ICT2021
ICT2021
Internet addressing:
Each computer and router on the internet must have a name so that it can be
uniquely identified.
An Internet addressing or Internet protocol address or IP address consists of
32 bits, or four bytes.
IP addresses as four natural numbers from 0-255. It is common to express
IP addresses as four natural numbers separated by dots.
The network interface card (NIC) of every computer that wants to send or
receive messages on the internet must have atleast one address.
This is similar to the need for you to have a unique address receive mail.
On the internet, this address is called IP address.
IP address is often expressed in the dotted decimal format, such as:
192.168.1.1
WWW.FACEBOOK.COM
For example if you want to open Facebook website then type
www.facebook.com in the address bar and then press the enter button the
Facebook page will displayed at web page area in the browser
Types of URL: -
URL s varies depending on the location of the documents to which user will
link.
Basically URLS fall into two categories; Absolute and relative URL.
Absolute URL:
An absolute URL contains all the information necessary to find the files on
the internet.
It contains the protocol indicator, host name, folder name and File name.
Absolute URL are similar to address used by the U.S postal service, which
include a name, street address, apartment number, city, state and zip code.
If same of the information is missing – bay, the street number or house
number. The carrier can’t deliver the mail to the right person.
Similarly, if the protocol indicator or host name is missing from a URL,
browsers can not link to a specific file because they won’t know where and
how to look for the file.
Likewise, if the folder or file name is missing, browsers won’t know which
piece of information to pull of the server.
Relative URLS:
A relative URL usually contains only the folder name and file name or even
just the file name.
We can use these partial URLs when we are pointing to a file that’s located
within the same folder or on the same server as the originating file.
In these cases, a browser doesn’t need the server name or the protocol
indicator because it assumes the files are located in a folder or on a server
that’s relative to the originating document.
User can use relative URLS to refer to documents in relation to the
originating documents, which is called document.
Relative URLS or to the server on which the originating document resides,
which is called server – related URLS.
Browser:
A browser is a software application used to locate, retrieve and display
content on the World Wide Web, including Web pages, images, video and
other files.
Types of Browsers:
Web Browsers are software installed on your PC. To access the Web, you
need a web browser, such as Netscape Navigator, Microsoft Internet
Explorer or Mozilla Firefox.
Internet Explorer:
Internet Explorer (IE) is a product from software giant Microsoft.
This is the most commonly used browser in the universe.
This was introduced in 1995 along with Windows 95 launch.
Google Chrome:
This web browser is developed by Google and its beta version was first
released on September 2, 2008 for Microsoft Windows.
Today, chrome is known to be one of the most popular web browsers with
its global share of more than 60%.
Mozilla Firefox:
Firefox is a new browser derived from Mozilla.
It was released in 2004 and has grown to be the second most popular
browser on the Internet.
Safari:
Safari is a web browser developed by Apple Inc. and included in Mac OS X.
It was first released as a public beta in January 2003.
Safari has very good support for latest technologies like XHTML, CSS2 etc.
Opera:
Opera is smaller and faster than most other browsers, yet it is full- featured.
Fast, user-friendly, with keyboard interface, and more.
Privacy:
Social media sites have a variety of privacy settings you can adjust. This
means you can control who sees your profile page and other information you
share on the site.
Some people do not mind having their personal information available for
anyone to view online. However, we strongly recommend that you don't
publish your home address and be mindful of posting other personal
information about yourself (including your birthday), or others especially if
you don't have their permission.
Friends:
The whole point of joining social media websites is to be in touch with your
friends and family.
"Friends" in the context of social media, and Facebook in particular, has a
specific meaning.
For example, for you to interact online with a friend, family member or
associate either one of you must first send a "friend request" to the other and
then have that request accepted.
Once accepted, the technology recognises you as "friends" and you can
interact with each other online, so you can view the other person's profile
page, see their pictures, and send them messages.
Twitter:
It is an online social networking service that enables users to send and
read short 140- character messages called "tweets".
Registered users can read and post tweets, but those who are unregistered
can only read them.
Users access Twitter through the website interface, SMS or mobile
device app.
Twitter was created in March 2006 by Jack Dorsey, Evan Williams, Biz
Stone, and Noah Glass and launched in July 2006.
The service rapidly gained worldwide popularity; it was one of the ten
most-visited websites and has been described as "the SMS of the
Internet". As of March 2016, Twitter has more than 320 million monthly
active users.
