0% found this document useful (0 votes)
29 views55 pages

IP Notes

Uploaded by

agam12993
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
29 views55 pages

IP Notes

Uploaded by

agam12993
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 55

What is digital footprint ?

Answer

Digital Footprints are the records and traces of individual's activities as they use the Internet.
Digital Footprints are permanently stored.

Question 2

What is IPR ?

Answer

Intellectual Property Rights (IPR) are the rights of the owner of information to decide how much
information is to be exchanged, shared or distributed. Also it gives the owner a right to decide
the price for doing (exchanging/sharing/distributing) so.

Question 3

What is plagiarism ?

Answer

Plagiarism is stealing someone else's intellectual work and representing it as our own work
without citing the source of information.

Question 4

What is FOSS ?

Answer

FOSS stands for Free and Open Source Software. It refers to software that is both free to use and
allows users to access its source code, modify it, and distribute it freely.

Question 5

How is freeware different from free software ?

Answer

The term freeware is generally used for software, which is available free of cost and which
allows copying and further distribution, but not modification and whose source code is not
available. The right to use the software is limited to certain types of users for instance, for private
and non-commercial purposes.
Free software means that the software is freely accessible and can be freely used, changed,
improved, copied and distributed by all who wish to do so. No payments are needed to be made
for free software.

Question 6

What are open source licenses ?

Answer

Open source licenses are licenses that comply with the Open Source Definition - in brief, they
allow software to be freely used, modified and shared.

Question 7

What is hacking and spoofing ?

Answer

Hacking refers to gaining unauthorized access to a network or computer or digital files, with an
intention to steal or manipulate data or information or to install malware.

Spoofing refers to as a fraudulent or malicious practice in which communication is sent from an


unknown source disguised as a trusted source known to the receiver.

Checkpoint 11.2

Question 1

How is e-waste disposed and recycled ?

Answer

The e-waste disposal and recycling process includes the following unit operations:

1. Dismantling — Removal of parts containing dangerous substances (CFCs, Hg switches,


PCB), removal of easily accessible parts containing valuable substances (cable containing
copper, steel, iron, precious, metal containing parts).

2. Segregation of ferrous metal, non-ferrous metal and plastic — This separation is


normally done in a shredder process.

3. Refurbishment and reuse — Refurbishment and reuse of e-waste has potential for those
used electrical and electronic equipments which can be easily refurbished to put to its
original use.
4. Recycling/recovery of valuable materials — Ferrous metals in electrical arc furnaces,
non-ferrous metals in smelting plants, precious metals in separating works.

5. Treatment/disposal of dangerous materials and waste — Shredder light fraction is


disposed off in landfill sites or sometimes incinerated (expensive), chlorofluoro-carbons
(CFCs) are treated thermally, Printed Circuit Board (PCB) is incinerated or disposed off
in underground storages, mercury (Hg) is often recycled or disposed off in underground
landfill sites.

Question 2

Both email attachments and downloaded files can spread malware.

(a) True

(b) False

Answer

True, both email attachments and downloaded files can spread malware.

Question 3

What is a firewall ?

(a) A wall that is reinforced and cannot catch on fire.

(b) A program that protects against viruses.

(c) A filter for an Internet connection that monitors outgoing and incoming activity.

Answer

A filter for an Internet connection that monitors outgoing and incoming activity.

Reason — A firewall is a network security system, either hardware or software-based, that


controls incoming and outgoing network traffic based on set of rules.

Question 4

A strong password should contain :

(a) Both uppercase and lowercase letters.

(b) A word that is easy to remember, such as the name of a pet.

(c) At least 8 characters, and a combination of letters, numbers, and characters.


Answer

At least 8 characters, and a combination of letters, numbers, and characters.

Reason — A strong password should be long and complex, making it difficult for attackers to
guess or crack. Including a mix of uppercase and lowercase letters, numbers, and special
characters enhances the password's strength by increasing the number of possible combinations.

Question 5

Which type of program can send out information about your web browsing activities or other
personal details ?

(a) Cookies

(b) Spam

(c) Spyware

(d) Trojan.

Answer

Spyware

Reason — Spyware is a software which is mostly installed on our computer without our consent,
to spy on our activities and report this data to people willing to pay for it.

Multiple Choice Questions

Question 1

............... operating system comes under FOSS.

1. Windows
2. Ubuntu
3. Mac
4. Oracle

Answer

Ubuntu

Reason — Ubuntu is an open-source operating system (OS) that falls under the category of Free
and Open Source Software (FOSS).
Question 2

............... is not a FOSS tool.

1. Libre Office
2. Mozilla Firefox
3. Google Chrome
4. Python

Answer

Google Chrome

Reason — Google Chrome is not a Free and Open Source Software (FOSS) tool. It is a web
browser developed by Google, which means its source code is not openly available for users to
view, modify, or distribute. In contrast, LibreOffice, Mozilla Firefox, and Python are all
examples of FOSS tools with open-source code that can be freely used, modified, and distributed
by anyone.

Question 3

A software that can be freely accessed and modified is called ............... .

1. Synchronous Software
2. Package Software
3. Open Source Software
4. Middleware

Answer

Open Source Software

Reason — Open Source Software (OSS), refers to software whose source code is available to
customers and it can be modified and redistributed without any limitation.

Question 4

Data which has no restriction of usage and is freely available to everyone under Intellectual
Property Rights is categorized as :

1. Open Source
2. Open Data
3. Open Content
4. Open Education
Answer

Open Data

Reason — Open Data refers to data that has no usage restrictions and is freely available to
everyone under Intellectual Property Rights.

Question 5

Technology not protected by copyright and available to everyone, is categorized as :

1. Proprietary
2. Open Source
3. Experimental
4. Shareware

Answer

Open Source

Reason — Technology that is not protected by copyright and is available to everyone is


categorized as Open Source.

Question 6

Which of the following is an advantage of 'open source' software ?

1. You can edit the source code to customize it.


2. You need to be an expert to edit code.
3. You have to pay.
4. Can sometimes be too generic for specialist purposes.

Answer

You can edit the source code to customize it.

Reason — The advantage of open-source software is that we can edit the source code to
customize it according to our needs or preferences.

Question 7

Which of the following is a disadvantage of 'open source' software ?

1. High quality software with lots of features


2. Not as customizable
3. May not have been tested as much as proprietary software, so might have bugs.
4. You can edit the source code to customize it

Answer

May not have been tested as much as proprietary software, so might have bugs.

Reason — The main disadvantage of open-source software is that it may not have been tested as
extensively as proprietary software, so it might have bugs.

Question 8

Which of the following is an advantage of 'proprietary' software ?

1. It is usually free.
2. Thoroughly tested because people are paying to use it.
3. Not as customizable
4. Can sometimes be too generic for specialist purposes

Answer

Thoroughly tested because people are paying to use it.

Reason — The advantage of proprietary software is that it is thoroughly tested because people
pay to use it.

Question 9

Which of the following is a disadvantage of 'proprietary' software ?

1. You need to be an expert to edit code.


2. You have to pay for this type of software.
3. It's licensed.
4. It is launched after proper testing.

Answer

You have to pay for this type of software.

Reason — The disadvantage of proprietary software is that users have to pay to access it.

