Loading...
Please wait while we prepare your content
Please wait while we prepare your content
Solutions for Informatics Practices, Class 12, CBSE
Assertion (A): The practice of taking someone else's work or ideas and passing them off as one's own is copyright infringement.
Reasoning (R): Copyright infringement includes the reproduction or distribution of a copyrighted work without permission.
Both A and R are true and R is the correct explanation of A.
Explanation
Copyright infringement involves using someone else's work without permission, including passing it off as one's own. This includes unauthorized actions like reproduction, distribution, display of the copyrighted work.
Assertion (A): Electronic records available on DigiLocker are considered legitimate.
Reasoning (R): Electronic records available on DigiLocker or mParivahan are deemed to be legally recognized at par with the original documents as per the provisions of the Information Technology Act, 2000.
Both A and R are true and R is the correct explanation of A.
Explanation
DigiLocker is a government-authorized digital storage service enabling users to store and access documents electronically. Documents on DigiLocker are considered legitimate and serve as proof of identity or address. The Information Technology Act, 2000, establishes the legal basis for recognizing electronic records as valid. According to the Act, records on platforms like DigiLocker or mParivahan are equivalent to original documents.
Assertion (A): Someone has created a fake social media profile in the name of Saket. Saket is a victim of cyberstalking.
Reasoning (R): Cyberstalking is a form of cybercrime.
Both A and R are true but R is not the correct explanation of A.
Explanation
Someone creating a fake social media profile in Saket's name exemplifies cyberstalking, which makes Saket a victim of cyberstalking. Cyberstalking is a form of cybercrime, which involves using technology to harass, intimidate, or stalk someone.
Assertion (A): Stealing money from someone's wallet is a type of cybercrime.
Reasoning (R): Cybercrime is a crime that involves a computer and a network.
A is false but R is true.
Explanation
Stealing money from someone's wallet would not be classified as a cybercrime, as it does not involve electronic devices or networks. Cybercrime is defined as a crime in which a computer is the target of crime (hacking, phishing, spamming) or is used as a tool to commit an offense.
Assertion (A): Rajat has stolen the content of a research paper and published it online. Rajat has committed cybercrime.
Reasoning (R): Plagiarism is an act of stealing someone's work and presenting it as one's own.
Both A and R are true and R is the correct explanation of A.
Explanation
Rajat has stolen content and published it, which constitutes plagiarism. Plagiarism involves taking someone else's work and presenting it as one's own, which is a form of intellectual property theft and can be considered a cybercrime, depending on the context. Therefore, both the assertion and the reasoning are true, and the reasoning correctly explains the assertion.
Assertion (A): The source code of GIMP software can be modified and shared as it is an open source software.
Reasoning (R): Open-source software is computer software that is released under a License in which the copyright holder grants users the rights to use, study, change and distribute the software and its source code.
Both A and R are true and R is the correct explanation of A.
Explanation
Open-source software, like GIMP, allows users to modify and share its source code as per the terms of its open-source license. Open source software is the software with source code that is publicly available under an open source license that gives users the right to study, change and distribute that software and emphasizes on security, cost-saving and transparency.
Assertion (A): Cyberbullying refers to an act of online harassment to someone by using online tools such as internet, email, instant messages, chat rooms, social networking sites, etc.
Reasoning (R): Cyberbullying is called harassing, demeaning, embarrassing, defaming or intimidating someone using modern technologies.
Both A and R are true and R is the correct explanation of A.
Explanation
Cyberbullying is the attack on an individual or group through the use of electronic means such as instant messaging, social media, email, chat rooms and other forms of online communication. Cyberbullying involves harassing, demeaning, embarrassing, defaming, or intimidating someone using modern technologies.
Assertion (A): Digital footprint is the trail of data we leave behind when we visit any website (or use any online application or portal) to fill in data or perform any transaction.
Reasoning (R): While online, all of us need to be aware of how to conduct ourselves, how best to relate with others and what ethics, morals and values to maintain.
Both A and R are true but R is not the correct explanation of A.
Explanation
A digital footprint refers to the data trail left behind when we interact with online platforms, including websites, applications, and portals. This can include data such as login credentials, search queries, browsing history, and more. It is essential to be mindful of our online behavior, including how we interact with others, and to maintain ethical standards, morals, and values while online.
