Any information about you or created by you that exists in digital form is referred to as Digital property.
Stealing someone's intellectual work and representing it as your own is known as Plagiarism.
Creative creations of mind such as patents, trademarks and copyrights are Intellectual property.
Any fraudulent business practice that extracts money from an ignorant person is called a Scam.
Software which usually limit the functionality after a trial period are known as Shareware.
IT Amendment Act, 2008 came into force from the year 2009.
Online identity theft is a theft of personal information in order to commit a fraud.
A smart mob is an organized group of people who have gathered through the use of social media to protest for a social or political cause.
Internet addiction is a specific type of disorder where a person can't strike a balance between their time online and offline.
The practice of attempting to acquire sensitive information from individuals over the internet by means of deception is called Phishing.
Hacking is the process of gaining unauthorized access to a computing device or a group of computer systems for some illicit purpose.
Cyber crime is defined as a crime in which a computer is the object of the crime.
Software Licensing is the legal right to run or the privilege given to you by a company to access their software.
A Firewall is a security device that can help protect your network by filtering traffic and blocking outsiders from gaining unauthorized access to private data on your computer.
Public Domain Software is free and can be used with restrictions.
Answer
False
Reason — Public Domain Software is not subject to copyright and therefore can be freely used, modified, and distributed by anyone without any restrictions.
An important factor of privacy is consumer consent.
Answer
True
Reason — Consumer consent is a fundamental aspect of privacy. It involves individuals having the ability to control and make informed decisions about how their personal information is collected, used, and shared.
Intellectual Property Rights are the rights of owners to decide how much information/data is to be shared or exchanged.
Answer
True
Reason — Intellectual property rights are the rights of the owner of information to decide how much information is to be exchanged, shared or distributed. Also it gives the owner a right to decide the price for doing so.
Copying and pasting data from the internet or other digital resources is ethical.
Answer
False
Reason — Copying and pasting data from the internet or other digital resources without proper citation, permission, or credit to the original author or creator is unethical.
E-document becomes legal after it is digitally signed.
Answer
True
Reason — A digitally signed e-document is considered legally binding and authentic, as the digital signature serves as proof of the signer's identity.
E-waste is very hazardous if not handled carefully.
Answer
True
Reason — E-waste, if not handled and disposed of properly, can be extremely hazardous to the environment and human health.
The data stored in biometric database can be updated.
Answer
False
Reason — Biometric data is unique to each individual and is used for identification and authentication purposes. Once biometric data is collected and stored in a database, it cannot be updated or changed, as it is a permanent characteristic of the individual.
Source code of proprietary software is normally available.
Answer
False
Reason — The source code of proprietary software is not available to the public, as it is considered the intellectual property of the software's owner or creator.
Free software is same as freeware.
Answer
False
Reason — Freeware is software that is available at no cost, but the user may not have the freedom to modify, distribute, or study the software. The source code may not be available, and the user may be restricted from making changes to the software. On the other hand, free software is software that gives users the freedom to run, study, share, and modify the software. The source code is available, and users are allowed to make changes and distribute the software. Hence, both are different.
Never respond to an email or advertisement that claims you have won something.
Answer
True
Reason — Emails or advertisements claiming that we have won something are usually phishing scams, designed to trick into revealing sensitive information, such as passwords, credit card numbers, or social security numbers. They may also attempt to install malware on our device or steal our identity.
A copyright is automatically granted to authors or creators of content.
Answer
True
Reason — A copyright is a collection of rights automatically vested to authors or creators of content.
In FOSS, source code is usually hidden from the users.
Answer
False
Reason — In Free and Open-Source Software (FOSS), the source code is made available to users, allowing them to view, modify, and distribute the code.
Using someone else's Twitter handle to post something will be termed as:
- Fraud
- Identity theft
- Online stealing
- Violation
Answer
Identity theft
Reason — Using someone else's twitter handle to post something, will be termed as identity theft.
Standard security protocol that establishes encrypted links between a web server and a browser is called ............... .
- Online safety technology
- SDT technology
- Web encryption technology
- Secure Sockets Layer Technology
Answer
Secure Sockets Layer Technology
Reason — Standard security protocol that establishes encrypted links between a web server and a browser is called Secure sockets layer technology.
