0% found this document useful (0 votes)
18 views1 page

Cscscs

Uploaded by

Vivek Singh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
18 views1 page

Cscscs

Uploaded by

Vivek Singh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 1

ETHICAL ISSUES:-

Intellectual property rightsare the rights of the owner of information to decide how much information is to be exchanged, shared or distributed. Also it gives the
owner a right to decide the price for doing (exchanging/sharing/distributing) so.
Plagiarismis stealing someone else’s intellectual work and representing is as your own work without citing the source of information.
Digital Property Rightsor digital assets refers to any information about you or created by you that exists inn digital form, either online or on an electronic storage
device.
VIOLATION OF IPR:-
IPR InfringementThe violation of IPR (Intellectual Property Rights) is called infringement or IPR infringement.
Plagiarism
Copyright InfringementA copyright infringement refers to using copyrighted work without the consent or permission of the copyright holder.
Trademark Infringementis the unauthorised usage of mark that is identical or deceptively similar to a registered trademark.
INTELECTUAL PROPERTY RIGHT:-
CopyrightA copyright is a legal term to describe the rights of the creator of an original creative work such as a literary work, an artistic work, a design, song, movie or
software etc.
PatentA patent refers to a collection of exclusive rights given to the inventor for their invention(s).
Trademarkare soe registered words, slogans, logos, shapes, colours and sounds etc used to distinguish the goods or services of one trader form another.
FLOSS:-FREE LIBRE AND OPEN SOURCE SOFTWARE
Free Softwaremeans the software is freely accessible and can be freely used, changed, improved, copied and distributed by all who wish to do so. And no payments
are needed to be made for free software.
Open Source SoftwareOpen source software refers to computer software whose source code is freely available for anyone to view, use, modify, and distribute. This
allows for collaborative development by a community of users, leading to greater innovation and flexibility, and often resulting in high-quality and cost-effective
solutions.
CC licenses (Creative Common Licenses)gives permissions to copy, modify, distribute the original works by attributing the creator of the work.
Apache License It grants a number of rights to users. These right can be applied to both copyrights and patents.
GNU Genral Public License(GPL)It is of commonly used licenses for open-source projects. It grants and guarantees a wide range of rights to developers who work on
open source projects.
Public-domain softwareis free and can be used without restrictions. It is often used incorrectly to include freeware, free software that is nevertheless copyrighted.
Proprietary Softwareis neither free nor available for pubic. There is a proper license attached to it. User has to buy the license in order to use it.

Society, Law and Ethics


PishingIs the practice of attempting to acquire sensitive information from individuals over the internet, by means of deception.
Malwareis a genral term used to refer to visruses, worms, spyware, adware etc. In other words, it is unwanted software that someone else wants to run on your computer.
Malware infects your computer, making it behave in a way, which you do not approvre of.
Viruses A computer virus is a kind of malicious computer program, which when executed, replicates itself and inserts its own code. When the replication is done, this code infects
the other files and program present on your system. These computer viruses are present in various types and each of them can infect a device in a different manner.
Spyware is any software that installs itself on your computer and starts covertly monitoring your online behavior without your knowledge or permission. Spyware is a kind of
malware that secretly gathers information about a person or organization and relays this data to other parties.
The Trojan is a type of malware program or code that presents itself as a useful legitimate program so that users would get fascinated by it and install it. It usually tricks users by
using social engineering techniques.
A computer worm is a piece of self-replicating software that can spread and copy itself without relying on host software or human intervention.
Adware is an "advertising-supported software" that displays ads on websites and collects data on a user's behavior for marketing purposes. Adware generates revenue for a
company through display and pay-per-click advertising. Not all adware is malware.
Spamming is the use of electronic messaging systems like e-mails and other digital delivery systems and broadcast media to send unwanted bulk messages indiscriminately.
A denial-of-service (DoS) attack is a type of cyber attack in which a malicious actor aims to render a computer or other device unavailable to its intended users by interrupting the
device's normal functioning.
EavesdroppingUnauthorised monitoring of other people’s communications is called Eavesdropping.
Pharming Pharming refers to redirecting website traffic through hacking, whereby the hacker implements tools that redirect a search to a fake website. Pharming may cause users
to find themselves on an illegitimate website without realizing they have been redirected to an impostor site, which may look exactly like the real site.
Cookiesare small files created on client computers when these systems browse certain web sites. These cookies can contain information about the user.
Digital Certificatesspecially foratted digital information issued to website, are used to verify the identity of the massage sender.
Digital Signaturesare a way of authenticating the identity of creators or producers of digital information.
Keyword FilteringThis method filters out email messages that contain certain keywords or phrases, which are defined by you or others.
AuthorizationAsking the user a legal login-id performs authorization. If the user is able to provide a legal login-id, he/she is considered an authorized user.
Authenticationis also termed as password-protection as the authorized user is asked to provide a valid password, and if he/she is able to do this, he/she is considered to be an
authentic user.
FirewallA system designed to prevent unauthorized access to or from a private network is called firewall.

