0% found this document useful (0 votes)
30 views14 pages

Ganganagar, Bangalore

The document discusses the societal impact of digital technology, covering topics such as digital technology definitions, advantages, digital society, netizens, digital footprints, and net etiquette. It also addresses data protection, intellectual property rights, software licensing, and the implications of software piracy. Additionally, it highlights the importance of responsible online behavior and the legal frameworks established by the Indian Information Technology Act.

Uploaded by

syedyaseenahmed1
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
30 views14 pages

Ganganagar, Bangalore

The document discusses the societal impact of digital technology, covering topics such as digital technology definitions, advantages, digital society, netizens, digital footprints, and net etiquette. It also addresses data protection, intellectual property rights, software licensing, and the implications of software piracy. Additionally, it highlights the importance of responsible online behavior and the legal frameworks established by the Indian Information Technology Act.

Uploaded by

syedyaseenahmed1
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 14

Ganganagar, Bangalore

SUBJECT Computer Science

CLASS Topic : SOCEITAL IMPACT


I PUC

1. What is Digital technology?


Information technology which refers to the use of computers to create, process and store data
and information

2. What are the advantages of digital technology?

1. Convenience and Speed


2. Digital technologies have made tasks faster and easier.
3. Emails can be sent instantly to multiple recipients.
4. Enhanced Productivity
5. Instant communication increases efficiency and productivity.
6. Widespread Use Across Industries
7. Digital technologies have transformed sectors like banking, aviation, and e commerce.
8. Accessibility to all.

3. What is Digital Society?


A digital society uses technology for daily tasks. Digital society thus reflects the growing
trend of using digital technologies in all spheres of human activities.

4. Who is netizen?
Anyone who uses digital technology along with Internet is a digital citizen or a netizen.

5. What is digital foot print?


Whenever we surf the Internet using smartphones, tablets, computers, etc., we leave a trail
of data reflecting the activities performed by us online, which is our digital footprint.
Trail of data you leave behind when you use the internet.
 Our digital footprint can be created and used with or without our knowledge.
 It includes websites we visit, emails we send, and any information we submit online, etc.,
along with the computer’s IP address, location, and other device specific details.
 Such data could be used for targeted advertisement or could also be misused or exploited.
 There is no guarantee that digital footprints will be fully eliminated from the Internet.
Therefore, we need to be more cautious while being online!

6. What are the kinds of digital footprints?


Active digital footprints
Includes data that we intentionally submit online.
• Eg: WhatsApp ,Instagram ,Facebook[status],emails-sending messages—all are recorded
Passive digital footprints
• The digital data trail we leave online unintentionally is called.
• Eg:This includes the data generated when we visit a website, use a mobile App, browse
Internet, etc.,
7. What are the rules a netizen should follow?
A responsible netizen must abide by net etiquettes, communication etiquettes and
social media etiquettes

8. What are net etiquettes?

Guidelines for ethical, respectful, and responsible behavior online.


One should be
• ethical,
• respectful ,
• responsible while surfing the Internet.
Be Ethical:
No Copyright Violation: Avoid using copyrighted materials without permission.
Share Expertise: Share accurate, clear information online,
Be Respectful
Respect Privacy: Respect the privacy of others and do not share personal information without
consent.
Respect Diversity: Acknowledge and value the different perspectives and experiences of others
in online spaces.
Be Responsible
a) Avoid cyber bullying: (taunting, teasing)
Any insulting, degrading online behavior like repeated posting of rumors, giving
threats online, posting the victim’s personal information, sexual harassment or comments
aimed to publicly ridicule[humiliate] a victim ,aggressive is termed as cyber bullying.

b) Don’t feed the troll:


• An Internet troll is a person who deliberately sows discord[disagree] on the Internet by
starting quarrels or upsetting people, by posting inflammatory or off topic messages in
an online community, just for amusement.
9. What do you mean by Digital communication?

Digital communication includes email, texting, instant messaging, talking on the cell phone,
audio or video conferencing, posting on forums, social networking sites, etc. Includes
email, texting, instant messaging, talking on the cell phone, audio or video conferencing,
posting on forums, social networking sites, etc.

10. What are Communication Etiquettes?

Guidelines for clear, respectful, and credible digital communication.