Intellectual Property Rights protect the use of information and ideas that are of:
- Ethical value
- Moral value
- Social value
- Commercial value
Answer
Commercial value
Reason — Intellectual Property Rights (IPR) protect the use of information and ideas that are of commercial value. These rights ensure that creators can benefit financially from their work by preventing unauthorized use, reproduction, or distribution.
Credit card fraud may include:
- Stealing of credit card
- Unauthorized and illegal use of credit card
- Stealing information
- Phishing
Answer
Unauthorized and illegal use of credit card
Reason — Unauthorized and illegal use of a credit card constitutes credit card fraud, as it involves making purchases or withdrawals without the cardholder's consent, resulting in financial loss and unauthorized transactions.
The term 'Intellectual Property Rights' covers:
- Copyrights
- Trademarks
- Patents
- All of these
Answer
All of these
Reason — The term "Intellectual Property Rights" includes copyrights, trademarks, and patents.
Which of the following is an open-source software?
- Microsoft Windows
- Adobe Photoshop
- MySQL
- MS PowerPoint
Answer
MySQL
Reason — MySQL is an open-source relational database management system, which means that its source code is freely available for modification and distribution.
Which of the following is not an intellectual property?
- A poem written by a poet
- An original painting made by a painter
- Trademark of a company
- A remixed song
Answer
A remixed song
Reason — A remixed song is a derivative work based on an existing song, not an original creation like a poem, painting, or trademark, hence, it is not considered intellectual property.
Online personal account, personal websites are examples of:
- Digital Wallet
- Digital Property
- Digital Certificate
- Digital Signature
Answer
Digital Property
Reason — Online personal accounts and personal websites are examples of digital property because they represent assets or content owned and controlled by an individual in the digital space.
Unsolicited commercial email is known as ............... .
- Spam
- Malware
- Virus
- Spyware
Answer
Spam
Reason — Unsolicited commercial email is known as spam. Spam refers to irrelevant or inappropriate messages sent over the internet to a large number of users, for the purposes of advertising, phishing, spreading malware, etc.
Which of the following is not a type of a cyber crime?
- Data theft
- Forgery
- Damage to data
- Installing antivirus for protection
Answer
Installing antivirus for protection
Reason — Installing antivirus for protection is not a type of cyber crime. It is a security measure taken to protect against cyber threats.
Which of the following is not covered under IPR?
- Music
- Insurance
- Logo designed
- Invention
Answer
Insurance
Reason — Insurance is not covered under Intellectual Property Rights (IPR). IPR protects creations of the mind, such as music, logos, and inventions.
Which of the following measures should not be adopted to recycle e-waste safely?
- Donate to NGO
- Sell your old electronics
- Burn your e-waste
- Give your e-waste to a certified e-waste recycler
Answer
Burn your e-waste
Reason — Burning e-waste is not a safe measure for recycling because it can release harmful chemicals and pollutants into the environment.
Assertion (A): The practice of taking someone else's work or ideas and passing them off as one's own is copyright infringement.
Reasoning (R): Copyright infringement includes the reproduction or distribution of a copyrighted work without permission.
- Both A and R are true and R is the correct explanation of A.
- Both A and R are true but R is not the correct explanation of A.
- A is true but R is false.
- A is false but R is true.
Answer
Both A and R are true and R is the correct explanation of A.
Explanation
Copyright infringement involves using someone else's work without permission, including passing it off as one's own. This includes unauthorized actions like reproduction, distribution, display of the copyrighted work.
Assertion (A): Electronic records available on DigiLocker are considered legitimate.
Reasoning (R): Electronic records available on DigiLocker or mParivahan are deemed to be legally recognized at par with the original documents as per the provisions of the Information Technology Act, 2000.
- Both A and R are true and R is the correct explanation of A.
- Both A and R are true but R is not the correct explanation of A.
- A is true but R is false.
- A is false but R is true.
Answer
Both A and R are true and R is the correct explanation of A.
