Loading...
Please wait while we prepare your content
Please wait while we prepare your content
Solutions for Computer Science, Class 11, CBSE
Assertion (A): Digital footprints are also termed as Digital Tattoos.
Reasoning (R): Digital footprints are the records and traces that we leave behind while working with the internet.
Both A and R are true and R is the correct explanation of A.
Explanation
Digital footprints, also known as digital tattoos, refer to the trail or traces left by individuals online while using digital devices like smartphones, tablets, and computers. These records are often permanent and cannot be easily erased.
Assertion (A): Privacy of sensitive data can be achieved through proper authentication checks.
Reasoning (R): Authentication is the process of providing access to the data for all the users.
A is true but R is false.
Explanation
Privacy of sensitive data can be implemented by encryption, authentication and other secure methods to ensure that such data is accessible only to the authorized user and is for a legitimate purpose. Authentication is the process of verifying the identity of users and granting access only to those who are authorized.
Assertion (A): FLOSS is an Open Source Software.
Reasoning (R): FLOSS source code is freely available and modifiable.
Both A and R are true and R is the correct explanation of A.
Explanation
FLOSS stands for Free Libre/Livre and Open Source Software. It refers to software that is both open source and free of charge. This means that users can freely access, modify, and distribute the software without any cost.
Assertion (A): One should not use copyrighted material without taking a license first.
Reasoning (R): A license is described as the permission granted by the copyright holder to use a product.
Both A and R are true and R is the correct explanation of A.
Explanation
One should not use copyrighted material without obtaining a license first, as doing so can violate copyright laws. A license is the permission granted by the copyright holder, allowing legal use of the material.
Assertion (A): Intellectual property refers to a creation of the intellect (hence, the name); inventions, literary and artistic works, symbols, names, images and designs used in commerce are part of it.
Reasoning (R): Intellectual property is safeguarded through copyright.
Both A and R are true but R is not the correct explanation of A.
Explanation
Assertion (A) is true because intellectual property includes creations like inventions, literary works, symbols, names, and designs.
Reasoning (R) is true as copyright is one of the ways to protect intellectual property (mainly for literary and artistic works).
However, Reasoning (R) is not the correct explanation of Assertion (A) because patents and trademarks are other ways of protecting other forms of intellectual property. Hence, copyright is not the sole mechanism for safeguarding all types of intellectual property.
Assertion (A): Plagiarism is a form of IPR infringement.
Reasoning (R): Intellectual Property Rights (IPR) infringement is using someone else's intellectual property without the consent of the owner.
Both A and R are true and R is the correct explanation of A.
Explanation
Plagiarism is a form of Intellectual Property Rights (IPR) infringement because it involves copying someone else's work without giving credit to the original author. Intellectual Property (IP) infringement refers to any violation or breach of protected intellectual property rights.
Assertion (A): When a patent is granted, the owner gets an exclusive right to prevent others from modifying, reproducing, selling or distributing the protected invention.
Reasoning (R): A patent is usually granted for inventions.
Both A and R are true but R is not the correct explanation of A.
Explanation
A patent is usually granted for inventions. When a patent is granted, the owner gets an exclusive right to prevent others from using, selling or distributing the protected invention. Patent gives full control to the patentee to decide whether or how the invention can be used by others.
Assertion (A): The act of presenting someone else's work or idea as your own is plagiarism.
Reasoning (R): Accessing someone's computer system without their permission is defined as plagiarism.
A is true but R is false.
Explanation
Plagiarism is copying someone else's work and then passing it off as one's own. Hacking is an act of unauthorized access to a computer, computer network or any digital system.
Secure Sockets Layer technology
Reason — Standard security protocol that establishes encrypted links between a web server and a browser is called Secure sockets layer technology.
Commercial Value
Reason — Intellectual Property Rights protect the use of information and ideas that are of commercial value.
Unauthorized and illegal use of credit card
Reason — Credit card fraud involves the use of credit/debit card to obtain money or acquire properties without appropriate authorization. Fraudsters obtain credit/debit card numbers of victims from unsecured web media and use them to carry out illegal or unethical transactions.
MySQL
Reason — MySQL is an open-source relational database management system, meaning its source code is freely available for anyone to use, modify, and distribute. In contrast, Microsoft Windows, Adobe Photoshop and MS Powerpoint are proprietary software.
Digital Property
Reason — Online personal accounts and personal websites are considered digital property because they represent owned assets in the digital space, similar to physical property in the real world.
Installing antivirus for protection
Reason — Installing antivirus is not a type of cyber crime because it is a defensive measure taken by individuals or organizations to protect against cyber threats. Cyber crime refers to criminal activities conducted using computers or the Internet, such as data theft, forgery, hacking, phishing, and malware attacks.
