IP Notes
IP Notes
Answer
Digital Footprints are the records and traces of individual's activities as they use the Internet.
Digital Footprints are permanently stored.
Question 2
What is IPR ?
Answer
Intellectual Property Rights (IPR) are the rights of the owner of information to decide how much
information is to be exchanged, shared or distributed. Also it gives the owner a right to decide
the price for doing (exchanging/sharing/distributing) so.
Question 3
What is plagiarism ?
Answer
Plagiarism is stealing someone else's intellectual work and representing it as our own work
without citing the source of information.
Question 4
What is FOSS ?
Answer
FOSS stands for Free and Open Source Software. It refers to software that is both free to use and
allows users to access its source code, modify it, and distribute it freely.
Question 5
Answer
The term freeware is generally used for software, which is available free of cost and which
allows copying and further distribution, but not modification and whose source code is not
available. The right to use the software is limited to certain types of users for instance, for private
and non-commercial purposes.
Free software means that the software is freely accessible and can be freely used, changed,
improved, copied and distributed by all who wish to do so. No payments are needed to be made
for free software.
Question 6
Answer
Open source licenses are licenses that comply with the Open Source Definition - in brief, they
allow software to be freely used, modified and shared.
Question 7
Answer
Hacking refers to gaining unauthorized access to a network or computer or digital files, with an
intention to steal or manipulate data or information or to install malware.
Checkpoint 11.2
Question 1
Answer
The e-waste disposal and recycling process includes the following unit operations:
3. Refurbishment and reuse — Refurbishment and reuse of e-waste has potential for those
used electrical and electronic equipments which can be easily refurbished to put to its
original use.
4. Recycling/recovery of valuable materials — Ferrous metals in electrical arc furnaces,
non-ferrous metals in smelting plants, precious metals in separating works.
Question 2
(a) True
(b) False
Answer
True, both email attachments and downloaded files can spread malware.
Question 3
What is a firewall ?
(c) A filter for an Internet connection that monitors outgoing and incoming activity.
Answer
A filter for an Internet connection that monitors outgoing and incoming activity.
Question 4
Reason — A strong password should be long and complex, making it difficult for attackers to
guess or crack. Including a mix of uppercase and lowercase letters, numbers, and special
characters enhances the password's strength by increasing the number of possible combinations.
Question 5
Which type of program can send out information about your web browsing activities or other
personal details ?
(a) Cookies
(b) Spam
(c) Spyware
(d) Trojan.
Answer
Spyware
Reason — Spyware is a software which is mostly installed on our computer without our consent,
to spy on our activities and report this data to people willing to pay for it.
Question 1
1. Windows
2. Ubuntu
3. Mac
4. Oracle
Answer
Ubuntu
Reason — Ubuntu is an open-source operating system (OS) that falls under the category of Free
and Open Source Software (FOSS).
Question 2
1. Libre Office
2. Mozilla Firefox
3. Google Chrome
4. Python
Answer
Google Chrome
Reason — Google Chrome is not a Free and Open Source Software (FOSS) tool. It is a web
browser developed by Google, which means its source code is not openly available for users to
view, modify, or distribute. In contrast, LibreOffice, Mozilla Firefox, and Python are all
examples of FOSS tools with open-source code that can be freely used, modified, and distributed
by anyone.
Question 3
1. Synchronous Software
2. Package Software
3. Open Source Software
4. Middleware
Answer
Reason — Open Source Software (OSS), refers to software whose source code is available to
customers and it can be modified and redistributed without any limitation.
Question 4
Data which has no restriction of usage and is freely available to everyone under Intellectual
Property Rights is categorized as :
1. Open Source
2. Open Data
3. Open Content
4. Open Education
Answer
Open Data
Reason — Open Data refers to data that has no usage restrictions and is freely available to
everyone under Intellectual Property Rights.
Question 5
1. Proprietary
2. Open Source
3. Experimental
4. Shareware
Answer
Open Source
Question 6
Answer
Reason — The advantage of open-source software is that we can edit the source code to
customize it according to our needs or preferences.
Question 7
Answer
May not have been tested as much as proprietary software, so might have bugs.
Reason — The main disadvantage of open-source software is that it may not have been tested as
extensively as proprietary software, so it might have bugs.
Question 8
1. It is usually free.
2. Thoroughly tested because people are paying to use it.
3. Not as customizable
4. Can sometimes be too generic for specialist purposes
Answer
Reason — The advantage of proprietary software is that it is thoroughly tested because people
pay to use it.
Question 9
Answer
Reason — The disadvantage of proprietary software is that users have to pay to access it.
Question 10
The generally recognized term for the government protection afforded to intellectual property
(written and electronic) is called ............... .
1. computer security law
2. aggregate information
3. copyright law
4. data security standards
Answer
copyright law
Reason — Copyright law is the generally recognized term for the government protection
afforded to intellectual property, including written and electronic works. It grants the creator of
original works exclusive rights to their use and distribution, protecting against unauthorized
copying or use by others.
