0% found this document useful (0 votes)
50 views19 pages

Societal Impacts Class 12 IP

The document discusses the concept of digital footprints, which are records of online activities, and categorizes them into active and passive types. It emphasizes the importance of netiquette, data protection, and intellectual property rights, including copyright, patents, and trademarks. Additionally, it addresses cybercrime, e-waste management, and the ethical use of digital technologies.

Uploaded by

Priyani Blessy
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
50 views19 pages

Societal Impacts Class 12 IP

The document discusses the concept of digital footprints, which are records of online activities, and categorizes them into active and passive types. It emphasizes the importance of netiquette, data protection, and intellectual property rights, including copyright, patents, and trademarks. Additionally, it addresses cybercrime, e-waste management, and the ethical use of digital technologies.

Uploaded by

Priyani Blessy
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 19
ERE EEE EEE EEE EEE EIDE EI II II IDI II III II II III IIS II EIEN ED EE IT Societal Impacts and Data Protection Fastracl« Revision > Digital Footprints: A digital Footprint is the record or trail left by the things one does online. The social media activity, the information on personal website, the browsing activities, online subscriptions, any photo galleries and videos uploaded by a user essentially, any activity carried out on the internet makes the digital Footprint of a user. Digital Footprints are the records and traces individuals’ activities as they use the internet. Digital footprints are permanently stored. It includes websites we visit, emails we send, and any information we submit online, etc., along with the computer's IP address, location, and other device specific details > Types of Digital Footprints: There are two kinds of digital Footprints: Active digltal Footprints and Passive digital Footprints. > Active Digital Footprints: Active digital footprints which includes data that we intentionally submit online. This would include emails we write, or responses or posts we make on different websites or mobile Apps, etc > Passive Digital Footprints: The digital data trall we leave online unintentionally is called passive digital Footprints, This includes the data generated, when we visita website, use a mobile App, browse internet, etc > Digital Society and Netizen: Digital society reflects the growing trend of using digital technologies in all spheres of human activities. Anyone who uses digital technology along with internet is a digital citizen or a netizen. Being a good netizen means practicing safe, ethical and legal use of digital technology. A responsible netizen must abide by net etiquettes, communication etiquettes and social media etiquettes. > Net Etiquettes: The word netiquette, derives from the combination of words -'net’ (internet) and ‘etiquette’. It refers to online manners while using internet or working online. One should be ethical, respectful and responsible while surfing the internet, C7. Coenen) ote > Mshavethe Since > Be Ethical > No Copyright Violation: We should not use copyrighted materials without the permission of the creator or owner. As an ethical digital citizen, we need to be careful while streaming audio or video or downloading images and files From the internet. > Share the Expertise: It is good to share information and knowledge on internet so that others can access it However, prior to sharing Information, we need to be sure that we have sufficlent knowledge on that topic. The information shared should be true and unambiguous. > Be Respectful: > Respect Privacy: As good digital citizens we have the right to privacy and the Freedom of personal expression. At the same time, we have to understand that other digital citizens also have the same rights and Freedoms. > Respect Diversity: In 8 group or public forum, we should respect the diversity oF the people in terms of knowledge, experience, culture and other aspects > Be Responsible: > avoid Cyber Bullying: Any insulting, degrading or intimidating online behaviour ike repeated posting of rumours, giving threats online, posting the victim's personal information, sexual harassment or comments aimed to publicly ridicule a victim is termed as cyber bullying, > Don't Feed the Troll: An internet troll is a person who deliberately sows discord on the internet by starting quarrels or upsetting people, by posting inflammatory or off topic messages in an online community, just for amusement. > Communication Etiquettes: Digital communication Includes emall, texting, Instant messaging, talking on the cell phone, audio or video conferencing, posting on Forums, social networking sites, ete. > Be Precise: > Respect Time: We should not waste precious time in responding to unnecessary emails or comments unless they have some relevance For us. > Respect Data Limits: For concerns related to data and bandwidth, very large attachments may be avoided. Rather send compressed files or link of the files through cloud shared storage Uke Google Drive, Microsoft OneDrive, etc. > Be Polite: Whether the communication Is synchronous (happening in real time like chat, audio/video calls) or asynchronous like emall, Forum post or comments, we should be polite and non-aggressive In our communication. : > Be Credible: We should be cautious while making a comment, replying or writing an email or Forum post as such acts decide our credibility over a period of time. Social Media Etiquettes: Social media are websites or applications that enable their users to participate in social networking by creating and sharing content with others in the community. These platforms encourage users to share their thoughts and experiences through posts or pictures. > Be Secure: * Choose password wisely: It is vital for social network users. News of breaching or leakage of user data From social network often attracts headlines. Never share personal credentials like username and password with others. > Know who you befriend: We need to be careful while befriending unknown people as their intentions possibly could be malicious and unsafe. > Beware of Fake Information: We should apply our knowledge and experience to validate such news, message or post. > Bo Reliable: * Think before uploading: We need to be cautious \while uploading or sending sensitive or confidential files which have a bearing on our privacy. Data Protection: In this digital age, data or information protection Is mainly about the privacy of data stored digitally. Elements of data that can cause substantial harm, embarrassment, inconvenience and unfairness to an individual, if breached or compromised, is called sensitive data. Intellectual Property Right (IPR): These are the rights oF the owner of Information to decide how much information isto be exchanged, shared or distributed. Also, it gives the ‘owner a right to decide the price For doing so. intellectual property Is legally protected through copyrights, patents, trademarks, etc. > Copyright: Copyright grants legal rights to creators for their original works like writing, photograph, audio recordings, video, sculptures, architectural works, computer software, and other creative works like literary and artistic work. > Patent: A patent is usually granted for inventions. Unlike copyright, the inventor needs to apply (file) For patenting the Invention. When a patent is granted, the ‘owner gets an exclusive right to prevent others from using, selling.or distributing the protected invention. > Trademark: Trademark includes any visual symbol, word, name, design, slogan, label, etc., that distingulshes the brand or commercial enterprise, from other brands or commercial enterprises. Licensing: Licensing is the legal term used to describe the terms under which people are allowed to use the copyrighted material. Violation of IPR: Violation of Intellectual property right may happen in one of the Following ways: > Plagiarism: It means using other’s work and not giving adequate cltatlon For use. > Copyright Infringement: It means using another person's work, without permission or without paying For it if itis being sold. > Trademark Infringement: It means unauthorised use of other's trademark on products and services. An owner of a trademark may commence legal proceedings against someone who infringes Its registered trademark. Public Access and Open Source Software: Open source Ucenses help others to contribute to existing work or project without seeking special individual permission to do so. The GNU General Public License (GPL) and the Creative Commons (CC) are two popular categories of public licenses. GPL: It is the most widely used free software license which grants the recipients, rights to copy, modify and redistribute the software and that the same rights are preserved in all derivative works. CC Liconses: tis a set of copyright licenses that give the recipients, rights to copy, modify and redistribute the creative material, but giving the authors, the Uberty to decide the conditions of licensing, Cybercrime: It is defined as 2 crime in which computer is the medium of crime (hacking, phishing, spamming), or the computer Is used as a tool to commit crimes (extortion, data breaches, theft) Hacking: Its the act of unauthorised access toa computer, computer network or any digital system. Hackers usually have technical expertise of the hardware and software. They look for bugs to exploit and break into the system. Ethical Hacker: Hacking, when done with a positive intent, is called ethical hacking. Such ethical hackers are known as white hat hackors. They are specialists in exploring any vulnerability or loophole by during testing ofthe software. Non-ethical Hacker: A non-ethical hacker is the one who trlas to gain unauthorised access to computers or networks in order to steal sensitive data with the intent to damage or bring down systems. They are called black hat hackers or crackers. Phishing: itis an unlawful activity where Fake websites or emails that look original or authentic are presented to the User to fraudulently collect sensitive and personal detalls, particularly usernames, passwords, banking and credit card detalls. Identity Theft: Identity thieves increasingly use personal