0% found this document useful (0 votes)
39 views6 pages

Cyber Society Law and Ethics - GR 11 CS

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
39 views6 pages

Cyber Society Law and Ethics - GR 11 CS

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

CHAPTER -16

SOCIETY LAW AND ETHICS


1. What is Digital footprint?
Digital footprints are the records and traces of individuals activities
as they use the Internet. Digital footprints are permanently stored. These
days, many universities look for digital footprint of applicant students
before giving them admission. Similarly, employers also may look for
digital footprint of candidates and so on.

2. How many types of digital footprints? What are they?


There are 2 types of digital footprint. They are
1. Active digital foot printincludes data that we intentionally submit
online. This includes emails we write, responses or posts we make
on different websites or mobile apps, etc.
2. Passive footprints – the digital trail we leave online
unintentionally is called passive digital footprints. This includes
the data generated when we visit a website, use a mobile app,
browse the internet etc.

3. What you should know to deal with networking sites?


While using social networking sites, you must know about the right
online behaviours are and what are cybercrime means. Avoid anonymous
profile using fake information. He/she can do such activities without
getting caught he/she is certainly mistaken. Modern technology tools can
find anyone online using IP address, location etc. So one must not indulge
in these activities at all.

4. What is privacy settings?


When you start using social media, you should not go with default
privacy settings. Set-up privacy settings yourself by using Account settings.
Through privacy settings you can control
1. Who all can see what you have posted
2. Who all send requests to you
3. What all information about you is visible to others, even to your
contacts etc.
5. What is copyright infringement?
When we use another person’s work without obtaining their
permission or we don’t pay for it, if it is being sold.
6. What is copyright and patent?
Copyright grants legal rights to creators for their original works like
writing, photograph, audio recordings, video, sculpture and architecture
works. Copyrights are automatically granted to creators and authors. A
patent is usually granted for inventions. Unlike copyright, the inventor
needs to apply (file) for patenting the invention.
When a patent is granted, the owner gets an exclusive right to
prevent others from using, selling or distributing the protected invention.

7. What is Ethical hacking and non-ethical hacking?


Non-ethical hacking is to gain unauthorised access to computers or
networks in order to steal sensitive data with the intent to damage or
bring down systems. Those who do non-ethical hacking are called
black hat hackers or crackers.

Hacking when done with positive intent, is called ethical hacking.


Such ethical hackers are known as white hat hackers. An ethical
hacker may exploit a website in order to discover its security
loopholes or vulnerabilities. Thus, ethical hacking is actually
preparing the owner against any cyber attack.

8. How many types of hackers? Give a short note on it.


There are 3 types of hackers
1. Black hat hackers or crackers are individuals with extraordinary
computing skills, resorting to malicious, destructive activities. Black
hat hackers use their knowledge and skill for their own personal
gains by hurting others.
2. White hat hackers are those individuals who use their hacking skills
for defensive purposes. This means that the while hat hackers use
their knowledge and skill for the good of others and for the common
good. Ethical hacking is legal.
3. Grey hat hackers are individuals who work both offensively and
defensively at different times. Their behaviour cannot be predicted.
Sometimes they use their skills for the common good.

9. How do websites track us?


Using a cookie or pixel to identify you even after you leave the site.
Or they may use device fingerprinting — a technique that uses your
browser's unique configurations and settings to track your activity.

10. What is meant by gender discrimination? How does it hamper


classroom teaching and learning process?
In the classroom, gender discrimination can significantly hamper the
teaching and learning process in several ways: Unequal Opportunities —
Students may not receive the same opportunities to participate in activities,
discussions, or leadership roles based on their gender, limiting their
engagement and development.

11. Explain any two ways in which technology can help students with
disabilities.
For blind – Braille keyboard, and touch (Braille screen)
Talking word processors
Screen readers
Conversion of local language to Braille
Eye Tracking mouse
12. What do you mean by virus?
A computer virus is a type of malicious software, or malware, that
spreads between computers and causes damage to data and software.
13. What do you mean by spyware and adware?
Spyware leads to direct infringement of privacy and sensitive
personal data.
Adware is a type of malware that displays unsolicited advertisements
on a computer or mobile device while a program is running.
14. What do you mean by worm?
A worm can replicate rapidly and spread virus across devices within
a network. As it spreads, a worm consumes bandwidth, overloading
infected systems and making them unreliable or unavailable. Worms can
also change and delete files or introduce other malware.
15. What do you mean by Trojan horse?
A Trojan horse is a program downloaded and installed on a
computer. It does unexpected changes to computer settings and unusual
activity, even when the computer should be idle, are strong indications that
a Trojan is residing on a computer.
16. Why do we need a secure connection while doing netbanking?
Identity theft: Even if hackers do not manage to breach an online
banking account, they may be able to steal the information they need to
steal an individual's identity and use this to hack into other accounts or set
up other types of financial fraud.

