0% found this document useful (0 votes)
26 views25 pages

Revision Content - Societal Impacts and Modules

Uploaded by

slaygirl337
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
26 views25 pages

Revision Content - Societal Impacts and Modules

Uploaded by

slaygirl337
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 25

Revision

Q.1 State whether True or False:


i. A copyright is automatically granted to authors or creators of content. _________
True
ii. In FOSS source code is usually hidden from the users. _______________
FOSS- Free and Open Source Software
False

Q.2 To prevent unauthorized access to and / or from the network, a system known as
____________, can be implemented by hardware and / or software.
Firewall

Q.3 The practice of taking someone else's work or ideas and passing them off as one's own is
known as _____________
Plagarism

Q.4 I can keep you signed in.


I can remember your site preferences.
I can give you locally relevant content.
Who am I ?
Cookies

Q.5 Which amongst the following is not an example of browser ?


a. Chrome b. Firefox c. Avast d. Edge
Avast

Q.6 A mail or message sent to a large number of people indiscriminately without their consent is
called____________
Spam
Q.7 Expand the following:
1. IPR: Intellectual Property Rights
2. FOSS: Free and open source software
3. GPL: General Public License
4. CC: Creative commons License
5. EULA: End User License Agreement
6. FLOSS: Free Libre/Livre and Open Source Software
(Libre: A Spanish word, Livre: A Portuguese word) both means freedom.
7. OSS: Open Source Software
8. E-waste: Electronic Waste

What is digital footprint? Write about the types of digital footprint.


The trail of data we leave behind that reflects the activities performed by us online is known as our
digital footprint.
There are two kinds of digital footprints:
Active digital footprints: which includes data that we intentionally submit online. This would
include emails we write, or responses or posts we make on different websites or mobile Apps, etc.
Passive digital footprints: The digital data trail we leave online unintentionally. This includes the
data generated when we visit a website, use a mobile App, browse Internet, etc.

Netizen:
Anyone who uses digital technology along with Internet is a digital citizen or a netizen. Being a
good netizen means practicing safe, ethical and legal use of digital technology. A responsible
netizen must abide by net etiquettes, communication etiquettes and social media etiquettes.

What do you understand by Net Etiquettes? Explain any two such netiquettes.
Net Etiquettes refers to the proper manners and behaviour we need to exhibit while being online.
These include :
1. No copyright violation: we should not use copyrighted materials without the permission of the
creator or owner. We should give proper credit to owners/creators of open source content when
using them.
2. Avoid cyber bullying: Avoid any insulting, degrading or intimidating online behaviour like
repeated posting of rumours, giving threats online, posting the victim’s personal information
etc.icule a victim.
Etc.

E-waste:
Whenever an electronic device covers up its working life, or becomes non- usable due to
technological advancements or becomes non-functional, it is not used anymore and comes under
the category of e-waste or electronic waste. As the technology is changing day by day, more and
more electronic devices are becoming non-functional and turning into e-waste. Managing
such non-functional electronic devices is termed as e-waste management.

Examples: TVs, computer monitors, printers, scanners, keyboards, mice, cables, mobile phones
etc.

E-waste is made up of deadly chemicals such as lead, cadmium, beryllium, mercury and
brominated flame retardants. Disposing of gadgets and devices improperly increases the
chances of these dangerous chemicals contaminating the soil, polluting the air and leaching
into water bodies.

And causes water, air and soil pollution.


According to a survey, one of the major asian country generates approximately about 2 million
tonnes of electronic waste per year. Only 1.5 % of the total e-waste gets recycled. Suggest methods
to manage e-waste (e-waste disposal techniques).
 Give Your Electronic Waste to a Certified E-Waste Recycler.
 Donating Your Outdated Technology.
 Give Back to Your Electronic Companies and Drop Off Points.
 Buy environmentally friendly electronics
 Donate used electronics to social programs
 Reuse, refurbish electronics

** Make sure to format your electronic devices before disposing them.

As a citizen of India, What advise you should give to others for e-waste disposal?
Ans. As a citizen of India, We can advise the following principle of waste management: Reduce,
Reuse and Recycle. (1 mark for correct answer)

Health hazards related to excessive use of Technology


The continuous use of devices like smartphones, computer desktop, laptops, head phones etc.
cause a lot of health hazards if not addressed.
These are:
i. Impact on bones and joints: wrong posture or long hours of sitting in an uncomfortable
position can cause muscle or bone injury.
ii. Impact on hearing: using headphones or earphones for a prolonged time and on high volume
can cause hearing problems and in severe cases hearing impairments.
iii. Impact on eyes: This is the most common form of health hazard as prolonged hours of screen
time can lead to extreme strain in the eyes.
iv. Sleep problem: Bright light from computer devices block a hormone called melatonin which
helps us sleep. Thus we can experience sleep disorders leading to short sleep cycles.