information stolen from computers or computer networks, to commit fraud by using the data gained unlawfully. Given below are a Few examples: > Financial Identity Theft: When the stolen identity Is Used for financial gain. > Criminal Identity Theft: Criminals use a victim's stolen identity to avold detection of their true Identity. > Medical Identity Theft: Criminals can seek medical drugs or treatment using a stolen identity. i - ee > Ransomware: This is another kind of cybercrime where the attacker gains access to the computer and blocks the user from accessing, usually by encrypting the data. The attacker blackmalls the victim to pay For getting access to the data, or sometimes threatens to publish personal and sensitive information or photographs unless a ransom is, pad > Combatting and Preventing Cybercrime: Following points can be considered as safety measures to reduce the risk of cybercrime: > Take regular backup of important data. > Use an antivirus software and keep it updated always. > avoid installing pirated software. Always download software from known and secure (HTTPS) sites. > Always update the system software which include the internet browser and other application software. > Do not visit or download anything from untrusted websites, > Digital Signatures: They are the digital equivalent of 2 paper certificate. Digital signatures work on a unique digital 10 issued by a Certificate Authority (CA) to the user. Signing a document digitally means attaching that user's Identify, which can be used to authenticate. > Indian Information Technology Act (IT Act): The Government of India's Information Technology Act, 2000 {also known as IT Act), amended in 2008, and provides guidelines to the user on the processing, storage and transmission of sensitive Information. > E-waste Hazards and Management: E-waste or Electronic waste includes electric or electronic gadgets and devices that are no longer in use. Hence, discarded computers, laptops, mobile phones, televisions, tablets, music systems, speakers, printers, scanners, etc. constitute e-waste when they are near or end of thelr useful life > Leaching: It is the process of removing a substance from ‘another substance by passing water through it. > Managoment of E-waste: E-waste management Is the efficient disposal of E-waste. Some of the Feasible methods of e-waste management are reduce, reuse and recycle: > Reduce: We should try to reduce the generation of e-waste by purchasing the electronic or electrical devices only according to our need > Reuse: It Is the process of reusing the electronic or electric waste after slight modification. The process of reselling old electronic goods at lower prices Is called ‘refurbishing, > Recycle: Recycling is the process of conversion of electronic devices into something that can be used again and again in some or the other manner. > E-waste Management india: in india, the Environmental Protection Act, 1986, has been enacted to punish people responsible For causing any Form of pollution by paying For the damage done to the natural environment. x Practice Exercise -Q Multiple choice Questions QL Asoftware that can be freely accessed and modified is called. : a. Synchronous software b. Package software c Open Source software . Middleware Q2. Data which has no restriction of usage and is freely available to everyone under Intellectual Property Rights Is categorised as: @. open source b. open data C open content d. open education Which of the following is an advantage of ‘open source’ software? a. You can edit the source code to customise it b. You need to be an expert to eult code. C You have to pay. d.Can sometimes be too generic for specialist purposes. Q4. Which of the following is an disadvantage of ‘open source’ software? a. High quality software with lots of features b. Not as customisable. c May not have been tested as much as proprietary software. so might have bugs. d. You can edit the source cade to customise it Q3. Q5. Which of the following is an advantage of proprietary’ software? a. tis usually free. b. Thoroughly tested because people are paying to use it. . Not as customisable. d.Can sometimes be too generic for specialist purposes. Which of the following is on disadvantage of ‘proprietary’ software? a. You need to be an expert to edit code b. You have to pay for this type of software. © Its licensed, 4. It is launched after proper testing. Q7. The generally recognised term for the government protection afforded to intellectual property (written and electronic) Is called ‘a. Computer security law b. Aggregate Information c. Copyright law . Data security standards 8. Which of the following would be a creative work protected by copyright? 2. A list of all Indian President names b. A portrait of your family. ¢. A song you wrote. d. The name of your pet dog, Qo. | | | SEEDED IEEE EEE IEEE EI IDI II EI EI EI I IDI II III IDI IID II II IS IE SE Quo. giz Qs. Qu. Qus, Qs. Q9. The digital footprint that we leave online unintentionally is called: (case 2023) a. Active digital footprint b. Passive digital footprint c True digital footprint d. False digital footprint Which of the following is not done by cyber criminals? a Unauthorised account access. b. Mass attack using Trojans as botnets. c Emall spoofing and spamming, d. Report vulnerability in any system. QL What is the name of the IT law that India is having in the Indian legislature? a. India's Technology (iT) Act. 2000 b. India’s Digital Information Technology (OMT) Act 2000 C India's Information Technology (FT) Act. 2000 d. The Technology Act. 2008 What is meant by the term cybercrime’? a. Any crime that uses computers to |eopardise or attempt to jeopardise national security. b. The use of computer networks to commit financlal or identity fraud. © The theft of digital Information d. Any crime that involves computers and networks. E-waste is responsible for the degradation of our environment if not properly treated of disposedoff. Some of the feasible methods of e-waste management are redUCe, wnmmnnnnnnninne and recycle. [case 2023) a. reuse b. recheck € resubmit d. regular When e-waste such as electronic circuit boards are burnt for disposal, the elements contained in them create 2 harmful chemical called . which causes skin diseases, allergies and an increased risk of lung cancer. [cose Sap 2023-24) a. Hydrogen bb Beryllium © Chlorine Oxygen A software company purchases new computers every year and discards the old ones into the local dumping yard. Write the name of the most appropriate category of waste that the organisation is creating every year, out of the following options: a. business waste —_b, commercial waste solid waste d.e-waste The rights of the owner of information to decide how much information Is to be sharod/ exchanged/distributed, are collectively known as o (IPR). 2a, Intelligent Property Rights b, Intellectual Property Rights ¢. Interactive Property Rights d. Instance Property Rights qu. qi. Qu. Qz20. Qa. Q zz. 023. Q24, 025. .. Q26. 27. Stealing someone else's intellectual work and representing it as own. is called a Intellectual steal ——_b. Pluckism. Plagiarism . Pickism Copyright, Patent and Trademark comes under: [case sop 2023-24) a Intellectual Property Right b. Individual Property Right © Industrial Property Right d. None of the above By restricting the server and encrypting the data, a software company's server is unethically accessed in order to obtain sensitive information. The attacker blackmails the company to pay money for getting ‘access to the data, and threatens to publish sensitive information unless price is paid. This kind of attack is known as: [case sop 2023-24) a. Phishing bi. Identity Theft Plagiarism 0. Ransomware Aswnnnnennnnnn 18 2 unique data trace of a user's activities, actions, communic: in digital media. a. Digital Handprint —_. Digital Footprint © Offline Footprint ——_d. Offline Handprint Which of the following is not a type of cybercrime? [case sap 2021 Term-1) ions or transactions [BSE Sop 2021, Teru-1] a. Data theft b. Forgery of antine documents Damage to data and systems , Installing antivirus for protection 'F’in FOSS stands for [case sop 2021 Tarm-1) a Free b. Forever c Fire d. Freezing IPR stands for: [COSE SOP 2021 Tarm-1) a, Intelligent Property Rights b. Intellectual Property Reserve Intellectual Property Rights d. Intellectual Product Rights Which of the following is not a violation of IPR? 3. Plagiarism [CBSE SOP 2021 Term-1) b. Copyright Infringement c Patent d. Trademark infringement the practice of taking someone else's work or ideas and passing them off as one's own: [case Sop 2021 Ter a. Plagiarism b. Copyright c Patent d. All of these Following are the impact of e-waste on the environment. Choose the odd one out. 3. Soil Pollution '. Water Pollution ¢. Air Pollution d. Sound Pollution ‘Abdul deleted all his chats from all his social media accounts and he thinks that all hls traces are deleted completely. Is he right in thinking so? [c8SESp 2021 Term-t) a. Yes, b.No © May be 4d. Not sure 26. Q 29. Q30. QsL Q az. 9.33. 34. Q35. 36. : The legal and regulatory aspects of the internet refer to. [OSE SOP 2021 Term-1} b. Cyber crime d.tact is a cybercrime in which a target or targets are contacted by e-mail, telephone or text message by someone posing as a legitimate institution to lure individuals into providing sensitive data such 2s personally identifiable information, banking and credit card details and passwords. a. Plagiarism bb. Phishing € Cyberstalking . Hacking ‘Suhhani is confused about the free operating system available in the market. Few of her friends suggested a few operating systems. Help her in choosing free operating system for her device: [Cos€ SP 2021 Term-1) ‘a. Ubuntu b. Windows ¢ Mozilla Firefox d. Blender Consider the following statements with reference to the use of e-mai Statement 1: Sending threatening messages to a classmate. Statement 2: Inviting friends to parti school club or sports activity. Statement 3: Asking your teacher for help on homework. Statement 4: Responding to or forwarding spam emails. Which of the above statements refer to appropriate use of e-mail? [c05E Sop 2021 Torm-]] a. Statements 1and2 — b. Statements 2 and 3 Statements 3 and4 —d. Statements 2 and 4 ‘Saharsh isa student of class-9 and he Is a very frequent user of internet applications. One day he got an unpleasant message on his instant messenger. What do you think he should do? a. Cyber Space Criminal law ate in a [cBSE Sop 2021 Terw-1] a. Ignore it and start chatting ta someone else bb. Reply back to them and find out what their problem s. Shut down the computer and hope theyll leave him alone in future d. Go to his parents, teacher. or other trusted adult and let them know that he feels uncomfortable. Feasible method (s) to manage e-waste: [cBSE Sop 202) Terw-1] a. reduce b. reuse c recycle 0. All of these We should exhibit proper manners and etiquettes while being online. Choose the right net etiquette (s) from the following: [c8se SQp 2021 Torn] a. Avold Cyber Bullying b. Respect Other's Privacy No Copyright Violation d. All of these Linux, MySQL and Mozilla Firefox software come UNE snnnnnnsne BLEGOTY. (COSESOP 2021 Ter-3] a Proprietary b. FOSS c Freeware d. Shareware The digital trail which gets created as a person's internet usage using computers, smartphones, gaming consoles ete, is called @. Internet data b. Internet trait € Dighal footprint 4. €-footprint Qa. Q38. 