S7 Social Impacts 2024 25
S7 Social Impacts 2024 25
Societal Impacts
Syllabus 2024-25 :
• Digital footprint, net and communication etiquettes, data protection,
• Intellectual property rights (IPR), Plagiarism, Licensing and copyright,
• Free and open-source software (FOSS)
• Cybercrime and Cyber laws,
• Hacking, phishing, cyber bullying,
• Overview of Indian IT Act 2000.
1. What is a Technology?
Ans. Technology is the application of scientific knowledge to the making of tools to
solve specific problems. Technological advances such as automobiles, airplanes,
radio, television, cellular phones, computers, modems, and fax machines have
brought major advances and changes to the world.
2. How the digital technology changes the impact of human lives?
Ans. Digital Technologies changes have made a dramatic impact on our lives, making
things more convenient, faster, and easier to handle. Applications of digital
technologies have redefined and evolved all spheres of human activities. Today
more and more people are using digital technologies through Smartphones,
computers, etc., with the help of high-speed Internet.
3. Why did the digital technologies become so widespread?
Ans. The introduction of personal computers (PCs) and Internet followed by
smartphones has brought these technologies to the common man.
4. What is a digital footprint? Give the example of Digital Footprint.
Ans. A digital footprint is a trail of data you create while using the Internet. It
includes the websites you visit, emails you send, and information you submit to
online services. Example -
i) Posting on Facebook, Instagram, Snapchat, Twitter, and other social media
platforms.
ii) Filling out online forms, such as when signing up to receive emails or texts.
iii) Agreeing to install cookies on your devices when prompted by the browser.
Whenever we surf the Internet using smartphones, tablets, computers, etc., we
leave a trail of data reflecting the activities performed by us online, which is our
digital footprint. Our digital footprint can be created and used with or
without our knowledge. It includes websites we visit, emails we send, and any
information we submit online, etc., along with the computer’s IP address, location,
and other device specific details. Such data could be used for targeted
advertisement or could also be misused or exploited. Thus, it is good to be aware
of the data trail wemight be leaving behind. This awareness should makeus
cautious about what we write, upload or downloador even browse online.
5. Write the two different kinds of digital footprint.
Ans. Two different kinds of Digital Footprints are-
▪ Active digital footprints - It includes data that we intentionally
submit online. This would include emails we write, or responses or posts
we make on different websites or mobile Apps, etc.
▪ Passive Digital Footprints - The digital data trail that we leave online
unintentionally is called passive digital footprints. This includes the data
generated when we visit a website, use a mobile App, browse Internet, etc.
6. Where the digital footprint stores in a browser?
Ans. Everyone who is connected to the Internet may have a digital footprint. With more
usage, the trail grows. On examining the browser settings, we can find out how it
stores our browsing history, cookies, passwords, auto fills, and many other types
of data.
7. Where the digital footprint stored permanently besides the browser?
Or,
Does the digital footprint still remain even after erase the data?
Or,
Is there any guarantee that the digital footprints fully eliminated from
the Internet?
Ans. Besides browser, most of our digital footprints are stored in servers where the
applications are hosted. We may not have access to remove or erase that data;
neither do we have any control on how that data will be used. Therefore, once a
data trail is generated, even if we later try to erase data about our online
activities, the digital footprints still remain. There is no guarantee that digital
footprints will be fully eliminated from the Internet.
8. What is Digital Citizen or Netizen?
Ans. In this era of digital society, our daily activities like communication, social
networking,banking, shopping, entertainment, education, transportation, etc.,
are increasingly being driven by online transactions.
Digital society thus reflects the growing trend of using digital technologies in all
spheres of human activities. But while online, all of us need to be aware of how to
conduct ourselves, how best to relate with others and what ethics, morals and
values to maintain. Anyone who uses digital technology along with
Internet is a digital citizen or a netizen. Being a good netizen means
practicing safe, ethical and legal use of digital technology.
9. What are the responsibilities of users to follow the etiquettes using
digital technology along with Internet?
Ans. A user of digital technology needs to follow certain etiquettes like net-etiquettes,
communication etiquettes and social media-etiquettes.
i) Net-etiquette includes avoiding copyright violations, respecting privacy and
diversity of users and avoiding cyber bullies and cyber trolls, besides sharing
of expertise.
ii) Communication-etiquette requires us to be precise and polite in our
conversation so that we remain credible through our remarks and comments.
iii) While using Social Media, one needs to take care of security through
password, be aware of fake information and be careful while befriending
unknowns. Care must be taken while sharing anything on social media as it
may create havoc if being mishandled, particularly our personal, sensitive
information.
10. What net-etiquettes should follow during Social interaction or while
being online?
Ans. One should be ethical, respectful and responsible while surfing the Internet.
i) Be Ethical –
• No copyright violation: We should not use copyrighted materials without
the permission of the creator or owner. As an ethical digital citizen, we need
to be careful while streaming audio or video or downloading images and
files from the Internet.
• Share the expertise: it is good to share information and knowledge on
Internet so that others can access it. However, prior to sharing information,
we need to be sure that we have sufficient knowledge on that topic. The
information shared should be true and unambiguous.
ii) Be Respectful–
• Respect privacy: as good digital citizens we have the right to privacy and
the freedom of personal expression. At the same time, we have to
understand that other digital citizens also have the same rights and
freedoms. Our personal communication with a digital citizen may include
images, documents, files, etc., that are private to both. We should respect
this privacy and should not share those images, documents, files, etc., with
any other digital citizen without each others’ consent.
forum posts while ignoring posts of other members of the forum. On various
discussion forums, we usually try to go through the previous comments of
a person and judge their credibility before relying on that person’s
comments.