Ergonomics is a branch of science that deals with designing or arranging workplaces including
the furniture, equipments and systems so that it becomes safe and comfortable for the user.
Ergonomics helps us in reducing the strain on our bodies — including the fatigue and injuries due
to prolonged use.
Intellectual Property refers to the inventions, literary and artistic expressions, designs and
symbols, names and logos. The ownership of such concepts lies with the creator, or the holder of
the intellectual property. This enables the creator or copyright owner to earn recognition or
financial benefit by using their creation or invention. Intellectual Property is legally protected
through copyrights, patents, trademarks, etc.

Trademark:
Trademark includes any visual symbol, word, name, design, slogan, label, etc., that distinguishes
the brand or commercial enterprise, from other brands or commercial enterprises. For example, no
company other than Nike can use the Nike brand to sell shoes or clothes. It also prevents others
from using a confusingly similar mark, including words or phrases.

Violation of IPR may happen in one of the following ways:


Plagiarism
Copyright Infringement
Trademark Infringement

Differentiate between:

a) Copyrights and Patents


Copyright grants legal rights to creators for their original works like writing, photograph, audio
recordings, video, sculptures, and architectural works. Copyrights are automatically granted to
creators and authors.
A patent is usually granted for inventions. Unlike copyright, the inventor needs to apply (file) for
patenting the invention. When a patent is granted, the owner gets an exclusive right to prevent
others from using, selling, or distributing the protected invention.

b) Plagiarism and Copyright infringement


Plagiarism means to copy some contents from Internet, but do not mention the source or the
original creator.
Copyright infringement is when we use other person’s work without obtaining their permission
to use or we have not paid for it, if it is being sold.

The practice of taking someone else's work or ideas and passing them off as one's own is known
as Plagarism.

It is an internet service for sending written messages electronically from one computer to
another. Write the service name. 1
Ans. e-mail (1 mark for correct answer)
What is an open source software? Write the names of any 2 softwares which can be categorized
as Open Source.
Ans. It is a software with source code that anyone can inspect, modify and enhance, Examples:
Mozilla’s Firefox Web Browser
Python Programming Language
Linux Operating System
LibreOffice
Apache HTTP Web Server
Mysql Database Management System
Etc.

Free and Free and Open Source Software

Free software – Those software for which there is no license fee and can be downloaded, shared
without any restrictions but their source code is not available are called Free Software.

Free and Open Source Software: Free and Open Source Software (FOSS) allow users to not only
access but also to modify (or improve) them as Source Code is also available.

Gender and Disability issues while Teaching and Using Computers

Gender issues
It has been commonly observed that girls are underrepresented in Computer Science Studies be
it computer science major subject at high school or at college level. There are far less girls than
boys in computer science section.

The factors behind this are:

Preconceived notions

Notions like boys are better at technical things, girls are good at humanities, arts etc.; girls must
take up a career keeping in mind that they have to raise a family; Teaching is the best option for
girls as it gives you half day off and ample number of holidays so that you can take care of your
family; have their impact on decision making of girls while taking up subjects. Also parents play
a major role while deciding the subjects.

Lack of interest
During primitive years children often play games on the computers and smart phones. Most of the
games are boys centric that increase the interest of boys in computers.

Lack of motivation

Girls are pressurized to choose a career option which will give them work life balance because
they have to play an important family role in future. This theory discourages girls from taking up
technical subjects like computer science.

Lack of role models

Girls these days see less role models in the field of computer science. In every field such as movies,
advertisements, scientists etc we see more men than women. All these things influence girl’s sub-
psychology and they infer that computer science is for boys and not to take that subject.