Tumblr:
Tumblr is a micro-blogging and social networking website founded by
David Karp in 2007, and owned by Yahoo! since 2013.
The service allows users to post multimedia and other content to a short-
form blog.
Users can follow other users' blogs. Bloggers can also make their blogs
private.
Linkedin:
LinkedIn is a business-oriented social networking service.
It was Founded on December 14, 2002, and launched on May 5, 2003.
it is mainly used for professional networking.
As of 2015, most of the site's revenue came from selling access to
information about its users to recruiters and sales professionals.
As of March 2016, LinkedIn has more than 433 million users, out of which
more than 106 million are active.
Facebook:
Facebook is an online social networking service based in Menlo Park,
United States.
The Facebook website was launched on February 4, 2004 by “Mark
Zuckerberg”, along with fellow Harvard College students and roommates,
the founders had initially limited the website's membership to Harvard
students; however, later they expanded it to higher education institutions in
the Boston area.
Users can create a user profile, add other users as "friends", exchange
messages, post status updates and photos, share videos, use various
applications (apps), and receive notifications when others update their
profiles.
Additionally, users may join common-interest user groups organized by
workplace, school, or other topics, and categorize their friends into lists such
as "People from Work" or "Close Friends".
In groups, editors can pin posts to top.
Flickr:
Flickr is an image hosting and video hosting website and web services suite
that was created by Ludicorp in 2004 and acquired by Yahoo in 2005.
In addition to being a popular website for users to share and embed personal
photographs, and effectively an online community, the service is widely
used by photo researchers and by bloggers to host images that they embed in
blogs and social media.
Skype:
Skype is an application that provides video chat and voice call services.
Users may exchange such digital documents as images, text, video and any
others, and may transmit both text and video messages.
Skype allows the creation of video conference calls.
Skype is available for Microsoft Windows, Macintosh, or Linux, as well as
Android, Blackberry, and both Apple and Windows smart phones and
tablets.
Skype Credit or a subscription is required to call a landline or a mobile
phone number.
At the end of 2010, there were over 660 million worldwide users, with over
300 million estimated active each month as of August 2015.
Yahoo!:
Yahoo is an American multinational technology company headquartered in
Sunnyvale, California.
It is globally known for its Web portal, search engine Yahoo! Search, and
related services, including Yahoo! Directory, Yahoo! Mail, Yahoo! News,
Yahoo! Finance, Yahoo! Groups, Yahoo! Answers, advertising, online
mapping, video sharing, fantasy sports and its social media website.
It is one of the most popular sites in the United States. Yahoo was founded
by Jerry Yang and David Filo in January 1994 and was incorporated on
March 2, 1995. Marissa Mayer, a former Google executive, serves as CEO
and President of the company.
YouTube:
YouTube is a global video-sharing website headquartered in San Bruno,
California, United States.
The service was created by three former PayPal employees in February
2005.
In November 2006, it was bought by Google for US$1.65 billion.
YouTube now operates as one of Google's subsidiaries.
The site allows users to upload, view, rate, share, and comment on videos,
and it makes use of WebM, H.264 / MPEG-4 AVC, and Adobe Flash Video
technology to display a wide variety of user-generated and corporate media
video.
Available content includes video clips, TV clips, music videos, movie
trailers, and other content such as video blogging, short original videos, and
educational videos.
Whatsapp:
WhatsApp Messenger is a proprietary cross-platform, encrypted, instant
messaging client for smartphones.
It uses the Internet to send text messages, documents, images, video, user
location and audio messages to other users using standard cellular mobile.
As of February 2016, WhatsApp had a user base of one billion, making it the
most popular messaging application.
WhatsApp Inc., based in Mountain View, California, United States, was
acquired by Facebook Inc. on February 19, 2014, for approximately US$19.3
billion.
UNIT-2
E-Mail:
E-Mail or electronic mail is a system for sending messages from one
individual to another via telecommunications links between computers or
terminals using dedicated software.
The sender and receiver must have email addresses to share their data.
Advantages and disadvantages:
Advantages:
As in the early days of the telephone, the original users of email only had a
limited number of people whom they could communicate.
Now that email is more prevalent, some of the advantages of using email
are:
1. Convenience: there are not trips to post office and no need to search for
stationary and stamps. Sending information through email is easy.
2. Speed: email is fast, based on the speed of the underlying communication
network.