12. What do you mean by social media? What etiquettes should be followed
in Social Media?
Ans. Social media are websites or applications that enable their users to participate
in social networking by creating and sharing content with others in the
community. These platforms encourage users to share their thoughts and
experiences through posts or pictures.
In social media too, there are certain etiquettes need to follow –
i) Be Secure –
• Choose password wisely: It is vital for social network users. News of
breaching or leakage of user data from social network often attracts
headlines. Users should be wary of such possibilities and must know how
to safeguard themselves and their accounts. The minimum one can do is to
have strong and frequently changed password. Never share personal
credentials like username and password with others.
• Know who you befriend: Social networks usually encourage connecting
with users (making friends), sometime even those whom we don’t know or
have not met. However, we need to be careful while befriending unknown
people as their intentions possibly could be malicious and unsafe.
• Beware of fake information: Fake news, messages and posts are
common in social networks. As a user, we should be aware of them. With
experience, we should be able to figure out whether a news, message or post
is genuine or fake. Thus, we should not blindly believe in everything that
we come across on such platforms, we should apply our knowledge and
experience to validate such news, message or post.
ii)
Be Reliable –
Think before uploading: We can upload almost anything on social
•
network. However, remember that once uploaded, it is always there in the
remote server even if we delete the files. Hence, we need to be cautious
while uploading or sending sensitive or confidential files which have a
bearing on our privacy.
13. What do you mean by the Sensitive Data? Give example.
Ans. Elements of data that can cause substantial harm, embarrassment, inconvenience
and unfairness to an individual, if breached or compromised, is called Sensitive
Data.
Examples of sensitive data include biometric information, health information,
financial information, or other personal documents, images or audios or videos.
14. How to implement Privacy of Sensitive Data?
Ans. Intellectual Property Rights (IPR) help in data protection through copyrights,
patents and trademarks. There are both ethical and legal aspects of violating IPR.
A good digital citizen should avoid plagiarism, copyright infringement and
trademark infringement.
▪ Intellectual Property Rights (IPR) is the statutory right granted by the
Government, to the owner(s) of the intellectual property or applicant(s) of an
intellectual property to exclude others from exploiting the IP commercially for
a given period of time in lieu of the discloser of his/her IP in an IPR
application.
▪ The most well-known types are Copyrights, Patents, Trademarks and trade
secrets.
19. How to protect Intellectual Property legally?
Ans. Intellectual Property is legally protected through copyrights, patents,
trademarks, etc
20. What is a Copyright and Copyright Law?
Ans. Copyright – Copyright is a legal means of protecting an author’s work
created or originated.
Copyright grants legal rights to creators for their original works like writing,
photograph, audio recordings, video, sculptures, architectural works, computer
software, and other creative works like literary and artistic work. Copyrights are
automatically granted to creators and authors.
Copyright law gives the copyright holder a set of rights that they alone can avail
legally. The rights include right to copy (reproduce) a work, right to create
derivative works based upon it, right to distribute copies of the work to the public,
and right to publicly display or perform the work. It prevents others from copying,
using or selling the work.
• It gives creators protection against use of their work without permission.
Owners of copyright can use, sell or license a work to a third party.
A Patent is usually granted for inventions. Unlike copyright, the
inventor needs to apply (file) for patenting the invention. When a
patent is granted, the owner gets an exclusive right to prevent others
from using, selling, or distributing the protected invention. Patent
gives full control to the patentee to decide whether or how the
invention can be used by others.
A patent protects an invention for 20 years, after which it can
be freely used.
21. What rights does a patent give?
Ans. • A patent gives the right to stop others from using your inventions.
• A patent also brings the right to take legal action against others who might
be infringing and to claim an image.
26. List down the steps in order to executing IPR for software.
Ans. Executing IPR for a software -
▪ Code of the software will be protected by a Copyright.
▪ Functional expression of the idea will be protected by a Patent.
▪ The name and logo of the software will come under a registered
Trademark.
27. Write the different way in order to violating IPR.
Ans. Violation of intellectual property right may happen in one of the following ways:
i) Plagiarism – Presenting someone else’s idea or work as one’s own idea or
work is called plagiarism.
i) Copyright Infringement - Copyright infringement is when we use other
person’s work without obtaining their permission to use or we have not paid
for it, if it is being sold.
ii) Trademark Infringement- Trademark Infringement means
unauthorised use of other’s trademark on products and services.
28. What is Plagiarism?
Ans. Presenting someone else’s idea or work as one’s own idea or work is called
plagiarism. If we copy some contents from Internet, but do not mention the
source or the original creator, then it is considered as an act of plagiarism.
It is a serious ethical offense and sometimes considered as an act of fraud. Even
if we take contents that are open for public use, we should cite the author or source
to avoid plagiarism.
In other word, Plagiarism is the "wrongful appropriation" and "stealing
and publication" of another author's "language, thoughts, ideas, images,
words or expressions" and the representation of them as one's own original
work.
• With the rise of the Internet, plagiarism has risen to a new level.
29. What is the Importance of Plagiarism?
Ans. • Steal and pass off (the ideas or words of another) as one’s own
• Use (another’s production) without crediting the source
• Commit literary theft
• Present as new and original an idea or product derived from an existing source
30. Write the different types of Plagiarism?
Ans. Two types of Plagiarism -
▪ Intentional Plagiarism
• Copying other’s work
• Borrowing/buying assignments
• Copy, Paste from electronic resources
Ans. When authors share their copyrighted works with others under public license, it
allows others to use and even modify the content.
