ETHICAL ISSUES:-
Intellectual property rightsare the rights of the owner of information to decide how much information is to be exchanged, shared or distributed. Also it gives the
owner a right to decide the price for doing (exchanging/sharing/distributing) so.
Plagiarismis stealing someone else’s intellectual work and representing is as your own work without citing the source of information.
Digital Property Rightsor digital assets refers to any information about you or created by you that exists inn digital form, either online or on an electronic storage
device.
VIOLATION OF IPR:-
IPR InfringementThe violation of IPR (Intellectual Property Rights) is called infringement or IPR infringement.
Plagiarism
Copyright InfringementA copyright infringement refers to using copyrighted work without the consent or permission of the copyright holder.
Trademark Infringementis the unauthorised usage of mark that is identical or deceptively similar to a registered trademark.
INTELECTUAL PROPERTY RIGHT:-
CopyrightA copyright is a legal term to describe the rights of the creator of an original creative work such as a literary work, an artistic work, a design, song, movie or
software etc.
PatentA patent refers to a collection of exclusive rights given to the inventor for their invention(s).
Trademarkare soe registered words, slogans, logos, shapes, colours and sounds etc used to distinguish the goods or services of one trader form another.
FLOSS:-FREE LIBRE AND OPEN SOURCE SOFTWARE
Free Softwaremeans the software is freely accessible and can be freely used, changed, improved, copied and distributed by all who wish to do so. And no payments
are needed to be made for free software.
Open Source SoftwareOpen source software refers to computer software whose source code is freely available for anyone to view, use, modify, and distribute. This
allows for collaborative development by a community of users, leading to greater innovation and flexibility, and often resulting in high-quality and cost-effective
solutions.
CC licenses (Creative Common Licenses)gives permissions to copy, modify, distribute the original works by attributing the creator of the work.
Apache License It grants a number of rights to users. These right can be applied to both copyrights and patents.
GNU Genral Public License(GPL)It is of commonly used licenses for open-source projects. It grants and guarantees a wide range of rights to developers who work on
open source projects.
Public-domain softwareis free and can be used without restrictions. It is often used incorrectly to include freeware, free software that is nevertheless copyrighted.
Proprietary Softwareis neither free nor available for pubic. There is a proper license attached to it. User has to buy the license in order to use it.
Society, Law and Ethics
PishingIs the practice of attempting to acquire sensitive information from individuals over the internet, by means of deception.
Malwareis a genral term used to refer to visruses, worms, spyware, adware etc. In other words, it is unwanted software that someone else wants to run on your computer.
Malware infects your computer, making it behave in a way, which you do not approvre of.
Viruses A computer virus is a kind of malicious computer program, which when executed, replicates itself and inserts its own code. When the replication is done, this code infects
the other files and program present on your system. These computer viruses are present in various types and each of them can infect a device in a different manner.
Spyware is any software that installs itself on your computer and starts covertly monitoring your online behavior without your knowledge or permission. Spyware is a kind of
malware that secretly gathers information about a person or organization and relays this data to other parties.
The Trojan is a type of malware program or code that presents itself as a useful legitimate program so that users would get fascinated by it and install it. It usually tricks users by
using social engineering techniques.
A computer worm is a piece of self-replicating software that can spread and copy itself without relying on host software or human intervention.
Adware is an "advertising-supported software" that displays ads on websites and collects data on a user's behavior for marketing purposes. Adware generates revenue for a
company through display and pay-per-click advertising. Not all adware is malware.
Spamming is the use of electronic messaging systems like e-mails and other digital delivery systems and broadcast media to send unwanted bulk messages indiscriminately.
A denial-of-service (DoS) attack is a type of cyber attack in which a malicious actor aims to render a computer or other device unavailable to its intended users by interrupting the
device's normal functioning.
EavesdroppingUnauthorised monitoring of other people’s communications is called Eavesdropping.
Pharming Pharming refers to redirecting website traffic through hacking, whereby the hacker implements tools that redirect a search to a fake website. Pharming may cause users
to find themselves on an illegitimate website without realizing they have been redirected to an impostor site, which may look exactly like the real site.
Cookiesare small files created on client computers when these systems browse certain web sites. These cookies can contain information about the user.
Digital Certificatesspecially foratted digital information issued to website, are used to verify the identity of the massage sender.
Digital Signaturesare a way of authenticating the identity of creators or producers of digital information.
Keyword FilteringThis method filters out email messages that contain certain keywords or phrases, which are defined by you or others.
AuthorizationAsking the user a legal login-id performs authorization. If the user is able to provide a legal login-id, he/she is considered an authorized user.