Explanation
DigiLocker is a government-authorized digital storage service enabling users to store and access documents electronically. Documents on DigiLocker are considered legitimate and serve as proof of identity or address. The Information Technology Act, 2000, establishes the legal basis for recognizing electronic records as valid. According to the Act, records on platforms like DigiLocker or mParivahan are equivalent to original documents.
Assertion (A): Someone has created a fake social media profile in the name of Saket. Saket is a victim of cyberstalking.
Reasoning (R): Cyberstalking is a form of cybercrime.
- Both A and R are true and R is the correct explanation of A.
- Both A and R are true but R is not the correct explanation of A.
- A is true but R is false.
- A is false but R is true.
Answer
Both A and R are true but R is not the correct explanation of A.
Explanation
Someone creating a fake social media profile in Saket's name exemplifies cyberstalking, which makes Saket a victim of cyberstalking. Cyberstalking is a form of cybercrime, which involves using technology to harass, intimidate, or stalk someone.
Assertion (A): Stealing money from someone's wallet is a type of cybercrime.
Reasoning (R): Cybercrime is a crime that involves a computer and a network.
- Both A and R are true and R is the correct explanation of A.
- Both A and R are true but R is not the correct explanation of A.
- A is true but R is false.
- A is false but R is true.
Answer
A is false but R is true.
Explanation
Stealing money from someone's wallet would not be classified as a cybercrime, as it does not involve electronic devices or networks. Cybercrime is defined as a crime in which a computer is the target of crime (hacking, phishing, spamming) or is used as a tool to commit an offense.
Assertion (A): Rajat has stolen the content of a research paper and published it online. Rajat has committed cybercrime.
Reasoning (R): Plagiarism is an act of stealing someone's work and presenting it as one's own.
- Both A and R are true and R is the correct explanation of A.
- Both A and R are true but R is not the correct explanation of A.
- A is true but R is false.
- A is false but R is true.
Answer
Both A and R are true and R is the correct explanation of A.
Explanation
Rajat has stolen content and published it, which constitutes plagiarism. Plagiarism involves taking someone else's work and presenting it as one's own, which is a form of intellectual property theft and can be considered a cybercrime, depending on the context. Therefore, both the assertion and the reasoning are true, and the reasoning correctly explains the assertion.
Assertion (A): The source code of GIMP software can be modified and shared as it is an open source software.
Reasoning (R): Open-source software is computer software that is released under a License in which the copyright holder grants users the rights to use, study, change and distribute the software and its source code.
- Both A and R are true and R is the correct explanation of A.
- Both A and R are true but R is not the correct explanation of A.
- A is true but R is false.
- A is false but R is true.
Answer
Both A and R are true and R is the correct explanation of A.
Explanation
Open-source software, like GIMP, allows users to modify and share its source code as per the terms of its open-source license. Open source software is the software with source code that is publicly available under an open source license that gives users the right to study, change and distribute that software and emphasizes on security, cost-saving and transparency.
Assertion (A): Cyberbullying refers to an act of online harassment to someone by using online tools such as internet, email, instant messages, chat rooms, social networking sites, etc.
Reasoning (R): Cyberbullying is called harassing, demeaning, embarrassing, defaming or intimidating someone using modern technologies.
- Both A and R are true and R is the correct explanation of A.
- Both A and R are true but R is not the correct explanation of A.
- A is true but R is false.
- A is false but R is true.
Answer
Both A and R are true and R is the correct explanation of A.
Explanation
Cyberbullying is the attack on an individual or group through the use of electronic means such as instant messaging, social media, email, chat rooms and other forms of online communication. Cyberbullying involves harassing, demeaning, embarrassing, defaming, or intimidating someone using modern technologies.
Assertion (A): Digital footprint is the trail of data we leave behind when we visit any website (or use any online application or portal) to fill in data or perform any transaction.
Reasoning (R): While online, all of us need to be aware of how to conduct ourselves, how best to relate with others and what ethics, morals and values to maintain.
- Both A and R are true and R is the correct explanation of A.
- Both A and R are true but R is not the correct explanation of A.
- A is true but R is false.
- A is false but R is true.
Answer
Both A and R are true but R is not the correct explanation of A.
