Loading...
Please wait while we prepare your content
Please wait while we prepare your content
Solutions for Informatics Practices, Class 12, CBSE
Assertion. The trail of online activity is called Digital Footprint.
Reason. Digital footprints are the records of online activities of an individual.
Both A and R are true and R is the correct explanation of A.
Explanation
The trail of online activity, known as a Digital Footprint, refers to the records and traces of an individual's activities as they use the Internet.
Assertion. Copyright, Patents and Trademarks are Intellectual Property Rights.
Reason. Intellectual Property Rights are the rights of the owner of information to decide how and how much the creation can be used.
Both A and R are true and R is the correct explanation of A.
Explanation
Intellectual Property Rights are the rights of the owner of information to decide how much information is to be exchanged, shared, or distributed and the price of their intellectual property. These rights also encompass the ability to protect one's creations through copyrights, patents, or trademarks. Therefore, Copyrights, Patents, and Trademarks are examples of Intellectual Property Rights.
Assertion. The patents are available online.
Reason. Patents are the grant of exclusive right(s) of an invention.
A is false but R is true.
Explanation
While some patent information may be available online, not all patents are publicly available online. Patent applications and granted patents may contain confidential or proprietary information, and therefore, may not be publicly disclosed. A patent is a grant of exclusive right to the inventor by the government.
Assertion. Anything available online does not mean it is free and freely available to use.
Reason. IPRs do not apply on the online content.
A is true but R is false.
Explanation
Many online materials are protected by copyright laws, and using them without permission may infringe on the rights of the copyright holder. Just because content is available online does not mean it is free from copyright or other intellectual property rights (IPRs). Intellectual Property Rights (IPRs) do apply to online content. Copyright, trademarks, patents, and other forms of IPRs protect various types of content on the Internet, just as they protect content in the offline world.
Assertion. Plagiarism is an offense.
Reason. Stealing someone's work and showing it as own work is the violation of Intellectual Property Rights.
Both A and R are true and R is the correct explanation of A.
Explanation
Plagiarism is considered an offense because it is the act of stealing someone else's intellectual work and presenting it as our own work without citing the source of information, which is a violation of Intellectual Property Rights.
Assertion. Open Source Software makes available the source code of the software.
Reason. Open source software and free software are the same.
A is true but R is false.
Explanation
Open Source Software makes the source code of the software available to customers, and it can be modified and redistributed without limitations. It may be available for free or for a nominal charge. In contrast, free software is freely accessible and can be used, changed, improved, copied, and distributed by anyone without any restrictions or payments. Therefore, open-source software and free software are not the same.
Assertion. Open Source Software and Freeware may come free of cost but they are not the same.
Reason. Open Source Software gives source code with freedom to-use while freeware comes at free-of-cost.
Both A and R are true and R is the correct explanation of A.
Explanation
Open Source Software and Freeware may come free of cost, but they are not the same. Open Source Software is a software that is available free of cost to customers and can be modified and redistributed without limitations. It makes the source code of the software available to customers. On the other hand, Freeware is also available free of cost, but it does not allow modification of the software and does not make the source code available to customers.
A is false but R is true.
Explanation
Freeware is software that is available free of cost and allows copying and further distribution, but not modification, and whose source code is not available. Free software, on the other hand, is freely accessible and can be used, changed, improved, copied, and distributed by anyone without any restrictions or payments. While free software is often available at no cost, it's possible for developers to charge for services, support, or proprietary features related to the software.
Assertion. Freeware and free software are different.
Reason. Freeware means no cost for the software, while free software means source code available with a freedom to use it.
Both A and R are true and R is the correct explanation of A.
Explanation
Freeware is software that is available free of cost and allows copying and further distribution. However, freeware does not allow modification, and its source code is not available. Free software, on the other hand, is freely accessible and comes with source code available with a freedom to use it, allowing users to use, change, improve, copy, and distribute the software without any restrictions or payments.
Assertion. Viruses, worms, trojans, adware, spyware are all Malware.
Reason. Malware is a general term to represent data threat software.
Both A and R are true and R is the correct explanation of A.
Explanation
Malware is an umbrella term for any piece of software that has malicious intent. Viruses, Worms, Trojans, Adware, Spyware are all types of malware.
Assertion. Spyware are not harmful as they do not damage data.
Reason. Spyware track data about user and sell it to others hampering your data privacy.