Question 11
Answer
Reason — A copyright is a legal term to describe the rights of the creator of an original creative
work such as a literary work, an artistic work, a design, song, movie or software etc. Hence, a
song written by us is a creative work that would be protected by copyright.
Question 12
1. Data theft
2. Forgery
3. Damage to data and systems
4. Installing antivirus for protection
Answer
Question 13
Out of the following, which crime(s) will come under cyber crime category ?
1. Identify theft
2. Invasion of privacy
3. Online harassment
4. All of the above
Answer
Reason — The term cyber crime is a general term that covers crime like phishing, credit card
frauds, illegal downloading, industrial espionage, child pornography, cyber bullying, cyber
stalking, cyber terrorism, creation and/or distribution of viruses, spam and so on.
Question 14
Answer
Reason — Cyber criminals don't report vulnerabilities because their intent is to exploit them for
personal gain. Reporting would alert system owners, leading to fixes and preventing the
criminals from benefiting from the weaknesses.
Question 15
What is the name of the IT law that India is having in the Indian legislature ?
Answer
Reason — The name of the IT law in the Indian legislature is the Information Technology Act,
2000 (IT Act 2000).
Question 16
Primary law in India for matters related to e-commerce and cyber crime is :
1. IT Act 1995
2. IT Act 2000
3. IT Act 1998
4. IT Act 2010
Answer
IT Act 2000
Reason — The primary law in India for matters related to e-commerce and cyber crime is the
Information Technology Act, 2000 (IT Act 2000).
Question 17
1. Any crime that uses computers to jeopardize or attempt to jeopardize national security
2. The use of computer networks to commit financial or identity fraud
3. The theft of digital information
4. Any crime that involves computers and networks
Answer
Reason — Cyber crime is any criminal offense that is facilitated by, or involves the use of,
electronic communications or information systems, including any electronic device, computer, or
the Internet.
Question 18
Which of the following is a type of cyber crime where objectionable and demeaning comments
are posted on social media platform about a person, such that he/she is mentally harassed ?
1. Phishing
2. Hacking
3. Cyber bullying
4. Identity Theft
Answer
Cyber bullying
Reason — Cyber bullying involves posting objectionable and demeaning comments or messages
on social media platforms with the intent to harass or harm a person mentally or emotionally.
Question 19
1. a ripened banana
2. an old computer
3. old clothes
4. empty soda cans
Answer
an old computer
Reason — Electronic waste (e-waste) describes discarded electrical or electronic devices, such
as old computers, mobile phones, television sets etc.
Question 20
An organisation purchases new computers every year and dumps the old ones into the local
dumping yard. Write the name of the most appropriate category of waste that the organisation is
creating every year, out of the following options :
1. Solid Waste
2. Commercial Waste
3. E-Waste
4. Business Waste
Answer
E-Waste
Reason — The old computers being discarded by the organization fall under the category of
electronic waste (e-waste) since they are discarded electronic devices.
Question 21
E-waste is responsible for the degradation of our environment if not properly treated or disposed
of. Some of the feasible methods of e-waste management are reduce, ............... and recycle.
1. reuse
2. recheck
3. resubmit
4. regular
Answer
reuse
Reason — The feasible methods of e-waste management are reducing, reusing, reselling,
salvaging, recycling, and disposing.
Question 22
When e-waste such as electronic circuit boards are burnt for disposal, the elements contained in
them create a harmful chemical called ............... which causes skin diseases, allergies and an
increased risk of lung cancer.
1. Hydrogen
2. Beryllium
3. Chlorine
4. Oxygen
Answer
Beryllium
Reason — When electronic circuit boards containing beryllium are burnt for disposal, they
release beryllium oxide, a harmful chemical compound. Inhalation or skin contact with beryllium
oxide can lead to skin diseases, allergies, and an increased risk of lung cancer.
Question 23
A company buys old discarded laptops, smartphones, tablets etc. and extracts precious metals
from these and recycles these. What type of material is the company recycling ?
1. Business Waste
2. Commercial Waste
3. Solid Waste
4. E-Waste
Answer
E-Waste
Reason — The company is recycling electronic waste (e-waste) by extracting precious metals
from old laptops, smartphones, tablets, etc. E-waste refers to discarded electrical and electronic
devices that can be recycled to recover valuable materials such as metals, plastics, and glass.
Question 24
You were not able to create the IP project, therefore you downloaded a project from the internet
and submitted it to your teacher by your name. This wrong/unethical act is considered as
............... .
1. Copyright
2. Hacking
3. Plagiarism
4. Trademark
Answer
Plagiarism
Reason — Plagiarism is the act of stealing someone else's intellectual work and presenting it as
our own without citing the original source of information. In this case, submitting a downloaded
project from the Internet under my name is considered plagiarism, as it misrepresents the
originality and authorship of the work.
Question 25
Answer
Question 26
Ramandeep is a young woman with great aspirations and has a good team of like-minded people.
She along with her team members started a company to sell handicrafts online and also designed
a logo for their company. What type of intellectual property does this logo represent ?
