Friday, April 12, 2013

TDIL (Technology Development for Indian Languages)


The Department of Information Technology initiated the TDIL (Technology Development
for Indian Languages) with the objective of developing Information Processing Tools and
Techniques to facilitate human-machine interaction without language barrier; creating and
accessing multilingual knowledge resources; and integrating them to develop innovative user
products and services. There are many issues that have to be tackled because of the diverse and
complex language system in India.
Key issues include keyboard layout, IT localization, Vedic code set, Unicode for Indian scripts…
Indian Language Keyboard is categorized into three parts namely, Inscript, Phonetic and
Typewriter keyboards. The Indian language alphabet table is divided into Vowels (Swar) and
Consonants (Vyanjan). The INSCRIPT (Indian Script) keyboard was standardized by Department
of Information Technology (DIT) and was declared as National Standard by Bureau of Indian
Standard (BIS). Very recently a single solution was found out for the incorporation of a new
Rupee symbol 

Software tools for typing languages


Language in which a computer programmer writes instructions for a computer to execute is
known as software.
NiLa, Varamozhi, Lipikaar are examples for Malayalam typing software. Lipikaar is a
simple method for typing in Malayalam on an ordinary keyboard. It requires no learning, and
within a few seconds you will be able to type in Malayalam any word that you can imagine. It
works on all Windows Applications, MS Office, All Websites, Chat and E-mail.
Typing software is different from Transliteration software that is found in Gmail.
Transliteration is a method in which you spell the pronunciation of the Malayalam word in
English. The algorithm then converts the word into Malayalam script.
There are several problems with this approach:
1. Ambiguous
Transliteration is suitable for common words that can be spelled easily. However for words
that are not part of our everyday conversation, figuring out the correct English spelling may
not be as simple. Typing words accurately may require a trial and error approach and thus
making it unsuitable for professional use.
2. Fluency in English
Transliteration requires users to have fluency in English so that they can spell the Malayalam
word phonetically.
3. Silent Characters
There are many silent characters in languages like Malayalam, Tamil and other Indic
scripts which may have different spellings but they are phonetically quite different. For an
intelligent transliteration algorithm, it becomes difficult to interpret these words.
4. Writing Names, Addresses and other non-dictionary words
Since transliteration is based on a dictionary approach typing names, addresses and other
non-dictionary or hybrid words becomes difficult.
Transliteration is more suitable for users who think in English and is meant for typing common
words and few sentences.

Using computers in the local language


Many organizations have been working to make the computers available in the different
Indian languages. However, because of multiplicity of the languages (there are 18 languages
recognized by the Constitution of India) the issue is quite complicated. There are only two
essential components required to represent a language on computers - The language must have a
Script, and it should be possible to represent the script on the computers. The computers
understand English because they were developed by people who used English.

In the Bharatbhasha system, one can use computers in Indian languages without paying the
extra cost for the hardware and software. Computer applications in Indian languages can be
prepared by the people who know computer programming, therefore, this part of the work has to
be taken up by those who know computers and also know Indian languages.
Nowadays there are virtual or “on-screen” keyboard that lets you type directly in your local
language script in an easy and consistent manner, no matter where you are or what computer
you’re using. Malayalam is also included

Language localization


Language localization(from the English term locale, "a place where something happens or
is set") is the second phase of a larger process of product translation and cultural adaptation (for
specific countries, regions, or groups) to account for differences in distinct markets, a process
known as internationalization and localization. Language localization is not merely a translation
activity, because it involves a comprehensive study of the target culture in order to correctly adapt
the product to local needs. Localization is sometimes referred to by the numeronym "L10N" (as in:
"L", followed by ten more letters, and then "N").
The localization process is most generally related to the cultural adaptation and translation
of software, video games, and websites, and less frequently to any written translation (which may
also involve cultural adaptation processes). Localization can be done for regions or countries
where people speak different languages, or where the same language is spoken: for instance,
different dialects of Spanish, with different idioms, are spoken in Spain than are spoken in Latin
America; likewise, word choices and idioms vary among countries where English is the official
language (e.g., in the United States, the United Kingdom, and the Philippines).
Keyboards that are sourced from the Gulf incorporate Arabic letters above each key.
Regional languages in India are also being introduced into keyboards as part of localization.

IT AND REGIONAL LANGUAGES


In a large, geographically dispersed, demographic multilingual country like India, the
common thread in implementing and achieving these basic objectives of governance has been the
development and adoption of language computing tools and methodologies. The government
officials in various provinces, the non-government functionaries across the country and the people,
mostly use their own language in day to day work, be it in government administration at various
levels, in business, in profession, in services or in school education. Thus, if the fruits of
information technology revolution have to spread to all these participating members, in
government and public, it is best done through the use of computers in their own languages.
The Center for Development of Advanced Computing (C-DAC) has made pioneering
contributions in developing Indian language tools with natural language processing, and in
evolving script and font standards through its GIST technology, to enable and spread use of
computers in various languages. It accordingly took up the initiative of developing important
e-governance solutions in Indian languages, which impact government and the citizens both. This
initiative started in 1997 and has grown to a significant extent by the end of 2001.

What is UNICODE


Fundamentally computers just deal with numbers. They store letters and other characters
by assigning a number for each one. Before Unicode was invented, there were hundreds of
different encoding systems for assigning these numbers. No single encoding could contain enough
characters: for example, the European Union alone requires several different encodings to cover all
its languages. Even for a single language like English no single encoding was adequate for all the
letters, punctuations and technical symbols in common use.
The name 'Unicode' is intended to suggest a unique, unified, universal encoding.
These encoding systems also conflict with one another. That is two encodings can use the
same number for two different characters or use different numbers for the same character. Any
given computer needs to support many different encodings; yet whenever data is passed between
different encodings or platforms, that data always runs the risk of corruption.
UNICODE standard is the universal character encoding standard, used for representation of
text for computer processing. UNICODE standard provides the capacity to encode all of the
characters used for the written languages of the world. The UNICODE standards provide
information about the character and their use. UNICODE standards are very useful for computer
users who deal with multilingual text, business people, linguists, researchers, scientists,
mathematicians, and technicians. UNICODE uses a 16 bit encoding that provides code point for
more than 65000 characters ( 65536). UNICODE standards assigns each character a unique
numeric value and name.
UNICODE provides a unique number for every character irrespective of the platform or the
program or the language. The UNICODE standard has been adopted by such industry leaders as
Apple, HP, IBM, JustSystems, Microsoft, Oracle, SAP, Sun, Sybase, Unisys and many others.
Unicode's success at unifying character sets has led to its widespread and predominant use in the
internationalization and localization of computer software. The standard has been implemented in
many recent technologies, including XML, the Java programming language, the Microsoft .NET
Framework, and modern operating systems. It is supported in many operating systems and in all
modern browsers. The emergence of the Unicode Standard, and the availability of tools supporting
it is among the most significant recent global software technology trends.
Incorporating Unicode into client-server or multi-tiered applications and web sites offers
significant cost savings over the use of legacy character sets. Unicode enables a single software
product or a single website to be targeted across multiple platforms, languages and countries
without re-engineering. It allows data to be transported through many different systems without
corruption.

