Loading...
Please wait while we prepare your content
Please wait while we prepare your content
Solutions for Computer Applications, Class 10, CBSE
Kuhu has just learnt how to do online banking. Name any two precautions that she should take to prevent online fraud.
Two precautions that Kuhu should take to prevent online fraud are:
Companies spend a lot on secure data transmission that requires enough technical safeguards.
(a) What do you understand by secure data transmission ?
(b) Why do you think companies spend so much on secure data transmission ?
(c) What are common technical safeguards that are applied to ensure secure data transmission ?
(a) Secure data transmission means applying enough technical safeguards so that data travels safely to its target, without being compromised or eavesdropped.
(b) Companies spend heavily on secure data transmission due to the following reasons:
(c) To ensure secure data transmission, following techniques are applied :
These days it is equally important to safeguard digital properties:
(a) What are digital properties?
(b) Why is above given statement/fact important?
(c) What are possible threats to digital properties?
(d) How can digital properties be safeguarded?
(a) Digital property (or digital assets) refers to any information about us or created by us that exists in digital form, either online or on an electronic storage device.
For example, any online personal accounts such as email, personal websites and blogs, domain names registered in our name, intellectual properties etc.
(b) Digital property rights lie with the owner. Legally a person who has created it or the owner who has got it developed by paying legally is the legal owner of a digital property. Only the owner can use and decide who all and in what form can his/her digital asset may be used by others, whether by making payments or by buying it or by obtaining its license or usage rights etc. Thus, it is important to safeguard digital properties.
(c) The common threats to digital properties are as follows:
(d) The following are the ways to ensure protection of digital properties:
Freedom of information refers to right to access information available on public platforms.
(a) What are the problems that are a hinderance in freedom of information for all?
(b) What are the ways to ensure freedom of information for all?
(a) There are several problems that hinder freedom of information for all:
(b) To ensure freedom of information for all, the following approaches can be taken:
Policies of companies related to protection of personal information of users online are meant to safeguard ............... of users.
Privacy
Reason — By implementing privacy policies, companies protect personal information of users, such as their name, contact details, financial data, or browsing history from unauthorized access, use, or disclosure, thus, maintaining their privacy rights and preventing misuse or exploitation of their data.
Credit card fraud may include :
Both of the above
Reason — Credit card fraud may include both stealing of credit card and unauthorized and illegal use of credit card.
Using someone else's twitter handle to post something, will be termed as :
Identity theft
Reason — Using someone else's twitter handle to post something, will be termed as identity theft.
Standard security protocol that establishes encrypted links between a web server and a browser is called ............... .
Secure sockets layer technology
Reason — Standard security protocol that establishes encrypted links between a web server and a browser is called Secure sockets layer technology.
Things like these, e.g., online email account, social media account or handle, online shopping account, online photo sharing account, trademarks, patents, own registered domain name etc. are collectively called ............... .
Digital property
Reason — Things like these, e.g., online email account, social media account or handle, online shopping account, online photo sharing account, trademarks, patents, own registered domain name etc. are collectively called digital property.
A ............... is an economic and social inequality with regard to access to, use of, or impact of ICT.
Digital divide
Reason — A digital divide is an economic and social inequality with regard to access to, use of, or impact of ICT.
Preeti needs to send a very confidential message to her colleague in office over a secure channel. She uses a technique wherein an actual message (which is in readable form) can be converted into an unreadable message. This concept is known as ................ .
Encryption
Reason — The concept of converting a readable message into an unreadable form is known as encryption.
Which of the following techniques can be used for security of data ?
All of the Above
Reason — Authentication, authorisation and encryption techniques can be used for security of data.
Which of the following is not a cybercrime ?
Using licensed software
Reason — Using licensed software is not a cyber crime. Plagiarism, phishing and hacking are cyber crimes.
Secure data transmission means :
Data cannot be accessed by any unauthorized person during transmission.
Reason — Secure data transmission means the data can not be accessed by any unauthorized person during transmission.
Which of the following is NOT an example of Intellectual Property rights ?
Password
Reason — Password is not an example of Intellectual Property rights because it does not represent a legal protection for creations or inventions. Patent, Trademark and Industrial Design can be used to protect one's intellectual property rights.
A ............... is the right given by the government to an inventor to protect his/her invention from being used/copied for a fixed period of time.
Patent
Reason — A patent is the right given by the government to an inventor to protect his/her invention from being used/copied for a fixed period of time.