Both A and R are true and R is the correct explanation of A.
Explanation
Spyware are the software that stealthily attach with computer software such as a web browser and stealthily collect information about user's activities such as passwords, pins, banking information etc. Hence, spyware may not directly damage data, but they track data about user and sell it to others hampering user's data privacy.
Assertion. Phishing is fraudulently taking a user to an authentic looking site and stealing user information.
Reason. Pharming is fraudulently redirecting a website's traffic to another to steal information.
Both A and R are true but R is not the correct explanation of A.
Explanation
Phishing is the criminally fraudulent process of taking a user to an authentic looking site and attempting to acquire sensitive information such as usernames, passwords, credit card information etc. While pharming is fraudulently redirecting a website's traffic to bogus site without user's knowledge or consent to steal information.
Assertion. One should share information only on encrypted connections and protocols.
Reason. HTTPS is a protocol that ensures exchange of information in encrypted form.
Both A and R are true and R is the correct explanation of A.
Explanation
One should share information only on encrypted connections and protocols to ensure the security and confidentiality of data. This can be achieved using HTTPS (Hypertext Transfer Protocol Secure), a protocol that provides end-to-end encryption, ensuring the secure exchange of information.
Digital Footprint
The trail of data that is automatically created when a person uses any digital device like laptops, smartphones, tablets, etc., is called a digital footprint.
It is important to think carefully of digital footprint because:
Any piece of information is produced or created with a lot of efforts and it consumes a lot of time. Creative creations of mind such as patents, literary and creative arts, copyrights, trademarks etc. are known as intellectual property.
Intellectual property rights are the rights of the owner of information to decide how much information is to be exchanged, shared or distributed. Also it gives the owner a right to decide the price for doing so.
Plagiarism is stealing someone else's intellectual work and representing it as our own work without giving credit to creator or without citing the source of information.
For example, a student copies a paragraph from a website and includes it in his/her essay without citing the source, it is considered as plagiarism.
To avoid plagiarism while referring to someone else's creation, we must give credit whenever we use:
The common threats to digital properties are as follows:
The following ways to ensure protection of your digital properties:
Open source software is the software, whose source code is freely available and which can be copied, modified and redistributed without any limitation.
Two open-source softwares are Linux and Mozilla Firefox.
Free software is the software which is free of cost, which can be copied, modified and redistributed as well and whose source code is available. No charges are payable for free software.
Open source software, on the other hand, is the software, whose source code is available and which can be copied, modified and redistributed as well. There may or may not be charges payable for open source software.
OSS refers to Open Source Software whose source code is made available to the public, allowing anyone to view, modify, and distribute the code. However, OSS does not necessarily mean that the software is completely free of charge. It only means that the source code is available for others to access and modify.
FLOSS refers to Free Libre/Livre and Open Source Software. The term FLOSS is used to refer to a software which is both free software as well as open source software. In addition to being Open Source, FLOSS also emphasises that no charges are applicable to the user for using and distributing the software.
Proprietary software is the software that is neither open nor freely available. Its use is regulated and further distribution and modification is either forbidden or requires special permission by the supplier or vendor. Source code of proprietary software is normally not available. These softwares need to be purchased before they can be used.
Free software means that the software is freely accessible and can be freely used, changed, improved, copied and distributed by all who wish to do so. No payments are needed to be made for free software.
The term freeware is generally used for software, which is available free of cost and which allows copying and further distribution, but not modification and whose source code is not available. The right to use the software is limited to certain types of users for instance, for private and non-commercial purposes.
Shareware is a software which is made available with the right to redistribute copies, but it is stipulated that if one intends to use the software, often after a certain period of time then a license fee should be paid. The source code of shareware is not available and modifications to the software are not allowed.
The term freeware is generally used for software, which is available free of cost and which allows copying and further distribution, but not modification and whose source code is not available. The right to use the software is limited to certain types of users for instance, for private and non-commercial purposes.
Free software means that the software is freely accessible and can be freely used, changed, improved, copied and distributed by all who wish to do so. No payments are needed to be made for free software.
Consider the following scenario and answer the questions which follow :
"A student is expected to write a research paper on a topic. The student had a friend who took a similar class five years ago. The student asks his older friend for a copy of his paper and then takes the paper and then submits the entire paper as his own research work".
(i) Which of the following activities appropriately categorizes the act of the writer ?
(ii) Which kind of offense out of the following is made by the student ?
