AS-societal impacts-NCERT Solutions
AS-societal impacts-NCERT Solutions
AS-societal impacts-NCERT Solutions
1. After practicals, Atharv left the computer laboratory but forgot to sign off from his email
account. Later, his classmate Revaan started using the same computer. He is now logged
in as Atharv. He sends inflammatory email messages to few of his classmates using
Atharv’s email account. Revaan’s activity is an example of which of the following cyber
crime? Justify your answer.
o Hacking
o Identity theft – As he used someone’s account and sent inflammatory email
messages.
o Cyber bullying
o Plagiarism
2. Rishika found a crumpled paper under her desk. She picked it up and opened it. It
contained some text which was struck off thrice. But she could still figure out easily that
the struck-off text was the email ID and password of Garvit, her classmate. What is
ethically correct for Rishika to do?
o Inform Garvit so that he may change his password.
o Give the password of Garvit’s email ID to all other classmates.
o Use Garvit’s password to access his account.
3. Suhana is down with fever. So, she decided not to go to school tomorrow. Next day, in
the evening she called up her classmate, Shaurya and enquired about the computer
class. She also requested him to explain the concept. Shaurya said, “Mam taught us how
to use tuples in python”. Further, he generously said, “Give me some time, I will email
you the material which will help you to understand tuples in python”. Shaurya quickly
Column A Column B
Fakers, by offering special rewards or money prize asked for personal information,
Plagiarism
such as bank account information
Copy and paste information from the Internet into your report and then organize
Hacking
it
Credit card fraud The trail that is created when a person uses the Internet.
Digital Foot Print Breaking into computers to read private emails and other files
7. You got the below shown SMS from your bank querying a recent transaction. Answer the
following —
a) Will you SMS your pin number to the given contact number? – No, we should not provide any
confidential information like pin number or password to anyone.
8. Preeti celebrated her birthday with her family. She was excited to share the moments with
her friend Himanshu. She uploaded selected images of her birthday party on a social
networking site so that Himanshu can see them. After few days, Preeti had a fight with
Himanshu. Next morning, she deleted her birthday photographs from that social networking
site, so that Himanshu cannot access them. Later in the evening, to her surprise, she saw that
one of the images which she had already deleted from the social networking site was
available with their common friend Gayatri. She hurriedly enquired Gayatri “Where did you
get this picture from?”. Gayatri replied “Himanshu forwarded this image few minutes back”.
Help Preeti to get answers for the following questions. Give justification for your answers so
that Preeti can understand it clearly.
a) How could Himanshu access an image which I had already deleted? – When you perform any
transaction on the internet it leaves a digital footprint. There few websites and resources that
can be access to get the deleted items.
b) Can anybody else also access these deleted images? Yes, all marked friends and tagged
individuals can see them.
c) Had these images not been deleted from my digital footprint? There are certain data which
remain in digital footprint even files are deleted, cannot be deleted from my digital footprint.
9. The school offers wireless facility (wifi) to the Computer Science students of Class XI. For
communication, registered URL schoolwifi.edu. On 17 September 2017, the following email
was mass distributed to all the Computer Science students of Class XI. The email claimed that
the password of the students was about to expire. Instructions were given to go to URL to
renew their password within 24 hours.
b) What will happen if the student will click on the given URL? – It will redirect the user to
change the password. This is now a secure URL so the information can be open to anyone so it
can be hacked or stolen from the database.
c) Is the email an example of cybercrime? If yes, then specify which type of cybercrime is it.
Justify your answer. – Yes, it can be an example of cybercrime as it is a phishing activity.
10. You are planning to go for a vacation. You surfed the Internet to get answers for the
following queries, Which of your above-mentioned actions might have created a digital
footprint?
a) Weather conditions – Weather conditions do not store the information related to the user so
do not create any digital footprint.
b) Availability of air tickets and fares – It will create a digital footprint because it collects data
related to customer and ticket details.
c) Places to visit – The places to visit on google map is creating a digital footprint in your profile.
d) Best hotel deals – This will also ask data from user and create a digital footprint.