The Unicode consortium is a nonprofit organization founded to develop, extend and
promote use of the Unicode Standard, which specifies the representation of texts in modern
software products and standards. The membership of the consortium represents a broad spectrum
of corporations and organizations in the computer processing industry. The consortium is
supported financially solely through membership dues.

GREEN COMPUTING


Green computing is the study and practice of using computing resources efficiently. Some of the
key approaches that are followed as part of green computing are:
Efficient algorithm: A large algorithm would obviously require large memory space and more
time for execution; thus in a way leading to energy and resource wastage. Thus it is always
advisable to keep the algorithm efficient form the point of view of time and space tradeoff.

Virtualization of computer system: It involves creating multiple virtual computer systems
serving each of its own individualistic functions on a single physical hardware system. The entire
virtualization concept is based on the approach of ‘optimum utilization of available resources’.
Power management: It involves managing the power in such a way as to minimize its wastage.
This approach makes use of software controlled power management applications to eliminate
power wastage. Some of its examples includes, screen savers, automatic standby etc.
Power generation:
All computers require electrical power to operate. One of the goals of green computing is to use
power generated from sources that are more environmentally friendly than coal-fired power
stations
Recycling e-waste: This approach focuses on recycling of e-waste (old, broken or useless
electrical or electronic devices).

E-WASTE AND GREEN COMPUTING


There is no generally accepted definition of e-waste. But we can say that unwanted,
obsolete or unusable electronic products such as computers, computer peripherals, televisions,
VCRs, DVD Players, stereo equipment, hand cell phones are commonly referred to as ‘electronic
waste’.
Management and disposal of e-waste has become a serious problem among states
nationwide. The problem of electronic waste (e-waste) is growing at an unsustainable rate. E-waste
is now the fastest growing, and most toxic, component of municipal garbage. Local governments
are facing huge costs to handle e-waste, and even greater costs if they do not capture this toxic
stream and handle it in an appropriate manner.
E-Waste contains hazardous materials like lead which pose a potential long term human
health and environmental impacts. Ground Water especially is more likely to be polluted (note,
more than half the country reliant on ground water resources). Lead in the e-waste is a toxic
substance which may and cause lead poisoning and can be especially harmful for young children.
The piling up of E-waste is not only due to the electronic goods used in India but the
developed nations of the world export illegally their e-waste to India and other Asian countries.
These wastes are disposed of by uncontrolled burning and burying which are causing
environmental problems. The toxicity of some of the substance, eg mercury, cadmium also pose
grievous health problems.
Management and disposal options
• Due to increased public, regulatory and commercial scrutiny and also a commensurate
entrepreneur interest, there has been a diversion from energy intensive down cycling
processes to more mature processing systems.
• This has been largely achieved through reuse and refurbishing
• The government should strictly monitor and punish illegal importing of E-Waste to the
country.
Reuse
• Preventing waste in the first place is the preferred management option.
• This can be achieved through repairing, upgrading used electrical equipment.
• Example- adding memory to a computer, upgrading software.
Recycle
• Make use of take back programs
• Through recycling units are either reused or dismantled for recycling.
• The silver, gold, lead and other heavy metal are recyclable
Dispose
• The least preferred option is to landfill electronic waste.
• This should only come as a last option but care should be taken to consult with state
regulations on disposal of any hazardous waste.

Benefits of reuse (social and environmental)
• Diminished demand for new products and their commensurate requirement for virgin raw
material
• There is lessened need for water and energy for the associated manufacturing
• Less packaging per unit
• Availability of technology to wider swaths of society due to greater affordability of
products
• Saved landfill space
Each one of us has a role to play!
• Need for a e-waste policy and legislation
• Encourage and facilitate organized recycling systems
• Should subsidies recycling and disposal industries
• Collect fee from manufactured/consumers for the disposal of toxic material
• Incentive schemes for garbage collectors and general public for collecting and handling
over e-waste
• Awareness programme on e-waste for school children and general public
• Transparency and accountability to the public Handling large amounts of e-waste poses
risks of toxic contamination to workers and surrounding communities if conducted
carelessly.
• Thus, the most basic criterion that employees and citizens should rightfully expect from
any recycling operation is that it be open to public inspection.
• General compliance with occupational health and safety standards Observance of health
and safety standards in the workplace is important for protecting workers from exposure to
toxics whilst handling e-waste
• Well-trained workers, who are fully protected by the law to seek advice and take action to
protect their health and the environment without fear of reprisal from their employer, are
the most effective environmental protection.
• it is important that we create a national framework for the environmentally sound
management of e-waste including wide public awareness and education
• Conduct detailed inventories of e-waste
• Initiate pilot schemes on collection and sorting of e-wastes, including take back schemes
and schemes for repair refurbishment and recycling