39. Qo. Qa Qae. 943. Q44. Q4s. 46. is a non-profit organisation that aims to build a publicly accessible global platform where a range of creative and academic work is shared freely. [cBSE Sap 2023-24) a. Creative Cost b. Critical Commons © Creative Commons — d. Creative Common Legal term to describe the rights of a creator of original creative or artistic work Is called a. Copyright b. Copyleft < GPL d. None of these Aworm a. a slimy pink thing that lives in dict b.pleces of malicious code that make coples of themselves and spread through computers without human interaction an unsolicited e-mail message d. None of the above If you receive an email claiming to need your username and/or password, what should you do? ‘a. Report it as phishing/spam through your emall provider b, Delete the message Reply to the message with your email and password d. None of the above What should your response be if you receive an ‘email stating that you have won a lottery or received some Inheritance from an unknown person? ‘a Send them email asking for further procedure b. ignore it ¢ Mark it'as spam and block it d. None of the above A computer .. is a malicious code which self-replicates by copying itself to other programs. ‘a. program application Which of the following is a type of program that either pretends to have, or is described as having, a set of useful or desirable features but actually contains a damaging code? a. Trojans b. Viruses < Worm J. Adware Which of the following is the type of software that has self-replicating software that causes damage to file and system? a. Trojans b. Viruses Worm d. Adware Which of the following tracks your internet browsing habits and sends you popups containing advertisements related to the sites and topics you've visited? be virus d. worm a. Trojans b. Viruses Worm d. Adware Primary law in India for matters related to e-commerce and cyber crime is: [cose 2023) aT Act 1995 b. IT Act 2000 IT Act 1998 d. IT Act 2010 ee qa7. Q48. Q49. 50. Qs. Qs2. Q83. - With the outset of COVID-19 schools started online classes, but due to continuous online classes students health issues also started. Health practitioner advised the parents to follow a few health tips. Which of the following health tip should not be suggested? [BSE 2021 Term-1) ‘a. The sitting posture should be correct. b. Breaks should be taken in between the online classes ¢ To protect the eyes the gadgets should be placed above eye level. 4. Wash the eyes regularly The following is automatically granted to the creator or owner of any invention: [BSE 2021 Fernw-1) 2. patent b. trademark € copyright license Himanshi sets up her own company to sell her ‘own range of clothes on Instagram. What type of intellectual property can she use to show that the clothes are made by his company? (CBSE 2021 Ternt-1] a. Patents b. Design € Copyright d. Trademark Ramandeep Isa young woman with great aspirations and has a good team of like-minded people. She along with her team mombers started a company to sell handicrafts online and also designed a logo for their company. What type of intellectual property does this logo represent? [case 2023) a. Patents, b. Copyright c Design d. Trademark E-waste is becoming one of the fastest growing environmental hazards in the world today. If it is not properly treated or disposed of it can cause serious health hazards, therefore the has issued a formal set of guidelines for proper handling and disposal of e-waste. [€0SE 2021 Torm:1] a. Central Pollution Control Board (CPCE) b. Department of Information Technology (OIT) c Waste from Electrical and Electronic Equipment (WEEE) 4d. Information Communication Technology (ICT) Priyaisa student of class 10 and she is avery frequent user of internet applications. One day she got an unpleasant message on her instant messenger. What do you think she should do? (CBSE 2021 Tarm-1] 2. Start chatting with an unknown person. b. Talk to her parent/teacher or ather trusted adult and (et them know that she Is feeling uncomfortable Ignore the conversation d. She should delete the chat so that no ane comes to know. The primary law in India dealing with cybercrime and electronic commerce is: (CBSE 2021 Ternt-1] a. India’s Technology (IT) Act. 2008 b. India’s Digital Information Technology (OM) Act. 2000 India's Information technology (IT) Act. 4. The Technology Act, 2008 1000 Q54. Q58. Q56. Qs. 58. Q59. Q60. Consider the following statements with reference to Trademark and Hacking. Statement 1 : Trademark is a document that provides legally binding guidelines for the use and distribution of software. Statement 2 : Hacking is the act of unauthorised access to a computer network or any digital system. [c0St 2021 Terw-1] a. Statement 1is true, but Statement 2 is false b, Statement 1is false, but Statement 2 is true. € Both the Statements are True d. Both the Statements are False. There is only 1 day left for Ravisha to submit her Science project. Therefore, she performed the following activities to complete her task. Which of the following activities can be considered as plagiarism? [cose 2021 Term-1] a Downloaded the Images that were marked as CC and pasted in her project file b. Copied the content from some website and pasted Inher file. €. Copied the content from the website and gave references about the same in the project d.Downloaded and installed the open software for typing the synopsis. Acontract between the creator and the user to allow the user use his/her work with some price i [cose 2021 Term-1} a agreement b. copyright ¢ license d. patent Companies get their Trademark registered to protect? [cose 2021 Torm-3) source a, logos, names and brands b. word, phrase. or symbot c. slogans, stylised fonts, and colours 4. company furniture. worker. brands Rohit forgot his laptop In his car and when he came back he found his laptop was missing. This act is [cose 2021 Torm-1] a. cyber crime b. phishing © theft 4. plagiarism The rights of the owner of information to decide how much information Is to be shared/exchanged/ distributed are collectively known as [OSE 2021 Torm-1] a, Intelligent Portable Rights b Intellectual Property Rights ¢. Interactive Property Rights d. Instance Portability Rights Abhilasha forgot to sign out from her gmail id and Aditi used Abhilasha's gmail id to send mail. This act of Aditi is considered as: [c0Se 2021 Terne}} a. plagiarism b. Identify thert . phishing . piracy ee Q62. Which of the following is a type of cyberc Q6L The trail that is automatically created when a person uses the internet on any digital devices like Laptops, smart phones, tablets, etc is called: (CBSE 2021 Term-1] a. cyberbullying bb. phishing C digital Footprint di. digital Activity e where objectionable and demeaning comments are posted on social media platform about 2 person, such that he/she is mentally harassed? [c0se 2023] a. Phishing b. Hacking c Cyber bullying Identity Theft ’ Fill in the Blanks tyoe Questions Q63. OSS stands for 2 Q64. Any fraudulent business practice that extracts money from an unsuspecting, ignorant person is called a 3 Q65. wrnissnmstanennne is stealing someone else's intellectual work and representing it as your own without giving credit. Q.66. Any work/information that exists in digital form either on internet or on an electronic device, is known as. property. Q67. Discarded electrical or electronic devices are Q68. The least restrictive open source license is license. 69. The original code written by programmers for a software is known as... . Q70. srnsinennnnnnne Means NO price is to be pald for the software, IN & Reason type Questions y Directions (Q. Nos. 71-78): In the questions given below, there are two statements marked as Assertion (A) ond Reason (R). Read the statements and choose the correct option. a. Both Assertion (A) and Reason (R) are true and Reason (R)/s the correct explanation of Assertion (A) b.Both Assertion (A) and Reason (R) are true, but Reason (R) is not the correct explanation of Assertion (A). Assertion (A) is true, but Reason (R) is false. 4. Assertion (A) Is false, but Reason (R) is true Q7L. Assertion (A): Encryption is a secure technique to protect data being transmitted over a network. Reason (R): The sender of the information encrypts the data using a secret code and the specified receiver only can decrypt the data using the same or different secret code. Q72. Assertion (A): A digital signature is a form of electronic signature that authenticates a dacument ‘or transaction through encryption and password. Reason (R): Security certificate is also a unique digital identification that is used to verify the identity of an individual website or user. (7. Assertion (A): Session Electronic Transaction Is a secure protocol developed by MasterCard and Visa, in collaboration. Reason (R): The term ethics generally refers to a set of moral principles that govern the behaviour of an individual or a group of individuals. Q74. Assertion (A): Plagiarism, Cyber bullying, Hacking, Phishing, Spamming, Software piracy, Intellectual property rights are some common issues that are governed by computer ethics. Reason (R): Patent refers to the creations of the mind, which have both a moral and a commercial value. Q75. Assertion (A): Patent is a legal document that gives the inventor sole rights to make, sell or use an invention. Reason (R): Intellectual Property (IP) is a right that is granted by law to the creator or inventor for his original work. Q76. Assertion (A): A logo or symbol that Is printed on business items to make it exclusive, is known as a trademark. trademark is valid for seven years and can be renewed after that. Reason (R): Copyright covers literary and artistic establishments such as books, plays, novels, articles, music compositions and much more. Q77. Assertion (A): In Minimal plagiarism the original work is edited, reframed and reproduced. It is very common in the education field. Reason (R): Direct or complete plagiarism is the verbatim transcription of a section of someone else's work, without making any changes in the original work. Q78. Assertion (A): Digital assets that users create, and Which exist in any kind of digital form, for example, online or on storage media, constitute the digital property of users. Reason (R): The owners are the ones who only can decide in what form the assets can be sold, reused, modified, repurposed or applied in any other media other than what the assets were originally meant for. Answers * 1) 2b) 3{a) 4 (ce) 5. (b) 6.