3. Inexpensive: once you are on-line, the cost of sending a message is small.
4. Printable: a hard copy is easy to obtain.
5. Global: increasingly, people and business all over the world are using email.
Disadvantages:
Despite all of the advantages, we should bear in mind that not everyone
everywhere has access to email.
Although the telephone is not truly universal either, it still far outdistances
email in terms of its worldwide availability.
1. Misdirection: with email, you are your own worst enemy. It is far more
likely that you will accidentally send email to an unintended recipient than it
is for someone actually to intercept your email.
2. Forgery: email does not preclude forgeries, that is, someone impersonating
the sender, since the sender is usually not authenticated in any way.
3. Overload: email can also be too convenient and result in a flood of mail.
4. Junk: another more recent negative development involves junk email. This
flooding of undesirable or inappropriate email is sometime referred to as
spam and is becoming serious problem.
5. No response: A mild frustration sometimes associated with using email is
dealing with recipients who do not read and respond to their email on a
regular basis.
Mailers:
A mailer is the software that allows you to manage, read, and compose
email.
Examples for mailers are: gmail.com, mail.yahoo.com, rediffmail.com,
ymail.com, etc.
Message components:
An email message consists of the following general components:
Headers:
The message headers contain information concerning the sender and
recipients.
The exact content of mail headers can vary depending on the email system
that generated the message.
Generally, headers contain the following information:
1. Subject. Subject is a description of the topic of the message and displays in
most email systems that list email messages individually.
2. Sender (From). This is the sender's Internet email address. It is usually
presumed to be the same as the Reply-to address, unless a different one is
provided.
3. Date and time received (On). The date and time the message was received.
4. Reply-to. This is the Internet email address that will become the recipient of
your reply if you click the Reply button.
5. Recipient (To :). First/last name of email recipient, as configured by the
sender.
6. Recipient email address. The Internet mail address of the recipient, or where
the message was actually sent.
7. Attachments. Files that are attached to the message.
8. Body: The body of a message contains text that is the actual content, such as
"Employees who are eligible for the new health care program should contact
their supervisors by next Friday if they want to switch." The message body
can also include signatures or automatically generated text that is inserted by
the sender's email system.
3. In the CC box (carbon copy) type the email addresses you want to receive
a copy of the email. (A recipient who is CC is able to see and correspond
with the other recipients of the message.)
4. In the BCC box (blind carbon copy) type the email addresses you want to
receive a copy of the email. (The email addresses of recipients who are BCC
will not appear in the headers of the message.)
5. Type a brief description of the email message in the Subject box. For
example, if you're sending out a recipe for oatmeal cookies, the subject
might be "My oatmeal cookies recipe".
6. Type the body of the email message.
7. If you wish to add a signature to your email, select one from the Signature
pull-down menu.
8. If you wish to attach files to this message, use the Browse buttons at the
bottom of the page to choose files from your hard drive. You can include up
to three attachments with a message.
9. If you want to send your email message now, click Send.
10. If you want to send your email message later, or work on it more at a
later time, click Save as a draft and you'll be able to retrieve it from the
Drafts folder later.
Mail management:
Email management is a systematic approach to maximizing the efficiency of
email practices and minimizing the negative effects that email handling can
have on an individual's productivity and job satisfaction.
Tips for effective email management include:
1. Limiting the number of times you process mail in a day.
2. Limiting the amount of time you dedicate to processing email in a given
session.
3. Only keeping your email program open while you are actively dealing with
it.
4. Checking email only when you are going to process it.
5. Deleting as many messages as possible immediately.
6. Responding immediately to messages that can be answered very briefly.
7. Moving messages to be dealt with later to a separate folder.
8. Responding to only emails that require responses.
9. Limiting recipients to as few individuals as possible.
10. Keeping responses brief.
11. Deleting all messages that are not archived after a specific amount of time.
Introduction to G-Suite:
G Suite gives your business two things:
1. Gmail accounts for everyone at your company
2. A suite of office software for your company
We will get these tools with G Suite:
1. Gmail – email
2. Google Calendar – calendar tool
3. Google Docs – cloud word documents
4. Google Sheets – cloud spreadsheets
5. Google Slides – cloud presentations
6. Google Drive – cloud storage for all your documents
7. Google Meet – video conferencing tool
8. Google Forms – survey tool
G Suite is like Microsoft Office with everything in the cloud, plus you get a
company Gmail.
What’s the Difference between G Suite and Gmail?
Basically, Gmail is free and for individuals. G Suite is paid and for
companies.