Assertion (A): An internet troll is a person who deliberately sows discord on the internet by starting quarrels or upsetting people.
Reasoning (R): We can download and use any material available on the internet.
A is true but R is false.
Explanation
An internet troll is a person who intentionally tries to provoke or upset others online, often by posting inflammatory or off-topic comments. We cannot download and use any material available on the internet due to many restrictions, limitations, copyright laws, and privacy laws.
Assertion (A): Social media are websites or applications that enable their users to participate in social networking but they cannot create and share content with others in the community.
Reasoning (R): We should not waste precious time in responding to unnecessary emails or comments unless they have some relevance for us.
A is false but R is true.
Explanation
Social media are websites or applications that enable their users to participate in social networking and allow users to create and share content with others in the community. This is one of the primary functions of social media. We should not waste our precious time in responding to unnecessary emails or comments unless they have some relevance for us.
Assertion (A): Hacking is compromising security on digital devices.
Reasoning (R): Hacking involves stealing passwords and other digital information.
Both A and R are true and R is the correct explanation of A.
Explanation
Hacking is the process of gaining unauthorized access to a computing device or a group of computer systems for some illicit purpose. This is done through cracking passwords and codes which gives access to the systems.
Jeet has to prepare a project on 'Swachh Bharat Abhiyan'. He decides to gather information from the internet. He downloads three web pages (webpage 1, webpage 2, webpage 3) containing information on Swachh Bharat Mission. Which of the following steps taken by Jeet is/are an example of plagiarism or copyright infringement? Give justification in support of your answer.
(a) He read a paragraph on 'Swachh Bharat Abhiyan' from webpage 1 and rephrased it. He finally pasted the rephrased paragraph in his project.
(b) He downloaded three images of 'Swachh Bharat Abhiyan' from webpage 2. He made a collage for his project using these images.
(c) He downloaded 'Swachh Bharat Abhiyan' icon from webpage 3 and pasted it on the front page of his project report.
Jeet's actions in all three scenarios (a, b, and c) are examples of plagiarism or copyright infringement because he failed to properly cite or acknowledge the original sources. By rephrasing a paragraph from webpage 1 without credit, downloading and using images from webpage 2 without permission or attribution, and using the 'Swachh Bharat Abhiyan' icon from webpage 3 without permission or attribution, Jeet presented others work as his own, violating fundamental principles of academic integrity and copyright laws, and should have provided proper citations, credits, or acknowledgements to the original sources to avoid these infringements.
Angad receives an SMS, shown alongside, from his bank querying a recent transaction. Answer the following questions as to what he should do in such a situation:
(a) Should he SMS his pin number to the given contact number?
(b) Should he call the bank helpline number to recheck the validity of the SMS received?
(a) No, he should not SMS his PIN number to the given contact number. Sharing PIN numbers over SMS can lead to fraud and unauthorized access to his bank account, increasing the chance of his account being hacked, which can result in financial loss.
(b) Yes, he should call the bank helpline number to verify the validity of the SMS received. This ensures he is speaking directly to a legitimate bank representative and can confirm whether the transaction is genuine or if the SMS is a phishing attempt.
Munish has topped in all the subjects in his school exams. His father has gifted him a laptop. He would like to make Munish aware of the health hazards associated with inappropriate and excessive use of laptop. Help his father list the points which he should discuss with Munish.
Munish must be made aware of the following points regarding the pitfalls of excessive use of technology:
Physical Problems
Psychological Problems
Jayati Chatterjee is studying digital footprints. Help her clarify the concepts of digital footprints.
(i) Digital footprints are also known as:
(ii) Digital footprints are stored
(iii) Whenever we surf the internet using smartphones, we leave behind a trail of data reflecting the activities performed by us online, which is termed as ............... .
(iv) There are ............... kinds of digital footprints.
(v) Which is the correct type(s) of digital footprint?
(i) Digital tattoos
Reason — Digital footprints are referred to as "digital tattoos" because, just like tattoos, they can be permanent and leave a lasting impression.
(ii) Permanently
Reason — Digital footprints are stored permanently because they are recorded and stored on servers, databases, and other digital storage systems.
(iii) Digital Footprint
Reason — A digital footprint refers to the trail of data that we leave behind when we use the internet or digital devices. This can include our browsing history, search queries, social media activity, and other online actions.