1. Patents
2. Copyright
3. Design
4. Trademark
Answer
Trademark
Reason — A logo designed for a company represents a form of intellectual property known as a
trademark. A trademark is a word, phrase, symbol, sound, color and/or design that identifies and
distinguishes the products and goods of one party from those of others.
Question 27
Answer
Reason — Companies register their trademarks to protect their words, phrases, and symbols
from unauthorized use by others.
Question 28
Rohit forgot his laptop in his car and when he came back he found his laptop was missing. That
act is :
1. Cyber crime
2. Phishing
3. Theft
4. Plagiarism
Answer
Theft
Reason — The act of someone taking Rohit's laptop without his permission or authorization
constitutes theft, as it involves the unlawful taking of someone else's property.
Question 29
1. Parent
2. Copyright
3. Trademark
4. License
Answer
Copyright
Reason — A copyright is a collection of rights automatically vested to someone who has created
an original work.
Question 30
Himanshi sets up her own company to sell her own range of clothes on instagram. What type of
intellectual property can she use to show that the clothes are made by his company ?
1. Patents
2. Copyright
3. Design
4. Trademark
Answer
Trademark
Reason — Himanshi can use a trademark to indicate that the clothes are made by her company.
A trademark is used to distinguish and identify the products and goods of one company from
those of others.
Question 31
Stealing someone else's intellectual work and representing it as own, is called ............... .
1. Intellectual steal
2. Pluckism
3. Plagiarism
4. Pickism
Answer
Plagiarism
Reason — Plagiarism is stealing someone else's intellectual work and representing it as our own
work without citing the source of information.
Question 32
1. e-work
2. e-asset
3. digital property
4. e-property
Answer
digital property
Reason — Digital property or digital assets refers to any information about us or created by us
that exists in digital form, either online or an electronic storage device.
Question 33
Answer
Reason — A passive digital footprint gets created through our data trail that we unintentionally
leave online.
Question 34
Every activity you perform on the Internet is saved for how long ?
1. one month
2. one year
3. as per my setting
4. forever
Answer
forever
Reason — Every activity we perform on the Internet is saved forever unless we have specific
settings or tools in place to delete or limit the retention of our data.
Question 35
The digital trail which gets created as a person's Internet usage using computers, smartphones,
gaming consoles etc. is called ............... .
1. Internet data
2. Internet trail
3. Digital footprint
4. e-footprint
Answer
Digital footprint
Reason — Digital footprints are the records and traces of individuals' activities as they use the
Internet on various devices such as computers, smartphones, gaming consoles etc.
Question 36
Gaining unauthorized access to a network or computer or digital files with malicious intentions,
is called ............... .
1. Cracking
2. Hacking
3. Banging
4. Phishing
Answer
Hacking
Question 37
Legal term to describe the rights of a creator of original creative or artistic work is called
............... .
1. Copyright
2. Copyleft
3. GPL
4. None of these
Answer
Copyright
Reason — A copyright is a legal term to describe the rights of the creator of an original creative
work such as a literary work, an artistic work, a design, song, movie or software etc.
Question 38
Answer
Reason — Copyright, patent, and trademark are all forms of intellectual property rights.
Question 39
1. Size
2. Type
3. Empty
4. Columns
Answer
Type
Question 40
............... is a non-profit organization that aims to build a publicly accessible global platform
where a range of creative and academic work is shared freely.
1. Creative Cost
2. Critical Commons
3. Creative Commons
4. Creative Common
Answer
Creative Commons
Question 41
Answer
Question 42
E-waste is becoming one of the fastest growing environmental hazards in the world today. If it is
not properly treated or disposed of it can cause serious health hazards, therefore the ............... has
issued a formal set of guidelines for proper handling and disposal of e-waste.
Answer
Reason — The Central Pollution Control Board (CPCB) has issued formal guidelines for the
proper handling and disposal of e-waste to address the growing environmental hazards associated
with it.
Question 43
A worm is ...............
Answer
Pieces of malicious code that make copies of themselves and spread through computers without
human interaction.
Reason — A worm is a self-replicating program which eats up the entire disk space or memory.
A worm keeps on creating its copies until all the disk space or memory is filled.
Question 44
If you receive an email claiming to need your username and/or password, what should you do ?
Answer
Reason — If we receive an email asking for our username and/or password, we should report it
as phishing/spam through our email provider.
Question 45
What should your response be if you receive an email stating that you have won a lottery or
received some inheritance from an unknown person ?
Answer
Reason — Marking the email as spam and blocking the sender is the appropriate response when
we receive an email stating that we have won a lottery or received some inheritance from an
unknown person.
Question 46
1. program
2. virus
3. application
4. worm
Answer
worm
Reason — A computer worm is a type of malicious code that self-replicates by copying itself to
other programs, allowing it to spread throughout a computer system or network.
Question 47
Which of the following is a type of program that either pretends to have, or is described as
having, a set of useful or desirable features but actually contains a damaging code.
1. Trojans
2. Viruses
3. Worm
4. Adware
Answer
Trojans
Reason — A Trojan horse is a program that appears harmless but actually performs malicious
functions such as deleting or damaging files.