With Gmail, you get a personal email account, some storage in Google
Drive, and access to apps like Google Docs, Slides, and Sheets.
All for free.
The storage space is limited and you can’t add additional users.
You’re also stuck with an email address that looks like [email protected].
G Suite gives your entire company access to Gmail accounts and the suite
of office products.
You’ll be able to easily manage users with G Suite Admin, get more storage
in Google Drive, and have email addresses that look like
[email protected].
But you have to pay a monthly fee for each user at your company.
Google Drive
Google Drive is a free service from Google that allows you to store files
online and access them anywhere using the cloud.
Google Drive also gives you access to free web-based applications for
creating documents, spreadsheets, presentations, and more.
Google Drive is one of the most popular cloud storage services available
today.
Because files can be accessed from any computer with an Internet
connection,
Drive eliminates the need to email or save a file to a USB drive.
Google Drive allows you to share files; working with others becomes much
easier.
Creating a Google account In order to use Google Drive, you will need a
Google account.
Google accounts are free, and signing up for one is fairly simple.
In order to create a Google account, you'll need to enter some information,
including your name, birth date, and location.
Creating a Google account will automatically create a Gmail email address
and a Google+ profile.
If you have a Gmail address, you already have a Google account, so you
won't need to create an account— you can simply sign in to Drive using
your Gmail information.
How to create Google account:
To create a Google account:
1. Go to www.google.com Locate and select the Sign in button in the top-
right corner of the page.
3. The sign-up form will appear. Follow the directions and enter the
required information.
4. Next enter your phone number. Google will send a verification code to
your phone that you will use to complete the sign up process.
5. Enter the verification code sent to your phone and click Verify.
6. The personal information page will appear. Follow the directions and
enter your information, including your birth date and gender.
7. Review Google's Terms of Service and Privacy Policy, then click I agree
2. Your new file will appear in a new tab on your browser. Locate and select
untitled document in theupper-left corner.
3. The Rename dialog box will appear. Type a name for your file, then click
OK.
4. Your file will be renamed. You can access the file at any time from your
Google Drive, where it will be saved automatically. Simply double-click
to open the file again.
5. You may notice that there is no Save button for your files. This is because
Google Drive uses autosave, which automatically and immediately saves
your files as you edit them.
6. You may notice that there is no save button. This is because Google
Drive uses autosave, which automatically and immediately saves your files
as you edit them.
Google Slides
Google Slides allows you to create dynamic slide presentations.
These presentations can include animation, narration, images, videos, and
much more.
Google Slides interface and the basics of setting up your document,
including the menu and shortcut toolbars, zoom settings, and choosing a
theme.
The Google Slides interface when you create a new presentation in Google
Slides, the interface for Slides will appear.
This interface displays the toolbar, along with the main view of your
presentation.
It allows you to create and modify slides, choose a theme, and share the
presentation with others.
Click the buttons in the interactive below to learn about the interface for
Google Slides.
Choosing a theme when you first create a new presentation, Google Slides
will prompt you to choose a theme.
Themes give you a quick and easy way to change the overall design of your
presentation.
Each theme has a unique combination of colors, fonts, and slide layouts.
Select a theme from the panel on the right side of the window, and it will be
applied to your entire presentation.
You can choose from a variety of new themes at any time, giving your
entire presentation a consistent, professional look.
If you want to change your theme, you can open the Themes panel again by
clicking the Theme command on the shortcut toolbar.
The Google Slides interface uses a traditional menu system with a shortcut
toolbar.
The menus contain commands grouped by function.
The shortcut toolbar has buttons for some frequently used commands.
Within the View drop-down menu, hover over Zoom and there you will see
options to set the zoom more precisely.
Playing the presentation When you are ready to show your presentation—
or if you want to see what it will look like during a presentation—click the
Present button to the right of the menus.
You can also click the drop-down arrow for additional presentation options
Google forms.
Google Forms allows you to create your own custom online forms and send
them to others.
These forms can include surveys, quizzes, sign-ups, and more. When
someone completes the form, the responses will be stored in a Google
Sheets spreadsheet.
An easy way to access Google Forms is through Google Drive.
1. Click the new button.
Types of Firewall
There are various types of Firewalls.