Explanation
A digital footprint refers to the data trail left behind when we interact with online platforms, including websites, applications, and portals. This can include data such as login credentials, search queries, browsing history, and more. It is essential to be mindful of our online behavior, including how we interact with others, and to maintain ethical standards, morals, and values while online.
Assertion (A): An internet troll is a person who deliberately sows discord on the internet by starting quarrels or upsetting people.
Reasoning (R): We can download and use any material available on the internet.
- Both A and R are true and R is the correct explanation of A.
- Both A and R are true but R is not the correct explanation of A.
- A is true but R is false.
- A is false but R is true.
Answer
A is true but R is false.
Explanation
An internet troll is a person who intentionally tries to provoke or upset others online, often by posting inflammatory or off-topic comments. We cannot download and use any material available on the internet due to many restrictions, limitations, copyright laws, and privacy laws.
Assertion (A): Social media are websites or applications that enable their users to participate in social networking but they cannot create and share content with others in the community.
Reasoning (R): We should not waste precious time in responding to unnecessary emails or comments unless they have some relevance for us.
- Both A and R are true and R is the correct explanation of A.
- Both A and R are true but R is not the correct explanation of A.
- A is true but R is false.
- A is false but R is true.
Answer
A is false but R is true.
Explanation
Social media are websites or applications that enable their users to participate in social networking and allow users to create and share content with others in the community. This is one of the primary functions of social media. We should not waste our precious time in responding to unnecessary emails or comments unless they have some relevance for us.
Assertion (A): Hacking is compromising security on digital devices.
Reasoning (R): Hacking involves stealing passwords and other digital information.
- Both A and R are true and R is the correct explanation of A.
- Both A and R are true but R is not the correct explanation of A.
- A is true but R is false.
- A is false but R is true.
Answer
Both A and R are true and R is the correct explanation of A.
Explanation
Hacking is the process of gaining unauthorized access to a computing device or a group of computer systems for some illicit purpose. This is done through cracking passwords and codes which gives access to the systems.
Jeet has to prepare a project on 'Swachh Bharat Abhiyan'. He decides to gather information from the internet. He downloads three web pages (webpage 1, webpage 2, webpage 3) containing information on Swachh Bharat Mission. Which of the following steps taken by Jeet is/are an example of plagiarism or copyright infringement? Give justification in support of your answer.
(a) He read a paragraph on 'Swachh Bharat Abhiyan' from webpage 1 and rephrased it. He finally pasted the rephrased paragraph in his project.
(b) He downloaded three images of 'Swachh Bharat Abhiyan' from webpage 2. He made a collage for his project using these images.
(c) He downloaded 'Swachh Bharat Abhiyan' icon from webpage 3 and pasted it on the front page of his project report.
Answer
Jeet's actions in all three scenarios (a, b, and c) are examples of plagiarism or copyright infringement because he failed to properly cite or acknowledge the original sources. By rephrasing a paragraph from webpage 1 without credit, downloading and using images from webpage 2 without permission or attribution, and using the 'Swachh Bharat Abhiyan' icon from webpage 3 without permission or attribution, Jeet presented others work as his own, violating fundamental principles of academic integrity and copyright laws, and should have provided proper citations, credits, or acknowledgements to the original sources to avoid these infringements.
Angad receives an SMS, shown alongside, from his bank querying a recent transaction. Answer the following questions as to what he should do in such a situation:
(a) Should he SMS his pin number to the given contact number?
(b) Should he call the bank helpline number to recheck the validity of the SMS received?
Answer
(a) No, he should not SMS his PIN number to the given contact number. Sharing PIN numbers over SMS can lead to fraud and unauthorized access to his bank account, increasing the chance of his account being hacked, which can result in financial loss.
(b) Yes, he should call the bank helpline number to verify the validity of the SMS received. This ensures he is speaking directly to a legitimate bank representative and can confirm whether the transaction is genuine or if the SMS is a phishing attempt.
Munish has topped in all the subjects in his school exams. His father has gifted him a laptop. He would like to make Munish aware of the health hazards associated with inappropriate and excessive use of laptop. Help his father list the points which he should discuss with Munish.
