Tuesday, March 15, 2011

cs192 module 11-13 !!!

Question: What is computer crime?
Answer: Computer crimes are any acts against computer ethics. Specifically, computer crimes are harmful acts committed from or against a computer or network and it differs from most terrestrial crimes in four ways: they are easy to learn how to commit; they require few resources relative to the potential damage caused; they can be committed in a jurisdiction without being physically present in it; and they are often not clearly illegal because the laws of most countries do not clearly prohibit computer or cyber crimes.

Question: Give an example of a computer crime not stated in the Computer Ethics blog (http://cs192computerethics.blogspot.com/)        
Answer: "Love-Bug" virus
                                  
It is estimated that the so-called "Love-Bug" email virus has caused some $10 billion in losses in as many as 20 countries.
The virus was originally distributed in an email with the subject line "I love you". The message contains the text "kindly check the attached LOVELETTER from me" and an attached file called LOVE-LETTER-FOR-YOU.TXT.VBS. If this attachment is opened it will replicate itself and be transferred to all addresses within a user's email address book. The virus also deletes graphic files ending with the letters jpg or jpeg, and alters music files ending in mp3 to make them inaccessible.
The victim's Internet browser is directed by the virus to visit four web sites in the Philippines, where another malicious program called WIN-BUGSFIX.EXE is downloaded. This program searches the victim's hard drive for password files and sends them to an Internet account in the Philippines, managed by Access Net Inc., an Internet service provider.
The search for the author of the virus, which shut down the email service of the British parliament and attacked the computers of the Pentagon and CIA in the US, focused on the Philippines, after security experts scrutinised the code of the virus.
Initial reports that the author had used the name "spider" proved to be misleading. The references to "spider" in the software code were, in fact, references to the author of the password collection software used in the file "WIN-BUGSFIX.EXE", which infected computers were directed to download. Stolen passwords were emailed to accounts at Access Net in the Philippines with the message, "Barok... e.mail.passwords.sender.Trojan-by spyder."

Question:Visit this site. http://www.crime-research.org/news/09.07.2008/3443/. This is the site that features the first Hacking crime being filed in the Philippines.What is stated in section 33a of Republic Act 8792?
Answer: Section 33a of Republic Act 8792 states that
              "Hacking or crackling with refers to unauthorized access into or interference in a computer system/server or information and communication system; or any access in order to corrupt, alter, steal, or destroy using a computer or other similar information and communication devices, without the knowledge and consent of the owner of the computer or information and communications system, including the introduction of computer viruses and the like, resulting in the corruption, destruction, alteration, theft or loss of electronic data messages or electronic documents shall be punished by a minimum fine of One Hundred Thousand pesos (P 100,000.00) and a maximum commensurate to the damage incurred and a mandatory imprisonment of six (6) months to three (3) years;"

Question: In Visayas State University, there is an office that deals with protecting the Intellectual Property Rights (IPR) of those who publish their intellectual output works. What is this office that caters with IPR concerns? Who is the head of this office?
Answer: In Visayas State University, the office that caters with IPR concerns is the Office of the Director of Research and Extension(ODREx)  headed by Dr. Othello B. Capuno.

                                 




                                                   
 


Saturday, January 8, 2011

Module1 and Module 2 Asessment!!!

Q:If you are to become a part of the VSU team who will formulate a handbook like that of Virginia University, give at least 2 policies that you want to be implemented in VSU or even just for CS students like you, regarding computing. Also include sanction or sort of punishment to those who will violate the said policy.
Ans. Given the chance, the two policies that I want to be implemented here in VSU are:
        a. E-Learning or MOODLE (like what we have in DCST) will be implemented in every department and each student will have their own moodle account so that they can access everything about their course and their respective subjects. And it is students duty to get an update of school and course related activities as well as subject's exercises found in moodle. Failure to make an update without a valid reason will have its own consequences-meaning no update-miss the exercises and activities.
        b.Students will be given 1hour per day or five hours per week a free internet so that they can update their moodle account as well as make their school works. Using the free internet for personal gain/interest or use it for activities outside school scope will be sanctioned no free internet for the whole semester.

Q:According to the definition of ethics, it can be connected to the norms or custom of the society. What could be ethical to one, could be unethical to another. If this is the case, in which ethics seem to be subjective in nature, why is there a need to study computer ethics at all? Support your opinion with facts.
Ans.In this world, some specially those who can't afford a meal three times a day would really find a way to excel their living even in unlawful way. Human as we are, it is ethical because it isn't wrong  to make a living for your family's sake but we have to take it in mind that there are many ways to improve your way of life where in you can't harm other people or even put yourself in danger and most of all you have abide the law. So, it is very important to study ethics so that we will be reminded of what is morally right or wrong and be a responsible individual.

Q:There are 4 types of non-jural law. Divine, natural, moral and physical. If you are to practice just one type of the non-jural law for the entire existence of your life, what would it be and why? 
Ans.If I were to practise just one type of the non-jural law, I guess it would be moral law because sometimes, we can do things which is not in accordance with the moral law but what's good in it is that the next day or some day we would wake up and realize that what we did is wrong and that we can change it for the best. And for me, that is what moral law constitute.

Sunday, December 19, 2010

Talking about future!!!

Q: What would you like to be five years from now?
Ans: Five years from now, I would like to be the manager of my own company, be successful so I can help my family and friends. Most of all, I wish God will still be with me so I will be in the right path.

Q:If you will be a full-pledge computer programmer five years from now what program would you like to do and why?
Ans: In five years from now, if i will be a full-pledge computer programmer I would like to make a robot that would imitate the functionality of the human eyes and brain. It may be ridiculous on others part but this is what I loved to do because this future robot of mine would help humans in so many ways such as: alarming during burglar attack and any other chores that eyes and brain can do.

Q:If you were a machine what would you be and why?

Ans: If  I were a machine, I would be a computer because nowadays, computer is the backbone of information technology.With this machine, one would be able to gather information through world wide web and one can do life's stuffs like online gaming, video streaming, blogging and many more.

Sunday, December 12, 2010