1.Packet Filtering Firewall
One of the oldest types of Firewall
This type of Firewall creates a checkpoint at the traffic router. Only the
secure and verified IP address or networks are allowed for the further flow
of data
The data packets are not verified, i.e. the information or data is not opened at
the Firewall stage
They are easy to use and do not overload the device and do not affect its
processing or functioning speed
2. Application Level Gateway Firewall
It is also known as Proxy Firewall
When the user connects with the destination server, it forms a connection
with the application gateway
The proxy then connects with the destination server and takes up the
decision of forwarding the data packets
It is a bit more secure in comparison to Packet Filtering Firewall
Strong Memory and processors are required for using this Firewall
3. Circuit Level Gateway Firewall
This works as the Sessions layer of the OSI Model
Using this, two Transmission Control Protocol (TCP) connections can be set
up together
It can easily let the flow of data packets continue without consuming major
computer resources
These Firewalls are not much efficient as they do not check the data packets
and incase a data packet comprises malware, it will allow it to pass if the
TCP connections are successfully done
4. Stateful Inspection Firewall
It is a combination of data packet inspection and TCP connection. Until both
the fields are verified, the information cannot be approved
They are less straining for the computer resources
However, they are a bit slow in comparison to other Firewalls
5. Next-Generation Firewall
The recently launched Firewall systems are known as the Next-Gen
Firewalls
Under this, the data packets are also thoroughly checked before being passed
on to the destination address
These are still on the platform of improving and evolving and intend to use
modern technology for automatic detection of errors and network safety
6. Software Firewall
Any firewall which is installed in a local device or a cloud server is called a
Software Firewall
They can be the most beneficial in terms of restricting the number of
networks being connected to a single device and control the in-flow and out-
flow of data packets
Software Firewall also time-consuming
7. Hardware Firewall
They are also known as Physical-appliance based firewalls
It ensures that the malicious data is stopped before it reaches the endpoint of
the network at risk
Cryptography
Cryptography is technique of securing information and communications
through use of codes so that only those people for whom the information is
intended can understand it and process it. Thus preventing unauthorized
access to information.
The prefix “crypt” means “hidden” and suffix graphy means “writing”.
In Cryptography the techniques which are use to protect information are
obtained from mathematical concepts and a set of rule based calculations
known as algorithms to convert messages in ways that make it hard to
decode it.
These algorithms are used for cryptographic key generation, digital signing,
and verification to protect data privacy, web browsing on internet and to
protect confidential transactions such as credit card and debit card
transactions.
Features Of Cryptography
1. Confidentiality: Information can only be accessed by the person for whom
it is intended and no other person except him can access it.
2. Integrity: Information cannot be modified in storage or transition between
sender and intended receiver without any addition to information being
detected.
3. Non-repudiation: The creator/sender of information cannot deny his or her
intention to send information at later stage.
4. Authentication: The identities of sender and receiver are confirmed. As
well as destination/origin of information is confirmed.
Types of Cryptography:
In general there are three types of cryptography:
1. Symmetric Key Cryptography:
It is an encryption system where the sender and receiver of message use a
single common key to encrypt and decrypt messages.
Symmetric Key Systems are faster and simpler but the problem is that
sender and receiver have to somehow exchange key in a secure manner.
The most popular symmetric key cryptography system is Data Encryption
System (DES).
2. Hash Functions:
There is no usage of any key in this algorithm.
A hash value with fixed length is calculated as per the plain text which
makes it impossible for contents of plain text to be recovered.
Many operating systems use hash functions to encrypt passwords.
3. Asymmetric Key Cryptography:
Under this system a pair of keys is used to encrypt and decrypt information.
A public key is used for encryption and a private key is used for decryption.
Public key and Private Key are different.
Even if the public key is known by everyone the intended receiver can only
decode it because he alone knows the private key.
Digital signatures
The full form of DSC is the Digital Signature Certificate.
DSC is a protected digital key provided by the certifying authorities to
verify and confirm the identity of the individual keeping such certificate.
Digital signatures use the authentication of the public key to build the
signature.
DSC contains information on the user’s profile, pin code, nation, email
address, certificate issuance date and the certifying authority’s name.
Types of DSC
The type of client and the purpose for which the DSC is acquired determines
the Class of DSC to be applied.
There are three types of DSC available
1. Type 1 Certificates
These are given to the person or private users that are used to verify that
perhaps the recipient’s name and contact details from the clearly specified
subject area in the certifying agency‘s database.
2. Type 2 Certificates
These are issued to the director or signatory authority of the organizations
for e-filing with ROC (Registrar of Companies).