(b) Z(c) Bc) 9. (b) 10. (a) ma 1d) 13. (a) 4, (b) 15. (a) 16.(0) 7. (c) (a) 19. (d) 20. (b) 2.(d) 22. (2) 2B.(c) 24. (0) 25. (a) 26.(d) 27. (b) 28. (cd) 29. (b) 30. (a) Bub) 32. (d)_ 33. (d) 34 (d) 35. (b) 36.() 37. (c)_ 38. (a) 39. (b) 40. (a) 41 (c) 42. (dc) 43. (a) 44, (c) 45, (a) 46.(b) 47. (c) 48. (c) 49, (d) 50. (o) Su(a) 52. (b) 53. (c) 54, (b) 55. (b) 56.(c) 57. (a) 5B. (c) 59. (b) 60. (d) GL (c) 62. (c) 63.Open Source Software 64, Scan 65, Plagiarism 66. digital 67. e-waste 68..MiT 69, Source code 70. Freeware T(a) 72. (bd) 73. (d) -7A(c) 75. () 76.(d) 77. (db) 78. (b) : € Case Study Based Questions y Case Study 1 Q4 ‘Smridh has recently changed his school so he is not aware of the people, but someone is posting negative, demeaning comments on his social media profile. He is also geiting repeated mails from unknown people. Everytime he goes online, he finds someone chasing him online. Smridh Is a victim of . . a. eavesdropping b.stolen Identity c phishing d. cyber stalking ‘The action that Smridh should take: a. he should only share with his friends. b. he should not share with anyone as It can cause serious problem C he should immediately report to the police. d. he should bring to the natice of his parents and school authorities. is a set of moral principles that governs the behaviour of a group or individual and regulates the use of computers. a. Copyright b. Computer ethics c Property rights d. Privacy law Smridh needs to protect his personal Information or data from unintentional and intentional attacks and disclosure which is termed as... gs a. Digital right b. Copyright c Privacy d.intellectual property The act of fraudulently acquiring someone's personal and private information, such as online account names, login information and passwords Is called as Qn Qa. Qs. a. Phishing b. Fraud Scam d. Plagiarism . Answers + 1(d) 2(d) 3b) &(c) 5. (a) Case Study 2 The school offers WiFi to the students of Class XI For communication, the network security-staff of the school is having a registered URL "schoolwifi.edu* On 17th September 2017, emails were received by all the students regarding expiry of their passwords. Instructions were also given renew their password within 24 hours by clicking on purticular URL provided. On the bases of the above case study, answer the questions given below: Q1. Specify which type of cybercrime is it? a. Spamming bb. Phishing € Identity theft d Hacking Q2. URL stands for a. Universal Resource Loader b. Uniform Resource Locator ¢ United Research Loader d, Uniform Resource Loader Q3. Unsolicited commercial email is known as: a, malware b.virus c spam d. spyware (Q4. WiFi stands for a, Wireless Internet Frequent Interface b, Wireless Functioning ©. Wireless Fidelity d, Wire Free Internet Ideally, what characters should be used ina password to make it strong? a, Letters and numbers only b, Mixed Case (Upper and Lower) ©. Special characters 4. All of the above Q5. - Answers * 1.) 2(o) 3) 4() 5.4) Case Study 3 Sumit has to prepare a project on “Swachh Bharat Shreshtha Bharat”, He decides to get information from the internet. He downloads three web pages (web page 1, web page 2, web page 3) containing information on the given topic. (W He read a paragraph on from web page 1 and rephrased it in his own words. He finally pasted the rephrased paragraph in his project. (ii) He downloaded three images of from web page 2. He made a collage for his project using these images. iii) He also downloaded an icon from web page 3 and pasted it on the front page of his project report. QL. Step (i) an example o' a. plaglarism b. paraphrasing © copyright infringement 4, intellectual property right Q2. Step (i) an act of. a. plagiarism b. copyright infringement ¢. Intellectual property right d. digital footprints 8. Step (iii) an act of. a. plagiarism b. paraphrasing . copyright infringement 4. intellectual property right Qa. Awebsite Is a collection Of wusmmnnnee a, web servers b. wab pages . browsers, d. hyperlinks yp Qs. The process of getting web pages, images and files from a web server to local computer is called: Qu Qa. 93 a4. Qs. a. FIP b.uploading c downloading, demote access Answers 10) 2@ ad 40) 50 Case Study 4 Cyber ethics in E-Commerce: The branch of ICT that allows selling or buying things online, is known as e-commerce. The process of buying and selling of products or services over electronic systems and using communication technology like internet is defined as e-commerce. It is generally regarded as the sales and commercial function of e-business Now, many businesses are running online with the help of the internet, and a substantial increase has been observed in the level of trade and business conducted electronically E-commerce not only covers buying or selling, rather a wide variety of commerce including electronic funds transfer, supply chain management, internet marketing, online transaction processing, Electronic Data Interchange (EDD, ete. Which of the following describes e-commerce? 2. Doing business electronically b. Buying goods only C Sale of goods anly 4. Allof the above E-Commerce stands for: a. electronic Commerce b. electronic Data Exchange electric Data Exchange 4. electronic Commerciallsation Legal recognition for transactions are carried out by: 2. electronic data interchange b. electronic data exchange ¢ electronic data transfer 4. electrical data interchange Which of the following is related to cyberethics? 2. Ethics In the online enviranment b. Online gaming © Ethics at school 4. Telecommunications Selling or buying stuff online, is known as... a. E-commerce bo. Plagiarism Digital property d. Authenticity Answers. + _ L(a) 2) 3) 4) 5) Case Study 5 Requirements for Safe E-Commerce Transactions: In addition to the benefits gained from the e-commerce branch of ICT, there are many security concerns and other issues that prevent QL Qa. Q3, Qa Qs. people to take its maximum benefits. Security is an essential part of any electronic transaction that takes place over the internet. Clients will lose their faith in e-business if its security is compromised. At the time of buying some objects online, we are generally asked to enter our personal information such as name, delivery address (house address), credit card or debit card details, etc. Information should not be hampered or changed during its transmission over the network. Information should be enerypted and decrypted only by the authorised user. As e-commerce is a crucial branch of ICT, the information required for completing a transaction should be available on time. Delay in the availability of information may incur loss in business. Authenticity is an important requisite of e-commerce. Only authorised persons should be allowed to gain access to information. Otherwise, unauthorised persons may steal and misuse the information. Unauthorised user cannot read the data in the curity aspect. b.integrity d.non-repudiation data is transferred in coded form. a. encryption b. decryption . Firewall d. digital certification To convert cipher text to plain text is called 2. Firewall b. digital certificate «. decryption ¢. virus Which of the following is a fundamental requisite to ensure safety of personal information? a, Confidentiality b. Encryption c. Integrity d. Authenticity What is a form of electronic signature called? a, Certificate b. Encryption a. confidentiality ¢. authorlsatlon In.. c. Password 4. Digital signature Answers - L@ 2@) 30 40) 5(d) Case Study 6 Cyberethics is a branch of applied ethics that examines moral, legal, and social issues at the intersection of computerfinformation and communication technologies. This field is sometimes also referred to by phrases such as internet ethics, computer ethics, and information ethics. The expression “internet ethics” is somewhat narrow in scope and thus unable to capture the range of cyber-related ethical issues that arise independently of the internet and networked computer per se. Because “computer ethics" connotes ethical issues affecting either computer professionals or computing machines, it also can easily fail to include a cluster of relevant issues that fall under the heading “cyberethics”. i QL What do you know about computer viruses? Q2. Name any two popular opensource Ucences. 3. Define free software Licence. 4. What do you know about software cop; Q5. What do you understand by ‘intellectual property rights’? ERE EEE EEE EEE EEE EIDE EI II II IDI II III II II III IIS II EIEN ED EE IT Answers ° 1. Computer viruses are generally developed with a definite intention to change computer files or cause inconvenience and annoyance to computer users. 2. The two popular Opensource License are: ()) GNU General Public Licence (GPL) (i) GNU Library or ‘Lesser’ General Public Licence (usPL) 3. A free software Ucence Is a notice that grants the receiver of software wide-ranging rights to use mosify or redistribute that particular software. 