HEALTH ISSUES


We sit in front of the computer looking into the screen without taking a break and blinking
eyelid. This hurts many parts of our body. Before the problems go out of hand and we may have to
say goodbye to using this machine, let us deal with it.
Problem Area: Lower back Pain
• Causes: Wrong type of chair or desk, Right chair an desk but wrong posture, Sitting on the
edge of the chair, sitting with all the weight on one buttock by sitting cross legged.
Corrective Measures: Always go for a chair that has a mechanism for lowering and
raising the height of the backrest. Never buy a computer chair that has arms rest.
Problem Area: Neck Pain
• Causes: While typing when one is moving the neck up and down, left and right too much it
causes neck pain. Use of wrong type of glasses (like bifocals), Height of screen. It may
sound strange to some of you but some people sit on the computer with mouthpiece of
phone hanging around their neck. This casual attitude is not cool at all!
Corrective Measures: A document holder is a must to restrict neck movement. Take
opticians advice and go for special glasses that you can use while in front of the computer.
Screen’s height should be adjusted parallel to eyesight – not too high and not too low.
Problem Area: Pain In Wrists & Fingers
• Causes: Height of the chair not adjusted properly. If you have bought the right chair you
might a well make use of it! Striking the keys too hard. Mouse is not close to the body.
Corrective Measures: Height of the chair should make a perfect L between the shoulder,
elbow and wrist. This ensures fingers and keys or mouse are at a perfect horizontal.
Clicking finger is also horizontal for that perfect wrist support. Mouse should be placed
right in front of the shoulder, close to our body.
Problem Area: Strain In the Eyes
• Causes: Glare from monitor, sun glare directly coming in straight on to the monitor from
windows, lighting arrangement of the room are some causes that put strain on the eyes.
Corrective Measures: The correct thing to do is to place the computer table between lights
and not directly under them. The best alternative is to switch off the overhead light and
switch on the angle poise lamp. Ask your optician to put slight tint coat on your glasses.
Adjust monitor’s contrast and brightness. Make sure the distance is right. Opt for a 17inch
SVGA or XGA screen.
Some Important Tips & Reminders
• Wrong chair or a chair not adjusted properly can result into knee, buttocks and shoulder
pain also. Get to know about posture breaks and wrist exercise. Room temperature also
plays an important part. Pain in the muscles may result into spasm if temperature of the
room you are working in is very low. To avoid dehydration work in a room with fewer
computers and people and avoid endless rounds of tea and coffee. Take to water. It won’t
turn you into fish! Keep everything you need like stationery, CDs etc at a distance that you
can reach without overstretching yourself each time. Drawers also should be easily
reachable and smooth to open.

INFORMATION OVERLOAD


Information overload refers to the addiction towards unlimited information available on the
internet. The addict in this case finds a craving for searching and reading information of his
interest on the internet. It often results in stress and anxiety related disorders. The term information
overload was first coined by the great futurist and writer Alwin Toffler in his book future shock.
According to Alwin Toffler, future shock is too much change in too short a period of time. The
concept of future shock revolves around the changes that are taking place with regard to
individuals and society. In this book, Toffler projects the concept of information overload as a
psychological disorder caused due to abundance of information availability.
The amount of information on the internet has been growing in leaps and bounds. Such a
great magnitude of information development and that too at such a rapid pace has led to an
information explosion of sorts. More and more number of internet users are becoming victims of
information overload as there are flooded with information sourced from a large numbers of web
sites, e-mails, blogs, reviews, messages, social networking sites etc. the consumption of such a
huge volume of information is increasingly becoming difficult for the users and thus causing
anxiety, irritation and stress. One of the best precautionary measures for protecting oneself from
information overload is to consume the information in a systematic and precise manner instead of
bulk consumption.

Helping a child or teen with an Internet addiction


If a child or teen is showing signs of Internet addiction, there are many things that you as a parent
can do to help.
1. Encourage other interests and social activities
2. Monitor computer use and set clear limits
3. Talk to your child about underlying issues

Managing Internet Addiction


The following are some tools to get your Internet use under control. While you can put
many of these in place yourself, make sure you get some outside support as well.
1. Identify any underlying reasons that need treatment.
Do you have any problems of depression, anxiety, problems with alcohol, drugs etc? this will
lead to cyber addiction and has to be treated.
2. Increase your coping skills
Sometimes spending a lot of time on the Internet is a method of managing stress or angry
feelings. A person may have trouble relating to others, or feeling excessively shy or feeling
that he can never understand people in real life. Building communication skills and
interpersonal skills will help such a person to remove stress and strains from his daily life.
3. Strengthen the relationships
Use of Internet for social interaction can be reduced by building strong relationship in real life.
Keep aside little time each week for spouse or other family. If you are shy, try finding common
interest groups such as an exercise class or book reading club. This allows you to interact with
others in a non-threatening way and allows relationships to naturally develop.

Risk factors for Internet addiction


There are some risk factors that have been identified with Internet addiction
1. Anxiety
One may use the internet to divert himself from his worries and fears. An anxiety disorder
like obsessive-compulsive disorder may also contribute to excessive email checking and
compulsive internet use.
2. Depression
The internet can be an escape from feelings of depression, but too much time online can
make things worse. Internet addiction further contributes to isolation and depression.
3. Other addictions
Many internet addicts suffer from other addictions like drugs, alcohol, gambling and sex.
4. Lack of social support
Internet addicts often use chat rooms, online messaging, or gaming as a safe way of
establishing new relationships and more confidently relate to others.
5. Teenagers
Teenagers may feel that internet is a wonder world and it might feel more comfortable than
real life friends.

Thursday, April 11, 2013

CYBER ADDICTIONS


The Internet helps us to connect with literally hundreds of people on social networking
sites like My Space, Face book, or Twitter. Email, online chat and message boards allow for both
public and anonymous communication about almost any topic imaginable, down to the smallest
detail. We all enjoy the benefits of the internet, and for many it is an indispensable tool for work as
well.
The concept of compulsive internet use is relatively new and is not yet formally recognized
as a psychological disorder, although research is underway in this area. However, there is increasing
evidence that for some people, compulsive internet use interferes with daily life, work and
relationships.

So what is healthy and unhealthy internet use? There is no easy answer because each
persons internet use is so different. Spending a lot of time online is not necessarily a problem. But
if we are neglecting our relationships, our work or other important things in our life, then we may
have a problem with internet addiction.

Signs and symptoms of cyber addiction
Sings and symptoms of compulsive Internet use may vary from person to person. But there
are some general warning signs that your Internet use has become a problem.
1. Losing track of time online.
If a person frequently finds himself on the Internet longer than he wish or his Internet use
of a few minutes turn into a few hours or he finds himself running late to appointments, college or
work because of too much time spent online are some of the clear indications of cyber addiction.
2. Having trouble completing tasks at work or home
If a person faces the problem of working late more and more because he can’t complete his
work on time-then staying even longer when everyone else has gone home is also a sign of internet
addiction.
3. Isolation from family and friends
Social life may suffer because of all the time one may spend online. They even neglect
their family and feels like there are no one in his real life.
4. Feeling guilty or defensive about your Internet use
Feeling guilty or defensive about internet use is another sign of internet addiction. Are you
sick of your spouse irritating you to get off the computer and spend some time together? Do you
hide your internet use or lie about how much time you spend online?

