Important Questions For Board Examination
Class 12 Informatics Practices
Topic: Societal Impact
Code: 065
Hello students in this Article I am sharing very important question for class 12th Informatics practices with python Board examination. I am discussing SOCIETAL IMPACT Chapter. 10 Marks question will be asked from this chapter. In this article i am sharing some important question based on Societal Impact. This is part 1 second part will be coming soon.
What is intellectual property rights?
Intellectual property right are the rights of the owner of information to decide how much information is to be exchanged, shared or distribute. Also it gives the owner a right to decide the price for doing (exchanging/Sharing/distributing)
What is plagiarism?
Plagiarism is stealing someone else's intellectual work and representing it as your own work without citing the source of information.
What is digital property or digital asset?
Digital property refers to any information about you or created by you that exits in digital form, either online or on an electronic storage device.
What is openOffice.org?
It is an open source office applications suite compatible with a popular proprietary office application suite, Microsoft Office.
Compare open source software and proprietary software.
Open Source software can be freely used but it does not have to be free of charge.
Proprietary Software is the software that is neither open not freely available. Its source code is not available, further distribution and modification is either forbidden or requires special permission but the supplier or vendor.
Name two open source software alongwith their application.
- OpenOffice.org - Office application suite;
- Linux - operating system
Name two proprietary software along with their application.
- MS-Office - Office application suite
- MS-Windows - Operating system.
Name tow threats to digital properties.
- Digital software penetration tools
- Stealing and plagiarizing codes of digital properties.
What is IAD?
When a person can't find a balance between their time online and their time offline, it considerably affects their mental health, theirs condition is called internet addiction or Internet Addiction disorder(IAD)
Define Digital Foot Print
Digital Footprints are the records and traces of the online activities of a user, performed while suing Internet. Digital footprints are permanently stored.
Example of Digital Foot Print:
- Websites visited by you
- Facebook check-ins
- Using google map for a destination
What is cyber crime?
Any criminal offense that is facilitated by, or involves the use of, electronic communications or involves the use of electronics communications or information systems, including any electric devices, computer, or the internet is referred to as Cyber Crime.
What is Phishing?
Phishing is the practice of attempting to acquire sensitive information from individuals over the Internet, by means of deception, i.e. Through authentic looking links.
What is Scam?
Any fraudulent business practice that extracts money from an unsuspecting, ignorant person is called a SCAM.
What is online Identity Theft?
Online identity theft is the theft of personal information in order to commit fraud.
Mention at least three net etiquette.
- Refrain from personal abuse.
- Never spam.
- Always post correct content in respectful language.
Mention at least three email etiquette.
- Be concise and to the point.
- Use proper spelling, grammar and punctuation.
- Do not write in Capitals (Case Sensitivity)
What is copyright?
A copyright is a legal term to describe the rights of the creator of an original creative work such as literary work, an artistic work, a design, song, movies or software etc.
What is hacking?
Hacking refers to gaining unauthorized access to a network or computer or digital files, with an intention to steal or manipulate data r information or tho install malware.
What is cyber bullying?
Cyber bullying is a cyber crime that occurs when someone used the internet, a cell phone, email, instant messaging, chat rooms, or social networks, such as Facebook, Twitter etc, to harass, demean, embarrass, or intimidate someone else.
What is cyber stalking?
Cyber stalking is a cyber crime that involves online harassment wherein the victim is subjected to a barrage of online messages and emails.
What are some common threats (Offline and online) to data? Just mention the names.
Viruses, Worms, Trojans horses, Spyware, Adware, Spamming, Eavesdropping, hacking, Phishing etc.
What are computer viruses?
Computer viruses are malicious codes/programs that cause damage to data and files on a system, Computer viruses either corrupt the data or cause irregular functioning of the computer or both.
What is Worms?
A worm is self-replicating program which eats up the entire disk space or memory, A worm keeps on creating its copies until all the disk space or memory is filled.