Two popular categories of Public License are-
i) Creative Commons (CC) - CC is used for all kind of creative works
like websites, music, film, literature, etc. CC enables the free
distribution of an otherwise copyrighted work. It is used when an author
wants to give people the right to share, use and build upon a work that
they have created.
CC licenses are a set of copyright licenses that give the recipients, rights
to copy, modify and redistribute the creative material, but giving the
authors, the liberty to decide the conditions of licensing.
ii) GNU General public license (GPL) – GPL is primarily designed for
providing public license to a software. GNU GPL is another free
software license, which provides end users the freedom to run, study,
share and modify the software, besides getting regular updates.
GPL is the most widely used free software license which grants the
recipients, rights to copy, modify and redistribute the software and that
the same rights are preserved in all derivative works.
Users or companies who distribute GPL license works may charge a fee
for copies or give them free of charge.
The GPL is a copyleft license, which means that derivative
work must be open-source and distributed under the same or equivalent
license terms.
37. Define FOSS.
Ans. Free and open-source software (FOSS) has a large community of users and
developers who are contributing continuously towards adding new features or
improving the existing features. For example, Linux kernel-based operating
systems like Ubuntu and Fedora come under FOSS. Some of the popular FOSS
tools are office packages, like Libre Office, browser like Mozilla Firefox, etc.
38. What do you meant by ‘Open Source’?
Ans. The term ‘Open Source’ refers to software in which the source code is freely
available for others to view amends and adapt.
39. Define OSS.
Ans. OSS refers to Open-Source Software, which refers to software whose source code
is available to customers and it can be modified and redistributed without any
limitation. An OSS may come free of cost or with a payment of nominal charges
that its developers may charge in the name of development.
40. Define FLOSS.
Ans. FLOSS refers to Free/Libre and Open-Source Software, which refers to software
to software which is both free software as well as Open-Source Software. Libre
means freedom.
• Creative Commons licenses are simple from a legal point of view and
provide a quick solution to the complexities of content licensing.
• It allows for easy sharing data can bring down costs and be beneficial for
humanity.
• Works come with permissions pre-applied, so users do not have to request
permissions to reuse individual works.
Con’s-
• Creative Commons is not appropriate for work from which you intend to
gain commercially, either now or in the future.
• No control over who will reuse your work, other than through the license
terms you choose to exercise.
• Licenses are non-revocable – you cannot withdraw copies of work released
under Creative Commons at a later date.
• The majority of today’s Creative Commons licensed works are only available
online, making them irrelevant in places where fast internet access is absent
or too expensive.
46. Write the purpose of GPL.
Ans. ▪ Freedom to download and run the software.
▪ Freedom to use a source
▪ Freedom to modify
▪ Freedom to share or redistribute
▪ Provide Legal protection
▪ GPL is Copyleft license created for the open source community.
47. Write the advantages and disadvantages of GPL.
Ans. Advantages of GPL -
• Regular feedback from users helps in the development of software in new
areas.
• Open-source software aids to the free development of several other open-
source software.
• Get technical support from developer’s community.
• Reduces the cost of software maintenance as the volunteer’s increases.
• Bugs can be identified easily many people’s worked on it.
• Copyleft license created for the open-source community.
• Open-source product itself will tempt the user to try and use it.
Disadvantages of GPL -
• If GPL licensed product is used in any commercial product then the entire
product has to be released as open source. Most of the companies set a ban
to use GPL product.
• As per the clause "the derivative work should also be released as open source“.
• It’s extremely viral. If your project contains a component that is under the
GPL, your whole project is subject to the GPL too.
48. Distinguish between Copyright and License.
Ans. Copyright sometimes put restriction on the usage of the copyrighted works by
anyone else whereas Licenses provide rules and guidelines for others to use the
existing work. When authors share their copyrighted works with others under
public license, it allows others to use and even modify the content.
49. Differentiate between Copyright and Copyleft.
Ans. ▪ A COPYRIGHT is a legal process used by creators and inventors to protect
their work and to control distribution of their product.
▪ Whereas, the COPYLEFT is an invented term, used to describe
a copyright that requires anyone distributing a copy or derived copy to allow
redistribution of their code.
Ans. That software which are actually "free" in the sense of price. These are known as
Freeware. Lots of freeware can be downloaded from the internet for various
different purposes such as currency converters, drawing graphs and charts etc.
But freeware may not come with the source code.
56. Give some examples of Free Software.
Ans. Examples of free software include the Linux Kernel, MySQL Relational Database,
Apache web server, OpenOffice.org office suite and TeX and LaTeX typesetting
systems.
57. What is Computer/Cyber Fraud? Write the different types of Computer
Fraud presently exist.
Ans. Computer fraud is the act of using a computer to take or alter electronic data, or
to gain unlawful use of a computer or system.
Phishing, social engineering, viruses, and DDoS attacks are fairly well-known
tactics used to disrupt service or gain access to another's network.
Types of computer fraud include:
• Distributing hoax emails
• Accessing unauthorized computers
• Engaging in data mining via spyware and malware
• Hacking into computer systems to illegally access personal information,
such as credit cards or Social Security numbers
• Sending computer viruses or worms with the intent to destroy or ruin
computer or system.
58. What is Cybercrime?
Ans. Cybercrime, or computer-oriented crime, is a crime that involves
a computer and a network.
▪ Cybercrimes can be defined as: “Offences that are committed against
individuals or groups of individuals with a criminal motive to intentionally
harm the reputation of the victim or cause physical or mental harm, or loss, to
the victim directly or indirectly, using modern telecommunication networks
such as Internet and mobile phones”.
▪ When any crime is committed over the Internet it is referred to as a Cyber
Crime.