4, Computer software is covered by the laws, which covers a wide range of intellectual property such as music, literature and software. The main provisions of the act is to make illegal to:\) Copy software (i) Run pirated software, (il) Transmit software over a telecommunication tne, thereby creating a copy. 5. Intellectual property rights are the rights given to people for the original creations of their minds. They usually glve the creator an exclusive rights over the Use of his/her creation for a certaln period of time. yy Very Short Answer type Questions Y QL. What is digital footprint? Ans. Digital footprints are the records and traces Individuals’ activities as they use the Internet. Digital Footprints are permanently stored. Q2. What is digital property? Ans. Digital property (or digital assets) refers to any Information about you or created by you that exists In digital form. either online or an an electronic storage device ‘What are open source based software? Open source software, which refers to software whose source code is available to customers and It can be modified and redistributed without any Limitation. What is public domain software? Name some common public domain software licenses. . Public domain software is free and can be used without restrictions. e.g, LINUX. Apache, Firefox. Define Phishing. Phishing Is the practice of attempting to acquire sensitive information from individuals over the Internet, by means of deception, Define the term scams. Any fraudulent business practice that extracts money from an unsuspecting, ignorant person is, called a scam Q3. Ans. Qa, Qs. Ans. Q6. Ans. Q7. Ans. QB. Ans. Q9. Ans, quo. Ans, qu. Ans. Qi. Ans, quis. Ans. Qua. wledge BOOSTER I Scams committed over the internet are called online 2 internet has become a primary source of scams. What do you mean by hacking? Hacking refers to gaining unauthorised access to a network or computer or digital files. with an intention to steal ar manipulate data or information or to install malware Define spoofing. It refers to a fraudulent or malicious practice in which communication is sent from an unknown source disgulsed as a trusted source known to the receiver, What is cybercrime? Any criminal offense that is facilitated by, or involves the use of. electronic communications or information systems, including any electronic device. computer, or the internet Is referred to as cybercrime. What Is copyright? A copyright is a legal term to describe the rights of the creator of an original creative work such as a literary work, an artistic work. a design. song. movie or software. etc What are netiquettes? Theword netiquette. derives from the combination of words-net (internet) and letiquette’ It refers to online manners while using internet or warking antine. Who are hackers? Ahacker is someane who gains unauthorised access, to your network or computer or digital files. with an Intention to steal ar manipulate data or Information or to install malware Rishika found a crumpled paper under her desk. She picked it up and opened it. It contained some text which was struck off thrice, But she could still figure out easily that the struck off text was the ‘email ID and password of Garvit, her classmate. What is ethically correct for Rishika to do? (i) Inform Garvitsothathe may change his password. /e the password of Garvit’s e-mail ID to all other classmates, (lil) Use Garvit’s password to access his account. (i) Inform Garvit so that he may change his password. Suhana is down with fever. So, she decided not to go to school tomorrow. Next day, in the evening she called up her classmate, Shaurya and enquired about the computer class. She also requested him to explain the concept. Shaurya said, “Mam, taught us how to use tuples in python’ Further, he generously said, "Give me sometime, | will email you the material which will help you to understand tuples in python’: Shaurya quickly downloaded a 2-minute clip from the internet explaining the concept of tuples in python. Using video editor, he added the text "Prepared by ne - Shaurya" in the downloaded video clip. Then, he emailed the modified video clip to Suhana. This act of Shaurya is an example of: (i) Fair use (ii) Copyright infringement Ans. (ill) Copyright Infringement Q1S. After practicals, Atharvleft the computer Laboratory but forgot to sign off from his email account. Later, his classmate Revaan started using the same computer. He is now logged in as Athary. He sends inflammatory email messages to few of his classmates using Atharv’s email account. Revaan's activity is an example of which of the following cybercrime? Justify your answer. (i) Hacking (ii) Identity theft Cyber bullying (lv) Plagiarism Ans. (ii) Identity theft Identity theft means obtaining someone's credentials to commit same online fraud. Q16. After a fight with your friend, you did the following activities. Which of these activities is not an example of cyber bullying? (i) You sent an email to your friend with 2 message saying that "| am sorry’. (ii) You sent a message to your friend saying "Do not call or talk to me’. (ili) You created an embarrassing pleture of your friend and uploaded on your account on a social notworking site. Ans. (i) You sent an email to your friend with a message saying that “I am sorry’ 17. You got the SMS from your bank querying a recent transaction. Answer the following: (i) Will you SMS your pin number to the given contact number? Will you call the bank help line number to recheck the validity of the SMS received? () No, without any confirmation that the SMS has been made securely from the bank, pin ‘number should not be shared () Yes. for checking the validity of the message received. bank help line number may be contacted ) Hacking (iv) Cybercrime Ans. ~) Short Answer tType-t Questions QL What is digital footprint? ‘Ans. A digital footprint is the record or trall left by the things one does online. The social media activity, the information on personal website. the browsing activities, online subscriptions, any photo galleries and videos uploaded by 2 user ~ essentially, any activity carried out on the internet makes the digital footprint of a user. Q2. Differentiate between the active digital footprint and passive digital footprints. case sap 2023-24] ‘Ans. Active Digital Footprints: Active digital footprints Include data that we intentionally submit online. This would include emails we write. or responses Q3. Ans. Q4. Ans. Qs. Ans. Q6. Ans. Q7. Ans. or posts we make on different websites or mobile Apps. etc. Passive Digital Footprints: The digital data trail we leave online unintentionally is called passive digital footprints. This includes the data generated when we visit a website, use a mobile App. browse Internet. etc ‘What are intellectual property rights? Intellectual property rights are the rights of the owner of information to decide how much information is tobe exchanged. shared or distributed Aso it gives the owner a right to decide the price for doing (exchanging/sharing/distributing) so. Explain plagiarism with an example. (cBse 2023] Plagiarism Is the act of using or stealing someone else's intellectual work, ideas. etc. and passing it as our own work. In ather words, plaglarism Is a failure in giving credit to its source Plagiarism is 3 fraud and violation of intellectual property rights. Since, intellectual property holds a legal entity status. violating its owners right is a legally punishable offence For example, if we get someone else to write an essay or assignment for us or if we find a text online and submit it'as our own work. we are committing global plagiarism. What is digital property? Give some examples of digital properties. Oigital property (or digital assets) refers to any information about you or created by you that exists in digital form, either online or on an electronic storage device. Examples of digital property include: any online personal accounts (emall/soclat media accounts/ shopping accounts/video gaming accounts, online storage accounts) and personal websites and blogs: domain names registered in your name: intellectual properties. etc. Expand the following terms: (i) OSS, (ji) SDLC, (iil) GNU, (iv) FLOSS. (i) 05S: Open Source Software (i) SDLC: System Development Life Cycle (ili) GNU: GNU's Not Unix (iv) FLOSS: Free Libre/Livre and Open Source Software Compare freeware and shareware. Freeware is a computer software that Is avallable for use at no cost or for an optional fee. Freeware Is generally proprietary software available at zero price and is nat free software. The author usually restricts one or more rights to copy, distribute and make derivative works of the softvare. Shareware is usually offered as a trial version with certain features only available after the license is purchased, or as a full version, but For a trial period. Once the trial period has passed. the program may stop running until a Ucense Is purchased. Shareware is often offered without support. updates, or help menus. which only become available with the purchase of a Ucense. The words “Free trial" or "trial version” are indicative of shareware. i Q9. Quo. Qu. Ans. qua. . Differentiate between open source and open data. [cose sop 2019} The term ‘open source’ is applicable to software. which means source code of a software Is freely available and user can make changes init and reuse It The term ‘open data’ is applicable to data that is freely available for everyone to use without any Ucensing or copyright requirements. Nivedita has recently shifted to new city and new school. She does not know many people in her new city and school. But all of a sudden, someone is posting negative, demeaning comments on her social networking profile, school site's forum, etc. She is also getting repeated mails from unknown people. Everytime she goes online, she finds someone chasing her online. (i) What is this happening to Nivedita? (ii) What action should she taken to stop them? . () Nivedita has become a victim of cyber bullying and cyber stalking. (i) She must immediately bring it into the notice of her parents and school authorities. And she must report this cybercrime to Local police with the help of her parents. Describe following Cybercrimes: {i) Cyber Bullying (ii) Cyber Stal () Cyber Bullyingreferstoactofonlineharassment of someone by using online tools such as internet, email. instant messages. chat rooms or soclal networking sites, etc. Cyber trolling, which means posting of sarcastic, demeaning or insulting comments about someone. is also considered form of cyber bullying (i) Cyber Statking