(i) Plagiarism
Reason — Submitting his friend's work as his own research work without proper attribution or permission is considered plagiarism.
(ii) Violation of Intellectual Property Rights
Reason — Plagiarism is a violation of intellectual property rights, as it involves using another person's intellectual creation without authorization or acknowledgment.
All of the above
Reason — E-waste contains hazardous substances such as lead, mercury, cadmium, arsenic etc. Improper handling or disposal of e-waste can release these toxic substances into the environment, leading to various health hazards including lung cancer, DNA damage, and brain damage.
Public-domain software is free and can be used without restrictions. It is, by its very nature, outside the scope of copyright and licensing.
Some open source licenses are Creative Commons License, General Public License and Apache License.
General Public License (GPL) grants and guarantees a wide range of rights to developers who work on open-source projects. With GPL, users can do the following:
The LGPL and GPL licenses differ with one major exception. With LGPL the requirement that you have to release software extensions in open GPL has been removed.
(a) Digital property (or digital assets) refers to any information about us or created by us that exists in digital form, either online or on an electronic storage device.
For example, any online personal accounts such as email, personal websites and blogs, domain names registered in our name, intellectual properties etc.
(b) Digital property rights lie with the owner. Legally a person who has created it or the owner who has got it developed by paying legally is the legal owner of a digital property. Only the owner can use and decide who all and in what form can his/her digital asset may be used by others, whether by making payments or by buying it or by obtaining its license or usage rights etc. Thus, it is important to safeguard digital properties.
(c) The common threats to digital properties are as follows:
(d) The following are the ways to ensure protection of digital properties:
When a person can't find a balance between their time online and their time offline, it considerably affects their mental health, this condition is called Internet addiction.
Symptoms of Internet addiction are as follows:
The list of net etiquettes are as follows:
Net Etiquettes refers to online manners while using Internet or working online. While online, we should be courteous, truthful and respectful of others.
The two netiquettes are as follows:
Refrain from personal abuse — If we disagree to something, we may express robust disagreement, but never call them names or threaten them with personal violence.
Never spam — We should not repeatedly post the same advertisement for products or services.
The two netiquettes that we should follow while communicating on social media are as follows:
Hacking refers to gaining unauthorized access to a network or computer or digital files, with an intention to steal or manipulate data or information or to install malware.
A hacker is someone who gains unauthorized access to our network or computer or digital files, with an intention to steal or manipulate data or information or to install malware.
The two health hazards related to excessive use of technology are as follows:
Repetitive Strain Injury (RSI) — It is an injury or disorder of the muscles, nerves, tendons, ligaments and Joints.
Computer Vision Syndrome (CVS) — It is a technology related health condition affecting eyesight.
Excessive use of technology leads to isolation, as people don't get time to physically socialize. It sometimes also leads to anxiety and depression, as people often tend to think that their "connections" have "perfect rosy lives" while they do not. Additionally, it can lead to Internet addiction. People may obsessively look through emails and messages, feeling stressed if they don't receive likes or replies on their posts, etc. This problem is formally termed Internet addiction disorder.
Excessive use of technology can have several impacts on physical health:
Impact on Hearing — Listening to loud music for over 15 minutes can cause hearing damage. Using headphones for long periods increases bacteria in the ears by over 700 times.
Impact on Bones and Joints — Technology affects posture due to prolonged sitting and repetitive movements, leading to muscle and joint strain. Repetitive Strain Injuries (RSIs) affect muscles, nerves, tendons, ligaments, and joints.
Eye Problems — Constant screen exposure from smartphones, laptops, and computers can damage vision, especially due to blue light, leading to potential vision loss. Computer Vision Syndrome (CVS) is a related eye condition.
Sleep Issues — Excessive device use disrupts sleep due to bright screen light suppressing melatonin production. Poor sleep impacts cognitive function, memory, and attention span.
A virus is a malicious codes/programs that cause damage to data and files on a system. Viruses can attack any part of a computer's software such as boot block, operating system, system areas, files and application-program-macros etc.
Anti-virus software is designed to detect and block attacks from malware. This software when loaded, resides in memory and checks every operation if it is malicious or not. If it finds any suspicious activity, it blocks that operation and saves our computer.
A computer virus is a computer program that can infect other computer programs by modifying them in such a way as to include a copy of itself.