Question 10

The generally recognized term for the government protection afforded to intellectual property
(written and electronic) is called ............... .
1. computer security law
2. aggregate information
3. copyright law
4. data security standards

Answer

copyright law

Reason — Copyright law is the generally recognized term for the government protection
afforded to intellectual property, including written and electronic works. It grants the creator of
original works exclusive rights to their use and distribution, protecting against unauthorized
copying or use by others.

Question 11

Which of the following would be a creative work protected by copyright ?

1. A list of all Indian President names


2. A portrait of your family
3. A song you wrote
4. The name of your pet dog

Answer

A song you wrote

Reason — A copyright is a legal term to describe the rights of the creator of an original creative
work such as a literary work, an artistic work, a design, song, movie or software etc. Hence, a
song written by us is a creative work that would be protected by copyright.

Question 12

Which of the following is not a type of cyber crime ?

1. Data theft
2. Forgery
3. Damage to data and systems
4. Installing antivirus for protection

Answer

Installing antivirus for protection


Reason — Installing antivirus is not a type of cyber crime because it is a defensive measure
taken by individuals or organizations to protect against cyber threats. Cyber crime refers to
criminal activities conducted using computers or the Internet, such as data theft, forgery,
hacking, phishing, and malware attacks.

Question 13

Out of the following, which crime(s) will come under cyber crime category ?

1. Identify theft
2. Invasion of privacy
3. Online harassment
4. All of the above

Answer

All of the above

Reason — The term cyber crime is a general term that covers crime like phishing, credit card
frauds, illegal downloading, industrial espionage, child pornography, cyber bullying, cyber
stalking, cyber terrorism, creation and/or distribution of viruses, spam and so on.

Question 14

Which of the following is not done by cyber criminals ?

1. Unauthorized account access


2. Mass attack using Trojans as botnets
3. Email spoofing and spamming
4. Report vulnerability in any system

Answer

Report vulnerability in any system

Reason — Cyber criminals don't report vulnerabilities because their intent is to exploit them for
personal gain. Reporting would alert system owners, leading to fixes and preventing the
criminals from benefiting from the weaknesses.

Question 15

What is the name of the IT law that India is having in the Indian legislature ?

1. India's Technology (IT) Act, 2000


2. India's Digital Information Technology (DIT) Act, 2000
3. India's Information Technology (IT) Act, 2000
4. The Technology Act, 2008

Answer

India's Information Technology (IT) Act, 2000

Reason — The name of the IT law in the Indian legislature is the Information Technology Act,
2000 (IT Act 2000).

Question 16

Primary law in India for matters related to e-commerce and cyber crime is :

1. IT Act 1995
2. IT Act 2000
3. IT Act 1998
4. IT Act 2010

Answer

IT Act 2000

Reason — The primary law in India for matters related to e-commerce and cyber crime is the
Information Technology Act, 2000 (IT Act 2000).

Question 17

What is meant by the term 'cyber-crime' ?

1. Any crime that uses computers to jeopardize or attempt to jeopardize national security
2. The use of computer networks to commit financial or identity fraud
3. The theft of digital information
4. Any crime that involves computers and networks

Answer

Any crime that involves computers and networks

Reason — Cyber crime is any criminal offense that is facilitated by, or involves the use of,
electronic communications or information systems, including any electronic device, computer, or
the Internet.

Question 18
Which of the following is a type of cyber crime where objectionable and demeaning comments
are posted on social media platform about a person, such that he/she is mentally harassed ?

1. Phishing
2. Hacking
3. Cyber bullying
4. Identity Theft

Answer

Cyber bullying

Reason — Cyber bullying involves posting objectionable and demeaning comments or messages
on social media platforms with the intent to harass or harm a person mentally or emotionally.

Question 19

What is an example of e-waste ?

1. a ripened banana
2. an old computer
3. old clothes
4. empty soda cans

Answer

an old computer

Reason — Electronic waste (e-waste) describes discarded electrical or electronic devices, such
as old computers, mobile phones, television sets etc.

Question 20

An organisation purchases new computers every year and dumps the old ones into the local
dumping yard. Write the name of the most appropriate category of waste that the organisation is
creating every year, out of the following options :

1. Solid Waste
2. Commercial Waste
3. E-Waste
4. Business Waste

Answer

E-Waste
Reason — The old computers being discarded by the organization fall under the category of
electronic waste (e-waste) since they are discarded electronic devices.

Question 21

E-waste is responsible for the degradation of our environment if not properly treated or disposed
of. Some of the feasible methods of e-waste management are reduce, ............... and recycle.

1. reuse
2. recheck
3. resubmit
4. regular

Answer

reuse

Reason — The feasible methods of e-waste management are reducing, reusing, reselling,
salvaging, recycling, and disposing.

Question 22

When e-waste such as electronic circuit boards are burnt for disposal, the elements contained in
them create a harmful chemical called ............... which causes skin diseases, allergies and an
increased risk of lung cancer.

1. Hydrogen
2. Beryllium
3. Chlorine
4. Oxygen

Answer

Beryllium

Reason — When electronic circuit boards containing beryllium are burnt for disposal, they
release beryllium oxide, a harmful chemical compound. Inhalation or skin contact with beryllium
oxide can lead to skin diseases, allergies, and an increased risk of lung cancer.

Question 23

A company buys old discarded laptops, smartphones, tablets etc. and extracts precious metals
from these and recycles these. What type of material is the company recycling ?

1. Business Waste
2. Commercial Waste
3. Solid Waste
4. E-Waste

Answer

E-Waste

Reason — The company is recycling electronic waste (e-waste) by extracting precious metals
from old laptops, smartphones, tablets, etc. E-waste refers to discarded electrical and electronic
devices that can be recycled to recover valuable materials such as metals, plastics, and glass.

Question 24

You were not able to create the IP project, therefore you downloaded a project from the internet
and submitted it to your teacher by your name. This wrong/unethical act is considered as
............... .

1. Copyright
2. Hacking
3. Plagiarism
4. Trademark

Answer

Plagiarism

Reason — Plagiarism is the act of stealing someone else's intellectual work and presenting it as
our own without citing the original source of information. In this case, submitting a downloaded
project from the Internet under my name is considered plagiarism, as it misrepresents the
originality and authorship of the work.

Question 25

The rights of the owner of information to decide how much information is to be


shared/exchanged/distributed, are collectively known as ............... (IPR).

1. Intelligent Property Rights


2. Intellectual Property Rights
3. Interactive Property Rights
4. Instance Property Rights

Answer

Intellectual Property Rights


Reason — Intellectual Property Rights (IPR) are the rights of the owner of information to decide
how much information is to be exchanged, shared or distributed.

Question 26

Ramandeep is a young woman with great aspirations and has a good team of like-minded people.
She along with her team members started a company to sell handicrafts online and also designed
a logo for their company. What type of intellectual property does this logo represent ?

1. Patents
2. Copyright
3. Design
4. Trademark

Answer

Trademark

Reason — A logo designed for a company represents a form of intellectual property known as a
trademark. A trademark is a word, phrase, symbol, sound, color and/or design that identifies and
distinguishes the products and goods of one party from those of others.