Question 48
Which of the following is the type of software that has self-replicating software that causes
damage to files and system ?
1. Trojans
2. Viruses
3. Worm
4. Adware
Answer
Worm
Reason — A worm is a self-replicating program and can cause damage to files and systems as it
spreads through networks or systems.
Question 49
Which of the following tracks your internet browsing habits and sends you popups containing
advertisements related to the sites and topics you've visited ?
1. Trojans
2. Viruses
3. Worm
4. Adware
Answer
Adware
Reason — Adware is the type of software that tracks our internet browsing habits and displays
pop-up advertisements related to the sites and topics we've visited.
Question 50
What is the broad term covering computer viruses, worms, trojan, adware, etc. ?
1. Malware
2. Spyware
3. Worm
4. Adware
Answer
Malware
Reason — Malware is a broad term covering computer viruses, worms, trojans, adware,
spyware, etc.
Question 51
The attack that focuses on capturing small packets from the network transmitted by other
computers and reading the data content in search of any type of information is ............... .
1. Phishing
2. Eavesdropping
3. Scams
4. PC intrusion
Answer
Eavesdropping
Reason — Eavesdropping is the attack that focuses on capturing small packets from the network
transmitted by other computers and reading the data content in search of any type of information.
Question 52
Which of the following is/are source of spreading viruses from one computer to another ?
1. Email
2. Infected data
3. Infected programs
4. All of these
Answer
All of these
Reason — The sources of spreading viruses from one computer to another include email,
infected data, and infected programs.
Question 53
............... are the attempts by individuals to obtain confidential information from you through an
original looking site and URL.
1. Phishing scams
2. Spoofing
3. Eavesdropping
4. Pharming
Answer
Phishing scams
Question 54
............... is an attempt where a hacker tries to divert network traffic to a bogus site.
1. Phishing scams
2. Spoofing
3. Eavesdropping
4. Pharming attack
Answer
Pharming attack
Reason — Pharming attack is an attempt where a hacker tries to divert network traffic to a bogus
site without our knowledge or consent.
Question 55
A research student is expected to write a thesis on a topic. The student browses Internet for the
topic and luckily finds it on the Internet. He copies and submits the entire thesis as his own
research work. Which of the following activities appropriately categorises the act of the writer ?
1. Spamming
2. Phishing
3. Plagiarism
4. Trojan
Answer
Plagiarism
Reason — Plagiarism is the act of stealing someone else's intellectual work and presenting it as
our own without citing the original source of information. In this case, the student copied the
entire thesis from the internet and claimed it as his own research work, which is a case of
plagiarism.
Question 1
Question 2
Any fraudulent business practice that extracts money from an unsuspecting, ignorant person is
called a scam.
Question 3
Plagiarism is stealing someone else's intellectual work and representing it as your own without
giving credit.
Question 4
Any work/information that exists in digital form either on Internet or on an electronic device, is
known as digital property.
Question 5
Question 6
Question 7
The original code written by programmers for a software is known as source code.
Question 8
Question 10
Question 11
The Digital Footprint is the digital trail of your activity on the Internet.
Question 12
The licenses are the permissions given to use a product or someone's creation by the copyright
holder.
Question 13
Question 14
The practice of taking someone else's work or ideas and passing them off as one's own is known
as Plagiarism.
Question 15
A Repetitive Strain Injury is an injury or disorder of the muscles, nerves, tendons, ligaments and
joints.
Question 16
Question 17
Malware is a general term used to refer to viruses, worms, spyware, adware etc.
Question 18
A worm is a self-replicating program which eats up the entire disk space or memory.
Question 19
Trojan horse is a program that appears harmless (such as a text editor or a utility program) but
actually performs malicious functions.
Question 20
Spyware is a software which is installed on your computer to spy on your activities and report
this data to people willing to pay for it.
Question 21
Question 22
Question 23
A cookie is a small piece of data sent from a website and stored in a user's web browser (in a text
file) while a user is browsing a website.
Question 24
Question 25
A mail or message sent to a large number of people indiscriminately without their consent is
called spam.
Question 26
True/False Questions
Question 1
Answer
True
Reason — Open source software, being freely available and allowing modification and
redistribution without limitations, can be used for commercial purposes.
Question 2
It is okay to copy and paste information from the Internet into your report then organize it.
Answer
False
Reason — Copying and pasting information from the internet into our report without proper
citation or attribution is considered plagiarism.
Question 3
Shareware software allows you to try the software before you buy it.
Answer
True
Reason — Shareware software allows users to try the software before purchasing it.
Question 4
Answer
True
Reason — Freeware is copyrighted software that is available free of cost and allows copying and
further distribution, but not modification, and whose source code is not available.
Question 5
Answer
False
Reason — Cyber law is a generic term which refers to all the legal and regulatory aspects of
Internet and the World Wide Web.
Question 6
Deceptively attempting to acquire sensitive information of someone else using online means, is a
cyber crime.
Answer
True
Reason — The practice of attempting to acquire sensitive information from individuals over the
Internet, by means of deception, known as phishing, is considered a cyber crime.