INFORMATION TECHNOLOGY (AMENDMENT) ACT, 2008


Rapid increase in the use of computer and Internet has given rise to new forms of crimes
like, sending offensive emails and multimedia messages, child pornography, cyber terrorism,
publishing sexually explicit materials in electronic form, video voyeurism, breach of
confidentiality and leakage of data by intermediary, e-commerce frauds like cheating by
personating-commonly known as phishing, identity theft, frauds on online auction sites, etc. So,
penal provisions were required to be included in the Information Technology Act, 20000. Also, the
act needed to be technology-neutral to provide for alternative technology of electronic signature
for bringing harmonization with Model Law on Electronic. Signatures adopted by United Nations
Commission on International Trade Law (UNCITRAL).
Keeping in view the above, Government had introduced the Information Technology
(Amendment) Bill, 2006 in Lok Sabha on 15 of December 2006. Both the houses of Parliament
passed the Bill on 23rd December 2008. Subsequently the Information Technology (Amendment)
Act, 2008 received the assent of President on 5th February 2009 and was notified in the Gazette of
India.

Under the IT Act, sections 65 to 78 did provide for offences and penalties, but were limited
in their scope dealing with tampering with computer source code documents, hacking systems and
publishing and disseminating obscene information in electronic form or for fraudulent purposes.
The amendment provides for eight different types of offences, which range from using computer
resource code or communication device to disseminating and composing information which is
false, offensive or menacing in nature, fraudulent, dishonest use of electronic signatures, password
or other identification features to any computer source or communication device in capturing,
publishing or transmitting any form of obscene images and visuals, as being crimes affecting
individuals, or other persons. Cyber cafes have been brought in the net, increasing accountability
of intermediaries, thereby including search engines, service provides, online markets, without
clarity on how to trap the fox. These provisions structured in a diffused manner with unrelated
aspects such cyber terrorism clauses juxtaposed in between. Somewhere along the line the concept
of hacking of the 2000 act has been dropped, dumping the accepted trade definition, replacing it by
section 66, the detailed language of which could prove inherently restrictive in interpretation.
Prevention is always better than cure. It is always better to take precaution while operating
the net. The 5P mantra for online security are : Precaution, Prevention, Protection, Preservation
and Perseverance. A netizen should keep in mind the following things.
1. To prevent cyber stalking avoid disclosing any information pertaining to oneself. This is as
good as disclosing your identity to strangers in public place.
2. Always avoid sending any photograph online particularly to strangers and chat friends as
there have been incidents of misuse of the photographs.
3. Always use latest and update antivirus software to guard against virus attacks.
4. Always keep back up volumes so that one may not suffer data loss in case of virus
contamination.
5. Never send your credit card number to any site that is not secured, to guard against fraud.
6. Always keep a watch on the sites your children are accessing to prevent any kind of
harassment or depravation in children.
7. It is better to use a security program that gives control over the cookies that send information
back to the site as leaving the cookies unguarded might prove fatal.
8. Web site owners should watch traffic and check any irregularity on the site. Putting host
based intrusion detection on servers may do the trick.
9. Use of firewalls may be beneficial.
10. Web servers running public sites must be physically separated and protected from internal
corporate network.

CYBER LAWS


India is a signatory to the Model Law and is under an obligation to revise its laws as per the
Model Law. Keeping in view the urgent need to bring urgent amendments to the existing laws to
facilitate electronic commerce and with a view to facilitate electronic governance, the Information
Technology Bill (IT Bill) was passed by Indian Parliament on May 17, 2000. The Information
Technology Act (IT Act) came into effect on 17th October, 2000.
The main objective of the Act is to provide legal recognition for transactions carried out by
means of electronic data interchange and other means of electronic communication and storage of
information to facilitate electronic filing of documents with the government agencies. The Act has
extra-territorial jurisdiction to cover any offence or contraventions committed outside the country
by any person. It also involves legal provisions relating to piracy, defamation, advertising,
taxation, digital signatures, copy rights and trade secrets in the cyber world. This bill intends to
facilitate E-commerce by removing legal uncertainties created by the information technology.
Some important provisions of Information Technology Act 2000 are reproduced below.
The IT Act shall extend to the whole of India and applies also to any offence or
contraventions committed outside the country by any person. As regard the applicability of the
Act to offences and contraventions, the nationality of the accused is irrelevant if the act or conduct
constituting the offence or contravention involve a computer, computer system or computer
network located in India. Some of the major provision contained in the act are as follows.
1. Electronic contracts will be legally valid.
2. Legal recognition of digital signatures.
3. Security procedure of electronic records and digital signatures.
4. Appointment of certifying authorities and controller of certifying authorities,
including recognition of foreign certifying authorities.
5. Various kinds of computer crimes defined and stringent penalties provided under
the act.
6. Establishment of Cyber Appellate Tribunal under the Act.
7. Act to apply for offences or contraventions committed outside India.
8. Power of police officers and other officers to enter into any public place and search
and arrest without warrant.
9. Constitution of Cyber Regulations and Advisory Committee who will advise the
Central Government and Controller

CYBER ETHICS


An old adage tells us "Character is what you do when no one is watching." So it is with the
Internet. Online, people can feel invisible and capable of doing things they normally wouldn’t do
in person or in public - things that they know might be wrong. As the Internet becomes an
indispensable tool for everyday life, it is more important than ever to dust off the concept of
"citizenship" and apply it to the online world. Relatively new terms, "cyber citizenship", "cyber
ethics", and "netiquette" refer to responsible cyber social behavior. These terms refer to what
people do online when no one else is looking. As kids go online in increasing numbers, cyber
ethics is a critical lesson, especially since poor e-habits can start at an early age. Unfortunately, we
are learning all too well that children armed with computers can be dangerous and cause serious
damage and harm, regardless of whether they are being mischievous or trying to intentionally
commit cyber-crimes.
What is cyber ethics? And how do you teach it to your children? Simply put, cyber ethics is
a code of behavior for using the Internet. One easy way to think about cyber ethics and to address
the subject with children is this: acceptable behavior on the Internet is very much the same as
acceptable behavior in everyday life. For instance, at an early age, children learn what it means to
be honest, and to respect the rights and property of others. They are taught to not take what does
not belong to them, and to be considerate of others. On the Internet, the same basic rules apply.
The ‘Dos and don’ts’ or the difference between using and abusing the Internet have to be taught to
them.
Here are some helpful dos and don’ts pertaining to situations that children are likely to encounter.
1. Do use the Internet to help you do your schoolwork. The Internet is the world’s largest
library. You can find information on almost any subject from science, math and technology
to language, art, history, current events and more. When you use information, photos and
other materials that you find on the Internet in your homework or research projects, make
sure that you identify the sources of the information in footnotes.