Answer
Munish must be made aware of the following points regarding the pitfalls of excessive use of technology:
Physical Problems
- Repetitive Strain Injury
- Carpal Tunnel Syndrome
- Computer Vision Syndrome
- Radiation
- Sleeping disorders and decline in productivity
- Loss of attention and stress
Psychological Problems
- Fear of technology
- Computer anxiety
- Internet addiction
Jayati Chatterjee is studying digital footprints. Help her clarify the concepts of digital footprints.
(i) Digital footprints are also known as:
- Digital data
- Digital tattoos
- Plagiarism
- Digital print
(ii) Digital footprints are stored
- Temporarily (for a few days)
- For 7 days only
- Permanently
- For 3 days only
(iii) Whenever we surf the internet using smartphones, we leave behind a trail of data reflecting the activities performed by us online, which is termed as ............... .
- Digital footprint
- Online handprint
- Digital activities
- Internet activities
(iv) There are ............... kinds of digital footprints.
- 1
- 3
- 2
- 4
(v) Which is the correct type(s) of digital footprint?
- Active digital footprint
- Passive digital footprint
- Both (1) and (2)
- None of these
Answer
(i) Digital tattoos
Reason — Digital footprints are referred to as "digital tattoos" because, just like tattoos, they can be permanent and leave a lasting impression.
(ii) Permanently
Reason — Digital footprints are stored permanently because they are recorded and stored on servers, databases, and other digital storage systems.
(iii) Digital Footprint
Reason — A digital footprint refers to the trail of data that we leave behind when we use the internet or digital devices. This can include our browsing history, search queries, social media activity, and other online actions.
(iv) 2
Reason — There are two main types of digital footprints: active digital footprints and passive digital footprints.
(v) Both (1) and (2)
Reason — The two types of digital footprints are active digital footprint and passive digital footprint.
Neetu has recently shifted to a new city and a new school. She does not know many people there. However, someone starts posting negative, demeaning comments on her social networking profile, school site's forum, etc.
She also starts getting repeated mails from unknown people. Every time she goes online, she finds someone chasing her online.
(i) What is all this happening to Neetu?
- Neetu has become a victim of cyber bullying and cyber stalking
- Eaves dropping
- Scam
- Violation of IPR
(ii) What action should be taken by her to stop all this?
- Discuss with her parents
- Discuss in peer group
- Keep quiet and suffer emotionally
- She must immediately bring all this to the notice of her parents and school authorities and also report this to the cybercrime wing of the local police with the help of her parents.
(iii) The act of fraudulently acquiring someone's personal and private information, such as online account names, login information and passwords is called ............... .
- Phishing
- Identity theft
- Fraud
- Plagiarism
(iv) Neetu needs to protect her personal information or data from unintentional and intentional attacks and disclosure which is termed as ............... .
- Digital right
- Privacy
- Copyright
- Intellectual property
(v) A set of moral principles that governs the behaviour of a group or individual and regulates the use of computers.
- Copyright
- Computer ethics
- Property rights
- Privacy law
Answer
(i) Neetu has become a victim of cyber bullying and cyber stalking
Reason — Neetu is being targeted online with negative comments, repeated emails, and online harassment, which are all forms of cyberbullying and cyberstalking.
(ii) She must immediately bring all this to the notice of her parents and school authorities and also report this to the cybercrime wing of the local police with the help of her parents.
Reason — Neetu should inform her parents and school authorities about the online harassment and report it to the cybercrime wing of the local police to take legal action against the perpetrators.
(iii) Phishing
Reason — Phishing is an unlawful activity where fake websites or emails that look original or authentic are presented to the user to fraudulently collect sensitive and personal details, particularly usernames, passwords, banking and credit card details.
(iv) Privacy
Reason — Neetu needs to protect her personal information and data from unauthorized access, disclosure, or misuse, which is referred to as privacy. Privacy is the right to control one's personal information and data.
(v) Computer ethics
Reason — A set of moral principles that governs the behaviour of a group or individual and regulates the use of computers is called computer ethics.
What do you mean by cybercrime?