Online Acess And Computer Security


Cyber Safetyrefers to the safe and responsible use of internet to ensure safety and security of personal information and not posing threat to anyone else’s information.
Identity Theftis a type of fraud that involves using someone else’s identity to steal money or gain other benefits. Online identity theft refers to an act of stealing someone’s
personal information such as name, login details etc. and then posing as that person online.
IP Address IP address is your digital identity. It’s a network address for your computer so the Internet knows where to send you emails, data, etc. IP address determines who and
where you are in the network of billions of digital devices that are connected to the Internet
Super Cookies A super cookie is a type of browser cookie that is designed to be permanently stored on a user’s computer. Super cookies are generally more difficult for users to
detect and remove from their devices because they cannot be deleted in the same fashion as regular cookies.
User Agent A user agent is any software that retrieves and presents Web content for end users or is implemented using Web technologies.
Private BrowsingA type of browsing wherein browser opens in incognito mode or through proxy or VPN, and does not store cookies about your online activity, is called Private
Browsing.
Anonymous Browsingallows user to view websites without revealing any personal information of the user like their IP address, machine type, location etc.
CybercrimeAny criminal offence that is facilitated by, or involves the use of, electronic communications or information systems, including any electronic device, computer, or the
internet is reffered to as cybercrime.
CybertrollsDerogatory messages or comments posted online targeting people are called cyber trolls.
Cyber BullyingHarassing, demeaning, embarrassing or intimidating someone using modern technologies like internet, cell phones, instant messengers, social networks etc., is
called cyber bullying.
ScamAny fraudulent business practice that extracts money from an unsuspecting, ignorant person is called scam.
Ransomwareis a form of malware and cyber attack that essentially holds a computer system captive while demanding a ransom.
Digital or Computer Forensicsrefers to methods used for interpretation of computer media for digital evidence.
Digital Footprintsare the records and traces of iindividuals activities as they use the internet. Digital footprints are permanently stored.
Cyber Law Cyber law is the part of the overall legal system that deals with the Internet, cyberspace, and their respective legal issues. Cyber law covers a fairly broad area,
encompassing several subtopics including freedom of expression, access to and usage of the Internet, and online privacy.

Cyber Safety
Dictionariesare mutable, unordered collections with elements in the form of a key:value pairs that associate keys to values. They are called associative arrays or mappings or
hashes.
LookupA dictionary operation that takes a keys and finds the corresponding value, is called lookup.
A Shallow copyof a dictionary refers to a copy of the dictionary whereby only a copy of references (the keys) is created and the content (values of the dictionary) is not copied.
 To delete an element, you can either use del statement or use pop() or popitem() method.
 The clear() function removes all the items from dictionary but the dictionary objects exists as an empty dictionary.
Tuples are immutable sequences of python i.e., you cannot change elements of a tuple in place. They are formed by placing a comma-seprated tuple of expression in parentheses.
Immutable Tuplecan store mutable elements and its mutable elements individual elements can be changed. The immutable objects elements are always the same python object,
but aren’t always the same abstract value.
Packing & UnpackingForming a tuple from individual values is called packing and creating individual values from a tuple’s elements is called unpacking.
Nested TupleA tuple containing another tuple in it as a member is called a nested tuple.
Common Tuple Manipulation function arelen(), max(), min(), sum(), index(), count(), sorted(), and tuple().

Dictionary & Tuple


Binary DecisionThe decision which results into either YES (TRUE) or NO (FALSE) is called a binary decision.
Truth TableA truth table is a table which represents all the possible values of logical variables/statements along with all the possible results of the given
combinations of values.
TautologyIf the result of any logical statement or expression is always TRUE or 1 for all input combinations, it is called tautology.
FallacyIf the result of any logical statement or expression is always FALSE or 0 for all input combinations, it is called Fallacy.
A Gateis a basic electronic circuit which operates on one or more signals to produce an output signal.
An Inverter (NOT Gate)is a gate with only one input signal and one output signal; the output state is always the opposite of the input state.
OR GateThe OR Gate has two or more input signals but only one output signal. If any of the input signal is 1 (high), the output signal is 1 (high).
AND Gatecan have two or more than two input signals and produce one output signal. When all the inputs are 1 i.e., high then the output is 1 otherwise
output is 0 only.
NOR Gatehas two or more input signals but only one output signal. If all the inputs are 0 (i.e., low), then the output signal is 1 (high).
NAND Gatehas two or more input signals but only one output signal. If all of the inputs are 1 (high), then the output produced is 0 (low).
XOR Gate produces output 1 for only those input combinations that have odd number of 1’s.
XNOR Gateproduces output 1 for only those input combinations that have even number of 1’s.
DeMorgan’s theorems are:- 1st X+Y=XY . . . . . . . . . . 2ndX.Y=X+Y
Logical Statement or Truth FunctionsThe statement which can be determined to be True or False are called logical statements or truth functions.
Logic Circuitis a circuit that carries out a set of logic actions based on an expression.

