Professional Documents
Culture Documents
Ans.- Computer Network - A computer network is a group of computer systems and other
computing hardware devices that are linked together through communication channels to
facilitate communication and resource-sharing among a wide range of users. Networks are
commonly categorized based on their characteristics.
1. The basic requirements for connecting to the Internet are a computer device, a
working Internet line and the right modem for that Internet line. In addition, software
programs such as Internet browsers, email clients, Usenet clients and other special
applications are needed in order to access the Internet. A computer device is any one of
the following: a PC, a Macintosh or Linux computer, a tablet PC and a smart-phone.
4. Lastly, software programs such as Internet browsers and email clients are optional;
however, they are essential for the majority of Internet applications.
Ans.- In computer security a threat is a possible danger that might exploit a vulnerability to
breach security and therefore cause possible harm. A threat can be either "intentional" (i.e.
hacking: an individual cracker or a criminal organization) or "accidental" (e.g. the possibility
of a computer malfunctioning) or otherwise a circumstance, capability, action, or event.
Types of threats
1. Law: What Lessig calls "Standard East Coast Code," from laws enacted by
government in Washington D.C. This is the most self-evident of the four modes of
regulation. As the numerous United States statutes, codes, regulations, and evolving
case law make clear, many actions on the Internet are already subject to conventional
laws, both with regard to transactions conducted on the Internet and content posted.
Areas like gambling, child pornography, and fraud are regulated in very similar ways
online as off-line. While one of the most controversial and unclear areas of evolving
laws is the determination of what forum has subject matter jurisdiction over activity
(economic and other) conducted on the internet, particularly as cross border
transactions affect local jurisdictions, it is certainly clear that substantial portions of
internet activity are subject to traditional regulation, and that conduct that is unlawful
off-line is presumptively unlawful online, and subject to traditional enforcement of
similar laws and regulations.
2. Norms: As in all other modes of social interaction, conduct is regulated by social
norms and conventions in significant ways. While certain activities or kinds of
conduct online may not be specifically prohibited by the code architecture of the
Internet, or expressly prohibited by traditional governmental law, nevertheless these
activities or conduct are regulated by the standards of the community in which the
activity takes place, in this case internet "users."
3. Markets: Closely allied with regulation by social norms, markets also regulate certain
patterns of conduct on the Internet. While economic markets will have limited
influence over non-commercial portions of the Internet, the Internet also creates a
virtual marketplace for information, and such information affects everything from the
comparative valuation of services to the traditional valuation of stocks
These forces or regulators of the Internet do not act independently of each other. For
example, governmental laws may be influenced by greater societal norms, and markets
affected by the nature and quality of the code that operates a particular system.
Scope of Cyber Law -Cyber law is concerned with every individual these days. This is
primarily because we all use internet in some or the other form daily. Internet is used when
we create any account online, while performing e-commerce transactions, net banking,
sending or receiving emails, surfing the net to take out some important information, etc.
Cyber law is that stream of law where all the cyber-crimes such as theft, fraud, etc. all of
which are subject to the Indian Penal Code are addressed by the Information Technology Act,
2000. With advanced technology and changing times, almost all the processes are now going
on IT platform. This is giving rise to increase of cyber-crimes in India as well as abroad.
1. Using a computer to target other computer for eg. Virus attacks, hacking, etc.
2. Using a computer to commit crimes for eg. Credit card frauds, cyber terrorism, etc.
Ans- Business method patents are a class of patents which disclose and claim new methods
of doing business. This includes new types of e-commerce, insurance, banking and tax
compliance etc. Business method patents are a relatively new species of patent and there have
been several reviews investigating the appropriateness of patenting business methods.
Nonetheless, they have become important assets for both independent inventors and major
corporations.
In order to adequately identify a business method invention that is linked to some kind
of computer implementation the following should be followed:
1. The business method must be described in a way that clearly identifies the real world value
of the business method. In order to fulfil this requirement it will be necessary to provide a
generalized description of the overall business method in a way that explains what the
business method accomplishes and how it accomplishes the task. In order to do this most
patent attorneys suggest the use of one or more flow charts the depict the steps associated
with the overall business method. In most, if not all, business method inventions it will be
possible to describe the process from multiple viewpoints. For example, how the overall
system operates viewed from the user perspective is different from the perspective of the
central computer, which performs the various computations, comparisons and routes
information. It is, therefore, critical to clearly identify the business method from all
possible viewpoints.
2. In addition to providing a generalized overview of the business method, it is also necessary
to clearly identify what the central computer does when it performs the processes required
by the business method. This will normally require a detailed description of the
functionality of the central computer.
3. It is also necessary to provide an overview of the system used to implement the business
method. This will require description of the relationship of the central computer (or other
central controller) to other subject matter outside the computer (or controller), which
together represent the system for carrying out the business method.
4. Specialized software will almost always constitute a part of the best way to carry out the
invention. In this situation it is necessary to provide a description of the best way to carry
out the invention using software by disclosure of the functions of the software. While the
Patent Office position is that flow charts are not a requirement for adequately disclosing
the functions of the software, most patent attorneys would strongly recommend or even
require their clients to include flow charts. This is because those skilled in the art will be
computer programmers and computer engineers, who are (or should be) taught from the
earliest levels of their technical education to conceptualize software first in a flow chart.
Therefore, the provision of a flow chart is fundamental to conveying the function of
software. If done properly your flow charts will also satisfactorily disclose the algorithms,
which is becoming increasing essential.
5. Disclosure of the software code is not necessary where the functions of the software
program are readily apparent from the specification and one skilled in the art could
generate the necessary software code to implement the disclosed functions. Nevertheless,
the disclosure of some code may be a good idea, particularly at the time of filing a
provisional patent application. This is because the code you disclose provides an effective
way to convey aspects relating to core functionality of what has been coded.