Question 27

Companies get their Trademark registered to project :

1. logos, names and brands


2. word, phrase, or symbol
3. slogans, stylized fonts, and colors
4. company furniture, worker, brands

Answer

word, phrase, or symbol

Reason — Companies register their trademarks to protect their words, phrases, and symbols
from unauthorized use by others.

Question 28

Rohit forgot his laptop in his car and when he came back he found his laptop was missing. That
act is :

1. Cyber crime
2. Phishing
3. Theft
4. Plagiarism

Answer

Theft

Reason — The act of someone taking Rohit's laptop without his permission or authorization
constitutes theft, as it involves the unlawful taking of someone else's property.

Question 29

The following is automatically granted to the creator or owner of any invention :

1. Parent
2. Copyright
3. Trademark
4. License

Answer

Copyright

Reason — A copyright is a collection of rights automatically vested to someone who has created
an original work.

Question 30

Himanshi sets up her own company to sell her own range of clothes on instagram. What type of
intellectual property can she use to show that the clothes are made by his company ?

1. Patents
2. Copyright
3. Design
4. Trademark

Answer

Trademark

Reason — Himanshi can use a trademark to indicate that the clothes are made by her company.
A trademark is used to distinguish and identify the products and goods of one company from
those of others.

Question 31
Stealing someone else's intellectual work and representing it as own, is called ............... .

1. Intellectual steal
2. Pluckism
3. Plagiarism
4. Pickism

Answer

Plagiarism

Reason — Plagiarism is stealing someone else's intellectual work and representing it as our own
work without citing the source of information.

Question 32

The information/art/work that exists in digital form is called ............... .

1. e-work
2. e-asset
3. digital property
4. e-property

Answer

digital property

Reason — Digital property or digital assets refers to any information about us or created by us
that exists in digital form, either online or an electronic storage device.

Question 33

The digital footprint that we leave online unintentionally is called

1. Active digital footprint


2. Passive digital footprint
3. True digital footprint
4. False digital footprint

Answer

Passive digital footprint

Reason — A passive digital footprint gets created through our data trail that we unintentionally
leave online.
Question 34

Every activity you perform on the Internet is saved for how long ?

1. one month
2. one year
3. as per my setting
4. forever

Answer

forever

Reason — Every activity we perform on the Internet is saved forever unless we have specific
settings or tools in place to delete or limit the retention of our data.

Question 35

The digital trail which gets created as a person's Internet usage using computers, smartphones,
gaming consoles etc. is called ............... .

1. Internet data
2. Internet trail
3. Digital footprint
4. e-footprint

Answer

Digital footprint

Reason — Digital footprints are the records and traces of individuals' activities as they use the
Internet on various devices such as computers, smartphones, gaming consoles etc.

Question 36

Gaining unauthorized access to a network or computer or digital files with malicious intentions,
is called ............... .

1. Cracking
2. Hacking
3. Banging
4. Phishing

Answer
Hacking

Reason — Hacking refers to gaining unauthorized access to a network or computer or digital


files, with an intention to steal or manipulate data or information or to install malware.

Question 37

Legal term to describe the rights of a creator of original creative or artistic work is called
............... .

1. Copyright
2. Copyleft
3. GPL
4. None of these

Answer

Copyright

Reason — A copyright is a legal term to describe the rights of the creator of an original creative
work such as a literary work, an artistic work, a design, song, movie or software etc.

Question 38

Copyright, Patent and Trademark comes under :

1. Intellectual Property Right


2. Individual Property Right
3. Industrial Property Right
4. None of the above

Answer

Intellectual Property Right

Reason — Copyright, patent, and trademark are all forms of intellectual property rights.

Question 39

Which attribute is not used with DataFrame ?

1. Size
2. Type
3. Empty
4. Columns
Answer

Type

Reason — The type attribute is not used with DataFrame.

Question 40

............... is a non-profit organization that aims to build a publicly accessible global platform
where a range of creative and academic work is shared freely.

1. Creative Cost
2. Critical Commons
3. Creative Commons
4. Creative Common

Answer

Creative Commons

Reason — Creative Commons is a non-profit organization that aims to build a publicly


accessible global platform where a range of creative and academic work is shared freely.

Question 41

GPL stands for :

1. Guided Public License


2. General Public License
3. Global Public License
4. General Public Letter

Answer

General Public License

Reason — GPL stands for General Public License.

Question 42

E-waste is becoming one of the fastest growing environmental hazards in the world today. If it is
not properly treated or disposed of it can cause serious health hazards, therefore the ............... has
issued a formal set of guidelines for proper handling and disposal of e-waste.

1. Central Pollution Control Board (CPCB)


2. Department of Information Technology (DIT)
3. Electrical and Electronic Equipment (EEE)
4. Information Communication Technology (ICT)

Answer

Central Pollution Control Board (CPCB)

Reason — The Central Pollution Control Board (CPCB) has issued formal guidelines for the
proper handling and disposal of e-waste to address the growing environmental hazards associated
with it.

Question 43

A worm is ...............

1. A slimy pink thing that lives in dirt.


2. Pieces of malicious code that make copies of themselves and spread through computers
without human interaction.
3. An unsolicited email message.

Answer

Pieces of malicious code that make copies of themselves and spread through computers without
human interaction.

Reason — A worm is a self-replicating program which eats up the entire disk space or memory.
A worm keeps on creating its copies until all the disk space or memory is filled.

Question 44

If you receive an email claiming to need your username and/or password, what should you do ?

1. Report it as phishing/spam through your email provider


2. Delete the message
3. Reply to the message with your email and password

Answer

Report it as phishing/spam through your email provider

Reason — If we receive an email asking for our username and/or password, we should report it
as phishing/spam through our email provider.

Question 45
What should your response be if you receive an email stating that you have won a lottery or
received some inheritance from an unknown person ?

1. Send them email asking for further procedure


2. Ignore it
3. Mark it as spam and block it

Answer

Mark it as spam and block it

Reason — Marking the email as spam and blocking the sender is the appropriate response when
we receive an email stating that we have won a lottery or received some inheritance from an
unknown person.

Question 46

A computer ............... is a malicious code which self-replicates by copying itself to other


programs.

1. program
2. virus
3. application
4. worm

Answer

worm

Reason — A computer worm is a type of malicious code that self-replicates by copying itself to
other programs, allowing it to spread throughout a computer system or network.

Question 47

Which of the following is a type of program that either pretends to have, or is described as
having, a set of useful or desirable features but actually contains a damaging code.

1. Trojans
2. Viruses
3. Worm
4. Adware

Answer

Trojans
Reason — A Trojan horse is a program that appears harmless but actually performs malicious
functions such as deleting or damaging files.

Question 48

Which of the following is the type of software that has self-replicating software that causes
damage to files and system ?

1. Trojans
2. Viruses
3. Worm
4. Adware

Answer

Worm

Reason — A worm is a self-replicating program and can cause damage to files and systems as it
spreads through networks or systems.

Question 49

Which of the following tracks your internet browsing habits and sends you popups containing
advertisements related to the sites and topics you've visited ?

1. Trojans
2. Viruses
3. Worm
4. Adware

Answer

Adware

Reason — Adware is the type of software that tracks our internet browsing habits and displays
pop-up advertisements related to the sites and topics we've visited.

