Ethical & Social Issues

Social and ethical issues

Very short answer questions of Ethical & Social Issues In ICT :

1. What is meant by digital citizen?

2. What is digital footprint?

3. What is IT policy?

4. What is the main vision of IT policy of Nepal?

5. What is the mission of IT policy of Nepal?

6. What do you mean by electronic transaction?

7. When was the electronic transaction act introduced in Nepal?

8. What is social Media?

9. What is meant by Malicious Apps?

10. What is malware?

11. What is hacking?

12. What is cyber bullying?

13. Define cyber ethics?

Short Answer questions:

1. What is digital footprint? Explain its type.

2. Write any four objectives of IT policy of Nepal?

  • To empower and facilitate Nepal’s participation in the global knowledge society.
  • To create an innovative, market responsive, highly competitive and well regulated ICT industry.
  • To promote the use of free and open source software as well as software development for government agencies.
  • To conserve natural resources and safeguard Nepal’s heritage using ICT tools.

3. List any four strategies of IT policy?

  • Human Resource Development.
  • ICT Education, Research, & Development.
  • Access, Media and Content.
  • ICT in Agriculture, Health, Tourism.

4. How is National Information and Communication Technology Policy 2072 implemented in Nepal?

5. Write any four objective of electronic transaction act 2063.

  • To make legal provision for authentication and regulation of electronic data.
  • To make a reliable data generation, communication and transmission.
  • To make a secured and authentic means of electronic communication.
  • To regulate all the relating matters of electronic transactions.

6. Write any four opportunities of social media?

  • It helps us to share anything around us.
  • It helps us to do business and marketing.
  • It helps for learning and personal development.
  • It helps to show our creativity and self expression.

7. Explain any two threats in social media?

  • Personal data and privacy can be easily hacked and shared on the internet.
  • It will decrease the creativity and efficiency of the people.
  • It spreads false or unreliable information.
  • Many health issues can occur.

8. What are the methods an attackers uses to launch, after data collection? Explain any two.

  • phishing: Attackers can collect social media information and the send emails to trick users so that they can collect sensitive data and instructing the recipient to send money.
  • Spread Malware: Attackers create website which seems to be legal so that user download it and put their account information .

9. When was the Electronic Transaction Act- 2063 (ETA-2063) had been approved by the government of Nepal?

10. Write any four commandments of computer ethics.

  • Do not use computer to harm other people.
  • Do not use a computer to publish fake information.
  • Do not destroy or delete the records of other people.
  • Do not use computer to steal someone’s privacy.

11. Write about dos and don’ts of cyber ethics.

Facebook Comments Box

Read This

Scroll to Top