Boolean Logic
DecompositionThe process of breaking down a big or complex problem into a set of smaller sub-processes in order to understand a problem or situation
better, is known as decomposition.
FlowchartA flowchart is a pictorial representation of step by step solution of a problem.
Pseudocodeis an informal way of describing the steps of a program’s solution without using any strict programming language syntax or underlying
technology considerations.
Dry Runis the process of a programmer manually working through their code to trace the value of variables. There is no software involved in this process.
Identifiersare the names given to various components of a program by the programmer e.g., to variable that hold values, to functions, modules etc.
Start/Stop……, Input/Output……, Processing……. Decision Box……, Connector

Flow of control symbol……, Annotation

Introduction To Problem Solving


Token or Lexical Unit The smallest individual unit in a program is known as a token or a lexical unit.
Keywordis a word having special meaning reserved by programming language.
String Literalis a sequence of characters surrounded by quotes (single or double or triple quotes).
Operatorsare token that trigger some computation/action when applied to variables and other objects in an expression.
Punctuatorsare symbols that are used in programming languages to organize prograing-sentence structures, and indicate the rhythm and ephasis of
expressions, statements, and program structure.
Expressionis any legal combination of symbols that represents a value.
Statementis a programming instruction that does something i.e., some action takes place.
Commentsare the additional readable information to clarify the source code. Comments in python begin with symbol# and generally end with end of the
physical line.
Physical Lineis the one complete line that you see on a computer whereas a logical line is the one that python sees as one full statement.
DocstringsComments enclosed in triple quotes(“””) or triple apostrophe(‘’’) are called docstrings.
Functionis a code that has a name and it can be reused (executed again) by specifying its name in the program, where needed.
Block or Code-Block or SuiteA group of statements which are part of another statement or a function are called block or code-block or suite in python.
Variables Named labels, whose values can be used and processed during program run, are called variables.
Lvaluesare the objects to which you can assign a value or expression. Lvalues can come on lhs or rhs of an assignment statement.
Rvaluesare the literals and expressions that are assigned to lvalues. Rvalues can come on rhs of an assignment statement.
Name Error a variable is defined inly when you assign some value to it. Using an undefined variables in an expression/statement causes an error called Name
Error.
Dynamic Typinga variable pointing to a value of certain type, can be made to point to a value/object of different type. This is called Dynamic Typing.
Type ErrorWhen you try to perform an operation on a data type not suitable for it (e.g., dividing or multiplying a string), Python raises an error called
TypeError.

Python Fundamentals
IterableAn iterable is any python objects that can return its members, one at a time. Since, you can access elements of strings, lists, tuples and dictionary one
at a time, these are all iterables.
Mutable TypesThe mutable types are those whose values can be changed in place. Only three types are mutable in python. These are: lists, dictionaries and
sets.
Operators The symbols that trigger the operation/action on data, are called operators, and the data on which operation is being carried out, i.e., the objects
of the operation(s) are reffered to as operands.
Unary OperatorsThe operators that act on one operand are reffered to as Unary Operators.
Binary Operators Operators that act upon two operands are reffered to as Binary Operators.
Immutable Typesin python mean that their values cannot be changed in place.
Relational Operatorscompare the values of their operands. These are >, <, =, <=, >= and !=.
Bitwise Operatorsare like logical operators but they work on individual bits.
Atoms is something that has a value. Identifiers, literals, strings, lists, tuples, sets, dictionaries etc. all are atoms.
Expressionin python is any valid combination of operators and atoms. An expression is composed of one or more operations.
Type CastingThe explicit conversion of an operand to a specific type is called type casting.
Debuggingrefers to the process of locating the place of error, cause of error and correcting the code accordingly.
Syntaxrefers to formal rules governing the construction of valid statements in a language.
Semanticsrefers to the set of rules which gives the meaning of a statement.

Data Handling

You might also like