Copyrights Patents
Copyright law gives the copyright holder a set of rights A patent gives full control to the patentee to
that they alone can avail themselves legally and rights decide whether or how the invention can be
Presenting someone else’s idea or work as Copyright infringement is when we use other
one’s own idea or work is called person’s work without obtaining their permission to
plagiarism. use or we have not paid for it, if it is being sold.
Suppose we
If we copy some contents from Internet, download an image from the Internet and use it in
but do not mention the source or the our project. But if the owner of the copyright of the
original creator, then it is considered as an image does not permit its free usage, then using
act of plagiarism. such an image even after giving reference to the
image in our project is a violation of copyright.
It is a serious ethical offense and Check the copyright status of writer’s work before
sometimes considered as an act of fraud. using it to avoid copyright infringement.
The hacking which is done with the The hacking, that is done with the intention of
positive intent is known as ethical stealing information and unauthorized access of data
Ethical hacking helps in improving the The primary focus of non-ethical hacking is security
security and loopholes in the system. cracking and stealing sensitive data.
They are free of cost They may free or minimal charges to use them
Free software provides freedom to run, share Free and open-source software provides software
and modify software besides getting regular code to open for anyone to access, modify,
13. If you plan to use a short text from an article on the web, what steps must you take in
order to credit the sources used?
You need to put citation specifying the website name from where the content has been used.
14. When you search online for pictures, how will you find pictures that are available in the
free public domain. How can those pictures be used in your project without copyright
violations?
Follow the below given steps to make pictures available for free from copyright violations.
15. Describe why it is important to secure your wireless router at home. Search the Internet
to find the rules to create a reasonably secure password. Create an imaginary password for
your home router. Will you share your password for a home router with the following people.
Justify your answer.
a) Parents
b) Friends
c) Neighbours
d) Home tutors
16. List down the steps you need to take in order to ensure —
a) Your computer is in good working condition for a longer time. – Regular antivirus updates,
update software and do regular maintenance,
keep it clean it dustfree, keep in normal temperatures, switching it off once a day etc.
b) smart and safe Internet surfing. – Visit only https sites, don’t remain login at all times,
antivirus updates, use of strong passwords, think twice before feeding in your personal details
on any web sites, do not open any mail from unknown sender etc
17. What is data privacy? Websites that you visit collect what type of information about you?
The data collected can include– what device you’re using, which advertisements you’ve clicked
on, browsing activity across different sites, even IP address to determine ones location and
more.
18. In the computer science class, Sunil and Jagdish were assigned the following task by their
teacher.
a) Sunil was asked to find information about “India, a Nuclear power”. He was asked to use
Google Chrome browser and prepare his report using Google Docs.
b) Jagdish was asked to find information about “Digital India”. He was asked to use Mozilla
Firefox browser and prepare his report using Libre Office Writer. What is the difference
between technologies used by Sunil and Jagdish?
Chrome and google docs are freewares Whereas Mozilla Firefox browser and libre office are
open source softwares. Refer the deferentiate question for more.
20. Neerja is a student of Class XI. She has opted for Computer Science. Neerja prepared the
project assigned to her. She mailed it to her teacher. The snapshot of that email is shown
below.
Find out which of the following email etiquettes are missing in it. Justify your answer.
a) Subject of the mail
b) Formal greeting
c) Self-explanatory terms
d) Identity of the sender
e) Regards
21. Sumit got good marks in all the subjects. His father gifted him a laptop. He would like to
make Sumit aware of health hazards associated with inappropriate and excessive use of
laptop. Help his father to list the points which he should discuss with Sumit.
Sumit must be made aware of the following points regarding the aftermath of excessive use of
technology:
a) Strained Vision
b) Muscle and joint pain
c) Too much co-dependence
d) Failing memory
e) Sleep deprivation
f) Internet is very distracting, eats away lot of time