0% found this document useful (0 votes)
52 views45 pages

S7 Social Impacts 2024 25

Uploaded by

reduxotter
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
52 views45 pages

S7 Social Impacts 2024 25

Uploaded by

reduxotter
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 45

Chapter 6

Societal Impacts

Syllabus 2024-25 :
• Digital footprint, net and communication etiquettes, data protection,
• Intellectual property rights (IPR), Plagiarism, Licensing and copyright,
• Free and open-source software (FOSS)
• Cybercrime and Cyber laws,
• Hacking, phishing, cyber bullying,
• Overview of Indian IT Act 2000.

• E-waste: Hazards and Management.


• Awareness about health concerns related to the usage of technology.

1. What is a Technology?
Ans. Technology is the application of scientific knowledge to the making of tools to
solve specific problems. Technological advances such as automobiles, airplanes,
radio, television, cellular phones, computers, modems, and fax machines have
brought major advances and changes to the world.
2. How the digital technology changes the impact of human lives?
Ans. Digital Technologies changes have made a dramatic impact on our lives, making
things more convenient, faster, and easier to handle. Applications of digital
technologies have redefined and evolved all spheres of human activities. Today
more and more people are using digital technologies through Smartphones,
computers, etc., with the help of high-speed Internet.
3. Why did the digital technologies become so widespread?
Ans. The introduction of personal computers (PCs) and Internet followed by
smartphones has brought these technologies to the common man.
4. What is a digital footprint? Give the example of Digital Footprint.
Ans. A digital footprint is a trail of data you create while using the Internet. It
includes the websites you visit, emails you send, and information you submit to
online services. Example -
i) Posting on Facebook, Instagram, Snapchat, Twitter, and other social media
platforms.

Chapter 6: Societal Impacts 1|Page


Prepared by : Taposh Karmakar | Mobile : 7002070313 | Last Update : 11 September 2024
Class Notes :2024-25

ii) Filling out online forms, such as when signing up to receive emails or texts.
iii) Agreeing to install cookies on your devices when prompted by the browser.
Whenever we surf the Internet using smartphones, tablets, computers, etc., we
leave a trail of data reflecting the activities performed by us online, which is our
digital footprint. Our digital footprint can be created and used with or
without our knowledge. It includes websites we visit, emails we send, and any
information we submit online, etc., along with the computer’s IP address, location,
and other device specific details. Such data could be used for targeted
advertisement or could also be misused or exploited. Thus, it is good to be aware
of the data trail wemight be leaving behind. This awareness should makeus
cautious about what we write, upload or downloador even browse online.
5. Write the two different kinds of digital footprint.
Ans. Two different kinds of Digital Footprints are-
▪ Active digital footprints - It includes data that we intentionally
submit online. This would include emails we write, or responses or posts
we make on different websites or mobile Apps, etc.
▪ Passive Digital Footprints - The digital data trail that we leave online
unintentionally is called passive digital footprints. This includes the data
generated when we visit a website, use a mobile App, browse Internet, etc.
6. Where the digital footprint stores in a browser?
Ans. Everyone who is connected to the Internet may have a digital footprint. With more
usage, the trail grows. On examining the browser settings, we can find out how it
stores our browsing history, cookies, passwords, auto fills, and many other types
of data.
7. Where the digital footprint stored permanently besides the browser?
Or,
Does the digital footprint still remain even after erase the data?
Or,
Is there any guarantee that the digital footprints fully eliminated from
the Internet?
Ans. Besides browser, most of our digital footprints are stored in servers where the
applications are hosted. We may not have access to remove or erase that data;
neither do we have any control on how that data will be used. Therefore, once a
data trail is generated, even if we later try to erase data about our online
activities, the digital footprints still remain. There is no guarantee that digital
footprints will be fully eliminated from the Internet.
8. What is Digital Citizen or Netizen?
Ans. In this era of digital society, our daily activities like communication, social
networking,banking, shopping, entertainment, education, transportation, etc.,
are increasingly being driven by online transactions.

Chapter 6: Societal Impact 2|Page


Pr ep ar ed b y : Tap os h Ka rm akar AI R FO R CE SC HO OL J O RH A T | M ob i l e : 7 00 20 70 3 13
Las t Up d a ted on 11 September 2024
Class Notes :2024-25

Digital society thus reflects the growing trend of using digital technologies in all
spheres of human activities. But while online, all of us need to be aware of how to
conduct ourselves, how best to relate with others and what ethics, morals and
values to maintain. Anyone who uses digital technology along with
Internet is a digital citizen or a netizen. Being a good netizen means
practicing safe, ethical and legal use of digital technology.
9. What are the responsibilities of users to follow the etiquettes using
digital technology along with Internet?
Ans. A user of digital technology needs to follow certain etiquettes like net-etiquettes,
communication etiquettes and social media-etiquettes.
i) Net-etiquette includes avoiding copyright violations, respecting privacy and
diversity of users and avoiding cyber bullies and cyber trolls, besides sharing
of expertise.
ii) Communication-etiquette requires us to be precise and polite in our
conversation so that we remain credible through our remarks and comments.
iii) While using Social Media, one needs to take care of security through
password, be aware of fake information and be careful while befriending
unknowns. Care must be taken while sharing anything on social media as it
may create havoc if being mishandled, particularly our personal, sensitive
information.
10. What net-etiquettes should follow during Social interaction or while
being online?
Ans. One should be ethical, respectful and responsible while surfing the Internet.
i) Be Ethical –
• No copyright violation: We should not use copyrighted materials without
the permission of the creator or owner. As an ethical digital citizen, we need
to be careful while streaming audio or video or downloading images and
files from the Internet.
• Share the expertise: it is good to share information and knowledge on
Internet so that others can access it. However, prior to sharing information,
we need to be sure that we have sufficient knowledge on that topic. The
information shared should be true and unambiguous.
ii) Be Respectful–
• Respect privacy: as good digital citizens we have the right to privacy and
the freedom of personal expression. At the same time, we have to
understand that other digital citizens also have the same rights and
freedoms. Our personal communication with a digital citizen may include
images, documents, files, etc., that are private to both. We should respect
this privacy and should not share those images, documents, files, etc., with
any other digital citizen without each others’ consent.

Chapter 6: Societal Impact 3|Page


Pr ep ar ed b y : Tap os h Ka rm akar AI R FO R CE SC HO OL J O RH A T | M ob i l e : 7 00 20 70 3 13
Las t Up d a ted on 11 September 2024
Class Notes :2024-25

• Respect diversity: in a group or public forum, we should respect the


diversity of the people in terms of knowledge, experience, culture and other
aspects.
iii) Be Responsible –
• Avoid cyber bullying: any insulting, degrading or intimidating online
behavior like repeated posting of rumours, giving threats online, posting
the victim’s personal information, sexual harassment or comments aimed
to publicly ridicule a victim is termed as cyber bullying. It implies
repeatedly targeting someone with intentions to hurt or embarrass.
Perhaps new or non-frequent users of the Internet feel that things done
online have no effect in the real world. We need to realise that bullying
online can have very serious implications on the other person (victim). Also,
remember our actions can be traced back using our digital footprints.
• Don’t feed the troll: an Internet troll is a person who deliberately sows
discord on the Internet by starting quarrels or upsetting people, by posting
inflammatory or off topic messages in an online community, just for
amusement. Since trolls thrive on attention, the best way to discourage
trolls is not to pay any attention to their comments.
11. What communication etiquettes are required by digital citizens to abide
the good communication?
Ans. Digital communication includes email, texting, instant messaging, talking on the
cell phone, audio or video conferencing, posting on forums, social networking sites,
etc. All these are great ways to connect with people in order to exchange ideas,
share data and knowledge. Good communication over email, chat room and other
such forums require a digital citizen to abide by the communication etiquettes are
as –
i) Be Precise -
• Respect time: we should not waste precious time in responding to
unnecessary emails or comments unless they have some relevance for us.
Also, we should not always expect an instant response as the recipient may
have other priorities.
• Respect data limits: For concerns related to data and bandwidth, very
large attachments may be avoided. Rather send compressed files or link of
the files through cloud shared storage like Google Drive, Microsoft
OneDrive, Yahoo Dropbox, etc.
ii) Be Polite - Whether the communication is synchronous (happening in real
time like chat, audio/video calls) or asynchronous (like email, forum post or
comments), we should be polite and non-aggressive in our communication.
We should avoid being abusive even if we don’t agree with others’ point of
view.
iii) Be Credible - We should be cautious while making a comment, replying
or writing an email or forum post as such acts decide our credibility over a
period of time. That is how we decide to follow some particular person’s
Chapter 6: Societal Impact 4|Page
Pr ep ar ed b y : Tap os h Ka rm akar AI R FO R CE SC HO OL J O RH A T | M ob i l e : 7 00 20 70 3 13
Las t Up d a ted on 11 September 2024
Class Notes :2024-25

forum posts while ignoring posts of other members of the forum. On various
discussion forums, we usually try to go through the previous comments of
a person and judge their credibility before relying on that person’s
comments.
12. What do you mean by social media? What etiquettes should be followed
in Social Media?
Ans. Social media are websites or applications that enable their users to participate
in social networking by creating and sharing content with others in the
community. These platforms encourage users to share their thoughts and
experiences through posts or pictures.
In social media too, there are certain etiquettes need to follow –
i) Be Secure –
• Choose password wisely: It is vital for social network users. News of
breaching or leakage of user data from social network often attracts
headlines. Users should be wary of such possibilities and must know how
to safeguard themselves and their accounts. The minimum one can do is to
have strong and frequently changed password. Never share personal
credentials like username and password with others.
• Know who you befriend: Social networks usually encourage connecting
with users (making friends), sometime even those whom we don’t know or
have not met. However, we need to be careful while befriending unknown
people as their intentions possibly could be malicious and unsafe.
• Beware of fake information: Fake news, messages and posts are
common in social networks. As a user, we should be aware of them. With
experience, we should be able to figure out whether a news, message or post
is genuine or fake. Thus, we should not blindly believe in everything that
we come across on such platforms, we should apply our knowledge and
experience to validate such news, message or post.
ii)
Be Reliable –
Think before uploading: We can upload almost anything on social

network. However, remember that once uploaded, it is always there in the
remote server even if we delete the files. Hence, we need to be cautious
while uploading or sending sensitive or confidential files which have a
bearing on our privacy.
13. What do you mean by the Sensitive Data? Give example.
Ans. Elements of data that can cause substantial harm, embarrassment, inconvenience
and unfairness to an individual, if breached or compromised, is called Sensitive
Data.
Examples of sensitive data include biometric information, health information,
financial information, or other personal documents, images or audios or videos.
14. How to implement Privacy of Sensitive Data?