1) Be Precise:
Respect Time: Avoid unnecessary emails and do not expect instant responses
Respect data limits: Optimize Data Usage.
For concerns related to data and bandwidth, very large attachments may be avoided.
2) Be polite:
 Whether the communication is synchronous (happening in real time interactions like
chat, audio/video calls) or asynchronous (like email, forum post or comments), we should
be polite and non-aggressive in our communication.
 We should avoid being abusive even if we don’t agree with others’ point of view.
 Use respectful language
3) Be Credible:
Post Thoughtfully: Ensure your contributions are reliable and build trust over time.

11.What are Social Media Etiquettes?


Social Media Etiquettes are guidelines for safe, respectful, and responsible behavior on social
platforms.
1) Be Secure:
Choose Passwords Wisely: Use strong, frequently updated passwords and avoid sharing
credentials.
Never share personal credentials like username and password with
others.
Know Who You Befriend: Avoid connecting with unknown people who may have malicious
intentions.
Beware of Fake Information: Validate the authenticity of news, posts, and messages before
believing or sharing them.
2) Be Reliable:
Think Before Uploading:
Avoid uploading sensitive content, as once online, it remains stored even if deleted.

12.What do you mean by data protection?

Data protection ensures the privacy and security of sensitive information in the digital world,
preventing unauthorized access or misuse.

13.What do you mean by sensitive data?

Data that can cause harm if breached (e.g., biometric, health, financial information).

14.Give examples of sensitive data?

Examples of sensitive data include biometric information, health information, financial


information, or other personal documents, images or audios or videos.

15. Mention the protection methods for sensitive data?

Encryption, authentication, and secure methods to limit access to authorized users.

16. What is the Objective of Data Protection?


To prevent unauthorized access, modification, or disclosure of sensitive information.

17.What is IPR?

Intellectual Property Right (IPR):


Intellectual Property Rights protect the creations of the mind, such as inventions, literary
works, and symbols, allowing creators to benefit from their original ideas.

18. Mention the 3 IPR?

PATENT, COPYRIGHT, TRADEMARK

19. Explain the 3 IPR?

copyright

 Copyright grants creators legal rights to their original works (e.g., writing, photography,
software).
 The copyright holder has the exclusive right to reproduce, distribute, and display the
work.
 To use copyrighted material, permission must be obtained from the owner.
Patent
 Protects inventions and grants exclusive rights to the inventor.
 Patents are granted for 20 years and prevent others from using, selling, or distributing the
invention without permission.
Trademark
 Trademark includes any visual symbol, word, name, design, slogan, label, etc., that
distinguishes the brand or commercial enterprise, from other brands or commercial
enterprises.
 For example, no company other than Nike can use the Nike brand to sell shoes or clothes.
 Prevents others from using confusingly similar marks to avoid brand confusion.
20. Briefly explain the violations of IPR?

1) Plagiarism
‖ With the availability of Internet, we can instantly copy or share text, pictures and videos.
‖ Presenting someone else’s idea or work as one’s own idea or work is called plagiarism.
‖ If we copy some contents from Internet, but do not mention the source or the original
creator, then it is considered as an act of plagiarism.
‖ It is a serious ethical offense and sometimes considered as an act of fraud.
2) Copyright Infringement [act of violating agreement,law]
 Copyright infringement is when we use other person’s work without obtaining their
permission to use or we have not paid for it, if it is being sold.
 Suppose we download an image from the Internet and use it in our project.
 But if the owner of the copyright of the image does not permit its free usage, then using
such an image even after giving reference of the image in our project is a violation of
copyright.
3) Trademark Infringement
 Trademark Infringement means unauthorized use of other’s trademark on products and
services.
 An owner of a trademark may commence legal proceedings against someone who
infringes its registered trademark.

21. What do you mean by public access and open source software?
Public access and open-source software enable users to share, modify, and contribute to existing
works, fostering collaboration and innovation.

22. What is licensing in software?

Licensing provide rules and guidelines for others to use the existing work.

23. What is open source license?

Open source licenses help others to contribute to existing work or project without seeking
special individual permission to do so.