Question 50

What is the broad term covering computer viruses, worms, trojan, adware, etc. ?

1. Malware
2. Spyware
3. Worm
4. Adware

Answer

Malware

Reason — Malware is a broad term covering computer viruses, worms, trojans, adware,
spyware, etc.

Question 51

The attack that focuses on capturing small packets from the network transmitted by other
computers and reading the data content in search of any type of information is ............... .

1. Phishing
2. Eavesdropping
3. Scams
4. PC intrusion

Answer

Eavesdropping

Reason — Eavesdropping is the attack that focuses on capturing small packets from the network
transmitted by other computers and reading the data content in search of any type of information.

Question 52

Which of the following is/are source of spreading viruses from one computer to another ?

1. Email
2. Infected data
3. Infected programs
4. All of these

Answer

All of these

Reason — The sources of spreading viruses from one computer to another include email,
infected data, and infected programs.

Question 53
............... are the attempts by individuals to obtain confidential information from you through an
original looking site and URL.

1. Phishing scams
2. Spoofing
3. Eavesdropping
4. Pharming

Answer

Phishing scams

Reason — Phishing scams involve attempts by individuals to obtain confidential information,


such as usernames, passwords, and credit card details, from us by using an original-looking site
and URL to deceive.

Question 54

............... is an attempt where a hacker tries to divert network traffic to a bogus site.

1. Phishing scams
2. Spoofing
3. Eavesdropping
4. Pharming attack

Answer

Pharming attack

Reason — Pharming attack is an attempt where a hacker tries to divert network traffic to a bogus
site without our knowledge or consent.

Question 55

A research student is expected to write a thesis on a topic. The student browses Internet for the
topic and luckily finds it on the Internet. He copies and submits the entire thesis as his own
research work. Which of the following activities appropriately categorises the act of the writer ?

1. Spamming
2. Phishing
3. Plagiarism
4. Trojan

Answer
Plagiarism

Reason — Plagiarism is the act of stealing someone else's intellectual work and presenting it as
our own without citing the original source of information. In this case, the student copied the
entire thesis from the internet and claimed it as his own research work, which is a case of
plagiarism.

Fill in the Blanks

Question 1

OSS stands for Open Source Software.

Question 2

Any fraudulent business practice that extracts money from an unsuspecting, ignorant person is
called a scam.

Question 3

Plagiarism is stealing someone else's intellectual work and representing it as your own without
giving credit.

Question 4

Any work/information that exists in digital form either on Internet or on an electronic device, is
known as digital property.

Question 5

Discarded electrical or electronic devices are known as e-waste.

Question 6

The least restrictive open source license is MIT license.

Question 7

The original code written by programmers for a software is known as source code.

Question 8

Freeware means no price is to be paid for the software.


Question 9

Free Software means freedom to use the software.

Question 10

IAD means Internet Addiction Disorder.

Question 11

The Digital Footprint is the digital trail of your activity on the Internet.

Question 12

The licenses are the permissions given to use a product or someone's creation by the copyright
holder.

Question 13

Copyleft is a license that gives rights opposite to copyright.

Question 14

The practice of taking someone else's work or ideas and passing them off as one's own is known
as Plagiarism.

Question 15

A Repetitive Strain Injury is an injury or disorder of the muscles, nerves, tendons, ligaments and
joints.

Question 16

Computer Vision Syndrome is a technology related health condition affecting eyesight.

Question 17

Malware is a general term used to refer to viruses, worms, spyware, adware etc.

Question 18

A worm is a self-replicating program which eats up the entire disk space or memory.

Question 19
Trojan horse is a program that appears harmless (such as a text editor or a utility program) but
actually performs malicious functions.

Question 20

Spyware is a software which is installed on your computer to spy on your activities and report
this data to people willing to pay for it.

Question 21

Spamming refers to the sending of bulk-mail by an identified or unidentified source.

Question 22

Unauthorised monitoring of other people's communications is called eavesdropping.

Question 23

A cookie is a small piece of data sent from a website and stored in a user's web browser (in a text
file) while a user is browsing a website.

Question 24

Firewall is a system designed to prevent unauthorized access to or from a private network.

Question 25

A mail or message sent to a large number of people indiscriminately without their consent is
called spam.

Question 26

Receiving irrelevant and unwanted emails repeatedly is an example of spam.

True/False Questions

Question 1

Open Source Software can be used for commercial purposes.

Answer

True
Reason — Open source software, being freely available and allowing modification and
redistribution without limitations, can be used for commercial purposes.

Question 2

It is okay to copy and paste information from the Internet into your report then organize it.

Answer

False

Reason — Copying and pasting information from the internet into our report without proper
citation or attribution is considered plagiarism.

Question 3

Shareware software allows you to try the software before you buy it.

Answer

True

Reason — Shareware software allows users to try the software before purchasing it.

Question 4

Freeware is copyrighted software that is freely available to use.

Answer

True

Reason — Freeware is copyrighted software that is available free of cost and allows copying and
further distribution, but not modification, and whose source code is not available.

Question 5

Cyber-laws are incorporated for punishing all types of criminals only.

Answer

False

Reason — Cyber law is a generic term which refers to all the legal and regulatory aspects of
Internet and the World Wide Web.

Question 6
Deceptively attempting to acquire sensitive information of someone else using online means, is a
cyber crime.

Answer

True

Reason — The practice of attempting to acquire sensitive information from individuals over the
Internet, by means of deception, known as phishing, is considered a cyber crime.

Question 7

Freeware and free software mean the same thing.

Answer

False

Reason — Freeware is a type of software available free of cost, permitting copying and
distribution but not modification, with its source code not available. On the other hand, free
software, or open-source software, can be freely used, modified, improved, copied, and
distributed without any payment required.

Question 8

Excessive use of Internet and social media is termed as a disorder.

Answer

True

Reason — Excessive use of the internet and social media can be considered a disorder, such as
internet addiction disorder.

Question 9

Digital footprint can be deleted.

Answer

False

Reason — Digital footprints are permanently stored.

Question 10

Digital footprint remains forever.


Answer

True

Reason — Once we post anything online, it stays forever and cannot be undone, and hence,
digital footprints remain forever.

Question 11

It is safe to make all one posts public on social media.

Answer

False

Reason — Making all posts public on social media can pose various risks. Therefore, we should
be selective about who we authorize to access our information, limiting it to our known circle or
people we trust.

Question 12

Hacking is performed to help find the security loopholes.

Answer

False

Reason — Hacking is performed to exploit computer/network security and employ techniques


like spoofing, phishing, social engineering, etc., to capture users personal or financial details.

Question 13

If you post something mean about someone, you can just delete it and your activity will be
undone.

Answer

False

Reason — No, deleting a post does not undo the activity because the post might already have
been seen, shared, or saved by others.

Question 14

Hacking is a cyber crime.

Answer
True

Reason — Hacking refers to gaining unauthorized access to a network, computer, or digital files
with the intention to steal or manipulate data or information or to install malware, making it a
form of cyber crime.

Question 15

Copyright is the right of the creator of creative/artistic work.

Answer

True

Reason — A copyright is the rights of the creator of an original creative work such as a literary
work, an artistic work, a design, song, movie or software etc.