Cyber crime refers to any online illegal activity facilitated by the use of electronic communication devices like mobile phones, computers or through networks like the Internet. For example, cyberstalking, cyberbullying, cyberespionage, cyberwarfare, etc.
Cyber ethics refers to the moral principles and guidelines that govern the use of computers, the internet, and other digital technologies.
Cyber ethics are important because they:
Identity theft is a type of fraud that involves using someone else's identity to steal money or gain other benefits. Online identity theft refers to an act of stealing someone's personal information such as name, login details, credit card details etc, and then posing as that person online.
To protect ourselves from such frauds, we should follow Private Browsing or Anonymous Browsing on the internet.
People unknowingly commit cyber crime by:
Clicking on phishing emails or links
Using weak passwords
Downloading pirated software or content
Using public Wi-Fi or unsecured networks
Sharing personal information on social media
Not updating software or operating systems
Using infected devices or USB drives
Participating in online scams
Not using two-factor authentication
Lack of awareness about cyber laws
Using unauthorized or unlicensed software
Not reporting cyber incidents
The protective measures to be followed against phishing include:
The procedure followed by the police to track/investigate cyber crime cases is as follows:
The precautions to be taken so that students do not indulge in cybercrime unknowingly are as follows:
Proprietary License | Open Source License |
---|---|
A proprietary license is a type of software license that restricts the use, modification, and distribution of software. | An open source license is a type of software license that allows users to freely use, modify, and distribute software. |
The owner of the software, a company or individual, retains the intellectual property rights and controls how the software is used. | The source code is publicly available, and users have the freedom to modify and redistribute the software. |
It requires a license fee. | It is Free of cost. |
Examples: Microsoft Windows, Adobe Photoshop. | Examples: Linux, Apache, Mozilla Firefox. |
Biometric authentication systems offer a high level of security by using unique biological traits, such as fingerprints or facial recognition, which are difficult to replicate or forge. They provide convenience and reduce the risk of unauthorized access, as traits cannot be easily shared or stolen.
Ethics and law are interconnected but distinct; ethics involves moral principles guiding behaviour based on what is considered right and wrong, while law consists of formal rules established by authorities to maintain societal order.
Fairness in law refers to the principle of treating all individuals impartially and justly, ensuring that legal processes and outcomes are equitable. It focuses on the application of laws in a manner that is unbiased and consistent, regardless of personal characteristics or circumstances.
Ethics in law involves the moral principles and values that guide the behaviour of legal professionals and the interpretation of legal rules. It encompasses broader concerns about what is morally right or wrong in legal practice and decision-making, such as integrity, honesty, and justice.
Ethical norms are moral principles guiding behaviour based on concepts of right and wrong and are often subjective, varying by culture and personal values. They are not legally enforceable and rely on societal expectations. In contrast, laws are formal, objective rules established by governing bodies to regulate behaviour and maintain order, with legal consequences for non-compliance.
A threat is any potential danger or adverse event that could exploit a vulnerability and cause harm. It represents something that could exploit a weakness, such as a hacker, malware, or natural disaster.
A vulnerability is a weakness or gap in a system's defenses that could be exploited by a threat. It represents the susceptibility of a system to threats, such as outdated software, misconfigured settings, or weak passwords.
Risk is the likelihood that a threat will exploit a vulnerability and the potential impact of that exploitation.
The ways to secure our system from cyber attacks are as follows:
The advantages of biometrics in school are as follows:
Hacker | Cracker |
---|---|
Hackers are technically sound people who hack devices and systems with good intentions, such as to find the security lapses of a system, in order to rectify it or for obtaining more knowledge out of it. | Crackers are people with malicious intentions who hack a system by breaking into it and violating it for some bad motives. |
Hackers are the ethical professionals. | Crackers are unethical. |
They are known as White hat hackers. | They are known as Black hat hackers. |
Illegal downloads means obtaining files from the internet that we don't have the right to use. It is the root cause of digital piracy, which involves illegally sharing copyrighted media.
Illegal downloads should be discouraged as it incurs heavy losses to developers/producers and the person who is carrying out such illegal downloads can face punishment or fine due to this unethical act.
A virus is a malicious code/program that causes damage to data and files on a system. Viruses can attack any part of a computer's software such as boot block, operating system, system areas, files and application-program-macros etc.
Spyware is malicious software that can collect various types of personal information, such as tracking the internet surfing habits and visiting web pages by the user or changing the configuration of our system.
Adware are programs that send unwanted advertisements to the user's computer. These advertisements generally appear in the form of pop ups, which can disrupt user's working.
Malware is a general term used to refer to viruses, worms, spyware, adware etc. It is unwanted software that someone else wants to run on our computer. Malware infects our computer, making it behave in a way, which we do not approve of.
Worms are self-replicating viruses that exploit security vulnerabilities to automatically spread themselves across computers and networks. Unlike many viruses, worms do not attach to existing programs or alter files. They typically go unnoticed until replication reaches a scale that consumes significant system resources or network bandwidth.