▪ In short, Cyber crime is defined as a crime in which computer is the medium
of crime (hacking, phishing, spamming), or the computer is used as a tool to
commit crimes (extortion, data breaches, theft).
59. Write the reasons for growth in Cyber Crime.
Ans. • Cybercriminals are embracing new attack technologies.
• Many new Internet users come from countries with weak Cyber Security.
Ans. Phishing is an unlawful activity where fake websites or emails that look original
or authentic are presented to the user to fraudulently collect sensitive and
personal details, particularly usernames, passwords, banking and credit card
details.
The most common phishing method is through email spoofing where a fake or
forged email address is used and the user presumes it to be from an authentic
source.
65. How the phishing works?
Ans. Phishing can work as follow-
Step 1 :Fraudsters
Step 2 :Build Fake Site.
Step 3 :Send out thousands of phishing emails with link to fake website.
Step 4 :Victims click on link in email believing it is legitimate. They enter
personal information.
Step 5 :Fraudsters compile the stolen data and sell it online or use it themselves.
66. What is an Identity theft?
Or,
Identity theft is one of the phishing attacks. How?
Ans. Identity thieves increasingly use personal information stolen from computers or
computer networks, to commit fraud by using the data gained unlawfully.
A user’s identifiable personal data like demographic details email ID, banking
credentials, passport, PAN, Aadhaar number and various such personal data are
stolen and misused by the hacker on behalf of the victim.
67. What is the main purpose of the Identity theft?
Ans. An identity theft is one type of phishing attack where the intention is largely for
monetary gain.
68. In what ways the criminal takes advantage of an individual’s stolen
identity?
Ans. There can be many ways in which the criminal takes advantage of an individual’s
stolen identity. Given below are a few examples:
i) Financial identity theft: when the stolen identity is used for financial gain.
ii) Criminal identity theft: criminals use a victim’s stolen identity to avoid
detection of their true identity.
iii) Medical identity theft: criminals can seek medical drugs or treatment using
a stolen identity.
69. What is Ransomware?
Ans. Ransomware another kind of cyber crime where the attacker gains access to the
computer and blocks the user from accessing, usually by encrypting the data. The
attacker blackmails the victim to pay for getting access to the data, or sometimes
Ans. Digital signatures are the digital equivalent of a paper certificate. Signing a
document digitally means attaching that user's identity which can be
used to authenticate.
Digital signatures work on a unique digital ID issued by a Certified Authority
(CA) to the user.
A licensed CA, who has been granted a license to issue it under section 24 of the
Indian IT-Act 2000, can issue the digital signature.
78. Why Cyber Appellate Tribunal (CAT) is established?
Ans. Cyber Appellate Tribunal has been established to resolve disputes arising from
cyber crime, such as tampering with computer source documents, hacking the
computer system, using password of another person, publishing sensitive
personal data of others without their consent, etc.
79. Why the IT Act needed?
Or,
Write the importance of IT Act, 2000.
Ans. The IT act is needed so that people can perform transactions over the Internet
through credit cards without fear of misuse. Not only people, the act empower
government departments also to accept filing, creation and storage of official
documents in the digital format.
80. Write some Sections, its Offences and Penalties under IT Act 2000.
Ans. Some of sections under IT ACT 2000 are given below-
e-Waste Management
83. How can e-waste, containing certain elements or metals used in the
production of electronic products, cause air, water, and soil pollution?
Ans. When e-waste is carelessly thrown or dumped in landfills or dumping grounds,
certain elements or metals used in production of electronic products cause air,
water and soil pollution.
This is because when these products come in contact with air and moisture, they
tend to leach. As a result, the harmful chemicals seep into the soil, causing soil
pollution.
Further, when these chemicals reach and contaminate the natural ground
water, it causes water pollution as the water becomes unfit for humans,
animals and even for agricultural use.
When dust particles loaded with heavy metals enters the atmosphere, it causes
air pollution as well.
84. What are some of the specific metals and elements commonly used in
the manufacturing of electrical or electronic devices, which can have
environmental implications if not managed properly?
Ans. The electrical or electronic devices are manufactured using certain metals and
elements like lead, beryllium, cadmium, plastics, etc.
Most of these materials are difficult to recycle and are considered to be toxic
and carcinogenic.
If e-waste is not disposed of in proper manner, it can be extremely harmful to
humans, plants, animals and the environment.
85. Which metals is widely used in electronic devices such as monitors and
batteries?
Ans. One of the most widely used metals in electronic devices such as monitors and
batteries is Lead.
86. How the lead poisoning affects human body?
Ans. When lead enters the human body through contaminated food, water, air or soil,
it causes lead poisoning which affects the kidneys, brain and central nervous
system.
Children are particularly vulnerable to lead poisoning.
87. How the e-waste can impact on humans?
Ans. The electrical or electronic devices are manufactured using certain metals and
elements like lead, beryllium, cadmium, plastics, etc.
Lead :When lead enters the human body through contaminated food, water, air
or soil, it causes lead poisoning which affects the kidneys, brain and central
nervous system.
Beryllium :When e-waste such as electronic circuit boards are burnt for
disposal, the elements contained in them create a harmful chemical called
Beryllium which causes skin diseases, allergies and an increased risk of
lung cancer.
Mercury :Some of the electronic devices contain Mercury which causes
respiratory disorders and brain damage.
Cadmium :The Cadmium found in semiconductors and resistors can damage
kidneys, liver and bones.
Plastic :When this plastic reacts with air and moisture, it passes harmful
chemicals into the soil and water resources. When consumed, it damages the
immune system of the body and also causes various psychological
problems like stress and anxiety. Burning of insulated wires to extract
copper can cause neurological disorders.