Question 16

Computer viruses are healthy codes/programs written to test the security health of a system.

Answer

False

Reason — Computer viruses are malicious codes/programs that cause damage to data and files
on a system.

Question 17

A worm is a self-replicating program.

Answer

True

Reason — A worm is a self-replicating program which eats up the entire disk space or memory.

Question 18

A trojan horse is a utility program that does harm when its date gets expired.

Answer

False
Reason — A Trojan horse is a program that appears harmless but actually performs malicious
functions such as deleting or damaging files.

Question 19

Spyware is healthy software which keeps an eye on activities happening on your computer.

Answer

False

Reason — Spyware is a software which is mostly installed on our computer without our consent,
to spy on our activities and report this data to people willing to pay for it.

Question 20

Adware are the programs that deliver unwanted ads to your computer.

Answer

True

Reason — Adware are the programs that deliver unwanted ads to our computer.

Question 21

Malware is a special type of virus.

Answer

False

Reason — Malware is a general term used to refer to viruses, worms, spyware, adware etc. In
the other words, it is unwanted software that someone else wants to run on our computer.

Question 22

Spamming refers to the sending of bulk-mail by an identified or unidentified source.

Answer

True

Reason — Spamming refers to the sending of bulk-mail by an identified or unidentified source.

Question 23
Phishing involves authentic looking sites trying to collect your sensitive transactional and
identity information.

Answer

True

Reason — In phishing, an imposter uses an authentic-looking email or website to trick recipients


into giving out sensitive transactional and identity information.

Question 24

To keep a computer protected, one should use updated software, be cautious while handling
mails and surfing Internet, scanning computer regularly etc.

Answer

True

Reason — Keeping a computer protected involves using updated software, being cautious while
handling emails and surfing the internet, regularly scanning the computer for malware or viruses,
using strong passwords, and practicing safe browsing habits.

Question 25

Firewall can be implemented in software as well as in hardware.

Answer

True

Reason — A firewall is a network security system, which can be implemented in software as


well as in hardware, that controls incoming and outgoing network traffic based on a set of rules.

Assertions and Reasons

Question 1

Assertion. The trail of online activity is called Digital Footprint.

Reason. Digital footprints are the records of online activities of an individual.

1. Both A and R are true and R is the correct explanation of A.


2. Both A and R are true but R is not the correct explanation of A.
3. A is true but R is false.
4. A is false but R is true.
Answer

Both A and R are true and R is the correct explanation of A.

Explanation
The trail of online activity, known as a Digital Footprint, refers to the records and traces of an
individual's activities as they use the Internet.

Question 2

Assertion. Copyright, Patents and Trademarks are Intellectual Property Rights.

Reason. Intellectual Property Rights are the rights of the owner of information to decide how
and how much the creation can be used.

1. Both A and R are true and R is the correct explanation of A.


2. Both A and R are true but R is not the correct explanation of A.
3. A is true but R is false.
4. A is false but R is true.

Answer

Both A and R are true and R is the correct explanation of A.

Explanation
Intellectual Property Rights are the rights of the owner of information to decide how much
information is to be exchanged, shared, or distributed and the price of their intellectual property.
These rights also encompass the ability to protect one's creations through copyrights, patents, or
trademarks. Therefore, Copyrights, Patents, and Trademarks are examples of Intellectual
Property Rights.

Question 3

Assertion. The patents are available online.

Reason. Patents are the grant of exclusive right(s) of an invention.

1. Both A and R are true and R is the correct explanation of A.


2. Both A and R are true but R is not the correct explanation of A.
3. A is true but R is false.
4. A is false but R is true.

Answer

A is false but R is true.


Explanation
While some patent information may be available online, not all patents are publicly available
online. Patent applications and granted patents may contain confidential or proprietary
information, and therefore, may not be publicly disclosed. A patent is a grant of exclusive right
to the inventor by the government.

Question 4

Assertion. Anything available online does not mean it is free and freely available to use.

Reason. IPRs do not apply on the online content.

1. Both A and R are true and R is the correct explanation of A.


2. Both A and R are true but R is not the correct explanation of A.
3. A is true but R is false.
4. A is false but R is true.

Answer

A is true but R is false.

Explanation
Many online materials are protected by copyright laws, and using them without permission may
infringe on the rights of the copyright holder. Just because content is available online does not
mean it is free from copyright or other intellectual property rights (IPRs). Intellectual Property
Rights (IPRs) do apply to online content. Copyright, trademarks, patents, and other forms of
IPRs protect various types of content on the Internet, just as they protect content in the offline
world.

Question 5

Assertion. Plagiarism is an offense.

Reason. Stealing someone's work and showing it as own work is the violation of Intellectual
Property Rights.

1. Both A and R are true and R is the correct explanation of A.


2. Both A and R are true but R is not the correct explanation of A.
3. A is true but R is false.
4. A is false but R is true.

Answer

Both A and R are true and R is the correct explanation of A.


Explanation
Plagiarism is considered an offense because it is the act of stealing someone else's intellectual
work and presenting it as our own work without citing the source of information, which is a
violation of Intellectual Property Rights.

Question 6

Assertion. Open Source Software makes available the source code of the software.

Reason. Open source software and free software are the same.

1. Both A and R are true and R is the correct explanation of A.


2. Both A and R are true but R is not the correct explanation of A.
3. A is true but R is false.
4. A is false but R is true.

Answer

A is true but R is false.

Explanation
Open Source Software makes the source code of the software available to customers, and it can
be modified and redistributed without limitations. It may be available for free or for a nominal
charge. In contrast, free software is freely accessible and can be used, changed, improved,
copied, and distributed by anyone without any restrictions or payments. Therefore, open-source
software and free software are not the same.

Question 7

Assertion. Open Source Software and Freeware may come free of cost but they are not the same.

Reason. Open Source Software gives source code with freedom to-use while freeware comes at
free-of-cost.

1. Both A and R are true and R is the correct explanation of A.


2. Both A and R are true but R is not the correct explanation of A.
3. A is true but R is false.
4. A is false but R is true.

Answer

Both A and R are true and R is the correct explanation of A.

Explanation
Open Source Software and Freeware may come free of cost, but they are not the same. Open
Source Software is a software that is available free of cost to customers and can be modified and
redistributed without limitations. It makes the source code of the software available to customers.
On the other hand, Freeware is also available free of cost, but it does not allow modification of
the software and does not make the source code available to customers.

Question 8

Assertion. Freeware and Free software mean the same.

Reason. Free software may be chargeable.

1. Both A and R are true and R is the correct explanation of A.


2. Both A and R are true but R is not the correct explanation of A.
3. A is true but R is false.
4. A is false but R is true.

Answer

A is false but R is true.

Explanation
Freeware is software that is available free of cost and allows copying and further distribution, but
not modification, and whose source code is not available. Free software, on the other hand, is
freely accessible and can be used, changed, improved, copied, and distributed by anyone without
any restrictions or payments. While free software is often available at no cost, it's possible for
developers to charge for services, support, or proprietary features related to the software.

Question 9

Assertion. Freeware and free software are different.

Reason. Freeware means no cost for the software, while free software means source code
available with a freedom to use it.