Arun clicks on a link received in a message on his phone which promises him a complimentary trip to a destination of his choice. He forwarded this message to his friend, Panshul and asked him to do the same. But Panshul refuses and tells Arun that his personal and private information, such as online account names, login information and passwords can be stolen and he should be careful of such ............... attacks.
Phishing
Reason — Phishing is a deceptive technique used by cybercriminals to trick individuals into revealing sensitive information, such as usernames, passwords, or financial details.
Charlene is an artist. She displays her artwork on the Internet using her website to attract buyers. One day while browsing the Internet she discovers that another artist has displayed her painting portraying it as his own. Which right of Charlene was infringed ?
Intellectual Property right
Reason — Intellectual property rights are the rights of the owner of information to decide how much information is to be exchanged, shared or distributed. Also it gives the owner a right to decide the price for doing so. Here, the artwork is the intellectual right of Charlene.
Which of these is NOT an example of Cyber bullying ?
Bullying a classmate in the school corridor
Reason — Cyber bullying refers to an act of bullying on internet. Bullying a classmate in the school corridor doesn't involve internet. Hence, it cannot be considered as cyber bullying.
The other three acts involve the use of internet for bullying. Hence, they come under cyber bullying.
Which of the following is NOT a reason for the digital divide in different demographic regions ?
Lack of access to high performance computers
Reason — Cost of Technology, lack of information and lack of access to the disabled are reasons of digital divide. Lack of access to high performance computers is not a reason for digital divide as information can be accessed even through a normally functioning computer or mobile phone.
One of the most popular methods of encrypting data is Caesar cipher where original data is replaced by a key character like if key is -2 than 'a' will be replaced by ' y' , 'b' is replaced by 'z' and so on.
If the key is 2 i.e., every letter is replaced by its next to next letter means the letter 'A' will be replaced by 'C', the letter 'B' is replaced by 'D', and so on then what will be the replacement of the word 'CoMpUtEr'.
EqOrWvGt
Reason — According to the key, each letter of CoMpUtEr is replaced as follows:
C → E
o → q
M → O
p → r
U → W
t → v
E → G
r → t
Which of the following is a way to avoid Plagiarism when using material from the Internet ?
(i) Citing
(ii) Paraphrasing
(iii) Referencing
(iv) Embedding
Choose the correct option :
(i), (ii) and (iii) only
Reason — To avoid plagiarism, while referring to someone's else's creation, we must always give credit whenever we use:
............... is a software for which exclusive rights of modification in the source code remain with the owner.
Proprietary Software
Reason — Proprietary Software is a software for which exclusive rights of modification in the source code remain with the owner.
Pratham is excited to use a new software which is freely available to download but he cannot modify or change the source code. Pratham is using :
Freeware
Reason — A freeware software is available free of cost and allows copying and further distribution, but not modification and its source code is not available.
Which one of the following software comes under Open-Source Software category ?
Linux
Reason — The source code of Linux is available to customers and it can be modified and redistributed without any limitation.
What do you understand by privacy of data in e-commerce context ?
In e-commerce context, privacy of data is related to a company's policies on the use of user data. An e-commerce company must clearly state how it intends to use the data collected from the customer and whether the customer can restrict the use of personal information.
What role does consumer consent play in implementing the privacy of user data ?
Consumer consent plays a vital role in implementing the privacy of consumer data. Consumer consent decides what information can and cannot be used. The consent also relates to whether the given information can be further exploited.
What is the responsibility of e-commerce merchant to ensure before getting user's consent about his/her details' usage ?
Before getting user's consent about his/her details' usage, the e-commerce merchant must ensure the following:
What is online fraud ? Give some examples.
Fraud committed using the Internet is called Online fraud. Online fraud may occur in many forms such as :
Some examples of online fraud are:
What is credit card fraud ?
In credit card frauds, the credit card details of a user such as his credit card number, name, CVV, transaction pin, etc., are stolen from his/her online activities and then some payment frauds are carried out with this stolen information.
What is identity theft ?
Online identity theft refers to an act of stealing someone's personal information such as name, login details etc. and then posing as that person online. Malicious activities like fraudulent posts, rumour mongering, riots fueling, fraudulent financial transactions, etc. can be carried out through identity theft.
What measures can you take to curb online frauds ?
The measures that can be taken to curb online frauds are as follows:
What is safe data transmission ? How can you ensure secure data transmission ?