Answer
Cybercrime refers to any online illegal activity facilitated by the use of electronic communication devices like mobile phones, computers or through networks like the Internet. For example, cyberstalking, cyberbullying, cyberespionage, cyberwarfare, etc.
What is meant by cyber ethics? How are they Important for us?
Answer
Cyber ethics refers to the moral principles and guidelines that govern the use of computers, the internet, and other digital technologies.
Cyber ethics are important because they:
- Protect individuals and organizations from cyber threats and attacks.
- Promote trust and confidence in digital transactions and interactions.
- Ensure accountability and responsibility in the digital world.
- Foster a culture of respect and empathy online.
- Help to prevent digital divide and promote digital inclusion.
What do you understand by illegal download?
Answer
Illegal downloading refers to the act of downloading copyrighted digital content, such as music, movies, software, or e-books, without permission from the copyright holder or without paying the required fee.
What is phishing?
Answer
Phishing is the act of illegally acquiring personal and sensitive information such as, online banking details, credit card details, and other login details, of an individual by sending malicious e-mails or by creating web pages that can collect this information as they appear to come from very famous organizations.
What is cyber law?
Answer
Cyber law is a part of the legal system that deals with cyberspace, internet and legal issues. It covers a broad area, like freedom of expression, access to and utilization of internet, and online security or online privacy.
How is cyber law implemented in India?
Answer
The Information Technology Act, 2000 (also known as IT Act) is an act of the Indian Parliament notified on 17 October, 2000. It is the primary law in India dealing with cybercrime and electronic commerce. The Act, amended in 2008, provides guidelines to the user on the processing, storage and transmission of sensitive information. It provides legal framework for electronic governance by giving recognition to electronic records and digital signatures. The Act outlines cyber crimes and penalties for them.
What is IT Act, 2000 of India?
Answer
In India, the cyber laws are enforced through Information Technology Act, 2000 which was notified on 17 October, 2000. It's prime purpose was to provide legal recognition to electronic commerce and to facilitate filing of electronic records with the Government, i.e., to provide the legal infrastructure for e-commerce in India.
The Act was later amended in December 2008 through the IT (Amendment) Act, 2008. It provided additional focus on Information Security. It has added several new sections on offences including Cyber Terrorism and Data Protection. The Information Technology Amendment Act, 2008 (IT Act 2008) came into force from October 27, 2009 onwards. Major amendments of IT ACT (2008) included digital signatures, electronic governance, offences and penalties and amendments to other laws.
What amendments were introduced in IT Act in the year 2008?
Answer
A major amendment was made in the IT Act in 2008 which came into force in October 2009. It introduced Section 66A which penalized sending of "offensive messages". It also introduced Section 69, which gave authorities the power of "interception or monitoring or decryption of any information through any computer resource". The amendments also contained penalties for child pornography, cyberterrorism and voyeurism.
How do people unknowingly commit cyber crime?
Answer
People unknowingly commit cybercrime by:
Clicking on phishing emails or links
Using weak passwords
Downloading pirated software or content
Using public Wi-Fi or unsecured networks
Sharing personal information on social media
Not updating software or operating systems
Using infected devices or USB drives
Participating in online scams
Not using two-factor authentication
Lack of awareness about cyber laws
Using unauthorized or unlicensed software
Not reporting cyber incidents
What are the different ways to indulge in phishing?
Answer
The different ways to indulge in phishing are fake emails from banks, targeted emails, fraudulent SMS messages, fake phone calls, and redirecting users to fake websites to steal information.
How would you recognize if one of your friends is being cyberbullied?
(a) Cite the online activities which would help you detect that your friend is being cyberbullied.
(b) What are the provisions in the IT Act 2000 (amended in 2008) to tackle such a situation?
Answer
(a) Repeated posting of rumours, giving threats online, posting the victim's personal information, sexual harassment or comments aimed to publicly ridicule a victim are the online activities which would help to detect that my friend is cyber bullied.
(b) The IT Act 2000, amended in 2008, includes provisions against cyberbullying, such as Section 66A, which penalizes sending of offensive messages, and Section 67, which penalizes publishing or transmitting obscene material.
