyright notice is recommended.

▪ Trademark Law:
Trademark law governs the use of a device (including word, phrase, symbol, product shape and logo) by a manufacturer to identify its goods and to distinguish those goods from those made or sold by another. Service marks, which are used on services rather than goods, are also governed by trademark law. However to obtain the greatest protection to a mark, it is almost always advisable to register the mark. A mark which is registered in the registration office should use the symbol (®). Unregistered trademark should be marked with a (™).

▪ Telecommunication Law:
Development in telecommunication has been rapid since some years. Almost all people are using the facility provided in telecommunication tools to share message from one location to other, to transfer the database from one location to another in the form of electronic data. We can transmit voice calls concerning the important issues and many more. In such transmission of voice or messages over the telecommunication system, many leakages might be done by the criminals on the data. Therefore, the telecommunication system also falls within the territory of the cyber space and forms a part of the cyber law.

▪ Data Protection and Privacy Law:
People are using computers to store the valuable data and data for the purpose of transmission from one location to other location. Data protection is the process of securing data from various disasters. Data plate AC is the second year in data without sharing with anybody else. Data protection and privacy law prevents the data from unauthorized access and punishes the criminals who steal the private data.


Computer Ethics 

Computer ethics can be defined as the set of moral principles that regulate the use of computers.
Or, 
Computer ethics is a system of moral standards or values used as a guideline for computer users.

Each society forms a set of rules that establishes the boundaries of generally accepted behavior. Those rules are often expressed in statements about how people should be behave and they fit together to form the moral code by which a society lives. Ethics is the set of beliefs about right and wrong behavior. Ethical behavior conforms Who generally excepted social norms, many of which are almost universal. Virtues are habits that incline people to do what is acceptable and vices are habits of unacceptable behavior. People’s virtues and vices held define their value system the complex scheme of moral values by which they live.

Some common issues of computer ethics include intellectual property rights (such as copyrighted electronic content), privacy concerns and how computers affect society. For example, while it is easy to duplicate copyrighted electronic (digital) content, computer ethics would suggest that it is wrong to do without the author’s approval. And while it may be possible to access someone’s personal information on a computer system, computer ethics would advise that such an action is unethical.

The Commandments of Computer Ethics

Some commandments of computer ethics are as follows:
1. You shall not use a computer to harm other people.
2. You shall not interfere with other people’s work.
3. You shall not snoop around in other people’s computer files.
4. You shall not use a computer to steal privacy of other peoples.
5. You shall not use a computer to bear false witness.
6. You shall not copy or use proprietary software for which you have not paid.
7. You shall not use other people’s computer resources without authorization or proper compensation.
8. You shall not appropriate other people’s intellectual output.
9. You shall think about the social consequences of the program you are writing or the system you are designing.
10. You shall always use a computer in ways that ensure consideration and respect for your fellow humans.



Comments

Popular posts from this blog

Impact of the Internet in Today's World

Impact of the Internet in Today's World The Internet is the largest computer network that connects millions of computers and several networks around the world. The billions of people throughout the world are using the Internet at the same time. It is the most widely used technology in today's world. Nowadays, it is hard to imagine anyone not having heard of the term Internet. The role of Internet in out daily life is becoming very important. The Internet has great effects on society especially the way people communicate and interact with each other and the way certain tasks are being done. It has changed the way we communicate, way we get information, way we buy goods , way we do business and so on. It has also affected the living standard of people. The Internet has changed the way people communicate and interact with one another, obtain information and certain tasks. With the Internet, a person can send messages using the email technology and messengers . Bef

Create a Free .com.np Website In Nepal 2021

Create A Free .com.np Website In Nepal If you are looking for a free, easy and step-by-step guide on how to start a lifetime free .com.np blog then, you have come to the right place. I will try my best to guide you through this procedure. This article has been enormously helpful for viewers. Take a look! Everybody wishes to have their own website especially students(ICT), online researchers, gamers, etc but what comes in between us and our own website(blog) is the expensive price of the domain name and web hosting service. So today, I am here to teach you, how to create a website for free with .com.np domain and host it using free web hosting services . There are a number of online companies providing free websites (domain name with web hosting) like WordPress, Blogger, Wix, etc but with something fishy going on. Owning your own domain name looks far more professional than having your site on someone else’s domain (like www.yourdomain.freewebsite.com), and it’s super

Things To Know About The Share Market Of Nepal

Things To Know About The Share Market Of Nepal NEPAL STOCK EXCHANGE LIMITED  ( NEPSE ) The Nepal Stock Exchange Limited is the only Stock Exchange of Nepal. It is located in Singha Durbar Plaza, Kathmandu, Nepal. As of November 4, 2020, the equity market capitalization of the companies listed on NEPSE was approximately US$230.35 billion. STOCK MARKET A  stock market ,  equity market,  or  share market  is the aggregation of buyers and sellers of stocks (also called shares), which represent ownership claims on businesses; these may include  securities  listed on a public stock exchange, as well as stock that is only traded privately, such as shares of private companies which are sold to investors through equity crowdfunding platforms. Investment in the stock market is most often done via stock brokerages and electronic trading platforms. Investment is usually made with an investment strategy in mind. Stocks can be categorized by the country where the company is domiciled. STOCK EXCHANGE