refers to ontine stalking where someone uses internet, chat rooms, social networking sites, emails, etc. to stalk his/ her victim, Cyber stalker follows the victim ‘online everywhere and keeps posting/sending something which are unsolicited, What can be done to reduce the risk of identity theft? Write any two ways. [case sop 2019} or List two measures against online identity theft. (i) Use unique 1Ds to protect your devices and accounts. (i) Using biometric protection. Write names of any two common types of intellectual property rights which are protected by the law. () Rights upon musical. tterary and artistic works. (i) Rights upon discoveries and inventions. (i) Words, phrases, symbols and designs (iv) Copyright. trademarks, patents, industrial design rights and trade secrets, (Any two) Qs. Ans. qu. Ans. Qs. Ans. Qs. Ans. qu. Describe why authentication Is important for file protection, Authentication is the process of determining whether someone is a legal user. It is the process of identifying an individual. usually based on a username and password. Authentication merely ensures that the individual is who he ar she claims to be, but says nothing about the access rights of the individual. It is used a primary step for file protection from unauthorised users. What is anti-virus software? There are a number of malicious software {malware’) programs that can cause damage to computers. These include viruses. worms. Trojan horses (Trojans), malware. spyware. etc Anti-virus software is designed to detect and block attacks fram malware. This software when loaded, resides in memory and checks every aperation if it is malicious or not {Fit finds any suspicious activity. it blocks that operation and saves our computer. Nowadays all of us frequently use social media to connect with our friends. Give any two etiquettes that we should follow while communicating on social media [cose 2023) While communicating on social media, we should follow the following netiquettes: (i) Weshould not waste precious time in responding tounnecessary emails or comments unless they have some relevance far us. (ii) We should be cautions while making a comment. replying or writing an email or forum post as such acts decide aur credibility over a period of time. What measures should you take to keep data secure? Measures that can be taken to keep data secure include: ())_ Making regular backups of files (backup copies should be stored in fireproof safes or in another building) (W) Protecting against viruses by running antl-virus, software (li) Using a system of strong passwords so that access to data Is restricted Safe storage of Important files stored on removable disks, eg. locked away In a safe location, Sourabh has to prepare a project on “Digital india Initiatives", He decides to gat information from the internet. He downloads three web pages (web page 1L,web page 2, web page 3) containing information on Digital India Initiatives. Which of the following steps taken by Sourabh is an example of plagiarism or copyright infringement? Give justification in support of your answer. Ww) (i) He read a paragraph on “Digital India Initiatives” from web page 1 and rephrased it in his own words. He finally pasted the rephrased paragraph in his project. (ll) He downloaded three images of "Digital Indla Initiatives” from web page 2. He made a collage for his project using these images. (ii) He downloaded “Digital India Initiative” icon from web page 3 and pasted It on the front page of his project report. Ans. (i) and (i. Plagiarism means using someone else's work without giving adequate citation for use and presenting as your own work. Copyright infringement means using copyright- protected material without obtalning copyright holder's permission or viithout paying for it. iF It Is 21. What Is identity theft? Give am example. or What do you mean by identity theft? Explain with the help of an example. [cose sop 2020-21) ‘Ans. Identity theft occurs when someone uses another person's personal identifying information and pretends to be that person in arder to commit fraud or to gain other financial benefits 22. Cite examples depicting that you were a victim off allowing cybercrime. Also, cite provisions in IT Act to deal with such a cybercrime: () Identity theft (li) Credit card account theft ‘Ans. (|) Someone got hold of login and password of our social network site and used it to troll or cyber bully someone using stolen credentials. (W) Someone did fraud shopping after stealing our credit card @ Short Answer type-t! Questions y being sold. 18. Match the following: Column A Column B (@) Plagiarism |i. Fokers, by offering special rewards or money prize asked for personal information, such as bank account information. Copy and paste information from the internet into your report and then organise it (b) Hacking — 2 The trail that is created when a fraud person Uses the intemet. (8) Digital foot-|4, Breaking into computers to print read private emails and other Ans. (a) > 2: (b) > 4; (c) > 1:(d) 93 Q19. How would you recognise if one of your friends Is being cyber bullied? (i) Cite the online activities which would help you detect that your friend is being cyber bullied? What provisions are in IT Act 2000, (amended in 2008) to combat such situations? Ans. (i) Repeated posting of rumours. giving threats online, postingthe victim's personal information sexual harassment or comments aimed to publicly ridicule a victim, (i) The act provides legal framework for electronic governance by giving recognition to electronic records and digital signatures, The act outlines cybercrimes and penalties for them, Q20. If you plan to use a short text from an article on the web, what steps must you take in order to crodit the sources used? Ans. (i) Determine if you need the permission to use the desired plece of work. (ll) Identity the owner of the article (ll). Identify the rights needed to use It. (v) Contact the owner and negotiate whether payment is required. (v) Get your permission agreement in writing (©) Credit card QL. Why should protected? ‘Ans. The intellectual property rights must be protected because pratecting them: () encourages individuals and businesses to create new software and new software applications. as well as improving existing applications. (ii) ensures new ideas and technologies are widely distributed. (i) promotes Investment in the national economy. The imposter can steal and use identifying Information such as full name, home address, emall address, online login and passwords, drivers Ucense number. passport number or bank account number. etc. Once thieves access this information. they may Use it to commit identity theft. For example, using stolen credit card information, identity thie may go on shopping spree or using stolen online identity. they may send fraudulent malls or even ask for some money In the name of help (on behalf of stolen identity) 2. Describe the terms free software and open source software. Write examples of one proprietary and one OSS software. ‘Ans. Free software is the software free of cost, which can be copied. mosified and redistributed as well but whose source cade Is not available. Open source software, on the other hand, Is the software, whose source code Is avallable and which can be copied, modified and redistributed as well There may or may not be charges payable for open source software, Proprietary Software: Microsoft Windows & Open Source Software: Linux intellectual property rights be : Q3. Mr. Jayanto Das is confused between shareware and open source software. Mention at least two points of differences to help him understand the same. Ans. Shareware Is software. which Is made avallable with the right to redistribute copies. but itis available for Umited time, often after a certain perlod of time. then a license fee should be paid. Shareware is not the same thing as Free and Open Source Software (FOSS) for two main reasons: (i) the source code is not available and, (i) modifications to the software are not allowed. O55 refers to Open Source Software, which refers to software whose source code Is avallable to customers and it can be modified and redistributed without any Umitation. An OSS may come free of cost or with a payment of nominal charges that its developers may charge in the name of development. support of software Q4. Would you suggest Open Source Software (OSS) for ‘an organisation or sector where the performance is, the factor of utmost importance, such as military? You must be aware that military has different software needs than the commercial sector because of its unique mission and environment. While commercial sector chooses software on the basis of factors like: application cholce, ease of use, service and support, price, reliability and performance, the military does the same depending upon factors like: reliability, long-term supportability, security, scalability and performance of the software. Keeping in mind the above scenario, answer the above question with a proper justification. Giveexample ofa software,ifyouarerecommending one. ‘Ans. Theopen source software comes with characteristics Uke; avalabllity of open source. no license restriction on type of usage, freedom to modify, redistribute. etc. But all these characteristics are not enough to be suggested as a preferred software. Not all the 055 provide long-term support or are secure- enough or scalable. Therefore. we can not blindly recommend any OSS software. The same applies to proprietary software as well Therefore. we can recommend only those software to military that have solld support-base In the form of community-development groups etc. and that have features like security, scalability and performance along with it. Thus, the OSS software suite like LAMP (Linux. Apache, MySQL, PhP) that has all the above mentioned features can be racommended to military. Q5. What Is GPL software license? How Is it different from LGPL software License? ‘Ans. GPL: The General Public License (GPL) is probably one of the most commonly used licenses for opensource projects. The GPL grants and guarantees a wide range of rights to developers who work on open-source projects. Basically, it allows users to legally copy distribute and modify software. LGPL: The Lesser General Public License (LGPL). It offers lesser rights to a work than the standard GPL license. The LGPL is used to license free software so that it can be incorporated into both free software and proprietary software. The LGPL and GPL licenses differ with one major exception: with LGPL the requirement that you have to release software extensions in open GPL has been removed. Q6. List a table of differences between free software and open source software. Ans. Difference between free software and open source software s. Free No. Software 7. [Freedom to run program |it has distribution of for any purpose. Ucense. 