1. Both A and R are true and R is the correct explanation of A.


2. Both A and R are true but R is not the correct explanation of A.
3. A is true but R is false.
4. A is false but R is true.

Answer

Both A and R are true and R is the correct explanation of A.

Explanation
Freeware is software that is available free of cost and allows copying and further distribution.
However, freeware does not allow modification, and its source code is not available. Free
software, on the other hand, is freely accessible and comes with source code available with a
freedom to use it, allowing users to use, change, improve, copy, and distribute the software
without any restrictions or payments.

Question 10

Assertion. Viruses, worms, trojans, adware, spyware are all Malware.

Reason. Malware is a general term to represent data threat software.

1. Both A and R are true and R is the correct explanation of A.


2. Both A and R are true but R is not the correct explanation of A.
3. A is true but R is false.
4. A is false but R is true.

Answer

Both A and R are true and R is the correct explanation of A.

Explanation
Malware is an umbrella term for any piece of software that has malicious intent. Viruses,
Worms, Trojans, Adware, Spyware are all types of malware.

Question 11

Assertion. Spyware are not harmful as they do not damage data.

Reason. Spyware track data about user and sell it to others hampering your data privacy.

1. Both A and R are true and R is the correct explanation of A.


2. Both A and R are true but R is not the correct explanation of A.
3. A is true but R is false.
4. A is false but R is true.

Answer

Both A and R are true and R is the correct explanation of A.

Explanation
Spyware are the software that stealthily attach with computer software such as a web browser
and stealthily collect information about user's activities such as passwords, pins, banking
information etc. Hence, spyware may not directly damage data, but they track data about user
and sell it to others hampering user's data privacy.

Question 12
Assertion. Phishing is fraudulently taking a user to an authentic looking site and stealing user
information.

Reason. Pharming is fraudulently redirecting a website's traffic to another to steal information.

1. Both A and R are true and R is the correct explanation of A.


2. Both A and R are true but R is not the correct explanation of A.
3. A is true but R is false.
4. A is false but R is true.

Answer

Both A and R are true but R is not the correct explanation of A.

Explanation
Phishing is the criminally fraudulent process of taking a user to an authentic looking site and
attempting to acquire sensitive information such as usernames, passwords, credit card
information etc. While pharming is fraudulently redirecting a website's traffic to bogus site
without user's knowledge or consent to steal information.

Question 13

Assertion. One should share information only on encrypted connections and protocols.

Reason. HTTPS is a protocol that ensures exchange of information in encrypted form.

1. Both A and R are true and R is the correct explanation of A.


2. Both A and R are true but R is not the correct explanation of A.
3. A is true but R is false.
4. A is false but R is true.

Answer

Both A and R are true and R is the correct explanation of A.

Explanation
One should share information only on encrypted connections and protocols to ensure the security
and confidentiality of data. This can be achieved using HTTPS (Hypertext Transfer Protocol
Secure), a protocol that provides end-to-end encryption, ensuring the secure exchange of
information.

Assignment

Question 1
The trail that is automatically created when a person uses the internet on any digital devices like
Laptops, smart phones, tablets etc. is called :

(a) Cyber bullying

(b) Phishing

(c) Digital Footprint

(d) Digital Activity

Answer

Digital Footprint

The trail of data that is automatically created when a person uses any digital device like laptops,
smartphones, tablets, etc., is called a digital footprint.

Question 2

What is digital footprint ?

Answer

Digital Footprints are the records and traces of individual's activities as they use the Internet.
Digital Footprints are permanently stored.

Question 3

Why is it so important to carefully think of digital footprint ?

Answer

It is important to think carefully of digital footprint because:

1. It gives us a digital persona by defining our online behavior.


2. The digital footprint is often used by universities before approving admissions to a
student.
3. The digital footprint is also used by future employers, and law enforcement offices, to
find people with positive and clean digital footprint.
4. The digital footprint should not provide personal information as it could be
misinterpreted or misused for theft or identity.

Question 4

What is intellectual property ? What do you understand by intellectual property rights ?


Answer

Any piece of information is produced or created with a lot of efforts and it consumes a lot of
time. Creative creations of mind such as patents, literary and creative arts, copyrights,
trademarks etc. are known as intellectual property.

Intellectual property rights are the rights of the owner of information to decide how much
information is to be exchanged, shared or distributed. Also it gives the owner a right to decide
the price for doing so.

Question 5

Explain plagiarism with an example.

Answer

Plagiarism is stealing someone else's intellectual work and representing it as our own work
without giving credit to creator or without citing the source of information.

For example, a student copies a paragraph from a website and includes it in his/her essay without
citing the source, it is considered as plagiarism.

Question 6

How can you avoid plagiarism while referring to someone's else's creation ?

Answer

To avoid plagiarism while referring to someone else's creation, we must give credit whenever we
use:

1. Another person's idea, opinion, or theory;


2. Quotations of another person's actual spoken or written words; or
3. Paraphrase of another person's spoken or written words

Question 7

What is digital property ?

Answer

Digital property (or digital assets) refers to any information about us or created by us that exists
in digital form, either online or on an electronic storage device.

Question 8
What are the threats to digital properties ?

Answer

The common threats to digital properties are as follows:

1. Digital software penetration tools — There are many software penetration tools such as
cracks and keygens which enable unauthorized users to freely access a software without
actually paying for it.
2. Stealing and plagiarizing codes of digital properties — Other developers may steal a
software's source code and use it to build their own versions of it, and then sell it under
their own company name.

Question 9

How can you protect your digital properties ?

Answer

The following ways to ensure protection of your digital properties:

1. Anti-Tamper Solutions — They use a host of advanced technologies to prevent hacking,


reverse-engineering or manipulating digital properties such as utility tools, software,
apps, video games and so forth.
2. Legal Clauses — There must be a transparent clause in the software's Terms of Service
that prohibits the scraping of the software's source code for reuse.
3. Limit the sharing of software code — One should share software code only with trusted
individuals who are part of development team. Digital Rights Management (DRM)
solution can protect a software from being scraped for source code using decompilers etc.

Question 10

Expand the terms :

1. OSI
2. FLOSS
3. FSF
4. GNU
5. GPL
6. W3C
7. OSS

Answer

1. OSI — Open Source Initiative.


2. FLOSS — Free Libre/Livre and Open Source Software.
3. FSF — Free Software Foundation.
4. GNU — GNU is Not Unix.
5. GPL — General Public License.
6. W3C — World Wide Web Consortium.
7. OSS — Open Source Software.

Question 11

What is open source software ? Write the names of any two software which can be categorized
as Open Source.

Answer

Open source software is the software, whose source code is freely available and which can be
copied, modified and redistributed without any limitation.

Two open-source softwares are Linux and Mozilla Firefox.

Question 12(i)

Compare and Contrast : Free software and Open source software.

Answer

Free software is the software which is free of cost, which can be copied, modified and
redistributed as well and whose source code is available. No charges are payable for free
software.

Open source software, on the other hand, is the software, whose source code is available and
which can be copied, modified and redistributed as well. There may or may not be charges
payable for open source software.

Question 12(ii)

Compare and Contrast : OSS and FLOSS.

Answer

OSS refers to Open Source Software whose source code is made available to the public, allowing
anyone to view, modify, and distribute the code. However, OSS does not necessarily mean that
the software is completely free of charge. It only means that the source code is available for
others to access and modify.