2. Don’t copy information from the Internet and call it your own. It is sometimes tempting to
copy information from the Internet into your schoolwork, and to present it as your own
work. That is dishonest, just like taking someone else’s jacket and calling it your own. And
it might be illegal, too. Much of the information, pictures and other materials on the
Internet is copyrighted, which means it belongs to someone else. If you take it without
permission, or without identifying the source in a footnote, you are breaking the law.
Music, video, games and copyrights.
3. Do use the Internet to learn about music, video and games. There are many websites where
you can learn about music by listening to sample tracks, preview movie videos, and learn
about new computer games.
4. Don’t use the Internet to download or share copyrighted material. When something is
copyrighted, it means that someone else owns it, and you cannot copy or distribute it
without their permission. It is dishonest and illegal to download copyrighted music, video,
games or other materials. It is also dishonest and illegal to share copyrighted music, video,
games or other materials over the Internet. When you see this symbol—©—it means that
the material is copyrighted.
5. Do use the Internet to communicate with friends and family. Email and instant messaging
(IM) are good, fun ways to communicate with your friends and your family. Always make
sure that you know the people with whom you exchange email and IM.
6. Don’t use the Internet to communicate with strangers. Do not use email or IM to talk to
strangers. They may not be who they say they are, and if they are not, they are not nice
people. Don’t give out your email or IM address to people you don’t know, either online or
in person. Don’t open email or email attachments from people you don’t know. Unsolicited
email may contain viruses that will damage your computer and the information on it.
7. Don’t pretend to be someone else. Just as you don’t want others to hide their true identity
when they email or IM you, don’t pretend to be someone else when you’re online.
8. Don’t be rude or use bad language. When you use email or IM, be considerate of others.
Don’t be rude, mean or use bad language. You wouldn’t do that in real life, and you
shouldn’t do it on the Internet either.
9. Don’t give anyone personal information or passwords. Don’t tell people, especially
strangers, more about yourself than you would if you met them in person. Don’t tell them
what you look like, your age, where you live, your phone number, what school you go to,
or any passwords that protect your computer or your private information.
10. Don’t leave your children unsupervised. Make sure you know what sites your children visit
when they’re on the internet, and with whom they’re communicating. Look over their
shoulder. Keep track of the websites they visit. There are websites and programs available
that direct children to sites that are fun, interesting and appropriate. And there are others
that restrict their browsing to appropriate websites. The best control, however, is parental
involvement. Make sure they understand acceptable behavior on the Internet. And make
sure they follow the rules.
11. Do encourage your children to use the Internet. The Internet has a lot good things to offer
children. When used wisely, it is a great tool for information gathering and learning.

ANTIVIRUS TOOLS


Viruses and Worms can be removed using Antivirus Software. As soon as an infection is
detected, it must be eliminated. Otherwise it will cause great harm to your data. Your data might
get corrupted or even eliminated.
Antivirus tools can be purchase from the market. They are also provided free of cost by certain
companies. Most of them provide the user with an antivirus scanner for 30 days. Afterwards, the
customer has to pay. Other companies provide antivirus tools to eliminate a certain number of
viruses. In order to remove malicious viruses, the customer will have to pay.

How to tackle computer viruses


1. Do not disclose passwords, pin numbers, net banking user-id & pass words.
2. No bank will request for passwords thru e-mail
3. Never click the link
4. Enter the URL in the address bar
5. Check the status bar of the browser for actual address
6. Use anti-pharming, anti virus, anti-spyware & update regularly
7. Change online passwords periodically
8. Check bank statements regularly
9. Online shopping only with known & reputable merchants
10. Read privacy policies before you agree

What is MALWARE


Malware, short for malicious software, is software used or created by hackers to disrupt
computer operation, gather sensitive information, or gain access to private computer systems.
While it is often software, it can also appear in the form of scripts or code.[1] 'Malware' is a
general term used to refer to a variety of forms of hostile, intrusive, or annoying software.[2]
Malware includes computer viruses, worms, trojan horses, spyware, adware, most rootkits,
and other malicious programs

What is SPYWARE


Spyware is a type of malware (malicious software) installed on computers that collects
information about users without their knowledge. The presence of spyware is typically hidden
from the user and can be difficult to detect. Some spyware, such as keyloggers, may be installed by
the owner of a shared, corporate, or public computer intentionally in order to monitor users.
While the term spyware suggests software that monitors a user's computing, the functions
of spyware can extend beyond simple monitoring. Spyware can collect almost any type of data,
including personal information like Internet surfing habits, user logins, and bank or credit account
information. Spyware can also interfere with user control of a computer by installing additional
software or redirecting Web browsers. Some spyware can change computer settings, which can
result in slow Internet connection speeds, un-authorized changes in browser settings, or changes to
software settings

What is ADWARE


Adware, or advertising-supported software, is any software package which automatically
renders advertisements. These advertisements can be in the form of a pop-up. They may also be in
the user interface of the software or on a screen presented to the user during the installation
process. The object of the Adware is to generate revenue for its author.
Adware, by itself, is harmless; however, some adware may come with integrated spyware
such as key loggers and other privacy-invasive software. Adware has been criticized because it
usually includes code that tracks a user’s personal information and passes it on to third parties,
without the user’s authorization or knowledge.

What is COOKIES


A cookie, also known as an HTTP cookie, web cookie, or browser cookie, is usually a
small piece of data sent from a website and stored in a user's web browser while a user is browsing
a website. When the user browses the same website in the future, the data stored in the coobe retrieved by the website to notify the website of the user's previous activity. Cookies were
designed to be a reliable mechanism for websites to remember the state of the website or activity
the user had taken in the past. This can include clicking particular buttons, logging in, or a record
of which pages were visited by the user even months or years ago. Other kinds of cookies are the
authentication cookies, which is used by web servers to know whether the user is logged in or not,
and which account they are logged in under. Without such a mechanism, the site would not know
whether to send a page containing sensitive information, or require the user to authenticate himself
by logging-in.
Although cookies cannot carry viruses, and cannot install malware on the host computer,
tracking cookies and especially third-party tracking cookies are commonly used as ways to
compile long-term records of individuals' browsing histories — a major privacy concern that has
prompted many governments to take action.