Chapter 6: Societal Impact 5|Page


Pr ep ar ed b y : Tap os h Ka rm akar AI R FO R CE SC HO OL J O RH A T | M ob i l e : 7 00 20 70 3 13
Las t Up d a ted on 11 September 2024
Class Notes :2024-25

Ans. Privacy of sensitive data can be implemented by encryption, authentication,


and other secure methods to ensure that such data is accessible only to the
authorised user and is for a legitimate purpose.
15. What is the difference between Data privacy and Digital piracy?
Ans. Data privacy refers to the protection of personal or sensitive information from
unauthorized access or disclosure. This information can include personal data,
financial records, health information, and more.
Digital piracy refers to the unauthorized duplication, distribution, or sharing of
digital content, such as software, music, movies, eBooks, and more, without the
consent of the copyright holder or without proper licensing.
16. What is Data Protection Policy (Law)? What is main motive behind data
protection policy?
Ans. Data Protection Policies are legal documents that provide guidelines to the
user on processing, storage and transmission of sensitive information.
The motive behind implementation of these policies is to ensure that sensitive
information is appropriately protected from modification or disclosure.
17. What is an Intellectual Property (IP)?
Ans. ▪ Intellectual property (IP) is a category of property that includes
intangible creations of the human intellect.
▪ Intellectual property refers to creations of the mind: inventions; literary
and artistic works; and symbols, names and images used in commerce.
Thus, Intellectual Property refers to the inventions, literary and artistic
expressions, designs and symbols, names and logos. The ownership of such
concepts lies with the creator, or the holder of the intellectual property. This enables
the creator or copyright owner to earn recognition or financial benefit by using their
creation or invention.

18. How to prevent IP?


Or,
What are Intellectual Property Rights (IPR)? Write its different types.

Chapter 6: Societal Impact 6|Page


Pr ep ar ed b y : Tap os h Ka rm akar AI R FO R CE SC HO OL J O RH A T | M ob i l e : 7 00 20 70 3 13
Las t Up d a ted on 11 September 2024
Class Notes :2024-25

Ans. Intellectual Property Rights (IPR) help in data protection through copyrights,
patents and trademarks. There are both ethical and legal aspects of violating IPR.
A good digital citizen should avoid plagiarism, copyright infringement and
trademark infringement.
▪ Intellectual Property Rights (IPR) is the statutory right granted by the
Government, to the owner(s) of the intellectual property or applicant(s) of an
intellectual property to exclude others from exploiting the IP commercially for
a given period of time in lieu of the discloser of his/her IP in an IPR
application.
▪ The most well-known types are Copyrights, Patents, Trademarks and trade
secrets.
19. How to protect Intellectual Property legally?
Ans. Intellectual Property is legally protected through copyrights, patents,
trademarks, etc
20. What is a Copyright and Copyright Law?
Ans. Copyright – Copyright is a legal means of protecting an author’s work
created or originated.
Copyright grants legal rights to creators for their original works like writing,
photograph, audio recordings, video, sculptures, architectural works, computer
software, and other creative works like literary and artistic work. Copyrights are
automatically granted to creators and authors.
Copyright law gives the copyright holder a set of rights that they alone can avail
legally. The rights include right to copy (reproduce) a work, right to create
derivative works based upon it, right to distribute copies of the work to the public,
and right to publicly display or perform the work. It prevents others from copying,
using or selling the work.
• It gives creators protection against use of their work without permission.
Owners of copyright can use, sell or license a work to a third party.
A Patent is usually granted for inventions. Unlike copyright, the
inventor needs to apply (file) for patenting the invention. When a
patent is granted, the owner gets an exclusive right to prevent others
from using, selling, or distributing the protected invention. Patent
gives full control to the patentee to decide whether or how the
invention can be used by others.
A patent protects an invention for 20 years, after which it can
be freely used.
21. What rights does a patent give?
Ans. • A patent gives the right to stop others from using your inventions.
• A patent also brings the right to take legal action against others who might
be infringing and to claim an image.

Chapter 6: Societal Impact 7|Page


Pr ep ar ed b y : Tap os h Ka rm akar AI R FO R CE SC HO OL J O RH A T | M ob i l e : 7 00 20 70 3 13
Las t Up d a ted on 11 September 2024
Class Notes :2024-25

• An inventor is not required to get a patent in order to put an invention into


practice, but once the invention is made public, there will be no protection
against others using the invention and you would be unable to obtain a
patent.
22. What is a Trademark?
Ans. Trademark includes any visual logo or symbol, word, name, design, slogan, label,
image or combination of these elements etc., that distinguishes the brand or
commercial enterprise, from other brands or commercial enterprises.
For example, no company other than Nike can use the Nike brand to sell shoes or
clothes.
It also prevents others from using a confusingly similar mark, including words or
phrases. For example, confusing brands like “Nikke” cannot be used.

23. What is the importance of Trademark?


Ans. Importance of Trademark -
• Used in commerce.
• Have fees paid as required to keep it in force.
• Must be identified as a Trademark by ® or ™
• They should not be descriptive and must not include common surnames,
geographical names, registered company names or anything implying royal
patronage.
• Make sure that chosen trademark does not infringe someone else’s and that
you are free to use it.
• Trademarks do not necessarily require government approval to be in effect;
they can apply through abundant use in interstate commerce.
24. Write the differences between Copyright and Patent?
Ans. ▪ Copyright grants legal rights to creators for their original works where as a
Patent is usually granted for inventions.
▪ Copyrights are automatically granted to creators and authors whereas the
inventor needs to apply (file) for patenting the invention.
▪ To use other’s copyrighted material, one needs to obtain a license from them
whereas a patent protects an invention for 20 years, after which it can be
freely used.
25. Write a similarity between Copyright and Patent?
Ans. Copyright prevents others from copying, using or selling the work whereas a
patent gets an exclusive right to prevent others from using, selling or distributing
the protected invention.

Chapter 6: Societal Impact 8|Page


Pr ep ar ed b y : Tap os h Ka rm akar AI R FO R CE SC HO OL J O RH A T | M ob i l e : 7 00 20 70 3 13
Las t Up d a ted on 11 September 2024
Class Notes :2024-25

26. List down the steps in order to executing IPR for software.
Ans. Executing IPR for a software -
▪ Code of the software will be protected by a Copyright.
▪ Functional expression of the idea will be protected by a Patent.
▪ The name and logo of the software will come under a registered
Trademark.
27. Write the different way in order to violating IPR.
Ans. Violation of intellectual property right may happen in one of the following ways:
i) Plagiarism – Presenting someone else’s idea or work as one’s own idea or
work is called plagiarism.
i) Copyright Infringement - Copyright infringement is when we use other
person’s work without obtaining their permission to use or we have not paid
for it, if it is being sold.
ii) Trademark Infringement- Trademark Infringement means
unauthorised use of other’s trademark on products and services.
28. What is Plagiarism?
Ans. Presenting someone else’s idea or work as one’s own idea or work is called
plagiarism. If we copy some contents from Internet, but do not mention the
source or the original creator, then it is considered as an act of plagiarism.
It is a serious ethical offense and sometimes considered as an act of fraud. Even
if we take contents that are open for public use, we should cite the author or source
to avoid plagiarism.
In other word, Plagiarism is the "wrongful appropriation" and "stealing
and publication" of another author's "language, thoughts, ideas, images,
words or expressions" and the representation of them as one's own original
work.
• With the rise of the Internet, plagiarism has risen to a new level.
29. What is the Importance of Plagiarism?
Ans. • Steal and pass off (the ideas or words of another) as one’s own
• Use (another’s production) without crediting the source
• Commit literary theft
• Present as new and original an idea or product derived from an existing source
30. Write the different types of Plagiarism?
Ans. Two types of Plagiarism -
▪ Intentional Plagiarism
• Copying other’s work
• Borrowing/buying assignments
• Copy, Paste from electronic resources

Chapter 6: Societal Impact 9|Page


Pr ep ar ed b y : Tap os h Ka rm akar AI R FO R CE SC HO OL J O RH A T | M ob i l e : 7 00 20 70 3 13
Las t Up d a ted on 11 September 2024
Class Notes :2024-25

• Downloading essays/text from the Internet and presenting as own work.


▪ Unintentional Plagiarism
• Not knowing how to acknowledge or incorporate sources of information
through proper paraphrasing, summarizing and quotation.
• Careless copying and pasting from electronic databases.
• Quoting excessively.
• Failure to use own “Voice”.
31. What do meant by Copyright infringement?
Ans. Copyright infringement is when we use other person’s work without obtaining
their permission to use or we have not paid for it, if it is being sold. Suppose we
download an image from the Internet and use it in our project. But if the owner
of the copyright of the image does not permit its free usage, then using such an
image even after giving reference of the image in our project is a violation of
copyright. On the Internet, does not mean that it is free for use. Hence, check the
copyright status of writer’s work before using it to avoid plagiarism.

32. What do you meant by Trademark Infringement?


Ans. Trademark Infringement means unauthorised use of other’s trademark on
products and services. An owner of a trademark may commence legal proceedings
against someone who infringes its registered trademark.
33. Write the difference between Plagiarism and Copyright Infringement.
Ans. Plagiarism means using other’s work and not giving adequate citation for use.
Copyright infringement means using another person’s work, without
permission or without paying for it, if it is being sold.
34. What is a License?
Ans. Licenses provide rules and guidelines for others to use the existing work. When
authors share their copyrighted works with others under public license, it allows
others to use and even modify the content.
35. What is the use of License?
Or,
Why License?
Ans. The use of strong licensing relationship brings benefits to all parties to the deal –
property owners and their agents, licensees and their affiliates, retailers
and, ultimately, consumers, Each of those parties has its own goals and aims
that ultimately adds value to the final product or service.
36. What is Public License? Write the two popular categories of Public
License.