2. [Freedom to study about | Availabilty oF source program. code, 3. [Freedom to distribute | Free distribution, coples of software. 4. [Freedom to modify/| integrity oF improve program and | source code release Improvements to public (Open Source Software authors Q7. What are the freedoms that a free software must provide? ‘Ans. According to the free software definition. free software must fulfil four freedoms: () The freedom to run the program. for any purpose. (i) The freedom to study how the program works, ‘and adapt it to your needs. Access to the source cade Is a precondition for this (il), The freedom to redistribute copies. (iv) The freedam to improve the program, and release your improvements to the public, so that the whole community benefits. Access to the source code is a precondition for this. 8. Richa, recently started using her social media account. Within a few days, she beftiands many people she knows and some that she does not know. After some time, she starts getting negative comments on her posts. She also finds that her pictures are being shared online without her pormission. ee : Based on the given information, answer the questions given below: {() Identify the type of cybercrime she is a victim of. (i) Under which act, she can lodge a complaint to the relevant authorities? (lil) Suggest her any two precautionary measures which she should take In future while being online to avoid any such situations. [cose sop 2023.24) Ans. () She is victim of Cyber Bullying (i) Information Technology Act. 2000 (also known as IT Act), (li) The two precautionary measures are (a)Need to be careful while befriending unknown people on the Internet. (b) Never share personal credentials like username and password with athers, 9. Manohar received an email from a company, named Makemoney Pvt. Ltd., claiming that Manohar has won % 20 lakhs in a survey done online. In order to claim the prize money, he was required to answer few security questions such as his Name, Account number, PAN card details, Phone number and OTP for verification purposes. For this, he had to click on the link provided in the email. ‘Answer the following questions: (I) Should Manohar give the required detalls to the company? (ii) What is the activity depicted above? (lil) What should he do with this emall?. [case 2023) Ans. (i) No, Manohar shouldn't give the required detalls to the company, This may be a scam and an attempt to steal his personal and financial information (i) The activity depicted is a phishing scam in which scarnmers impersonate a company or an organisation in order to trick people into giving away thelr sensitive information. (li) Manohar should delete this emall and not click on any such inks or provide any personal information. Q10. Viruses, pharming and phishing are all examples of potential internet security issues. Explain what is meant by each of these three terms. Ans. Virus refers to a computer prograny/software that replicates/copies Itself. it can delete or alter files/ data stored on a computer and can even make the computer “crash’/run slow, Pharming is a way to trick unsuspecting user by inserting malicious code/software installed on a user's hard drive/actual web server. This code redirects user to a fake website (without his/her knowledge). Pharming takes place generally to obtain personaVFinanclal infarmatian/data QL What is Ans. qu. Ans. qus. Phishing is another way to trick unsuspecting user where legitimate-Looking emails are sent to a user. As soon as recipient opens/clicks on link in the emalVattachment. the user Is directed to a fake website (without his/her knowledge). Like Pharming, Phishing also takes place generally to obtain personal/financial information/data. internet addiction? What are some symptoms of the internet addiction? Internet Addiction: When 2 person can't find a balance between their time online and their time offline. it considerably affects their mental health this condition is called Internet addiction or Internet Addiction Disorder (IA0). ‘Some symptoms of the internet addiction Uke: () Mental and Emotional Symptoms: Anger. depression, relief, moad swings, anxlety, fear. Irritability, sadness. loneliness. boredom. restlessness. procrastination (li) Physical Symptoms: An upset stomach, eating, irregularities, (such as skipping meals). severe headaches, backaches. dry eyes. ignoring personal hygiene and sleep disturbance. What do you understand by the term Hacking? Write any two measures that one should take to avold being the victim of hacking. (cose 2023) Hacking refers to gaining unauthorised access to a network or computer or digital files with an intention to steal or manipulate data or information or to install malware One should take the following measures to avoid being the victim of hacking: () Don't reuse the same password on multiple logins. Once hackers get one password. they will try it on everything else they can connect us to. (il) Use auto-updates to get the latest patches for apps, software and operating systems. Preeti celebrated her birthday with her family. She was excited to share the moments with her friend Himanshu, She uploaded selected images of her birthday party on a social networking site so that Himanshu can see them. After few days, Preeti had a fight with Himanshu. Next morning, she deleted her birthday photographs from that soclal networking site, so that Himanshu cannot access them, Later in the evening, to her surprise, she saw that one of the images which she had already deleted from the social networking site was available with their common friend Gayatri. She hurriedly enquired Gayatri "Where did you get this picture from?" Gayatri replied “Himanshu forwarded this Image few minutes back". Help Preeti to get answers for the following questions. Give justification for your answers so that Proeti can understand it clearly. ee : (i) How could Himanshu access an image which Preeti had already deleted? (ii) Can anybody else also access these deleted images? (iil) Had these Images not been deleted from my digital footprint? (i) images toaded an a social networking site can bbe saved/downloaded or even screenshots may be taken. (i) Yes. from the digital footprint. government and other agencies can obtain these legally, if needed. (ii) Images deleted from a social website always remain part of a digital footprint. Q14. The school offers Wireless Facility (WiFi) to the Computer Science students of Class XI. For communication, the network security staff of the school have a registered URL schoolwifi.edu. On 17 September 2017, the following email was mass distributed to all the Computer Science students of class XI. The email claimed that the password of the students was about to expire. Instructions were given to go to URL to renew their password within 24 hours. Ans. Yo J Cokie) Dear Students, This mail Is meant to inform you that your Schoo WIFI network password will expire in 24 hours. Please follow the link below to update your password, ‘Schoolwifl.edu/updatepassword Thank you Network Security Staff (i) Do you find any discrepancy in this email? (ii) What will happen if the student will click on the given URL? (iil) fs the email an example of cybercrime? If yes, then specify which type of cybercrime is it. Justify your answer. (i) Yes, there is an extra ‘in the URL of the email (ii) Itis a phishing site which will steal the students’ data (ll) It Is an example of phishing where using a similar looking UAL and site, people are footed 15. Mention any three health hazards associated with inappropriate and excessive use of gadgets. [cust sop 2023-24) Simran needs to be made aware of the following, consequences due to inappropriate and excessive use of gadgets {i) Eye strain (i) Painful muscles and joints (i) Poor memory (Wv) Lack of steep (v) Back pain and neck pain Ans. Ans. (Any three) [?] Long Answer \MType Questions Q1. Write the differences between the following: ()) Copyright and Patent (i) Plagiarism and Copyright infringement (ii) Non-ethical hacking and Ethical hacking (iv) Active and Passive footprints (v) Free software and Free and open source software ‘Ans. (i) Copyright: A copyright is a collection of rights automatically vested to someone who has created an original work. The copyright owner has the authority to keep or to transfer the rights to use/distribute, individually to one or more peaple, or to transfer them collectively to one ar more people. Patent: A patent is 2 grant of exclusive right to the Inventor by the government. Patents give the holder a right to exclude others from making, selling. using or importing a particular product or service, in exchange for full public disclosure of thelr invention. (il) Plagiarism: Plagiarism Is stealing someone elses Intellectual work and representing it as your own work without citing the source of information Copyright infringement: Copyright infringement is the use or production of copyright protected ‘material without the permission of the copyright holder. (lil) €thicat Hacking: It Is done on behalf of 3 company, which wants to find out the Loophates in the system in context to security. Unethical Hacking. on the other hand. is done in order to harm or cause loss to an individual or a company. (iv) An Active Digital Footprint: Includes data that you intentionally submit online, eg. sending an email sending messages online, postinga social media post, replying to post or commenting online ete. A Passive Digital Footprint: Gets created through your data trall that you unintentionally leave online. For example, when you visit a website, the web server may log your IP address, which identifies your internet service provider and your approximate (acatlon. (v) Free Software: It is the software free of cost. which can be copied, modified and redistributed as well but whose source