Differentiate between Copyrights and Patents.
Answer
Copyright | Patent |
---|---|
A copyright is a collection of rights automatically vested to someone who has created an original work. | A patent is a grant of exclusive right to the inventor by the government. |
It protects original literary, dramatic, musical, and artistic works. | It protects novel, inventions, processes, and designs. |
The copyright owner has the authority to keep or to transfer the rights to use/distribute, individually to one or more people, or to transfer them collectively to one or more people. | Patents give the holder a right to exclude others from making, selling, using or importing a particular product or service, in exchange for full public disclosure of their invention. |
Differentiate between Plagiarism and Copyright Infringement.
Answer
Plagiarism | Copyright infringement |
---|---|
Plagiarism is stealing someone else's intellectual work and representing it as our own work without citing the source of information. | Copyright infringement is the use or production of copyright protected material without the permission of the copyright holder. |
Plagiarism can be classified as accidental/unintentional or deliberate/intentional. | Copyright infringement is considered intentional. |
Differentiate between Ethical and Non-ethical Hacking.
Answer
Ethical hacking | Non-ethical hacking |
---|---|
It is done on behalf of a company, which wants to find out the loopholes in the system in context to security. | It is done in order to harm or cause loss to an individual or a company. |
It is legal practice, authorized by the company or individual. | It is illegal practice and considered a crime. |
Such types of hackers are called white-hat hackers. | Such types of hackers are called black-hat hackers. |
They work with different government agencies and big tech companies. | They work for themselves for money. |
Differentiate between Active and Passive Footprints.
Answer
Active digital footprints | Passive digital footprints |
---|---|
An active digital footprints includes data that we intentionally submit online. | A passive digital footprints gets created through our data that we unintentionally leave online. |
Examples: Sending an email, sending messages online, posting a social media post, replying to post or commenting online etc. | Examples: When we visit a website, the web server may log our IP address, which identifies our internet service provider and our approximate location. |
Differentiate between Free Software and Free and Open Source Software.
Answer
Free software | Free and open source software |
---|---|
Free software means the software is freely accessible and can be freely used, changed, improved, copied and distributed by all who wish to do so. | A software which is free as well as open belongs to category FOSS (Free and open source software). |
Free software emphasizes the philosophical and ethical aspects of software freedom focusing on users' rights to control and modify the software they use. | Free and open source software emphasizes the practical benefits of transparency, collaboration, and the ability to modify and distribute software freely. |
Free software adheres to specific licenses like the GNU General Public License (GPL) that ensures users' freedoms. | This software can be released under various licenses, some of which are more permissive like BSD, MIT, Apache 2. |
When you search for pictures online, how will you find pictures that are in the public domain? How can those pictures be used in your project without copyright violations?
Answer
To find pictures available in the free public domain, understand that public domain images are visual works not subject to copyright because their copyright has expired, was never applicable, or was abandoned by the owner.
To use public domain images in our project without copyright violations, verify the image's copyright status, and give credit to the image's author, title, source, date, and license (if applicable).
Describe why it is important to secure your wireless router at home. Search the internet for rules to create a reasonably secure password. Create an imaginary password for your home router. Will you share password for your home router with the following people? Justify your answer.
(a) Parents
(b) Friends
(c) Neighbours
(d) Home tutors
Answer
Securing our wireless router at home is essential to prevent unauthorized access, protect personal information, avoid malware and viruses, and ensure privacy.
The rules to create a secure password are as follows :
- Should have a mix of uppercase and lowercase letters
- Should include numbers and special characters
- It should be at least 8 characters long
- Should not use a common phrase or pattern
The imaginary password for home router can be Xc78dW34aa12!
.
We shall share the password with parents only as they are trusted family members who need access to the internet.
What precautions should be taken by people to avoid phishing?
Answer
To avoid phishing, people should take the following precautions:
- Always check the sender’s email address and look for signs of spoofing.
- Avoid clicking on suspicious links.
- Use Anti-Phishing Software.
- Enable Two-Factor Authentication.
- Ensure websites are secure (https://) before entering personal information.
- Regularly update passwords.
What procedure is followed by the police to track/investigate cybercrime cases?