Chapter 6: Societal Impact 10 | P a g e


Pr ep ar ed b y : Tap os h Ka rm akar AI R FO R CE SC HO OL J O RH A T | M ob i l e : 7 00 20 70 3 13
Las t Up d a ted on 11 September 2024
Class Notes :2024-25

Ans. When authors share their copyrighted works with others under public license, it
allows others to use and even modify the content.
Two popular categories of Public License are-
i) Creative Commons (CC) - CC is used for all kind of creative works
like websites, music, film, literature, etc. CC enables the free
distribution of an otherwise copyrighted work. It is used when an author
wants to give people the right to share, use and build upon a work that
they have created.
CC licenses are a set of copyright licenses that give the recipients, rights
to copy, modify and redistribute the creative material, but giving the
authors, the liberty to decide the conditions of licensing.
ii) GNU General public license (GPL) – GPL is primarily designed for
providing public license to a software. GNU GPL is another free
software license, which provides end users the freedom to run, study,
share and modify the software, besides getting regular updates.
GPL is the most widely used free software license which grants the
recipients, rights to copy, modify and redistribute the software and that
the same rights are preserved in all derivative works.
Users or companies who distribute GPL license works may charge a fee
for copies or give them free of charge.
The GPL is a copyleft license, which means that derivative
work must be open-source and distributed under the same or equivalent
license terms.
37. Define FOSS.
Ans. Free and open-source software (FOSS) has a large community of users and
developers who are contributing continuously towards adding new features or
improving the existing features. For example, Linux kernel-based operating
systems like Ubuntu and Fedora come under FOSS. Some of the popular FOSS
tools are office packages, like Libre Office, browser like Mozilla Firefox, etc.
38. What do you meant by ‘Open Source’?
Ans. The term ‘Open Source’ refers to software in which the source code is freely
available for others to view amends and adapt.
39. Define OSS.
Ans. OSS refers to Open-Source Software, which refers to software whose source code
is available to customers and it can be modified and redistributed without any
limitation. An OSS may come free of cost or with a payment of nominal charges
that its developers may charge in the name of development.
40. Define FLOSS.
Ans. FLOSS refers to Free/Libre and Open-Source Software, which refers to software
to software which is both free software as well as Open-Source Software. Libre
means freedom.

Chapter 6: Societal Impact 11 | P a g e


Pr ep ar ed b y : Tap os h Ka rm akar AI R FO R CE SC HO OL J O RH A T | M ob i l e : 7 00 20 70 3 13
Las t Up d a ted on 11 September 2024
Class Notes :2024-25

41. What do you understand by Proprietary Standard Software?


Ans. Proprietary Standards are those, for which users have to buy license to use them.
Proprietary standards are owned by a single company/person/vendor or group of
vendors. Their specification is not publicly available.
Standards like Microsoft Office Formats (.doc, .docx, .ppt, .pptx, .xls, .xlsx etc.),
Windows Media Formats (.wma, .wmv etc.) , Apple Media Formats ( .mov etc)
are proprietary standards.
Open-Source License – Open-source licenses help others to contribute to
existing work or project without seeking special individual permission to do so.
Public License- When authors share their copyrighted works with others under
public license, it allows others to use and even modify the content.
42. How GPL License is differing from Freeware Software License?
Ans. Users or companies who distribute GPL license works may charge a fee for copies
or give them free of charge. This distinguishes the GPL license from freeware
software licenses like Skype, Adobe Acrobat reader, etc. that allow copying for
personal use but prohibit commercial distribution, or proprietary licenses where
copying is prohibited by copyright law.
43. Write the difference between “Proprietary Software” and “Free and
Open-Source Software”.
Ans. Proprietary software’s that we use are sold commercially and their program
code (source code) are not shared or distributed. For example, Microsoft Operating
System like Windows 7/10 and Microsoft Office package like MS-Word, Excel,
PowerPoint etc.
Free and Open Source Software is a vailable freely for anyone and their source
code is also open for anyone to access, modify, correct, improve and redistribute.
For example, Linux kernel-based operating systems like Ubuntu and Fedora come
under FOSS. Some of the popular FOSS tools are office packages, like Libre Office,
browser like Mozilla Firefox, etc.

44. Define Software Piracy. Why should we avoid software piracy?


Ans. Software piracy is the unauthorised use or distribution of software. Those who
purchase a license for a copy of the software do not have the rights to make
additional copies without the permission of the copyright owner. It amounts to
copyright infringement regardless of whether it is done for sale, for free
distribution or for copier’s own use.
One should avoid software piracy. Using pirated software not only degrades
the performance of a computer system, but also affects the software industry
which in turn affects the economy of a country.
45. Write the Pro’s and Con’s of Creative Commons License.
Ans. Pro’s-
• Creative Commons licenses are free to use, widely adopted and flexible.

Chapter 6: Societal Impact 12 | P a g e


Pr ep ar ed b y : Tap os h Ka rm akar AI R FO R CE SC HO OL J O RH A T | M ob i l e : 7 00 20 70 3 13
Las t Up d a ted on 11 September 2024
Class Notes :2024-25

• Creative Commons licenses are simple from a legal point of view and
provide a quick solution to the complexities of content licensing.
• It allows for easy sharing data can bring down costs and be beneficial for
humanity.
• Works come with permissions pre-applied, so users do not have to request
permissions to reuse individual works.
Con’s-
• Creative Commons is not appropriate for work from which you intend to
gain commercially, either now or in the future.
• No control over who will reuse your work, other than through the license
terms you choose to exercise.
• Licenses are non-revocable – you cannot withdraw copies of work released
under Creative Commons at a later date.
• The majority of today’s Creative Commons licensed works are only available
online, making them irrelevant in places where fast internet access is absent
or too expensive.
46. Write the purpose of GPL.
Ans. ▪ Freedom to download and run the software.
▪ Freedom to use a source
▪ Freedom to modify
▪ Freedom to share or redistribute
▪ Provide Legal protection
▪ GPL is Copyleft license created for the open source community.
47. Write the advantages and disadvantages of GPL.
Ans. Advantages of GPL -
• Regular feedback from users helps in the development of software in new
areas.
• Open-source software aids to the free development of several other open-
source software.
• Get technical support from developer’s community.
• Reduces the cost of software maintenance as the volunteer’s increases.
• Bugs can be identified easily many people’s worked on it.
• Copyleft license created for the open-source community.
• Open-source product itself will tempt the user to try and use it.
Disadvantages of GPL -

Chapter 6: Societal Impact 13 | P a g e


Pr ep ar ed b y : Tap os h Ka rm akar AI R FO R CE SC HO OL J O RH A T | M ob i l e : 7 00 20 70 3 13
Las t Up d a ted on 11 September 2024
Class Notes :2024-25

• If GPL licensed product is used in any commercial product then the entire
product has to be released as open source. Most of the companies set a ban
to use GPL product.
• As per the clause "the derivative work should also be released as open source“.
• It’s extremely viral. If your project contains a component that is under the
GPL, your whole project is subject to the GPL too.
48. Distinguish between Copyright and License.
Ans. Copyright sometimes put restriction on the usage of the copyrighted works by
anyone else whereas Licenses provide rules and guidelines for others to use the
existing work. When authors share their copyrighted works with others under
public license, it allows others to use and even modify the content.
49. Differentiate between Copyright and Copyleft.
Ans. ▪ A COPYRIGHT is a legal process used by creators and inventors to protect
their work and to control distribution of their product.
▪ Whereas, the COPYLEFT is an invented term, used to describe
a copyright that requires anyone distributing a copy or derived copy to allow
redistribution of their code.

50. Write the main Features of Apache License


Ans. • Software may be freely used, reproduced, modified, distributed or sold.
• Software can be combined with other products and distributed or sold
as packages.
• Products derived or modified from licensed software can be distributed
under other licenses.
• Apache software cannot be redistributed without attribution.
• A copy of the license must be redistributed along with any Apache software.
• External contributions to the software are released under the ASF terms
unless explicitly specified otherwise.
51. Write the important criteria under GPL for Open-Source License.
Ans. ▪ The license must be Technology-Natural
▪ Source code
▪ Free Redistribution
▪ Distribution of license
▪ Derived work
▪ A license must not be specific to the product

Chapter 6: Societal Impact 14 | P a g e


Pr ep ar ed b y : Tap os h Ka rm akar AI R FO R CE SC HO OL J O RH A T | M ob i l e : 7 00 20 70 3 13
Las t Up d a ted on 11 September 2024
Class Notes :2024-25

▪ No discrimination between the field of endeavor


▪ A license must not restrict other software
▪ The integrity of the author’s source code
52. What are the Advantages and disadvantages of Open-Source License?
Ans. Advantages of Open-Source License -
• Very low cost, negligible cost or free.
• No vendor integration
• Collaboration culture
• Highly efficient and quality product software
• The audit is very easy
• Updates anytime anywhere
• License management
• Debugging is easy
• Abundant support
• Large community
• Very low hardware cost
Disadvantages of Open-Source License –
• It can be less user-friendly to some people as we are copying the source code
indirectly.
• Sometimes support issue may also go wrong
• Though open-source license is free there are charges associated with its plug-
in modules and many other things.
• Malicious users can potentially view it and exploit any vulnerabilities.
53. Give some examples of Open-Source Software (OSS)
Ans. • Operating System – Linux, Ubuntu, etc.
• DBMS/RDBMS – MySQL, Mongodb, etc.
• Programming Languages – Java, PHP, Python, etc.
• Web Browser – Chromium, FireFox, etc.
• Web Server – Apache, HTTP Server, Apache Tomcat, etc.
54. What is Free Software?
Ans. Free software can be studied, copied, redistributed freely and even modified
according to one's need without seeking any kind of permission. In order to modify
such software the developers also provide the source code to the users.
55. What is Freeware? How it is differed from free software?

Chapter 6: Societal Impact 15 | P a g e


Pr ep ar ed b y : Tap os h Ka rm akar AI R FO R CE SC HO OL J O RH A T | M ob i l e : 7 00 20 70 3 13
Las t Up d a ted on 11 September 2024
Class Notes :2024-25

Ans. That software which are actually "free" in the sense of price. These are known as
Freeware. Lots of freeware can be downloaded from the internet for various
different purposes such as currency converters, drawing graphs and charts etc.
But freeware may not come with the source code.
56. Give some examples of Free Software.
Ans. Examples of free software include the Linux Kernel, MySQL Relational Database,
Apache web server, OpenOffice.org office suite and TeX and LaTeX typesetting
systems.
57. What is Computer/Cyber Fraud? Write the different types of Computer
Fraud presently exist.
Ans. Computer fraud is the act of using a computer to take or alter electronic data, or
to gain unlawful use of a computer or system.
Phishing, social engineering, viruses, and DDoS attacks are fairly well-known
tactics used to disrupt service or gain access to another's network.
Types of computer fraud include:
• Distributing hoax emails
• Accessing unauthorized computers
• Engaging in data mining via spyware and malware
• Hacking into computer systems to illegally access personal information,
such as credit cards or Social Security numbers
• Sending computer viruses or worms with the intent to destroy or ruin
computer or system.
58. What is Cybercrime?
Ans. Cybercrime, or computer-oriented crime, is a crime that involves
a computer and a network.
▪ Cybercrimes can be defined as: “Offences that are committed against
individuals or groups of individuals with a criminal motive to intentionally
harm the reputation of the victim or cause physical or mental harm, or loss, to
the victim directly or indirectly, using modern telecommunication networks
such as Internet and mobile phones”.
▪ When any crime is committed over the Internet it is referred to as a Cyber
Crime.
▪ In short, Cyber crime is defined as a crime in which computer is the medium
of crime (hacking, phishing, spamming), or the computer is used as a tool to
commit crimes (extortion, data breaches, theft).
59. Write the reasons for growth in Cyber Crime.
Ans. • Cybercriminals are embracing new attack technologies.
• Many new Internet users come from countries with weak Cyber Security.