16. What are the Do’s and Don’ts of Internet?


Do’s Don’ts
Keep messages and posts brief Don’t post inflammatory / offensive
comments
Reread your posts or emails to make Don’t write in ALL CAPS. It is
sure they say what you intend. considered as SHOUTING on the
net.
Remember that you leave a digital Do not respond to internet trollers /
footprint. So, be careful what you personal attacks
write.
Use discretion Avoid posting private or
embarrassing images / comments
Include a subject line in an email. Don’t use sarcasm. It might be
misinterpreted.
Protect personal information Do not violate copyright laws. Make
sure your work is your own or
properly cited.
Obey copyright laws. Do not exclude people or talk behind
their backs.
Stay focused and stick to the topic. Don’t spam others by sending large
number of unsolicited emails.
18. List out the threats to computer security.
Viruses - Trojans (Trojan Horse Virus), worms
Spyware
Adware
Spamming
PC Intrusion - Denial of service, Sweeping, Password Guessing
Phishing.
19. How can you get the virus into your computer?
You can’t get a virus simply by reading email. It is activated only
when you click a link in it or open an attachment. Downloading Games,
Using infected Pendrive. Copying virus infected files from one computer to
another computer.
20. What is Eavesdropping?
Unauthorised monitoring of other people’s communications is called
Eavesdropping.
21. What is Digital Certificates?
Digital Certificates, specially formatted digital information issued to
website, are used to verify the identity of the message sender.
22. Digital Signatures
Digital signatures are a way of authenticating the identity of creators
or producers of digital information.

23. What is Etiquette?


Etiquette – a code of polite behaviour in society.
A Code of good behaviour while working on the internet.
It includes several aspects of the internet, such as social
media, email, online chat, web forums, website comments , multiplayer
gaming and other types of online communications.
24. What is Netiquette and Netizens?
Netiquette is a combination of the words “Network” and “Citizens”,
“etiquette”. It defines the proper manners and behaviour one should
possess while working on the Internet.

18. Write two applications of Cyber law.


Cyber law encompasses a wide variety of political and legal issues
related to the internet and other communication technologies, including
intellectual property, privacy, freedom of expression and jurisdiction.

19. What is Plagiarism?


Copying and pasting information from the internet into your report
and then passing it off as your own work. Take credit of others work.

20. What is Hacking?


Breaking into computers to read private emails and other files.

21. List some of the risks that internet users face.


1. Inappropriate or unwanted contact (Cyberbullying and
spamming)
2. Inappropriate or inaccurate content(pornography and hate sites)
3. Deceptive or fraudulent commerce

22. List out the Usage rules applicable on the use of social media.
1. Be Authentic – Be honest about your identity.
2. Be secure – While creating social media accounts, always choose
Your passwords carefully. Your password should not
be easily guessable like your surname, dob,
Schoolname etc.
3. Be Reliable – Be careful what you upload as once something is
uploaded. It stays forever on the Internet.
4. Don’t pick Fights Online.
Sometimes people may respond to your post in a way you do
not find good and happy. In such a case, it is advised not to pick
fights online. Don’t convey your unhappiness through constructive
posts/message while carefully choosing right words.
5. Don’t use Fake names or Pseudonyms.
Never pretend to be someone else. If you think that making an
anonymous profile would hide you online, you are mistaken. Modern
tracking tools can easily track anonymous posts.
6. Protect your identity :
You should never provide or post personal information online. Never
list your full name, parents details , home address or telephone
number online. It is good idea to create a separate e-mail address
that is used only with social media sites.
7. Does your Information / Post pass the Publicity Test?
If your message / post is not acceptable for face-to-face
conversation, over the telephone, or in another medium, then it is not
acceptable for the a social networking site too.
8. Respect your Audience
Sometimes school / college students talk in slang or use some
abusive words which they find okay within their small group. But
these things must not be posted online. Don’t use slangs, personal
insults etc.
9. Respect others sentiments :
You should always respect others privacy and be considerate
for topics that may be considered sensitive – such as politics and
religion.
10. Monitor comments :
Most people who maintain social media sites welcome comments. – it
will builds credibility and community.

23. What is the role of IP address in networking?


An IP address identifies every device connected to the internet. This
enables computers and other internet-connected devices, such as mobile
phones and Internet-of-Things (IoT) devices, to communicate over the
internet and on local-area networks (LANs).

You might also like