Question 7
Answer
False
Reason — Freeware is a type of software available free of cost, permitting copying and
distribution but not modification, with its source code not available. On the other hand, free
software, or open-source software, can be freely used, modified, improved, copied, and
distributed without any payment required.
Question 8
Answer
True
Reason — Excessive use of the internet and social media can be considered a disorder, such as
internet addiction disorder.
Question 9
Answer
False
Question 10
True
Reason — Once we post anything online, it stays forever and cannot be undone, and hence,
digital footprints remain forever.
Question 11
Answer
False
Reason — Making all posts public on social media can pose various risks. Therefore, we should
be selective about who we authorize to access our information, limiting it to our known circle or
people we trust.
Question 12
Answer
False
Question 13
If you post something mean about someone, you can just delete it and your activity will be
undone.
Answer
False
Reason — No, deleting a post does not undo the activity because the post might already have
been seen, shared, or saved by others.
Question 14
Answer
True
Reason — Hacking refers to gaining unauthorized access to a network, computer, or digital files
with the intention to steal or manipulate data or information or to install malware, making it a
form of cyber crime.
Question 15
Answer
True
Reason — A copyright is the rights of the creator of an original creative work such as a literary
work, an artistic work, a design, song, movie or software etc.
Question 16
Computer viruses are healthy codes/programs written to test the security health of a system.
Answer
False
Reason — Computer viruses are malicious codes/programs that cause damage to data and files
on a system.
Question 17
Answer
True
Reason — A worm is a self-replicating program which eats up the entire disk space or memory.
Question 18
A trojan horse is a utility program that does harm when its date gets expired.
Answer
False
Reason — A Trojan horse is a program that appears harmless but actually performs malicious
functions such as deleting or damaging files.
Question 19
Spyware is healthy software which keeps an eye on activities happening on your computer.
Answer
False
Reason — Spyware is a software which is mostly installed on our computer without our consent,
to spy on our activities and report this data to people willing to pay for it.
Question 20
Adware are the programs that deliver unwanted ads to your computer.
Answer
True
Reason — Adware are the programs that deliver unwanted ads to our computer.
Question 21
Answer
False
Reason — Malware is a general term used to refer to viruses, worms, spyware, adware etc. In
the other words, it is unwanted software that someone else wants to run on our computer.
Question 22
Answer
True
Question 23
Phishing involves authentic looking sites trying to collect your sensitive transactional and
identity information.
Answer
True
Question 24
To keep a computer protected, one should use updated software, be cautious while handling
mails and surfing Internet, scanning computer regularly etc.
Answer
True
Reason — Keeping a computer protected involves using updated software, being cautious while
handling emails and surfing the internet, regularly scanning the computer for malware or viruses,
using strong passwords, and practicing safe browsing habits.
Question 25
Answer
True
Question 1
Explanation
The trail of online activity, known as a Digital Footprint, refers to the records and traces of an
individual's activities as they use the Internet.
Question 2
Reason. Intellectual Property Rights are the rights of the owner of information to decide how
and how much the creation can be used.
Answer
Explanation
Intellectual Property Rights are the rights of the owner of information to decide how much
information is to be exchanged, shared, or distributed and the price of their intellectual property.
These rights also encompass the ability to protect one's creations through copyrights, patents, or
trademarks. Therefore, Copyrights, Patents, and Trademarks are examples of Intellectual
Property Rights.
Question 3
Answer
Question 4
Assertion. Anything available online does not mean it is free and freely available to use.
Answer
Explanation
Many online materials are protected by copyright laws, and using them without permission may
infringe on the rights of the copyright holder. Just because content is available online does not
mean it is free from copyright or other intellectual property rights (IPRs). Intellectual Property
Rights (IPRs) do apply to online content. Copyright, trademarks, patents, and other forms of
IPRs protect various types of content on the Internet, just as they protect content in the offline
world.
Question 5
Reason. Stealing someone's work and showing it as own work is the violation of Intellectual
Property Rights.
Answer
Question 6
Assertion. Open Source Software makes available the source code of the software.
Reason. Open source software and free software are the same.
Answer
Explanation
Open Source Software makes the source code of the software available to customers, and it can
be modified and redistributed without limitations. It may be available for free or for a nominal
charge. In contrast, free software is freely accessible and can be used, changed, improved,
copied, and distributed by anyone without any restrictions or payments. Therefore, open-source
software and free software are not the same.
Question 7
Assertion. Open Source Software and Freeware may come free of cost but they are not the same.
Reason. Open Source Software gives source code with freedom to-use while freeware comes at
free-of-cost.
Answer
Explanation
Open Source Software and Freeware may come free of cost, but they are not the same. Open
Source Software is a software that is available free of cost to customers and can be modified and
redistributed without limitations. It makes the source code of the software available to customers.
On the other hand, Freeware is also available free of cost, but it does not allow modification of
the software and does not make the source code available to customers.