Chapter 6: Societal Impact 16 | P a g e


Pr ep ar ed b y : Tap os h Ka rm akar AI R FO R CE SC HO OL J O RH A T | M ob i l e : 7 00 20 70 3 13
Las t Up d a ted on 11 September 2024
Class Notes :2024-25

• Online crime is becoming easier through cybercrime-as-a-service and other


business schemes.
• Cybercriminals are becoming more financially sophisticated, making it
easier to monetize their exploits.
60. Write the most common types of Cyber Crime.
Ans. There are many types of cybercrimes and the most common ones are explained
below:
▪ Phishing
▪ Illegal download
▪ Child Pornography
▪ Scams
▪ Hacking
61. What is Hacking? What is Ethical and Non-ethical Hacking?
Ans. Hacking is the act of unauthorised access to a computer, computer network or
any digital system. Hackers usually have technical expertise of the hardware and
software. They look for bugs to exploit and break into the system.
▪ Hacking, when done with a positive intent, is called Ethical Hacking. Such
ethical hackers are known as WHITE HAT HACKERS.
▪ A Non-ethical Hacker is the one who tries to gain unauthorised access to
computers or networks in order to steal sensitive data with the intent to
damage or bring down systems. They are called BLACK HAT HACKERS or
CRACKERS.
62. “Ethical Hacking done with a positive intent”. Explain.
Or,
Write the purpose of Ethical hackers.
Ans. Hacking, when done with a positive intent, is called ethical hacking. Such ethical
hackers are known as white hat hackers. They are specialists in exploring any
vulnerability or loophole during testing of the software. Thus, they help in
improving the security of software.
An ethical hacker may exploit a website in order to discover its security loopholes
or vulnerabilities. He then reports his findings to the website owner. Thus, ethical
hacking is actually preparing the owner against any cyber-attack.
63. Write the primary focus of Non-Ethical Hackers or black hat
hackers/crackers.
Ans. Their primary focus is on security cracking and data stealing. They use their skill
for illegal or malicious purposes. Such hackers try to break through system
securities for identity theft, monetary gain, to bring a competitor or rival site
down, to leak sensitive information, etc.
64. What do you meant by Phishing?

Chapter 6: Societal Impact 17 | P a g e


Pr ep ar ed b y : Tap os h Ka rm akar AI R FO R CE SC HO OL J O RH A T | M ob i l e : 7 00 20 70 3 13
Las t Up d a ted on 11 September 2024
Class Notes :2024-25

Ans. Phishing is an unlawful activity where fake websites or emails that look original
or authentic are presented to the user to fraudulently collect sensitive and
personal details, particularly usernames, passwords, banking and credit card
details.
The most common phishing method is through email spoofing where a fake or
forged email address is used and the user presumes it to be from an authentic
source.
65. How the phishing works?
Ans. Phishing can work as follow-
Step 1 :Fraudsters
Step 2 :Build Fake Site.
Step 3 :Send out thousands of phishing emails with link to fake website.
Step 4 :Victims click on link in email believing it is legitimate. They enter
personal information.
Step 5 :Fraudsters compile the stolen data and sell it online or use it themselves.
66. What is an Identity theft?
Or,
Identity theft is one of the phishing attacks. How?
Ans. Identity thieves increasingly use personal information stolen from computers or
computer networks, to commit fraud by using the data gained unlawfully.
A user’s identifiable personal data like demographic details email ID, banking
credentials, passport, PAN, Aadhaar number and various such personal data are
stolen and misused by the hacker on behalf of the victim.
67. What is the main purpose of the Identity theft?
Ans. An identity theft is one type of phishing attack where the intention is largely for
monetary gain.
68. In what ways the criminal takes advantage of an individual’s stolen
identity?
Ans. There can be many ways in which the criminal takes advantage of an individual’s
stolen identity. Given below are a few examples:
i) Financial identity theft: when the stolen identity is used for financial gain.
ii) Criminal identity theft: criminals use a victim’s stolen identity to avoid
detection of their true identity.
iii) Medical identity theft: criminals can seek medical drugs or treatment using
a stolen identity.
69. What is Ransomware?
Ans. Ransomware another kind of cyber crime where the attacker gains access to the
computer and blocks the user from accessing, usually by encrypting the data. The
attacker blackmails the victim to pay for getting access to the data, or sometimes

Chapter 6: Societal Impact 18 | P a g e


Pr ep ar ed b y : Tap os h Ka rm akar AI R FO R CE SC HO OL J O RH A T | M ob i l e : 7 00 20 70 3 13
Las t Up d a ted on 11 September 2024
Class Notes :2024-25

threaten to publish personal and sensitive information or photographs unless a


ransom is paid.
70. How is the ransomware attackers gain access to the user’s computer?
Ans. Ransomware can get downloaded when the users visit any malicious or unsecure
websites or download software from doubtful repositories. Some ransomware are
sent as email attachments in spam mails. It can also reach our system when we
click on a malicious advertisement on the Internet.
71. What safety measures you should consider to reduce the risk of cyber
crime?
Ans. The challenges of cyber crime can be mitigated with the twin approach of being
alert and taking legal help. Following points can be considered as safety measures
to reduce the risk of cyber crime:
▪ Take regular backup of important data.
▪ Use antivirus software and keep it updated always.
▪ Avoid installing pirated software. Always download software from known and
secure (HTTPS) sites.
▪ Always update the system software which include the Internet browser and
other application software.
▪ Do not visit or download anything from untrusted websites.
▪ Usually the browser alerts users about doubtful websites whose security
certificate could not be verified; avoid visiting such sites.
▪ Use strong password for web login, and change it periodically. Do not use
same password for all the websites. Use different combinations of
alphanumeric characters including special characters. Ignore common words
or names in password.
▪ While using someone else’s computer, don’t allow browser to save password
or auto fill data, and try to browse in your private browser window.
▪ For an unknown site, do not agree to use cookies when asked for, through a
Yes/No option.
▪ Perform online transaction like shopping, ticketing, and other such services
only through well-known and secure sites.
▪ Always secure wireless network at home with strong password and regularly
change it.
72. What is Internet Troll or Cyber troll? How to deal with the trolls?
Ans. ▪ An Internet troll is a member of an online social community who
deliberately tries to disrupt attack, offend or generally cause trouble within
the community by posting certain comments, photos, videos, GIFs or some
other form of online content.

Chapter 6: Societal Impact 19 | P a g e


Pr ep ar ed b y : Tap os h Ka rm akar AI R FO R CE SC HO OL J O RH A T | M ob i l e : 7 00 20 70 3 13
Las t Up d a ted on 11 September 2024
Class Notes :2024-25

▪ In Internet Slang, a troll is a person who intentionally starts argument or


upsets people by posting inflammatory remarks in a newsgroup, forum, chat
room, blog etc. The sole purpose of trolling is angering people.
▪ The BEST ADVICE for dealing with being trolled is to ignore rather
than engage with a troll.
73. Give some examples of Internet trolls.
Ans. Cyberbullying, Cyberharressment, Cyber Stalking are some form of Internet
trolls.
Internet trolling is a common form of bullying over the Internet in an online
community.
74. What is Cyberbulling or Cyberharresment?
Ans. Cyber-bullying or cyber-harassment is a form of bullying or harassment using
electronic means.
Cyberbullying is the use of digital technologies with intent to offend, humiliate,
threaten, harass or abuse somebody.
75. What is Cyberstalking?
Ans. Cyberstalking is the use of the Internet or other electronic means
to stalk or harass an individual, group, or organization.
Cyberstalking is another form of bullying or harassment that uses electronic
communications to stalk a victim; this may pose a credible threat to the victim.
76. What is an Indian IT Act - 2000?
Ans. The Information Technology Act, 2000 provides legal recognition to the
transaction done via an electronic exchange of data and other electronic means of
communication or electronic commerce transactions.
With the growth of Internet, many cases of cybercrimes, frauds, cyber-attacks and
cyber bullying are reported. The nature of fraudulent activities and crimes keeps
changing. To deal with such threats, many countries have come up with legal
measures for protection of sensitive personal data and to safeguard the
rights of Internet users.
The Government of India’s Information Technology Act, 2000 (also known
as IT Act), amended in2008, and provides guidelines to the user on the
processing, storage and transmission of sensitive information. In many
Indian states, there are cyber cells in police stations where one can report any
cyber crime.
TheIndian IT Act, 2020provides legal framework for electronic governance by
giving recognition to electronic records and digital signatures. The act outlines
cyber crimes and penalties for them.
77. What are Digital Signatures?

Chapter 6: Societal Impact 20 | P a g e


Pr ep ar ed b y : Tap os h Ka rm akar AI R FO R CE SC HO OL J O RH A T | M ob i l e : 7 00 20 70 3 13
Las t Up d a ted on 11 September 2024
Class Notes :2024-25

Ans. Digital signatures are the digital equivalent of a paper certificate. Signing a
document digitally means attaching that user's identity which can be
used to authenticate.
Digital signatures work on a unique digital ID issued by a Certified Authority
(CA) to the user.
A licensed CA, who has been granted a license to issue it under section 24 of the
Indian IT-Act 2000, can issue the digital signature.
78. Why Cyber Appellate Tribunal (CAT) is established?
Ans. Cyber Appellate Tribunal has been established to resolve disputes arising from
cyber crime, such as tampering with computer source documents, hacking the
computer system, using password of another person, publishing sensitive
personal data of others without their consent, etc.
79. Why the IT Act needed?
Or,
Write the importance of IT Act, 2000.
Ans. The IT act is needed so that people can perform transactions over the Internet
through credit cards without fear of misuse. Not only people, the act empower
government departments also to accept filing, creation and storage of official
documents in the digital format.
80. Write some Sections, its Offences and Penalties under IT Act 2000.
Ans. Some of sections under IT ACT 2000 are given below-

Sections Offence Penalty


67A Publishing images Imprisonment up to seven years,
containing sexual acts or/and with fine up to Rs. 1,000,000

67B Publishing child porn or Imprisonment up to five years,


predating children online or/and with fine up toRs. 10,00,000
on first conviction. Imprisonment
up to seven years, or/and with fine
up to Rs.10,00,000 on second
conviction.
67C Failure to maintain record Imprisonment up to three years,
or/and with fine
68 Failure/refusal to comply Imprisonment up to three years,
with orders or/and with fine up toRs.2,00,000

69 Failure/refusal to decrypt Imprisonment up to seven years


data and possible fine.