Lack of encouragement in class

As there are lesser number of girls in a class, the teachers for most work – assignments end
choosing more boys. Also some teachers pin point on their roles in the society. All this may play
as hindrance and girls do not develop interest in Computer Science.

Disability Issues

Various disability issues faced in learning computers are:

Unavailability of teaching material / aids

Students with different disabilities need different types of teaching aids/ material. For instance
visually challenged students would want that there screen readers that could read the digital content
to them, hearing impaired students would want lore of visual input than oratory, low vision
students may need Braille keyboards, braille monitors and printers along with screen readers for
working on computers. Unavailability of such supportive programming aids and software are a big
issue that must be handled by the school and the management.

Lack of special needs teachers

For different types of special needs, students require special needs teachers. For example: a hearing
impaired student needs a teacher who is able to converse in sign language and would be able to
convey and explain study material. There should be teachers who know what type of hardware and
software tool can be used for the differently able students as per their specific needs. For example
braille keyboards, monitors and printers, synthetic speech generators etc, software assistants like
Google assistant, Microsoft Narrator and Cortana, specialized editors for visually impaired
students for typing programs etc.
Lack of supporting curriculum

Curriculum should be designed while keeping focus on inclusive education. Software’s and
programs should be so used so that disabled students can easily work on that. For example office
software based curriculum can be easily implemented as it provides accessibility features and all
types of students an easily work on it.

Nalini received a mail form IRS department (as shown above). On clicking “ ClickHere” , she was
taken to a site designed to imitate an official-looking website, such as IRS.gov. She uploaded some
important information on it.
Identify and explain the cyber crime being discussed in the above scenario.
Ans. It is an example of phishing. Phishing is a term used to describe a malicious individual or
group of individuals who scam users. They do so by sending e-mails or creating web pages that
are designed to collect an individual's online bank, credit card, or other login information.

Safely Accessing Websites


While accessing any website we should always be aware it’s safe and it does not contain any
harmful content in like virus and other malicious things always try to access websites which has
https:// in it rather http:// here “s” means secure. Let’s see some of the possible network security
threats (that has potential to cause serious harm to computer system) which you might get while
accessing websites.
Malware:

Malware (short for “malicious software”) is a file or code, typically delivered over a network, that
infects, explores, steals or conducts virtually any behavior an attacker wants. Malware usually has
one of the following objectives:

 Provide remote control for an attacker to use an infected machine.


 Send spam from the infected machine to unsuspecting targets.
 Investigate the infected user’s local network.
 Steal sensitive data.

Virus:
A virus is a self-replicating malicious piece of code that attaches itself to other host programs and
gain control over the system without the owner's knowledge. The virus gets executed each time
the host program is executed and requires human interaction to propagate. They could produce
annoying effects like changing desktop, adding silly icons etc. They can spread through external
media such as CDs, browsing infected internet sites and from email attachments.

Trojan
A Trojan is a malware, that looks like a legitimate software and once it tricks a user into installing
it, it acts pretty much like a virus or worm. However, a Trojan does not self-replicate or infect
other files, it spreads through user interaction such as opening an email attachment or downloading
and executing a file from the Internet. Some Trojans create backdoors to give malicious users
access to the system.
Adware is unwanted software designed to throw advertisements up on your screen.”
Or
Adware. Adware (short for advertising-supported software) is a type of malware that
automatically delivers advertisements. Common examples of adware include pop-up ads on
websites and advertisements that are displayed by software. Often time’s software and applications
offer “free” versions that come bundled with adware.