(iv) 2
Reason — There are two main types of digital footprints: active digital footprints and passive digital footprints.
(v) Both (1) and (2)
Reason — The two types of digital footprints are active digital footprint and passive digital footprint.
Neetu has recently shifted to a new city and a new school. She does not know many people there. However, someone starts posting negative, demeaning comments on her social networking profile, school site's forum, etc.
She also starts getting repeated mails from unknown people. Every time she goes online, she finds someone chasing her online.
(i) What is all this happening to Neetu?
(ii) What action should be taken by her to stop all this?
(iii) The act of fraudulently acquiring someone's personal and private information, such as online account names, login information and passwords is called ............... .
(iv) Neetu needs to protect her personal information or data from unintentional and intentional attacks and disclosure which is termed as ............... .
(v) A set of moral principles that governs the behaviour of a group or individual and regulates the use of computers.
(i) Neetu has become a victim of cyber bullying and cyber stalking
Reason — Neetu is being targeted online with negative comments, repeated emails, and online harassment, which are all forms of cyberbullying and cyberstalking.
(ii) She must immediately bring all this to the notice of her parents and school authorities and also report this to the cybercrime wing of the local police with the help of her parents.
Reason — Neetu should inform her parents and school authorities about the online harassment and report it to the cybercrime wing of the local police to take legal action against the perpetrators.
(iii) Phishing
Reason — Phishing is an unlawful activity where fake websites or emails that look original or authentic are presented to the user to fraudulently collect sensitive and personal details, particularly usernames, passwords, banking and credit card details.
(iv) Privacy
Reason — Neetu needs to protect her personal information and data from unauthorized access, disclosure, or misuse, which is referred to as privacy. Privacy is the right to control one's personal information and data.
(v) Computer ethics
Reason — A set of moral principles that governs the behaviour of a group or individual and regulates the use of computers is called computer ethics.
Secure Sockets Layer Technology
Reason — Standard security protocol that establishes encrypted links between a web server and a browser is called Secure sockets layer technology.
Commercial value
Reason — Intellectual Property Rights (IPR) protect the use of information and ideas that are of commercial value. These rights ensure that creators can benefit financially from their work by preventing unauthorized use, reproduction, or distribution.
Unauthorized and illegal use of credit card
Reason — Unauthorized and illegal use of a credit card constitutes credit card fraud, as it involves making purchases or withdrawals without the cardholder's consent, resulting in financial loss and unauthorized transactions.
MySQL
Reason — MySQL is an open-source relational database management system, which means that its source code is freely available for modification and distribution.
A remixed song
Reason — A remixed song is a derivative work based on an existing song, not an original creation like a poem, painting, or trademark, hence, it is not considered intellectual property.
Digital Property
Reason — Online personal accounts and personal websites are examples of digital property because they represent assets or content owned and controlled by an individual in the digital space.
Spam
Reason — Unsolicited commercial email is known as spam. Spam refers to irrelevant or inappropriate messages sent over the internet to a large number of users, for the purposes of advertising, phishing, spreading malware, etc.
Installing antivirus for protection
Reason — Installing antivirus for protection is not a type of cyber crime. It is a security measure taken to protect against cyber threats.
Burn your e-waste
Reason — Burning e-waste is not a safe measure for recycling because it can release harmful chemicals and pollutants into the environment.
Cybercrime refers to any online illegal activity facilitated by the use of electronic communication devices like mobile phones, computers or through networks like the Internet. For example, cyberstalking, cyberbullying, cyberespionage, cyberwarfare, etc.
Cyber ethics refers to the moral principles and guidelines that govern the use of computers, the internet, and other digital technologies.
Cyber ethics are important because they:
Phishing is the act of illegally acquiring personal and sensitive information such as, online banking details, credit card details, and other login details, of an individual by sending malicious e-mails or by creating web pages that can collect this information as they appear to come from very famous organizations.
The Information Technology Act, 2000 (also known as IT Act) is an act of the Indian Parliament notified on 17 October, 2000. It is the primary law in India dealing with cybercrime and electronic commerce. The Act, amended in 2008, provides guidelines to the user on the processing, storage and transmission of sensitive information. It provides legal framework for electronic governance by giving recognition to electronic records and digital signatures. The Act outlines cyber crimes and penalties for them.