Chapter 6: Societal Impact 21 | P a g e


Pr ep ar ed b y : Tap os h Ka rm akar AI R FO R CE SC HO OL J O RH A T | M ob i l e : 7 00 20 70 3 13
Las t Up d a ted on 11 September 2024
Class Notes :2024-25

70 Securing access or Imprisonment up to ten years,


attempting to secure access or/and with fine.
to a protected system
71 Misrepresentation Imprisonment up to three years,
or/and with fine up toRs.1,00,000

e-Waste Management

81. What is an e-Waste?


Ans. E-waste or electronic waste is created when an electronic product is
discarded after the end of its useful life.
E-waste is loosely discarded, surplus, obsolete, broken, electrical
or electronic devices. The rapid expansion of technology and the consumption
driven society results in the creation of a very large amount of e-waste in every
minute. Therefore, the need of proper e-waste management has been realized.
82. How does e-waste is responsible for the degradation of our
environment?
Ans. E-waste is responsible for the degradation of our environment such as -
i. Emission of gases and fumes into the atmosphere
ii. Discharge of liquid waste into drains or disposal of solid e-waste materials

83. How can e-waste, containing certain elements or metals used in the
production of electronic products, cause air, water, and soil pollution?
Ans. When e-waste is carelessly thrown or dumped in landfills or dumping grounds,
certain elements or metals used in production of electronic products cause air,
water and soil pollution.
This is because when these products come in contact with air and moisture, they
tend to leach. As a result, the harmful chemicals seep into the soil, causing soil
pollution.
Further, when these chemicals reach and contaminate the natural ground
water, it causes water pollution as the water becomes unfit for humans,
animals and even for agricultural use.
When dust particles loaded with heavy metals enters the atmosphere, it causes
air pollution as well.
84. What are some of the specific metals and elements commonly used in
the manufacturing of electrical or electronic devices, which can have
environmental implications if not managed properly?
Ans. The electrical or electronic devices are manufactured using certain metals and
elements like lead, beryllium, cadmium, plastics, etc.

Chapter 6: Societal Impact 22 | P a g e


Pr ep ar ed b y : Tap os h Ka rm akar AI R FO R CE SC HO OL J O RH A T | M ob i l e : 7 00 20 70 3 13
Las t Up d a ted on 11 September 2024
Class Notes :2024-25

Most of these materials are difficult to recycle and are considered to be toxic
and carcinogenic.
If e-waste is not disposed of in proper manner, it can be extremely harmful to
humans, plants, animals and the environment.
85. Which metals is widely used in electronic devices such as monitors and
batteries?
Ans. One of the most widely used metals in electronic devices such as monitors and
batteries is Lead.
86. How the lead poisoning affects human body?
Ans. When lead enters the human body through contaminated food, water, air or soil,
it causes lead poisoning which affects the kidneys, brain and central nervous
system.
Children are particularly vulnerable to lead poisoning.
87. How the e-waste can impact on humans?
Ans. The electrical or electronic devices are manufactured using certain metals and
elements like lead, beryllium, cadmium, plastics, etc.
Lead :When lead enters the human body through contaminated food, water, air
or soil, it causes lead poisoning which affects the kidneys, brain and central
nervous system.
Beryllium :When e-waste such as electronic circuit boards are burnt for
disposal, the elements contained in them create a harmful chemical called
Beryllium which causes skin diseases, allergies and an increased risk of
lung cancer.
Mercury :Some of the electronic devices contain Mercury which causes
respiratory disorders and brain damage.
Cadmium :The Cadmium found in semiconductors and resistors can damage
kidneys, liver and bones.
Plastic :When this plastic reacts with air and moisture, it passes harmful
chemicals into the soil and water resources. When consumed, it damages the
immune system of the body and also causes various psychological
problems like stress and anxiety. Burning of insulated wires to extract
copper can cause neurological disorders.
88. How the Indian e-Waste is a mess stinks?
Ans. Any electronic or electrical product which is discarded is called e-Waste. E-waste
is a growing problem for us in India. As a 132 cr. strong economy, we produce e-
waste in large quantities. India’s e-waste generation is rising at the rate of 4 to
5%. The huge gap between e-waste generation and e-waste recycling
management. It is very important to dispose of waste in a pragmatic manner.
89. What you can do to manage or control e-Waste?
Or,

Chapter 6: Societal Impact 23 | P a g e


Pr ep ar ed b y : Tap os h Ka rm akar AI R FO R CE SC HO OL J O RH A T | M ob i l e : 7 00 20 70 3 13
Las t Up d a ted on 11 September 2024
Class Notes :2024-25

What measure should be taken for proper disposal of used electronic


gadgets?
Ans. Proper disposal of used electronic gadgets are -
i) Handle e-waste in scientific and pragmatic manner.
ii) Proper disposal of all components that cannot be recycled.
iii) Increase number of dismantling or recycling units.
iv) Increase awareness amongst consumers.
90. How does prolonged use of digital technologies affect human health?
Ans. As digital technologies have penetrated into different fields, we are spending
more time in front of screens, be it mobile, laptop, desktop, television, gaming
console, music or sound device. But interacting in an improper posture can be
bad for us — both physically, and mentally. Besides, spending too much time on
Internet can be addictive and can have a negative impact on our physical and
psychological well-being.
91. What is Ergonomics? Why is it important?
Or,
What is Ergonomics used for?
Ans. Ergonomics is a branch of science that deals with designing or arranging
workplaces including the furniture, equipment’s and systems so that it becomes
safe and comfortable for the user. Ergonomics helps us in reducing the strain on
our bodies — including the fatigue and injuries due to prolonged use.
92. What are the negative impacts on our physical and psychological
health due to prolonged usage of digital devices or computer?
Ans. Following are the negative impacts on the health due to prolonged usage of
digital devices or computer -
▪ Eye strain is a symptom commonly complained by users of digital devices.
▪ Bad posture, Fatigue caused due to prolonged use of computer system and
other digital devices.
▪ Overuse of keyboards can give rise to a painful condition of wrists and
fingers, and may require medical help in the long run.
▪ Stress, physical fatigue and obesity are the other related impacts the
body may face if one spends too much time using digital devices.

93. Write some guideline issued by ergonomics related to the usages of


digital technologies.

Chapter 6: Societal Impact 24 | P a g e


Pr ep ar ed b y : Tap os h Ka rm akar AI R FO R CE SC HO OL J O RH A T | M ob i l e : 7 00 20 70 3 13
Las t Up d a ted on 11 September 2024
Class Notes :2024-25

Ans. Guidelines issued by Computer Ergonomics -


a. Posture to be maintained. Sit so your head and neck are upright and
in-line with your torso, not bent down or tilted back.
b. Face your computer screen directly. Avoid viewing your screen with
your head turned or your back twisted.
c. Keep your elbows comfortably close to your body.
d. Use a comfortable chair that provides support for your lower back and
has a cushioned seat with a contoured front edge.
e. Keep your mouse close to your keyboard so you don't have to reach
for it.
f. Position your computer display so the top of the screen is at or slightly
below eye level. This will allow you to view the screen without bending
your neck.
g. Adjust the position of your display to prevent reflections of overhead
and outdoor lighting appearing on your screen.
h. Put your monitor close enough to your eyes so you can comfortably
read text on the screen without leaning forward.

94. Mention some device safety measure to ensure good health of a


computer system.
Ans. Device Safety: Ensures Good Health of a Computer System -
i) Regularly clean it to keep the dust off. Use a liquid solution specifically
formulated for the cleaning of electronic screens.
ii) Wipe monitor’s screen often using the regular microfiber soft cloth (the one
used for spectacles).
iii) Keep it away from direct heat, sunlight and put it in a room with enough
ventilation for air circulation.

Chapter 6: Societal Impact 25 | P a g e


Pr ep ar ed b y : Tap os h Ka rm akar AI R FO R CE SC HO OL J O RH A T | M ob i l e : 7 00 20 70 3 13
Las t Up d a ted on 11 September 2024
Class Notes :2024-25

iv) Do not eat food or drink over the keyboard. Food crumbs that fall into the
gaps between the keys or spilled over liquid can cause issues to the devices.

Chapter 6: Societal Impact 26 | P a g e


Pr ep ar ed b y : Tap os h Ka rm akar AI R FO R CE SC HO OL J O RH A T | M ob i l e : 7 00 20 70 3 13
Las t Up d a ted on 11 September 2024
Class Notes :2024-25

NCERT Text – Book Question: (Solved)

1. After practicals, Atharv left the computer laboratory but forgot to sign off from his
email account. Later, his classmate Revaan started using the same computer. He
is now logged in as Atharv. He sends inflammatory email messages to few of his
classmates using Atharv’s email account.
Revaan’s activity is an example of which of the following cyber crime? Justify your
answer.
a) Hacking
b) Identity theft
c) Cyber bullying
d) Plagiarism
Ans. c) Cyber bullying
2. Rishika found a crumpled paper under her desk. She picked it up and opened it. It
contained some text which was struck off thrice. But she could still figure out easily
that the struck off text was the email ID and password of Garvit, her classmate.
What is ethically correct for Rishika to do?
a) Inform Garvit so that he may change his password.
b) Give the password of Garvit’s email ID to all other classmates.
c) Use Garvit’s password to access his account.
Ans. a) Inform Garvit so that he may change his password.
3. Suhana is down with fever. So she decided not to go to school tomorrow. Next day,
in the evening she called up her classmate, Shaurya and enquired about the
computer class. She also requested him to explain the concept. Shaurya said, “Mam
taught us how to use tuples in python”. Further, he generously said, “Give me some
time, I will email you the material which will help you to understand tuples in
python”. Shaurya quickly downloaded a 2-minute clip from the Internet explaining
the concept of tuples in python. Using video editor, he added the text “Prepared by
Shaurya” in the downloaded video clip. Then, he emailed the modified video clip to
Suhana. This act of Shaurya is an example of:
a) Fair use
b) Hacking
c) Copyright infringement
d) Cyber crime
Ans. c) Copyright infringement
4. After a fight with your friend, you did the following activities.
Which of these activities is not an example of cyber bullying?
a) You sent an email to your friend with a message saying that “I am sorry”.
b) You sent a threatening message to your friend saying “Do not try to call or
talk to me”.