Answer
The procedure followed by the police to track/investigate cybercrime cases is as follows:
- Reporting: Victim reports the crime to the police.
- Initial Assessment: Police gather basic information and assess the crime.
- Securing Evidence: Preserve digital evidence and maintain the chain of custody.
- Digital Forensics: Collect and analyze data from devices to uncover clues.
- Tracing: Trace IP addresses and online activities to locate the perpetrator.
- Legal Procedures: Obtain necessary warrants and collaborate with other agencies.
- Arrest and Prosecution: Identify, arrest, and prosecute the suspect based on gathered evidence.
What precautions should be taken so that students do not indulge in cybercrime unknowingly?
Answer
The precautions to be taken so that students do not indulge in cybercrime unknowingly are as follows:
- Teach digital literacy and cybercrime laws.
- Encourage the use of strong, unique passwords and proper privacy settings on online platforms.
- Implement clear use policies and supervise internet use.
- Use and update antivirus and security software.
- Teach students to avoid clicking on unknown links or downloading unverified files.
- Encourage students to speak up if they encounter anything suspicious or uncomfortable online.
- Make students aware of the legal consequences of engaging in cybercrime activities, even unknowingly.
Define e-waste. What are the various methods for effective e-waste management?
Answer
E-waste, or electronic waste, refers to discarded electronic or electrical devices and components. This includes items like computers, mobile phones, televisions, refrigerators, and other electronic appliances that are no longer in use or have reached the end of their life cycle.
The various methods for effective e-waste management are as follows:
Dismantling — Removal of parts containing dangerous substances (CFCs, Hg switches, PCB), removal of easily accessible parts containing valuable substances (cable containing copper, steel, iron, parts containing precious metals).
Segregation of ferrous metal, non-ferrous metal and plastic — This separation is normally done in a shredder process.
Refurbishment and reuse — Refurbishment and reuse of e-waste has potential for those used electrical and electronic equipments which can be easily refurbished to put to its original use.
Recycling/recovery of valuable materials — Ferrous metals in electrical arc furnaces, non-ferrous metals in smelting plants, precious metals in separating works.
Treatment/disposal of dangerous materials and waste — Shredder light fraction is disposed off in landfill sites or sometimes incinerated (expensive), chlorofluoro-carbons (CFCs) are treated thermally, Printed Circuit Board (PCB) is incinerated or disposed off in underground storages, mercury (Hg) is often recycled or disposed off in underground landfill sites.
Differentiate between Proprietary License and Open Source License.
Answer
Proprietary License | Open Source License |
---|---|
A proprietary license is a type of software license that restricts the use, modification, and distribution of software. | An open source license is a type of software license that allows users to freely use, modify, and distribute software. |
The owner of the software, a company or individual, retains the intellectual property rights and controls how the software is used. | The source code is publicly available, and users have the freedom to modify and redistribute the software. |
It requires a license fee. | It is free of cost. |
Examples: Microsoft Windows, Adobe Photoshop. | Examples: Linux, Apache, Mozilla Firefox. |
How is internet affecting one’s daily life? Give one example each of positive and negative aspects of internet.
Answer
The internet has revolutionized the way we live, work, and interact with each other.
Example of positive aspect of the internet's impact on daily life:
The internet has made it possible for people to access a vast amount of information and educational resources from anywhere in the world.
Example of negative aspect of the internet's impact on daily life:
The internet's constant availability and instant gratification can lead to social isolation and addiction. People spend more time interacting with their screens than with real-life friends and family, leading to feelings of loneliness and disconnection.
Name any three areas where internet addiction is advantageous.
Answer
Internet addiction can be advantageous in:
- Access to Knowledge and Learning.
- Skill Development in Technology.
- Global Connectivity and Collaboration.
List at least three emotional and physical symptoms of internet addiction.
Answer
Emotional Symptoms of internet addiction:
- Anxiety or depression when not online
- Feelings of guilt or defensiveness about internet use
- Isolation from friends and family
Physical Symptoms of internet addiction:
- Fatigue or sleep disturbances
- Headaches or migraines
- Carpal tunnel syndrome or back pain