What is SPAM


Email spam, also known as junk email or unsolicited bulk email (UBE), is a subset of
electronic spam involving nearly identical messages sent to numerous recipients by email.
Clicking on links in spam email may send users to phishing web sites or sites that are hosting
malware. Spam email may also include malware as scripts or other executable file attachments.
Definitions of spam usually include the aspects that email is unsolicited and sent in bulk.

What is LOGIC BOMB AND TIME BOMB


A logic bomb is a piece of code intentionally inserted into a software system that will set
off a malicious function when specified conditions are met. For example, a programmer may hide
a piece of code that starts deleting files (such as a salary database trigger), should they ever be
terminated from the company.
Software that is inherently malicious, such as viruses and worms, often contain logic
bombs that execute a certain payload at a pre-defined time or when some other condition is met.
This technique can be used by a virus or worm to gain momentum and spread before being
noticed. Many viruses attack their host systems on specific dates, such as Friday the 13th or April
Fool's Day. Trojans that activate on certain dates are often called "time bombs".

What is TROJAN HORSE


It is a malicious program disguised as legitimate software. It cannot replicate itself, in
contrast to some other types of “malware” like worms and viruses but they can be contained within
a worm. Depending on their purpose, a Trojan can be destructive or a resource hog and is almost
always considered a root compromise.
Example: Back Orifice, NetBus, SubSeven

What is WORM


A virus that duplicates itself and sends itself as an e-mail attachment or as part of a network
message is known as a Worm. Unlike a virus, it is self-contained and does not need to be part of
another program to propagate itself. It is often designed to exploit computers’ file transmission
capabilities

What is VIRUS


A program or programming code that duplicates itself and infects the computer is termed a
Virus. They can be can be transmitted as attachments to an e-mail note or in a downloaded file, or
be present on a diskette or CD. The immediate source of the e-mail note, downloaded file, or disk
you've received is usually unaware that it contains a virus.
Some viruses begin their destructive effect as soon as their code is executed; other viruses
lie dormant until circumstances cause their code to be executed by the computer. Some viruses are
harmless but they can be playful.
Viruses have strange and sometimes even fanciful names in order to catch the attention of
the user. Armageddon, Burger, Happy Birthday, Ludwig are examples of certain viruses.

Importance of Computer Security Issues


We cannot deny the fact that we always feel threatened by the fact that any computer
genius may use unknown techniques to know and may come to know important details about your
financial status and might tamper with it. This is also true in the case of big organization. This is
where computer security steps in. It aims to preserve the “integrity, availability and confidentiality” of
vital information stored in computers.
Cyber criminals take the following methods to commit a crime.

SECURITY ISSUES


Security issues for computers have become very important because we rely so much on
technology these days. One major security issue is how valuable data can be protected and
preserved, in their both theoretical and practical aspects.
Computer Security is a definite branch of study which was introduced in the 1970's.
Computer Security is a branch of Computer Science Risk Management. It is also regarded as a
form of Security Engineering as because it adequately addresses security issues of Computer.
Computer Security's purpose is to secure a particular computer system from any kind of
cyber-crime. Computer Security, therefore, aims at securing data, keeping them intact and also
providing uninterrupted services.

PHARMING


Pharming is a hacker's attack intended to redirect a website's traffic to another, bogus site.
Pharming can be conducted either by changing the hosts file on a victim's computer or by
exploitation of a vulnerability in DNS server software. DNS servers are computers responsible for
resolving Internet names into their real IP addresses. Compromised DNS servers are sometimes
referred to as "poisoned". Pharming requires unprotected access to target a computer, such as
altering a customer's home computer, rather than a corporate business server.
Pharming has become of major concern to businesses hosting ecommerce and online
banking websites. Sophisticated measures known as anti-pharming are required to protect against
this serious threat. Antivirus software and spyware removal software cannot protect against
pharming.
How to tackle Phishing and Pharming
1. Do not disclose passwords, pin numbers, net banking user-id & pass words.
2. No bank will request for passwords thru e-mail
3. Never click the link
4. Enter the URL in the address bar
5. Check the status bar of the browser for actual address
6. Use anti-pharming, anti virus, anti-spyware& update regularly
7. Change online passwords periodically
8. Check bank statements regularly
9. Online shopping only with known & reputable merchants
10. Read privacy policies before you agree

What is PHISHING


Phishing is the criminally fraudulent process of attempting to acquire sensitive information
such as usernames, passwords and credit card details by masquerading as a trustworthy entity in an
electronic communication.
Phishing is typically carried out by e-mail or instant messaging. The scammers use social
engineering techniques to fool users. Social engineering refers to a group of activities that
essentially trick users into divulging sensitive information through ordinary communication means
such as conversations and e-mail. The scammers send e-mail messages that look like they are from
a legitimate business the recipient deals with, such as an online bank. They ask you to update your
account information and provides a link that, when clicked, sends the recipient to a Web site. Once
the e-mail recipient confirms his or her personal information, the scammers capture it and can
begin using it.

TYPES OF HACKERS


White hat- A white hat hacker breaks security for non-malicious reasons, for instance testing their
own security system
Grey hat - A grey hat hacker is a hacker of ambiguous ethics and/or borderline legality, often
frankly admit
Black hat -A black hat hacker is someone who breaks computer security without authorization or
uses technology (usually a computer, phone system or network) for vandalism, credit card fraud,
identity theft, piracy, or other types of illegal activity.

What is HACKING


Computer hacking is the practice of modifying computer hardware and software to
accomplish a goal outside of the creator’s original purpose. People who engage in computer
hacking activities are often called hackers. Thus a hacker is a person who breaks into computers,
usually by gaining access to administrative controls. Since the word “hack” has long been used to
describe someone who is incompetent at his/her profession, some hackers claim this term is
offensive and fails to give appropriate recognition to their skills.