24. Describe the types of licenses?

 The GNU General public license (GPL) and the Creative Commons (CC) are two popular
categories of public licenses.
 CC is used for all kind of creative works like websites, music, film, literature,
logos,movies remakeetc.
 CC licenses are a set of copyright licenses that give the recipients, rights to copy, modify
and redistribute the creative material, but giving the authors, the liberty to decide the
conditions of licensing.
 GPL is the most widely used free software license which grants the recipients, rights to
copy, modify and redistribute the software and that the same rights are preserved in all
derivative works.[gnu-not unix]
25. What is Free and Open Source Software (FOSS?)
Software like Linux, LibreOffice, and Mozilla Firefox that is free to use, modify, and distribute,
with ongoing community contributions.

26. What is software piracy?


Software piracy is the unauthorised use or distribution of software.

27. What is the impact of software piracy?


Those who purchase a license for a copy of the software do not have the rights to make
additional copies without the permission of the copyright owner. It amounts to copyright
infringement.
One should avoid software piracy. Using a pirated software not only degrades the performance
of a computer system, but also affects the software industry which in turn affects the economy
of a country.

28. What is the use of Indian Information Technology Act (IT Act) ?

 Enactment and Amendments: Introduced in 2000, amended in 2008 to address cyber-


crimes and frauds.
 The act provides legal framework for electronic governance by giving recognition to
electronic records and digital signatures.
 The act outlines cybercrimes and penalties for them.
 Cyber Appellate Tribunal has been established to resolve disputes arising from
cybercrime, such as tampering with computer source documents, hacking the computer
system, using password of another person, publishing sensitive personal data of others
without their consent,
29. How does the digital technology impact on health?

Physical Strain
Prolonged device use causes fatigue and strain on the body.
Improper posture leads to backaches, neck, and shoulder pains.
Eye Health
Continuous screen exposure leads to eye strain, dryness, and irritation.
Small handheld devices exacerbate eye discomfort.
Ergonomics
Proper arrangement of workspace reduces strain on the body.
Ergonomically positioned devices prevent wrist and finger pain.
Mental and Emotional Impact
Excessive screen time can increase stress and mental fatigue.
Prolonged use of digital devices can lead to physical fatigue and obesity.

Exercise problems
1. You are planning to go for a vacation. You surfed the Internet to get answers for the
following queries:

a) Weather conditions
b) Availability of air tickets and fares
c) Places to visit
d) Best hotel deals
Which of your above mentioned actions might have created a digital footprint?

All options above mentioned actions might have created a digital foot print whenever we
surfed the internet.

2. How would you recognize if one of your friends is being cyber bullied?

a) Cite the online activities which would help you detect that your friend is being cyber
bullied?

Some activities which may help to detect that my friend is being cyberbullied are: Checking
his Social Media accounts like Facebook, Twitter, WhatsApp, etc.

Checking his Email account like Gmail, yahoo, etc.

b) What provisions are in IT Act 2000, (amended in 2008) to combact such situations?
 To deal with such menaces, many countries have come up with legal measures for
protection of sensitive personal data and to safeguard the rights of Internet users.
 The Government of India’s Information Technology Act, 2000 (also known as IT Act),
amended [formal change to a law] in 2008, and provides guidelines to the user on the
processing, storage and transmission of sensitive information.
 In many Indian states, there are cyber cells in police stations where one can report any
cybercrime.
 The act provides legal framework for electronic governance by giving recognition to
electronic records and digital signatures.
 The act outlines cybercrimes and penalties for them.

3. Write the differences between the following


a)Copyrights and Patents Solution:

Copyrights:-
Copyright grants legal rights to creators for their original works like writing, photograph, audio
recordings, video, sculptures, architectural works, computer software, and other creative
works like literary and artistic work.

The rights include the right to copy (reproduce) a work, the right to create derivative works
based upon it, the right to distribute copies of the work to the public, and the right to
publicly display or perform the work.

It prevents others from copying, using, or selling the work.

b) Plagiarism and Copyright infringement


Plagiarism
Presenting someone else’s idea or work as one’s own idea or work is called plagiarism.
If we copy some contents from Internet, but do not mention the source or the original
creator, then it is considered as an act of plagiarism.
Further, if someone derives an idea or a product from an already existing idea or product,
but instead presents it a new idea, then also it is plagiarism.
Even if we take contents that are open for public use, we should cite the author or source
to avoid plagiarism.
Copyright infringement
Copyright infringement is when we use other person’s work without obtaining their
permission to use or we have not paid for it, if it is being sold.
Anything on the Internet does not mean that it is free for use.
c)Difference between ethical hacking and non ethical hacking
Ethical hacking

d)Active and Passive foot prints


e)Free software and free and open source software

4. If you plan to use a short text from an article on the web, what steps must you take in
order to credit the sources used?
Answer:I can give the credit by writing the name of the owner or by giving details of the owner.