Cyber crime
Cybercrime is defined as a crime in which computer is the medium of crime (hacking, phishing,
spamming), or the computer is used as a tool to commit crimes (extortion, data breaches, theft).
Cybercrimes are carried out against either an individual, or a group, or an organization or even
against a country, with the intent to directly or indirectly cause physical harm, financial loss or
mental harassment.
Hacking
Hacking is the act of unauthorized access to a computer, computer network or any digital system.
Hackers usually have technical expertise of the hardware and software. They look for bugs to
exploit and break into the system.
Hacking, when done with a positive intent, is called ethical hacking. Such ethical hackers are
known as white hat hackers. They are specialists in exploring any vulnerability or loophole during
testing of the software. Thus, they help in improving the security of a software. An ethical hacker
may exploit a website in order to discover its security loopholes or vulnerabilities. He then reports
his findings to the website owner. Thus, ethical hacking is actually preparing the owner against
any cyber-attack.
A non-ethical hacker is the one who tries to gain unauthorized access to computers or networks
in order to steal sensitive data with the intent to damage or bring down systems. They are called
black hat hackers or crackers. Their primary focus is on security cracking and data stealing.
They use their skill for illegal or malicious purposes. Such hackers try to break through system
securities for identity theft, monetary gain, to bring a competitor or rival site down, to leak sensitive
information, etc.
Phishing and Fraud Emails
Phishing is an unlawful activity where fake websites or emails that look original or authentic are
presented to the user to fraudulently collect sensitive and personal details, particularly usernames,
passwords, banking and credit card details. The most common phishing method is through email
spoofing where a fake or forged email address is used and the user presumes it to be from an
authentic source. So you might get an email from an address that looks similar to your bank or
educational institution, asking for your information, but if you look carefully you will see their
URL address is fake. They will often use logo’s of the original, making them difficult to detect
from the real! Phishing attempts through phone calls or text messages are also common these days.
(A) Identity Theft
Identity thieves increasingly use personal information stolen from computers or computer
networks, to commit fraud by using the data gained unlawfully. A user’s identifiable personal data
like demographic details, email ID, banking credentials, passport, PAN, Aadhaar number and
various such personal data are stolen and misused by the hacker on behalf of the victim. This is
one type of phishing attack where the intention is largely for monetary gain. There can be many
ways in which the criminal takes advantage of an individual’s stolen identity. Given below are a
few examples:
• Financial identity theft: when the stolen identity is used for financial gain.
• Criminal identity theft: criminals use a victim’s stolen identity to avoid detection of their true
identity.
• Medical identity theft: criminals can seek medical drugs or treatment using a stolen identity.

What is Identity Theft?


Identity theft occurs when someone uses another person’s personal identifying information and
pretends to be that person in order to commit fraud or to gain other financial benefits.

What can be done to reduce the risk of identity theft? Write any two ways.
Ans. 1. Don't Give out Personal Information to anyone
2. Don't Carry Your Social Security Card.

Ransomware
This is another kind of cyber-crime where the attacker gains access to the computer and blocks the
user from accessing, usually by encrypting the data. The attacker blackmails the victim to pay for
getting access to the data, or sometimes threaten to publish personal and sensitive information or
photographs unless a ransom is paid.
Ransomware can get downloaded when the users visit any malicious or unsecure websites or
download software from doubtful repositories. Some ransomware are sent as email attachments in
spam mails. It can also reach our system when we click on a malicious advertisement on the
Internet.

Eavesdropping
An eavesdropping attack occurs when a hacker intercepts, deletes, or modifies data that is
transmitted between two devices. Eavesdropping, also known as sniffing or snooping, relies on
unsecured network communications to access data in transit between devices.
Combatting and Preventing Cyber Crime
Or
Write safety measures that can reduce the risk of cybercrime.
The challenges of cyber-crime can be mitigated with the twin approach of being alert and taking
legal help. Following points can be considered as safety measures to reduce the risk of cyber-
crime:
• Take regular backup of important data
• Use an antivirus software and keep it updated always
• Avoid installing pirated software. Always download software from known and secure (HTTPS)
sites
• Always update the system software which include the Internet browser and other application
software
• Do not visit or download anything from untrusted websites
• Usually the browser alerts users about doubtful websites whose security certificate could not be
verified; avoid visiting such sites
• Use strong password for web login, and change it periodically. Do not use same password for
all the websites. Use different combinations of alphanumeric characters including special
characters. Ignore common words or names in password
• While using someone else’s computer, don’t allow browser to save password or auto fill data,
and try to browse in your private browser window
• For an unknown site, do not agree to use cookies when asked for, through a Yes/No option.
• Perform online transaction like shopping, ticketing, and other such services only through well-
known and secure sites
• Always secure wireless network at home with strong password and regularly change it.