Chapter 6: Societal Impact 27 | P a g e


Pr ep ar ed b y : Tap os h Ka rm akar AI R FO R CE SC HO OL J O RH A T | M ob i l e : 7 00 20 70 3 13
Las t Up d a ted on 11 September 2024
Class Notes :2024-25

c) You created an embarrassing picture of your friend and uploaded on your


account on a social networking site.

Ans. a) You sent an email to your friend with a message saying that “I am sorry”.
5. Sourabh has to prepare a project on “Digital India Initiatives”. He decides to get
information from the Internet. He downloads three web pages (webpage 1, webpage
2, webpage 3) containing information on Digital India Initiatives.
Which of the following steps taken by Sourabh is an example of plagiarism or
copyright infringement? Give justification in support of your answer.
a) He read a paragraph on “Digital India Initiatives” from webpage 1 and
rephrased it in his own words. He finally pasted the rephrased paragraph in
his project.
b) He downloaded three images of “Digital India Initiatives” from webpage 2.
He made a collage for his project using these images.
c) He downloaded “Digital India Initiative” icon from web page 3 and pasted it
on the front page of his project report.
Ans. a) He read a paragraph on “Digital India Initiatives” from webpage 1 and
rephrased it in his own words. He finally pasted the rephrased paragraph
in his project.
6. Match the following:
Column A Column B
Plagiarism Fakers, by offering special rewards or money prize asked
for personal information, such as bank account
information
Hacking Copy and paste information from the Internet into your
report and then organise it
Credit card fraud The trail that is created when a person uses the Internet.

Digital Foot Print Breaking into computers to read private emails and other
files

Ans. Column A Column B


Plagiarism Copy and paste information from the Internet into your
report and then organise it.
Hacking Breaking into computers to read private emails and
other files
Credit card fraud Fakers, by offering special rewards or money prize asked
for personal information, such as bank account
information
Digital Foot Print The trail that is created when a person uses the Internet.

Chapter 6: Societal Impact 28 | P a g e


Pr ep ar ed b y : Tap os h Ka rm akar AI R FO R CE SC HO OL J O RH A T | M ob i l e : 7 00 20 70 3 13
Las t Up d a ted on 11 September 2024
Class Notes :2024-25

7. You got the below shown SMS from your bank querying a recent transaction.

Answer the following:


a) Will you SMS your pin number to the given contact number?
b) Will you call the bank helpline number to recheck the validity of the SMS
received?
Ans. a) No
b) Yes
8. Preeti celebrated her birthday with her family. She was excited to share the
moments with her friend Himanshu. She uploaded selected images of her birthday
party on a social networking site so that Himanshu can see them. After few days,
Preeti had a fight with Himanshu. Next morning, she deleted her birthday
photographs from that social networking site, so that Himanshu cannot access
them. Later in the evening, to her surprise, she saw that one of the images which
she had already deleted from the social networking site was available with their
common friend Gayatri. She hurriedly enquired Gayatri “Where did you get this
picture from?”. Gayatri replied “Himanshu forwarded this image few minutes
back”.
Help Preeti to get answers for the following questions.
Give justification for your answers so that Preeti can understand it clearly.
a) How could Himanshu access an image which I had already deleted?
b) Can anybody else also access these deleted images?
c) Had these images not been deleted from my digital footprint?
Ans. a) Himanshu downloaded all the images before Preeti deletion. Preeti is the victim
of Plagiarism.
b) Yes, once an image data is generated, even if we later try to erase data about
our online activities, the digital footprints still remain.
c) There is no guarantee that digital footprints will be fully eliminated from the
Internet.
9. The school offers wireless facility (wifi) to the Computer Science students of Class
XI. For communication, the network security staff of the school has a registered
URL schoolwifi.edu. On 17 September 2017, the following email was mass
distributed to all the Computer Science students of Class XI. The email claimed

Chapter 6: Societal Impact 29 | P a g e


Pr ep ar ed b y : Tap os h Ka rm akar AI R FO R CE SC HO OL J O RH A T | M ob i l e : 7 00 20 70 3 13
Las t Up d a ted on 11 September 2024
Class Notes :2024-25

that the password of the students was about to expire. Instructions were given to
go to URL to renew their password within 24 hours.

a) Do you find any discrepancy in this email?


b) What will happen if the student will click on the given URL?
c) Is the email an example of cyber crime? If yes, then specify which type of
cyber crime is it.
Justify your answer.
Ans. a) HOME WORK
10. You are planning to go for a vacation. You surfed the Internet to get answers for
the following queries:
a) Weather conditions
b) Availability of air tickets and fares
c) Places to visit
d) Best hotel deals
Which of your above-mentioned actions might have created a digital footprint?
Ans. The following actions may have created a digital footprint while planning a
vacation:
Weather conditions: Searching for weather conditions in a specific destination
likely leaves a digital footprint, as search queries are typically logged by search
engines or weather websites.
Availability of air tickets and fares: Searching for air ticket availability and
fares on airline websites, travel booking platforms, or search engines can create a
digital footprint. These platforms often collect user data and search history.
Places to visit: Exploring destinations, tourist attractions, or points of interest on
travel-related websites or using location-based services can generate a digital
footprint, as your preferences and interests are tracked.
Best hotel deals: Searching for hotel deals and accommodations on travel websites
or hotel booking platforms can also create a digital footprint, as these services
collect data about your search and booking history.

Chapter 6: Societal Impact 30 | P a g e


Pr ep ar ed b y : Tap os h Ka rm akar AI R FO R CE SC HO OL J O RH A T | M ob i l e : 7 00 20 70 3 13
Las t Up d a ted on 11 September 2024
Class Notes :2024-25

In all these cases, it's important to be aware that your online activities related to
vacation planning can leave a trace of data that may be used for various purposes,
including targeted advertising, improving user experiences, and data analytics.
11. How would you recognise if one of your friends is being cyber bullied?
a) Cite the online activities which would help you detect that your friend is
being cyber bullied?
b) What provisions are in IT Act 2000, (amended in 2008) to combat such
situations?
Ans. a) Cite online activities to detect cyberbullying:
Sudden Change in Online Behavior: If your friend suddenly becomes anxious,
upset, or withdraws from their online activities, it could be a sign of cyberbullying.
Receiving Abusive or Threatening Messages: If your friend is receiving
offensive, threatening, or hurtful messages, either privately or in public online
spaces, this is a clear sign of cyberbullying.
Harassment or Impersonation: If someone is impersonating your friend or
repeatedly posting negative or false information about them online, it's a sign of
cyberbullying.
Exclusion from Online Groups: If your friend is being excluded from social
media groups or experiencing social isolation, it could be a form of bullying.
Changes in Mood and Behavior: Notice if your friend's mood, self-esteem, or
behavior changes as a result of online interactions. They may become more anxious,
depressed, or isolated.
Loss of Interest in Hobbies: A sudden loss of interest in previously enjoyed
activities, especially those related to the online world, might be a sign.
Evidence of Threats or Hurtful Posts: If your friend shows you evidence of
hurtful messages, threats, or offensive posts, take them seriously and document the
evidence.
b) Provisions in the IT Act 2000 (amended in 2008) to combat
cyberbullying:
The IT Act 2000, amended in 2008, provides several provisions that can be used to
combat cyberbullying:
Section 66A (Amended): This section, which was previously widely criticized for
being misused, was amended to remove the criminalization of "offensive" online
content. However, it still covers acts of cyberbullying, including sending offensive
messages or causing annoyance, inconvenience, or danger to the recipient.
Section 66E: This section covers the violation of privacy by capturing, publishing,
or disseminating images of a person's private area without their consent. It can be
used to address issues related to non-consensual sharing of explicit images
(commonly known as "revenge porn").

Chapter 6: Societal Impact 31 | P a g e


Pr ep ar ed b y : Tap os h Ka rm akar AI R FO R CE SC HO OL J O RH A T | M ob i l e : 7 00 20 70 3 13
Las t Up d a ted on 11 September 2024
Class Notes :2024-25

Section 67 and 67A: These sections deal with the publication or transmission of
obscene material and material containing sexually explicit content. They can be
invoked when explicit content is used to harass or defame someone.
Section 72 and 72A: These sections deal with the breach of confidentiality and the
disclosure of personal information without consent. They can be applicable when
personal information is shared online to harm or defame someone.
It's important to note that the IT Act provides legal recourse for victims of
cyberbullying, and individuals should report such incidents to law enforcement or
cybercrime authorities. Additionally, India has other laws and regulations,
including the Protection of Children from Sexual Offenses (POCSO) Act, that can
be applied to protect minors from online harassment and abuse.
12. Write the differences between the following-
a) Copyrights and Patents
b) Plagiarism and Copyright infringement
c) Non-ethical hacking and Ethical hacking
d) Active and Passive footprints
e) Free software and Free and open source software
Ans. a) Copyrights and Patents:
Copyrights: Protect original literary, artistic, and creative works, giving the
creator exclusive rights to reproduce, distribute, and adapt the work. Copyrights
are automatically granted upon creation and last for the creator's lifetime plus 70
years.
Patents: Protect inventions, granting the inventor exclusive rights to make, use,
and sell the patented invention for a limited time (typically 20 years). Patents
require a formal application and examination process.
b) Plagiarism and Copyright Infringement:
Plagiarism: Involves presenting someone else's work, ideas, or words as your own
without proper attribution or permission. It's an ethical violation but not
necessarily a legal one.
Copyright Infringement: Occurs when someone uses copyrighted material
without the owner's permission, violating the owner's exclusive rights. It is a legal
issue and can result in legal action.
c) Non-ethical Hacking and Ethical Hacking:
Non-ethical Hacking (Malicious Hacking): Involves unauthorized access,
disruption, or damage to computer systems, networks, or data with malicious
intent, such as stealing information or causing harm.
Ethical Hacking (White-Hat Hacking): Involves authorized and legal
penetration testing and vulnerability assessments of computer systems, networks,
or applications to identify and rectify security weaknesses. Ethical hackers work to
improve security.
d) Active and Passive Footprints:

Chapter 6: Societal Impact 32 | P a g e


Pr ep ar ed b y : Tap os h Ka rm akar AI R FO R CE SC HO OL J O RH A T | M ob i l e : 7 00 20 70 3 13
Las t Up d a ted on 11 September 2024
Class Notes :2024-25