Viruses can alter, corrupt and delete files, freeze the computer, flash unknown or unasked messages or display unwanted graphics on the computer screen, play unwanted music and interfere with the computer operation.
A virus can damage our computer in the following ways:
Malware is a general term used to refer to viruses, worms, spyware, adware etc. It is unwanted software that someone else wants to run on our computer. Malware infects our computer, making it behave in a way, which we do not approve of.
Malware can damage our computer in the following ways:
Spam refers to electronic junk mail or junk newsgroup postings, as well as unsolicited, usually commercial email sent to a large number of addresses.
Spam has become a significant Internet issue because:
It reduces productivity — The billions of spam messages circulating across the Internet can disrupt email delivery, degrade system performance, and reduce overall productivity.
It consumes time — While deleting spam emails might seem like a simple solution, it consumes a significant amount of time and hampers productivity.
It can lead to worse things — Spam messages may contain offensive or fraudulent material and can even be used to spread viruses.
Phishing is the act of illegally acquiring personal and sensitive information such as, online banking details, credit card details, and other login details, of an individual by sending malicious e-mails or by creating web pages that can collect this information as they appear to come from very famous organizations.
A firewall secures the computer such that only authentic users can connect to it. The significance of firewall lies in its ability to monitor, filter, and control incoming and outgoing network traffic based on predefined security rules. This helps prevent unauthorized access, data breaches, and malicious attacks, such as viruses, malware, and hacking attempts, from reaching the protected computer system.
The term freeware is generally used for software, which is available free of cost and which allows copying and further distribution, but not modification and whose source code is not available. The right to use the software is limited to certain types of users for instance, for private and non-commercial purposes.
Free software means that the software is freely accessible and can be freely used, changed, improved, copied and distributed by all who wish to do so. No payments are needed to be made for free software.
Hacking refers to gaining unauthorized access to a network or computer or digital files, with an intention to steal or manipulate data or information or to install malware.
Spoofing refers to as a fraudulent or malicious practice in which communication is sent from an unknown source disguised as a trusted source known to the receiver.
The e-waste disposal and recycling process includes the following unit operations:
Dismantling — Removal of parts containing dangerous substances (CFCs, Hg switches, PCB), removal of easily accessible parts containing valuable substances (cable containing copper, steel, iron, precious, metal containing parts).
Segregation of ferrous metal, non-ferrous metal and plastic — This separation is normally done in a shredder process.
Refurbishment and reuse — Refurbishment and reuse of e-waste has potential for those used electrical and electronic equipments which can be easily refurbished to put to its original use.
Recycling/recovery of valuable materials — Ferrous metals in electrical arc furnaces, non-ferrous metals in smelting plants, precious metals in separating works.
Treatment/disposal of dangerous materials and waste — Shredder light fraction is disposed off in landfill sites or sometimes incinerated (expensive), chlorofluoro-carbons (CFCs) are treated thermally, Printed Circuit Board (PCB) is incinerated or disposed off in underground storages, mercury (Hg) is often recycled or disposed off in underground landfill sites.
A filter for an Internet connection that monitors outgoing and incoming activity.
Reason — A firewall is a network security system, either hardware or software-based, that controls incoming and outgoing network traffic based on set of rules.
At least 8 characters, and a combination of letters, numbers, and characters.
Reason — A strong password should be long and complex, making it difficult for attackers to guess or crack. Including a mix of uppercase and lowercase letters, numbers, and special characters enhances the password's strength by increasing the number of possible combinations.
Spyware
Reason — Spyware is a software which is mostly installed on our computer without our consent, to spy on our activities and report this data to people willing to pay for it.
Google Chrome
Reason — Google Chrome is not a Free and Open Source Software (FOSS) tool. It is a web browser developed by Google, which means its source code is not openly available for users to view, modify, or distribute. In contrast, LibreOffice, Mozilla Firefox, and Python are all examples of FOSS tools with open-source code that can be freely used, modified, and distributed by anyone.
Open Source Software
Reason — Open Source Software (OSS), refers to software whose source code is available to customers and it can be modified and redistributed without any limitation.
Open Data
Reason — Open Data refers to data that has no usage restrictions and is freely available to everyone under Intellectual Property Rights.
You can edit the source code to customize it.
Reason — The advantage of open-source software is that we can edit the source code to customize it according to our needs or preferences.
May not have been tested as much as proprietary software, so might have bugs.