5. When you search online for pictures, how will you find pictures that are available in
the free public domain? How can those pictures be used in your project without
copyright violations?

Answer: If the pictures are downloadable and there is no watermark in the picture then
they may be available for the free public domain.

6. List down the steps you need to take in order to ensure


a) Your computer is in good working condition for a longer time.

Answer: Our computer will be in good working condition for a longer time when:
 We keep our system up-to-date.
 Do not use third-party applications.
 Use antivirus and anti-spyware. etc.
b) smart and safe Internet surfing.
Answer:
 Use a firewall on the computer.
 Disconnect from the internet when away.
 Keep your email address private.
 Disable cookies, if possible.
 Be careful with email.

 Use caution when downloading files on the internet.


7) In the computer science class, Sunil and Jagdish were assigned the following task by their
teacher. a) Sunil was asked to find information about “India, a Nuclear power”. He was asked
to use Google Chrome browser and prepare his report using Google Docs.
b) Jagdish was asked to find information about “Digital India”. He was asked to use Mozilla
Firefox browser and prepare his report using Libre Office Writer. What is the difference
between technologies used by Sunil and Jagdish?

Answer: Here Sunil is using free software which is Google Chrome and Google Docs
While Jagdish is using free and open source software which is Mozilla Firefox and Libre Office
Writer.

8) Cite examples depicting that you were a victim of following cybercrime. Also, cite provisions
in IT Act to deal with such a cybercrime.

a) Identity theft

Answer: Identity theft occurs when someone uses another person's personal information such
as name, Aadhar number, driver's license number, credit card number, or other identifying
information to take on that person's identity in order to commit fraud or other crimes.

b) Credit card account theft Solution:

Answer:Credit card theft is also a type of identity theft. It occurs when someone accesses your
credit card account and uses it to make unauthorized purchases.

9)Neerja is a student of Class XI. She has opted for Computer Science. Neerja prepared the
project assigned to her. She mailed it to her teacher. The snapshot of that email is shown below.
Find out which of the following email etiquettes are missing in it.
Justify your answer.

a) Subject of the mail


b) Formal greeting
c) Self-explanatory terms
d) Identity of the sender
e) Regards

The following email etiquettes are missing in the given screenshot:


Answer:
The subject of the mail:
Neerja missed the subject of the mail. This is basically the title of the email. A good email
subject convinces readers to open your email.
Formal Greeting:
Neerja missed formal greetings which is not a good habit.
She can give greetings like:
Hi, sir/mam
Hello, sir/mam
Respected, sir/mam,
Self-explanatory terms:
Neerja missed self-explanatory terms that the reader cannot understand in the email.
Regards: There should be respectful towards the recipient which is missing in that screenshot.

11) Sumit got good marks in all the subjects. His father gifted him a laptop. He would like to
make Sumit aware of health hazards associated with inappropriate and excessive use of laptop.
Help his father to list the points which he should discuss with Sumit.

Answer:List of the points which he should discuss with Sumit impact of excessive use of
laptop:
 Impact of hearing impact on bones and joints
 Eye problems
 Sleep issue
 Mental health issues
 Physical symptoms
 Internet addiction disorders
 Eating irregularities.
12) Describe why it is important to secure your wireless router at home.
Search the Internet to find the rules to create a reasonably secure password.
Create an imaginary password for your home router.
Will you share your password for home router with following people.
Justify your answer. a) Parents b) Friends c) Neighbours d) Home Tutors.

Answer:
It is important to secure your wireless router at home so that an unknown person cannot miss
use internet.

A strong password consists of at least a lowercase letter, an uppercase letter, a number, and
some special characters and must be of tale 8 characters in length.
You can share your passwords with anyone whom you can trust.
If you trust your friends, neighbors, and home tutors then you can share with them but make
sure they don't forward it to someone.

You might also like