Active Footprints: Refers to the digital traces left intentionally by a user during
online activities. This can include social media posts, emails, comments, and other
direct interactions.
Passive Footprints: Refers to the digital traces left unintentionally, often as a
result of online tracking, data collection, or monitoring by websites, advertisers, or
third parties. These may include cookies, browsing history, and metadata.
e) Free Software and Free and Open Source Software (FOSS):
Free Software: Refers to software that is free in the sense of user freedom. Users
have the liberty to run, study, modify, and distribute the software. It doesn't
necessarily mean the software has no cost.
Free and Open Source Software (FOSS): Includes both the concept of user
freedom and the idea of open collaboration. FOSS not only allows users to view and
modify the source code but also encourages open development and community
collaboration. FOSS is often available at no cost.
13. If you plan to use a short text from an article on the web, what steps must you take
in order to credit the sources used?
Ans. Failing to provide proper attribution or using someone else's content without
permission can result in copyright infringement or plagiarism, which can have legal
and ethical consequences. It's essential to respect the rights of content creators and
follow best practices for using and crediting online sources.
14. When you search online for pictures, how will you find pictures that are available
in the free public domain? How can those pictures be used in your project without
copyright violations?
Ans. To find pictures available in the free public domain and use them in your project
without copyright violations, follow these steps:
1. Use Public Domain Databases: There are several online resources and
databases that specifically host public domain or Creative Commons (CC) licensed
images. Websites like Pixabay, Unsplash, Pexels, and Wikimedia Commons are
good places to start.
2. Filter by License: Many search engines and image hosting platforms allow you
to filter search results by license type. Look for options to filter by "public domain",
"CC", or "free to use."
3. Explore Government Websites: Government websites often provide access to
public domain images, particularly for educational and informational purposes.
4. Check Creative Commons: Creative Commons licenses, such as CC or CC BY,
allow for various degrees of use. Always check the specific license terms associated
with an image to ensure it's in the public domain or available for your intended use.
5. Verify Copyright Status: If you find an image outside of well-known public
domain resources, verify its copyright status. Look for information about the
image's copyright status on the source website or contact the owner for
confirmation.

Chapter 6: Societal Impact 33 | P a g e


Pr ep ar ed b y : Tap os h Ka rm akar AI R FO R CE SC HO OL J O RH A T | M ob i l e : 7 00 20 70 3 13
Las t Up d a ted on 11 September 2024
Class Notes :2024-25

15. Describe why it is important to secure your wireless router at home. Search the
Internet to find the rules to create a reasonably secure password. Create an
imaginary password for your home router. Will you share your password for home
router with following people? Justify your answer.
a) Parents
b) Friends
c) Neighbours
d) Home Tutors
Ans. Answer yourself
16. List down the steps you need to take in order to ensure
a) Your computer is in good working condition for a longer time.
b) Smart and safe Internet surfing.
Ans. a) To ensure your computer is in good working condition for a longer time:
1. Regularly Update Software: Keep your operating system, drivers, and
applications up to date. Software updates often include bug fixes and security
patches.
2. Install Antivirus Software: Use reputable antivirus and anti-malware
software to protect your computer from viruses and malicious software.
3. Manage Disk Space: Regularly clean up your hard drive by removing
unnecessary files and programs. Use tools like Disk Cleanup (Windows) or Disk
Utility (macOS).
4. Back Up Your Data: Create regular backups of your important files to prevent
data loss in case of hardware failure or malware attacks.
5. Password Protection: Set strong, unique passwords for your computer and
accounts to prevent unauthorized access.

b) For smart and safe internet surfing:


1. Use a Secure Connection: Ensure your internet connection is secure and
encrypted, especially when transmitting sensitive information. Use secure websites
(https://) and virtual private networks (VPNs).
2. Enable Firewall: Activate your computer's firewall to block unauthorized
access.
3. Use Strong, Unique Passwords: Create strong and unique passwords for your
online accounts. Consider using a password manager for convenience and security.
4. Beware of Phishing: Be cautious about unsolicited emails, messages, and links.
Avoid clicking on suspicious links or sharing personal information.
5. Keep Software Updated: Regularly update your web browsers, plugins, and
extensions to patch security vulnerabilities.
6. Use Two-Factor Authentication (2FA): Enable 2FA wherever possible to add
an extra layer of security to your online accounts.

Chapter 6: Societal Impact 34 | P a g e


Pr ep ar ed b y : Tap os h Ka rm akar AI R FO R CE SC HO OL J O RH A T | M ob i l e : 7 00 20 70 3 13
Las t Up d a ted on 11 September 2024
Class Notes :2024-25

7. Regularly Clear Cookies and Cache: Clear your browser's cookies and cache
to remove tracking data and improve your online privacy.
8. Stay Wary of Downloads: Be cautious when downloading files from the
internet. Only download from trusted sources and use reputable antivirus software
to scan downloads.
9. Be Careful with Public Wi-Fi: Use public Wi-Fi networks cautiously, as they
can be less secure. Avoid sensitive activities on unsecured networks.
10. Limit Sharing on Social Media: Be cautious about the information you share
on social media. Avoid revealing too much personal information publicly.
17. What is data privacy? Websites that you visit, collect what type of information
about you?
Ans. Data privacy, also known as information privacy or data protection, refers to
the concept of safeguarding an individual's or organization's personal, sensitive, or
confidential information from unauthorized access, use, disclosure, or other privacy
violations.
Data privacy is the practice of controlling and managing the collection, storage, and
sharing of personal data in a way that ensures the confidentiality and security of
that information.
Websites that you visit can collect various types of information about you,
including:
i) Personal Information: This may include your name, email address, phone
number, and sometimes even your physical address if you provide it during
registration or transactions.
ii) Browsing History: Websites can track the pages you visit on their site, the links
you click, and the time you spend on each page.
iii) Cookies: Websites often use cookies to track your online behavior. These are
small text files stored on your device that remember your preferences and
activities.
iv) IP Address: Websites can log your IP address, which can be used to identify
your approximate location and internet service provider.
v) Device Information: Information about the device you are using, such as its
type, operating system, browser version, and screen resolution, may be
collected.
vi) Referral Source: Websites can determine how you arrived at their site, whether
through a search engine, social media, or another website.
vii) User Behavior: Information about your interactions on the site, such as what
products you view, what items you add to your shopping cart, or which articles
you read.
viii) Form Submissions: If you fill out forms on websites, such as contact forms or
surveys, the information you provide can be collected.

Chapter 6: Societal Impact 35 | P a g e


Pr ep ar ed b y : Tap os h Ka rm akar AI R FO R CE SC HO OL J O RH A T | M ob i l e : 7 00 20 70 3 13
Las t Up d a ted on 11 September 2024
Class Notes :2024-25

ix) Social Media Integration: Many websites allow you to log in or share content
using your social media profiles. This may grant them access to your social
media data.
x) Third-Party Tracking: Websites can integrate third-party tools and services,
such as Google Analytics or advertising networks, to collect additional data
about your behavior and preferences.
18. In the computer science class, Sunil and Jagdish were assigned the following task
by their teacher.
a) Sunil was asked to find information about “India, a Nuclear power”. He was
asked to use Google Chrome browser and prepare his report using Google
Docs.
b) Jagdish was asked to find information about “Digital India”. He was asked
to use Mozilla Firefox browser and prepare his report using Libre Office
Writer.
What is the difference between technologies used by Sunil and Jagdish?
Ans. The main differences between the technologies used by Sunil and Jagdish are as
follows:
Web Browsers:
• Google Chrome is a popular web browser developed by Google.
• Mozilla Firefox is an open-source web browser developed by the Mozilla
Foundation.
Document Editing Software:
• Google Docs, which is a cloud-based word processing application developed
by Google. It allows collaborative document editing and is accessible through
a web browser.
• LibreOffice Writer, which is an open-source word processing software.
LibreOffice is a free and open-source office suite that includes a word
processor, spreadsheet, presentation software, and more.
19. Cite examples depicting that you were a victim of following cyber crime. Also, cite
provisions in IT Act to deal with such a cyber crime.
a) Identity theft
b) Credit card account theft
Ans. a) Identity Theft:
A person gains unauthorized access to someone's personal information, such as
their name, address, social security number, and uses this information to
impersonate the victim for fraudulent activities, like opening bank accounts or
applying for credit cards.
Provisions in the IT Act: In India, identity theft may be addressed under various
sections of the IT Act. For instance, Section 66C deals with identity theft and
provides for penalties for any person who dishonestly or fraudulently makes use of

Chapter 6: Societal Impact 36 | P a g e


Pr ep ar ed b y : Tap os h Ka rm akar AI R FO R CE SC HO OL J O RH A T | M ob i l e : 7 00 20 70 3 13
Las t Up d a ted on 11 September 2024
Class Notes :2024-25

an electronic signature, password, or any other unique identification feature of any


other person.

b) Credit Card Account Theft:

A cybercriminal gains access to an individual's credit card information and makes


unauthorized transactions using the stolen card details.
Provisions in the IT Act: Credit card account theft is often covered under several
sections of the IT Act. For example, Section 66D deals with cheating by personation,
which includes unauthorized use of electronic signatures, and Section 66E relates
to violation of privacy by capturing, publishing, or disseminating images of private
areas. Such actions can lead to legal consequences as per these provisions.
20. Neerja is a student of Class XI. She has opted for Computer Science. Neerja
prepared the project assigned to her. She mailed it to her teacher. The snapshot of
that email is shown below.