88. How the Indian e-Waste is a mess stinks?
Ans. Any electronic or electrical product which is discarded is called e-Waste. E-waste
is a growing problem for us in India. As a 132 cr. strong economy, we produce e-
waste in large quantities. India’s e-waste generation is rising at the rate of 4 to
5%. The huge gap between e-waste generation and e-waste recycling
management. It is very important to dispose of waste in a pragmatic manner.
89. What you can do to manage or control e-Waste?
Or,
iv) Do not eat food or drink over the keyboard. Food crumbs that fall into the
gaps between the keys or spilled over liquid can cause issues to the devices.
1. After practicals, Atharv left the computer laboratory but forgot to sign off from his
email account. Later, his classmate Revaan started using the same computer. He
is now logged in as Atharv. He sends inflammatory email messages to few of his
classmates using Atharv’s email account.
Revaan’s activity is an example of which of the following cyber crime? Justify your
answer.
a) Hacking
b) Identity theft
c) Cyber bullying
d) Plagiarism
Ans. c) Cyber bullying
2. Rishika found a crumpled paper under her desk. She picked it up and opened it. It
contained some text which was struck off thrice. But she could still figure out easily
that the struck off text was the email ID and password of Garvit, her classmate.
What is ethically correct for Rishika to do?
a) Inform Garvit so that he may change his password.
b) Give the password of Garvit’s email ID to all other classmates.
c) Use Garvit’s password to access his account.
Ans. a) Inform Garvit so that he may change his password.
3. Suhana is down with fever. So she decided not to go to school tomorrow. Next day,
in the evening she called up her classmate, Shaurya and enquired about the
computer class. She also requested him to explain the concept. Shaurya said, “Mam
taught us how to use tuples in python”. Further, he generously said, “Give me some
time, I will email you the material which will help you to understand tuples in
python”. Shaurya quickly downloaded a 2-minute clip from the Internet explaining
the concept of tuples in python. Using video editor, he added the text “Prepared by
Shaurya” in the downloaded video clip. Then, he emailed the modified video clip to
Suhana. This act of Shaurya is an example of:
a) Fair use
b) Hacking
c) Copyright infringement
d) Cyber crime
Ans. c) Copyright infringement
4. After a fight with your friend, you did the following activities.
Which of these activities is not an example of cyber bullying?
a) You sent an email to your friend with a message saying that “I am sorry”.
b) You sent a threatening message to your friend saying “Do not try to call or
talk to me”.
Ans. a) You sent an email to your friend with a message saying that “I am sorry”.
5. Sourabh has to prepare a project on “Digital India Initiatives”. He decides to get
information from the Internet. He downloads three web pages (webpage 1, webpage
2, webpage 3) containing information on Digital India Initiatives.
Which of the following steps taken by Sourabh is an example of plagiarism or
copyright infringement? Give justification in support of your answer.
a) He read a paragraph on “Digital India Initiatives” from webpage 1 and
rephrased it in his own words. He finally pasted the rephrased paragraph in
his project.
b) He downloaded three images of “Digital India Initiatives” from webpage 2.
He made a collage for his project using these images.
c) He downloaded “Digital India Initiative” icon from web page 3 and pasted it
on the front page of his project report.
Ans. a) He read a paragraph on “Digital India Initiatives” from webpage 1 and
rephrased it in his own words. He finally pasted the rephrased paragraph
in his project.
6. Match the following:
Column A Column B
Plagiarism Fakers, by offering special rewards or money prize asked
for personal information, such as bank account
information
Hacking Copy and paste information from the Internet into your
report and then organise it
Credit card fraud The trail that is created when a person uses the Internet.
Digital Foot Print Breaking into computers to read private emails and other
files
7. You got the below shown SMS from your bank querying a recent transaction.
that the password of the students was about to expire. Instructions were given to
go to URL to renew their password within 24 hours.
In all these cases, it's important to be aware that your online activities related to
vacation planning can leave a trace of data that may be used for various purposes,
including targeted advertising, improving user experiences, and data analytics.
11. How would you recognise if one of your friends is being cyber bullied?
a) Cite the online activities which would help you detect that your friend is
being cyber bullied?
b) What provisions are in IT Act 2000, (amended in 2008) to combat such
situations?
Ans. a) Cite online activities to detect cyberbullying:
Sudden Change in Online Behavior: If your friend suddenly becomes anxious,
upset, or withdraws from their online activities, it could be a sign of cyberbullying.
Receiving Abusive or Threatening Messages: If your friend is receiving
offensive, threatening, or hurtful messages, either privately or in public online
spaces, this is a clear sign of cyberbullying.
Harassment or Impersonation: If someone is impersonating your friend or
repeatedly posting negative or false information about them online, it's a sign of
cyberbullying.
Exclusion from Online Groups: If your friend is being excluded from social
media groups or experiencing social isolation, it could be a form of bullying.
Changes in Mood and Behavior: Notice if your friend's mood, self-esteem, or
behavior changes as a result of online interactions. They may become more anxious,
depressed, or isolated.
Loss of Interest in Hobbies: A sudden loss of interest in previously enjoyed
activities, especially those related to the online world, might be a sign.
Evidence of Threats or Hurtful Posts: If your friend shows you evidence of
hurtful messages, threats, or offensive posts, take them seriously and document the
evidence.
b) Provisions in the IT Act 2000 (amended in 2008) to combat
cyberbullying:
The IT Act 2000, amended in 2008, provides several provisions that can be used to
combat cyberbullying:
Section 66A (Amended): This section, which was previously widely criticized for
being misused, was amended to remove the criminalization of "offensive" online
content. However, it still covers acts of cyberbullying, including sending offensive
messages or causing annoyance, inconvenience, or danger to the recipient.