Malware disguised in what appears to be legitimate software are known as Trojans. Once activated, Trojans will conduct whatever action they have been programmed to carry out. Unlike viruses and worms, Trojans do not replicate or reproduce through infection.
Malware (Malicious Software) is a file or code, typically delivered over a network, that infects, explores, steals or conducts virtually any behavior an attacker wants. It includes various forms of malicious software, such as viruses, spyware, trojans and worms.
Worms are a type of malware that are self-replicating viruses that exploit security vulnerabilities to automatically spread themselves across computers and networks.
Technology greatly impacts society by improving communication, access to information, and quality of life. For example, smartphones have transformed how we connect with others, allowing instant messaging, video calls, and access to the internet from almost anywhere. This makes staying in touch with family and friends easier and helps people work remotely. However, it also brings challenges like reduced face-to-face interactions and concerns about privacy and screen time.
The drawback of social media networks are as follows:
Phishing | Identity theft |
---|---|
Phishing is an attempt to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity in an electronic communication. | Identity theft is a type of fraud that involves using someone else's identity to steal money or gain other benefits. Online identity theft refers to an act of stealing someone's personal information such as name, login details, credit card details etc, and then posing as that person online. |
Copyright Infringement | Trademark Infringement |
---|---|
Copyright infringement is the use or production of copyrighted material without the permission of the copyright holder. | Trademark infringement is defined as the unauthorized use of a trademark or service mark on or in connection with goods and/or services in a manner that is likely to cause confusion, deception, or mistake about the source of the goods and/or services. |
Proprietary Software | Free and Open-source Software |
---|---|
Proprietary Software is a software that is owned by an individual or company and has restrictions on its use, modification, and distribution. | Free and Open-source Software is a software that is freely available to use, modify, and distribute . |
Source code is not available to the public. | Source code is open and available for anyone to view, modify, and contribute to. |
Examples: Microsoft Windows, Adobe Photoshop. | Examples: Linux, Mozilla Firefox. |
(a) My personal medical information, including my medical records and health insurance details, was stolen from a hacked hospital database. The thief used this information to obtain medical treatment and prescription drugs, resulting in financial losses and damage to my credit score.
Provisions in IT Act:
(b) My credit card information was stolen through a phishing email, and the thief used it to make unauthorized transactions, resulting in financial losses.
Provisions in IT Act:
Section 66D of the IT Act, 2000: Punishment for cheating by personation using computer resource, which includes imprisonment up to 3 years and/or fine up to ₹1 lakh. Section 43 of the IT Act, 2000: Compensation for unauthorized access to computer system, which allows victims to claim damages from the person responsible for the unauthorized access.
The cyber crime discussed in this scenario is phishing. Phishing is an attempt to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity in an electronic communication. In this case, Ravi received an email that appeared to be from the IRS department. When he clicked on the link, he was directed to a website that looked like the official IRS site, but it was actually a fake site created by cybercriminals. By uploading important information to this fraudulent site, Ravi unknowingly provided his sensitive data to the attackers.
Shreya was not able to attend a class and she called up Rajni enquiring about the topic discussed in the class. Rajni informed her that tuples in Python was discussed. She also downloaded a PowerPoint Presentation from the internet and mailed it to Shreya after changing the name to "made by Rajni" saying she had made this presentation for her. Identify and explain the cyber crime being discussed in the above example.
The cyber crime being discussed in the above example is plagiarism. Plagiarism involves copying someone else's work and passing it off as one's own without giving proper credit to the original author. In this case, Rajni downloaded a PowerPoint presentation from the internet, changed the name to "made by Rajni," and falsely claimed that she had created it. This act violates intellectual property rights and is considered a cyber crime.
A trademark includes any visual symbol, word, name, design, slogan, label, etc. that distinguishes a brand or commercial enterprise from other brands or commercial enterprises.
Intellectual property refers to creations of the intellect, inventions, literary and artistic works, symbols, names, images and designs used in commerce are part of it.
Data privacy refers to the protection of personal data and sensitive information from unauthorized access, use, disclosure, disruption, modification, or destruction.
Websites collect the information such as :
True
Reason — Intellectual Property Rights are the specific legal rights that allow their owner to completely benefit from the use of their creation for a certain period of time. These rights also entitle them to prevent others from using or dealing with their product without prior permission and force them to stop and compensate for any damages.
False
Reason — Copying and pasting data from the internet or other digital resources without permission is considered unethical because it can infringe on copyright and intellectual property rights.
False
Reason — Freeware is a type of software available free of cost, permitting copying and distribution but not modification, with its source code not available. On the other hand, free software, or open-source software, can be freely used, modified, improved, copied, and distributed without any payment required.