In India, the cyber laws are enforced through Information Technology Act, 2000 which was notified on 17 October, 2000. It's prime purpose was to provide legal recognition to electronic commerce and to facilitate filing of electronic records with the Government, i.e., to provide the legal infrastructure for e-commerce in India.
The Act was later amended in December 2008 through the IT (Amendment) Act, 2008. It provided additional focus on Information Security. It has added several new sections on offences including Cyber Terrorism and Data Protection. The Information Technology Amendment Act, 2008 (IT Act 2008) came into force from October 27, 2009 onwards. Major amendments of IT ACT (2008) included digital signatures, electronic governance, offences and penalties and amendments to other laws.
A major amendment was made in the IT Act in 2008 which came into force in October 2009. It introduced Section 66A which penalized sending of "offensive messages". It also introduced Section 69, which gave authorities the power of "interception or monitoring or decryption of any information through any computer resource". The amendments also contained penalties for child pornography, cyberterrorism and voyeurism.
People unknowingly commit cybercrime by:
Clicking on phishing emails or links
Using weak passwords
Downloading pirated software or content
Using public Wi-Fi or unsecured networks
Sharing personal information on social media
Not updating software or operating systems
Using infected devices or USB drives
Participating in online scams
Not using two-factor authentication
Lack of awareness about cyber laws
Using unauthorized or unlicensed software
Not reporting cyber incidents
How would you recognize if one of your friends is being cyberbullied?
(a) Cite the online activities which would help you detect that your friend is being cyberbullied.
(b) What are the provisions in the IT Act 2000 (amended in 2008) to tackle such a situation?
(a) Repeated posting of rumours, giving threats online, posting the victim's personal information, sexual harassment or comments aimed to publicly ridicule a victim are the online activities which would help to detect that my friend is cyber bullied.
(b) The IT Act 2000, amended in 2008, includes provisions against cyberbullying, such as Section 66A, which penalizes sending of offensive messages, and Section 67, which penalizes publishing or transmitting obscene material.
Copyright | Patent |
---|---|
A copyright is a collection of rights automatically vested to someone who has created an original work. | A patent is a grant of exclusive right to the inventor by the government. |
It protects original literary, dramatic, musical, and artistic works. | It protects novel, inventions, processes, and designs. |
The copyright owner has the authority to keep or to transfer the rights to use/distribute, individually to one or more people, or to transfer them collectively to one or more people. | Patents give the holder a right to exclude others from making, selling, using or importing a particular product or service, in exchange for full public disclosure of their invention. |
Plagiarism | Copyright infringement |
---|---|
Plagiarism is stealing someone else's intellectual work and representing it as our own work without citing the source of information. | Copyright infringement is the use or production of copyright protected material without the permission of the copyright holder. |
Plagiarism can be classified as accidental/unintentional or deliberate/intentional. | Copyright infringement is considered intentional. |
Ethical hacking | Non-ethical hacking |
---|---|
It is done on behalf of a company, which wants to find out the loopholes in the system in context to security. | It is done in order to harm or cause loss to an individual or a company. |
It is legal practice, authorized by the company or individual. | It is illegal practice and considered a crime. |
Such types of hackers are called white-hat hackers. | Such types of hackers are called black-hat hackers. |
They work with different government agencies and big tech companies. | They work for themselves for money. |
Active digital footprints | Passive digital footprints |
---|---|
An active digital footprints includes data that we intentionally submit online. | A passive digital footprints gets created through our data that we unintentionally leave online. |
Examples: Sending an email, sending messages online, posting a social media post, replying to post or commenting online etc. | Examples: When we visit a website, the web server may log our IP address, which identifies our internet service provider and our approximate location. |
Free software | Free and open source software |
---|---|
Free software means the software is freely accessible and can be freely used, changed, improved, copied and distributed by all who wish to do so. | A software which is free as well as open belongs to category FOSS (Free and open source software). |
Free software emphasizes the philosophical and ethical aspects of software freedom focusing on users' rights to control and modify the software they use. | Free and open source software emphasizes the practical benefits of transparency, collaboration, and the ability to modify and distribute software freely. |
Free software adheres to specific licenses like the GNU General Public License (GPL) that ensures users' freedoms. | This software can be released under various licenses, some of which are more permissive like BSD, MIT, Apache 2. |
To find pictures available in the free public domain, understand that public domain images are visual works not subject to copyright because their copyright has expired, was never applicable, or was abandoned by the owner.