Section 66E: This section covers the violation of privacy by capturing, publishing,
or disseminating images of a person's private area without their consent. It can be
used to address issues related to non-consensual sharing of explicit images
(commonly known as "revenge porn").
Section 67 and 67A: These sections deal with the publication or transmission of
obscene material and material containing sexually explicit content. They can be
invoked when explicit content is used to harass or defame someone.
Section 72 and 72A: These sections deal with the breach of confidentiality and the
disclosure of personal information without consent. They can be applicable when
personal information is shared online to harm or defame someone.
It's important to note that the IT Act provides legal recourse for victims of
cyberbullying, and individuals should report such incidents to law enforcement or
cybercrime authorities. Additionally, India has other laws and regulations,
including the Protection of Children from Sexual Offenses (POCSO) Act, that can
be applied to protect minors from online harassment and abuse.
12. Write the differences between the following-
a) Copyrights and Patents
b) Plagiarism and Copyright infringement
c) Non-ethical hacking and Ethical hacking
d) Active and Passive footprints
e) Free software and Free and open source software
Ans. a) Copyrights and Patents:
Copyrights: Protect original literary, artistic, and creative works, giving the
creator exclusive rights to reproduce, distribute, and adapt the work. Copyrights
are automatically granted upon creation and last for the creator's lifetime plus 70
years.
Patents: Protect inventions, granting the inventor exclusive rights to make, use,
and sell the patented invention for a limited time (typically 20 years). Patents
require a formal application and examination process.
b) Plagiarism and Copyright Infringement:
Plagiarism: Involves presenting someone else's work, ideas, or words as your own
without proper attribution or permission. It's an ethical violation but not
necessarily a legal one.
Copyright Infringement: Occurs when someone uses copyrighted material
without the owner's permission, violating the owner's exclusive rights. It is a legal
issue and can result in legal action.
c) Non-ethical Hacking and Ethical Hacking:
Non-ethical Hacking (Malicious Hacking): Involves unauthorized access,
disruption, or damage to computer systems, networks, or data with malicious
intent, such as stealing information or causing harm.
Ethical Hacking (White-Hat Hacking): Involves authorized and legal
penetration testing and vulnerability assessments of computer systems, networks,
or applications to identify and rectify security weaknesses. Ethical hackers work to
improve security.
d) Active and Passive Footprints:
Active Footprints: Refers to the digital traces left intentionally by a user during
online activities. This can include social media posts, emails, comments, and other
direct interactions.
Passive Footprints: Refers to the digital traces left unintentionally, often as a
result of online tracking, data collection, or monitoring by websites, advertisers, or
third parties. These may include cookies, browsing history, and metadata.
e) Free Software and Free and Open Source Software (FOSS):
Free Software: Refers to software that is free in the sense of user freedom. Users
have the liberty to run, study, modify, and distribute the software. It doesn't
necessarily mean the software has no cost.
Free and Open Source Software (FOSS): Includes both the concept of user
freedom and the idea of open collaboration. FOSS not only allows users to view and
modify the source code but also encourages open development and community
collaboration. FOSS is often available at no cost.
13. If you plan to use a short text from an article on the web, what steps must you take
in order to credit the sources used?
Ans. Failing to provide proper attribution or using someone else's content without
permission can result in copyright infringement or plagiarism, which can have legal
and ethical consequences. It's essential to respect the rights of content creators and
follow best practices for using and crediting online sources.
14. When you search online for pictures, how will you find pictures that are available
in the free public domain? How can those pictures be used in your project without
copyright violations?
Ans. To find pictures available in the free public domain and use them in your project
without copyright violations, follow these steps:
1. Use Public Domain Databases: There are several online resources and
databases that specifically host public domain or Creative Commons (CC) licensed
images. Websites like Pixabay, Unsplash, Pexels, and Wikimedia Commons are
good places to start.
2. Filter by License: Many search engines and image hosting platforms allow you
to filter search results by license type. Look for options to filter by "public domain",
"CC", or "free to use."
3. Explore Government Websites: Government websites often provide access to
public domain images, particularly for educational and informational purposes.
4. Check Creative Commons: Creative Commons licenses, such as CC or CC BY,
allow for various degrees of use. Always check the specific license terms associated
with an image to ensure it's in the public domain or available for your intended use.
5. Verify Copyright Status: If you find an image outside of well-known public
domain resources, verify its copyright status. Look for information about the
image's copyright status on the source website or contact the owner for
confirmation.
15. Describe why it is important to secure your wireless router at home. Search the
Internet to find the rules to create a reasonably secure password. Create an
imaginary password for your home router. Will you share your password for home
router with following people? Justify your answer.
a) Parents
b) Friends
c) Neighbours
d) Home Tutors
Ans. Answer yourself
16. List down the steps you need to take in order to ensure
a) Your computer is in good working condition for a longer time.
b) Smart and safe Internet surfing.
Ans. a) To ensure your computer is in good working condition for a longer time:
1. Regularly Update Software: Keep your operating system, drivers, and
applications up to date. Software updates often include bug fixes and security
patches.
2. Install Antivirus Software: Use reputable antivirus and anti-malware
software to protect your computer from viruses and malicious software.
3. Manage Disk Space: Regularly clean up your hard drive by removing
unnecessary files and programs. Use tools like Disk Cleanup (Windows) or Disk
Utility (macOS).