Find out which of the following email etiquettes are missing in it. Justify your
answer.
a) Subject of the mail
b) Formal greeting
c) Self-explanatory terms
d) Identity of the sender
e) Regards
Ans. Try Yourself
21. Sumit got good marks in all the subjects. His father gifted him a laptop. He would
like to make Sumit aware of health hazards associated within appropriate and
excessive use of laptop. Help his father to list the points which he should discuss
with Sumit.
Chapter 6: Societal Impact 37 | P a g e
Pr ep ar ed b y : Tap os h Ka rm akar AI R FO R CE SC HO OL J O RH A T | M ob i l e : 7 00 20 70 3 13
Las t Up d a ted on 11 September 2024
Class Notes :2024-25

Ans. Sumit's father can discuss the following points with him to make him aware of the
health hazards associated with inappropriate and excessive use of a laptop:

i) Eye Strain: Spending long hours on a laptop screen can lead to eye strain,
which may cause discomfort, dry eyes, headaches, and blurred vision.
ii) Poor Posture: Prolonged laptop use in awkward positions can result in poor
posture and musculoskeletal issues. Sumit should be advised to use an external
keyboard and mouse to maintain an ergonomic setup.
iii) Repetitive Strain Injuries (RSIs): Using the laptop's touchpad or keyboard
for extended periods without breaks can lead to RSIs, such as carpal tunnel
syndrome. Taking regular breaks and using proper accessories can help
prevent this.
iv) Radiation and Heat: Laptops emit electromagnetic radiation and heat. While
there is no conclusive evidence of harm, it's advisable to maintain a safe
distance and use a cooling pad to reduce heat exposure.
v) Sleep Disruption: Using a laptop late into the night can disrupt sleep
patterns due to the blue light emitted from screens. Sumit should avoid laptop
use before bedtime.
vi) Internet Safety: Sumit should be educated about internet safety to avoid
online threats, scams, and inappropriate content. He should use strong, unique
passwords and avoid sharing personal information online.
vii) Privacy Concerns: Discuss the importance of protecting personal and
sensitive information while using a laptop, including secure browsing, using
firewalls, and not sharing private data.
viii) Addiction and Mental Health: Spending excessive time on a laptop,
especially on social media and gaming, can lead to addiction and negatively
impact mental health. Encourage a balanced approach and physical activities.
ix) Parental Controls: If Sumit is a minor, consider using parental control
software to limit his online activities and screen time.
x) Hygiene: Remind Sumit to keep his laptop clean, as keyboards and screens
can harbor germs and bacteria.
xi) Backup and Security: Emphasize the importance of regular data backup to
avoid data loss. Install reliable antivirus and security software to protect the
laptop from malware.
xii) Healthy Habits: Encourage Sumit to establish healthy laptop use habits,
including regular breaks, maintaining a clean workspace, and using proper
accessories like a laptop stand.
xiii) Professional Help: If Sumit experiences any physical discomfort or health
issues related to laptop use, he should seek professional medical advice.

MULTIPLE CHOICE QUESTIONS:


Chapter 6: Societal Impact 38 | P a g e
Pr ep ar ed b y : Tap os h Ka rm akar AI R FO R CE SC HO OL J O RH A T | M ob i l e : 7 00 20 70 3 13
Las t Up d a ted on 11 September 2024
Class Notes :2024-25

1. A ______________ is a unique data trace of a user’s activities, actions,


communications or transactions in digital media.

a. Digital Handprint

b. Digital Footprint

c. Offline Footprint

d. Offline Handprint

2. Abdul deleted all his chats from all his social media accounts, and he thinks
that all his traces are deleted completely. Is he right in thinking so?

a. Yes

b. No

c. May be

d. Not sure

3. We should exhibit proper manners and etiquettes while being online.


Choose the right net etiquette (s) from the following:

a. Avoid Cyber Bullying

b. Respect Other’s Privacy

c. No Copyright violation

d. All of the above

4. A research student is expected to write a thesis on a topic. The student


browses Internet for the topic and luckily finds it on the Internet. He copies
and submits the entire thesis as his own research work. Which of the
following activities appropriately categorises the act of the writer?

a. Spamming

b. Phishing

c. Plagiarism

d. Trojan

5. Consider the following scenario and answer the questions which follow:

Chapter 6: Societal Impact 39 | P a g e


Pr ep ar ed b y : Tap os h Ka rm akar AI R FO R CE SC HO OL J O RH A T | M ob i l e : 7 00 20 70 3 13
Las t Up d a ted on 11 September 2024
Class Notes :2024-25

“A student is expected to write a research paper on a topic. The student had


a friend who took a similar class five years ago. The student asks his older
friend for a copy of his paper and then takes the paper and then submits the
entire paper as his own research work.”

Which of the following activities appropriately categorises the act of the


writer:

a. Plagiarism

b. Spamming

c. Virus

d. Phishing

6. Consider the following scenario and answer the questions which follow:

“A student is expected to write a research paper on a topic. The student


had a friend who took a similar class five years ago. The student asks his
older friend for a copy of his paper and then takes the paper and then
submits the entire paper as his own research work.”

Which kind of offense out of the following is made by the student?

a. Cyber Crime

b. Civil Crime

c. Violation of Intellectual Property Rights

7. ‘F’ in FOSS stands for:

a. Free

b. Forever

c. Fire

d. Freezing

8. Suhhani is confused about the free operating system available in the


market. Few of her friends suggested a few operating systems. Help her in
choosing free operating system for her device:

a. Ubuntu

b. Windows

Chapter 6: Societal Impact 40 | P a g e


Pr ep ar ed b y : Tap os h Ka rm akar AI R FO R CE SC HO OL J O RH A T | M ob i l e : 7 00 20 70 3 13
Las t Up d a ted on 11 September 2024
Class Notes :2024-25

c. Mozilla Firefox

d. Blender

9. Linux, MySQL and Mozilla Firefox software come under_______ category.

a. Proprietary

b. FOSS

c. Freeware

d. Shareware

10. Which of the following is not a type of cybercrime?

a. Data theft

b. Forgery of online documents

c. Damage to data and systems

d. Installing antivirus for protection

11. Consider the following statements with reference to the use of email:

Statement 1: Sending threatening messages to a classmate.

Statement 2: Inviting friends to participate in a school club or sports


activity.

Statement 3: Asking your teacher for help on homework.

Statement 4: Responding to or forwarding spam emails.

Which of the above statements refer to appropriate use of email?

a. Statements 1 and 2

b. Statements 2 and 3

c. Statements 3 and 4

d. Statements 2 and 4

12. Saharsh is a student of class -9 and he is a very frequent user of internet


applications. One day he got an unpleasant message on his instant
messenger. What do you think he should do?

a. ignore it and start chatting to someone else.


Chapter 6: Societal Impact 41 | P a g e
Pr ep ar ed b y : Tap os h Ka rm akar AI R FO R CE SC HO OL J O RH A T | M ob i l e : 7 00 20 70 3 13
Las t Up d a ted on 11 September 2024
Class Notes :2024-25

b. reply back to them and find out what their problem is.

c. shut down the computer and hope they'll leave him alone in future.

d. go to his parents, teacher, or other trusted adult and let


them know that he feels uncomfortable.

13. IPR stands for:

a. Intelligent Property Rights

b. Intellectual Property Reserve

c. Intellectual Property Rights

d. Intellectual Product Rights

14. Which of the following is not a violation of IPR?

a. Plagiarism

b. Copyright Infringement

c. Patent

d. Trademark Infringement

15. ____________is the practice of taking someone else's work or ideas and
passing them off as one's own:

a. Plagiarism

b. Copyright

c. Patent

d. All of the above

16. The legal and regulatory aspects of the internet refer to____________.

a. Cyber Space

b. Cyber crime

c. Criminal law

d. IT act

17. A software company purchases new computers every year and discards the
old ones into the local dumping yard. Write the name of the most
Chapter 6: Societal Impact 42 | P a g e
Pr ep ar ed b y : Tap os h Ka rm akar AI R FO R CE SC HO OL J O RH A T | M ob i l e : 7 00 20 70 3 13
Las t Up d a ted on 11 September 2024
Class Notes :2024-25

appropriate category of waste that the organisation is creating every year,


out of the following options :
a. Business Waste

b. Commercial Waste

c. Solid Waste

d. E-Waste

18. Following are the impact of e-waste on the environment. Choose the odd
one out.

a. Soil Pollution

b. Water Pollution

c. Air Pollution

d. Sound Pollution

19. Feasible method (s) to manage e-waste:

a. Reduce

b. Reuse

c. Recycle

d. All of the above

20. When e-waste such as electronic circuit boards are burnt for disposal, the
elements contained in them create a harmful chemical called ______which
causes skin diseases, allergies and an increased risk of lung cancer.

a. Cadmium

b. Beryllium

c. Mercury

d. Lead

21. Lead poisoning, caused by exposure to lead from e-waste, primarily affects
which parts of the human body?

a. Heart and lungs

b. Liver and stomach

Chapter 6: Societal Impact 43 | P a g e


Pr ep ar ed b y : Tap os h Ka rm akar AI R FO R CE SC HO OL J O RH A T | M ob i l e : 7 00 20 70 3 13
Las t Up d a ted on 11 September 2024
Class Notes :2024-25

c. Kidneys, brain, and central nervous system

d. Skin and bones

22. Which metal is commonly used in e-waste like monitors and batteries,
enters the human body through contaminated food, water, air or soil, can
affects the kidneys, brain and central nervous system?

a. Cadmium

b. Beryllium

c. Mercury

d. Lead

23. Assertion: Active digital footprints include data that we intentionally


submit online.

Reason: This includes emails we write, responses, or posts on various


websites or mobile apps.

a. Both the assertion and reason are true, and the reason is a
correct explanation of the assertion.
b. Both the assertion and reason are true, but the reason is not a correct
explanation of the assertion.
c. The assertion is true, but the reason is false.
d. The assertion is false, but the reason is true.

24. Assertion: Passive digital footprints include data generated when we visit
a website, use a mobile app, or browse the internet.

Reason: Passive digital footprints are the unintentional data trail we leave
online.

a. Both the assertion and reason are true, and the reason is a
correct explanation of the assertion.
b. Both the assertion and reason are true, but the reason is not a correct
explanation of the assertion.
c. The assertion is true, but the reason is false.
d. The assertion is false, but the reason is true.

25. Assertion: Active and passive digital footprints are two distinct categories
of online data.
Chapter 6: Societal Impact 44 | P a g e
Pr ep ar ed b y : Tap os h Ka rm akar AI R FO R CE SC HO OL J O RH A T | M ob i l e : 7 00 20 70 3 13
Las t Up d a ted on 11 September 2024
Class Notes :2024-25

Reason: Active digital footprints are always larger in size compared to


passive digital footprints.

a. Both the assertion and reason are true, and the reason is a correct
explanation of the assertion.
b. Both the assertion and reason are true, but the reason is not a correct
explanation of the assertion.
c. The assertion is true, but the reason is false.
d. The assertion is false, but the reason is true.
26. Assertion: Active digital footprints include data that we intentionally
submit online.

Reason: Active digital footprints include data generated when we visit a


website, use a mobile app, or browse the internet.

a. Both the assertion and reason are true, and the reason is a correct
explanation of the assertion.
b. Both the assertion and reason are true, but the reason is not a correct
explanation of the assertion.
c. The assertion is true, but the reason is false.
d. The assertion is false, but the reason is true.

Chapter 6: Societal Impact 45 | P a g e


Pr ep ar ed b y : Tap os h Ka rm akar AI R FO R CE SC HO OL J O RH A T | M ob i l e : 7 00 20 70 3 13
Las t Up d a ted on 11 September 2024

You might also like