code is not available ‘An open source software which Is available Free of cost is free and open source software, ee | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | fs Q2. Internet Security is a major issue for many people. The following is a list of four typical security issues: () Pharming (ii) Phishing (ill) Spyware (v) Viruses. For each one, describe the security Issue and suggest a way of protecting against it. Also define Indian Information Technology Act (IT Act). Ans. ~ Security Issue Description of Security issue Method of Protection Pharming Teis actually a code installed on the harddrive | « Use filters to authenticate website of auser’s computer or on actual web server; | User should be alert and look for code redirects user to a bogus/fake website pharming clues which indicate being without user knowing, directed to a bogus site. Phishing Th phishing, creator sends legitimate looking | « ISPs can filter/block out phishing emails. (Fake) email in the hope of gaining personaly | « User should be avare of opening links in financial information; Fake email replicates a emails. well known company eg. a bank. Spyware Tels a type of software that gathers Information | » Use dropdown boxes. by monitoring key presses on a user's keyboard | « User should be alert and look for clues or activity and relays the information back to when using their computer. person who sent the spyware. Viruses Terefersto program or coding that replicates | » Use antivirus software. itself/corrupts the system/alters or deletes | » Do not use disks/soRtware From aka unknown sources. *Donot open emails from unknown senders. Indian Information Technology Act (IT Act): The system. With time. GNU project expanded and Government of India's The Information Technology now [tls net United ‘tovanlyen operating system. ‘Act, 2000 (also known as IT Act), amended In vector apart fom range of stare including 2008. and provides guidelines to the user on the GPL: GNU General Public Licence (GPL) Is probably processing, storage and transmission of sensitive ive of the most Grier ise Ucatives for ope pfscmetion source projects. The GPL grants and guarantees a 3. Expand the terms: FLOSS, FSF, GNU, GPL, OSS. wide range of rights to developers who work on Ans. FLOSS: Free Libre and Open Source Software or open-source project. Basically, it allows users to to Free Livre and Open Source Software. The term FLOSS Is used to refer to a software which is bath free softwares as well as open source software. Here the words libre (a Spanish word) and livre (@ Portuguese word) mean freedom. FSF: Free Software Foundation. FSF is a non-profit organisation created for the purpose of supporting free software movement. Now a days. it also works on legal and structural issues for the free software ‘community. GNU: GNUS Not Unix. GNU project emphasises on freedom. The GNU project was initiated by Richard AM, Stallman with an objective to create an operating Learn the abbreviations properly along with thelr purpose and usage. legally copy, distribute and modify software. OSS: Open Source Software, which refers to software whose source code Is avallable to customers and it can be modified and redistributed without any Umitation. An OSS may come free of cost or with 2 payment of nominal charges that its developers may charge in the name of development, support of software TiP x Chapter Test Multiple Choice Questions qu Qa. The attack that focuses on capturing small packets from the network transmitted by other computers and reading the data content in search of any type of information Is . 2. phishing, c scams Which of the following is/are source of spreading Viruses from ona computer to another? a. E-mail b. Infected data C Infected programs —_d. All af these b. eavesdropping, d. PC intrusion a4. are the attempts by individuals to Information from you through an original looking site and URL. ‘a. Phishing scams b. Spoofing <. Eavesdropping . Pharming is an attempt where a hacker tries to divert network traffic to a bogus a. Phishing scams b. Spoofing «. Eavesdropping . Pharming attack ERE EEE EEE EEE EEE EIDE EI II II IDI II III II II III IIS II EIEN ED EE IT Q5. Aresearch student is expected to write a thesis ona topic. The student browses Internet for the topic and luckily finds it on the internet. He copies and submits the entire thesis as his own research work. Which of the following activities appropriately categorises the act of the writer? a. Spamming ©. Plaglartsm b. Phishing d. Trojan Fill in the Blanks Q6.A a small piece of data sent from a website and stored in a user's web browser (in a text file) while a user is browsing a website. Q7... is a system designed to prevent unauthorised access to or from a private network. Q8. Amail or message sent to a Large number of people indiscriminately without their consent is called [case sop 2020-21) Assertion & Reason Type Questions Directions (Q.Nos. 9-41): In the questions given below, there are two statements marked as Assertion (A) and Reason (R). Read the statements and choose the correct aption. a. Both Assertion (A) and Reason (R) are true and Reason (R) Is the correct explanation of Assertion (A). b, Bath Assertion (A) and Reason (R) are true, but Reason (R) is not the correct explanation of Assertion (A), c. Assertion (A) is true. but Reason (A) is false d. Assertion (A) Is false, but Reason (A) Is true. Q9. Assertion (A): There are many anti-hacking software and technologies available which can be used to protect digital assets such as proprietary software, applications, tools, etc. Reason (R): These anti-hacking tools prevent attackers from controlling or accessing your software, and therefore, help in protecting digital assets. Assertion (A): A software Licence is a document that provides legally binding guidelines for the use and distribution of software. Reason (R): Open source software licence is a notice that grants the receiver of software wide- ranging rights to use, modify or redistribute that particular software. Q1L Assertion (A): Digital unite refers to a soclety where everyone would be skilled and equipped to take advantages of various ICT services. Reason (R): The licence must discriminate against any person or group of persons. quo. Case Study Based Questions qu. Qs. Some More Ethics in Computing: The term ethics generally refers to a set of moral principles that govern the behaviour of an individual or a group of individuals. In the same manner, ethics in computing or computer ethics is a set of moral principles which regulate and govern the use of computing and internet technology. Plagiarism, Cyber bullying, Hacking, Phishing, Spamming, Software piracy, Intellectual property rights are some common issues that are governed by computer ethics. For example, one can easily copy the content available online, but computer ethics suggest that it is not a right practice. () The term refers to the creations of mind, which have both a moral and a commercial value. a. patent b. copyright ©. intellectual property d. trademark (i) .. smn i8 a Legal document that gives the inventor sole rights to make, sell or use an invention. a. Trademark b Patent ©. Copyright d Intellectual property (lll) A logo or symbol that Is printed on business items to make it exclusive, is known as a, Patent © Trademark b. Copyright d. Intellectual property (wy) is a right that is granted by law to the creator or inventor for his original work. a. Copyright b. Trademark ¢. Intellectual property d. None of the above ©. may be defined as the act of taking another person writing, conversation, song and passing it off as your own, without citing or craditing original author. a. Plagiarism b. Copyright . Trademark d. Patent Cyber ethies is the study of ethics pertaining to computers, covering user behaviour and what computers are programmed to do, and how this affects individuals and society. For years, various governments have enacted regulations while organisations have explained policies about cyber ethics. With the inerease of young children using the internet, it is now very essential than ever to tell children about how to properly operate the internet und its dangers. [tis especially hard to talk to teens ee a because they do not want to be lectured about what is right and wrong. They seem to think they have it all sorts out. That is why is it is important to instill appropriate cyber etiquette at an early age but if you haven't there is still time to tell to your child (}) What do you understand by the word privacy? (ii) What do you understand by malicious code? Name the types of malicious code? (iv) What is worm? (v) What is trojan? Very Short Answer Type Questions Q14. When you search online for pictures, how will you find pictures that are available in the free public domain. How can those pictures be used in your project without copyright violations? Q1S. In the computer science class, Sunil and Jagdish were assigned the following task by their teacher: (I) Sunil was asked to find information about “India, a Nuclear power": He was asked to use Google Chrome browser and prepare his report using Google Docs. | (ii) Jagdish was asked to find information about Firefox browser and prepare his report using Libre Office Writer, What Is the difference between technologies used by Sunil and Jagdish? Short Answer Type-I Questions Q16. Sumit got good marks in all the subjects. His father gifted him a laptop. He would like to make Sumit aware of health hazards associated with inappropriate and excessive use of laptop. Help his father to Ust the points which he should discuss with Sumit. Q17. Asa citizen of India, what advise you should give to others for e-waste disposal? Or How should one dispose off the e-waste? Short Answer Type-II Questions Q18. List down the steps you need to take in order to ensure: () Your computer is in good working condition for a longer time. (ii) Smart and safe internet surfing. Q19. What is data privacy? Websites that you visit collect what type of Information about you? Long Answer Type Questions Q20. Compare and Contrast: Free software and Open source software OSS and FLOSS Proprietary software and Free software Freeware and Shareware Freeware and Free Software Q2l. What are some health concems related to the excessive use of technology? ee

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy