XI CS Unit 3 Notes
XI CS Unit 3 Notes
XI CS Unit 3 Notes
DIGITAL FOOTPRINT
A digital footprint – refers to the trail of data you leave while using the internet. It includes websites you
visit, emails you send, and information you submit online. A digital footprint can be used to track a
person’s online activities and devices.
Internet users create their digital footprint either actively or passively. A passive footprint is made when
information is collected from the user without the person knowing this is happening. An active digital
footprint is where the user has deliberately shared information about themselves either by using social
media sites or by using websites.
Digital Footprint Examples –
Online shopping - Making purchases from e-commerce websites
Online banking - Using a mobile banking app
Social media - Using social media on your computer or mobile, Sharing information, data, and
photos with your connections, Health and fitness, Using fitness trackers and Using apps to receive
healthcare
NETIQUETTE
It is the abbreviation of Internet etiquette or network etiquette, refers to online manners while using
internet or working online. While online you should be courteous, truthful and respectful of others. It
includes proper manners for sending e-mail, conversing online, and so on.
Some basic rules of netiquette are:-
● Be respectful
● Think about who can see what you have shared.
● Read first, then ask
● Respect the privacy of others
● Do not share personal information
COMMUNICATION ETIQUETTES
Digital communication includes email, texting, instant messaging, talking on the cell phone, audio or video
conferencing, posting on forums, social networking sites, etc. All these are the popular ways to connect
with people in order to exchange ideas, share data and knowledge.
• Be Precise
•Respect time
•Respect data limits
• Be Polite
• Be Credible
Copyright laws protect intellectual property Copyright - It is a legal concept, enacted by most
governments giving creator of original work exclusive rights to it, usually for a limited period.
Patent – A patent is a grant of exclusive right to the inventor by the government. Patent give the holder a
right to exclude others from making, selling, using or importing a particular product or service, in exchange
for full public disclosure of their invention.
Trademark – A Trademark is a word, phrase, symbol, sound, colour and/or design that identifies and
distinguishes the products from those of others.
VIOLATION OF IPR - Violation of intellectual property right may happen in one of the following ways:
Plagiarism - Plagiarism It is stealing someone’s intellectual work and representing it as your own work
without citing the source of information.
Any of the following acts would be termed as Plagiarism:
• Using some other author’s work without giving credit to the author
• Using someone else’s work in incorrect form than intended originally by the author or creator.
• Modifying /lifting someone’s production such as music composition etc.
• Giving incorrect source of information.
Copyright infringement – When someone uses a copyrighted material without permission, or we have not
paid for it, if it is being sold. it is called Copyright infringement. Suppose we download an image from the
Internet and use it in our project.
CC is used for all kind of creative works like websites, music, film, literature, etc. CC enables the free
distribution of an otherwise copyrighted work.
It is used when an author wants to give people the right to share, use and build upon a work that they have
created.
GPL is primarily designed for providing public licence to a software. GNU GPL is another free software
license, which provides end users the freedom to run, study, share and modify the software, besides
getting regular updates.
CYBER CRIME - Any criminal or illegal activity through an electric channel or through any computer
network is considered as cybercrime. Eg: Cyber harassment and stalking, distribution of child pornography,
types of spoofing, credit card fraud,. etc
CYBER LAW - It is the law governing cyberspace which includes freedom of expression, access to and usage
of internet and online privacy. The issues addressed by cyber law include cybercrime, e-commerce, IPR and
Data protection.
HACKING - It is an act of unauthorised access to a computer, computer network or any digital system.
Hackers usually are technical expertise of hardware and software.
Hacking when done with a positive intent is called as Ethical hacking or White hat.
Hacking when done with a negative intent is called as Unethical hacking or Black hat.
EAVESDROPPING - The term eavesdropping has been derived from the literal practice of secretly listening
to the conversations of people by standing under the eaves of a house. Unlike snooping, where the
network traffic can be stored for later analysis, eavesdropping is an unauthorised real-time interception or
monitoring of private communication between two entities over a network.
Also, the targets are usually the private communication channels like phone calls (VoIP), instant messages,
video conference, fax transmission, etc.
PHISHING AND FRAUD EMAILS - It is an unlawful activity where fake websites or emails appear as original
or authentic .This sites when clicked by the user will collect sensitive and personal details like usernames,
password, credit card details etc.
Phishing is an unlawful activity where fake websites or emails that look original or authentic are presented
to the user to fraudulently collect sensitive and personal details, particularly usernames, passwords,
banking and credit card details. The most common phishing method is through email spoofing where a
fake or forged email address is used and the user presumes it to be from an authentic source. So you might
get an email from an address that looks similar to your bank or educational institution, which is asking for
your information.
RANSOMEWARE - This is another kind of cybercrime where the attacker gains access to the computer and
blocks the user from accessing, usually by encrypting the data. The attacker blackmails the victim to pay for
getting access to the data, or sometimes threatens to publish personal and sensitive information or
photographs unless a ransom is paid. Ransomware can get downloaded when the users visit any malicious
or unsecure websites or download software from doubtful repositories.
CYBER TROLL - The comments or posts demean other users or people, or their content is called Cyber Troll.
An Cyber troll is an excellent example of social laws and ethics missing out. These are generally done to
respond to any person or their posts negatively. Trolling can be done by sending hate direct through
messages, posts, or comments.
Trolls are visible on all social platforms such as Instagram, Twitter, Facebook, YouTube, etc. The main
target of the people who create trolls is people with good fan-following, whether influencers or celebrities.
CYBER SAFETY - Cyber safety refers to safe and responsible use of Internet, to ensure safety and security of
personal information and not posing threat to anyone else’s information.
Safely Browsing The Web
Everyone must know the threats while browsing the web. Safe browsing on web needs to know many
important things like:
• What are possible threats?
• How to avoid these threats/dangers?
• How to be safe while browsing web
• Not every site you visit is safe.
• Every post or activity we do online is visible to others.
• Not everything you see or is promised online is true.
Confidentiality of Information
▪ Never share your password or account numbers/Ban Details over an e-mail or message.
▪ Do not follow links from e-mails
▪ Beware of fraud callers, pop-ups, websites, or e-mails asking for personal information.
▪ Use secure passwords and change it regularly.
▪ Use anti-spyware, and antivirus software.
Malware - Malware is a short term used for malicious software. It is any software developed with an
intention to damage hardware devices, steal data, or cause any other trouble to the user.
Viruses, Worms, Ransomware, Trojans, and Spyware are some of the kinds of malware.
Viruses - A virus is a piece of software code created to perform malicious activities and hamper resources
of a computer system like CPU time, memory, personal files, or sensitive information.
A computer virus infects other computer systems that it comes into contact with by copying or inserting its
code into the computer programs or software (executable files).
Trojan - A Trojan is a malware, that looks like a legitimate software and once it tricks a user into installing
it, it acts pretty much like a virus or worm. However, a Trojan does not self-replicate or infect other files, it
spreads through user interaction such as opening an email attachment or downloading and executing a file
from the Internet.
Adware - An Adware is a malware that is created to generate revenue for its developer. An adware
displays online advertisements using pop-ups, web pages, or installation screens. Once an adware has
infected a substantial number of computer systems, it generates revenue either by displaying
advertisements or using “pay per click” mechanism to charge its clients against the number of clicks on
their displayed ads.
E-waste - MANAGEMENT:- Various forms of electric and electronic equipment which no longer satisfy their
original purpose are termed as E-waste. This includes Desktop, Laptop, Projectors, Mobiles, etc
● MANAGEMENT: Sell back, gift/donate, and reuse the parts giveaway to a certified e-waste Recycler.
Some of the feasible methods of e-waste management are reduce, reuse and recycle.
• Reduce: We should try to reduce the generation of e-waste by purchasing the electronic or electrical
devices only according to our need. Also, they should be used to their maximum capacity and discarded
only after their useful life has ended. Good maintenance of electronics devices also increases the life of the
devices.
• Reuse: It is the process of re-using the electronic or electric waste after slight modification. The
electronic equipment that is still functioning should be donated or sold to someone who is still willing to
use it. The process of re-selling old electronic goods at lower prices is called refurbishing.
• Recycle: Recycling is the process of conversion of electronic devices into something that can be used
again and again in some or the other manner. Only those products should be recycled that cannot be
repaired, refurbished or re-used. To promote recycling of e-waste many companies and NGOs are
providing door-to do or pick up facilities for collecting the e-waste from homes and offices.
GENDER AND DISABILITY ISSUES WHILE TEACHING AND USING COMPUTERS GENDER ISSUES
• Lack of interest
During primitive years, children often play games on computers/ smartphones. Most games available
today are boys-centric that increase their interest in computers Also, at homes boys get to play more on
computers/smartphone (keeping in mind the entire India scenario) and develop more interest in
computers than girls.
• Lack of motivation
Girls are pressurised to choose a career option which will give them ‘work life balance in favour of family
roles they have to play later on. Girls are always told directly/indirectly in households that you have to play
important family role later on and indulging in a subject which will consume most of your time is not
advisable as no matter what, whatever job option you choose, you cannot shy away from your family role.
• Lack of role models
Girls these days see less of role models in the field of ‘Computer Science’ whom they can imitate. TV,
movies, advertisements, everywhere it is portrayed that is technical fields like ‘Computers Science’, are
men’s fields. All these things influence girls sub-psychologically and they infer that ‘Computer Science’ is
for boys and do not take up the subject.
• Lack of encouragement in class
As there are lesser number of girls in a class, the teachers for most work-assignments end up choosing
more boys. Also, less number of girls means, lesser peer-encouragement. Also, some teachers pin point on
their roles in society such girls will get married and may not take it up as career.
• Unavailability of teaching material / aids
It has been observed that when, in schools, work-partners are chosen, boys prefer boys over girls. And
even if a girl and a boy are made work-partners, boys prefer to work actively and make girls silent
observers. Boys are not comfortable in situations where they are not playing active roles.
Disability Issues
In the specially abled students, there can be one or more disabilities:
(i) Locomotor disabilities – Severe deformities, polio, leprosy, cerebral palsy.
(ii) Hearing and speech disabilities – Hearing impairment, speech aphasia.
(iii) Cognitive impairment – Specific learning deficits (Dyslexia, Dyscalculia). Down’s syndrome, Autism.
(iv)Vision impairment. low vision, blindness.
• Lack of special needs teachers
For different types of special needs, if special needs teachers are available, disabled students get
their needs addressed in right manner eg., for hearing impaired students, a teacher who is able to
converse in sign language would be able to convey and explain the study material than traditional
methods.
• There should be teachers who know what types of hardware, software, tools etc. can be used for the
differently able students as per their specific needs, eg, special types of specialized hardware such as
Braille keyboards, monitors, printers, synthetic speech generators etc., software assistants such as Google
assistant etc.
• Lack of supporting curriculum.
Curriculum should be designed while keeping focus on inclusive education. There always should be
possible alternatives keeping in mind special needs of the students. Software and programs should be so
used so that the disabled students can easily work on that. For example, office software based curriculum
can easily be implemented for all types of students as nearly all office software provide accessibility
features.
**********************