Cyber safety
Cyber safety is trying to be safe on the internet and is the knowledge of maximizing the user's
personal safety and security risks to private information and property associated with using the
internet, and the self-protection from computer crime in general.
Safely browsing the web:
Protecting yourself by securing your devices, software and connections is important, but making
the right choices when doing things on the web can make a huge difference to your safety online.
There are potential risks involved in doing things online, but by making smart choices you can
reduce that risk. By using a combination of preventative measures and making good choices
online you can stay safe when browsing the web.

 Before you start – Update your software:


 Protect your web browser
 Use safe behaviour:
 Use strong unique passwords online.
 Only download files and applications from websites that you trust, such as from
 official app stores or legitimate organisations, such as your bank.
 Pause and think carefully before clicking on links in email, messages or on social
 networking sites. Don’t click on links in messages if you don’t know the sender or
if the message is unexpected.
 If you think a link looks suspicious or you can’t tell where it leads to, before you
click hover over that link to see the actual web address it will take you to (usually
shown at the bottom of the browser window). If you do not recognize or trust the
address, try searching for relevant key terms in a web browser. This way you can
find the article, video, or webpage without directly clicking on the suspicious link.
 Expand shortened URLS to check if they are safe. Short URLs are often used in
social media. There are a number of services that create short links - such as goo.gl,
bit.ly, tinyurl.com, ow.ly and youtu.be. To check if these links are safe you can use
an ‘expand link’ facility to get the original URL from a shortened link without
having to click through to the destination. Look for a short URL expander that is
recommended by your anti-virus software or a reputable software company.
 Be wary of offers that seem too good to be true. Leave websites that ask for your
personal or banking details in return for money – these are scams.
 Don’t agree to friend requests from people you don’t know on social media
networks -people are not always who they say they are.

Identity protection: Your personal identity is important as it defines who you are. Your identity
includes your personal information; information such as name, address, contact information, bank
account, credit card numbers, and social security numbers should all be kept private.

Confidentiality: It ensures that only authorized users get access to sensitive and protected data.

Cyber Trolling: Trolling is internet slang for a person who intentionally starts arguments or
upsets others by posting inflammatory remarks. The sole purpose of trolling is angering people.
It has been compared to flaming in cyber bullying. Plus, many people who troll think what they
do is an "art". They frequently hide behind a cloak of anonymity. The symbol for trolling is a
black and white drawing of a face with a mischievous grin, which is symbolic of the expression
someone is making while trolling victims.
Purpose of trolling is to be a source of entertainment for the troller, To be offensive and
argumentative, To derive pleasure from annoying the hell out of others, To scour the internet for
bait (a.k.a. you), To get attention, To feel powerful, To gain recognition, To upset the victim
Cyber bullying: Cyber bullying is deliberate and repeated harm inflicted through using the
Internet, interactive and digital technologies, or mobile phones.
Purpose:
To get revenge
To feel empowered
To gain popularity
To harass and threaten
To be offensive
To humiliate
To upset the victim
Modules:
What is a module? What are the advantages of using a module?

Types of modules:
Built-in Module: available in Python (math, random, statistics)
User-defined Module
Importing module using import statement and using from statement

import statement
When we use import statement, all the defined functions and variables created in the module are
now available to the program that imported it. To call a function of a module, the function name
should be preceded with the name of the module with a dot(.) as a separator.
Syntax:
import modulename1 [,modulename2, …]
Example:
import math
print(math.sin(3.14))

from statement can be used to access only the required functions from a module. It loads only
the specified function(s) instead of all the functions in a module. To use the function when
imported using "from statement" we do not need to precede it with the module name.
Synatx:
from <module_name> import <function_name(s)>
Example:
from math import sin
print(sin(3.14))

from <module_name> import *


When we use from <module_name> import * , all the functions of a specific module are
imported to the program. No prefix is required to use them.
from math import *
print(sin(3.14))
print(cos(3.14))

Python math Module


Python has a built-in module that you can use for mathematical tasks.
The math module has a set of methods/functions and constants.
1. ceil(x): Returns the smallest integer that is greater than or equal to x.
Example:
>>> import math
>>> math.ceil(3.4)
4
>>> math.ceil(3.5)
4

2. floor(x): returns the largest integer that is less than or equal to x.


Example:
>>> math.floor(2.3)
2
>>> math.floor(2.0)
2

3. pow(x,y):It returns the value x to the power y.