Secure data transmission means applying enough technical safeguards so that data travels safely to its target, without being compromised or eavesdropped.
To ensure secure data transmission, following techniques are applied:
What is intellectual property ? What do you understand by intellectual property rights ?
Any piece of information is produced or created with a lot of efforts and it consumes a lot of time. Creative creations of mind such as patents, literary and creative arts, copyrights, trademarks etc. are known as intellectual property.
Intellectual property rights are the rights of the owner of information to decide how much information is to be exchanged, shared or distributed. Also it gives the owner a right to decide the price for doing so.
What is plagiarism ? How can you avoid plagiarism while referring to someone's else's creation ?
Plagiarism is stealing someone else's intellectual work, such as an idea, literary work or academic work etc., and representing it as our own work without giving credit to creator or without citing the source of information.
To avoid plagiarism while referring to someone else's creation, we must give credit whenever we use:
What is digital property ? What are the threats to digital properties ?
Digital property (or digital assets) refers to any information about us or created by us that exists in digital form, either online or on an electronic storage device.
For example, any online personal accounts such as email, personal websites and blogs, domain names registered in our name, intellectual properties etc.
The common threats to digital properties are as follows:
How can you protect your digital properties ?
The following ways to ensure protection of your digital properties:
Expand the terms:
What are open source based software ?
Open source software is the software whose source code is available and which can be copied, modified and redistributed as well. There may or may not be charges payable for open source software.
In open source software, the source code is freely available to the customer. For example, Linux.
Compare and Contrast: Free software and Open source software
Free software is the software which is free of cost, which can be copied, modified and redistributed as well and whose source code is available. No charges are payable for free software.
Open source software, on the other hand, is the software, whose source code is available and which can be copied, modified and redistributed as well. There may or may not be charges payable for open source software.
Compare and Contrast: OSS and FLOSS
OSS refers to Open Source Software whose source code is made available to the public, allowing anyone to view, modify, and distribute the code. However, OSS does not necessarily mean that the software is completely free of charge. It only means that the source code is available for others to access and modify.
FLOSS refers to Free Libre/Livre and Open Source Software. The term FLOSS is used to refer to a software which is both free software as well as open source software. In addition to being Open Source, FLOSS also emphasises that no charges are applicable to the user for using and distributing the software.
Compare and Contrast: Proprietary software and Free software
Proprietary software is the software that is neither open nor freely available. Its use is regulated and further distribution and modification is either forbidden or requires special permission by the supplier or vendor. Source code of proprietary software is normally not available. These softwares need to be purchased before they can be used.
Free software means that the software is freely accessible and can be freely used, changed, improved, copied and distributed by all who wish to do so. No payments are needed to be made for free software.
Compare and Contrast: Freeware and Shareware
The term freeware is generally used for software, which is available free of cost and which allows copying and further distribution, but not modification and whose source code is not available. The right to use the software is limited to certain types of users for instance, for private and non-commercial purposes.
Shareware is a software which is made available with the right to redistribute copies, but it is stipulated that if one intends to use the software, often after a certain period of time then a license fee should be paid. The source code of shareware is not available and modifications to the software are not allowed.
Compare and Contrast: Freeware and Free software.
The term freeware is generally used for software, which is available free of cost and which allows copying and further distribution, but not modification and whose source code is not available. The right to use the software is limited to certain types of users for instance, for private and non-commercial purposes.
Free software means that the software is freely accessible and can be freely used, changed, improved, copied and distributed by all who wish to do so. No payments are needed to be made for free software.
What is public domain software ?
Public-domain software is free and can be used without restrictions. It is, by its very nature, outside the scope of copyright and licensing.
Name some common public domain software licenses.
Some open source licenses are Creative Commons License, General Public License and Apache License.
What is GPL software license ? How is it different from LGPL software license ?
General Public Licence (GPL) grants and guarantees a wide range of rights to developers who work on open-source projects. With GPL, users can do the following:
The LGPL and GPL licenses differ with one major exception. With LGPL the requirement that you have to release software extensions in open GPL has been removed.
What is freedom of information ?
Freedom of information refers to the right to access information available on public platforms.
What are the major factors behind digital divide ?
The major factors behind digital divide are:
Write any one application each of e-Governance and e-commerce.
An application of e-Governance is filing of online application forms for Aadhaar card, passport, etc.
An application of e-commerce is that we can do online shopping.