CYBER CRIMES


Generally computer crimes can be categorized into three
1. The computer as a target - attacking the computers of others (spreading viruses is an example).
2. The computer as a weapon - using a computer to commit "traditional crime" that we see in
the physical world (such as fraud or illegal gambling).
3. The computer as accessory - using a computer as a "fancy filing cabinet" to store illegal or
stolen information.
Reports of alleged computer crime have been a hot news item of late. Especially alarming
is the realization that many of the masterminds behind these criminal acts are mere kids. In fact,
children no longer need to be highly skilled in order to execute cyber-crimes. "Hacker tools" are
easily available on the Net and, once downloaded, can be used by even novice computer users.
This greatly expands the population of possible wrongdoers. Children (and in some cases - their
parents) often think that shutting down or defacing Web sites or releasing network viruses are
amusing pranks. Kids might not even realize that what they are doing is illegal. Still other kids
might find themselves hanging out online with skilled hackers who share hacking tools with them
and encourage them to do inappropriate things online. Unfortunately, some of these kids don’t
realize that they are committing crimes until it is too late. Even more distressing and difficult to
combat is the fact that some in the media portray the computer criminal as a modern day Robin
Hood. Nothing could be further from the truth.

Cyber-crime generally refers to criminal activity where a computer or network is the source, tool,
target, or place of a crime.

FREE SOFTWARE MOVEMENT


The free software movement (abbreviated FSM) is a social movement which aims to promote
user’s rights to access and modify software. The alternative terms "software libre", "open
source", and "FOSS" are associated with the free software movement. Although drawing on traditions
and philosophies among members of the 1970s hacker culture, Richard Stallman is widely
credited with launching the movement in 1983 by founding the GNU Project. Stallman founded
the Free Software Foundation in 1985 to support the movement.

The philosophy of the movement is to give freedom to computer users by replacing
proprietary software under restrictive licensing terms with free software, with the ultimate goal of
liberating everyone "in cyberspace" that is, every computer user. Members of the free software
movement believe that all users of software should have the freedoms listed in the free software
definition. Many hold that it is immoral to prohibit or prevent people from exercising these
freedoms and that these freedoms are required to create a decent society where software users can
help each other, and to have control over their computers.
Some adherents to the free software movement do not believe that proprietary software is
strictly immoral. They argue freedom is valuable (both socially and pragmatically) as a property of
software in its own right, separate from technical quality in a narrow sense. The Free Software
Foundation also believes all software needs free documentation (in particular because
conscientious programmers should be able to update manuals to reflect modification that they
made to the software), but deems the freedom to modify less important for other types of written
works. Within the free software movement, the Floss manuals foundation specializes on the goal
of providing such documentation.
Members of the free software movement advocate that works which serve a practical
purpose should also be free. The initial work of the free software movement focused on software
development. The free software movement also rejects proprietary software, refusing to install
software that does not give them the freedoms of free software. According to Stallman, "The only
thing in the software field that is worse than an unauthorized copy of a proprietary program, is an
authorized copy of the proprietary program because this does the same harm to its whole
community of users, and in addition, usually the developer, the perpetrator of this evil, profits from it."
Some free software advocates use the term Free and Open Source Software(FOSS) as an
inclusive compromise, drawing on both philosophies to bring both free software advocates and
open source software advocates together to work on projects with more cohesion. Some users
believe that a compromise term encompassing both aspects is ideal, to promote both the user’s
freedom with the software and also to promote the perceived superiority of an open source
development model.

DIGITAL DIVIDE


The term digital divide refers to the gap between people with effective accessto digital and
information technology and those with very limited or no access at all. It includes the imbalances
in physical access to technology as well as the imbalances in resources and skills needed to
effectively participate as a digital citizen.
In other words, it is the unequal access by some members of society to information and
communication technology, and the unequal acquisition of related skills. The term is closely
related to the knowledge divide as the lack of technology causes lack of useful information and
knowledge. The digital divide may be classified based on gender, income, and race groups, and by
locations. The term global digital divide refers to differences in technological accessibility
between countries or the whole world.

5. Other Issues


 (a)Employment and Productivity
The impact of computers on employment and productivity is directly related to the use of computers to achieve automation. The use of computers have created new job opportunities and increased productivity. At same time the introduction of computers for many social applications has substantially reduced some type of job opportunities. Many of the routine and monotonous jobs formerly done by clerks are now replaced by computers.
(b)Individuality
Another issue generally discussed connected with computer based system is its negative effect on the individuality of people .It is said that computer based system are dehumanizing and depersonalizing individuals .Human relationship presents in non computer system are completely neglected in computer-based systems .People are known by numbers rather than their names as result many people feel a loss of identity .Moreover computer based system do not allow any flexibility .Strict rules and procedures to be followed if the accuracy in the result is required and naturally people will work like machines without any human touches.
                                    Technology development in the field of computer certainly reached the man in a comfortable living condition .However it should be noted that not the technology alone that provides strength to the society .Other factors also play an important role in shaping the society .It is a part of human nature to be sociable, to meet other people .If everything is computerized, one need not go to school or office and meet and interact with the people .He will simply sit his home lime a machine and doing all his activity by pressing some buttons or keys Family and friends historically have provided powerful support mechanism for individuals.

[c] The Quality of Life

              Computerized business system increase productivity and as a result they provide better quality goods and services at lower costs .The standard of living of the people increased and people gets more leisure time for enjoyment .Monotonous and respective job can be given to the computer system .Thus computers help the quality of life of people because they can upgrade the quality of working conditions and the quality of jobs itself.
                                                      At the same time it should be noted that some jobs done with the help of computers are repetitive and routine and it forces peoples to work like a machine .Certain procedures and operations of computers based system are quite monotonous and boring and nonintellectual exercise is not expected in most cases .But those who argue in favour of computers says that this short coming is very negligible compared to the diversity of benefits derived out of the system.  

4 .System Quality and Related Issues


Another serious issue which may come up with the development of information technology is the widespread marketing of low quality and inferior software and system .Many software companies are marketing their software product without conducting strict quality control tests in order to make the software totally bug free .Such nonstandard software may create sever damages to the information system of an organisation and in some cases it will brings irreparable consequences .Data failures are very common in many system .Under this circumstances it is necessary to examine the responsibility and role of systems and software providers .The main issues in this connection are as follows.
                                                Failures in data quality is a serious issue and which raises certain ethical issues to the software companies .It is their duty and obligations to conduct complete quality control test to verify the correctness of software .Software should only released only when it is fully confirmed that it is a best product, totally bug free and satisfying all text criteria.
.                 Data quality also raises certain social issues .As a society, we have to think of whether we want to encourage the people to believe that systems are fully perfect .0and data errors are impossible .It also essential to decide the feasibility of making awareness among the people regarding all possible changes of system failures and the resulting risk. However, it should be remembered that if such awareness is made, it may hamper the further development of all systems which is not desirable for developing society.