Reason — The main disadvantage of open-source software is that it may not have been tested as extensively as proprietary software, so it might have bugs.
Thoroughly tested because people are paying to use it.
Reason — The advantage of proprietary software is that it is thoroughly tested because people pay to use it.
You have to pay for this type of software.
Reason — The disadvantage of proprietary software is that users have to pay to access it.
copyright law
Reason — Copyright law is the generally recognized term for the government protection afforded to intellectual property, including written and electronic works. It grants the creator of original works exclusive rights to their use and distribution, protecting against unauthorized copying or use by others.
A song you wrote
Reason — A copyright is a legal term to describe the rights of the creator of an original creative work such as a literary work, an artistic work, a design, song, movie or software etc. Hence, a song written by us is a creative work that would be protected by copyright.
Installing antivirus for protection
Reason — Installing antivirus is not a type of cyber crime because it is a defensive measure taken by individuals or organizations to protect against cyber threats. Cyber crime refers to criminal activities conducted using computers or the Internet, such as data theft, forgery, hacking, phishing, and malware attacks.
All of the above
Reason — The term cyber crime is a general term that covers crime like phishing, credit card frauds, illegal downloading, industrial espionage, child pornography, cyber bullying, cyber stalking, cyber terrorism, creation and/or distribution of viruses, spam and so on.
Report vulnerability in any system
Reason — Cyber criminals don't report vulnerabilities because their intent is to exploit them for personal gain. Reporting would alert system owners, leading to fixes and preventing the criminals from benefiting from the weaknesses.
India's Information Technology (IT) Act, 2000
Reason — The name of the IT law in the Indian legislature is the Information Technology Act, 2000 (IT Act 2000).
IT Act 2000
Reason — The primary law in India for matters related to e-commerce and cyber crime is the Information Technology Act, 2000 (IT Act 2000).
What is meant by the term 'cyber-crime' ?
Any crime that involves computers and networks
Reason — Cyber crime is any criminal offense that is facilitated by, or involves the use of, electronic communications or information systems, including any electronic device, computer, or the Internet.
Cyber bullying
Reason — Cyber bullying involves posting objectionable and demeaning comments or messages on social media platforms with the intent to harass or harm a person mentally or emotionally.
An organisation purchases new computers every year and dumps the old ones into the local dumping yard. Write the name of the most appropriate category of waste that the organisation is creating every year, out of the following options :
E-Waste
Reason — The old computers being discarded by the organization fall under the category of electronic waste (e-waste) since they are discarded electronic devices.
reuse
Reason — The feasible methods of e-waste management are reducing, reusing, reselling, salvaging, recycling, and disposing.
Beryllium
Reason — When electronic circuit boards containing beryllium are burnt for disposal, they release beryllium oxide, a harmful chemical compound. Inhalation or skin contact with beryllium oxide can lead to skin diseases, allergies, and an increased risk of lung cancer.
E-Waste
Reason — The company is recycling electronic waste (e-waste) by extracting precious metals from old laptops, smartphones, tablets, etc. E-waste refers to discarded electrical and electronic devices that can be recycled to recover valuable materials such as metals, plastics, and glass.
Plagiarism
Reason — Plagiarism is the act of stealing someone else's intellectual work and presenting it as our own without citing the original source of information. In this case, submitting a downloaded project from the Internet under my name is considered plagiarism, as it misrepresents the originality and authorship of the work.
Intellectual Property Rights
Reason — Intellectual Property Rights (IPR) are the rights of the owner of information to decide how much information is to be exchanged, shared or distributed.
Ramandeep is a young woman with great aspirations and has a good team of like-minded people. She along with her team members started a company to sell handicrafts online and also designed a logo for their company. What type of intellectual property does this logo represent ?
Trademark
Reason — A logo designed for a company represents a form of intellectual property known as a trademark. A trademark is a word, phrase, symbol, sound, color and/or design that identifies and distinguishes the products and goods of one party from those of others.
word, phrase, or symbol
Reason — Companies register their trademarks to protect their words, phrases, and symbols from unauthorized use by others.
Theft
Reason — The act of someone taking Rohit's laptop without his permission or authorization constitutes theft, as it involves the unlawful taking of someone else's property.
Trademark
Reason — Himanshi can use a trademark to indicate that the clothes are made by her company. A trademark is used to distinguish and identify the products and goods of one company from those of others.