4. Back Up Your Data: Create regular backups of your important files to prevent
data loss in case of hardware failure or malware attacks.
5. Password Protection: Set strong, unique passwords for your computer and
accounts to prevent unauthorized access.
7. Regularly Clear Cookies and Cache: Clear your browser's cookies and cache
to remove tracking data and improve your online privacy.
8. Stay Wary of Downloads: Be cautious when downloading files from the
internet. Only download from trusted sources and use reputable antivirus software
to scan downloads.
9. Be Careful with Public Wi-Fi: Use public Wi-Fi networks cautiously, as they
can be less secure. Avoid sensitive activities on unsecured networks.
10. Limit Sharing on Social Media: Be cautious about the information you share
on social media. Avoid revealing too much personal information publicly.
17. What is data privacy? Websites that you visit, collect what type of information
about you?
Ans. Data privacy, also known as information privacy or data protection, refers to
the concept of safeguarding an individual's or organization's personal, sensitive, or
confidential information from unauthorized access, use, disclosure, or other privacy
violations.
Data privacy is the practice of controlling and managing the collection, storage, and
sharing of personal data in a way that ensures the confidentiality and security of
that information.
Websites that you visit can collect various types of information about you,
including:
i) Personal Information: This may include your name, email address, phone
number, and sometimes even your physical address if you provide it during
registration or transactions.
ii) Browsing History: Websites can track the pages you visit on their site, the links
you click, and the time you spend on each page.
iii) Cookies: Websites often use cookies to track your online behavior. These are
small text files stored on your device that remember your preferences and
activities.
iv) IP Address: Websites can log your IP address, which can be used to identify
your approximate location and internet service provider.
v) Device Information: Information about the device you are using, such as its
type, operating system, browser version, and screen resolution, may be
collected.
vi) Referral Source: Websites can determine how you arrived at their site, whether
through a search engine, social media, or another website.
vii) User Behavior: Information about your interactions on the site, such as what
products you view, what items you add to your shopping cart, or which articles
you read.
viii) Form Submissions: If you fill out forms on websites, such as contact forms or
surveys, the information you provide can be collected.
ix) Social Media Integration: Many websites allow you to log in or share content
using your social media profiles. This may grant them access to your social
media data.
x) Third-Party Tracking: Websites can integrate third-party tools and services,
such as Google Analytics or advertising networks, to collect additional data
about your behavior and preferences.
18. In the computer science class, Sunil and Jagdish were assigned the following task
by their teacher.
a) Sunil was asked to find information about “India, a Nuclear power”. He was
asked to use Google Chrome browser and prepare his report using Google
Docs.
b) Jagdish was asked to find information about “Digital India”. He was asked
to use Mozilla Firefox browser and prepare his report using Libre Office
Writer.
What is the difference between technologies used by Sunil and Jagdish?
Ans. The main differences between the technologies used by Sunil and Jagdish are as
follows:
Web Browsers:
• Google Chrome is a popular web browser developed by Google.
• Mozilla Firefox is an open-source web browser developed by the Mozilla
Foundation.
Document Editing Software:
• Google Docs, which is a cloud-based word processing application developed
by Google. It allows collaborative document editing and is accessible through
a web browser.
• LibreOffice Writer, which is an open-source word processing software.
LibreOffice is a free and open-source office suite that includes a word
processor, spreadsheet, presentation software, and more.
19. Cite examples depicting that you were a victim of following cyber crime. Also, cite
provisions in IT Act to deal with such a cyber crime.
a) Identity theft
b) Credit card account theft
Ans. a) Identity Theft:
A person gains unauthorized access to someone's personal information, such as
their name, address, social security number, and uses this information to
impersonate the victim for fraudulent activities, like opening bank accounts or
applying for credit cards.
Provisions in the IT Act: In India, identity theft may be addressed under various
sections of the IT Act. For instance, Section 66C deals with identity theft and
provides for penalties for any person who dishonestly or fraudulently makes use of
Find out which of the following email etiquettes are missing in it. Justify your
answer.
a) Subject of the mail
b) Formal greeting
c) Self-explanatory terms
d) Identity of the sender
e) Regards
Ans. Try Yourself
21. Sumit got good marks in all the subjects. His father gifted him a laptop. He would
like to make Sumit aware of health hazards associated within appropriate and
excessive use of laptop. Help his father to list the points which he should discuss
with Sumit.
Chapter 6: Societal Impact 37 | P a g e
Pr ep ar ed b y : Tap os h Ka rm akar AI R FO R CE SC HO OL J O RH A T | M ob i l e : 7 00 20 70 3 13
Las t Up d a ted on 11 September 2024
Class Notes :2024-25
Ans. Sumit's father can discuss the following points with him to make him aware of the
health hazards associated with inappropriate and excessive use of a laptop:
i) Eye Strain: Spending long hours on a laptop screen can lead to eye strain,
which may cause discomfort, dry eyes, headaches, and blurred vision.
ii) Poor Posture: Prolonged laptop use in awkward positions can result in poor
posture and musculoskeletal issues. Sumit should be advised to use an external
keyboard and mouse to maintain an ergonomic setup.
iii) Repetitive Strain Injuries (RSIs): Using the laptop's touchpad or keyboard
for extended periods without breaks can lead to RSIs, such as carpal tunnel
syndrome. Taking regular breaks and using proper accessories can help
prevent this.
iv) Radiation and Heat: Laptops emit electromagnetic radiation and heat. While
there is no conclusive evidence of harm, it's advisable to maintain a safe
distance and use a cooling pad to reduce heat exposure.
v) Sleep Disruption: Using a laptop late into the night can disrupt sleep
patterns due to the blue light emitted from screens. Sumit should avoid laptop
use before bedtime.