Example:
>>> math.pow(2,3)
8.0
>>> math.pow(3,3)
27.0

4. fabs(x): It returns the absolute value (positive value) of the expression/number.


Example:
>>> math.fabs(-15)
15.0
>>> math.fabs(3-7)
4.0
abs(x)- returns absolute value(built-in function/method of Python).
Example:
abs(-15)
15

5. sqrt(x): It returns the square root of x.


Example:
>>> math.sqrt(65)
8.06225774829855
>>> math.sqrt(16)
4.0

# WAP to display the square root of a number using math module using import statement.
import math
num=int(input('Enter a number:'))
sq_root=math.sqrt(num)
print('Square root of',num,'is:',sq_root)

# WAP to display x raise to y using math module using import statement.

import math
x=int(input('Enter the value for x:'))
y=int(input('Enter the value for y:'))
p=math.pow(x,y)
print('Power of',x,'raise to', y,':',p)

# WAP to display x raise to y and square root using math module and from statement.
from math import *
x=int(input('Enter the value for x:'))
y=int(input('Enter the value for y:'))
p=pow(x,y)
print('Power of',x,'raise to', y,':',p)
num=int(input('Enter a number:'))
sq_root=sqrt(num)
print('Square root of',num,'is:',sq_root)

6. sin(x): It returns the sine of x in radians.


Example:
>>> import math
>>> math.sin(3)
0.1411200080598672
>>> math.sin(-3)
-0.1411200080598672
>>> math.sin(0)
0.0

7. cos(x): It returns the cosine of x in radians.


>>> import math
>>> math.cos(3)
-0.9899924966004454
>>> math.cos(-3)
-0.9899924966004454
>>> math.cos(0)
1.0

8. tan(x): It returns the tangent of x in radians.


>>> math.tan(3)
-0.1425465430742778
>>> math.tan(-3)
0.1425465430742778
>>> math.tan(0)
0.0

Constants of math module:


1. e: Python math.e constant
To print euler's number.
>>> import math
>>> math.e
2.718281828459045

2. pi: Python math.pi constant


To print the value of pi.
>>> import math
>>> math.pi
3.141592653589793
>>> math.cos(math.pi)
-1.0

random module
It is used to generate random numbers.
Use of random numbers:
1. Lottery scratch cards
2. Computer games
3. Shuffling of cards
4. Recaptcha
Methods/Functions of random module
1. randrange()
It generates an integer between its lower(inclusive) and upper argument(excluded). By default,
the lower argument is 0.

Syntax:
random.randrange(start,stop,step)

start-optional (default=0)
stop-required
step-optional (default=1)

>>> import random


>>> random.randrange(3,9)
8
>>> random.randrange(3,9)
5
>>> random.randrange(3,9)
7

2. random()
This function generates a random number from 0(inclusive) to 1(excluded), such as
0.5642434435.
This function generates random number in floating point values.
It takes no parameters.

Example:
>>> import random # using import statement
>>> random.random()
0.23833104958243945
>>> random.random()
0.3286292161197556

>>> from random import random # using from statement


>>> random()
0.38273819239798457
3. randint()
It generates a random number between lower limit(inclusive) and upper limit(inclusive).
It takes two parameters.
a<=N<=b,
where a is lower limit
b is upper limit
N is random number

Example:
>>> import random
>>> random.randint(3,8)
4
>>> random.randint(3,8)
3
>>> random.randint(3,8)
5

statistics module
It provides functions for calculating mathematical statistics of numeric data.

mean()
median()
mode()
1. mean() - It calculates the arithmetic mean of the numbers in a list.

Example:
>>> import statistics
>>> statistics.mean([4,6,7,8,10,45])
13.333333333333334
>>> L=[1,2,3,4,5]
>>> statistics.mean(L)
3

2. median() - It returns the middle value of numeric data in a list.

** If the dataset has an even number of values, it averages the two middle elemnets.

Example:
>>> import statistics
>>> statistics.mean([4,6,7,8,10,45])
13.333333333333334
>>> L=[1,2,3,4,5]
>>> statistics.mean(L)
3

3. mode()- It returns the most repeated value of the list.


Example:
>>> import statistics
>>> statistics.mode([1,2,3,1,2,4,2,5,2])
2
>>> statistics.mode(['a','b','a','c','a'])
'a'

You might also like