Question 8
Answer
Explanation
Freeware is software that is available free of cost and allows copying and further distribution, but
not modification, and whose source code is not available. Free software, on the other hand, is
freely accessible and can be used, changed, improved, copied, and distributed by anyone without
any restrictions or payments. While free software is often available at no cost, it's possible for
developers to charge for services, support, or proprietary features related to the software.
Question 9
Reason. Freeware means no cost for the software, while free software means source code
available with a freedom to use it.
Answer
Explanation
Freeware is software that is available free of cost and allows copying and further distribution.
However, freeware does not allow modification, and its source code is not available. Free
software, on the other hand, is freely accessible and comes with source code available with a
freedom to use it, allowing users to use, change, improve, copy, and distribute the software
without any restrictions or payments.
Question 10
Answer
Explanation
Malware is an umbrella term for any piece of software that has malicious intent. Viruses,
Worms, Trojans, Adware, Spyware are all types of malware.
Question 11
Reason. Spyware track data about user and sell it to others hampering your data privacy.
Answer
Explanation
Spyware are the software that stealthily attach with computer software such as a web browser
and stealthily collect information about user's activities such as passwords, pins, banking
information etc. Hence, spyware may not directly damage data, but they track data about user
and sell it to others hampering user's data privacy.
Question 12
Assertion. Phishing is fraudulently taking a user to an authentic looking site and stealing user
information.
Answer
Explanation
Phishing is the criminally fraudulent process of taking a user to an authentic looking site and
attempting to acquire sensitive information such as usernames, passwords, credit card
information etc. While pharming is fraudulently redirecting a website's traffic to bogus site
without user's knowledge or consent to steal information.
Question 13
Assertion. One should share information only on encrypted connections and protocols.
Answer
Explanation
One should share information only on encrypted connections and protocols to ensure the security
and confidentiality of data. This can be achieved using HTTPS (Hypertext Transfer Protocol
Secure), a protocol that provides end-to-end encryption, ensuring the secure exchange of
information.
Assignment
Question 1
The trail that is automatically created when a person uses the internet on any digital devices like
Laptops, smart phones, tablets etc. is called :
(b) Phishing
Answer
Digital Footprint
The trail of data that is automatically created when a person uses any digital device like laptops,
smartphones, tablets, etc., is called a digital footprint.
Question 2
Answer
Digital Footprints are the records and traces of individual's activities as they use the Internet.
Digital Footprints are permanently stored.
Question 3
Answer
Question 4
Any piece of information is produced or created with a lot of efforts and it consumes a lot of
time. Creative creations of mind such as patents, literary and creative arts, copyrights,
trademarks etc. are known as intellectual property.
Intellectual property rights are the rights of the owner of information to decide how much
information is to be exchanged, shared or distributed. Also it gives the owner a right to decide
the price for doing so.
Question 5
Answer
Plagiarism is stealing someone else's intellectual work and representing it as our own work
without giving credit to creator or without citing the source of information.
For example, a student copies a paragraph from a website and includes it in his/her essay without
citing the source, it is considered as plagiarism.
Question 6
How can you avoid plagiarism while referring to someone's else's creation ?
Answer
To avoid plagiarism while referring to someone else's creation, we must give credit whenever we
use:
Question 7
Answer
Digital property (or digital assets) refers to any information about us or created by us that exists
in digital form, either online or on an electronic storage device.
Question 8
What are the threats to digital properties ?
Answer
1. Digital software penetration tools — There are many software penetration tools such as
cracks and keygens which enable unauthorized users to freely access a software without
actually paying for it.
2. Stealing and plagiarizing codes of digital properties — Other developers may steal a
software's source code and use it to build their own versions of it, and then sell it under
their own company name.
Question 9
Answer
Question 10
1. OSI
2. FLOSS
3. FSF
4. GNU
5. GPL
6. W3C
7. OSS
Answer
Question 11
What is open source software ? Write the names of any two software which can be categorized
as Open Source.
Answer
Open source software is the software, whose source code is freely available and which can be
copied, modified and redistributed without any limitation.
Question 12(i)
Answer
Free software is the software which is free of cost, which can be copied, modified and
redistributed as well and whose source code is available. No charges are payable for free
software.
Open source software, on the other hand, is the software, whose source code is available and
which can be copied, modified and redistributed as well. There may or may not be charges
payable for open source software.
Question 12(ii)
Answer
OSS refers to Open Source Software whose source code is made available to the public, allowing
anyone to view, modify, and distribute the code. However, OSS does not necessarily mean that
the software is completely free of charge. It only means that the source code is available for
others to access and modify.
FLOSS refers to Free Libre/Livre and Open Source Software. The term FLOSS is used to refer
to a software which is both free software as well as open source software. In addition to being
Open Source, FLOSS also emphasises that no charges are applicable to the user for using and
distributing the software.
Question 12(iii)
Answer
Proprietary software is the software that is neither open nor freely available. Its use is regulated
and further distribution and modification is either forbidden or requires special permission by the
supplier or vendor. Source code of proprietary software is normally not available. These
softwares need to be purchased before they can be used.
Free software means that the software is freely accessible and can be freely used, changed,
improved, copied and distributed by all who wish to do so. No payments are needed to be made
for free software.