vi) Internet Safety: Sumit should be educated about internet safety to avoid
online threats, scams, and inappropriate content. He should use strong, unique
passwords and avoid sharing personal information online.
vii) Privacy Concerns: Discuss the importance of protecting personal and
sensitive information while using a laptop, including secure browsing, using
firewalls, and not sharing private data.
viii) Addiction and Mental Health: Spending excessive time on a laptop,
especially on social media and gaming, can lead to addiction and negatively
impact mental health. Encourage a balanced approach and physical activities.
ix) Parental Controls: If Sumit is a minor, consider using parental control
software to limit his online activities and screen time.
x) Hygiene: Remind Sumit to keep his laptop clean, as keyboards and screens
can harbor germs and bacteria.
xi) Backup and Security: Emphasize the importance of regular data backup to
avoid data loss. Install reliable antivirus and security software to protect the
laptop from malware.
xii) Healthy Habits: Encourage Sumit to establish healthy laptop use habits,
including regular breaks, maintaining a clean workspace, and using proper
accessories like a laptop stand.
xiii) Professional Help: If Sumit experiences any physical discomfort or health
issues related to laptop use, he should seek professional medical advice.
a. Digital Handprint
b. Digital Footprint
c. Offline Footprint
d. Offline Handprint
2. Abdul deleted all his chats from all his social media accounts, and he thinks
that all his traces are deleted completely. Is he right in thinking so?
a. Yes
b. No
c. May be
d. Not sure
c. No Copyright violation
a. Spamming
b. Phishing
c. Plagiarism
d. Trojan
5. Consider the following scenario and answer the questions which follow:
a. Plagiarism
b. Spamming
c. Virus
d. Phishing
6. Consider the following scenario and answer the questions which follow:
a. Cyber Crime
b. Civil Crime
a. Free
b. Forever
c. Fire
d. Freezing
a. Ubuntu
b. Windows
c. Mozilla Firefox
d. Blender
a. Proprietary
b. FOSS
c. Freeware
d. Shareware
a. Data theft
11. Consider the following statements with reference to the use of email:
a. Statements 1 and 2
b. Statements 2 and 3
c. Statements 3 and 4
d. Statements 2 and 4
b. reply back to them and find out what their problem is.
c. shut down the computer and hope they'll leave him alone in future.
a. Plagiarism
b. Copyright Infringement
c. Patent
d. Trademark Infringement
15. ____________is the practice of taking someone else's work or ideas and
passing them off as one's own:
a. Plagiarism
b. Copyright
c. Patent
16. The legal and regulatory aspects of the internet refer to____________.
a. Cyber Space
b. Cyber crime
c. Criminal law
d. IT act
17. A software company purchases new computers every year and discards the
old ones into the local dumping yard. Write the name of the most
Chapter 6: Societal Impact 42 | P a g e
Pr ep ar ed b y : Tap os h Ka rm akar AI R FO R CE SC HO OL J O RH A T | M ob i l e : 7 00 20 70 3 13
Las t Up d a ted on 11 September 2024
Class Notes :2024-25
b. Commercial Waste
c. Solid Waste
d. E-Waste
18. Following are the impact of e-waste on the environment. Choose the odd
one out.
a. Soil Pollution
b. Water Pollution
c. Air Pollution
d. Sound Pollution
a. Reduce
b. Reuse
c. Recycle
20. When e-waste such as electronic circuit boards are burnt for disposal, the
elements contained in them create a harmful chemical called ______which
causes skin diseases, allergies and an increased risk of lung cancer.
a. Cadmium
b. Beryllium
c. Mercury
d. Lead
21. Lead poisoning, caused by exposure to lead from e-waste, primarily affects
which parts of the human body?
22. Which metal is commonly used in e-waste like monitors and batteries,
enters the human body through contaminated food, water, air or soil, can
affects the kidneys, brain and central nervous system?
a. Cadmium
b. Beryllium
c. Mercury
d. Lead
a. Both the assertion and reason are true, and the reason is a
correct explanation of the assertion.
b. Both the assertion and reason are true, but the reason is not a correct
explanation of the assertion.
c. The assertion is true, but the reason is false.
d. The assertion is false, but the reason is true.
24. Assertion: Passive digital footprints include data generated when we visit
a website, use a mobile app, or browse the internet.
Reason: Passive digital footprints are the unintentional data trail we leave
online.
a. Both the assertion and reason are true, and the reason is a
correct explanation of the assertion.
b. Both the assertion and reason are true, but the reason is not a correct
explanation of the assertion.
c. The assertion is true, but the reason is false.
d. The assertion is false, but the reason is true.
25. Assertion: Active and passive digital footprints are two distinct categories
of online data.
Chapter 6: Societal Impact 44 | P a g e
Pr ep ar ed b y : Tap os h Ka rm akar AI R FO R CE SC HO OL J O RH A T | M ob i l e : 7 00 20 70 3 13
Las t Up d a ted on 11 September 2024
Class Notes :2024-25
a. Both the assertion and reason are true, and the reason is a correct
explanation of the assertion.
b. Both the assertion and reason are true, but the reason is not a correct
explanation of the assertion.
c. The assertion is true, but the reason is false.
d. The assertion is false, but the reason is true.
26. Assertion: Active digital footprints include data that we intentionally
submit online.
a. Both the assertion and reason are true, and the reason is a correct
explanation of the assertion.
b. Both the assertion and reason are true, but the reason is not a correct
explanation of the assertion.
c. The assertion is true, but the reason is false.
d. The assertion is false, but the reason is true.