FLOSS refers to Free Libre/Livre and Open Source Software. The term FLOSS is used to refer
to a software which is both free software as well as open source software. In addition to being
Open Source, FLOSS also emphasises that no charges are applicable to the user for using and
distributing the software.

Question 12(iii)

Compare and Contrast : Proprietary software and Free software.

Answer

Proprietary software is the software that is neither open nor freely available. Its use is regulated
and further distribution and modification is either forbidden or requires special permission by the
supplier or vendor. Source code of proprietary software is normally not available. These
softwares need to be purchased before they can be used.

Free software means that the software is freely accessible and can be freely used, changed,
improved, copied and distributed by all who wish to do so. No payments are needed to be made
for free software.

Question 12(iv)

Compare and Contrast : Freeware and Shareware.

Answer

The term freeware is generally used for software, which is available free of cost and which
allows copying and further distribution, but not modification and whose source code is not
available. The right to use the software is limited to certain types of users for instance, for private
and non-commercial purposes.

Shareware is a software which is made available with the right to redistribute copies, but it is
stipulated that if one intends to use the software, often after a certain period of time then a
license fee should be paid. The source code of shareware is not available and modifications to
the software are not allowed.

Question 12(v)

Compare and Contrast : Freeware and Free software.

Answer

The term freeware is generally used for software, which is available free of cost and which
allows copying and further distribution, but not modification and whose source code is not
available. The right to use the software is limited to certain types of users for instance, for private
and non-commercial purposes.
Free software means that the software is freely accessible and can be freely used, changed,
improved, copied and distributed by all who wish to do so. No payments are needed to be made
for free software.

Question 13

Consider the following scenario and answer the questions which follow :

"A student is expected to write a research paper on a topic. The student had a friend who took a
similar class five years ago. The student asks his older friend for a copy of his paper and then
takes the paper and then submits the entire paper as his own research work".

(i) Which of the following activities appropriately categorizes the act of the writer ?

1. Plagiarism
2. Spamming
3. Virus
4. Phishing

(ii) Which kind of offense out of the following is made by the student ?

1. Cyber Crime
2. Civil Crime
3. Violation of Intellectual Property Rights

Answer

(i) Plagiarism

Reason — Submitting his friend's work as his own research work without proper attribution or
permission is considered plagiarism.

(ii) Violation of Intellectual Property Rights

Reason — Plagiarism is a violation of intellectual property rights, as it involves using another


person's intellectual creation without authorization or acknowledgment.

Question 14

Indian law to deal with cyber crime is :

1. Cyber Act (CA)


2. Internet Act (IA)
3. IT Act (ITA)
4. WWW Act (WWWA)
Answer

IT Act (ITA)

Reason — In India, cyber laws are enforced through Information Technology Act, 2000.

Question 15

E-waste is harmful to the environment and human health if not properly treated or disposed of,
therefore they must be handled with care. What are the health hazard which can be caused by E-
waste ?

1. Lung cancer
2. DNA damage
3. Brain damage
4. All of the above

Answer

All of the above

Reason — E-waste contains hazardous substances such as lead, mercury, cadmium, arsenic etc.
Improper handling or disposal of e-waste can release these toxic substances into the
environment, leading to various health hazards including lung cancer, DNA damage, and brain
damage.

Question 16

What is public domain software ? Name some common public domain software licenses.

Answer

Public-domain software is free and can be used without restrictions. It is, by its very nature,
outside the scope of copyright and licensing.

Some open source licenses are Creative Commons License, General Public License and Apache
License.

Question 17

What is GPL software license ? How is it different from LGPL software license ?

Answer

General Public License (GPL) grants and guarantees a wide range of rights to developers who
work on open-source projects. With GPL, users can do the following:
1. Copy the software as many times as needed.
2. Distribute the software in any way
3. Charge a fee to distribute the software after modifying it but the software should still be
under GNU GPL.
4. Make any type of modifications to the software

The LGPL and GPL licenses differ with one major exception. With LGPL the requirement that
you have to release software extensions in open GPL has been removed.

Question 18

These days it is equally important to safeguard digital properties :

(a) What are digital properties ?

(b) Why is above given statement/fact important ?

(c) What are possible threats to digital properties ?

(d) How can digital properties be safeguarded ?

Answer

(a) Digital property (or digital assets) refers to any information about us or created by us that
exists in digital form, either online or on an electronic storage device.

For example, any online personal accounts such as email, personal websites and blogs, domain
names registered in our name, intellectual properties etc.

(b) Digital property rights lie with the owner. Legally a person who has created it or the owner
who has got it developed by paying legally is the legal owner of a digital property. Only the
owner can use and decide who all and in what form can his/her digital asset may be used by
others, whether by making payments or by buying it or by obtaining its license or usage rights
etc. Thus, it is important to safeguard digital properties.

(c) The common threats to digital properties are as follows:

1. Digital software penetration tools — There are many software penetration tools such as
cracks and keygens which enable unauthorized users to freely access a software without
actually paying for it.
2. Stealing and plagiarizing codes of digital properties — Other developers may steal a
software's source code and use it to build their own versions of it, and then sell it under
their own company name.

(d) The following are the ways to ensure protection of digital properties:
1. Anti-Tamper Solutions — They use a host of advanced technologies to prevent hacking,
reverse-engineering or manipulating digital properties such as utility tools, software,
apps, video games and so forth.
2. Legal Clauses — There must be a transparent clause in the software's Terms of Service
that prohibits the scraping of the software's source code for reuse.
3. Limit the sharing of software code — One should share software code only with trusted
individuals who are part of development team. Digital Rights Management (DRM)
solution can protect a software from being scraped for source code using decompilers etc.

Question 19(i)

Define Phishing.

Answer

Phishing is the practice of attempting to acquire sensitive information from individuals over the
internet, by means of deception.

Question 19(ii)

Define Scam.

Answer

Any fraudulent business practice that extracts money from an unsuspecting, ignorant person is
called a scam.

Question 19(iii)

Define Hacking.

Answer

Hacking refers to gaining unauthorized access to a network or computer or digital files, with an
intention to steal or manipulate data or information or to install malware.

Question 19(iv)

Define Spoofing.

Answer

Spoofing refers to as a fraudulent or malicious practice in which communication is sent from an


unknown source disguised as a trusted source known to the receiver.

Question 20
What is cyber crime ? Give examples.

Answer

Cyber crime is any criminal offense that is facilitated by, or involves the use of, electronic
communications or information systems, including any electronic device, computer, or the
Internet.

Examples: Hacking, Spoofing, Phishing etc.

Question 21

Can you give an example of crime which is not cyber crime ?

Answer

A person breaks into a house and steals jewellery and cash. This crime involves the unlawful
taking of someone else's property and is not classified as a cyber crime.

Question 22

What is Internet addiction ? What are some symptoms of the Internet addiction ?

Answer

When a person can't find a balance between their time online and their time offline, it
considerably affects their mental health, this condition is called Internet addiction.

Symptoms of Internet addiction are as follows:

1. Excessive social networking


2. Playing online games
3. Excessive blogging
4. Compulsive online gambling
5. Excessive online Shopping
6. Compulsive watching of Internet videos and pornography

Question 23

What is cyber bullying ?