Authenticationis also termed as password-protection as the authorized user is asked to provide a valid password, and if he/she is able to do this, he/she is considered to be an
authentic user.
FirewallA system designed to prevent unauthorized access to or from a private network is called firewall.
Online Acess And Computer Security
Cyber Safetyrefers to the safe and responsible use of internet to ensure safety and security of personal information and not posing threat to anyone else’s information.
Identity Theftis a type of fraud that involves using someone else’s identity to steal money or gain other benefits. Online identity theft refers to an act of stealing someone’s
personal information such as name, login details etc. and then posing as that person online.
IP Address IP address is your digital identity. It’s a network address for your computer so the Internet knows where to send you emails, data, etc. IP address determines who and
where you are in the network of billions of digital devices that are connected to the Internet
Super Cookies A super cookie is a type of browser cookie that is designed to be permanently stored on a user’s computer. Super cookies are generally more difficult for users to
detect and remove from their devices because they cannot be deleted in the same fashion as regular cookies.
User Agent A user agent is any software that retrieves and presents Web content for end users or is implemented using Web technologies.
Private BrowsingA type of browsing wherein browser opens in incognito mode or through proxy or VPN, and does not store cookies about your online activity, is called Private
Browsing.
Anonymous Browsingallows user to view websites without revealing any personal information of the user like their IP address, machine type, location etc.
CybercrimeAny criminal offence that is facilitated by, or involves the use of, electronic communications or information systems, including any electronic device, computer, or the
internet is reffered to as cybercrime.
CybertrollsDerogatory messages or comments posted online targeting people are called cyber trolls.
Cyber BullyingHarassing, demeaning, embarrassing or intimidating someone using modern technologies like internet, cell phones, instant messengers, social networks etc., is
called cyber bullying.
ScamAny fraudulent business practice that extracts money from an unsuspecting, ignorant person is called scam.
Ransomwareis a form of malware and cyber attack that essentially holds a computer system captive while demanding a ransom.
Digital or Computer Forensicsrefers to methods used for interpretation of computer media for digital evidence.
Digital Footprintsare the records and traces of iindividuals activities as they use the internet. Digital footprints are permanently stored.
Cyber Law Cyber law is the part of the overall legal system that deals with the Internet, cyberspace, and their respective legal issues. Cyber law covers a fairly broad area,
encompassing several subtopics including freedom of expression, access to and usage of the Internet, and online privacy.
Cyber Safety
Dictionariesare mutable, unordered collections with elements in the form of a key:value pairs that associate keys to values. They are called associative arrays or mappings or
hashes.
LookupA dictionary operation that takes a keys and finds the corresponding value, is called lookup.
A Shallow copyof a dictionary refers to a copy of the dictionary whereby only a copy of references (the keys) is created and the content (values of the dictionary) is not copied.
To delete an element, you can either use del statement or use pop() or popitem() method.
The clear() function removes all the items from dictionary but the dictionary objects exists as an empty dictionary.
Tuples are immutable sequences of python i.e., you cannot change elements of a tuple in place. They are formed by placing a comma-seprated tuple of expression in parentheses.
Immutable Tuplecan store mutable elements and its mutable elements individual elements can be changed. The immutable objects elements are always the same python object,
but aren’t always the same abstract value.
Packing & UnpackingForming a tuple from individual values is called packing and creating individual values from a tuple’s elements is called unpacking.
Nested TupleA tuple containing another tuple in it as a member is called a nested tuple.
Common Tuple Manipulation function arelen(), max(), min(), sum(), index(), count(), sorted(), and tuple().
Dictionary & Tuple
Binary DecisionThe decision which results into either YES (TRUE) or NO (FALSE) is called a binary decision.
Truth TableA truth table is a table which represents all the possible values of logical variables/statements along with all the possible results of the given
combinations of values.
TautologyIf the result of any logical statement or expression is always TRUE or 1 for all input combinations, it is called tautology.
FallacyIf the result of any logical statement or expression is always FALSE or 0 for all input combinations, it is called Fallacy.
A Gateis a basic electronic circuit which operates on one or more signals to produce an output signal.
An Inverter (NOT Gate)is a gate with only one input signal and one output signal; the output state is always the opposite of the input state.
OR GateThe OR Gate has two or more input signals but only one output signal. If any of the input signal is 1 (high), the output signal is 1 (high).
AND Gatecan have two or more than two input signals and produce one output signal. When all the inputs are 1 i.e., high then the output is 1 otherwise
output is 0 only.