Question 12(iv)
Answer
The term freeware is generally used for software, which is available free of cost and which
allows copying and further distribution, but not modification and whose source code is not
available. The right to use the software is limited to certain types of users for instance, for private
and non-commercial purposes.
Shareware is a software which is made available with the right to redistribute copies, but it is
stipulated that if one intends to use the software, often after a certain period of time then a
license fee should be paid. The source code of shareware is not available and modifications to
the software are not allowed.
Question 12(v)
Answer
The term freeware is generally used for software, which is available free of cost and which
allows copying and further distribution, but not modification and whose source code is not
available. The right to use the software is limited to certain types of users for instance, for private
and non-commercial purposes.
Free software means that the software is freely accessible and can be freely used, changed,
improved, copied and distributed by all who wish to do so. No payments are needed to be made
for free software.
Question 13
Consider the following scenario and answer the questions which follow :
"A student is expected to write a research paper on a topic. The student had a friend who took a
similar class five years ago. The student asks his older friend for a copy of his paper and then
takes the paper and then submits the entire paper as his own research work".
(i) Which of the following activities appropriately categorizes the act of the writer ?
1. Plagiarism
2. Spamming
3. Virus
4. Phishing
(ii) Which kind of offense out of the following is made by the student ?
1. Cyber Crime
2. Civil Crime
3. Violation of Intellectual Property Rights
Answer
(i) Plagiarism
Reason — Submitting his friend's work as his own research work without proper attribution or
permission is considered plagiarism.
Question 14
IT Act (ITA)
Reason — In India, cyber laws are enforced through Information Technology Act, 2000.
Question 15
E-waste is harmful to the environment and human health if not properly treated or disposed of,
therefore they must be handled with care. What are the health hazard which can be caused by E-
waste ?
1. Lung cancer
2. DNA damage
3. Brain damage
4. All of the above
Answer
Reason — E-waste contains hazardous substances such as lead, mercury, cadmium, arsenic etc.
Improper handling or disposal of e-waste can release these toxic substances into the
environment, leading to various health hazards including lung cancer, DNA damage, and brain
damage.
Question 16
What is public domain software ? Name some common public domain software licenses.
Answer
Public-domain software is free and can be used without restrictions. It is, by its very nature,
outside the scope of copyright and licensing.
Some open source licenses are Creative Commons License, General Public License and Apache
License.
Question 17
What is GPL software license ? How is it different from LGPL software license ?
Answer
General Public License (GPL) grants and guarantees a wide range of rights to developers who
work on open-source projects. With GPL, users can do the following:
1. Copy the software as many times as needed.
2. Distribute the software in any way
3. Charge a fee to distribute the software after modifying it but the software should still be
under GNU GPL.
4. Make any type of modifications to the software
The LGPL and GPL licenses differ with one major exception. With LGPL the requirement that
you have to release software extensions in open GPL has been removed.
Question 18
Answer
(a) Digital property (or digital assets) refers to any information about us or created by us that
exists in digital form, either online or on an electronic storage device.
For example, any online personal accounts such as email, personal websites and blogs, domain
names registered in our name, intellectual properties etc.
(b) Digital property rights lie with the owner. Legally a person who has created it or the owner
who has got it developed by paying legally is the legal owner of a digital property. Only the
owner can use and decide who all and in what form can his/her digital asset may be used by
others, whether by making payments or by buying it or by obtaining its license or usage rights
etc. Thus, it is important to safeguard digital properties.
1. Digital software penetration tools — There are many software penetration tools such as
cracks and keygens which enable unauthorized users to freely access a software without
actually paying for it.
2. Stealing and plagiarizing codes of digital properties — Other developers may steal a
software's source code and use it to build their own versions of it, and then sell it under
their own company name.
(d) The following are the ways to ensure protection of digital properties:
1. Anti-Tamper Solutions — They use a host of advanced technologies to prevent hacking,
reverse-engineering or manipulating digital properties such as utility tools, software,
apps, video games and so forth.
2. Legal Clauses — There must be a transparent clause in the software's Terms of Service
that prohibits the scraping of the software's source code for reuse.
3. Limit the sharing of software code — One should share software code only with trusted
individuals who are part of development team. Digital Rights Management (DRM)
solution can protect a software from being scraped for source code using decompilers etc.
Question 19(i)
Define Phishing.
Answer
Phishing is the practice of attempting to acquire sensitive information from individuals over the
internet, by means of deception.
Question 19(ii)
Define Scam.
Answer
Any fraudulent business practice that extracts money from an unsuspecting, ignorant person is
called a scam.
Question 19(iii)
Define Hacking.
Answer
Hacking refers to gaining unauthorized access to a network or computer or digital files, with an
intention to steal or manipulate data or information or to install malware.
Question 19(iv)
Define Spoofing.
Answer
Question 20
What is cyber crime ? Give examples.
Answer
Cyber crime is any criminal offense that is facilitated by, or involves the use of, electronic
communications or information systems, including any electronic device, computer, or the
Internet.