Answer

Harassing, demeaning, embarrassing, defaming or intimidating someone using modern


technologies like Internet, cell phones, instant messengers, social networks etc, is called Cyber
Bullying.
Question 24

What is copyright ?

Answer

A copyright is a legal term to describe the rights of the creator of an original creative work such
as a literary work, an artistic work, a design, song, movie or software etc.

Question 25

What are some types of software licenses ?

Answer

The types of software licenses are as follows:

1. GNU General Public License (GPL)


2. GNU Lesser General Public License (LGPL)
3. BSD License
4. MIT License
5. Apache License

Question 26(i)

What are some common net etiquettes ?

Answer

The list of net etiquettes are as follows:

1. Refrain from personal abuse.


2. Never spam.
3. Write clearly and concisely.
4. Always post correct content in respectful language.
5. In a discussion forum, stick to the topic.
6. Never expect other people to do our homework.
7. Do not post copyrighted material for which we do not own the rights.

Question 26(ii)

What do you understand by Net Etiquettes ? Explain any two such etiquettes.

Answer
Net Etiquettes refers to online manners while using Internet or working online. While online, we
should be courteous, truthful and respectful of others.

The two netiquettes are as follows:

1. Refrain from personal abuse — If we disagree to something, we may express robust


disagreement, but never call them names or threaten them with personal violence.

2. Never spam — We should not repeatedly post the same advertisement for products or
services.

Question 27

Nowadays all of us frequently use social media to connect with our friends. Give any two
netiquettes that we should follow while communicating on social media.

Answer

The two netiquettes that we should follow while communicating on social media are as follows:

1. Always post correct content in respectful language.


2. Do not post copyrighted material to which we do not own the rights.

Question 28

What is hacking ? Who is a hacker ?

Answer

Hacking refers to gaining unauthorized access to a network or computer or digital files, with an
intention to steal or manipulate data or information or to install malware.

A hacker is someone who gains unauthorized access to our network or computer or digital files,
with an intention to steal or manipulate data or information or to install malware.

Question 29

List any two health hazards related to excessive use of Technology.

Answer

The two health hazards related to excessive use of technology are as follows:

1. Repetitive Strain Injury (RSI) — It is an injury or disorder of the muscles, nerves,


tendons, ligaments and Joints.
2. Computer Vision Syndrome (CVS) — It is a technology related health condition
affecting eyesight.

Question 30

How does excessive use of technology impact the mental health of a user ?

Answer

Excessive use of technology leads to isolation, as people don't get time to physically socialize. It
sometimes also leads to anxiety and depression, as people often tend to think that their
"connections" have "perfect rosy lives" while they do not. Additionally, it can lead to Internet
addiction. People may obsessively look through emails and messages, feeling stressed if they
don't receive likes or replies on their posts, etc. This problem is formally termed Internet
addiction disorder.

Question 31

How does excessive use of technology impact the physical health of a user ?

Answer

Excessive use of technology can have several impacts on physical health:

1. Impact on Hearing — Listening to loud music for over 15 minutes can cause hearing
damage. Using headphones for long periods increases bacteria in the ears by over 700
times.

2. Impact on Bones and Joints — Technology affects posture due to prolonged sitting and
repetitive movements, leading to muscle and joint strain. Repetitive Strain Injuries (RSIs)
affect muscles, nerves, tendons, ligaments, and joints.

3. Eye Problems — Constant screen exposure from smartphones, laptops, and computers
can damage vision, especially due to blue light, leading to potential vision loss. Computer
Vision Syndrome (CVS) is a related eye condition.

4. Sleep Issues — Excessive device use disrupts sleep due to bright screen light suppressing
melatonin production. Poor sleep impacts cognitive function, memory, and attention
span.

Question 32

What is a virus ? What is anti-virus software ?

Answer
A virus is a malicious codes/programs that cause damage to data and files on a system. Viruses
can attack any part of a computer's software such as boot block, operating system, system areas,
files and application-program-macros etc.

Anti-virus software is designed to detect and block attacks from malware. This software when
loaded, resides in memory and checks every operation if it is malicious or not. If it finds any
suspicious activity, it blocks that operation and saves our computer.

Question 33

What is a computer virus ? How can it affect your computer ?

Answer

A computer virus is a computer program that can infect other computer programs by modifying
them in such a way as to include a copy of itself.

Viruses can alter, corrupt and delete files, freeze the computer, flash unknown or unasked
messages or display unwanted graphics on the computer screen, play unwanted music and
interfere with the computer operation.

Question 34

What type of damages can be caused by viruses to your computer ?

Answer

A virus can damage our computer in the following ways:

1. Some viruses may delete or damage random documents or specific files that are crucial to
the operating system.
2. Viruses can run in the background, without being seen, and may cause the computer to
run extremely slow.
3. Some forms of viruses may infect the email program and spread themselves to the
contacts in the address book.

Question 35

What are Malware ? What type of damages can they cause to your computer ?

Answer

Malware is a general term used to refer to viruses, worms, spyware, adware etc. It is unwanted
software that someone else wants to run on our computer. Malware infects our computer, making
it behave in a way, which we do not approve of.

Malware can damage our computer in the following ways:


1. Some viruses may delete or damage random documents or specific files that are crucial to
the operating system.
2. Viruses can run in the background, without being seen, and may cause our computer to
run extremely slow.
3. Some forms of viruses may infect the email program and spread themselves to the
contacts in the address book.
4. Spyware can monitor information about our computing habits which in the end can lead
to identity theft.
5. Some forms of spyware can also alter computer settings like our web browser home page
setting or the placement of our desktop icons.
6. Spyware can rob our PC or system speed and Internet access efficiency.
7. Adware tracks information about our data and computing habits to produce targeted
advertising, such as pop-up ads, on your computer screen.
8. When infected with adware, we will likely see frequent pop-up ads appear out of
nowhere.

Question 36

What is a Spam ? Why has it become a big Internet issue ?

Answer

Spam refers to electronic junk mail or junk newsgroup postings, as well as unsolicited, usually
commercial email sent to a large number of addresses.

Spam has become a significant Internet issue because:

1. It reduces productivity — The billions of spam messages circulating across the Internet
can disrupt email delivery, degrade system performance, and reduce overall productivity.

2. It consumes time — While deleting spam emails might seem like a simple solution, it
consumes a significant amount of time and hampers productivity.

3. It can lead to worse things — Spam messages may contain offensive or fraudulent
material and can even be used to spread viruses.

Question 37

What is phishing ?

Answer

Phishing is the act of illegally acquiring personal and sensitive information such as, online
banking details, credit card details, and other login details, of an individual by sending malicious
e-mails or by creating web pages that can collect this information as they appear to come from
very famous organizations.
Question 38

What is the significance of a firewall in a computer's security scheme ?

Answer

A firewall secures the computer such that only authentic users can connect to it. The significance
of firewall lies in its ability to monitor, filter, and control incoming and outgoing network traffic
based on predefined security rules. This helps prevent unauthorized access, data breaches, and
malicious attacks, such as viruses, malware, and hacking attempts, from reaching the protected
computer system.

You might also like