Tuesday, April 9, 2013

Blogger Template Editing Section Updated !

Blogger Template editing section updated to new user friendly format.Through the new design of blogger template editing section it is very easy to jump to coding of any widgets and view the preview after editing from that same page.

The New Look Of Blogger Template Edit HTML Section

Blogger New Template Editing Section

The new button called 'Jump to widget' help users to jump to the coding section of any widget and the button 'format template' help bloggers to format there template easily.Through this new design of blogger template editing section we can easily edit and make changes to our template staying on the same page.
So what are you waiting for go to your Blogger template editing section and see the change

Saturday, April 6, 2013

3. Accountability, Liability and Control


Development information technology also create a new problem relating to the liability and social practices which make individuals and organisation held accountable .A question arises as to who is responsible if a person is injured by a machine which is controlled by software .The various issues related with this phenomenon are discussed below.
Accountability, liability and control raise certain ethical issues .Here it is necessary to find answer to the responsibility, liability and accountability of software companies regarding the use of their software .It is also essential to see the responsibilities and liabilities of users in acquiring and using software and its related consequences.

It also raises some social issues .System failures and consequent damage on information is a usual experience .Hence, to protect the valuable information of individuals and organisations should be encouraged to develop their own back up services .The society is also required to decide whether it can permit network and bulletin boards to post inaccurate and misleading information which will harm many persons.
It raises certain political issues also.Serve conflicts are going on between service providers and users regarding the quality           

2 .Information systems and Intellectual Property


              Intellectual property rights can be defined as the rights given to peoples over the creations of their minds .They usually give the creator an exclusive right over the use of his creations for a certain period of time .This includes copyrights and related rights, trademarks, geographical indication, industrial designs, patents, integrated circuits layout designs and protection of undisclosed.
             Therefore in order to protect the interest of both the marketers and consumers and to prevent the misuse of trademarks, the Government enacted the trade and merchandise Marks Act, 1958 .To meet its obligations as a signatory to the WTO agreement, India has substantially amended its existing Trade Marks Act .The old Trade & Merchandise Marks Act 1958 is being repealed and a new Trade Marks Act 1999 has been passed by the parliament.

                                             Today, such unfair practices are not confined to traditional like books and magazines; it even extends to software, one of the most valuable technologies of the Information age .Software is an essential element to run a computer .Unfortunately, it is easy for the computer to create an exact copy of valuable software in seconds .Music industry is worried because individuals can illegally copy MP3 music files to web sites where they can downloaded by others who do not know that the MP3 files are not licensed for copying or distribution.
                                   Thus, software piracy is widespread from individual computer users to professionals .Piracy exists in homes, schools, business and Government .Software pirates not only steal from the companies that make the software, but they will also be able to develop new software with less money for research and development. That is why all software piracy is treated illegal .As the number of PCs and Internet use grow, the incidence of software piracy is also increasing.
                                                                    Software piracy refer to the unauthorized duplication of computer software .Although most computer users of today know that unauthorized use and duplication of software is illegal, many of them ignore the importance of treating software as valuable intellectual property .Foll0wing ethical, social and political issues are raised in connection with intellectual property.

Information technology also create certain social issues .Stealing and copying of software is become almost like social custom and people are not much bothered about the violation of various laws exiting in the country to protect software .Almost all the people consider copying of the software is silly matter and which in the real and sense, makes them as a law breaker.

Internet and privacy


                                                                       Internet brings new challenge to the protection of privacy individuals .Information sent over the network may pass through many computer systems before it searches to the recipient’s computers .Each of these computer systems is capable of monitoring, capturing and storing the information .Many of the software available in the market are capable to collect and store data relating to the user of information in the Internet .Web sites are also capable to collect and store information pertaining to the visitors without their consent .Special software like  ‘Cookies’ is mainly used to trace the personal details of the visitors of a web sites .The ethical, social and political issues related with privacy are outlined below.

Ethical, Social and political Issues connected with privacy

 

The following ethical issues are more relevant in the context of privacy of individuals.

1 .Under what circumstances one can invade the privacy of others?
2 .Is it legitimate to enter into the lives of others through surveillance or through other means like market research/
3 .Is it necessary to inform the individual when the taping information about him.

Privacy of information also raises certain social issues .The society itself has to earmark certain areas where privacy of individuals are needed and protected .But practically it is not easy to decide and allocate certain areas of society as private territory .This is because the concept of privacy in the social perspective is quite different from individual to individual .The society is also required to determine whether the freedom privacy be extended to criminal conspiracies.

1. Privacy and freedom

Privacy is the right of individuals to be left alone, free from surveillance or interference from other individuals or organizations including the state. Many employees working in organizations are under surveillance .Information technology augmented this problem and threatens individual’s privacy.
                                                   A great deal of information is stored in centralized computer data bases by government or private agencies .This information can be misused by an unscrupulous government or private agencies .The unauthorized use of such information would seriously affect the privacy of individuals and it may sometimes hurt the credit standing or reputation of an individual .The credit worthiness and reputation of individuals may be badly affect because of incorrect data stored in the computers.

Friday, April 5, 2013

SOCIAL AND ETHICAL ISSUES OF IT


A new invention leads to great changes in the living style of the people .Man has become a superior member of the animal kingdom because of his capability to invent new things .Today we are in the midst of an information revolution as a result of the invention of computers .The widespread use of computers has substantially increased our ability to compute and communicate .However, the introduction of information technology and its fast development have created many unresolved ethical and social issues.

                               Socio economic effects of IT are related with its impact on society of the use of computers .For example if a production process in computerized it provides consumer better quality goods at lower price .At same time it has an adverse effect of decrease in employment opportunities .Thus apart from benefits, many technological advances have side effects also .Yet human being, by their very nature will not avoid such inventions. Let us examine various aspect of the impact of information technology on society on the assumption that, it will affect our lives in one way or other.

IT AND SOCIETY -Issues and Concerns


We live in an` exciting time in history .The widespread availability of computers and Internet connections provides lot of opportunities to communicate and learn .Unfortunately, although most people use the Internet as a powerful and beneficial tool for communication and education, some individuals exploits the power of the Internet for criminal or terrorist purposes.

                            Information is the means through which the mind expands and increases its capacity to achieve its goals, often as the result of an input from another mind.