Type 2 certification is mandatory for people who have had to sign manual
documents when submitting ROC returns.
3. Type 3 Certificates
These certificates are used for online participation or bidding at online
tenders & e-auctions all around India.
Sellers wishing to participate in online bidding should have a Type 3 digital
signature certificate.
Advantages of DSC
1. It can be used to verify personal details and knowledge of an entity when
doing business online.
2. You can sign a digital format of a PDF file and start sending it to the
receiver, rather than signing and scanning a hard copy of the file to mail it.
In reality, it is not mandatory for the owner of the digitally signed certificate
to physically present a company for the approval.
3. Everywhere in India, these documents are used for online participation or
bidding at e-auctions and online tenders. Vendors wishing to engage in
online bidding must have a Class 3 digital certificate.
How do digital signatures work?
Digital signatures, like handwritten signatures, are unique to each signer.
Digital signature solution providers, such as DocuSign, follow a specific
protocol, called PKI.
PKI requires the provider to use a mathematical algorithm to generate two
long numbers, called keys.
One key is public, and one key is private.
When a signer electronically signs a document, the signature is created using
the signer’s private key, which is always securely kept by the signer.
The mathematical algorithm acts like a cipher, creating data matching the
signed document, called a hash, and encrypting that data.
The resulting encrypted data is the digital signature.
The signature is also marked with the time that the document was signed.
If the document changes after signing, the digital signature is invalidated.
To protect the integrity of the signature, PKI requires that the keys be
created, conducted, and saved in a secure manner, and often requires the
services of a reliable Certificate Authority (CA).
Digital signature providers, like DocuSign, meet PKI requirements for safe
digital signing.
Copyright issues
Copyright is a type of intellectual property that applies to creative work.
It is a legal right that gives exclusive rights to the creator of an original work
to use and distribute it.
It has to be revised from time to time.
The issue with copyright is that it only safeguards the expression of ideas by
the creator and not the underlying idea.
Works of literature, music or art (barring Photographs) are granted the
protection of copyright for a period which spans the creator's life and 60
years from the year of the author's demise.
Copyright issues include Copyright infringement.
Copyright infringement is using works protected by copyright law without
prior permission, breaching certain exclusive rights granted to the copyright
holder, such as the right to reproduce, distribute, display or perform the
protected work.
With the internet era going on, anything you take off the web is copyrighted.
Hence, to avoid such infringement issues, one must have the knowledge of:
1. The Copyright law:
One must have complete information of the law.
This will prove to be helpful when you will be able to distinguish plagiarism
from authentic copying.
If someone writes something from your work but gives due credit to you,
you cannot put him under the scanner.
You must also have the ability to examine what all copyright does not
protect.
Hence, knowledge of the law is required if you want to safeguard your work
properly.
2. Creativity:
One must be creative enough to make sure he himself is not creating
something that is already available on the internet.
Although copyright does not protects the underlying idea but fictional
characters, storyline and the likes are guarded.
Thus, the bulb of creativity must glow the brightest.
3. Know the difference between different intellectual properties:
There is a legit difference between copyright, trademark and patent.
Copyright safeguards your creative work, trademark gives you exclusive
right over a logo, symbol or a name, and patent excludes others from
manufacturing or trading an invention.
Therefore, absolute knowledge of the kinds of intellectual property plays an
important role in handling various copyright issues.
Hence, copyright comes with a lot of responsibilities.
Copyright Law of India
1. The Copyright Act of 1957 was the first legislation regarding Copyright in
Independent India. To this date, the law has been amended six times (the
latest being the Copyright Amendment Act, 2012)
2. India is a member of some of the most important international conventions,
such as the Universal Copyright Convention. These international bodies deal
with anything regarding copyright laws.
3. The rights covered under the Copyright laws include: – the right to
reproduce copyrighted work, communicate your work to the public,
adaptation and translation of the work.
4. The Indian Copyright Laws protect literary works, musical works, dramatic
works, artistic works, sound recordings and cinematography.
5. The Copyright Act of 1957 provides three kinds of remedies: administrative,
civil and criminal
6. The criminal remedies are covered under Chapter XIII of the statute and the
penalties upon infringement include imprisonment of up to 3 years along
with a fine of up to Rs.200,000
7. Copyrights of works of the countries mentioned in the International
Copyright Order are protected in India as if such works are Indian works.
The term of copyright in a work shall not exceed that which is enjoyed by it
in its country of origin.