Plagiarism
Reason — Plagiarism is stealing someone else's intellectual work and representing it as our own work without citing the source of information.
digital property
Reason — Digital property or digital assets refers to any information about us or created by us that exists in digital form, either online or an electronic storage device.
Passive digital footprint
Reason — A passive digital footprint gets created through our data trail that we unintentionally leave online.
forever
Reason — Every activity we perform on the Internet is saved forever unless we have specific settings or tools in place to delete or limit the retention of our data.
Digital footprint
Reason — Digital footprints are the records and traces of individuals' activities as they use the Internet on various devices such as computers, smartphones, gaming consoles etc.
Hacking
Reason — Hacking refers to gaining unauthorized access to a network or computer or digital files, with an intention to steal or manipulate data or information or to install malware.
Copyright
Reason — A copyright is a legal term to describe the rights of the creator of an original creative work such as a literary work, an artistic work, a design, song, movie or software etc.
Creative Commons
Reason — Creative Commons is a non-profit organization that aims to build a publicly accessible global platform where a range of creative and academic work is shared freely.
E-waste is becoming one of the fastest growing environmental hazards in the world today. If it is not properly treated or disposed of it can cause serious health hazards, therefore the ............... has issued a formal set of guidelines for proper handling and disposal of e-waste.
Central Pollution Control Board (CPCB)
Reason — The Central Pollution Control Board (CPCB) has issued formal guidelines for the proper handling and disposal of e-waste to address the growing environmental hazards associated with it.
Pieces of malicious code that make copies of themselves and spread through computers without human interaction.
Reason — A worm is a self-replicating program which eats up the entire disk space or memory. A worm keeps on creating its copies until all the disk space or memory is filled.
Report it as phishing/spam through your email provider
Reason — If we receive an email asking for our username and/or password, we should report it as phishing/spam through our email provider.
Mark it as spam and block it
Reason — Marking the email as spam and blocking the sender is the appropriate response when we receive an email stating that we have won a lottery or received some inheritance from an unknown person.
worm
Reason — A computer worm is a type of malicious code that self-replicates by copying itself to other programs, allowing it to spread throughout a computer system or network.
Trojans
Reason — A Trojan horse is a program that appears harmless but actually performs malicious functions such as deleting or damaging files.
Worm
Reason — A worm is a self-replicating program and can cause damage to files and systems as it spreads through networks or systems.
Adware
Reason — Adware is the type of software that tracks our internet browsing habits and displays pop-up advertisements related to the sites and topics we've visited.
Eavesdropping
Reason — Eavesdropping is the attack that focuses on capturing small packets from the network transmitted by other computers and reading the data content in search of any type of information.
All of these
Reason — The sources of spreading viruses from one computer to another include email, infected data, and infected programs.
Phishing scams
Reason — Phishing scams involve attempts by individuals to obtain confidential information, such as usernames, passwords, and credit card details, from us by using an original-looking site and URL to deceive.
Pharming attack
Reason — Pharming attack is an attempt where a hacker tries to divert network traffic to a bogus site without our knowledge or consent.
A research student is expected to write a thesis on a topic. The student browses Internet for the topic and luckily finds it on the Internet. He copies and submits the entire thesis as his own research work. Which of the following activities appropriately categorises the act of the writer ?
Plagiarism
Reason — Plagiarism is the act of stealing someone else's intellectual work and presenting it as our own without citing the original source of information. In this case, the student copied the entire thesis from the internet and claimed it as his own research work, which is a case of plagiarism.
True
Reason — The practice of attempting to acquire sensitive information from individuals over the Internet, by means of deception, known as phishing, is considered a cyber crime.
False
Reason — Freeware is a type of software available free of cost, permitting copying and distribution but not modification, with its source code not available. On the other hand, free software, or open-source software, can be freely used, modified, improved, copied, and distributed without any payment required.
False
Reason — Making all posts public on social media can pose various risks. Therefore, we should be selective about who we authorize to access our information, limiting it to our known circle or people we trust.
False
Reason — Spyware is a software which is mostly installed on our computer without our consent, to spy on our activities and report this data to people willing to pay for it.
True
Reason — In phishing, an imposter uses an authentic-looking email or website to trick recipients into giving out sensitive transactional and identity information.
True
Reason — Keeping a computer protected involves using updated software, being cautious while handling emails and surfing the internet, regularly scanning the computer for malware or viruses, using strong passwords, and practicing safe browsing habits.