NOR Gatehas two or more input signals but only one output signal. If all the inputs are 0 (i.e., low), then the output signal is 1 (high).
NAND Gatehas two or more input signals but only one output signal. If all of the inputs are 1 (high), then the output produced is 0 (low).
XOR Gate produces output 1 for only those input combinations that have odd number of 1’s.
XNOR Gateproduces output 1 for only those input combinations that have even number of 1’s.
DeMorgan’s theorems are:- 1st X+Y=XY . . . . . . . . . . 2ndX.Y=X+Y
Logical Statement or Truth FunctionsThe statement which can be determined to be True or False are called logical statements or truth functions.
Logic Circuitis a circuit that carries out a set of logic actions based on an expression.
Boolean Logic
DecompositionThe process of breaking down a big or complex problem into a set of smaller sub-processes in order to understand a problem or situation
better, is known as decomposition.
FlowchartA flowchart is a pictorial representation of step by step solution of a problem.
Pseudocodeis an informal way of describing the steps of a program’s solution without using any strict programming language syntax or underlying
technology considerations.
Dry Runis the process of a programmer manually working through their code to trace the value of variables. There is no software involved in this process.
Identifiersare the names given to various components of a program by the programmer e.g., to variable that hold values, to functions, modules etc.
Start/Stop……, Input/Output……, Processing……. Decision Box……, Connector
Flow of control symbol……, Annotation
Introduction To Problem Solving
Token or Lexical Unit The smallest individual unit in a program is known as a token or a lexical unit.
Keywordis a word having special meaning reserved by programming language.
String Literalis a sequence of characters surrounded by quotes (single or double or triple quotes).
Operatorsare token that trigger some computation/action when applied to variables and other objects in an expression.
Punctuatorsare symbols that are used in programming languages to organize prograing-sentence structures, and indicate the rhythm and ephasis of
expressions, statements, and program structure.
Expressionis any legal combination of symbols that represents a value.
Statementis a programming instruction that does something i.e., some action takes place.
Commentsare the additional readable information to clarify the source code. Comments in python begin with symbol# and generally end with end of the
physical line.
Physical Lineis the one complete line that you see on a computer whereas a logical line is the one that python sees as one full statement.
DocstringsComments enclosed in triple quotes(“””) or triple apostrophe(‘’’) are called docstrings.
Functionis a code that has a name and it can be reused (executed again) by specifying its name in the program, where needed.
Block or Code-Block or SuiteA group of statements which are part of another statement or a function are called block or code-block or suite in python.
Variables Named labels, whose values can be used and processed during program run, are called variables.
Lvaluesare the objects to which you can assign a value or expression. Lvalues can come on lhs or rhs of an assignment statement.
Rvaluesare the literals and expressions that are assigned to lvalues. Rvalues can come on rhs of an assignment statement.
Name Error a variable is defined inly when you assign some value to it. Using an undefined variables in an expression/statement causes an error called Name
Error.
Dynamic Typinga variable pointing to a value of certain type, can be made to point to a value/object of different type. This is called Dynamic Typing.
Type ErrorWhen you try to perform an operation on a data type not suitable for it (e.g., dividing or multiplying a string), Python raises an error called
TypeError.
Python Fundamentals
IterableAn iterable is any python objects that can return its members, one at a time. Since, you can access elements of strings, lists, tuples and dictionary one
at a time, these are all iterables.
Mutable TypesThe mutable types are those whose values can be changed in place. Only three types are mutable in python. These are: lists, dictionaries and
sets.
Operators The symbols that trigger the operation/action on data, are called operators, and the data on which operation is being carried out, i.e., the objects
of the operation(s) are reffered to as operands.
Unary OperatorsThe operators that act on one operand are reffered to as Unary Operators.
Binary Operators Operators that act upon two operands are reffered to as Binary Operators.
Immutable Typesin python mean that their values cannot be changed in place.
Relational Operatorscompare the values of their operands. These are >, <, =, <=, >= and !=.
Bitwise Operatorsare like logical operators but they work on individual bits.
Atoms is something that has a value. Identifiers, literals, strings, lists, tuples, sets, dictionaries etc. all are atoms.
Expressionin python is any valid combination of operators and atoms. An expression is composed of one or more operations.
Type CastingThe explicit conversion of an operand to a specific type is called type casting.
Debuggingrefers to the process of locating the place of error, cause of error and correcting the code accordingly.
Syntaxrefers to formal rules governing the construction of valid statements in a language.
Semanticsrefers to the set of rules which gives the meaning of a statement.
Data Handling