To use public domain images in our project without copyright violations, verify the image's copyright status, and give credit to the image's author, title, source, date, and license (if applicable).
Describe why it is important to secure your wireless router at home. Search the internet for rules to create a reasonably secure password. Create an imaginary password for your home router. Will you share password for your home router with the following people? Justify your answer.
(a) Parents
(b) Friends
(c) Neighbours
(d) Home tutors
Securing our wireless router at home is essential to prevent unauthorized access, protect personal information, avoid malware and viruses, and ensure privacy.
The rules to create a secure password are as follows :
The imaginary password for home router can be Xc78dW34aa12!
.
We shall share the password with parents only as they are trusted family members who need access to the internet.
To avoid phishing, people should take the following precautions:
The procedure followed by the police to track/investigate cybercrime cases is as follows:
The precautions to be taken so that students do not indulge in cybercrime unknowingly are as follows:
E-waste, or electronic waste, refers to discarded electronic or electrical devices and components. This includes items like computers, mobile phones, televisions, refrigerators, and other electronic appliances that are no longer in use or have reached the end of their life cycle.
The various methods for effective e-waste management are as follows:
Dismantling — Removal of parts containing dangerous substances (CFCs, Hg switches, PCB), removal of easily accessible parts containing valuable substances (cable containing copper, steel, iron, parts containing precious metals).
Segregation of ferrous metal, non-ferrous metal and plastic — This separation is normally done in a shredder process.
Refurbishment and reuse — Refurbishment and reuse of e-waste has potential for those used electrical and electronic equipments which can be easily refurbished to put to its original use.
Recycling/recovery of valuable materials — Ferrous metals in electrical arc furnaces, non-ferrous metals in smelting plants, precious metals in separating works.
Treatment/disposal of dangerous materials and waste — Shredder light fraction is disposed off in landfill sites or sometimes incinerated (expensive), chlorofluoro-carbons (CFCs) are treated thermally, Printed Circuit Board (PCB) is incinerated or disposed off in underground storages, mercury (Hg) is often recycled or disposed off in underground landfill sites.
Proprietary License | Open Source License |
---|---|
A proprietary license is a type of software license that restricts the use, modification, and distribution of software. | An open source license is a type of software license that allows users to freely use, modify, and distribute software. |
The owner of the software, a company or individual, retains the intellectual property rights and controls how the software is used. | The source code is publicly available, and users have the freedom to modify and redistribute the software. |
It requires a license fee. | It is free of cost. |
Examples: Microsoft Windows, Adobe Photoshop. | Examples: Linux, Apache, Mozilla Firefox. |
The internet has revolutionized the way we live, work, and interact with each other.
Example of positive aspect of the internet's impact on daily life:
The internet has made it possible for people to access a vast amount of information and educational resources from anywhere in the world.
Example of negative aspect of the internet's impact on daily life:
The internet's constant availability and instant gratification can lead to social isolation and addiction. People spend more time interacting with their screens than with real-life friends and family, leading to feelings of loneliness and disconnection.
Emotional Symptoms of internet addiction:
Physical Symptoms of internet addiction:
True
Reason — Consumer consent is a fundamental aspect of privacy. It involves individuals having the ability to control and make informed decisions about how their personal information is collected, used, and shared.
True
Reason — Intellectual property rights are the rights of the owner of information to decide how much information is to be exchanged, shared or distributed. Also it gives the owner a right to decide the price for doing so.
False
Reason — Biometric data is unique to each individual and is used for identification and authentication purposes. Once biometric data is collected and stored in a database, it cannot be updated or changed, as it is a permanent characteristic of the individual.
False
Reason — Freeware is software that is available at no cost, but the user may not have the freedom to modify, distribute, or study the software. The source code may not be available, and the user may be restricted from making changes to the software. On the other hand, free software is software that gives users the freedom to run, study, share, and modify the software. The source code is available, and users are allowed to make changes and distribute the software. Hence, both are different.
True
Reason — Emails or advertisements claiming that we have won something are usually phishing scams, designed to trick into revealing sensitive information, such as passwords, credit card numbers, or social security numbers. They may also attempt to install malware on our device or steal our identity.