What are Trojan horses?
A Trojan hours is a program that appears harmless but actually perform malicious function such as deleting or damaging files.
What is cookies?
A cookies or a web cookie a small piece of data sent from a website and stored in a user's web browser (in text file) while a user is browsing a website.
What is a firewall?
A firewall is a network security system, either hardware-or software-base, that controls incoming and outgoing network traffic based on a set of rules.
Type of Digital Foot Print
A passive
digital
footprint is created when data is collected without the owner knowing. A more
personal aspect of your passive digital footprint is your search history, which
is saved by some search engines while you are logged in.
Active digital footprints are
created when a user, for the purpose of sharing information about oneself by
means of websites or social media, deliberately. An "active digital
footprint" includes data that you intentionally submit online. Sending an
email contributes to your active digital footprint, since you expect the data
be seen and/or saved by another person. The more email you send, the more your
digital footprint grows.
What is Cyber Crime?
Cybercrime
is defined as “cybercrime (computer crime) is an illegal behavior, done through
electronic operations, that targets the security of computer systems and the
data processed by them”.
Define
Indian-IT Act, 2000
1. Information
technology act 2000/ITA-2000/IT act is an act of the Indian parliament notified
on 17 oct 2000.
2. This
primary law deals with cybercrimes and electronic commerce in India.
3. It
consists of 94 sections that are divided into 13 chapters and 4 schedules
4. A
person of others nationalities can also be indicated under the law if the crime
involves a computer or network located in India, which means the law applies to
the whole of India.
5. The
IT Act,2000 has provisions that permits the interception, monitoring of traffic
data.
HOW TO AVOID
PLAGIARISM?
Plagiarism
should be avoided by the following simple measures:
1. Use
your own ideas and words.
2. Always
provide a reference or give credit to the source from where you have received
information.
3. Cite
the name of the website, a URL or the name of authors, and acknowledge them if
you have used their work after rearranging the order of a sentence and changing
some of the work.
4. Take
the information in the form of bulleted notes in your words.
5. Use
online tools to check for plagiarism.
6. Develop
your writing skills.
Why E-Waste Hazards ?
Mostly all electronic
waste comprises of toxic chemicals such as lead, beryllium, mercury etc. Improper
disposing of gadgets and devices increases the amount of these toxic chemicals
thus contaminated the soil, causing air and water pollution.
The contaminated water
which is highly polluted it thus making it harmful for drinking purposes.
Improper e-waste
recycling, such as by open burning and acid baths creates hazardous and toxic
compounds like- dioxins, furans and acids. ⚫ Damage to the immune system
1. Skin disease.
2.
Multi
ailments.
3. Skin problems E-Waste Management
Need of E-Waste
Management ?
E-waste
management requires proper recycling and recovery of the disposed material. The
recycling and recovery process includes following steps
1. Dismantling:-
removal of parts containing valuable items such as- copper, silver, gold, steel
and removal of parts containing dangerous substance like- mercury, lead,
Beryllium etc.
2. Separation metal and
plastic
3. Refurbishment and
reuse:- it means used electrical and electronic items that
can be easily remodel to make it’s to reuse.
4. Recovery of valuable
materials
5. Disposal of
dangerous materials like- mercury, lead, Beryllium etc and
disposed off in underground landfill sites.
Awareness about health
concerns related to the use of Technology
1. Neck
strain
2. Vision
Problem
3. Sense
of isolation
4. Sleeping
disorder
5. Stress
6. Loss
of attention
7. Problem
in social relationships of individuals.
8. Computer
anxiety
9. Internet
addiction etc.
In order to avoid these
problems-
1. One
should learn how to use these technologies without experiencing any problem
rather than avoiding using them.
2. Some
of the users of computer technologies are not even aware of their
health-related problems that they have.
3. Some
of those who are aware of their illnesses see a doctor for various reasons.
Users of computer
0 Comments