Question 21
Answer
A person breaks into a house and steals jewellery and cash. This crime involves the unlawful
taking of someone else's property and is not classified as a cyber crime.
Question 22
What is Internet addiction ? What are some symptoms of the Internet addiction ?
Answer
When a person can't find a balance between their time online and their time offline, it
considerably affects their mental health, this condition is called Internet addiction.
Question 23
Answer
What is copyright ?
Answer
A copyright is a legal term to describe the rights of the creator of an original creative work such
as a literary work, an artistic work, a design, song, movie or software etc.
Question 25
Answer
Question 26(i)
Answer
Question 26(ii)
What do you understand by Net Etiquettes ? Explain any two such etiquettes.
Answer
Net Etiquettes refers to online manners while using Internet or working online. While online, we
should be courteous, truthful and respectful of others.
2. Never spam — We should not repeatedly post the same advertisement for products or
services.
Question 27
Nowadays all of us frequently use social media to connect with our friends. Give any two
netiquettes that we should follow while communicating on social media.
Answer
The two netiquettes that we should follow while communicating on social media are as follows:
Question 28
Answer
Hacking refers to gaining unauthorized access to a network or computer or digital files, with an
intention to steal or manipulate data or information or to install malware.
A hacker is someone who gains unauthorized access to our network or computer or digital files,
with an intention to steal or manipulate data or information or to install malware.
Question 29
Answer
The two health hazards related to excessive use of technology are as follows:
Question 30
How does excessive use of technology impact the mental health of a user ?
Answer
Excessive use of technology leads to isolation, as people don't get time to physically socialize. It
sometimes also leads to anxiety and depression, as people often tend to think that their
"connections" have "perfect rosy lives" while they do not. Additionally, it can lead to Internet
addiction. People may obsessively look through emails and messages, feeling stressed if they
don't receive likes or replies on their posts, etc. This problem is formally termed Internet
addiction disorder.
Question 31
How does excessive use of technology impact the physical health of a user ?
Answer
1. Impact on Hearing — Listening to loud music for over 15 minutes can cause hearing
damage. Using headphones for long periods increases bacteria in the ears by over 700
times.
2. Impact on Bones and Joints — Technology affects posture due to prolonged sitting and
repetitive movements, leading to muscle and joint strain. Repetitive Strain Injuries (RSIs)
affect muscles, nerves, tendons, ligaments, and joints.
3. Eye Problems — Constant screen exposure from smartphones, laptops, and computers
can damage vision, especially due to blue light, leading to potential vision loss. Computer
Vision Syndrome (CVS) is a related eye condition.
4. Sleep Issues — Excessive device use disrupts sleep due to bright screen light suppressing
melatonin production. Poor sleep impacts cognitive function, memory, and attention
span.
Question 32
Answer
A virus is a malicious codes/programs that cause damage to data and files on a system. Viruses
can attack any part of a computer's software such as boot block, operating system, system areas,
files and application-program-macros etc.
Anti-virus software is designed to detect and block attacks from malware. This software when
loaded, resides in memory and checks every operation if it is malicious or not. If it finds any
suspicious activity, it blocks that operation and saves our computer.
Question 33
Answer
A computer virus is a computer program that can infect other computer programs by modifying
them in such a way as to include a copy of itself.
Viruses can alter, corrupt and delete files, freeze the computer, flash unknown or unasked
messages or display unwanted graphics on the computer screen, play unwanted music and
interfere with the computer operation.
Question 34
Answer
1. Some viruses may delete or damage random documents or specific files that are crucial to
the operating system.
2. Viruses can run in the background, without being seen, and may cause the computer to
run extremely slow.
3. Some forms of viruses may infect the email program and spread themselves to the
contacts in the address book.
Question 35
What are Malware ? What type of damages can they cause to your computer ?
Answer
Malware is a general term used to refer to viruses, worms, spyware, adware etc. It is unwanted
software that someone else wants to run on our computer. Malware infects our computer, making
it behave in a way, which we do not approve of.
Question 36
Answer
Spam refers to electronic junk mail or junk newsgroup postings, as well as unsolicited, usually
commercial email sent to a large number of addresses.
1. It reduces productivity — The billions of spam messages circulating across the Internet
can disrupt email delivery, degrade system performance, and reduce overall productivity.
2. It consumes time — While deleting spam emails might seem like a simple solution, it
consumes a significant amount of time and hampers productivity.
3. It can lead to worse things — Spam messages may contain offensive or fraudulent
material and can even be used to spread viruses.
Question 37
What is phishing ?
Answer
Phishing is the act of illegally acquiring personal and sensitive information such as, online
banking details, credit card details, and other login details, of an individual by sending malicious
e-mails or by creating web pages that can collect this information as they appear to come from
very famous organizations.
Question 38
Answer
A firewall secures the computer such that only authentic users can connect to it. The significance
of firewall lies in its ability to monitor, filter, and control incoming and outgoing network traffic
based on predefined security rules. This helps prevent unauthorized access, data breaches, and
malicious attacks, such as viruses, malware, and hacking attempts, from reaching the protected
computer system.